id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
cs/0608118
Benoit Hudzia
B. Hudzia, M-T. Kechadi and A. Ottewill
TreeP: A Tree-Based P2P Network Architecture
null
B. Hudzia, M-T. Kechadi, and A. Ottewill, "TreeP: A Tree-Based P2P Network Architecture", International Workshop on Algorithms, Models and tools for parallel computing on heterogeneous networks (HeteroPar' 05), Boston, Massachusetts, USA, September 27-30, 2005
null
null
cs.DC
null
In this paper we proposed a hierarchical P2P network based on a dynamic partitioning on a 1-D space. This hierarchy is created and maintained dynamically and provides a gridmiddleware (like DGET) a P2P basic functionality for resource discovery and load-balancing.This network architecture is called TreeP (Tree based P2P network architecture) and is based on atessellation of a 1-D space. We show that this topology exploits in an efficient way theheterogeneity feature of the network while limiting the overhead introduced by the overlaymaintenance. Experimental results show that this topology is highly resilient to a large number ofnetwork failures.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 15:08:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "B.", "" ], [ "Kechadi", "M-T.", "" ], [ "Ottewill", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608119
Shiguo Lian
Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Security Analysis of A Chaos-based Image Encryption Algorithm
16 pages,4 figures
null
null
null
cs.MM cs.CR
null
The security of Fridrich Image Encryption Algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to strengthen the overall performance of the focused cryptosystem.
[ { "version": "v1", "created": "Wed, 30 Aug 2006 03:22:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Lian", "Shiguo", "" ], [ "Sun", "Jinsheng", "" ], [ "Wang", "Zhiquan", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608120
Thierry Cachat
Thierry Cachat (LIAFA)
Controller synthesis & Ordinal Automata
with appendix
Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06) Springer (Ed.) (2006) 215-228
null
null
cs.GT
null
Ordinal automata are used to model physical systems with Zeno behavior. Using automata and games techniques we solve a control problem formulated and left open by Demri and Nowak in 2005. It involves partial observability and a new synchronization between the controller and the environment.
[ { "version": "v1", "created": "Wed, 30 Aug 2006 09:58:08 GMT" }, { "version": "v2", "created": "Mon, 30 Oct 2006 11:04:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Cachat", "Thierry", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0608121
Cheng-Yuan Liou
Cheng-Yuan Liou and Bruce R. Musicus
Cross Entropy Approximation of Structured Covariance Matrices
20 pages
IEEE Transactions on Signal Processing, vol. 56, issue 7, Part 2, pages 3362-3367, 2008
null
null
cs.IT math.IT
null
We apply two variations of the principle of Minimum Cross Entropy (the Kullback information measure) to fit parameterized probability density models to observed data densities. For an array beamforming problem with P incident narrowband point sources, N > P sensors, and colored noise, both approaches yield eigenvector fitting methods similar to that of the MUSIC algorithm[1]. Furthermore, the corresponding cross-entropies are related to the MDL model order selection criterion[2].
[ { "version": "v1", "created": "Wed, 30 Aug 2006 10:03:50 GMT" } ]
2008-06-24T00:00:00
[ [ "Liou", "Cheng-Yuan", "" ], [ "Musicus", "Bruce R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608122
Mani A.
A. Mani
FOSS-Based Grid Computing
47 Pages. arXiv admin note: text overlap with arXiv:cs/0605056 by other authors
null
null
EG -15 (RMCE)
cs.DC cs.PL
http://creativecommons.org/licenses/by/4.0/
In this expository paper we will be primarily concerned with core aspects of Grids and Grid computing using free and open-source software with some emphasis on utility computing. It is based on a technical report entitled 'Grid-Computing Using GNU/Linux' by the present author. This article was written in 2006 and should be of historical interest.
[ { "version": "v1", "created": "Wed, 30 Aug 2006 18:59:33 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2006 14:36:06 GMT" }, { "version": "v3", "created": "Sun, 12 Jul 2015 06:01:09 GMT" }, { "version": "v4", "created": "Fri, 17 Jul 2015 17:33:07 GMT" } ]
2015-07-20T00:00:00
[ [ "Mani", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0608123
Zhengbang Zha
Zhengbang Zha and XueLi Wang
Proof of a Conjecture of Helleseth Regarding Pairs of Binary m-Sequences
This paper has been withdrawn
null
null
null
cs.IT math.IT
null
This paper has been withdrawn by the author(s), due a crucial sign error in Thm. 11.
[ { "version": "v1", "created": "Thu, 31 Aug 2006 07:52:07 GMT" }, { "version": "v2", "created": "Mon, 29 Oct 2007 04:56:52 GMT" } ]
2007-10-29T00:00:00
[ [ "Zha", "Zhengbang", "" ], [ "Wang", "XueLi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608124
Philip Bille
Philip Bille and Inge Li Goertz
The Tree Inclusion Problem: In Linear Space and Faster
Minor updates from last time
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given two rooted, ordered, and labeled trees $P$ and $T$ the tree inclusion problem is to determine if $P$ can be obtained from $T$ by deleting nodes in $T$. This problem has recently been recognized as an important query primitive in XML databases. Kilpel\"ainen and Mannila [\emph{SIAM J. Comput. 1995}] presented the first polynomial time algorithm using quadratic time and space. Since then several improved results have been obtained for special cases when $P$ and $T$ have a small number of leaves or small depth. However, in the worst case these algorithms still use quadratic time and space. Let $n_S$, $l_S$, and $d_S$ denote the number of nodes, the number of leaves, and the %maximum depth of a tree $S \in \{P, T\}$. In this paper we show that the tree inclusion problem can be solved in space $O(n_T)$ and time: O(\min(l_Pn_T, l_Pl_T\log \log n_T + n_T, \frac{n_Pn_T}{\log n_T} + n_{T}\log n_{T})). This improves or matches the best known time complexities while using only linear space instead of quadratic. This is particularly important in practical applications, such as XML databases, where the space is likely to be a bottleneck.
[ { "version": "v1", "created": "Thu, 31 Aug 2006 12:23:37 GMT" }, { "version": "v2", "created": "Fri, 7 Sep 2007 11:28:07 GMT" }, { "version": "v3", "created": "Mon, 9 Feb 2009 11:57:45 GMT" }, { "version": "v4", "created": "Wed, 7 Oct 2009 08:51:58 GMT" }, { "version": "v5", "created": "Tue, 18 Jan 2011 15:38:52 GMT" } ]
2011-01-19T00:00:00
[ [ "Bille", "Philip", "" ], [ "Goertz", "Inge Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0608125
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA)
Decidability of Type-checking in the Calculus of Algebraic Constructions with Size Annotations
null
null
10.1007/11538363\_11
null
cs.LO cs.PL
null
Since Val Tannen's pioneer work on the combination of simply-typed lambda-calculus and first-order rewriting (LICS'88), many authors have contributed to this subject by extending it to richer typed lambda-calculi and rewriting paradigms, culminating in calculi like the Calculus of Algebraic Constructions. These works provide theoretical foundations for type-theoretic proof assistants where functions and predicates are defined by oriented higher-order equations. This kind of definitions subsumes induction-based definitions, is easier to write and provides more automation. On the other hand, checking that user-defined rewrite rules are strongly normalizing and confluent, and preserve the decidability of type-checking when combined with beta-reduction, is more difficult. Most termination criteria rely on the term structure. In a previous work, we extended to dependent types and higher-order rewriting, the notion of ``sized types'' studied by several authors in the simpler framework of ML-like languages, and proved that it preserves strong normalization. The main contribution of the present paper is twofold. First, we prove that, in the Calculus of Algebraic Constructions with size annotations, the problems of type inference and type-checking are decidable, provided that the sets of constraints generated by size annotations are satisfiable and admit most general solutions. Second, we prove the later properties for a size algebra rich enough for capturing usual induction-based definitions and much more.
[ { "version": "v1", "created": "Thu, 31 Aug 2006 14:26:20 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2006 11:59:36 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0609001
Suzanne Shontz
Suzanne M. Shontz, Stephen A. Vavasis
A Robust Solution Procedure for Hyperelastic Solids with Large Boundary Deformation
Revision of earlier version of paper. Submitted for publication in Engineering with Computers on 9 September 2010. Accepted for publication on 20 May 2011. Published online 11 June 2011. The final publication is available at http://www.springerlink.com
null
10.1007/s00366-011-0225-y
null
cs.NA cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressible Mooney-Rivlin theory has been used to model hyperelastic solids, such as rubber and porous polymers, and more recently for the modeling of soft tissues for biomedical tissues, undergoing large elastic deformations. We propose a solution procedure for Lagrangian finite element discretization of a static nonlinear compressible Mooney-Rivlin hyperelastic solid. We consider the case in which the boundary condition is a large prescribed deformation, so that mesh tangling becomes an obstacle for straightforward algorithms. Our solution procedure involves a largely geometric procedure to untangle the mesh: solution of a sequence of linear systems to obtain initial guesses for interior nodal positions for which no element is inverted. After the mesh is untangled, we take Newton iterations to converge to a mechanical equilibrium. The Newton iterations are safeguarded by a line search similar to one used in optimization. Our computational results indicate that the algorithm is up to 70 times faster than a straightforward Newton continuation procedure and is also more robust (i.e., able to tolerate much larger deformations). For a few extremely large deformations, the deformed mesh could only be computed through the use of an expensive Newton continuation method while using a tight convergence tolerance and taking very small steps.
[ { "version": "v1", "created": "Fri, 1 Sep 2006 00:07:41 GMT" }, { "version": "v2", "created": "Tue, 14 Jun 2011 16:32:43 GMT" } ]
2011-06-15T00:00:00
[ [ "Shontz", "Suzanne M.", "" ], [ "Vavasis", "Stephen A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0609002
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Claude Kirchner (INRIA Lorraine - LORIA), Colin Riba (INRIA Lorraine - LORIA)
On the confluence of lambda-calculus with conditional rewriting
null
null
10.1007/11690634\_26
null
cs.LO cs.PL
null
The confluence of untyped lambda-calculus with unconditional rewriting has already been studied in various directions. In this paper, we investigate the confluence of lambda-calculus with conditional rewriting and provide general results in two directions. First, when conditional rules are algebraic. This extends results of Muller and Dougherty for unconditional rewriting. Two cases are considered, whether beta-reduction is allowed or not in the evaluation of conditions. Moreover, Dougherty's result is improved from the assumption of strongly normalizing beta-reduction to weakly normalizing beta-reduction. We also provide examples showing that outside these conditions, modularity of confluence is difficult to achieve. Second, we go beyond the algebraic framework and get new confluence results using an extended notion of orthogonality that takes advantage of the conditional part of rewrite rules.
[ { "version": "v1", "created": "Fri, 1 Sep 2006 12:56:02 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2006 16:56:30 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ], [ "Kirchner", "Claude", "", "INRIA\n Lorraine - LORIA" ], [ "Riba", "Colin", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0609003
Emanuel Diamant
Emanuel Diamant
In Quest of Image Semantics: Are We Looking for It Under the Right Lamppost?
In 2006, this paper has been submitted to 13 computer vision conferences, and was strongly rejected by 12 of them
null
null
null
cs.CV cs.IR
null
In the last years we witness a dramatic growth of research focused on semantic image understanding. Indeed, without understanding image content successful accomplishment of any image-processing task is simply incredible. Up to the recent times, the ultimate need for such understanding has been met by the knowledge that a domain expert or a vision system supervisor have contributed to every image-processing application. The advent of the Internet has drastically changed this situation. Internet sources of visual information are diffused and dispersed over the whole Web, so the duty of information content discovery and evaluation must be relegated now to an image understanding agent (a machine or a computer program) capable to perform image content assessment at a remote image location. Development of Content Based Image Retrieval (CBIR) techniques was a right move in a right direction, launched about ten years ago. Unfortunately, very little progress has been made since then. The reason for this can be seen in a rank of long lasting misconceptions that CBIR designers are continuing to adhere to. I hope, my arguments will help them to change their minds.
[ { "version": "v1", "created": "Sat, 2 Sep 2006 11:50:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609004
Moustapha Diaby
Moustapha Diaby
Equality of complexity classes P and NP: Linear programming formulation of the quadratic assignment problem
6 pages; Published in the 2006 IMECS Conference Proceedings (ISBN: 988 98671-3-3); Hofman's claimed "counter-example" is invalid: violates set of constraints 2.10
null
null
null
cs.CC cs.DM
null
In this paper, we present a polynomial-sized linear programming formulation of the Quadratic Assignment Problem (QAP). The proposed linear program is a network flow-based model. Hence, it provides for the solution of the QAP in polynomial time. Computational testing and results are discussed.
