id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0608118 | Benoit Hudzia | B. Hudzia, M-T. Kechadi and A. Ottewill | TreeP: A Tree-Based P2P Network Architecture | null | B. Hudzia, M-T. Kechadi, and A. Ottewill, "TreeP: A Tree-Based P2P
Network Architecture", International Workshop on Algorithms, Models and tools
for parallel computing on heterogeneous networks (HeteroPar' 05), Boston,
Massachusetts, USA, September 27-30, 2005 | null | null | cs.DC | null | In this paper we proposed a hierarchical P2P network based on a dynamic
partitioning on a 1-D space. This hierarchy is created and maintained
dynamically and provides a gridmiddleware (like DGET) a P2P basic functionality
for resource discovery and load-balancing.This network architecture is called
TreeP (Tree based P2P network architecture) and is based on atessellation of a
1-D space. We show that this topology exploits in an efficient way
theheterogeneity feature of the network while limiting the overhead introduced
by the overlaymaintenance. Experimental results show that this topology is
highly resilient to a large number ofnetwork failures.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 15:08:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hudzia",
"B.",
""
],
[
"Kechadi",
"M-T.",
""
],
[
"Ottewill",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608119 | Shiguo Lian | Shiguo Lian, Jinsheng Sun, Zhiquan Wang | Security Analysis of A Chaos-based Image Encryption Algorithm | 16 pages,4 figures | null | null | null | cs.MM cs.CR | null | The security of Fridrich Image Encryption Algorithm against brute-force
attack, statistical attack, known-plaintext attack and select-plaintext attack
is analyzed by investigating the properties of the involved chaotic maps and
diffusion functions. Based on the given analyses, some means are proposed to
strengthen the overall performance of the focused cryptosystem.
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 03:22:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lian",
"Shiguo",
""
],
[
"Sun",
"Jinsheng",
""
],
[
"Wang",
"Zhiquan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608120 | Thierry Cachat | Thierry Cachat (LIAFA) | Controller synthesis & Ordinal Automata | with appendix | Proceedings of the 4th International Symposium on Automated
Technology for Verification and Analysis (ATVA'06) Springer (Ed.) (2006)
215-228 | null | null | cs.GT | null | Ordinal automata are used to model physical systems with Zeno behavior. Using
automata and games techniques we solve a control problem formulated and left
open by Demri and Nowak in 2005. It involves partial observability and a new
synchronization between the controller and the environment.
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 09:58:08 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Oct 2006 11:04:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cachat",
"Thierry",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0608121 | Cheng-Yuan Liou | Cheng-Yuan Liou and Bruce R. Musicus | Cross Entropy Approximation of Structured Covariance Matrices | 20 pages | IEEE Transactions on Signal Processing, vol. 56, issue 7, Part 2,
pages 3362-3367, 2008 | null | null | cs.IT math.IT | null | We apply two variations of the principle of Minimum Cross Entropy (the
Kullback information measure) to fit parameterized probability density models
to observed data densities. For an array beamforming problem with P incident
narrowband point sources, N > P sensors, and colored noise, both approaches
yield eigenvector fitting methods similar to that of the MUSIC algorithm[1].
Furthermore, the corresponding cross-entropies are related to the MDL model
order selection criterion[2].
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 10:03:50 GMT"
}
] | 2008-06-24T00:00:00 | [
[
"Liou",
"Cheng-Yuan",
""
],
[
"Musicus",
"Bruce R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608122 | Mani A. | A. Mani | FOSS-Based Grid Computing | 47 Pages. arXiv admin note: text overlap with arXiv:cs/0605056 by
other authors | null | null | EG -15 (RMCE) | cs.DC cs.PL | http://creativecommons.org/licenses/by/4.0/ | In this expository paper we will be primarily concerned with core aspects of
Grids and Grid computing using free and open-source software with some emphasis
on utility computing. It is based on a technical report entitled
'Grid-Computing Using GNU/Linux' by the present author. This article was
written in 2006 and should be of historical interest.
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 18:59:33 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Sep 2006 14:36:06 GMT"
},
{
"version": "v3",
"created": "Sun, 12 Jul 2015 06:01:09 GMT"
},
{
"version": "v4",
"created": "Fri, 17 Jul 2015 17:33:07 GMT"
}
] | 2015-07-20T00:00:00 | [
[
"Mani",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0608123 | Zhengbang Zha | Zhengbang Zha and XueLi Wang | Proof of a Conjecture of Helleseth Regarding Pairs of Binary m-Sequences | This paper has been withdrawn | null | null | null | cs.IT math.IT | null | This paper has been withdrawn by the author(s), due a crucial sign error in
Thm. 11.
| [
{
"version": "v1",
"created": "Thu, 31 Aug 2006 07:52:07 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Oct 2007 04:56:52 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Zha",
"Zhengbang",
""
],
[
"Wang",
"XueLi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608124 | Philip Bille | Philip Bille and Inge Li Goertz | The Tree Inclusion Problem: In Linear Space and Faster | Minor updates from last time | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given two rooted, ordered, and labeled trees $P$ and $T$ the tree inclusion
problem is to determine if $P$ can be obtained from $T$ by deleting nodes in
$T$. This problem has recently been recognized as an important query primitive
in XML databases. Kilpel\"ainen and Mannila [\emph{SIAM J. Comput. 1995}]
presented the first polynomial time algorithm using quadratic time and space.
Since then several improved results have been obtained for special cases when
$P$ and $T$ have a small number of leaves or small depth. However, in the worst
case these algorithms still use quadratic time and space. Let $n_S$, $l_S$, and
$d_S$ denote the number of nodes, the number of leaves, and the %maximum depth
of a tree $S \in \{P, T\}$. In this paper we show that the tree inclusion
problem can be solved in space $O(n_T)$ and time: O(\min(l_Pn_T, l_Pl_T\log
\log n_T + n_T, \frac{n_Pn_T}{\log n_T} + n_{T}\log n_{T})). This improves or
matches the best known time complexities while using only linear space instead
of quadratic. This is particularly important in practical applications, such as
XML databases, where the space is likely to be a bottleneck.
| [
{
"version": "v1",
"created": "Thu, 31 Aug 2006 12:23:37 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Sep 2007 11:28:07 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Feb 2009 11:57:45 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Oct 2009 08:51:58 GMT"
},
{
"version": "v5",
"created": "Tue, 18 Jan 2011 15:38:52 GMT"
}
] | 2011-01-19T00:00:00 | [
[
"Bille",
"Philip",
""
],
[
"Goertz",
"Inge Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0608125 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA) | Decidability of Type-checking in the Calculus of Algebraic Constructions
with Size Annotations | null | null | 10.1007/11538363\_11 | null | cs.LO cs.PL | null | Since Val Tannen's pioneer work on the combination of simply-typed
lambda-calculus and first-order rewriting (LICS'88), many authors have
contributed to this subject by extending it to richer typed lambda-calculi and
rewriting paradigms, culminating in calculi like the Calculus of Algebraic
Constructions. These works provide theoretical foundations for type-theoretic
proof assistants where functions and predicates are defined by oriented
higher-order equations. This kind of definitions subsumes induction-based
definitions, is easier to write and provides more automation. On the other
hand, checking that user-defined rewrite rules are strongly normalizing and
confluent, and preserve the decidability of type-checking when combined with
beta-reduction, is more difficult. Most termination criteria rely on the term
structure. In a previous work, we extended to dependent types and higher-order
rewriting, the notion of ``sized types'' studied by several authors in the
simpler framework of ML-like languages, and proved that it preserves strong
normalization. The main contribution of the present paper is twofold. First, we
prove that, in the Calculus of Algebraic Constructions with size annotations,
the problems of type inference and type-checking are decidable, provided that
the sets of constraints generated by size annotations are satisfiable and admit
most general solutions. Second, we prove the later properties for a size
algebra rich enough for capturing usual induction-based definitions and much
more.
| [
{
"version": "v1",
"created": "Thu, 31 Aug 2006 14:26:20 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Sep 2006 11:59:36 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0609001 | Suzanne Shontz | Suzanne M. Shontz, Stephen A. Vavasis | A Robust Solution Procedure for Hyperelastic Solids with Large Boundary
Deformation | Revision of earlier version of paper. Submitted for publication in
Engineering with Computers on 9 September 2010. Accepted for publication on
20 May 2011. Published online 11 June 2011. The final publication is
available at http://www.springerlink.com | null | 10.1007/s00366-011-0225-y | null | cs.NA cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressible Mooney-Rivlin theory has been used to model hyperelastic solids,
such as rubber and porous polymers, and more recently for the modeling of soft
tissues for biomedical tissues, undergoing large elastic deformations. We
propose a solution procedure for Lagrangian finite element discretization of a
static nonlinear compressible Mooney-Rivlin hyperelastic solid. We consider the
case in which the boundary condition is a large prescribed deformation, so that
mesh tangling becomes an obstacle for straightforward algorithms. Our solution
procedure involves a largely geometric procedure to untangle the mesh: solution
of a sequence of linear systems to obtain initial guesses for interior nodal
positions for which no element is inverted. After the mesh is untangled, we
take Newton iterations to converge to a mechanical equilibrium. The Newton
iterations are safeguarded by a line search similar to one used in
optimization. Our computational results indicate that the algorithm is up to 70
times faster than a straightforward Newton continuation procedure and is also
more robust (i.e., able to tolerate much larger deformations). For a few
extremely large deformations, the deformed mesh could only be computed through
the use of an expensive Newton continuation method while using a tight
convergence tolerance and taking very small steps.
| [
{
"version": "v1",
"created": "Fri, 1 Sep 2006 00:07:41 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jun 2011 16:32:43 GMT"
}
] | 2011-06-15T00:00:00 | [
[
"Shontz",
"Suzanne M.",
""
],
[
"Vavasis",
"Stephen A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0609002 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Claude Kirchner (INRIA
Lorraine - LORIA), Colin Riba (INRIA Lorraine - LORIA) | On the confluence of lambda-calculus with conditional rewriting | null | null | 10.1007/11690634\_26 | null | cs.LO cs.PL | null | The confluence of untyped lambda-calculus with unconditional rewriting has
already been studied in various directions. In this paper, we investigate the
confluence of lambda-calculus with conditional rewriting and provide general
results in two directions. First, when conditional rules are algebraic. This
extends results of Muller and Dougherty for unconditional rewriting. Two cases
are considered, whether beta-reduction is allowed or not in the evaluation of
conditions. Moreover, Dougherty's result is improved from the assumption of
strongly normalizing beta-reduction to weakly normalizing beta-reduction. We
also provide examples showing that outside these conditions, modularity of
confluence is difficult to achieve. Second, we go beyond the algebraic
framework and get new confluence results using an extended notion of
orthogonality that takes advantage of the conditional part of rewrite rules.
| [
{
"version": "v1",
"created": "Fri, 1 Sep 2006 12:56:02 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Sep 2006 16:56:30 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Kirchner",
"Claude",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Riba",
"Colin",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0609003 | Emanuel Diamant | Emanuel Diamant | In Quest of Image Semantics: Are We Looking for It Under the Right
Lamppost? | In 2006, this paper has been submitted to 13 computer vision
conferences, and was strongly rejected by 12 of them | null | null | null | cs.CV cs.IR | null | In the last years we witness a dramatic growth of research focused on
semantic image understanding. Indeed, without understanding image content
successful accomplishment of any image-processing task is simply incredible. Up
to the recent times, the ultimate need for such understanding has been met by
the knowledge that a domain expert or a vision system supervisor have
contributed to every image-processing application. The advent of the Internet
has drastically changed this situation. Internet sources of visual information
are diffused and dispersed over the whole Web, so the duty of information
content discovery and evaluation must be relegated now to an image
understanding agent (a machine or a computer program) capable to perform image
content assessment at a remote image location. Development of Content Based
Image Retrieval (CBIR) techniques was a right move in a right direction,
launched about ten years ago. Unfortunately, very little progress has been made
since then. The reason for this can be seen in a rank of long lasting
misconceptions that CBIR designers are continuing to adhere to. I hope, my
arguments will help them to change their minds.
| [
{
"version": "v1",
"created": "Sat, 2 Sep 2006 11:50:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609004 | Moustapha Diaby | Moustapha Diaby | Equality of complexity classes P and NP: Linear programming formulation
of the quadratic assignment problem | 6 pages; Published in the 2006 IMECS Conference Proceedings (ISBN:
988 98671-3-3); Hofman's claimed "counter-example" is invalid: violates set
of constraints 2.10 | null | null | null | cs.CC cs.DM | null | In this paper, we present a polynomial-sized linear programming formulation
of the Quadratic Assignment Problem (QAP). The proposed linear program is a
network flow-based model. Hence, it provides for the solution of the QAP in
polynomial time. Computational testing and results are discussed.
| [
{
"version": "v1",
"created": "Sat, 2 Sep 2006 09:12:27 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Sep 2006 18:45:01 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Sep 2006 01:39:27 GMT"
},
{
"version": "v4",
"created": "Sun, 1 Oct 2006 19:25:04 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Oct 2006 18:43:28 GMT"
},
{
"version": "v6",
"created": "Sun, 22 Oct 2006 13:20:38 GMT"
},
{
"version": "v7",
"created": "Fri, 10 Nov 2006 08:48:05 GMT"
},
{
"version": "v8",
"created": "Wed, 27 Dec 2006 23:44:18 GMT"
},
{
"version": "v9",
"created": "Sun, 13 May 2007 21:04:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609005 | Moustapha Diaby | Moustapha Diaby | The traveling salesman problem: A Linear programming formulation | 10 pages; Published in "WSEAS Transactions on Mathematics."