[ { "version": "v1", "created": "Sat, 2 Sep 2006 09:12:27 GMT" }, { "version": "v2", "created": "Wed, 20 Sep 2006 18:45:01 GMT" }, { "version": "v3", "created": "Thu, 21 Sep 2006 01:39:27 GMT" }, { "version": "v4", "created": "Sun, 1 Oct 2006 19:25:04 GMT" }, { "version": "v5", "created": "Wed, 4 Oct 2006 18:43:28 GMT" }, { "version": "v6", "created": "Sun, 22 Oct 2006 13:20:38 GMT" }, { "version": "v7", "created": "Fri, 10 Nov 2006 08:48:05 GMT" }, { "version": "v8", "created": "Wed, 27 Dec 2006 23:44:18 GMT" }, { "version": "v9", "created": "Sun, 13 May 2007 21:04:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0609005
Moustapha Diaby
Moustapha Diaby
The traveling salesman problem: A Linear programming formulation
10 pages; Published in "WSEAS Transactions on Mathematics." Constraints added to rectify minor oversight in proof of proposition 2 (Theoretical development is same). Hofman's claim of a "counter-example" (arXiv cs/0610125 and cs/0611008) is invalid: violates constraints 2.11-2.15
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a polynomial-sized linear programming formulation of the Traveling Salesman Problem (TSP). The proposed linear program is a network flow-based model. Numerical implementation issues and results are discussed. (The exposition and proofs are much more detailed in an edition which I wrote in collaboration with Dr. M.H. Karwan in 2012-2014 . That edition is available at http://users.business.uconn.edu/mdiaby/P=NPProofPapers/tspPaper.pdf)
[ { "version": "v1", "created": "Sat, 2 Sep 2006 09:28:41 GMT" }, { "version": "v2", "created": "Tue, 17 Oct 2006 15:47:19 GMT" }, { "version": "v3", "created": "Sun, 22 Oct 2006 14:01:23 GMT" }, { "version": "v4", "created": "Fri, 10 Nov 2006 09:44:19 GMT" }, { "version": "v5", "created": "Wed, 27 Dec 2006 23:41:13 GMT" }, { "version": "v6", "created": "Sun, 13 May 2007 16:19:40 GMT" }, { "version": "v7", "created": "Thu, 10 Jul 2014 16:56:56 GMT" } ]
2014-07-11T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0609006
Eric Chen
Eric Zhi Chen
New Quasi-Cyclic Codes from Simplex Codes
3 pages
null
null
null
cs.IT math.IT
null
As a generalization of cyclic codes, quasi-cyclic (QC) codes contain many good linear codes. But quasi-cyclic codes studied so far are mainly limited to one generator (1-generator) QC codes. In this correspondence, 2-generator and 3-generator QC codes are studied, and many good, new QC codes are constructed from simplex codes. Some new binary QC codes or related codes, that improve the bounds on maximum minimum distance for binary linear codes are constructed. They are 5-generator QC [93, 17, 34] and [254, 23, 102] codes, and related [96, 17, 36], [256, 23, 104] codes.
[ { "version": "v1", "created": "Sat, 2 Sep 2006 11:08:15 GMT" }, { "version": "v2", "created": "Mon, 20 Nov 2006 15:22:14 GMT" } ]
2007-07-16T00:00:00
[ [ "Chen", "Eric Zhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609007
Vladislav Malyshkin
Vladislav Malyshkin, Ray Bakhramov, Andrey Gorodetsky
A Massive Local Rules Search Approach to the Classification Problem
24 pages
null
null
null
cs.LG
null
An approach to the classification problem of machine learning, based on building local classification rules, is developed. The local rules are considered as projections of the global classification rules to the event we want to classify. A massive global optimization algorithm is used for optimization of quality criterion. The algorithm, which has polynomial complexity in typical case, is used to find all high--quality local rules. The other distinctive feature of the algorithm is the integration of attributes levels selection (for ordered attributes) with rules searching and original conflicting rules resolution strategy. The algorithm is practical; it was tested on a number of data sets from UCI repository, and a comparison with the other predicting techniques is presented.
[ { "version": "v1", "created": "Sun, 3 Sep 2006 21:30:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Malyshkin", "Vladislav", "" ], [ "Bakhramov", "Ray", "" ], [ "Gorodetsky", "Andrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0609008
David Nowak
St\'ephane Demri, Ranko Lazic, David Nowak
On the freeze quantifier in Constraint LTL: decidability and complexity
29 pages
Information and Computation, 205(1):2-24, January 2007
10.1016/j.ic.2006.08.003
null
cs.LO cs.CC
null
Constraint LTL, a generalisation of LTL over Presburger constraints, is often used as a formal language to specify the behavior of operational models with constraints. The freeze quantifier can be part of the language, as in some real-time logics, but this variable-binding mechanism is quite general and ubiquitous in many logical languages (first-order temporal logics, hybrid logics, logics for sequence diagrams, navigation logics, logics with lambda-abstraction etc.). We show that Constraint LTL over the simple domain (N,=) augmented with the freeze quantifier is undecidable which is a surprising result in view of the poor language for constraints (only equality tests). Many versions of freeze-free Constraint LTL are decidable over domains with qualitative predicates and our undecidability result actually establishes Sigma_1^1-completeness. On the positive side, we provide complexity results when the domain is finite (EXPSPACE-completeness) or when the formulae are flat in a sense introduced in the paper. Our undecidability results are sharp (i.e. with restrictions on the number of variables) and all our complexity characterisations ensure completeness with respect to some complexity class (mainly PSPACE and EXPSPACE).
[ { "version": "v1", "created": "Mon, 4 Sep 2006 06:20:03 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2006 09:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Demri", "Stéphane", "" ], [ "Lazic", "Ranko", "" ], [ "Nowak", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0609009
Virginia Vassilevska
Virginia Vassilevska, Ryan Williams and Raphael Yuster
Finding heaviest H-subgraphs in real weighted graphs, with applications
23 pages
null
null
null
cs.DS cs.DM
null
For a graph G with real weights assigned to the vertices (edges), the MAX H-SUBGRAPH problem is to find an H-subgraph of G with maximum total weight, if one exists. The all-pairs MAX H-SUBGRAPH problem is to find for every pair of vertices u,v, a maximum H-subgraph containing both u and v, if one exists. Our main results are new strongly polynomial algorithms for the all-pairs MAX H-SUBGRAPH problem for vertex weighted graphs. We also give improved algorithms for the MAX-H SUBGRAPH problem for edge weighted graphs, and various related problems, including computing the first k most significant bits of the distance product of two matrices. Some of our algorithms are based, in part, on fast matrix multiplication.
[ { "version": "v1", "created": "Mon, 4 Sep 2006 08:08:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassilevska", "Virginia", "" ], [ "Williams", "Ryan", "" ], [ "Yuster", "Raphael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0609010
Artur Rataj
Artur Rataj
An effective edge--directed frequency filter for removal of aliasing in upsampled images
10 pages, 11 figures
null
null
null
cs.CV
null
Raster images can have a range of various distortions connected to their raster structure. Upsampling them might in effect substantially yield the raster structure of the original image, known as aliasing. The upsampling itself may introduce aliasing into the upsampled image as well. The presented method attempts to remove the aliasing using frequency filters based on the discrete fast Fourier transform, and applied directionally in certain regions placed along the edges in the image. As opposed to some anisotropic smoothing methods, the presented algorithm aims to selectively reduce only the aliasing, preserving the sharpness of image details. The method can be used as a post--processing filter along with various upsampling algorithms. It was experimentally shown that the method can improve the visual quality of the upsampled images.
[ { "version": "v1", "created": "Mon, 4 Sep 2006 13:04:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Rataj", "Artur", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0609011
Kalyanarama Sesha Sayee KCV
K.C.V. Kalyanarama Sesha Sayee
Scheduling for Stable and Reliable Communication over Multiaccess Channels and Degraded Broadcast Channels
Ph.D. Thesis submitted to Department of Electrical Communication Engineering at Indian Institute of Science, Bangalore, India
null
null
null
cs.NI cs.IT math.IT
null
Information-theoretic arguments focus on modeling the reliability of information transmission, assuming availability of infinite data at sources, thus ignoring randomness in message generation times at the respective sources. However, in information transport networks, not only is reliable transmission important, but also stability, i.e., finiteness of mean delay incurred by messages from the time of generation to the time of successful reception. Usually, delay analysis is done separately using queueing-theoretic arguments, whereas reliable information transmission is studied using information theory. In this thesis, we investigate these two important aspects of data communication jointly by suitably combining models from these two fields. In particular, we model scheduled communication of messages, that arrive in a random process, (i) over multiaccess channels, with either independent decoding or joint decoding, and (ii) over degraded broadcast channels. The scheduling policies proposed permit up to a certain maximum number of messages for simultaneous transmission. In the first part of the thesis, we develop a multi-class discrete-time processor-sharing queueing model, and then investigate the stability of this queue. In particular, we model the queue by a discrete-time Markov chain defined on a countable state space, and then establish (i) a sufficient condition for $c$-regularity of the chain, and hence positive recurrence and finiteness of stationary mean of the function $c$ of the state, and (ii) a sufficient condition for transience of the chain. These stability results form the basis for the conclusions drawn in the thesis.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 05:27:33 GMT" } ]
2009-09-29T00:00:00
[ [ "Sayee", "K. C. V. Kalyanarama Sesha", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609012
Philippe Moser
Philippe Moser
Baire Categories on Small Complexity Classes and Meager-Comeager Laws
to be published in Inform. and comp
null
null
null
cs.CC
null
We introduce two resource-bounded Baire category notions on small complexity classes such as P, SUBEXP, and PSPACE and on probabilistic classes such as BPP, which differ on how the corresponding finite extension strategies are computed. We give an alternative characterization of small sets via resource-bounded Banach-Mazur games. As an application of the first notion, we show that for almost every language A (i.e. all except a meager class) computable in subexponential time, P(A)=BPP(A). We also show that almost all languages in PSPACE do not have small nonuniform complexity. We then switch to the second Baire category notion (called locally-computable), and show that the class SPARSE is meager in P. We show that in contrast to the resource-bounded measure case, meager-comeager laws can be obtained for many standard complexity classes, relative to locally-computable Baire category on BPP and PSPACE. Another topic where locally-computable Baire categories differ from resource-bounded measure is regarding weak-completeness: we show that there is no weak-completeness notion in P based on locally-computable Baire categories, i.e. every P-weakly-complete set is complete for P. We also prove that the class of complete sets for P under Turing-logspace reductions is meager in P, if P is not equal to DSPACE(log n), and that the same holds unconditionally for quasi-poly time. Finally we observe that locally-computable Baire categories are incomparable with all existing resource-bounded measure notions on small complexity classes, which might explain why those two settings seem to differ so fundamentally.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 09:02:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Moser", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0609013
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Colin Riba (INRIA Lorraine - LORIA)
Combining typing and size constraints for checking the termination of higher-order conditional rewrite systems
null
Dans 13th International Conference on Logic for Programming, Artificial Intelligence and Reasoning - LPAR 2006
null
null
cs.LO
null
In a previous work, the first author extended to higher-order rewriting and dependent types the use of size annotations in types, a termination proof technique called type or size based termination and initially developed for ML-like programs. Here, we go one step further by considering conditional rewriting and explicit quantifications and constraints on size annotations. This allows to describe more precisely how the size of the output of a function depends on the size of its inputs. Hence, we can check the termination of more functions. We first give a general type-checking algorithm based on constraint solving. Then, we give a termination criterion with constraints in Presburger arithmetic. To our knowledge, this is the first termination criterion for higher-order conditional rewriting taking into account the conditions in termination.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 14:23:38 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2006 11:57:50 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ], [ "Riba", "Colin", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609014
Julien Reynier
Julien Reynier (INRIA Rocquencourt)
A simple stability condition for RED using TCP mean-field modeling
null
null
null
null
cs.NI math.PR
null
Congestion on the Internet is an old problem but still a subject of intensive research. The TCP protocol with its AIMD (Additive Increase and Multiplicative Decrease) behavior hides very challenging problems; one of them is to understand the interaction between a large number of users with delayed feedback. This article will focus on two modeling issues of TCP which appeared to be important to tackle concrete scenarios when implementing the model proposed in [Baccelli McDonald Reynier 02] firstly the modeling of the maximum TCP window size: this maximum can be reached quickly in many practical cases; secondly the delay structure: the usual Little-like formula behaves really poorly when queuing delays are variable, and may change dramatically the evolution of the predicted queue size, which makes it useless to study drop-tail or RED (Random Early Detection) mechanisms. Within proposed TCP modeling improvements, we are enabled to look at a concrete example where RED should be used in FIFO routers instead of letting the default drop-tail happen. We study mathematically fixed points of the window size distribution and local stability of RED. An interesting case is when RED operates at the limit when the congestion starts, it avoids unwanted loss of bandwidth and delay variations.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 14:27:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Reynier", "Julien", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0609015
Marc Tommasi
J. Carme (INRIA Futurs), R. Gilleron (INRIA Futurs), A. Lemay (INRIA Futurs), A. Terlutte (INRIA Futurs), M. Tommasi (INRIA Futurs)
Residual Finite Tree Automata
null
null
null
null
cs.CC cs.LO
null
Tree automata based algorithms are essential in many fields in computer science such as verification, specification, program analysis. They become also essential for databases with the development of standards such as XML. In this paper, we define new classes of non deterministic tree automata, namely residual finite tree automata (RFTA). In the bottom-up case, we obtain a new characterization of regular tree languages. In the top-down case, we obtain a subclass of regular tree languages which contains the class of languages recognized by deterministic top-down tree automata. RFTA also come with the property of existence of canonical non deterministic tree automata.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 16:23:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Carme", "J.", "", "INRIA Futurs" ], [ "Gilleron", "R.", "", "INRIA Futurs" ], [ "Lemay", "A.", "", "INRIA\n Futurs" ], [ "Terlutte", "A.", "", "INRIA Futurs" ], [ "Tommasi", "M.", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609016
Tomasz Ciszkowski Mr
Tomasz Ciszkowski, Zbigniew Kotulski
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
12 pages, 10th Domestic Conference on Applied Cryptography ENIGMA, Warsaw, Poland, May 2006, The second author's last name was corrected
null
null
null
cs.CR cs.NI
null
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researchers' attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make them vulnerable to security threats. Support for an anonymity in MANET is an orthogonal to security critical challenge we faced in this paper. We propose a new anonymous authentication protocol for mobile ad hoc networks enhanced with a distributed reputation system. The main its objective is to provide mechanisms concealing a real identity of communicating nodes with an ability of resist to known attacks. The distributed reputation system is incorporated for a trust management and malicious behavior detection in the network. The end-to-end anonymous authentication is conducted in three-pass handshake based on an asymmetric and symmetric key cryptography. After successfully finished authentication phase secure and multiple anonymous data channels are established. The anonymity is guarantied by randomly chosen pseudonyms owned by a user. Nodes of the network are publicly identified and are independent of users' pseudonyms. In this paper we presented an example of the protocol implementation.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 18:21:45 GMT" }, { "version": "v2", "created": "Wed, 6 Sep 2006 14:40:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ciszkowski", "Tomasz", "" ], [ "Kotulski", "Zbigniew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609017
Wolfgang Slany
Wolfgang Slany and Wolfgang Kienreich
On some winning strategies for the Iterated Prisoner's Dilemma or Mr. Nice Guy and the Cosa Nostra
null
null
null
null
cs.GT
null