Constraints added to rectify minor oversight in proof of proposition 2
(Theoretical development is same). Hofman's claim of a "counter-example"
(arXiv cs/0610125 and cs/0611008) is invalid: violates constraints 2.11-2.15 | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a polynomial-sized linear programming formulation
of the Traveling Salesman Problem (TSP). The proposed linear program is a
network flow-based model. Numerical implementation issues and results are
discussed. (The exposition and proofs are much more detailed in an edition
which I wrote in collaboration with Dr. M.H. Karwan in 2012-2014 . That edition
is available at
http://users.business.uconn.edu/mdiaby/P=NPProofPapers/tspPaper.pdf)
| [
{
"version": "v1",
"created": "Sat, 2 Sep 2006 09:28:41 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Oct 2006 15:47:19 GMT"
},
{
"version": "v3",
"created": "Sun, 22 Oct 2006 14:01:23 GMT"
},
{
"version": "v4",
"created": "Fri, 10 Nov 2006 09:44:19 GMT"
},
{
"version": "v5",
"created": "Wed, 27 Dec 2006 23:41:13 GMT"
},
{
"version": "v6",
"created": "Sun, 13 May 2007 16:19:40 GMT"
},
{
"version": "v7",
"created": "Thu, 10 Jul 2014 16:56:56 GMT"
}
] | 2014-07-11T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609006 | Eric Chen | Eric Zhi Chen | New Quasi-Cyclic Codes from Simplex Codes | 3 pages | null | null | null | cs.IT math.IT | null | As a generalization of cyclic codes, quasi-cyclic (QC) codes contain many
good linear codes. But quasi-cyclic codes studied so far are mainly limited to
one generator (1-generator) QC codes. In this correspondence, 2-generator and
3-generator QC codes are studied, and many good, new QC codes are constructed
from simplex codes. Some new binary QC codes or related codes, that improve the
bounds on maximum minimum distance for binary linear codes are constructed.
They are 5-generator QC [93, 17, 34] and [254, 23, 102] codes, and related [96,
17, 36], [256, 23, 104] codes.
| [
{
"version": "v1",
"created": "Sat, 2 Sep 2006 11:08:15 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Nov 2006 15:22:14 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chen",
"Eric Zhi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609007 | Vladislav Malyshkin | Vladislav Malyshkin, Ray Bakhramov, Andrey Gorodetsky | A Massive Local Rules Search Approach to the Classification Problem | 24 pages | null | null | null | cs.LG | null | An approach to the classification problem of machine learning, based on
building local classification rules, is developed. The local rules are
considered as projections of the global classification rules to the event we
want to classify. A massive global optimization algorithm is used for
optimization of quality criterion. The algorithm, which has polynomial
complexity in typical case, is used to find all high--quality local rules. The
other distinctive feature of the algorithm is the integration of attributes
levels selection (for ordered attributes) with rules searching and original
conflicting rules resolution strategy. The algorithm is practical; it was
tested on a number of data sets from UCI repository, and a comparison with the
other predicting techniques is presented.
| [
{
"version": "v1",
"created": "Sun, 3 Sep 2006 21:30:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malyshkin",
"Vladislav",
""
],
[
"Bakhramov",
"Ray",
""
],
[
"Gorodetsky",
"Andrey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0609008 | David Nowak | St\'ephane Demri, Ranko Lazic, David Nowak | On the freeze quantifier in Constraint LTL: decidability and complexity | 29 pages | Information and Computation, 205(1):2-24, January 2007 | 10.1016/j.ic.2006.08.003 | null | cs.LO cs.CC | null | Constraint LTL, a generalisation of LTL over Presburger constraints, is often
used as a formal language to specify the behavior of operational models with
constraints. The freeze quantifier can be part of the language, as in some
real-time logics, but this variable-binding mechanism is quite general and
ubiquitous in many logical languages (first-order temporal logics, hybrid
logics, logics for sequence diagrams, navigation logics, logics with
lambda-abstraction etc.). We show that Constraint LTL over the simple domain
(N,=) augmented with the freeze quantifier is undecidable which is a surprising
result in view of the poor language for constraints (only equality tests). Many
versions of freeze-free Constraint LTL are decidable over domains with
qualitative predicates and our undecidability result actually establishes
Sigma_1^1-completeness. On the positive side, we provide complexity results
when the domain is finite (EXPSPACE-completeness) or when the formulae are flat
in a sense introduced in the paper. Our undecidability results are sharp (i.e.
with restrictions on the number of variables) and all our complexity
characterisations ensure completeness with respect to some complexity class
(mainly PSPACE and EXPSPACE).
| [
{
"version": "v1",
"created": "Mon, 4 Sep 2006 06:20:03 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 09:36:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demri",
"Stéphane",
""
],
[
"Lazic",
"Ranko",
""
],
[
"Nowak",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0609009 | Virginia Vassilevska | Virginia Vassilevska, Ryan Williams and Raphael Yuster | Finding heaviest H-subgraphs in real weighted graphs, with applications | 23 pages | null | null | null | cs.DS cs.DM | null | For a graph G with real weights assigned to the vertices (edges), the MAX
H-SUBGRAPH problem is to find an H-subgraph of G with maximum total weight, if
one exists. The all-pairs MAX H-SUBGRAPH problem is to find for every pair of
vertices u,v, a maximum H-subgraph containing both u and v, if one exists. Our
main results are new strongly polynomial algorithms for the all-pairs MAX
H-SUBGRAPH problem for vertex weighted graphs. We also give improved algorithms
for the MAX-H SUBGRAPH problem for edge weighted graphs, and various related
problems, including computing the first k most significant bits of the distance
product of two matrices. Some of our algorithms are based, in part, on fast
matrix multiplication.
| [
{
"version": "v1",
"created": "Mon, 4 Sep 2006 08:08:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vassilevska",
"Virginia",
""
],
[
"Williams",
"Ryan",
""
],
[
"Yuster",
"Raphael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609010 | Artur Rataj | Artur Rataj | An effective edge--directed frequency filter for removal of aliasing in
upsampled images | 10 pages, 11 figures | null | null | null | cs.CV | null | Raster images can have a range of various distortions connected to their
raster structure. Upsampling them might in effect substantially yield the
raster structure of the original image, known as aliasing. The upsampling
itself may introduce aliasing into the upsampled image as well. The presented
method attempts to remove the aliasing using frequency filters based on the
discrete fast Fourier transform, and applied directionally in certain regions
placed along the edges in the image.
As opposed to some anisotropic smoothing methods, the presented algorithm
aims to selectively reduce only the aliasing, preserving the sharpness of image
details.
The method can be used as a post--processing filter along with various
upsampling algorithms. It was experimentally shown that the method can improve
the visual quality of the upsampled images.
| [
{
"version": "v1",
"created": "Mon, 4 Sep 2006 13:04:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rataj",
"Artur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0609011 | Kalyanarama Sesha Sayee KCV | K.C.V. Kalyanarama Sesha Sayee | Scheduling for Stable and Reliable Communication over Multiaccess
Channels and Degraded Broadcast Channels | Ph.D. Thesis submitted to Department of Electrical Communication
Engineering at Indian Institute of Science, Bangalore, India | null | null | null | cs.NI cs.IT math.IT | null | Information-theoretic arguments focus on modeling the reliability of
information transmission, assuming availability of infinite data at sources,
thus ignoring randomness in message generation times at the respective sources.
However, in information transport networks, not only is reliable transmission
important, but also stability, i.e., finiteness of mean delay incurred by
messages from the time of generation to the time of successful reception.
Usually, delay analysis is done separately using queueing-theoretic arguments,
whereas reliable information transmission is studied using information theory.
In this thesis, we investigate these two important aspects of data
communication jointly by suitably combining models from these two fields. In
particular, we model scheduled communication of messages, that arrive in a
random process, (i) over multiaccess channels, with either independent decoding
or joint decoding, and (ii) over degraded broadcast channels. The scheduling
policies proposed permit up to a certain maximum number of messages for
simultaneous transmission.
In the first part of the thesis, we develop a multi-class discrete-time
processor-sharing queueing model, and then investigate the stability of this
queue. In particular, we model the queue by a discrete-time Markov chain
defined on a countable state space, and then establish (i) a sufficient
condition for $c$-regularity of the chain, and hence positive recurrence and
finiteness of stationary mean of the function $c$ of the state, and (ii) a
sufficient condition for transience of the chain. These stability results form
the basis for the conclusions drawn in the thesis.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 05:27:33 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Sayee",
"K. C. V. Kalyanarama Sesha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609012 | Philippe Moser | Philippe Moser | Baire Categories on Small Complexity Classes and Meager-Comeager Laws | to be published in Inform. and comp | null | null | null | cs.CC | null | We introduce two resource-bounded Baire category notions on small complexity
classes such as P, SUBEXP, and PSPACE and on probabilistic classes such as BPP,
which differ on how the corresponding finite extension strategies are computed.
We give an alternative characterization of small sets via resource-bounded
Banach-Mazur games.
As an application of the first notion, we show that for almost every language
A (i.e. all except a meager class) computable in subexponential time,
P(A)=BPP(A). We also show that almost all languages in PSPACE do not have small
nonuniform complexity.
We then switch to the second Baire category notion (called
locally-computable), and show that the class SPARSE is meager in P. We show
that in contrast to the resource-bounded measure case, meager-comeager laws can
be obtained for many standard complexity classes, relative to
locally-computable Baire category on BPP and PSPACE.
Another topic where locally-computable Baire categories differ from
resource-bounded measure is regarding weak-completeness: we show that there is
no weak-completeness notion in P based on locally-computable Baire categories,
i.e. every P-weakly-complete set is complete for P. We also prove that the
class of complete sets for P under Turing-logspace reductions is meager in P,
if P is not equal to DSPACE(log n), and that the same holds unconditionally for
quasi-poly time.
Finally we observe that locally-computable Baire categories are incomparable
with all existing resource-bounded measure notions on small complexity classes,
which might explain why those two settings seem to differ so fundamentally.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 09:02:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Moser",
"Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0609013 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Colin Riba (INRIA
Lorraine - LORIA) | Combining typing and size constraints for checking the termination of
higher-order conditional rewrite systems | null | Dans 13th International Conference on Logic for Programming,
Artificial Intelligence and Reasoning - LPAR 2006 | null | null | cs.LO | null | In a previous work, the first author extended to higher-order rewriting and
dependent types the use of size annotations in types, a termination proof
technique called type or size based termination and initially developed for
ML-like programs. Here, we go one step further by considering conditional
rewriting and explicit quantifications and constraints on size annotations.
This allows to describe more precisely how the size of the output of a function
depends on the size of its inputs. Hence, we can check the termination of more
functions. We first give a general type-checking algorithm based on constraint
solving. Then, we give a termination criterion with constraints in Presburger
arithmetic. To our knowledge, this is the first termination criterion for
higher-order conditional rewriting taking into account the conditions in
termination.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 14:23:38 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Sep 2006 11:57:50 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Riba",
"Colin",
"",
"INRIA\n Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609014 | Julien Reynier | Julien Reynier (INRIA Rocquencourt) | A simple stability condition for RED using TCP mean-field modeling | null | null | null | null | cs.NI math.PR | null | Congestion on the Internet is an old problem but still a subject of intensive
research. The TCP protocol with its AIMD (Additive Increase and Multiplicative
Decrease) behavior hides very challenging problems; one of them is to
understand the interaction between a large number of users with delayed
feedback. This article will focus on two modeling issues of TCP which appeared
to be important to tackle concrete scenarios when implementing the model
proposed in [Baccelli McDonald Reynier 02] firstly the modeling of the maximum
TCP window size: this maximum can be reached quickly in many practical cases;
secondly the delay structure: the usual Little-like formula behaves really
poorly when queuing delays are variable, and may change dramatically the
evolution of the predicted queue size, which makes it useless to study
drop-tail or RED (Random Early Detection) mechanisms. Within proposed TCP
modeling improvements, we are enabled to look at a concrete example where RED
should be used in FIFO routers instead of letting the default drop-tail happen.
We study mathematically fixed points of the window size distribution and local
stability of RED. An interesting case is when RED operates at the limit when
the congestion starts, it avoids unwanted loss of bandwidth and delay
variations.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 14:27:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0609015 | Marc Tommasi | J. Carme (INRIA Futurs), R. Gilleron (INRIA Futurs), A. Lemay (INRIA
Futurs), A. Terlutte (INRIA Futurs), M. Tommasi (INRIA Futurs) | Residual Finite Tree Automata | null | null | null | null | cs.CC cs.LO | null | Tree automata based algorithms are essential in many fields in computer
science such as verification, specification, program analysis. They become also
essential for databases with the development of standards such as XML. In this
paper, we define new classes of non deterministic tree automata, namely
residual finite tree automata (RFTA). In the bottom-up case, we obtain a new
characterization of regular tree languages. In the top-down case, we obtain a
subclass of regular tree languages which contains the class of languages
recognized by deterministic top-down tree automata. RFTA also come with the
property of existence of canonical non deterministic tree automata.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 16:23:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carme",
"J.",
"",
"INRIA Futurs"
],
[
"Gilleron",
"R.",
"",
"INRIA Futurs"
],
[
"Lemay",
"A.",
"",
"INRIA\n Futurs"
],
[
"Terlutte",
"A.",
"",
"INRIA Futurs"
],
[
"Tommasi",
"M.",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609016 | Tomasz Ciszkowski Mr | Tomasz Ciszkowski, Zbigniew Kotulski | ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks | 12 pages, 10th Domestic Conference on Applied Cryptography ENIGMA,
Warsaw, Poland, May 2006, The second author's last name was corrected | null | null | null | cs.CR cs.NI | null | The pervasiveness of wireless communication recently gave mobile ad hoc
networks (MANET) a significant researchers' attention, due to its innate
capabilities of instant communication in many time and mission critical
applications. However, its natural advantages of networking in civilian and
military environments make them vulnerable to security threats. Support for an
anonymity in MANET is an orthogonal to security critical challenge we faced in
this paper. We propose a new anonymous authentication protocol for mobile ad
hoc networks enhanced with a distributed reputation system. The main its
objective is to provide mechanisms concealing a real identity of communicating
nodes with an ability of resist to known attacks. The distributed reputation
system is incorporated for a trust management and malicious behavior detection
in the network. The end-to-end anonymous authentication is conducted in
three-pass handshake based on an asymmetric and symmetric key cryptography.