We submitted two kinds of strategies to the iterated prisoner's dilemma (IPD) competitions organized by Graham Kendall, Paul Darwen and Xin Yao in 2004 and 2005. Our strategies performed exceedingly well in both years. One type is an intelligent and optimistic enhanced version of the well known TitForTat strategy which we named OmegaTitForTat. It recognizes common behaviour patterns and detects and recovers from repairable mutual defect deadlock situations, otherwise behaving much like TitForTat. The second type consists of a set of strategies working together as a team. These group strategies have one distinguished individual Godfather strategy that plays OmegaTitForTat against non-members while heavily profiting from the behaviour of the other members of his group, the Hitman. The Hitman willingly let themselves being abused by their Godfather while themselves lowering the scores of all other players as much as possible, thus further maximizing the performance of their Godfather in relation to other participants. The study of collusion in the simplified framework of the iterated prisoner's dilemma allows us to draw parallels to many common aspects of reality both in Nature as well as Human Society, and therefore further extends the scope of the iterated prisoner's dilemma as a metaphor for the study of cooperative behaviour in a new and natural direction. We further provide evidence that it will be unavoidable that such group strategies will dominate all future iterated prisoner's dilemma competitions as they can be stealthy camouflaged as non-group strategies with arbitrary subtlety. Moreover, we show that the general problem of recognizing stealth colluding strategies is undecidable in the theoretical sense.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 18:42:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Slany", "Wolfgang", "" ], [ "Kienreich", "Wolfgang", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0609018
Peyman Razaghi
Peyman Razaghi, Wei Yu
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
Submitted to IEEE Trans. Info. Theory
null
10.1109/TIT.2007.904983
null
cs.IT math.IT
null
This paper describes an efficient implementation of binning for the relay channel using low-density parity-check (LDPC) codes. We devise bilayer LDPC codes to approach the theoretically promised rate of the decode-and-forward relaying strategy by incorporating relay-generated information bits in specially designed bilayer graphical code structures. While conventional LDPC codes are sensitively tuned to operate efficiently at a certain channel parameter, the proposed bilayer LDPC codes are capable of working at two different channel parameters and two different rates: that at the relay and at the destination. To analyze the performance of bilayer LDPC codes, bilayer density evolution is devised as an extension of the standard density evolution algorithm. Based on bilayer density evolution, a design methodology is developed for the bilayer codes in which the degree distribution is iteratively improved using linear programming. Further, in order to approach the theoretical decode-and-forward rate for a wide range of channel parameters, this paper proposes two different forms bilayer codes, the bilayer-expurgated and bilayer-lengthened codes. It is demonstrated that a properly designed bilayer LDPC code can achieve an asymptotic infinite-length threshold within 0.24 dB gap to the Shannon limits of two different channels simultaneously for a wide range of channel parameters. By practical code construction, finite-length bilayer codes are shown to be able to approach within a 0.6 dB gap to the theoretical decode-and-forward rate of the relay channel at a block length of $10^5$ and a bit-error probability (BER) of $10^{-4}$. Finally, it is demonstrated that a generalized version of the proposed bilayer code construction is applicable to relay networks with multiple relays.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 19:34:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Razaghi", "Peyman", "" ], [ "Yu", "Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609019
Sophie Aubin
Sophie Aubin (LIPN), Thierry Hamon (LIPN)
Improving Term Extraction with Terminological Resources
null
Advances in Natural Language Processing 5th International Conference on NLP, FinTAL 2006 (2006) 380
null
null
cs.CL
null
Studies of different term extractors on a corpus of the biomedical domain revealed decreasing performances when applied to highly technical texts. The difficulty or impossibility of customising them to new domains is an additional limitation. In this paper, we propose to use external terminologies to influence generic linguistic data in order to augment the quality of the extraction. The tool we implemented exploits testified terms at different steps of the process: chunking, parsing and extraction of term candidates. Experiments reported here show that, using this method, more term candidates can be acquired with a higher level of reliability. We further describe the extraction process involving endogenous disambiguation implemented in the term extractor YaTeA.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 11:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Aubin", "Sophie", "", "LIPN" ], [ "Hamon", "Thierry", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0609020
Alin Bostan
Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), Francois Morain (LIX, INRIA Futurs), Eric Schost (LIX)
Fast algorithms for computing isogenies between elliptic curves
null
null
10.1090/S0025-5718-08-02066-8
null
cs.CC cs.SC math.NT
null
We survey algorithms for computing isogenies between elliptic curves defined over a field of characteristic either 0 or a large prime. We introduce a new algorithm that computes an isogeny of degree $\ell$ ($\ell$ different from the characteristic) in time quasi-linear with respect to $\ell$. This is based in particular on fast algorithms for power series expansion of the Weierstrass $\wp$-function and related functions.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 12:10:17 GMT" } ]
2013-06-19T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Morain", "Francois", "", "LIX, INRIA Futurs" ], [ "Schost", "Eric", "", "LIX" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
cs/0609021
Pierre Boudes
Pierre Boudes (LIPN)
Non uniform (hyper/multi)coherence spaces
32 pages
null
null
null
cs.LO
null
In (hyper)coherence semantics, proofs/terms are cliques in (hyper)graphs. Intuitively, vertices represent results of computations and the edge relation witnesses the ability of being assembled into a same piece of data or a same (strongly) stable function, at arrow types. In (hyper)coherence semantics, the argument of a (strongly) stable functional is always a (strongly) stable function. As a consequence, comparatively to the relational semantics, where there is no edge relation, some vertices are missing. Recovering these vertices is essential for the purpose of reconstructing proofs/terms from their interpretations. It shall also be useful for the comparison with other semantics, like game semantics. In [BE01], Bucciarelli and Ehrhard introduced a so called non uniform coherence space semantics where no vertex is missing. By constructing the co-free exponential we set a new version of this last semantics, together with non uniform versions of hypercoherences and multicoherences, a new semantics where an edge is a finite multiset. Thanks to the co-free construction, these non uniform semantics are deterministic in the sense that the intersection of a clique and of an anti-clique contains at most one vertex, a result of interaction, and extensionally collapse onto the corresponding uniform semantics.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 12:14:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Boudes", "Pierre", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609022
Barnaby Martin
Barnaby Martin
Dichotomies and Duality in First-order Model Checking Problems
null
null
null
null
cs.LO cs.CC
null
We study the complexity of the model checking problem, for fixed model A, over certain fragments L of first-order logic. These are sometimes known as the expression complexities of L. We obtain various complexity classification theorems for these logics L as each ranges over models A, in the spirit of the dichotomy conjecture for the Constraint Satisfaction Problem -- which itself may be seen as the model checking problem for existential conjunctive positive first-order logic.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 13:04:36 GMT" }, { "version": "v2", "created": "Tue, 28 Nov 2006 16:14:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Martin", "Barnaby", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0609023
Himanshu Thapliyal
Himanshu Thapliyal, M. B. Srinivas
Novel Reversible TSG Gate and Its Application for Designing Components of Primitive Reversible/Quantum ALU
5 Pages; Published in Proceedings of the Fifth IEEE International Conference on Information, Communications and Signal Processing (ICICS 2005), Bangkok, Thailand, 6-9 December 2005,pp.1425-1429
null
10.1109/ICICS.2005.1689293
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper utilizes a new 4 * 4 reversible gate called TSG gate to build the components of a primitive reversible/quantum ALU. The most significant aspect of the TSG gate is that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only. A Novel reversible 4:2 compressor is also designed from the TSG gate which is later used to design a novel 8x8 reversible Wallace tree multiplier. It is proved that the adder, 4:2 compressor and multiplier architectures designed using the TSG gate are better than their counterparts available in literature, in terms of number of reversible gates and garbage outputs. This is perhaps, the first attempt to design a reversible 4:2 compressor and a reversible Wallace tree multiplier as far as existing literature and our knowledge is concerned. Thus, this paper provides an initial threshold to build more complex systems which can execute complicated operations using reversible logic.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 16:09:04 GMT" } ]
2016-11-17T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0609024
Prashant Singh
Prashant
Linux, Open Source and Unicode
10 pages, 1 figure, 1 table
null
null
null
cs.SE
null
The paper is taken out.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 18:12:27 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:04:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0609025
Prashant Singh
Prashant
A XML Schema Definition based Universal User Interface
6 pages, 5 figures
null
null
null
cs.SE
null
The article is taken out for change of contents.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 18:21:23 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:03:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0609026
Arnaud Legout
Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Guillaume Urvoy-Keller (EURECOM), Pietro Michiardi (EURECOM)
Rarest First and Choke Algorithms Are Enough
null
Dans ACM SIGCOMM/USENIX IMC'2006
null
null
cs.NI
null
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rarest first and choke algorithms. Whereas it is commonly admitted that BitTorrent performs well, recent studies have proposed the replacement of the rarest first and choke algorithms in order to improve efficiency and fairness. In this paper, we use results from real experiments to advocate that the replacement of the rarest first and choke algorithms cannot be justified in the context of peer-to-peer file replication in the Internet. We instrumented a BitTorrent client and ran experiments on real torrents with different characteristics. Our experimental evaluation is peer oriented, instead of tracker oriented, which allows us to get detailed information on all exchanged messages and protocol events. We go beyond the mere observation of the good efficiency of both algorithms. We show that the rarest first algorithm guarantees close to ideal diversity of the pieces among peers. In particular, on our experiments, replacing the rarest first algorithm with source or network coding solutions cannot be justified. We also show that the choke algorithm in its latest version fosters reciprocation and is robust to free riders. In particular, the choke algorithm is fair and its replacement with a bit level tit-for-tat solution is not appropriate. Finally, we identify new areas of improvements for efficient peer-to-peer file replication protocols.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 19:44:35 GMT" } ]
2016-08-16T00:00:00
[ [ "Legout", "Arnaud", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Urvoy-Keller", "Guillaume", "", "EURECOM" ], [ "Michiardi", "Pietro", "", "EURECOM" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609027
Al-Mukaddim Khan Pathan
Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Broberg and Zahir Tari
A Case for Peering of Content Delivery Networks
Short Article (Submitted in DS Online as Work in Progress)
null
null
null
cs.DC
null
The proliferation of Content Delivery Networks (CDN) reveals that existing content networks are owned and operated by individual companies. As a consequence, closed delivery networks are evolved which do not cooperate with other CDNs and in practice, islands of CDNs are formed. Moreover, the logical separation between contents and services in this context results in two content networking domains. But present trends in content networks and content networking capabilities give rise to the interest in interconnecting content networks. Finding ways for distinct content networks to coordinate and cooperate with other content networks is necessary for better overall service. In addition to that, meeting the QoS requirements of users according to the negotiated Service Level Agreements between the user and the content network is a burning issue in this perspective. In this article, we present an open, scalable and Service-Oriented Architecture based system to assist the creation of open Content and Service Delivery Networks (CSDN) that scale and support sharing of resources with other CSDNs.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 23:41:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Broberg", "James", "" ], [ "Tari", "Zahir", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0609028
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic Mathematics
5 Pages: Proceedings of SPIE -- Volume 5837 VLSI Circuits and Systems II, Jose F. Lopez, Francisco V. Fernandez, Jose Maria Lopez-Villegas, Jose M. de la Rosa, Editors, June 2005, pp. 888-892
null
null
null
cs.AR
null
This paper proposes the hardware implementation of RSA encryption/decryption algorithm using the algorithms of Ancient Indian Vedic Mathematics that have been modified to improve performance. The recently proposed hierarchical overlay multiplier architecture is used in the RSA circuitry for multiplication operation. The most significant aspect of the paper is the development of a division architecture based on Straight Division algorithm of Ancient Indian Vedic Mathematics and embedding it in RSA encryption/decryption circuitry for improved efficiency. The coding is done in Verilog HDL and the FPGA synthesis is done using Xilinx Spartan library. The results show that RSA circuitry implemented using Vedic division and multiplication is efficient in terms of area/speed compared to its implementation using conventional multiplication and division architectures
[ { "version": "v1", "created": "Thu, 7 Sep 2006 14:18:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0609029
Himanshu Thapliyal
Himanshu Thapliyal and Hamid R. Arabnia
Reversible Programmable Logic Array (RPLA) using Fredkin & Feynman Gates for Industrial Electronics and Applications
Published in Proceedings of the International Conference on Embedded Systems and Applications(ESA'06),Las Vegas, U.S.A, June 2006(CSREA Press)
null
null
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. In this paper, the authors have proposed reversible programmable logic array (RPLA) architecture using reversible Fredkin and Feynman gates. The proposed RPLA has n inputs and m outputs and can realize m functions of n variables. In order to demonstrate the design of RPLA, a 3 input RPLA is designed which can perform any 28 functions using the combination of 8 min terms (23). Furthermore, the application of the designed 3 input RPLA is shown by implementing the full adder and full subtractor functions through it.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 14:25:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0609030
Kaibin Huang
Kaibin Huang, Robert W. Heath, Jr and Jeffrey G. Andrews
Space Division Multiple Access with a Sum Feedback Rate Constraint
29 pages; submitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2007.894245
null
cs.IT cs.NI math.IT
null
On a multi-antenna broadcast channel, simultaneous transmission to multiple users by joint beamforming and scheduling is capable of achieving high throughput, which grows double logarithmically with the number of users. The sum rate for channel state information (CSI) feedback, however, increases linearly with the number of users, reducing the effective uplink capacity. To address this problem, a novel space division multiple access (SDMA) design is proposed, where the sum feedback rate is upper-bounded by a constant. This design consists of algorithms for CSI quantization, threshold based CSI feedback, and joint beamforming and scheduling. The key feature of the proposed approach is the use of feedback thresholds to select feedback users with large channel gains and small CSI quantization errors such that the sum feedback rate constraint is satisfied. Despite this constraint, the proposed SDMA design is shown to achieve a sum capacity growth rate close to the optimal one. Moreover, the feedback overflow probability for this design is found to decrease exponentially with the difference between the allowable and the average sum feedback rates. Numerical results show that the proposed SDMA design is capable of attaining higher sum capacities than existing ones, even though the sum feedback rate is bounded.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 15:08:30 GMT" } ]
2012-08-27T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Heath,", "Robert W.", "Jr" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609031
Sreyash Kenkre
Sreyash Kenkre and Sundar Vishwanathan
Approximation Algorithms for the Bipartite Multi-cut Problem
11 pages
null
null
null
cs.CC cs.DS
null
We introduce the {\it Bipartite Multi-cut} problem. This is a generalization of the {\it st-Min-cut} problem, is similar to the {\it Multi-cut} problem (except for more stringent requirements) and also turns out to be an immediate generalization of the {\it Min UnCut} problem. We prove that this problem is {\bf NP}-hard and then present LP and SDP based approximation algorithms. While the LP algorithm is based on the Garg-Vazirani-Yannakakis algorithm for {\it Multi-cut}, the SDP algorithm uses the {\it Structure Theorem} of $\ell_2^2$ Metrics.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 18:10:39 GMT" }, { "version": "v2", "created": "Tue, 26 Sep 2006 06:46:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenkre", "Sreyash", "" ], [ "Vishwanathan", "Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0609032
Sumit Ganguly
Sumit Ganguly and Anirban Majumder
CR-precis: A deterministic summary structure for update data streams
11 pages
null
null
IIT Kanpur, July 1 2006
cs.DS
null
We present the \crprecis structure, that is a general-purpose, deterministic and sub-linear data structure for summarizing \emph{update} data streams. The \crprecis structure yields the \emph{first deterministic sub-linear space/time algorithms for update streams} for answering a variety of fundamental stream queries, such as, (a) point queries, (b) range queries, (c) finding approximate frequent items, (d) finding approximate quantiles, (e) finding approximate hierarchical heavy hitters, (f) estimating inner-products, (g) near-optimal $B$-bucket histograms, etc..