After successfully finished authentication phase secure and multiple anonymous
data channels are established. The anonymity is guarantied by randomly chosen
pseudonyms owned by a user. Nodes of the network are publicly identified and
are independent of users' pseudonyms. In this paper we presented an example of
the protocol implementation.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 18:21:45 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Sep 2006 14:40:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ciszkowski",
"Tomasz",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609017 | Wolfgang Slany | Wolfgang Slany and Wolfgang Kienreich | On some winning strategies for the Iterated Prisoner's Dilemma or Mr.
Nice Guy and the Cosa Nostra | null | null | null | null | cs.GT | null | We submitted two kinds of strategies to the iterated prisoner's dilemma (IPD)
competitions organized by Graham Kendall, Paul Darwen and Xin Yao in 2004 and
2005. Our strategies performed exceedingly well in both years. One type is an
intelligent and optimistic enhanced version of the well known TitForTat
strategy which we named OmegaTitForTat. It recognizes common behaviour patterns
and detects and recovers from repairable mutual defect deadlock situations,
otherwise behaving much like TitForTat. The second type consists of a set of
strategies working together as a team. These group strategies have one
distinguished individual Godfather strategy that plays OmegaTitForTat against
non-members while heavily profiting from the behaviour of the other members of
his group, the Hitman. The Hitman willingly let themselves being abused by
their Godfather while themselves lowering the scores of all other players as
much as possible, thus further maximizing the performance of their Godfather in
relation to other participants. The study of collusion in the simplified
framework of the iterated prisoner's dilemma allows us to draw parallels to
many common aspects of reality both in Nature as well as Human Society, and
therefore further extends the scope of the iterated prisoner's dilemma as a
metaphor for the study of cooperative behaviour in a new and natural direction.
We further provide evidence that it will be unavoidable that such group
strategies will dominate all future iterated prisoner's dilemma competitions as
they can be stealthy camouflaged as non-group strategies with arbitrary
subtlety. Moreover, we show that the general problem of recognizing stealth
colluding strategies is undecidable in the theoretical sense.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 18:42:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slany",
"Wolfgang",
""
],
[
"Kienreich",
"Wolfgang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0609018 | Peyman Razaghi | Peyman Razaghi, Wei Yu | Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay
Channels | Submitted to IEEE Trans. Info. Theory | null | 10.1109/TIT.2007.904983 | null | cs.IT math.IT | null | This paper describes an efficient implementation of binning for the relay
channel using low-density parity-check (LDPC) codes. We devise bilayer LDPC
codes to approach the theoretically promised rate of the decode-and-forward
relaying strategy by incorporating relay-generated information bits in
specially designed bilayer graphical code structures. While conventional LDPC
codes are sensitively tuned to operate efficiently at a certain channel
parameter, the proposed bilayer LDPC codes are capable of working at two
different channel parameters and two different rates: that at the relay and at
the destination. To analyze the performance of bilayer LDPC codes, bilayer
density evolution is devised as an extension of the standard density evolution
algorithm. Based on bilayer density evolution, a design methodology is
developed for the bilayer codes in which the degree distribution is iteratively
improved using linear programming. Further, in order to approach the
theoretical decode-and-forward rate for a wide range of channel parameters,
this paper proposes two different forms bilayer codes, the bilayer-expurgated
and bilayer-lengthened codes. It is demonstrated that a properly designed
bilayer LDPC code can achieve an asymptotic infinite-length threshold within
0.24 dB gap to the Shannon limits of two different channels simultaneously for
a wide range of channel parameters. By practical code construction,
finite-length bilayer codes are shown to be able to approach within a 0.6 dB
gap to the theoretical decode-and-forward rate of the relay channel at a block
length of $10^5$ and a bit-error probability (BER) of $10^{-4}$. Finally, it is
demonstrated that a generalized version of the proposed bilayer code
construction is applicable to relay networks with multiple relays.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 19:34:55 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Razaghi",
"Peyman",
""
],
[
"Yu",
"Wei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609019 | Sophie Aubin | Sophie Aubin (LIPN), Thierry Hamon (LIPN) | Improving Term Extraction with Terminological Resources | null | Advances in Natural Language Processing 5th International
Conference on NLP, FinTAL 2006 (2006) 380 | null | null | cs.CL | null | Studies of different term extractors on a corpus of the biomedical domain
revealed decreasing performances when applied to highly technical texts. The
difficulty or impossibility of customising them to new domains is an additional
limitation. In this paper, we propose to use external terminologies to
influence generic linguistic data in order to augment the quality of the
extraction. The tool we implemented exploits testified terms at different steps
of the process: chunking, parsing and extraction of term candidates.
Experiments reported here show that, using this method, more term candidates
can be acquired with a higher level of reliability. We further describe the
extraction process involving endogenous disambiguation implemented in the term
extractor YaTeA.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 11:41:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Hamon",
"Thierry",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0609020 | Alin Bostan | Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt),
Francois Morain (LIX, INRIA Futurs), Eric Schost (LIX) | Fast algorithms for computing isogenies between elliptic curves | null | null | 10.1090/S0025-5718-08-02066-8 | null | cs.CC cs.SC math.NT | null | We survey algorithms for computing isogenies between elliptic curves defined
over a field of characteristic either 0 or a large prime. We introduce a new
algorithm that computes an isogeny of degree $\ell$ ($\ell$ different from the
characteristic) in time quasi-linear with respect to $\ell$. This is based in
particular on fast algorithms for power series expansion of the Weierstrass
$\wp$-function and related functions.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 12:10:17 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
],
[
"Morain",
"Francois",
"",
"LIX, INRIA Futurs"
],
[
"Schost",
"Eric",
"",
"LIX"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
cs/0609021 | Pierre Boudes | Pierre Boudes (LIPN) | Non uniform (hyper/multi)coherence spaces | 32 pages | null | null | null | cs.LO | null | In (hyper)coherence semantics, proofs/terms are cliques in (hyper)graphs.
Intuitively, vertices represent results of computations and the edge relation
witnesses the ability of being assembled into a same piece of data or a same
(strongly) stable function, at arrow types. In (hyper)coherence semantics, the
argument of a (strongly) stable functional is always a (strongly) stable
function. As a consequence, comparatively to the relational semantics, where
there is no edge relation, some vertices are missing. Recovering these vertices
is essential for the purpose of reconstructing proofs/terms from their
interpretations. It shall also be useful for the comparison with other
semantics, like game semantics. In [BE01], Bucciarelli and Ehrhard introduced a
so called non uniform coherence space semantics where no vertex is missing. By
constructing the co-free exponential we set a new version of this last
semantics, together with non uniform versions of hypercoherences and
multicoherences, a new semantics where an edge is a finite multiset. Thanks to
the co-free construction, these non uniform semantics are deterministic in the
sense that the intersection of a clique and of an anti-clique contains at most
one vertex, a result of interaction, and extensionally collapse onto the
corresponding uniform semantics.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 12:14:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boudes",
"Pierre",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609022 | Barnaby Martin | Barnaby Martin | Dichotomies and Duality in First-order Model Checking Problems | null | null | null | null | cs.LO cs.CC | null | We study the complexity of the model checking problem, for fixed model A,
over certain fragments L of first-order logic. These are sometimes known as the
expression complexities of L. We obtain various complexity classification
theorems for these logics L as each ranges over models A, in the spirit of the
dichotomy conjecture for the Constraint Satisfaction Problem -- which itself
may be seen as the model checking problem for existential conjunctive positive
first-order logic.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 13:04:36 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Nov 2006 16:14:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martin",
"Barnaby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0609023 | Himanshu Thapliyal | Himanshu Thapliyal, M. B. Srinivas | Novel Reversible TSG Gate and Its Application for Designing Components
of Primitive Reversible/Quantum ALU | 5 Pages; Published in Proceedings of the Fifth IEEE International
Conference on Information, Communications and Signal Processing (ICICS 2005),
Bangkok, Thailand, 6-9 December 2005,pp.1425-1429 | null | 10.1109/ICICS.2005.1689293 | null | cs.AR | null | In recent years, reversible logic has emerged as a promising computing
paradigm having application in low power CMOS, quantum computing,
nanotechnology, and optical computing. The classical set of gates such as AND,
OR, and EXOR are not reversible. This paper utilizes a new 4 * 4 reversible
gate called TSG gate to build the components of a primitive reversible/quantum
ALU. The most significant aspect of the TSG gate is that it can work singly as
a reversible full adder, that is reversible full adder can now be implemented
with a single gate only. A Novel reversible 4:2 compressor is also designed
from the TSG gate which is later used to design a novel 8x8 reversible Wallace
tree multiplier. It is proved that the adder, 4:2 compressor and multiplier
architectures designed using the TSG gate are better than their counterparts
available in literature, in terms of number of reversible gates and garbage
outputs. This is perhaps, the first attempt to design a reversible 4:2
compressor and a reversible Wallace tree multiplier as far as existing
literature and our knowledge is concerned. Thus, this paper provides an initial
threshold to build more complex systems which can execute complicated
operations using reversible logic.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 16:09:04 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0609024 | Prashant Singh | Prashant | Linux, Open Source and Unicode | 10 pages, 1 figure, 1 table | null | null | null | cs.SE | null | The paper is taken out.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 18:12:27 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:04:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609025 | Prashant Singh | Prashant | A XML Schema Definition based Universal User Interface | 6 pages, 5 figures | null | null | null | cs.SE | null | The article is taken out for change of contents.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 18:21:23 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:03:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609026 | Arnaud Legout | Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes),
Guillaume Urvoy-Keller (EURECOM), Pietro Michiardi (EURECOM) | Rarest First and Choke Algorithms Are Enough | null | Dans ACM SIGCOMM/USENIX IMC'2006 | null | null | cs.NI | null | The performance of peer-to-peer file replication comes from its piece and
peer selection strategies. Two such strategies have been introduced by the
BitTorrent protocol: the rarest first and choke algorithms. Whereas it is
commonly admitted that BitTorrent performs well, recent studies have proposed
the replacement of the rarest first and choke algorithms in order to improve
efficiency and fairness. In this paper, we use results from real experiments to
advocate that the replacement of the rarest first and choke algorithms cannot
be justified in the context of peer-to-peer file replication in the Internet.
We instrumented a BitTorrent client and ran experiments on real torrents with
different characteristics. Our experimental evaluation is peer oriented,
instead of tracker oriented, which allows us to get detailed information on all
exchanged messages and protocol events. We go beyond the mere observation of
the good efficiency of both algorithms. We show that the rarest first algorithm
guarantees close to ideal diversity of the pieces among peers. In particular,
on our experiments, replacing the rarest first algorithm with source or network
coding solutions cannot be justified. We also show that the choke algorithm in
its latest version fosters reciprocation and is robust to free riders. In
particular, the choke algorithm is fair and its replacement with a bit level
tit-for-tat solution is not appropriate. Finally, we identify new areas of
improvements for efficient peer-to-peer file replication protocols.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 19:44:35 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Legout",
"Arnaud",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Urvoy-Keller",
"Guillaume",
"",
"EURECOM"
],
[
"Michiardi",
"Pietro",
"",
"EURECOM"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609027 | Al-Mukaddim Khan Pathan | Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Broberg and Zahir Tari | A Case for Peering of Content Delivery Networks | Short Article (Submitted in DS Online as Work in Progress) | null | null | null | cs.DC | null | The proliferation of Content Delivery Networks (CDN) reveals that existing
content networks are owned and operated by individual companies. As a
consequence, closed delivery networks are evolved which do not cooperate with
other CDNs and in practice, islands of CDNs are formed. Moreover, the logical
separation between contents and services in this context results in two content
networking domains. But present trends in content networks and content
networking capabilities give rise to the interest in interconnecting content
networks. Finding ways for distinct content networks to coordinate and
cooperate with other content networks is necessary for better overall service.
In addition to that, meeting the QoS requirements of users according to the
negotiated Service Level Agreements between the user and the content network is
a burning issue in this perspective. In this article, we present an open,
scalable and Service-Oriented Architecture based system to assist the creation
of open Content and Service Delivery Networks (CSDN) that scale and support
sharing of resources with other CSDNs.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2006 23:41:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Broberg",
"James",
""
],
[
"Tari",
"Zahir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0609028 | Himanshu Thapliyal | Himanshu Thapliyal and M.B Srinivas | VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic
Mathematics | 5 Pages: Proceedings of SPIE -- Volume 5837 VLSI Circuits and Systems
II, Jose F. Lopez, Francisco V. Fernandez, Jose Maria Lopez-Villegas, Jose M.