[ { "version": "v1", "created": "Thu, 7 Sep 2006 19:21:01 GMT" }, { "version": "v2", "created": "Sun, 17 Sep 2006 05:51:43 GMT" }, { "version": "v3", "created": "Tue, 10 Oct 2006 07:37:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Sumit", "" ], [ "Majumder", "Anirban", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0609033
David Eppstein
Michael B. Dillencourt and David Eppstein and Michael T. Goodrich
Choosing Colors for Geometric Graphs via Color Space Embeddings
12 pages, 4 figures. To appear at 14th Int. Symp. Graph Drawing, 2006
null
null
null
cs.CG
null
Graph drawing research traditionally focuses on producing geometric embeddings of graphs satisfying various aesthetic constraints. After the geometric embedding is specified, there is an additional step that is often overlooked or ignored: assigning display colors to the graph's vertices. We study the additional aesthetic criterion of assigning distinct colors to vertices of a geometric graph so that the colors assigned to adjacent vertices are as different from one another as possible. We formulate this as a problem involving perceptual metrics in color space and we develop algorithms for solving this problem by embedding the graph in color space. We also present an application of this work to a distributed load-balancing visualization problem.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 20:39:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Dillencourt", "Michael B.", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0609034
Marko Antonio Rodriguez
Marko A. Rodriguez
Social Decision Making with Multi-Relational Networks and Grammar-Based Particle Swarms
null
Hawaii International Conference on Systems Science (HICSS), pages 39-49, Waikoloa, Hawaii, IEEE Computer Society, ISSN: 1530-1605, January 2007
10.1109/HICSS.2007.487
LA-UR-06-2139
cs.CY cs.HC
null
Social decision support systems are able to aggregate the local perspectives of a diverse group of individuals into a global social decision. This paper presents a multi-relational network ontology and grammar-based particle swarm algorithm capable of aggregating the decisions of millions of individuals. This framework supports a diverse problem space and a broad range of vote aggregation algorithms. These algorithms account for individual expertise and representation across different domains of the group problem space. Individuals are able to pose and categorize problems, generate potential solutions, choose trusted representatives, and vote for particular solutions. Ultimately, via a social decision making algorithm, the system aggregates all the individual votes into a single collective decision.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 20:40:39 GMT" } ]
2009-01-07T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0609035
Joseph Y. Halpern
Joseph Y. Halpern and Vanessa Teague
Rational Secret Sharing and Multiparty Computation: Extended Abstract
Appears in STOC, 2004
null
null
null
cs.GT cs.CR cs.DC
null
We consider the problems of secret sharing and multiparty computation, assuming that agents prefer to get the secret (resp., function value) to not getting it, and secondarily, prefer that as few as possible of the other agents get it. We show that, under these assumptions, neither secret sharing nor multiparty function computation is possible using a mechanism that has a fixed running time. However, we show that both are possible using randomized mechanisms with constant expected running time.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 21:48:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Teague", "Vanessa", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0609036
Himanshu Thapliyal
Himanshu Thapliyal, Hamid R. Arabnia and M.B Srinivas
Reduced Area Low Power High Throughput BCD Adders for IEEE 754r Format
6 Pages;Published in Proceedings of the 11th International CSI Computer Conference (CSICC'06), Tehran, Jan 24-26, 2006, pp.59-64
null
null
null
cs.AR
null
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. Firstly, this paper proposes novel two transistor AND and OR gates. The proposed AND gate has no power supply, thus it can be referred as the Powerless AND gate. Similarly, the proposed two transistor OR gate has no ground and can be referred as Groundless OR. Secondly for IEEE 754r format, two novel BCD adders called carry skip and carry look-ahead BCD adders are also proposed in this paper. In order to design the carry look-ahead BCD adder, a novel 4 bit carry look-ahead adder called NCLA is proposed which forms the basic building block of the proposed carry look-ahead BCD adder. Finally, the proposed two transistors AND and OR gates are used to provide the optimized small area low power high throughput circuitries of the proposed BCD adders.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 05:36:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ], [ "Srinivas", "M. B", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0609037
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA)
(HO)RPO Revisited
null
null
null
null
cs.LO
null
The notion of computability closure has been introduced for proving the termination of the combination of higher-order rewriting and beta-reduction. It is also used for strengthening the higher-order recursive path ordering. In the present paper, we study in more details the relations between the computability closure and the (higher-order) recursive path ordering. We show that the first-order recursive path ordering is equal to an ordering naturally defined from the computability closure. In the higher-order case, we get an ordering containing the higher-order recursive path ordering whose well-foundedness relies on the correctness of the computability closure. This provides a simple way to extend the higher-order recursive path ordering to richer type systems.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 07:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609038
Bartek Blaszczyszyn
Bartlomiej Bartek Blaszczyszyn (INRIA Rocquencourt), Bozidar Radunovic (INRIA Rocquencourt)
On Performance of Event-to-Sink Transport in Transmit-Only Sensor Networks
null
Proc. of IEEE Infocom 2008
10.1109/INFOCOM.2008.176
null
cs.NI math.PR
null
We consider a hybrid wireless sensor network with regular and transmit-only sensors. The transmit-only sensors do not have receiver circuit, hence are cheaper and less energy consuming, but their transmissions cannot be coordinated. Regular sensors, also called cluster-heads, are responsible for receiving information from transmit-only sensors and forwarding it to sinks. The main goal of such a hybrid network is to reduce the cost of deployment while achieving some performance constraints (minimum coverage, sensing rate, etc). In this paper we are interested in the communication between transmit-only sensors and cluster-heads. We develop a detailed analytical model of the physical and MAC layer using tools from queuing theory and stochastic geometry. (The MAC model, that we call Erlang's loss model with interference, might be of independent interest as adequate for any non-slotted; i.e., unsynchronized, wireless communication channel.) We give an explicit formula for the frequency of successful packet reception by a cluster-head, given sensors' locations. We further define packet admission policies at a cluster-head, and we calculate the optimal policies for different performance criteria. Finally we show that the proposed hybrid network, using the optimal policies, can achieve substantial cost savings as compared to conventional architectures.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 07:47:24 GMT" } ]
2013-02-05T00:00:00
[ [ "Blaszczyszyn", "Bartlomiej Bartek", "", "INRIA Rocquencourt" ], [ "Radunovic", "Bozidar", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0609039
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud (LIX), Albert Rubio
Higher-Order Termination: from Kruskal to Computability
null
Dans 13th International Conference on Logic for Programming, Artificial Intelligence and Reasoning - LPAR 2006 4246 (2006)
10.1007/11916277_1
null
cs.LO
null
Termination is a major question in both logic and computer science. In logic, termination is at the heart of proof theory where it is usually called strong normalization (of cut elimination). In computer science, termination has always been an important issue for showing programs correct. In the early days of logic, strong normalization was usually shown by assigning ordinals to expressions in such a way that eliminating a cut would yield an expression with a smaller ordinal. In the early days of verification, computer scientists used similar ideas, interpreting the arguments of a program call by a natural number, such as their size. Showing the size of the arguments to decrease for each recursive call gives a termination proof of the program, which is however rather weak since it can only yield quite small ordinals. In the sixties, Tait invented a new method for showing cut elimination of natural deduction, based on a predicate over the set of terms, such that the membership of an expression to the predicate implied the strong normalization property for that expression. The predicate being defined by induction on types, or even as a fixpoint, this method could yield much larger ordinals. Later generalized by Girard under the name of reducibility or computability candidates, it showed very effective in proving the strong normalization property of typed lambda-calculi...
[ { "version": "v1", "created": "Fri, 8 Sep 2006 07:48:08 GMT" }, { "version": "v2", "created": "Fri, 5 Jan 2007 13:21:49 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ], [ "Jouannaud", "Jean-Pierre", "", "LIX" ], [ "Rubio", "Albert", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609040
Stefan Milius
Jiri Adamek, Stefan Milius, Jiri Velebil
Elgot Algebras
null
Logical Methods in Computer Science, Volume 2, Issue 5 (November 8, 2006) lmcs:2235
10.2168/LMCS-2(5:4)2006
null
cs.LO math.CT
null
Denotational semantics can be based on algebras with additional structure (order, metric, etc.) which makes it possible to interpret recursive specifications. It was the idea of Elgot to base denotational semantics on iterative theories instead, i.e., theories in which abstract recursive specifications are required to have unique solutions. Later Bloom and Esik studied iteration theories and iteration algebras in which a specified solution has to obey certain axioms. We propose so-called Elgot algebras as a convenient structure for semantics in the present paper. An Elgot algebra is an algebra with a specified solution for every system of flat recursive equations. That specification satisfies two simple and well motivated axioms: functoriality (stating that solutions are stable under renaming of recursion variables) and compositionality (stating how to perform simultaneous recursion). These two axioms stem canonically from Elgot's iterative theories: We prove that the category of Elgot algebras is the Eilenberg-Moore category of the monad given by a free iterative theory.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 08:51:33 GMT" }, { "version": "v2", "created": "Wed, 8 Nov 2006 16:48:49 GMT" } ]
2017-01-11T00:00:00
[ [ "Adamek", "Jiri", "" ], [ "Milius", "Stefan", "" ], [ "Velebil", "Jiri", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
cs/0609041
Julien Hendrickx
Julien M. Hendrickx, Baris Fidan, Changbin Yu, Brian D.O. Anderson and Vincent D. Blondel
Primitive operations for the construction and reorganization of minimally persistent formations
26 pages, 31 .eps files for the figures
null
null
CESAME research report 2006.62
cs.MA
null
In this paper, we study the construction and transformation of two-dimensional persistent graphs. Persistence is a generalization to directed graphs of the undirected notion of rigidity. In the context of moving autonomous agent formations, persistence characterizes the efficacy of a directed structure of unilateral distances constraints seeking to preserve a formation shape. Analogously to the powerful results about Henneberg sequences in minimal rigidity theory, we propose different types of directed graph operations allowing one to sequentially build any minimally persistent graph (i.e. persistent graph with a minimal number of edges for a given number of vertices), each intermediate graph being also minimally persistent. We also consider the more generic problem of obtaining one minimally persistent graph from another, which corresponds to the on-line reorganization of an autonomous agent formation. We prove that we can obtain any minimally persistent formation from any other one by a sequence of elementary local operations such that minimal persistence is preserved throughout the reorganization process.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 10:12:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Hendrickx", "Julien M.", "" ], [ "Fidan", "Baris", "" ], [ "Yu", "Changbin", "" ], [ "Anderson", "Brian D. O.", "" ], [ "Blondel", "Vincent D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0609042
Jacob Binia
Jacob Binia
On Divergence-Power Inequalities
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2006.890715
null
cs.IT math.IT
null
Expressions for (EPI Shannon type) Divergence-Power Inequalities (DPI) in two cases (time-discrete and band-limited time-continuous) of stationary random processes are given. The new expressions connect the divergence rate of the sum of independent processes, the individual divergence rate of each process, and their power spectral densities. All divergences are between a process and a Gaussian process with same second order statistics, and are assumed to be finite. A new proof of the Shannon entropy-power inequality EPI, based on the relationship between divergence and causal minimum mean-square error (CMMSE) in Gaussian channels with large signal-to-noise ratio, is also shown.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 10:34:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Binia", "Jacob", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609043
Francoise Gayral
Fran\c{c}oise Gayral (LIPN), Daniel Kayser (LIPN), Fran\c{c}ois L\'evy (LIPN)
Challenging the principle of compositionality in interpreting natural language texts
null
conference on Compositionality, Concepts and Cognition, Allemagne (2004)
null
null
cs.CL
null
The paper aims at emphasizing that, even relaxed, the hypothesis of compositionality has to face many problems when used for interpreting natural language texts. Rather than fixing these problems within the compositional framework, we believe that a more radical change is necessary, and propose another approach.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 14:01:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayral", "Françoise", "", "LIPN" ], [ "Kayser", "Daniel", "", "LIPN" ], [ "Lévy", "François", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0609044
Francoise Gayral
Fran\c{c}oise Gayral (LIPN), Daniel Kayser (LIPN), Fran\c{c}ois L\'evy (LIPN)
The role of time in considering collections
null
Journ\'{e}es de S\'{e}mantique et Mod\'{e}lisation, France (2004)
null
null
cs.CL
null
The paper concerns the understanding of plurals in the framework of Artificial Intelligence and emphasizes the role of time. The construction of collection(s) and their evolution across time is often crucial and has to be accounted for. The paper contrasts a "de dicto" collection where the collection can be considered as persisting over these situations even if its members change with a "de re" collection whose composition does not vary through time. It expresses different criteria of choice between the two interpretations (de re and de dicto) depending on the context of enunciation.
[ { "version": "v1", "created": "Fri, 8 Sep 2006 14:11:50 GMT" } ]
2016-08-16T00:00:00
[ [ "Gayral", "Françoise", "", "LIPN" ], [ "Kayser", "Daniel", "", "LIPN" ], [ "Lévy", "François", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0609045
Vladimir Vovk
Vladimir Vovk
Metric entropy in competitive on-line prediction
41 pages
null
null
null
cs.LG
null
Competitive on-line prediction (also known as universal prediction of individual sequences) is a strand of learning theory avoiding making any stochastic assumptions about the way the observations are generated. The predictor's goal is to compete with a benchmark class of prediction rules, which is often a proper Banach function space. Metric entropy provides a unifying framework for competitive on-line prediction: the numerous known upper bounds on the metric entropy of various compact sets in function spaces readily imply bounds on the performance of on-line prediction strategies. This paper discusses strengths and limitations of the direct approach to competitive on-line prediction via metric entropy, including comparisons to other approaches.
[ { "version": "v1", "created": "Sat, 9 Sep 2006 11:31:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0609046
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Exhausting Error-Prone Patterns in LDPC Codes
submitted to IEEE Trans. Information Theory
null
null
null
cs.IT cs.DS math.IT
null
It is proved in this work that exhaustively determining bad patterns in arbitrary, finite low-density parity-check (LDPC) codes, including stopping sets for binary erasure channels (BECs) and trapping sets (also known as near-codewords) for general memoryless symmetric channels, is an NP-complete problem, and efficient algorithms are provided for codes of practical short lengths n~=500. By exploiting the sparse connectivity of LDPC codes, the stopping sets of size <=13 and the trapping sets of size <=11 can be efficiently exhaustively determined for the first time, and the resulting exhaustive list is of great importance for code analysis and finite code optimization. The featured tree-based narrowing search distinguishes this algorithm from existing ones for which inexhaustive methods are employed. One important byproduct is a pair of upper bounds on the bit-error rate (BER) & frame-error rate (FER) iterative decoding performance of arbitrary codes over BECs that can be evaluated for any value of the erasure probability, including both the waterfall and the error floor regions. The tightness of these upper bounds and the exhaustion capability of the proposed algorithm are proved when combining an optimal leaf-finding module with the tree-based search. These upper bounds also provide a worst-case-performance guarantee which is crucial to optimizing LDPC codes for extremely low error rate applications, e.g., optical/satellite communications. Extensive numerical experiments are conducted that include both randomly and algebraically constructed LDPC codes, the results of which demonstrate the superior efficiency of the exhaustion algorithm and its significant value for finite length code optimization.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 00:50:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609047
S. M. Nazrul Alam
S. M. Nazrul Alam and Zygmunt J. Haas
Topology Control and Network Lifetime in Three-Dimensional Wireless Sensor Networks
Submitted for publication
null
null
null
cs.NI cs.CG
null
Coverage and connectivity issues of three-dimensional (3D) networks are addressed in [2], but that work assumes that a node can be placed at any arbitrary location. In this work, we drop that assumption and rather assume that nodes are uniformly and densely deployed in a 3D space. We want to devise a mechanism that keeps some nodes active and puts other nodes into sleep so that the number of active nodes at a time is minimized (and thus network life time is maximized), while maintaining full coverage and connectivity. One simple way to do that is to partition the 3D space into cells, and only one node in each cell remains active at a time. Our results show that the number of active nodes can be minimized if the shape of each cell is a truncated octahedron. It requires the sensing range to be at least 0.542326 times the transmission radius. This value is 0.5, 0.53452 and 0.5 for cube, hexagonal prism, and rhombic dodecahedron, respectively. However, at a time the number of active nodes for cube, hexagonal prism and rhombic dodecahedron model is respectively 2.372239, 1.82615 and 1.49468 times of that of truncated octahedron model. So clearly truncated octahedron model has the highest network lifetime. We also provide a distributed topology control algorithm that can be used by each sensor node to determine its cell id using a constant number of local arithmetic operations provided that the sensor node knows its location. We also validate our results by simulation.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 02:01:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Alam", "S. M. Nazrul", "" ], [ "Haas", "Zygmunt J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0609048
Pascal Weil
Pascal Weil (LaBRI)
On the logical definability of certain graph and poset languages
null
Journal of Automata, Languages and Computation 9 (2004) 147-165
null
null
cs.LO
null
We show that it is equivalent, for certain sets of finite graphs, to be definable in CMS (counting monadic second-order logic, a natural extension of monadic second-order logic), and to be recognizable in an algebraic framework induced by the notion of modular decomposition of a finite graph. More precisely, we consider the set $F\_\infty$ of composition operations on graphs which occur in the modular decomposition of finite graphs. If $F$ is a subset of $F\_{\infty}$, we say that a graph is an $\calF$-graph if it can be decomposed using only operations in $F$. A set of $F$-graphs is recognizable if it is a union of classes in a finite-index equivalence relation which is preserved by the operations in $F$. We show that if $F$ is finite and its elements enjoy only a limited amount of commutativity -- a property which we call weak rigidity, then recognizability is equivalent to CMS-definability. This requirement is weak enough to be satisfied whenever all $F$-graphs are posets, that is, transitive dags. In particular, our result generalizes Kuske's recent result on series-parallel poset languages.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 08:25:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Weil", "Pascal", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609049
Asaf Cohen
Asaf Cohen, Neri Merhav and Tsachy Weissman
Scanning and Sequential Decision Making for Multi-Dimensional Data - Part I: the Noiseless Case
46 pages, 2 figures. Revised version: title changed, section 1 revised, section 3.1 added, a few minor/technical corrections made
null
null
null
cs.IT cs.LG math.IT
null
We investigate the problem of scanning and prediction ("scandiction", for short) of multidimensional data arrays. This problem arises in several aspects of image and video processing, such as predictive coding, for example, where an image is compressed by coding the error sequence resulting from scandicting it. Thus, it is natural to ask what is the optimal method to scan and predict a given image, what is the resulting minimum prediction loss, and whether there exist specific scandiction schemes which are universal in some sense. Specifically, we investigate the following problems: First, modeling the data array as a random field, we wish to examine whether there exists a scandiction scheme which is independent of the field's distribution, yet asymptotically achieves the same performance as if this distribution was known. This question is answered in the affirmative for the set of all spatially stationary random fields and under mild conditions on the loss function. We then discuss the scenario where a non-optimal scanning order is used, yet accompanied by an optimal predictor, and derive bounds on the excess loss compared to optimal scanning and prediction. This paper is the first part of a two-part paper on sequential decision making for multi-dimensional data. It deals with clean, noiseless data arrays. The second part deals with noisy data arrays, namely, with the case where the decision maker observes only a noisy version of the data, yet it is judged with respect to the original, clean data.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 09:35:57 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 07:34:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Cohen", "Asaf", "" ], [ "Merhav", "Neri", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609050
Tomaso Erseghe
G. Cariolaro, T. Erseghe, N. Laurenti
Exact Spectral Analysis of Single-h and Multi-h CPM Signals through PAM decomposition and Matrix Series Evaluation
31 pages, 10 figures
IEEE Transactions on Communications 59 (7), 1893-1903
10.1109/TCOMM.2011.050911.100631
null
cs.IT math.IT
null
In this paper we address the problem of closed-form spectral evaluation of CPM. We show that the multi-h CPM signal can be conveniently generated by a PTI SM. The output is governed by a Markov chain with the unusual peculiarity of being cyclostationary and reducible; this holds also in the single-h context. Judicious reinterpretation of the result leads to a formalization through a stationary and irreducible Markov chain, whose spectral evaluation is known in closed-form from the literature. Two are the major outcomes of this paper. First, unlike the literature, we obtain a PSD in true closed-form. Second, we give novel insights into the CPM format.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 09:38:31 GMT" } ]
2015-05-19T00:00:00
[ [ "Cariolaro", "G.", "" ], [ "Erseghe", "T.", "" ], [ "Laurenti", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609051
Ralf Steinberger
Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Irina Temnikova, Anna Widiger, Wajdi Zaghouani, Jan Zizka
Multilingual person name recognition and transliteration
Explains the technology behind the JRC's NewsExplorer application, which is freely accessible at http://press.jrc.it/NewsExplorer
Journal CORELA - Cognition, Representation, Langage. Numeros speciaux, Le traitement lexicographique des noms propres. December 2005. ISSN 1638-5748
null
null
cs.CL cs.IR
null
We present an exploratory tool that extracts person names from multilingual news collections, matches name variants referring to the same person, and infers relationships between people based on the co-occurrence of their names in related news. A novel feature is the matching of name variants across languages and writing systems, including names written with the Greek, Cyrillic and Arabic writing system. Due to our highly multilingual setting, we use an internal standard representation for name representation and matching, instead of adopting the traditional bilingual approach to transliteration. This work is part of the news analysis system NewsExplorer that clusters an average of 25,000 news articles per day to detect related news within the same and across different languages.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 11:08:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouliquen", "Bruno", "" ], [ "Steinberger", "Ralf", "" ], [ "Ignat", "Camelia", "" ], [ "Temnikova", "Irina", "" ], [ "Widiger", "Anna", "" ], [ "Zaghouani", "Wajdi", "" ], [ "Zizka", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609052
Frank Wolter
Frank Wolter and Michael Zakharyaschev
Undecidability of the unification and admissibility problems for modal and description logics
null
null
null
null
cs.LO cs.AI
null
We show that the unification problem `is there a substitution instance of a given formula that is provable in a given logic?' is undecidable for basic modal logics K and K4 extended with the universal modality. It follows that the admissibility problem for inference rules is undecidable for these logics as well. These are the first examples of standard decidable modal logics for which the unification and admissibility problems are undecidable. We also prove undecidability of the unification and admissibility problems for K and K4 with at least two modal operators and nominals (instead of the universal modality), thereby showing that these problems are undecidable for basic hybrid logics. Recently, unification has been introduced as an important reasoning service for description logics. The undecidability proof for K with nominals can be used to show the undecidability of unification for boolean description logics with nominals (such as ALCO and SHIQO). The undecidability proof for K with the universal modality can be used to show that the unification problem relative to role boxes is undecidable for Boolean description logic with transitive roles, inverse roles, and role hierarchies (such as SHI and SHIQ).