de la Rosa, Editors, June 2005, pp. 888-892 | null | null | null | cs.AR | null | This paper proposes the hardware implementation of RSA encryption/decryption
algorithm using the algorithms of Ancient Indian Vedic Mathematics that have
been modified to improve performance. The recently proposed hierarchical
overlay multiplier architecture is used in the RSA circuitry for multiplication
operation. The most significant aspect of the paper is the development of a
division architecture based on Straight Division algorithm of Ancient Indian
Vedic Mathematics and embedding it in RSA encryption/decryption circuitry for
improved efficiency. The coding is done in Verilog HDL and the FPGA synthesis
is done using Xilinx Spartan library. The results show that RSA circuitry
implemented using Vedic division and multiplication is efficient in terms of
area/speed compared to its implementation using conventional multiplication and
division architectures
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 14:18:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0609029 | Himanshu Thapliyal | Himanshu Thapliyal and Hamid R. Arabnia | Reversible Programmable Logic Array (RPLA) using Fredkin & Feynman Gates
for Industrial Electronics and Applications | Published in Proceedings of the International Conference on Embedded
Systems and Applications(ESA'06),Las Vegas, U.S.A, June 2006(CSREA Press) | null | null | null | cs.AR | null | In recent years, reversible logic has emerged as a promising computing
paradigm having application in low power CMOS, quantum computing,
nanotechnology, and optical computing. The classical set of gates such as AND,
OR, and EXOR are not reversible. In this paper, the authors have proposed
reversible programmable logic array (RPLA) architecture using reversible
Fredkin and Feynman gates. The proposed RPLA has n inputs and m outputs and can
realize m functions of n variables. In order to demonstrate the design of RPLA,
a 3 input RPLA is designed which can perform any 28 functions using the
combination of 8 min terms (23). Furthermore, the application of the designed 3
input RPLA is shown by implementing the full adder and full subtractor
functions through it.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 14:25:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0609030 | Kaibin Huang | Kaibin Huang, Robert W. Heath, Jr and Jeffrey G. Andrews | Space Division Multiple Access with a Sum Feedback Rate Constraint | 29 pages; submitted to IEEE Transactions on Signal Processing | null | 10.1109/TSP.2007.894245 | null | cs.IT cs.NI math.IT | null | On a multi-antenna broadcast channel, simultaneous transmission to multiple
users by joint beamforming and scheduling is capable of achieving high
throughput, which grows double logarithmically with the number of users. The
sum rate for channel state information (CSI) feedback, however, increases
linearly with the number of users, reducing the effective uplink capacity. To
address this problem, a novel space division multiple access (SDMA) design is
proposed, where the sum feedback rate is upper-bounded by a constant. This
design consists of algorithms for CSI quantization, threshold based CSI
feedback, and joint beamforming and scheduling. The key feature of the proposed
approach is the use of feedback thresholds to select feedback users with large
channel gains and small CSI quantization errors such that the sum feedback rate
constraint is satisfied. Despite this constraint, the proposed SDMA design is
shown to achieve a sum capacity growth rate close to the optimal one. Moreover,
the feedback overflow probability for this design is found to decrease
exponentially with the difference between the allowable and the average sum
feedback rates. Numerical results show that the proposed SDMA design is capable
of attaining higher sum capacities than existing ones, even though the sum
feedback rate is bounded.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 15:08:30 GMT"
}
] | 2012-08-27T00:00:00 | [
[
"Huang",
"Kaibin",
""
],
[
"Heath,",
"Robert W.",
"Jr"
],
[
"Andrews",
"Jeffrey G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609031 | Sreyash Kenkre | Sreyash Kenkre and Sundar Vishwanathan | Approximation Algorithms for the Bipartite Multi-cut Problem | 11 pages | null | null | null | cs.CC cs.DS | null | We introduce the {\it Bipartite Multi-cut} problem. This is a generalization
of the {\it st-Min-cut} problem, is similar to the {\it Multi-cut} problem
(except for more stringent requirements) and also turns out to be an immediate
generalization of the {\it Min UnCut} problem. We prove that this problem is
{\bf NP}-hard and then present LP and SDP based approximation algorithms. While
the LP algorithm is based on the Garg-Vazirani-Yannakakis algorithm for {\it
Multi-cut}, the SDP algorithm uses the {\it Structure Theorem} of $\ell_2^2$
Metrics.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 18:10:39 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Sep 2006 06:46:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kenkre",
"Sreyash",
""
],
[
"Vishwanathan",
"Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0609032 | Sumit Ganguly | Sumit Ganguly and Anirban Majumder | CR-precis: A deterministic summary structure for update data streams | 11 pages | null | null | IIT Kanpur, July 1 2006 | cs.DS | null | We present the \crprecis structure, that is a general-purpose, deterministic
and sub-linear data structure for summarizing \emph{update} data streams. The
\crprecis structure yields the \emph{first deterministic sub-linear space/time
algorithms for update streams} for answering a variety of fundamental stream
queries, such as, (a) point queries, (b) range queries, (c) finding approximate
frequent items, (d) finding approximate quantiles, (e) finding approximate
hierarchical heavy hitters, (f) estimating inner-products, (g) near-optimal
$B$-bucket histograms, etc..
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 19:21:01 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Sep 2006 05:51:43 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Oct 2006 07:37:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganguly",
"Sumit",
""
],
[
"Majumder",
"Anirban",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0609033 | David Eppstein | Michael B. Dillencourt and David Eppstein and Michael T. Goodrich | Choosing Colors for Geometric Graphs via Color Space Embeddings | 12 pages, 4 figures. To appear at 14th Int. Symp. Graph Drawing, 2006 | null | null | null | cs.CG | null | Graph drawing research traditionally focuses on producing geometric
embeddings of graphs satisfying various aesthetic constraints. After the
geometric embedding is specified, there is an additional step that is often
overlooked or ignored: assigning display colors to the graph's vertices. We
study the additional aesthetic criterion of assigning distinct colors to
vertices of a geometric graph so that the colors assigned to adjacent vertices
are as different from one another as possible. We formulate this as a problem
involving perceptual metrics in color space and we develop algorithms for
solving this problem by embedding the graph in color space. We also present an
application of this work to a distributed load-balancing visualization problem.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 20:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dillencourt",
"Michael B.",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0609034 | Marko Antonio Rodriguez | Marko A. Rodriguez | Social Decision Making with Multi-Relational Networks and Grammar-Based
Particle Swarms | null | Hawaii International Conference on Systems Science (HICSS), pages
39-49, Waikoloa, Hawaii, IEEE Computer Society, ISSN: 1530-1605, January 2007 | 10.1109/HICSS.2007.487 | LA-UR-06-2139 | cs.CY cs.HC | null | Social decision support systems are able to aggregate the local perspectives
of a diverse group of individuals into a global social decision. This paper
presents a multi-relational network ontology and grammar-based particle swarm
algorithm capable of aggregating the decisions of millions of individuals. This
framework supports a diverse problem space and a broad range of vote
aggregation algorithms. These algorithms account for individual expertise and
representation across different domains of the group problem space. Individuals
are able to pose and categorize problems, generate potential solutions, choose
trusted representatives, and vote for particular solutions. Ultimately, via a
social decision making algorithm, the system aggregates all the individual
votes into a single collective decision.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 20:40:39 GMT"
}
] | 2009-01-07T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0609035 | Joseph Y. Halpern | Joseph Y. Halpern and Vanessa Teague | Rational Secret Sharing and Multiparty Computation: Extended Abstract | Appears in STOC, 2004 | null | null | null | cs.GT cs.CR cs.DC | null | We consider the problems of secret sharing and multiparty computation,
assuming that agents prefer to get the secret (resp., function value) to not
getting it, and secondarily, prefer that as few as possible of the other agents
get it. We show that, under these assumptions, neither secret sharing nor
multiparty function computation is possible using a mechanism that has a fixed
running time. However, we show that both are possible using randomized
mechanisms with constant expected running time.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 21:48:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Teague",
"Vanessa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0609036 | Himanshu Thapliyal | Himanshu Thapliyal, Hamid R. Arabnia and M.B Srinivas | Reduced Area Low Power High Throughput BCD Adders for IEEE 754r Format | 6 Pages;Published in Proceedings of the 11th International CSI
Computer Conference (CSICC'06), Tehran, Jan 24-26, 2006, pp.59-64 | null | null | null | cs.AR | null | IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and
a major enhancement to the standard is the addition of decimal format. Firstly,
this paper proposes novel two transistor AND and OR gates. The proposed AND
gate has no power supply, thus it can be referred as the Powerless AND gate.
Similarly, the proposed two transistor OR gate has no ground and can be
referred as Groundless OR. Secondly for IEEE 754r format, two novel BCD adders
called carry skip and carry look-ahead BCD adders are also proposed in this
paper. In order to design the carry look-ahead BCD adder, a novel 4 bit carry
look-ahead adder called NCLA is proposed which forms the basic building block
of the proposed carry look-ahead BCD adder. Finally, the proposed two
transistors AND and OR gates are used to provide the optimized small area low
power high throughput circuitries of the proposed BCD adders.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 05:36:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Srinivas",
"M. B",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0609037 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA) | (HO)RPO Revisited | null | null | null | null | cs.LO | null | The notion of computability closure has been introduced for proving the
termination of the combination of higher-order rewriting and beta-reduction. It
is also used for strengthening the higher-order recursive path ordering. In the
present paper, we study in more details the relations between the computability
closure and the (higher-order) recursive path ordering. We show that the
first-order recursive path ordering is equal to an ordering naturally defined
from the computability closure. In the higher-order case, we get an ordering
containing the higher-order recursive path ordering whose well-foundedness
relies on the correctness of the computability closure. This provides a simple
way to extend the higher-order recursive path ordering to richer type systems.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 07:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609038 | Bartek Blaszczyszyn | Bartlomiej Bartek Blaszczyszyn (INRIA Rocquencourt), Bozidar Radunovic
(INRIA Rocquencourt) | On Performance of Event-to-Sink Transport in Transmit-Only Sensor
Networks | null | Proc. of IEEE Infocom 2008 | 10.1109/INFOCOM.2008.176 | null | cs.NI math.PR | null | We consider a hybrid wireless sensor network with regular and transmit-only
sensors. The transmit-only sensors do not have receiver circuit, hence are
cheaper and less energy consuming, but their transmissions cannot be
coordinated. Regular sensors, also called cluster-heads, are responsible for
receiving information from transmit-only sensors and forwarding it to sinks.
The main goal of such a hybrid network is to reduce the cost of deployment
while achieving some performance constraints (minimum coverage, sensing rate,
etc). In this paper we are interested in the communication between
transmit-only sensors and cluster-heads. We develop a detailed analytical model
of the physical and MAC layer using tools from queuing theory and stochastic
geometry. (The MAC model, that we call Erlang's loss model with interference,
might be of independent interest as adequate for any non-slotted; i.e.,
unsynchronized, wireless communication channel.) We give an explicit formula
for the frequency of successful packet reception by a cluster-head, given
sensors' locations. We further define packet admission policies at a
cluster-head, and we calculate the optimal policies for different performance
criteria. Finally we show that the proposed hybrid network, using the optimal
policies, can achieve substantial cost savings as compared to conventional
architectures.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 07:47:24 GMT"
}
] | 2013-02-05T00:00:00 | [
[
"Blaszczyszyn",
"Bartlomiej Bartek",
"",
"INRIA Rocquencourt"
],
[
"Radunovic",
"Bozidar",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0609039 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud
(LIX), Albert Rubio | Higher-Order Termination: from Kruskal to Computability | null | Dans 13th International Conference on Logic for Programming,
Artificial Intelligence and Reasoning - LPAR 2006 4246 (2006) | 10.1007/11916277_1 | null | cs.LO | null | Termination is a major question in both logic and computer science. In logic,
termination is at the heart of proof theory where it is usually called strong
normalization (of cut elimination). In computer science, termination has always
been an important issue for showing programs correct. In the early days of
logic, strong normalization was usually shown by assigning ordinals to
expressions in such a way that eliminating a cut would yield an expression with
a smaller ordinal. In the early days of verification, computer scientists used
similar ideas, interpreting the arguments of a program call by a natural
number, such as their size. Showing the size of the arguments to decrease for
each recursive call gives a termination proof of the program, which is however
rather weak since it can only yield quite small ordinals. In the sixties, Tait
invented a new method for showing cut elimination of natural deduction, based
on a predicate over the set of terms, such that the membership of an expression
to the predicate implied the strong normalization property for that expression.
The predicate being defined by induction on types, or even as a fixpoint, this
method could yield much larger ordinals. Later generalized by Girard under the
name of reducibility or computability candidates, it showed very effective in
proving the strong normalization property of typed lambda-calculi...
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 07:48:08 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 13:21:49 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Jouannaud",
"Jean-Pierre",
"",
"LIX"
],
[
"Rubio",
"Albert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609040 | Stefan Milius | Jiri Adamek, Stefan Milius, Jiri Velebil | Elgot Algebras | null | Logical Methods in Computer Science, Volume 2, Issue 5 (November
8, 2006) lmcs:2235 | 10.2168/LMCS-2(5:4)2006 | null | cs.LO math.CT | null | Denotational semantics can be based on algebras with additional structure
(order, metric, etc.) which makes it possible to interpret recursive
specifications. It was the idea of Elgot to base denotational semantics on
iterative theories instead, i.e., theories in which abstract recursive
specifications are required to have unique solutions. Later Bloom and Esik
studied iteration theories and iteration algebras in which a specified solution
has to obey certain axioms. We propose so-called Elgot algebras as a convenient
structure for semantics in the present paper. An Elgot algebra is an algebra
with a specified solution for every system of flat recursive equations. That
specification satisfies two simple and well motivated axioms: functoriality
(stating that solutions are stable under renaming of recursion variables) and
compositionality (stating how to perform simultaneous recursion). These two
axioms stem canonically from Elgot's iterative theories: We prove that the
category of Elgot algebras is the Eilenberg-Moore category of the monad given
by a free iterative theory.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 08:51:33 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Nov 2006 16:48:49 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Adamek",
"Jiri",
""
],
[
"Milius",
"Stefan",
""
],
[
"Velebil",
"Jiri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
cs/0609041 | Julien Hendrickx | Julien M. Hendrickx, Baris Fidan, Changbin Yu, Brian D.O. Anderson and
Vincent D. Blondel | Primitive operations for the construction and reorganization of
minimally persistent formations | 26 pages, 31 .eps files for the figures | null | null | CESAME research report 2006.62 | cs.MA | null | In this paper, we study the construction and transformation of
two-dimensional persistent graphs. Persistence is a generalization to directed
graphs of the undirected notion of rigidity. In the context of moving
autonomous agent formations, persistence characterizes the efficacy of a
directed structure of unilateral distances constraints seeking to preserve a
formation shape. Analogously to the powerful results about Henneberg sequences
in minimal rigidity theory, we propose different types of directed graph
operations allowing one to sequentially build any minimally persistent graph
(i.e. persistent graph with a minimal number of edges for a given number of
vertices), each intermediate graph being also minimally persistent. We also
consider the more generic problem of obtaining one minimally persistent graph
from another, which corresponds to the on-line reorganization of an autonomous
agent formation. We prove that we can obtain any minimally persistent formation
from any other one by a sequence of elementary local operations such that
minimal persistence is preserved throughout the reorganization process.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 10:12:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hendrickx",
"Julien M.",
""
],
[
"Fidan",
"Baris",
""
],
[
"Yu",
"Changbin",
""
],
[
"Anderson",
"Brian D. O.",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0609042 | Jacob Binia | Jacob Binia | On Divergence-Power Inequalities | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2006.890715 | null | cs.IT math.IT | null | Expressions for (EPI Shannon type) Divergence-Power Inequalities (DPI) in two
cases (time-discrete and band-limited time-continuous) of stationary random
processes are given. The new expressions connect the divergence rate of the sum
of independent processes, the individual divergence rate of each process, and
their power spectral densities. All divergences are between a process and a
Gaussian process with same second order statistics, and are assumed to be
finite. A new proof of the Shannon entropy-power inequality EPI, based on the
relationship between divergence and causal minimum mean-square error (CMMSE) in
Gaussian channels with large signal-to-noise ratio, is also shown.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 10:34:51 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Binia",
"Jacob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609043 | Francoise Gayral | Fran\c{c}oise Gayral (LIPN), Daniel Kayser (LIPN), Fran\c{c}ois L\'evy
(LIPN) | Challenging the principle of compositionality in interpreting natural
language texts | null | conference on Compositionality, Concepts and Cognition, Allemagne
(2004) | null | null | cs.CL | null | The paper aims at emphasizing that, even relaxed, the hypothesis of
compositionality has to face many problems when used for interpreting natural
language texts. Rather than fixing these problems within the compositional
framework, we believe that a more radical change is necessary, and propose
another approach.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 14:01:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayral",
"Françoise",
"",
"LIPN"
],
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Lévy",
"François",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0609044 | Francoise Gayral | Fran\c{c}oise Gayral (LIPN), Daniel Kayser (LIPN), Fran\c{c}ois L\'evy
(LIPN) | The role of time in considering collections | null | Journ\'{e}es de S\'{e}mantique et Mod\'{e}lisation, France (2004) | null | null | cs.CL | null | The paper concerns the understanding of plurals in the framework of
Artificial Intelligence and emphasizes the role of time. The construction of
collection(s) and their evolution across time is often crucial and has to be
accounted for. The paper contrasts a "de dicto" collection where the collection
can be considered as persisting over these situations even if its members
change with a "de re" collection whose composition does not vary through time.