[ { "version": "v1", "created": "Mon, 11 Sep 2006 11:41:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolter", "Frank", "" ], [ "Zakharyaschev", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0609053
Ralf Steinberger
Ralf Steinberger, Bruno Pouliquen, Camelia Ignat (European Commission - Joint Research Centre)
Navigating multilingual news collections using automatically extracted information
This paper describes the main functionality of the JRC's fully-automatic news analysis system NewsExplorer, which is freely accessible in currently thirteen languages at http://press.jrc.it/NewsExplorer/ . 8 pages
Proceedings of the 27th International Conference 'Information Technology Interfaces' (ITI'2005). Cavtat / Dubrovnik
null
null
cs.CL cs.IR
null
We are presenting a text analysis tool set that allows analysts in various fields to sieve through large collections of multilingual news items quickly and to find information that is of relevance to them. For a given document collection, the tool set automatically clusters the texts into groups of similar articles, extracts names of places, people and organisations, lists the user-defined specialist terms found, links clusters and entities, and generates hyperlinks. Through its daily news analysis operating on thousands of articles per day, the tool also learns relationships between people and other entities. The fully functional prototype system allows users to explore and navigate multilingual document collections across languages and time.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 11:54:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinberger", "Ralf", "", "European Commission\n - Joint Research Centre" ], [ "Pouliquen", "Bruno", "", "European Commission\n - Joint Research Centre" ], [ "Ignat", "Camelia", "", "European Commission\n - Joint Research Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609054
Zhihang Yi
Zhihang Yi and Il-Min Kim
High Data-Rate Single-Symbol ML Decodable Distributed STBCs for Cooperative Networks
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High data-rate Distributed Orthogonal Space-Time Block Codes (DOSTBCs) which achieve the single-symbol decodability and full diversity order are proposed in this paper. An upper bound of the data-rate of the DOSTBC is derived and it is approximately twice larger than that of the conventional repetition-based cooperative strategy. In order to facilitate the systematic constructions of the DOSTBCs achieving the upper bound of the data-rate, some special DOSTBCs, which have diagonal noise covariance matrices at the destination terminal, are investigated. These codes are referred to as the row-monomial DOSTBCs. An upper bound of the data-rate of the row-monomial DOSTBC is derived and it is equal to or slightly smaller than that of the DOSTBC. Lastly, the systematic construction methods of the row-monomial DOSTBCs achieving the upper bound of the data-rate are presented.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 15:37:09 GMT" }, { "version": "v2", "created": "Mon, 10 Aug 2009 14:00:46 GMT" } ]
2009-08-10T00:00:00
[ [ "Yi", "Zhihang", "" ], [ "Kim", "Il-Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609055
Tsachy Weissman
Nuno C Martins, Tsachy Weissman
Coding for Additive White Noise Channels with Feedback Corrupted by Uniform Quantization or Bounded Noise
null
null
null
null
cs.IT math.IT
null
We present simple coding strategies, which are variants of the Schalkwijk-Kailath scheme, for communicating reliably over additive white noise channels in the presence of corrupted feedback. More specifically, we consider a framework comprising an additive white forward channel and a backward link which is used for feedback. We consider two types of corruption mechanisms in the backward link. The first is quantization noise, i.e., the encoder receives the quantized values of the past outputs of the forward channel. The quantization is uniform, memoryless and time invariant (that is, symbol-by-symbol scalar quantization), with bounded quantization error. The second corruption mechanism is an arbitrarily distributed additive bounded noise in the backward link. Here we allow symbol-by-symbol encoding at the input to the backward channel. We propose simple explicit schemes that guarantee positive information rate, in bits per channel use, with positive error exponent. If the forward channel is additive white Gaussian then our schemes achieve capacity, in the limit of diminishing amplitude of the noise components at the backward link, while guaranteeing that the probability of error converges to zero as a doubly exponential function of the block length. Furthermore, if the forward channel is additive white Gaussian and the backward link consists of an additive bounded noise channel, with signal-to-noise ratio (SNR) constrained symbol-by-symbol encoding, then our schemes are also capacity-achieving in the limit of high SNR.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 23:28:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Martins", "Nuno C", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609056
Leonid Vaserstein
L. N. Vaserstein
Matrix Games, Linear Programming, and Linear Approximation
5 pages
null
null
null
cs.GT cs.AI
null
The following four classes of computational problems are equivalent: solving matrix games, solving linear programs, best $l^{\infty}$ linear approximation, best $l^1$ linear approximation.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 00:10:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Vaserstein", "L. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0609057
Yi Deng
Yi Deng, Giovanni Di Crescenzo and Dongdai Lin
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
null
null
null
null
cs.CR
null
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. In an effort to reduce the setup assumptions required for efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks, we consider a model, which we call the Authenticated Public-Key (APK) model. The APK model seems to significantly reduce the setup assumptions made by the CRS model (as no trusted party or honest execution of a centralized algorithm are required), and can be seen as a slightly stronger variation of the Bare Public-Key (BPK) model from \cite{CGGM,MR}, and a weaker variation of the registered public-key model used in \cite{BCNP}. We then define and study man-in-the-middle attacks in the APK model. Our main result is a constant-round concurrent non-malleable zero-knowledge argument of knowledge for any polynomial-time relation (associated to a language in $\mathcal{NP}$), under the (minimal) assumption of the existence of a one-way function family. Furthermore,We show time-efficient instantiations of our protocol based on known number-theoretic assumptions. We also note a negative result with respect to further reducing the setup assumptions of our protocol to those in the (unauthenticated) BPK model, by showing that concurrently non-malleable zero-knowledge arguments of knowledge in the BPK model are only possible for trivial languages.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 06:20:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Deng", "Yi", "" ], [ "Di Crescenzo", "Giovanni", "" ], [ "Lin", "Dongdai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0609058
Ralf Steinberger
Ralf Steinberger, Bruno Pouliquen, Anna Widiger, Camelia Ignat, Tomaz Erjavec, Dan Tufis, Daniel Varga
The JRC-Acquis: A multilingual aligned parallel corpus with 20+ languages
A multilingual textual resource with meta-data freely available for download at http://langtech.jrc.it/JRC-Acquis.html
Proceedings of the 5th International Conference on Language Resources and Evaluation (LREC'2006), pp. 2142-2147. Genoa, Italy, 24-26 May 2006
null
null
cs.CL
null
We present a new, unique and freely available parallel corpus containing European Union (EU) documents of mostly legal nature. It is available in all 20 official EUanguages, with additional documents being available in the languages of the EU candidate countries. The corpus consists of almost 8,000 documents per language, with an average size of nearly 9 million words per language. Pair-wise paragraph alignment information produced by two different aligners (Vanilla and HunAlign) is available for all 190+ language pair combinations. Most texts have been manually classified according to the EUROVOC subject domains so that the collection can also be used to train and test multi-label classification algorithms and keyword-assignment software. The corpus is encoded in XML, according to the Text Encoding Initiative Guidelines. Due to the large number of parallel texts in many languages, the JRC-Acquis is particularly suitable to carry out all types of cross-language research, as well as to test and benchmark text analysis software across different languages (for instance for alignment, sentence splitting and term extraction).
[ { "version": "v1", "created": "Tue, 12 Sep 2006 07:10:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinberger", "Ralf", "" ], [ "Pouliquen", "Bruno", "" ], [ "Widiger", "Anna", "" ], [ "Ignat", "Camelia", "" ], [ "Erjavec", "Tomaz", "" ], [ "Tufis", "Dan", "" ], [ "Varga", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0609059
Ralf Steinberger
Bruno Pouliquen, Ralf Steinberger, Camelia Ignat
Automatic annotation of multilingual text collections with a conceptual thesaurus
10 pages
Proceedings of the Workshop 'Ontologies and Information Extraction' at the Summer School 'The Semantic Web and Language Technology - Its Potential and Practicalities' (EUROLAN'2003), pp 9-28. Bucharest, Romania, 28 July - 8 August 2003
null
null
cs.CL cs.IR
null
Automatic annotation of documents with controlled vocabulary terms (descriptors) from a conceptual thesaurus is not only useful for document indexing and retrieval. The mapping of texts onto the same thesaurus furthermore allows to establish links between similar documents. This is also a substantial requirement of the Semantic Web. This paper presents an almost language-independent system that maps documents written in different languages onto the same multilingual conceptual thesaurus, EUROVOC. Conceptual thesauri differ from Natural Language Thesauri in that they consist of relatively small controlled lists of words or phrases with a rather abstract meaning. To automatically identify which thesaurus descriptors describe the contents of a document best, we developed a statistical, associative system that is trained on texts that have previously been indexed manually. In addition to describing the large number of empirically optimised parameters of the fully functional application, we present the performance of the software according to a human evaluation by professional indexers.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 07:24:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouliquen", "Bruno", "" ], [ "Steinberger", "Ralf", "" ], [ "Ignat", "Camelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609060
Ralf Steinberger
Bruno Pouliquen, Ralf Steinberger, Camelia Ignat
Automatic Identification of Document Translations in Large Multilingual Document Collections
This technology is used daily to link related news items across languages in the multilingual news analysis system NewsExplorer, which is freely accessible at http://press.jrc.it/NewsExplorer . 8 pages
Proceedings of the International Conference 'Recent Advances in Natural Language Processing' (RANLP'2003), pp. 401-408. Borovets, Bulgaria, 10 - 12 September 2003
null
null
cs.CL cs.IR
null
Texts and their translations are a rich linguistic resource that can be used to train and test statistics-based Machine Translation systems and many other applications. In this paper, we present a working system that can identify translations and other very similar documents among a large number of candidates, by representing the document contents with a vector of thesaurus terms from a multilingual thesaurus, and by then measuring the semantic similarity between the vectors. Tests on different text types have shown that the system can detect translations with over 96% precision in a large search space of 820 documents or more. The system was tuned to ignore language-specific similarities and to give similar documents in a second language the same similarity score as equivalent documents in the same language. The application can also be used to detect cross-lingual document plagiarism.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 08:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouliquen", "Bruno", "" ], [ "Steinberger", "Ralf", "" ], [ "Ignat", "Camelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609061
Ralf Steinberger
Ralf Steinberger (European Commission - Joint Research Centre)
Cross-lingual keyword assignment
Precursor paper to cs.CL/0609059. The automatic classification system described here has now matured and is in daily use for document indexing in a European parliament. See http://langtech.jrc.it/Eurovoc.html for more details. 8 pages
Proceedings of the XVII Conference of the Spanish Society for Natural Language Processing (SEPLN-2001). Procesamiento del Lenguaje Natural, Revista No. 27, pp. 273-280. Jaen, Spain, 12-14 September 2001. ISSN 1135-5948
null
null
cs.CL cs.IR
null
This paper presents a language-independent approach to controlled vocabulary keyword assignment using the EUROVOC thesaurus. Due to the multilingual nature of EUROVOC, the keywords for a document written in one language can be displayed in all eleven official European Union languages. The mapping of documents written in different languages to the same multilingual thesaurus furthermore allows cross-language document comparison. The assignment of the controlled vocabulary thesaurus descriptors is achieved by applying a statistical method that uses a collection of manually indexed documents to identify, for each thesaurus descriptor, a large number of lemmas that are statistically associated to the descriptor. These associated words are then used during the assignment procedure to identify a ranked list of those EUROVOC terms that are most likely to be good keywords for a given document. The paper also describes the challenges of this task and discusses the achieved results of the fully functional prototype.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 09:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinberger", "Ralf", "", "European Commission - Joint Research Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609062
James Cheney
James Cheney, Christian Urban
Nominal Logic Programming
46 pages; 19 page appendix; 13 figures. Revised journal submission as of July 23, 2007
ACM Transactions on Programming Languages and Systems 30(5):26, August 2008
10.1145/1387673.1387675
null
cs.PL cs.LO
null
Nominal logic is an extension of first-order logic which provides a simple foundation for formalizing and reasoning about abstract syntax modulo consistent renaming of bound names (that is, alpha-equivalence). This article investigates logic programming based on nominal logic. We describe some typical nominal logic programs, and develop the model-theoretic, proof-theoretic, and operational semantics of such programs. Besides being of interest for ensuring the correct behavior of implementations, these results provide a rigorous foundation for techniques for analysis and reasoning about nominal logic programs, as we illustrate via examples.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 09:32:23 GMT" }, { "version": "v2", "created": "Mon, 20 Aug 2007 13:36:28 GMT" } ]
2008-09-15T00:00:00
[ [ "Cheney", "James", "" ], [ "Urban", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609063
Ralf Steinberger
Camelia Ignat, Bruno Pouliquen, Antonio Ribeiro, Ralf Steinberger (European Commission - Joint Research Centre)
Extending an Information Extraction tool set to Central and Eastern European languages
7 pages
Proceedings of the International Workshop 'Information Extraction for Slavonic and other Central and Eastern European Languages' (IESL-2003), held at RANLP-2003, pp. 33-39. Borovets, Bulgaria, 8 - 9 September 2003
null
null
cs.CL cs.IR
null
In a highly multilingual and multicultural environment such as in the European Commission with soon over twenty official languages, there is an urgent need for text analysis tools that use minimal linguistic knowledge so that they can be adapted to many languages without much human effort. We are presenting two such Information Extraction tools that have already been adapted to various Western and Eastern European languages: one for the recognition of date expressions in text, and one for the detection of geographical place names and the visualisation of the results in geographical maps. An evaluation of the performance has produced very satisfying results.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 12:29:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Ignat", "Camelia", "", "European Commission - Joint Research Centre" ], [ "Pouliquen", "Bruno", "", "European Commission - Joint Research Centre" ], [ "Ribeiro", "Antonio", "", "European Commission - Joint Research Centre" ], [ "Steinberger", "Ralf", "", "European Commission - Joint Research Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609064
Ralf Steinberger
Ralf Steinberger, Bruno Pouliquen, Camelia Ignat (European Commission - Joint Research Centre)
Exploiting multilingual nomenclatures and language-independent text features as an interlingua for cross-lingual text analysis applications
The approach described in this paper is used to link related documents across languages in the multilingual news analysis system NewsExplorer, which is freely accessible at http://press.jrc.it/NewsExplorer . 11 pages
Information Society 2004 (IS-2004) - Proceedings B of the 7th International Multiconference - Language Technologies, pages 2-12. Ljubljana, Slovenia, 13-14 October 2004
null
null
cs.CL cs.IR
null
We are proposing a simple, but efficient basic approach for a number of multilingual and cross-lingual language technology applications that are not limited to the usual two or three languages, but that can be applied with relatively little effort to larger sets of languages. The approach consists of using existing multilingual linguistic resources such as thesauri, nomenclatures and gazetteers, as well as exploiting the existence of additional more or less language-independent text items such as dates, currency expressions, numbers, names and cognates. Mapping texts onto the multilingual resources and identifying word token links between texts in different languages are basic ingredients for applications such as cross-lingual document similarity calculation, multilingual clustering and categorisation, cross-lingual document retrieval, and tools to provide cross-lingual information access.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 12:43:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinberger", "Ralf", "", "European Commission\n - Joint Research Centre" ], [ "Pouliquen", "Bruno", "", "European Commission\n - Joint Research Centre" ], [ "Ignat", "Camelia", "", "European Commission\n - Joint Research Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609065
Ralf Steinberger
Bruno Pouliquen, Marco Kimler, Ralf Steinberger, Camelia Ignat, Tamara Oellinger, Ken Blackler, Flavio Fuart, Wajdi Zaghouani, Anna Widiger, Ann-Charlotte Forslund, Clive Best (European Commission - Joint Research Centre)
Geocoding multilingual texts: Recognition, disambiguation and visualisation
6 pages
Proceedings of the 5th International Conference on Language Resources and Evaluation (LREC-2006), pp. 53-58. Genoa, Italy, 24-26 May 2006
null
null
cs.CL cs.IR
null
We are presenting a method to recognise geographical references in free text. Our tool must work on various languages with a minimum of language-dependent resources, except a gazetteer. The main difficulty is to disambiguate these place names by distinguishing places from persons and by selecting the most likely place out of a list of homographic place names world-wide. The system uses a number of language-independent clues and heuristics to disambiguate place name homographs. The final aim is to index texts with the countries and cities they mention and to automatically visualise this information on geographical maps using various tools.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 12:57:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouliquen", "Bruno", "", "European Commission - Joint Research\n Centre" ], [ "Kimler", "Marco", "", "European Commission - Joint Research\n Centre" ], [ "Steinberger", "Ralf", "", "European Commission - Joint Research\n Centre" ], [ "Ignat", "Camelia", "", "European Commission - Joint Research\n Centre" ], [ "Oellinger", "Tamara", "", "European Commission - Joint Research\n Centre" ], [ "Blackler", "Ken", "", "European Commission - Joint Research\n Centre" ], [ "Fuart", "Flavio", "", "European Commission - Joint Research\n Centre" ], [ "Zaghouani", "Wajdi", "", "European Commission - Joint Research\n Centre" ], [ "Widiger", "Anna", "", "European Commission - Joint Research\n Centre" ], [ "Forslund", "Ann-Charlotte", "", "European Commission - Joint Research\n Centre" ], [ "Best", "Clive", "", "European Commission - Joint Research\n Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609066
Ralf Steinberger
Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Tamara Oellinger (European Commission - Joint Research Centre)
Building and displaying name relations using automatic unsupervised analysis of newspaper articles
Builds upon the recognition of person names described in paper cs.CL/0609051. Resulting person relations can be explored in the multilingual online application NewsExplorer at http://press.jrc.it/NewsExplorer . 12 pages
Proceedings of the 8th International Conference on the Statistical Analysis of Textual Data (JADT-2006). Besancon, 19-21 April 2006
null
null
cs.CL cs.IR
null
We present a tool that, from automatically recognised names, tries to infer inter-person relations in order to present associated people on maps. Based on an in-house Named Entity Recognition tool, applied on clusters of an average of 15,000 news articles per day, in 15 different languages, we build a knowledge base that allows extracting statistical co-occurrences of persons and visualising them on a per-person page or in various graphs.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 13:09:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouliquen", "Bruno", "", "European Commission - Joint Research Centre" ], [ "Steinberger", "Ralf", "", "European Commission - Joint Research Centre" ], [ "Ignat", "Camelia", "", "European Commission - Joint Research Centre" ], [ "Oellinger", "Tamara", "", "European Commission - Joint Research Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609067
Ralf Steinberger
Camelia Ignat, Bruno Pouliquen, Ralf Steinberger, Tomaz Erjavec (European Commission - Joint Research Centre)
A tool set for the quick and efficient exploration of large document collections
10 pages
Proceedings of the Symposium on Safeguards and Nuclear Material Management. 27th Annual Meeting of the European SAfeguards Research and Development Association (ESARDA-2005). London, UK, 10-12 May 2005
null
null
cs.CL cs.IR
null
We are presenting a set of multilingual text analysis tools that can help analysts in any field to explore large document collections quickly in order to determine whether the documents contain information of interest, and to find the relevant text passages. The automatic tool, which currently exists as a fully functional prototype, is expected to be particularly useful when users repeatedly have to sieve through large collections of documents such as those downloaded automatically from the internet. The proposed system takes a whole document collection as input. It first carries out some automatic analysis tasks (named entity recognition, geo-coding, clustering, term extraction), annotates the texts with the generated meta-information and stores the meta-information in a database. The system then generates a zoomable and hyperlinked geographic map enhanced with information on entities and terms found. When the system is used on a regular basis, it builds up a historical database that contains information on which names have been mentioned together with which other names or places, and users can query this database to retrieve information extracted in the past.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 13:30:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ignat", "Camelia", "", "European Commission - Joint Research Centre" ], [ "Pouliquen", "Bruno", "", "European Commission - Joint Research Centre" ], [ "Steinberger", "Ralf", "", "European Commission - Joint Research Centre" ], [ "Erjavec", "Tomaz", "", "European Commission - Joint Research Centre" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0609068
Jeremie Leguay M.
Vania Conan, Jeremie Leguay, Timur Friedman
The heterogeneity of inter-contact time distributions: its importance for routing in delay tolerant networks
6 pages
null
null
null
cs.NI
null
Prior work on routing in delay tolerant networks (DTNs) has commonly made the assumption that each pair of nodes shares the same inter-contact time distribution as every other pair. The main argument in this paper is that researchers should also be looking at heterogeneous inter-contact time distributions. We demonstrate the presence of such heterogeneity in the often-used Dartmouth Wi-Fi data set. We also show that DTN routing can benefit from knowing these distributions. We first introduce a new stochastic model focusing on the inter-contact time distributions between all pairs of nodes, which we validate on real connectivity patterns. We then analytically derive the mean delivery time for a bundle of information traversing the network for simple single copy routing schemes. The purpose is to examine the theoretic impact of heterogeneous inter-contact time distributions. Finally, we show that we can exploit this user diversity to improve routing performance.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 15:25:29 GMT" }, { "version": "v2", "created": "Fri, 5 Jan 2007 10:20:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Conan", "Vania", "" ], [ "Leguay", "Jeremie", "" ], [ "Friedman", "Timur", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609069
S. M. Nazrul Alam
S. M. Nazrul Alam and Zygmunt J. Haas
Coverage and Connectivity in Three-Dimensional Networks
To appear in ACM Mobicom 2006
null
null
null
cs.NI
null
Most wireless terrestrial networks are designed based on the assumption that the nodes are deployed on a two-dimensional (2D) plane. However, this 2D assumption is not valid in underwater, atmospheric, or space communications. In fact, recent interest in underwater acoustic ad hoc and sensor networks hints at the need to understand how to design networks in 3D. Unfortunately, the design of 3D networks is surprisingly more difficult than the design of 2D networks. For example, proofs of Kelvin's conjecture and Kepler's conjecture required centuries of research to achieve breakthroughs, whereas their 2D counterparts are trivial to solve. In this paper, we consider the coverage and connectivity issues of 3D networks, where the goal is to find a node placement strategy with 100% sensing coverage of a 3D space, while minimizing the number of nodes required for surveillance. Our results indicate that the use of the Voronoi tessellation of 3D space to create truncated octahedral cells results in the best strategy. In this truncated octahedron placement strategy, the transmission range must be at least 1.7889 times the sensing range in order to maintain connectivity among nodes. If the transmission range is between 1.4142 and 1.7889 times the sensing range, then a hexagonal prism placement strategy or a rhombic dodecahedron placement strategy should be used. Although the required number of nodes in the hexagonal prism and the rhombic dodecahedron placement strategies is the same, this number is 43.25% higher than the number of nodes required by the truncated octahedron placement strategy. We verify by simulation that our placement strategies indeed guarantee ubiquitous coverage. We believe that our approach and our results presented in this paper could be used for extending the processes of 2D network design to 3D networks.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 17:35:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Alam", "S. M. Nazrul", "" ], [ "Haas", "Zygmunt J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609070
Thomas Way
Joseph Distasio and Thomas P. Way
Exploring Computer Science Concepts with a Ready-made Computer Game Framework
5 pages, 3 figures
null
null
null
cs.OH
null
Leveraging the prevailing interest in computer games among college students, both for entertainment and as a possible career path, is a major reason for the increasing prevalence of computer game design courses in computer science curricula. Because implementing a computer game requires strong programming skills, game design courses are most often restricted to more advanced computer science students. This paper reports on a ready-made game design and experimentation framework, implemented in Java, that makes game programming more widely accessible. This framework, called Labyrinth, enables students at all programming skill levels to participate in computer game design. We describe the architecture of the framework, and discuss programming projects suitable for a wide variety of computer science courses, from capstone to non-major.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 19:49:55 GMT" }, { "version": "v2", "created": "Tue, 12 Sep 2006 20:10:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Distasio", "Joseph", "" ], [ "Way", "Thomas P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0609071
Shotaro Akaho
Shotaro Akaho
A kernel method for canonical correlation analysis
Full version of paper presented in IMPS2001 (International Meeting of Psychometric Society) 2007-Feb-14: typos in equations (23) and (24) in page 3 of the first version have been corrected
null
null
null
cs.LG cs.CV
null
Canonical correlation analysis is a technique to extract common features from a pair of multivariate data. In complex situations, however, it does not extract useful features because of its linearity. On the other hand, kernel method used in support vector machine is an efficient approach to improve such a linear method. In this paper, we investigate the effectiveness of applying kernel method to canonical correlation analysis.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 03:44:08 GMT" }, { "version": "v2", "created": "Wed, 14 Feb 2007 06:51:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Akaho", "Shotaro", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0609072
Elitza Maneva
Parikshit Gopalan, Phokion G. Kolaitis, Elitza Maneva, Christos H. Papadimitriou
The Connectivity of Boolean Satisfiability: Computational and Structural Dichotomies
null
Extended abstract in Proceedings of ICALP 2006, pp 346-357
null
null
cs.CC
null
Boolean satisfiability problems are an important benchmark for questions about complexity, algorithms, heuristics and threshold phenomena. Recent work on heuristics, and the satisfiability threshold has centered around the structure and connectivity of the solution space. Motivated by this work, we study structural and connectivity-related properties of the space of solutions of Boolean satisfiability problems and establish various dichotomies in Schaefer's framework. On the structural side, we obtain dichotomies for the kinds of subgraphs of the hypercube that can be induced by the solutions of Boolean formulas, as well as for the diameter of the connected components of the solution space. On the computational side, we establish dichotomy theorems for the complexity of the connectivity and st-connectivity questions for the graph of solutions of Boolean formulas. Our results assert that the intractable side of the computational dichotomies is PSPACE-complete, while the tractable side - which includes but is not limited to all problems with polynomial time algorithms for satisfiability - is in P for the st-connectivity question, and in coNP for the connectivity question. The diameter of components can be exponential for the PSPACE-complete cases, whereas in all other cases it is linear; thus, small diameter and tractability of the connectivity problems are remarkably aligned. The crux of our results is an expressibility theorem showing that in the tractable cases, the subgraphs induced by the solution space possess certain good structural properties, whereas in the intractable cases, the subgraphs can be arbitrary.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 07:25:59 GMT" }, { "version": "v2", "created": "Wed, 3 Oct 2007 09:49:04 GMT" } ]
2007-10-03T00:00:00
[ [ "Gopalan", "Parikshit", "" ], [ "Kolaitis", "Phokion G.", "" ], [ "Maneva", "Elitza", "" ], [ "Papadimitriou", "Christos H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0609073
Mylene Pischella Mrs
Mylene Pischella, Jean-Claude Belfiore
Optimal power allocation for downlink cooperative cellular networks
null
null
null
null
cs.IT math.IT
null
This paper has been withdrawn by the author
[ { "version": "v1", "created": "Wed, 13 Sep 2006 07:42:49 GMT" }, { "version": "v2", "created": "Thu, 8 Mar 2007 15:38:10 GMT" }, { "version": "v3", "created": "Wed, 19 Sep 2007 10:39:40 GMT" } ]
2007-09-19T00:00:00
[ [ "Pischella", "Mylene", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609074
Yoo Chung
Yoo Chul Chung and Dongman Lee
A Non-anchored Unified Naming System for Ad Hoc Computing Environments
Submitted to Percom 2007
null
null
null
cs.DC cs.AR cs.NI
null
A ubiquitous computing environment consists of many resources that need to be identified by users and applications. Users and developers require some way to identify resources by human readable names. In addition, ubiquitous computing environments impose additional requirements such as the ability to work well with ad hoc situations and the provision of names that depend on context. The Non-anchored Unified Naming (NUN) system was designed to satisfy these requirements. It is based on relative naming among resources and provides the ability to name arbitrary types of resources. By having resources themselves take part in naming, resources are able to able contribute their specialized knowledge into the name resolution process, making context-dependent mapping of names to resources possible. The ease of which new resource types can be added makes it simple to incorporate new types of contextual information within names. In this paper, we describe the naming system and evaluate its use.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 12:52:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Chung", "Yoo Chul", "" ], [ "Lee", "Dongman", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609075
Sergey Tsarev P.