It expresses different criteria of choice between the two interpretations (de
re and de dicto) depending on the context of enunciation.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 14:11:50 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Gayral",
"Françoise",
"",
"LIPN"
],
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Lévy",
"François",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0609045 | Vladimir Vovk | Vladimir Vovk | Metric entropy in competitive on-line prediction | 41 pages | null | null | null | cs.LG | null | Competitive on-line prediction (also known as universal prediction of
individual sequences) is a strand of learning theory avoiding making any
stochastic assumptions about the way the observations are generated. The
predictor's goal is to compete with a benchmark class of prediction rules,
which is often a proper Banach function space. Metric entropy provides a
unifying framework for competitive on-line prediction: the numerous known upper
bounds on the metric entropy of various compact sets in function spaces readily
imply bounds on the performance of on-line prediction strategies. This paper
discusses strengths and limitations of the direct approach to competitive
on-line prediction via metric entropy, including comparisons to other
approaches.
| [
{
"version": "v1",
"created": "Sat, 9 Sep 2006 11:31:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0609046 | Chih-Chun Wang | Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1)
Purdue University, (2) Princeton University) | Exhausting Error-Prone Patterns in LDPC Codes | submitted to IEEE Trans. Information Theory | null | null | null | cs.IT cs.DS math.IT | null | It is proved in this work that exhaustively determining bad patterns in
arbitrary, finite low-density parity-check (LDPC) codes, including stopping
sets for binary erasure channels (BECs) and trapping sets (also known as
near-codewords) for general memoryless symmetric channels, is an NP-complete
problem, and efficient algorithms are provided for codes of practical short
lengths n~=500. By exploiting the sparse connectivity of LDPC codes, the
stopping sets of size <=13 and the trapping sets of size <=11 can be
efficiently exhaustively determined for the first time, and the resulting
exhaustive list is of great importance for code analysis and finite code
optimization. The featured tree-based narrowing search distinguishes this
algorithm from existing ones for which inexhaustive methods are employed. One
important byproduct is a pair of upper bounds on the bit-error rate (BER) &
frame-error rate (FER) iterative decoding performance of arbitrary codes over
BECs that can be evaluated for any value of the erasure probability, including
both the waterfall and the error floor regions. The tightness of these upper
bounds and the exhaustion capability of the proposed algorithm are proved when
combining an optimal leaf-finding module with the tree-based search. These
upper bounds also provide a worst-case-performance guarantee which is crucial
to optimizing LDPC codes for extremely low error rate applications, e.g.,
optical/satellite communications. Extensive numerical experiments are conducted
that include both randomly and algebraically constructed LDPC codes, the
results of which demonstrate the superior efficiency of the exhaustion
algorithm and its significant value for finite length code optimization.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 00:50:16 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wang",
"Chih-Chun",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609047 | S. M. Nazrul Alam | S. M. Nazrul Alam and Zygmunt J. Haas | Topology Control and Network Lifetime in Three-Dimensional Wireless
Sensor Networks | Submitted for publication | null | null | null | cs.NI cs.CG | null | Coverage and connectivity issues of three-dimensional (3D) networks are
addressed in [2], but that work assumes that a node can be placed at any
arbitrary location. In this work, we drop that assumption and rather assume
that nodes are uniformly and densely deployed in a 3D space. We want to devise
a mechanism that keeps some nodes active and puts other nodes into sleep so
that the number of active nodes at a time is minimized (and thus network life
time is maximized), while maintaining full coverage and connectivity. One
simple way to do that is to partition the 3D space into cells, and only one
node in each cell remains active at a time. Our results show that the number of
active nodes can be minimized if the shape of each cell is a truncated
octahedron. It requires the sensing range to be at least 0.542326 times the
transmission radius. This value is 0.5, 0.53452 and 0.5 for cube, hexagonal
prism, and rhombic dodecahedron, respectively. However, at a time the number of
active nodes for cube, hexagonal prism and rhombic dodecahedron model is
respectively 2.372239, 1.82615 and 1.49468 times of that of truncated
octahedron model. So clearly truncated octahedron model has the highest network
lifetime. We also provide a distributed topology control algorithm that can be
used by each sensor node to determine its cell id using a constant number of
local arithmetic operations provided that the sensor node knows its location.
We also validate our results by simulation.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 02:01:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alam",
"S. M. Nazrul",
""
],
[
"Haas",
"Zygmunt J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0609048 | Pascal Weil | Pascal Weil (LaBRI) | On the logical definability of certain graph and poset languages | null | Journal of Automata, Languages and Computation 9 (2004) 147-165 | null | null | cs.LO | null | We show that it is equivalent, for certain sets of finite graphs, to be
definable in CMS (counting monadic second-order logic, a natural extension of
monadic second-order logic), and to be recognizable in an algebraic framework
induced by the notion of modular decomposition of a finite graph. More
precisely, we consider the set $F\_\infty$ of composition operations on graphs
which occur in the modular decomposition of finite graphs. If $F$ is a subset
of $F\_{\infty}$, we say that a graph is an $\calF$-graph if it can be
decomposed using only operations in $F$. A set of $F$-graphs is recognizable if
it is a union of classes in a finite-index equivalence relation which is
preserved by the operations in $F$. We show that if $F$ is finite and its
elements enjoy only a limited amount of commutativity -- a property which we
call weak rigidity, then recognizability is equivalent to CMS-definability.
This requirement is weak enough to be satisfied whenever all $F$-graphs are
posets, that is, transitive dags. In particular, our result generalizes Kuske's
recent result on series-parallel poset languages.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 08:25:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Weil",
"Pascal",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609049 | Asaf Cohen | Asaf Cohen, Neri Merhav and Tsachy Weissman | Scanning and Sequential Decision Making for Multi-Dimensional Data -
Part I: the Noiseless Case | 46 pages, 2 figures. Revised version: title changed, section 1
revised, section 3.1 added, a few minor/technical corrections made | null | null | null | cs.IT cs.LG math.IT | null | We investigate the problem of scanning and prediction ("scandiction", for
short) of multidimensional data arrays. This problem arises in several aspects
of image and video processing, such as predictive coding, for example, where an
image is compressed by coding the error sequence resulting from scandicting it.
Thus, it is natural to ask what is the optimal method to scan and predict a
given image, what is the resulting minimum prediction loss, and whether there
exist specific scandiction schemes which are universal in some sense.
Specifically, we investigate the following problems: First, modeling the data
array as a random field, we wish to examine whether there exists a scandiction
scheme which is independent of the field's distribution, yet asymptotically
achieves the same performance as if this distribution was known. This question
is answered in the affirmative for the set of all spatially stationary random
fields and under mild conditions on the loss function. We then discuss the
scenario where a non-optimal scanning order is used, yet accompanied by an
optimal predictor, and derive bounds on the excess loss compared to optimal
scanning and prediction.
This paper is the first part of a two-part paper on sequential decision
making for multi-dimensional data. It deals with clean, noiseless data arrays.
The second part deals with noisy data arrays, namely, with the case where the
decision maker observes only a noisy version of the data, yet it is judged with
respect to the original, clean data.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 09:35:57 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 07:34:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Cohen",
"Asaf",
""
],
[
"Merhav",
"Neri",
""
],
[
"Weissman",
"Tsachy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609050 | Tomaso Erseghe | G. Cariolaro, T. Erseghe, N. Laurenti | Exact Spectral Analysis of Single-h and Multi-h CPM Signals through PAM
decomposition and Matrix Series Evaluation | 31 pages, 10 figures | IEEE Transactions on Communications 59 (7), 1893-1903 | 10.1109/TCOMM.2011.050911.100631 | null | cs.IT math.IT | null | In this paper we address the problem of closed-form spectral evaluation of
CPM. We show that the multi-h CPM signal can be conveniently generated by a PTI
SM. The output is governed by a Markov chain with the unusual peculiarity of
being cyclostationary and reducible; this holds also in the single-h context.
Judicious reinterpretation of the result leads to a formalization through a
stationary and irreducible Markov chain, whose spectral evaluation is known in
closed-form from the literature. Two are the major outcomes of this paper.
First, unlike the literature, we obtain a PSD in true closed-form. Second, we
give novel insights into the CPM format.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 09:38:31 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Cariolaro",
"G.",
""
],
[
"Erseghe",
"T.",
""
],
[
"Laurenti",
"N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609051 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Irina Temnikova,
Anna Widiger, Wajdi Zaghouani, Jan Zizka | Multilingual person name recognition and transliteration | Explains the technology behind the JRC's NewsExplorer application,
which is freely accessible at http://press.jrc.it/NewsExplorer | Journal CORELA - Cognition, Representation, Langage. Numeros
speciaux, Le traitement lexicographique des noms propres. December 2005. ISSN
1638-5748 | null | null | cs.CL cs.IR | null | We present an exploratory tool that extracts person names from multilingual
news collections, matches name variants referring to the same person, and
infers relationships between people based on the co-occurrence of their names
in related news. A novel feature is the matching of name variants across
languages and writing systems, including names written with the Greek, Cyrillic
and Arabic writing system. Due to our highly multilingual setting, we use an
internal standard representation for name representation and matching, instead
of adopting the traditional bilingual approach to transliteration. This work is
part of the news analysis system NewsExplorer that clusters an average of
25,000 news articles per day to detect related news within the same and across
different languages.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:08:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
],
[
"Temnikova",
"Irina",
""
],
[
"Widiger",
"Anna",
""
],
[
"Zaghouani",
"Wajdi",
""
],
[
"Zizka",
"Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609052 | Frank Wolter | Frank Wolter and Michael Zakharyaschev | Undecidability of the unification and admissibility problems for modal
and description logics | null | null | null | null | cs.LO cs.AI | null | We show that the unification problem `is there a substitution instance of a
given formula that is provable in a given logic?' is undecidable for basic
modal logics K and K4 extended with the universal modality. It follows that the
admissibility problem for inference rules is undecidable for these logics as
well. These are the first examples of standard decidable modal logics for which
the unification and admissibility problems are undecidable. We also prove
undecidability of the unification and admissibility problems for K and K4 with
at least two modal operators and nominals (instead of the universal modality),
thereby showing that these problems are undecidable for basic hybrid logics.
Recently, unification has been introduced as an important reasoning service for
description logics. The undecidability proof for K with nominals can be used to
show the undecidability of unification for boolean description logics with
nominals (such as ALCO and SHIQO). The undecidability proof for K with the
universal modality can be used to show that the unification problem relative to
role boxes is undecidable for Boolean description logic with transitive roles,
inverse roles, and role hierarchies (such as SHI and SHIQ).
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:41:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolter",
"Frank",
""
],
[
"Zakharyaschev",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0609053 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Camelia Ignat (European Commission
- Joint Research Centre) | Navigating multilingual news collections using automatically extracted
information | This paper describes the main functionality of the JRC's
fully-automatic news analysis system NewsExplorer, which is freely accessible
in currently thirteen languages at http://press.jrc.it/NewsExplorer/ . 8
pages | Proceedings of the 27th International Conference 'Information
Technology Interfaces' (ITI'2005). Cavtat / Dubrovnik | null | null | cs.CL cs.IR | null | We are presenting a text analysis tool set that allows analysts in various
fields to sieve through large collections of multilingual news items quickly
and to find information that is of relevance to them. For a given document
collection, the tool set automatically clusters the texts into groups of
similar articles, extracts names of places, people and organisations, lists the
user-defined specialist terms found, links clusters and entities, and generates
hyperlinks. Through its daily news analysis operating on thousands of articles
per day, the tool also learns relationships between people and other entities.
The fully functional prototype system allows users to explore and navigate
multilingual document collections across languages and time.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:54:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission\n - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission\n - Joint Research Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission\n - Joint Research Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609054 | Zhihang Yi | Zhihang Yi and Il-Min Kim | High Data-Rate Single-Symbol ML Decodable Distributed STBCs for
Cooperative Networks | submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High data-rate Distributed Orthogonal Space-Time Block Codes (DOSTBCs) which
achieve the single-symbol decodability and full diversity order are proposed in
this paper. An upper bound of the data-rate of the DOSTBC is derived and it is
approximately twice larger than that of the conventional repetition-based
cooperative strategy. In order to facilitate the systematic constructions of
the DOSTBCs achieving the upper bound of the data-rate, some special DOSTBCs,
which have diagonal noise covariance matrices at the destination terminal, are
investigated. These codes are referred to as the row-monomial DOSTBCs. An upper
bound of the data-rate of the row-monomial DOSTBC is derived and it is equal to
or slightly smaller than that of the DOSTBC. Lastly, the systematic
construction methods of the row-monomial DOSTBCs achieving the upper bound of
the data-rate are presented.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 15:37:09 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Aug 2009 14:00:46 GMT"
}
] | 2009-08-10T00:00:00 | [
[
"Yi",
"Zhihang",
""
],
[
"Kim",
"Il-Min",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609055 | Tsachy Weissman | Nuno C Martins, Tsachy Weissman | Coding for Additive White Noise Channels with Feedback Corrupted by
Uniform Quantization or Bounded Noise | null | null | null | null | cs.IT math.IT | null | We present simple coding strategies, which are variants of the
Schalkwijk-Kailath scheme, for communicating reliably over additive white noise
channels in the presence of corrupted feedback. More specifically, we consider
a framework comprising an additive white forward channel and a backward link
which is used for feedback. We consider two types of corruption mechanisms in
the backward link. The first is quantization noise, i.e., the encoder receives
the quantized values of the past outputs of the forward channel. The
quantization is uniform, memoryless and time invariant (that is,
symbol-by-symbol scalar quantization), with bounded quantization error. The
second corruption mechanism is an arbitrarily distributed additive bounded
noise in the backward link. Here we allow symbol-by-symbol encoding at the
input to the backward channel. We propose simple explicit schemes that
guarantee positive information rate, in bits per channel use, with positive
error exponent. If the forward channel is additive white Gaussian then our
schemes achieve capacity, in the limit of diminishing amplitude of the noise
components at the backward link, while guaranteeing that the probability of
error converges to zero as a doubly exponential function of the block length.
Furthermore, if the forward channel is additive white Gaussian and the backward
link consists of an additive bounded noise channel, with signal-to-noise ratio
(SNR) constrained symbol-by-symbol encoding, then our schemes are also
capacity-achieving in the limit of high SNR.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 23:28:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Martins",
"Nuno C",
""
],
[
"Weissman",
"Tsachy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609056 | Leonid Vaserstein | L. N. Vaserstein | Matrix Games, Linear Programming, and Linear Approximation | 5 pages | null | null | null | cs.GT cs.AI | null | The following four classes of computational problems are equivalent: solving
matrix games, solving linear programs, best $l^{\infty}$ linear approximation,
best $l^1$ linear approximation.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 00:10:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vaserstein",
"L. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0609057 | Yi Deng | Yi Deng, Giovanni Di Crescenzo and Dongdai Lin | Concurrently Non-Malleable Zero Knowledge in the Authenticated
Public-Key Model | null | null | null | null | cs.CR | null | We consider a type of zero-knowledge protocols that are of interest for their
practical applications within networks like the Internet: efficient
zero-knowledge arguments of knowledge that remain secure against concurrent
man-in-the-middle attacks. In an effort to reduce the setup assumptions
required for efficient zero-knowledge arguments of knowledge that remain secure
against concurrent man-in-the-middle attacks, we consider a model, which we
call the Authenticated Public-Key (APK) model. The APK model seems to
significantly reduce the setup assumptions made by the CRS model (as no trusted
party or honest execution of a centralized algorithm are required), and can be
seen as a slightly stronger variation of the Bare Public-Key (BPK) model from
\cite{CGGM,MR}, and a weaker variation of the registered public-key model used
in \cite{BCNP}. We then define and study man-in-the-middle attacks in the APK
model. Our main result is a constant-round concurrent non-malleable
zero-knowledge argument of knowledge for any polynomial-time relation
(associated to a language in $\mathcal{NP}$), under the (minimal) assumption of
the existence of a one-way function family. Furthermore,We show time-efficient
instantiations of our protocol based on known number-theoretic assumptions. We
also note a negative result with respect to further reducing the setup
assumptions of our protocol to those in the (unauthenticated) BPK model, by
showing that concurrently non-malleable zero-knowledge arguments of knowledge
in the BPK model are only possible for trivial languages.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 06:20:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Deng",
"Yi",
""
],
[
"Di Crescenzo",
"Giovanni",
""
],
[
"Lin",
"Dongdai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0609058 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Anna Widiger, Camelia Ignat, Tomaz
Erjavec, Dan Tufis, Daniel Varga | The JRC-Acquis: A multilingual aligned parallel corpus with 20+
languages | A multilingual textual resource with meta-data freely available for
download at http://langtech.jrc.it/JRC-Acquis.html | Proceedings of the 5th International Conference on Language
Resources and Evaluation (LREC'2006), pp. 2142-2147. Genoa, Italy, 24-26 May
2006 | null | null | cs.CL | null | We present a new, unique and freely available parallel corpus containing
European Union (EU) documents of mostly legal nature. It is available in all 20
official EUanguages, with additional documents being available in the languages
of the EU candidate countries. The corpus consists of almost 8,000 documents
per language, with an average size of nearly 9 million words per language.
Pair-wise paragraph alignment information produced by two different aligners
(Vanilla and HunAlign) is available for all 190+ language pair combinations.
Most texts have been manually classified according to the EUROVOC subject
domains so that the collection can also be used to train and test multi-label
classification algorithms and keyword-assignment software. The corpus is
encoded in XML, according to the Text Encoding Initiative Guidelines. Due to
the large number of parallel texts in many languages, the JRC-Acquis is
particularly suitable to carry out all types of cross-language research, as
well as to test and benchmark text analysis software across different languages
(for instance for alignment, sentence splitting and term extraction).
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 07:10:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
""
],
[
"Pouliquen",
"Bruno",
""
],
[
"Widiger",
"Anna",
""
],
[
"Ignat",
"Camelia",
""
],
[
"Erjavec",
"Tomaz",
""
],
[
"Tufis",
"Dan",
""
],
[
"Varga",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0609059 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat | Automatic annotation of multilingual text collections with a conceptual
thesaurus | 10 pages | Proceedings of the Workshop 'Ontologies and Information
Extraction' at the Summer School 'The Semantic Web and Language Technology -
Its Potential and Practicalities' (EUROLAN'2003), pp 9-28. Bucharest,
Romania, 28 July - 8 August 2003 | null | null | cs.CL cs.IR | null | Automatic annotation of documents with controlled vocabulary terms
(descriptors) from a conceptual thesaurus is not only useful for document
indexing and retrieval. The mapping of texts onto the same thesaurus
furthermore allows to establish links between similar documents. This is also a
substantial requirement of the Semantic Web. This paper presents an almost
language-independent system that maps documents written in different languages
onto the same multilingual conceptual thesaurus, EUROVOC. Conceptual thesauri
differ from Natural Language Thesauri in that they consist of relatively small
controlled lists of words or phrases with a rather abstract meaning. To
automatically identify which thesaurus descriptors describe the contents of a
document best, we developed a statistical, associative system that is trained
on texts that have previously been indexed manually. In addition to describing
the large number of empirically optimised parameters of the fully functional
application, we present the performance of the software according to a human
evaluation by professional indexers.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 07:24:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609060 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat | Automatic Identification of Document Translations in Large Multilingual
Document Collections | This technology is used daily to link related news items across
languages in the multilingual news analysis system NewsExplorer, which is
freely accessible at http://press.jrc.it/NewsExplorer . 8 pages | Proceedings of the International Conference 'Recent Advances in
Natural Language Processing' (RANLP'2003), pp. 401-408. Borovets, Bulgaria,
10 - 12 September 2003 | null | null | cs.CL cs.IR | null | Texts and their translations are a rich linguistic resource that can be used
to train and test statistics-based Machine Translation systems and many other
applications. In this paper, we present a working system that can identify
translations and other very similar documents among a large number of
candidates, by representing the document contents with a vector of thesaurus
terms from a multilingual thesaurus, and by then measuring the semantic
similarity between the vectors. Tests on different text types have shown that
the system can detect translations with over 96% precision in a large search
space of 820 documents or more. The system was tuned to ignore
language-specific similarities and to give similar documents in a second
language the same similarity score as equivalent documents in the same
language. The application can also be used to detect cross-lingual document
plagiarism.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 08:44:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609061 | Ralf Steinberger | Ralf Steinberger (European Commission - Joint Research Centre) | Cross-lingual keyword assignment | Precursor paper to cs.CL/0609059. The automatic classification system
described here has now matured and is in daily use for document indexing in a
European parliament. See http://langtech.jrc.it/Eurovoc.html for more
details. 8 pages | Proceedings of the XVII Conference of the Spanish Society for
Natural Language Processing (SEPLN-2001). Procesamiento del Lenguaje Natural,
Revista No. 27, pp. 273-280. Jaen, Spain, 12-14 September 2001. ISSN
1135-5948 | null | null | cs.CL cs.IR | null | This paper presents a language-independent approach to controlled vocabulary
keyword assignment using the EUROVOC thesaurus. Due to the multilingual nature
of EUROVOC, the keywords for a document written in one language can be
displayed in all eleven official European Union languages. The mapping of
documents written in different languages to the same multilingual thesaurus
furthermore allows cross-language document comparison. The assignment of the
controlled vocabulary thesaurus descriptors is achieved by applying a
statistical method that uses a collection of manually indexed documents to
identify, for each thesaurus descriptor, a large number of lemmas that are
statistically associated to the descriptor. These associated words are then
used during the assignment procedure to identify a ranked list of those EUROVOC
terms that are most likely to be good keywords for a given document. The paper
also describes the challenges of this task and discusses the achieved results
of the fully functional prototype.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 09:29:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609062 | James Cheney | James Cheney, Christian Urban | Nominal Logic Programming | 46 pages; 19 page appendix; 13 figures. Revised journal submission as
of July 23, 2007 | ACM Transactions on Programming Languages and Systems 30(5):26,
August 2008 | 10.1145/1387673.1387675 | null | cs.PL cs.LO | null | Nominal logic is an extension of first-order logic which provides a simple
foundation for formalizing and reasoning about abstract syntax modulo
consistent renaming of bound names (that is, alpha-equivalence). This article
investigates logic programming based on nominal logic. We describe some typical
nominal logic programs, and develop the model-theoretic, proof-theoretic, and
operational semantics of such programs. Besides being of interest for ensuring
the correct behavior of implementations, these results provide a rigorous
foundation for techniques for analysis and reasoning about nominal logic
programs, as we illustrate via examples.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 09:32:23 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Aug 2007 13:36:28 GMT"
}
] | 2008-09-15T00:00:00 | [
[
"Cheney",
"James",
""
],
[
"Urban",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609063 | Ralf Steinberger | Camelia Ignat, Bruno Pouliquen, Antonio Ribeiro, Ralf Steinberger
(European Commission - Joint Research Centre) | Extending an Information Extraction tool set to Central and Eastern
European languages | 7 pages | Proceedings of the International Workshop 'Information Extraction
for Slavonic and other Central and Eastern European Languages' (IESL-2003),
held at RANLP-2003, pp. 33-39. Borovets, Bulgaria, 8 - 9 September 2003 | null | null | cs.CL cs.IR | null | In a highly multilingual and multicultural environment such as in the
European Commission with soon over twenty official languages, there is an
urgent need for text analysis tools that use minimal linguistic knowledge so
that they can be adapted to many languages without much human effort. We are
presenting two such Information Extraction tools that have already been adapted
to various Western and Eastern European languages: one for the recognition of
date expressions in text, and one for the detection of geographical place names
and the visualisation of the results in geographical maps. An evaluation of the
performance has produced very satisfying results.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:29:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research Centre"
],
[
"Ribeiro",
"Antonio",
"",
"European Commission - Joint Research Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609064 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Camelia Ignat (European Commission
- Joint Research Centre) | Exploiting multilingual nomenclatures and language-independent text
features as an interlingua for cross-lingual text analysis applications | The approach described in this paper is used to link related
documents across languages in the multilingual news analysis system
NewsExplorer, which is freely accessible at http://press.jrc.it/NewsExplorer
. 11 pages | Information Society 2004 (IS-2004) - Proceedings B of the 7th
International Multiconference - Language Technologies, pages 2-12. Ljubljana,
Slovenia, 13-14 October 2004 | null | null | cs.CL cs.IR | null | We are proposing a simple, but efficient basic approach for a number of
multilingual and cross-lingual language technology applications that are not
limited to the usual two or three languages, but that can be applied with
relatively little effort to larger sets of languages. The approach consists of
using existing multilingual linguistic resources such as thesauri,
nomenclatures and gazetteers, as well as exploiting the existence of additional
more or less language-independent text items such as dates, currency
expressions, numbers, names and cognates. Mapping texts onto the multilingual
resources and identifying word token links between texts in different languages
are basic ingredients for applications such as cross-lingual document
similarity calculation, multilingual clustering and categorisation,
cross-lingual document retrieval, and tools to provide cross-lingual
information access.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:43:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission\n - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission\n - Joint Research Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission\n - Joint Research Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609065 | Ralf Steinberger | Bruno Pouliquen, Marco Kimler, Ralf Steinberger, Camelia Ignat, Tamara
Oellinger, Ken Blackler, Flavio Fuart, Wajdi Zaghouani, Anna Widiger,
Ann-Charlotte Forslund, Clive Best (European Commission - Joint Research
Centre) | Geocoding multilingual texts: Recognition, disambiguation and
visualisation | 6 pages | Proceedings of the 5th International Conference on Language
Resources and Evaluation (LREC-2006), pp. 53-58. Genoa, Italy, 24-26 May 2006 | null | null | cs.CL cs.IR | null | We are presenting a method to recognise geographical references in free text.
Our tool must work on various languages with a minimum of language-dependent
resources, except a gazetteer. The main difficulty is to disambiguate these
place names by distinguishing places from persons and by selecting the most
likely place out of a list of homographic place names world-wide. The system
uses a number of language-independent clues and heuristics to disambiguate
place name homographs. The final aim is to index texts with the countries and
cities they mention and to automatically visualise this information on
geographical maps using various tools.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:57:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research\n Centre"
],
[
"Kimler",
"Marco",
"",
"European Commission - Joint Research\n Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research\n Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research\n Centre"
],
[
"Oellinger",
"Tamara",
"",
"European Commission - Joint Research\n Centre"
],
[
"Blackler",
"Ken",
"",
"European Commission - Joint Research\n Centre"
],
[
"Fuart",
"Flavio",
"",
"European Commission - Joint Research\n Centre"
],
[
"Zaghouani",
"Wajdi",
"",
"European Commission - Joint Research\n Centre"
],
[
"Widiger",
"Anna",
"",
"European Commission - Joint Research\n Centre"
],
[
"Forslund",
"Ann-Charlotte",
"",
"European Commission - Joint Research\n Centre"
],
[
"Best",
"Clive",
"",
"European Commission - Joint Research\n Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609066 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Tamara Oellinger
(European Commission - Joint Research Centre) | Building and displaying name relations using automatic unsupervised
analysis of newspaper articles | Builds upon the recognition of person names described in paper
cs.CL/0609051. Resulting person relations can be explored in the multilingual
online application NewsExplorer at http://press.jrc.it/NewsExplorer . 12
pages | Proceedings of the 8th International Conference on the Statistical
Analysis of Textual Data (JADT-2006). Besancon, 19-21 April 2006 | null | null | cs.CL cs.IR | null | We present a tool that, from automatically recognised names, tries to infer
inter-person relations in order to present associated people on maps. Based on
an in-house Named Entity Recognition tool, applied on clusters of an average of
15,000 news articles per day, in 15 different languages, we build a knowledge
base that allows extracting statistical co-occurrences of persons and
visualising them on a per-person page or in various graphs.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 13:09:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research Centre"
],
[
"Oellinger",
"Tamara",
"",
"European Commission - Joint Research Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609067 | Ralf Steinberger | Camelia Ignat, Bruno Pouliquen, Ralf Steinberger, Tomaz Erjavec
(European Commission - Joint Research Centre) | A tool set for the quick and efficient exploration of large document
collections | 10 pages | Proceedings of the Symposium on Safeguards and Nuclear Material
Management. 27th Annual Meeting of the European SAfeguards Research and
Development Association (ESARDA-2005). London, UK, 10-12 May 2005 | null | null | cs.CL cs.IR | null | We are presenting a set of multilingual text analysis tools that can help
analysts in any field to explore large document collections quickly in order to
determine whether the documents contain information of interest, and to find
the relevant text passages. The automatic tool, which currently exists as a
fully functional prototype, is expected to be particularly useful when users
repeatedly have to sieve through large collections of documents such as those
downloaded automatically from the internet. The proposed system takes a whole
document collection as input. It first carries out some automatic analysis
tasks (named entity recognition, geo-coding, clustering, term extraction),
annotates the texts with the generated meta-information and stores the
meta-information in a database. The system then generates a zoomable and
hyperlinked geographic map enhanced with information on entities and terms
found. When the system is used on a regular basis, it builds up a historical
database that contains information on which names have been mentioned together
with which other names or places, and users can query this database to retrieve
information extracted in the past.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 13:30:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research Centre"
],
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
],
[
"Erjavec",
"Tomaz",
"",
"European Commission - Joint Research Centre"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609068 | Jeremie Leguay M. | Vania Conan, Jeremie Leguay, Timur Friedman | The heterogeneity of inter-contact time distributions: its importance
for routing in delay tolerant networks | 6 pages | null | null | null | cs.NI | null | Prior work on routing in delay tolerant networks (DTNs) has commonly made the
assumption that each pair of nodes shares the same inter-contact time
distribution as every other pair. The main argument in this paper is that
researchers should also be looking at heterogeneous inter-contact time
distributions. We demonstrate the presence of such heterogeneity in the
often-used Dartmouth Wi-Fi data set. We also show that DTN routing can benefit
from knowing these distributions. We first introduce a new stochastic model
focusing on the inter-contact time distributions between all pairs of nodes,
which we validate on real connectivity patterns. We then analytically derive
the mean delivery time for a bundle of information traversing the network for
simple single copy routing schemes. The purpose is to examine the theoretic
impact of heterogeneous inter-contact time distributions. Finally, we show that
we can exploit this user diversity to improve routing performance.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 15:25:29 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 10:20:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Conan",
"Vania",
""
],
[
"Leguay",
"Jeremie",
""
],
[
"Friedman",
"Timur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609069 | S. M. Nazrul Alam | S. M. Nazrul Alam and Zygmunt J. Haas | Coverage and Connectivity in Three-Dimensional Networks | To appear in ACM Mobicom 2006 | null | null | null | cs.NI | null | Most wireless terrestrial networks are designed based on the assumption that
the nodes are deployed on a two-dimensional (2D) plane. However, this 2D
assumption is not valid in underwater, atmospheric, or space communications. In
fact, recent interest in underwater acoustic ad hoc and sensor networks hints
at the need to understand how to design networks in 3D. Unfortunately, the
design of 3D networks is surprisingly more difficult than the design of 2D
networks. For example, proofs of Kelvin's conjecture and Kepler's conjecture
required centuries of research to achieve breakthroughs, whereas their 2D
counterparts are trivial to solve. In this paper, we consider the coverage and
connectivity issues of 3D networks, where the goal is to find a node placement
strategy with 100% sensing coverage of a 3D space, while minimizing the number
of nodes required for surveillance. Our results indicate that the use of the
Voronoi tessellation of 3D space to create truncated octahedral cells results
in the best strategy. In this truncated octahedron placement strategy, the
transmission range must be at least 1.7889 times the sensing range in order to
maintain connectivity among nodes. If the transmission range is between 1.4142
and 1.7889 times the sensing range, then a hexagonal prism placement strategy
or a rhombic dodecahedron placement strategy should be used. Although the
required number of nodes in the hexagonal prism and the rhombic dodecahedron
placement strategies is the same, this number is 43.25% higher than the number
of nodes required by the truncated octahedron placement strategy. We verify by
simulation that our placement strategies indeed guarantee ubiquitous coverage.
We believe that our approach and our results presented in this paper could be
used for extending the processes of 2D network design to 3D networks.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 17:35:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alam",
"S. M. Nazrul",
""
],
[
"Haas",
"Zygmunt J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609070 | Thomas Way | Joseph Distasio and Thomas P. Way | Exploring Computer Science Concepts with a Ready-made Computer Game
Framework | 5 pages, 3 figures | null | null | null | cs.OH | null | Leveraging the prevailing interest in computer games among college students,
both for entertainment and as a possible career path, is a major reason for the
increasing prevalence of computer game design courses in computer science
curricula. Because implementing a computer game requires strong programming
skills, game design courses are most often restricted to more advanced computer
science students. This paper reports on a ready-made game design and
experimentation framework, implemented in Java, that makes game programming
more widely accessible. This framework, called Labyrinth, enables students at
all programming skill levels to participate in computer game design. We
describe the architecture of the framework, and discuss programming projects
suitable for a wide variety of computer science courses, from capstone to
non-major.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 19:49:55 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2006 20:10:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Distasio",
"Joseph",
""
],
[
"Way",
"Thomas P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0609071 | Shotaro Akaho | Shotaro Akaho | A kernel method for canonical correlation analysis | Full version of paper presented in IMPS2001 (International Meeting of
Psychometric Society) 2007-Feb-14: typos in equations (23) and (24) in page 3
of the first version have been corrected | null | null | null | cs.LG cs.CV | null | Canonical correlation analysis is a technique to extract common features from
a pair of multivariate data. In complex situations, however, it does not
extract useful features because of its linearity. On the other hand, kernel
method used in support vector machine is an efficient approach to improve such
a linear method. In this paper, we investigate the effectiveness of applying
kernel method to canonical correlation analysis.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 03:44:08 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Feb 2007 06:51:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Akaho",
"Shotaro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0609072 | Elitza Maneva | Parikshit Gopalan, Phokion G. Kolaitis, Elitza Maneva, Christos H.
Papadimitriou | The Connectivity of Boolean Satisfiability: Computational and Structural
Dichotomies | null | Extended abstract in Proceedings of ICALP 2006, pp 346-357 | null | null | cs.CC | null | Boolean satisfiability problems are an important benchmark for questions
about complexity, algorithms, heuristics and threshold phenomena. Recent work
on heuristics, and the satisfiability threshold has centered around the
structure and connectivity of the solution space. Motivated by this work, we
study structural and connectivity-related properties of the space of solutions
of Boolean satisfiability problems and establish various dichotomies in
Schaefer's framework.
On the structural side, we obtain dichotomies for the kinds of subgraphs of
the hypercube that can be induced by the solutions of Boolean formulas, as well
as for the diameter of the connected components of the solution space. On the
computational side, we establish dichotomy theorems for the complexity of the
connectivity and st-connectivity questions for the graph of solutions of
Boolean formulas. Our results assert that the intractable side of the
computational dichotomies is PSPACE-complete, while the tractable side - which
includes but is not limited to all problems with polynomial time algorithms for
satisfiability - is in P for the st-connectivity question, and in coNP for the
connectivity question. The diameter of components can be exponential for the
PSPACE-complete cases, whereas in all other cases it is linear; thus, small
diameter and tractability of the connectivity problems are remarkably aligned.
The crux of our results is an expressibility theorem showing that in the
tractable cases, the subgraphs induced by the solution space possess certain
good structural properties, whereas in the intractable cases, the subgraphs can
be arbitrary.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 07:25:59 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Oct 2007 09:49:04 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"Gopalan",
"Parikshit",
""
],
[
"Kolaitis",
"Phokion G.",
""
],
[
"Maneva",
"Elitza",
""
],
[
"Papadimitriou",
"Christos H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0609073 | Mylene Pischella Mrs | Mylene Pischella, Jean-Claude Belfiore | Optimal power allocation for downlink cooperative cellular networks | null | null | null | null | cs.IT math.IT | null | This paper has been withdrawn by the author
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 07:42:49 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Mar 2007 15:38:10 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Sep 2007 10:39:40 GMT"
}
] | 2007-09-19T00:00:00 | [
[
"Pischella",
"Mylene",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609074 | Yoo Chung | Yoo Chul Chung and Dongman Lee | A Non-anchored Unified Naming System for Ad Hoc Computing Environments | Submitted to Percom 2007 | null | null | null | cs.DC cs.AR cs.NI | null | A ubiquitous computing environment consists of many resources that need to be
identified by users and applications. Users and developers require some way to
identify resources by human readable names. In addition, ubiquitous computing
environments impose additional requirements such as the ability to work well
with ad hoc situations and the provision of names that depend on context.
The Non-anchored Unified Naming (NUN) system was designed to satisfy these
requirements. It is based on relative naming among resources and provides the
ability to name arbitrary types of resources. By having resources themselves
take part in naming, resources are able to able contribute their specialized
knowledge into the name resolution process, making context-dependent mapping of
names to resources possible. The ease of which new resource types can be added
makes it simple to incorporate new types of contextual information within
names.
In this paper, we describe the naming system and evaluate its use.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 12:52:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chung",
"Yoo Chul",
""
],
[
"Lee",
"Dongman",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609075 | Sergey Tsarev P. | S.P. Tsarev | On factorization and solution of multidimensional linear partial
differential equations | 11 pages, Plain LaTeX; Submitted to Proceedings of Waterloo Workshop
on Computer Algebra devoted to the 60th birthday Of S.A.Abramov. The second
version includes grant acknowledgements and minor changes in a couple of
places | null | null | null | cs.SC nlin.SI | null | We describe a method of obtaining closed-form complete solutions of certain
second-order linear partial differential equations with more than two
independent variables. This method generalizes the classical method of Laplace
transformations of second-order hyperbolic equations in the plane and is based
on an idea given by Ulisse Dini in 1902.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 13:28:18 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2006 07:56:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsarev",
"S. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
}
] |
cs/0609076 | Chien-Hwa Hwang | Chien-Hwa Hwang | Asymptotic Spectral Distribution of Crosscorrelation Matrix in
Asynchronous CDMA | 63 pages, 8 figures, submitted to IEEE Transactions on Information
Theory, Sept. 2006 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Asymptotic spectral distribution (ASD) of the crosscorrelation matrix is
investigated for a random spreading short/long-code asynchronous direct
sequence-code division multiple access (DS-CDMA) system. The discrete-time
decision statistics are obtained as the output samples of a bank of symbol
matched filters of all users. The crosscorrelation matrix is studied when the
number of symbols transmitted by each user tends to infinity. Two levels of
asynchronism are considered. One is symbol-asynchronous but chip-synchronous,
and the other is chip-asynchronous. The existence of a nonrandom ASD is proved
by moment convergence theorem, where the focus is on the derivation of
asymptotic eigenvalue moments (AEM) of the crosscorrelation matrix. A
combinatorics approach based on noncrossing partition of set partition theory
is adopted for AEM computation. The spectral efficiency and the minimum
mean-square-error (MMSE) achievable by a linear receiver of asynchronous CDMA
are plotted by AEM using a numerical method.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 14:16:38 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Sep 2007 15:51:42 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Oct 2008 04:34:34 GMT"
}
] | 2008-10-06T00:00:00 | [
[
"Hwang",
"Chien-Hwa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609077 | Shi Xiao | Shi Xiao and Gaoxi Xiao | On Intentional Attacks and Protections in Complex Communication Networks | 5 pages, 11 figures, accepted by IEEE Globecom 2006 conference | null | null | null | cs.NI | null | Being motivated by recent developments in the theory of complex networks, we
examine the robustness of communication networks under intentional attack that
takes down network nodes in a decreasing order of their nodal degrees. In this
paper, we study two different effects that have been largely missed in the
existing results: (i) some communication networks, like Internet, are too large
for anyone to have global information of their topologies, which makes the
accurate intentional attack practically impossible; and (ii) most attacks in
communication networks are propagated from one node to its neighborhood
node(s), utilizing local network-topology information only. We show that
incomplete global information has different impacts to the intentional attack
in different circumstances, while local information-based attacks can be
actually highly efficient. Such insights would be helpful for the future
developments of efficient network attack/protection schemes.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 19:06:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xiao",
"Shi",
""
],
[
"Xiao",
"Gaoxi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609078 | Guy Bunin | Guy Bunin | A Continuum Theory for Unstructured Mesh Generation in Two Dimensions | null | null | null | null | cs.CG | null | A continuum description of unstructured meshes in two dimensions, both for
planar and curved surface domains, is proposed. The meshes described are those
which, in the limit of an increasingly finer mesh (smaller cells), and away
from irregular vertices, have ideally-shaped cells (squares or equilateral
triangles), and can therefore be completely described by two local properties:
local cell size and local edge directions. The connection between the two
properties is derived by defining a Riemannian manifold whose geodesics trace
the edges of the mesh. A function $\phi$, proportional to the logarithm of the
cell size, is shown to obey the Poisson equation, with localized charges
corresponding to irregular vertices. The problem of finding a suitable manifold
for a given domain is thus shown to exactly reduce to an Inverse Poisson
problem on $\phi$, of finding a distribution of localized charges adhering to
the conditions derived for boundary alignment. Possible applications to mesh
generation are discussed.
| [
{
"version": "v1",
"created": "Thu, 14 Sep 2006 00:07:39 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jul 2007 15:55:37 GMT"
}
] | 2007-07-04T00:00:00 | [
[
"Bunin",
"Guy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0609079 | Tomasz Suslo | Tomasz Suslo | Modern Statistics by Kriging | 4 pages | null | null | null | cs.NA cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present statistics (S-statistics) based only on random variable (not
random value) with a mean squared error of mean estimation as a concept of
error.
| [
{
"version": "v1",
"created": "Thu, 14 Sep 2006 12:34:59 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 12:45:33 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Mar 2007 16:14:46 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jul 2009 10:03:56 GMT"
}
] | 2009-07-29T00:00:00 | [
[
"Suslo",
"Tomasz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0609080 | Benedetto Intrigila | Benedetto Intrigila and Richard Statman | Solution of a Problem of Barendregt on Sensible lambda-Theories | 17 pages | Logical Methods in Computer Science, Volume 2, Issue 4 (October
18, 2006) lmcs:2241 | 10.2168/LMCS-2(4:5)2006 | null | cs.LO | null | <i>H</i> is the theory extending β-conversion by identifying all closed
unsolvables. <i>H</i>ω is the closure of this theory under the ω-rule
(and β-conversion). A long-standing conjecture of H. Barendregt states
that the provable equations of <i>H</i>ω form
Π<sub>1</sub><sup>1</sup>-complete set. Here we prove that conjecture.
| [
{
"version": "v1",
"created": "Thu, 14 Sep 2006 16:01:52 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Oct 2006 10:48:10 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Intrigila",
"Benedetto",
""
],
[
"Statman",
"Richard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609081 | Mark Tygert | Mark Tygert | Recurrence relations and fast algorithms | 24 pages | Recurrence relations and fast algorithms, Applied and
Computational Harmonic Analysis, 28 (1): 121-128, 2010 | null | null | cs.CE cs.NA | null | We construct fast algorithms for evaluating transforms associated with
families of functions which satisfy recurrence relations. These include
algorithms both for computing the coefficients in linear combinations of the
functions, given the values of these linear combinations at certain points,
and, vice versa, for evaluating such linear combinations at those points, given
the coefficients in the linear combinations; such procedures are also known as
analysis and synthesis of series of certain special functions. The algorithms
of the present paper are efficient in the sense that their computational costs
are proportional to n (ln n) (ln(1/epsilon))^3, where n is the amount of input
and output data, and epsilon is the precision of computations. Stated somewhat
more precisely, we find a positive real number C such that, for any positive
integer n > 10, the algorithms require at most C n (ln n) (ln(1/epsilon))^3
floating-point operations and words of memory to evaluate at n appropriately
chosen points any linear combination of n special functions, given the
coefficients in the linear combination, where epsilon is the precision of
computations.
| [
{
"version": "v1",
"created": "Thu, 14 Sep 2006 17:51:11 GMT"
}
] | 2010-06-04T00:00:00 | [
[
"Tygert",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0609082 | Marek W. Gutowski | Marek W. Gutowski | Classifying extrema using intervals | LaTeX, 7 pages, no figures | null | null | null | cs.MS cs.CC cs.NA | null | We present a straightforward and verified method of deciding whether the
n-dimensional point x (n>=1), such that \nabla f(x)=0, is the local minimizer,
maximizer or just a saddle point of a real-valued function f.
The method scales linearly with dimensionality of the problem and never
produces false results.
| [
{
"version": "v1",
"created": "Thu, 14 Sep 2006 18:32:46 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Gutowski",
"Marek W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0609083 | Chinh Hoang | C. T. Hoang, J. Sawada, X. Shu | k-Colorability of P5-free graphs | null | null | null | null | cs.DM cs.DS | null | A polynomial time algorithm that determines for a fixed integer k whether or
not a P5-free graph can be k-colored is presented in this paper. If such a
coloring exists, the algorithm will produce a valid k-coloring.
| [
{
"version": "v1",
"created": "Thu, 14 Sep 2006 21:30:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoang",
"C. T.",
""
],
[
"Sawada",
"J.",
""
],
[
"Shu",
"X.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0609084 | Amelia Sparavigna | A. Sparavigna, B. Montrucchio | Non-photorealistic image rendering with a labyrinthine tiling | 9 pages, 5 figures | null | null | null | cs.GR | null | The paper describes a new image processing for a non-photorealistic
rendering. The algorithm is based on a random generation of gray tones and
competing statistical requirements. The gray tone value of each pixel in the
starting image is replaced selecting among randomly generated tone values,
according to the statistics of nearest-neighbor and next-nearest-neighbor
pixels. Two competing conditions for replacing the tone values - one position
on the local mean value the other on the local variance - produce a peculiar
pattern on the image. This pattern has a labyrinthine tiling aspect. For
certain subjects, the pattern enhances the look of the image.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2006 07:21:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sparavigna",
"A.",
""
],
[
"Montrucchio",
"B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0609085 | Philip Bille | Philip Bille, Rolf Fagerberg, Inge Li Goertz | Improved Approximate String Matching and Regular Expression Matching on
Ziv-Lempel Compressed Texts | null | null | null | null | cs.DS | null | We study the approximate string matching and regular expression matching
problem for the case when the text to be searched is compressed with the
Ziv-Lempel adaptive dictionary compression schemes. We present a time-space
trade-off that leads to algorithms improving the previously known complexities
for both problems. In particular, we significantly improve the space bounds,
which in practical applications are likely to be a bottleneck.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2006 07:36:25 GMT"
},
{
"version": "v2",
"created": "Thu, 3 May 2007 11:07:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bille",
"Philip",
""
],
[
"Fagerberg",
"Rolf",
""
],
[
"Goertz",
"Inge Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0609086 | Fabrice Theoleyre | Herv\'e Rivano (INRIA Sophia Antipolis), Fabrice Theoleyre (INRIA
Rh\^one-Alpes), Fabrice Valois (INRIA Rh\^one-Alpes) | About the Capacity of Flat and Self-Organized Ad Hoc and Hybrid Networks | null | null | null | null | cs.NI | null | Ad hoc networking specific challenges foster a strong research effort on
efficient protocols design. Routing protocols based on a self-organized
structure have been studied principally for the robustness and the scalability
they provide. On the other hand, self-organization schemes may decrease the
network capacity since they concentrate the traffic on privileged links. This
paper presents four models for evaluating the capacity of a routing schemes on
802.11 like networks. Our approach consists in modeling the radio resource
sharing principles of 802.11 like MAC protocols as a set of linear constraints.
We have implemented two models of fairness. The first one assumes that nodes
have a fair access to the channel, while the second one assumes that on the
radio links. We then develop a pessimistic and an optimistic scenarii of
spatial re-utilization of the medium, yielding a lower bound and an upper bound
on the network capacity for each fairness case. Our models are independent of
the routing protocols and provide therefore a relevant framework for their
comparison. We apply our models to a comparative analysis of the well-known
shortest path base flat routing protocol OLSR against two main self-organized
structure approaches, VSR, and Wu & Li's protocols. This study concludes on the
relevance of self-organized approaches from the network capacity point of view.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2006 13:40:33 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Rivano",
"Hervé",
"",
"INRIA Sophia Antipolis"
],
[
"Theoleyre",
"Fabrice",
"",
"INRIA\n Rhône-Alpes"
],
[
"Valois",
"Fabrice",
"",
"INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609087 | Leszek Skoczylas | Jacek Michalski, Leszek Skoczylas | A comparative analysis of the geometrical surface texture of a real and
virtual model of a tooth flank of a cylindrical gear | 32 pages, 10 figures | null | null | null | cs.CE | null | The paper presents the methodology of modelling tooth flanks of cylindrical
gears in the Cad environment. The modelling consists in a computer simulation
of gear generation. A model of tooth flanks is an envelope curve of a family of
envelopes that originate from the rolling motion of a solid tool model in
relation to a solid model of the cylindrical gear. The surface stereometry and
topography of the tooth flanks, hobbed and chiselled by Fellows method, are
compared to their numerical models. Metrological measurements of the real gears
were carried out using a coordinated measuring machine and a two - and a
three-dimensional profilometer. A computer simulation of the gear generation
was performed in the Mechanical Desktop environment.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2006 14:05:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Michalski",
"Jacek",
""
],
[
"Skoczylas",
"Leszek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0609088 | Xiaofei Huang | Xiaofei Huang | Deriving the Normalized Min-Sum Algorithm from Cooperative Optimization | Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006 | null | 10.1109/ITW2.2006.323788 | null | cs.IT math.IT | null | The normalized min-sum algorithm can achieve near-optimal performance at
decoding LDPC codes. However, it is a critical question to understand the
mathematical principle underlying the algorithm. Traditionally, people thought
that the normalized min-sum algorithm is a good approximation to the
sum-product algorithm, the best known algorithm for decoding LDPC codes and
Turbo codes. This paper offers an alternative approach to understand the
normalized min-sum algorithm. The algorithm is derived directly from
cooperative optimization, a newly discovered general method for
global/combinatorial optimization. This approach provides us another
theoretical basis for the algorithm and offers new insights on its power and
limitation. It also gives us a general framework for designing new decoding
algorithms.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2006 23:47:03 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609089 | Xiaofei Huang | Xiaofei Huang, Suquan Ding, Zhixing Yang, Youshou Wu | Fast Min-Sum Algorithms for Decoding of LDPC over GF(q) | Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006 | null | 10.1109/ITW2.2006.323764 | null | cs.IT math.IT | null | In this paper, we present a fast min-sum algorithm for decoding LDPC codes
over GF(q). Our algorithm is different from the one presented by David Declercq
and Marc Fossorier in ISIT 05 only at the way of speeding up the horizontal
scan in the min-sum algorithm. The Declercq and Fossorier's algorithm speeds up
the computation by reducing the number of configurations, while our algorithm
uses the dynamic programming instead. Compared with the configuration reduction
algorithm, the dynamic programming one is simpler at the design stage because
it has less parameters to tune. Furthermore, it does not have the performance
degradation problem caused by the configuration reduction because it searches
the whole configuration space efficiently through dynamic programming. Both
algorithms have the same level of complexity and use simple operations which
are suitable for hardware implementations.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2006 23:58:15 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Huang",
"Xiaofei",
""
],
[
"Ding",
"Suquan",
""
],
[
"Yang",
"Zhixing",
""
],
[
"Wu",
"Youshou",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609090 | Xiaofei Huang | Xiaofei Huang | Single-Scan Min-Sum Algorithms for Fast Decoding of LDPC Codes | Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006 | null | 10.1109/ITW2.2006.323774 | null | cs.IT math.IT | null | Many implementations for decoding LDPC codes are based on the
(normalized/offset) min-sum algorithm due to its satisfactory performance and
simplicity in operations. Usually, each iteration of the min-sum algorithm
contains two scans, the horizontal scan and the vertical scan. This paper
presents a single-scan version of the min-sum algorithm to speed up the
decoding process. It can also reduce memory usage or wiring because it only
needs the addressing from check nodes to variable nodes while the original
min-sum algorithm requires that addressing plus the addressing from variable
nodes to check nodes. To cut down memory usage or wiring further, another
version of the single-scan min-sum algorithm is presented where the messages of
the algorithm are represented by single bit values instead of using fixed point
ones. The software implementation has shown that the single-scan min-sum
algorithm is more than twice as fast as the original min-sum algorithm.
| [
{
"version": "v1",
"created": "Sat, 16 Sep 2006 00:08:09 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609091 | Patrick Dehornoy | Patrick Dehornoy (LMNO) | Using shifted conjugacy in braid-based cryptography | null | null | null | null | cs.CR | null | Conjugacy is not the only possible primitive for designing braid-based
protocols. To illustrate this principle, we describe a Fiat--Shamir-style
authentication protocol that be can be implemented using any binary operation
that satisfies the left self-distributive law. Conjugation is an example of
such an operation, but there are other examples, in particular the shifted
conjugation on Artin's braid group B\_oo, and the finite Laver tables. In both
cases, the underlying structures have a high combinatorial complexity, and they
lead to difficult problems.
| [
{
"version": "v1",
"created": "Sat, 16 Sep 2006 10:55:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dehornoy",
"Patrick",
"",
"LMNO"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0609092 | Pavel Emelyanov | P. Emelyanov | Analysis of Equality Relationships for Imperative Programs | 31 pages, 10 figures, 2 tables, 1 appendix | null | null | null | cs.PL | null | In this article, we discuss a flow--sensitive analysis of equality
relationships for imperative programs. We describe its semantic domains,
general purpose operations over abstract computational states (term evaluation
and identification, semantic completion, widening operator, etc.) and semantic
transformers corresponding to program constructs. We summarize our experiences
from the last few years concerning this analysis and give attention to
applications of analysis of automatically generated code. Among other
illustrating examples, we consider a program for which the analysis diverges
without a widening operator and results of analyzing residual programs produced
by some automatic partial evaluator. An example of analysis of a program
generated by this evaluator is given.
| [
{
"version": "v1",
"created": "Sat, 16 Sep 2006 12:22:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Emelyanov",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.