S.P. Tsarev
On factorization and solution of multidimensional linear partial differential equations
11 pages, Plain LaTeX; Submitted to Proceedings of Waterloo Workshop on Computer Algebra devoted to the 60th birthday Of S.A.Abramov. The second version includes grant acknowledgements and minor changes in a couple of places
null
null
null
cs.SC nlin.SI
null
We describe a method of obtaining closed-form complete solutions of certain second-order linear partial differential equations with more than two independent variables. This method generalizes the classical method of Laplace transformations of second-order hyperbolic equations in the plane and is based on an idea given by Ulisse Dini in 1902.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 13:28:18 GMT" }, { "version": "v2", "created": "Wed, 27 Dec 2006 07:56:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsarev", "S. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" } ]
cs/0609076
Chien-Hwa Hwang
Chien-Hwa Hwang
Asymptotic Spectral Distribution of Crosscorrelation Matrix in Asynchronous CDMA
63 pages, 8 figures, submitted to IEEE Transactions on Information Theory, Sept. 2006
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Asymptotic spectral distribution (ASD) of the crosscorrelation matrix is investigated for a random spreading short/long-code asynchronous direct sequence-code division multiple access (DS-CDMA) system. The discrete-time decision statistics are obtained as the output samples of a bank of symbol matched filters of all users. The crosscorrelation matrix is studied when the number of symbols transmitted by each user tends to infinity. Two levels of asynchronism are considered. One is symbol-asynchronous but chip-synchronous, and the other is chip-asynchronous. The existence of a nonrandom ASD is proved by moment convergence theorem, where the focus is on the derivation of asymptotic eigenvalue moments (AEM) of the crosscorrelation matrix. A combinatorics approach based on noncrossing partition of set partition theory is adopted for AEM computation. The spectral efficiency and the minimum mean-square-error (MMSE) achievable by a linear receiver of asynchronous CDMA are plotted by AEM using a numerical method.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 14:16:38 GMT" }, { "version": "v2", "created": "Mon, 3 Sep 2007 15:51:42 GMT" }, { "version": "v3", "created": "Mon, 6 Oct 2008 04:34:34 GMT" } ]
2008-10-06T00:00:00
[ [ "Hwang", "Chien-Hwa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609077
Shi Xiao
Shi Xiao and Gaoxi Xiao
On Intentional Attacks and Protections in Complex Communication Networks
5 pages, 11 figures, accepted by IEEE Globecom 2006 conference
null
null
null
cs.NI
null
Being motivated by recent developments in the theory of complex networks, we examine the robustness of communication networks under intentional attack that takes down network nodes in a decreasing order of their nodal degrees. In this paper, we study two different effects that have been largely missed in the existing results: (i) some communication networks, like Internet, are too large for anyone to have global information of their topologies, which makes the accurate intentional attack practically impossible; and (ii) most attacks in communication networks are propagated from one node to its neighborhood node(s), utilizing local network-topology information only. We show that incomplete global information has different impacts to the intentional attack in different circumstances, while local information-based attacks can be actually highly efficient. Such insights would be helpful for the future developments of efficient network attack/protection schemes.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 19:06:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Xiao", "Shi", "" ], [ "Xiao", "Gaoxi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609078
Guy Bunin
Guy Bunin
A Continuum Theory for Unstructured Mesh Generation in Two Dimensions
null
null
null
null
cs.CG
null
A continuum description of unstructured meshes in two dimensions, both for planar and curved surface domains, is proposed. The meshes described are those which, in the limit of an increasingly finer mesh (smaller cells), and away from irregular vertices, have ideally-shaped cells (squares or equilateral triangles), and can therefore be completely described by two local properties: local cell size and local edge directions. The connection between the two properties is derived by defining a Riemannian manifold whose geodesics trace the edges of the mesh. A function $\phi$, proportional to the logarithm of the cell size, is shown to obey the Poisson equation, with localized charges corresponding to irregular vertices. The problem of finding a suitable manifold for a given domain is thus shown to exactly reduce to an Inverse Poisson problem on $\phi$, of finding a distribution of localized charges adhering to the conditions derived for boundary alignment. Possible applications to mesh generation are discussed.
[ { "version": "v1", "created": "Thu, 14 Sep 2006 00:07:39 GMT" }, { "version": "v2", "created": "Wed, 4 Jul 2007 15:55:37 GMT" } ]
2007-07-04T00:00:00
[ [ "Bunin", "Guy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0609079
Tomasz Suslo
Tomasz Suslo
Modern Statistics by Kriging
4 pages
null
null
null
cs.NA cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present statistics (S-statistics) based only on random variable (not random value) with a mean squared error of mean estimation as a concept of error.
[ { "version": "v1", "created": "Thu, 14 Sep 2006 12:34:59 GMT" }, { "version": "v2", "created": "Thu, 30 Nov 2006 12:45:33 GMT" }, { "version": "v3", "created": "Thu, 1 Mar 2007 16:14:46 GMT" }, { "version": "v4", "created": "Wed, 29 Jul 2009 10:03:56 GMT" } ]
2009-07-29T00:00:00
[ [ "Suslo", "Tomasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0609080
Benedetto Intrigila
Benedetto Intrigila and Richard Statman
Solution of a Problem of Barendregt on Sensible lambda-Theories
17 pages
Logical Methods in Computer Science, Volume 2, Issue 4 (October 18, 2006) lmcs:2241
10.2168/LMCS-2(4:5)2006
null
cs.LO
null
<i>H</i> is the theory extending &#946;-conversion by identifying all closed unsolvables. <i>H</i>&#969; is the closure of this theory under the &#969;-rule (and &#946;-conversion). A long-standing conjecture of H. Barendregt states that the provable equations of <i>H</i>&#969; form &#928;<sub>1</sub><sup>1</sup>-complete set. Here we prove that conjecture.
[ { "version": "v1", "created": "Thu, 14 Sep 2006 16:01:52 GMT" }, { "version": "v2", "created": "Wed, 18 Oct 2006 10:48:10 GMT" } ]
2017-01-11T00:00:00
[ [ "Intrigila", "Benedetto", "" ], [ "Statman", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0609081
Mark Tygert
Mark Tygert
Recurrence relations and fast algorithms
24 pages
Recurrence relations and fast algorithms, Applied and Computational Harmonic Analysis, 28 (1): 121-128, 2010
null
null
cs.CE cs.NA
null
We construct fast algorithms for evaluating transforms associated with families of functions which satisfy recurrence relations. These include algorithms both for computing the coefficients in linear combinations of the functions, given the values of these linear combinations at certain points, and, vice versa, for evaluating such linear combinations at those points, given the coefficients in the linear combinations; such procedures are also known as analysis and synthesis of series of certain special functions. The algorithms of the present paper are efficient in the sense that their computational costs are proportional to n (ln n) (ln(1/epsilon))^3, where n is the amount of input and output data, and epsilon is the precision of computations. Stated somewhat more precisely, we find a positive real number C such that, for any positive integer n > 10, the algorithms require at most C n (ln n) (ln(1/epsilon))^3 floating-point operations and words of memory to evaluate at n appropriately chosen points any linear combination of n special functions, given the coefficients in the linear combination, where epsilon is the precision of computations.
[ { "version": "v1", "created": "Thu, 14 Sep 2006 17:51:11 GMT" } ]
2010-06-04T00:00:00
[ [ "Tygert", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0609082
Marek W. Gutowski
Marek W. Gutowski
Classifying extrema using intervals
LaTeX, 7 pages, no figures
null
null
null
cs.MS cs.CC cs.NA
null
We present a straightforward and verified method of deciding whether the n-dimensional point x (n>=1), such that \nabla f(x)=0, is the local minimizer, maximizer or just a saddle point of a real-valued function f. The method scales linearly with dimensionality of the problem and never produces false results.
[ { "version": "v1", "created": "Thu, 14 Sep 2006 18:32:46 GMT" } ]
2011-11-09T00:00:00
[ [ "Gutowski", "Marek W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0609083
Chinh Hoang
C. T. Hoang, J. Sawada, X. Shu
k-Colorability of P5-free graphs
null
null
null
null
cs.DM cs.DS
null
A polynomial time algorithm that determines for a fixed integer k whether or not a P5-free graph can be k-colored is presented in this paper. If such a coloring exists, the algorithm will produce a valid k-coloring.
[ { "version": "v1", "created": "Thu, 14 Sep 2006 21:30:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoang", "C. T.", "" ], [ "Sawada", "J.", "" ], [ "Shu", "X.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0609084
Amelia Sparavigna
A. Sparavigna, B. Montrucchio
Non-photorealistic image rendering with a labyrinthine tiling
9 pages, 5 figures
null
null
null
cs.GR
null
The paper describes a new image processing for a non-photorealistic rendering. The algorithm is based on a random generation of gray tones and competing statistical requirements. The gray tone value of each pixel in the starting image is replaced selecting among randomly generated tone values, according to the statistics of nearest-neighbor and next-nearest-neighbor pixels. Two competing conditions for replacing the tone values - one position on the local mean value the other on the local variance - produce a peculiar pattern on the image. This pattern has a labyrinthine tiling aspect. For certain subjects, the pattern enhances the look of the image.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 07:21:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Sparavigna", "A.", "" ], [ "Montrucchio", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0609085
Philip Bille
Philip Bille, Rolf Fagerberg, Inge Li Goertz
Improved Approximate String Matching and Regular Expression Matching on Ziv-Lempel Compressed Texts
null
null
null
null
cs.DS
null
We study the approximate string matching and regular expression matching problem for the case when the text to be searched is compressed with the Ziv-Lempel adaptive dictionary compression schemes. We present a time-space trade-off that leads to algorithms improving the previously known complexities for both problems. In particular, we significantly improve the space bounds, which in practical applications are likely to be a bottleneck.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 07:36:25 GMT" }, { "version": "v2", "created": "Thu, 3 May 2007 11:07:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Bille", "Philip", "" ], [ "Fagerberg", "Rolf", "" ], [ "Goertz", "Inge Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0609086
Fabrice Theoleyre
Herv\'e Rivano (INRIA Sophia Antipolis), Fabrice Theoleyre (INRIA Rh\^one-Alpes), Fabrice Valois (INRIA Rh\^one-Alpes)
About the Capacity of Flat and Self-Organized Ad Hoc and Hybrid Networks
null
null
null
null
cs.NI
null
Ad hoc networking specific challenges foster a strong research effort on efficient protocols design. Routing protocols based on a self-organized structure have been studied principally for the robustness and the scalability they provide. On the other hand, self-organization schemes may decrease the network capacity since they concentrate the traffic on privileged links. This paper presents four models for evaluating the capacity of a routing schemes on 802.11 like networks. Our approach consists in modeling the radio resource sharing principles of 802.11 like MAC protocols as a set of linear constraints. We have implemented two models of fairness. The first one assumes that nodes have a fair access to the channel, while the second one assumes that on the radio links. We then develop a pessimistic and an optimistic scenarii of spatial re-utilization of the medium, yielding a lower bound and an upper bound on the network capacity for each fairness case. Our models are independent of the routing protocols and provide therefore a relevant framework for their comparison. We apply our models to a comparative analysis of the well-known shortest path base flat routing protocol OLSR against two main self-organized structure approaches, VSR, and Wu & Li's protocols. This study concludes on the relevance of self-organized approaches from the network capacity point of view.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 13:40:33 GMT" } ]
2016-08-16T00:00:00
[ [ "Rivano", "Hervé", "", "INRIA Sophia Antipolis" ], [ "Theoleyre", "Fabrice", "", "INRIA\n Rhône-Alpes" ], [ "Valois", "Fabrice", "", "INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0609087
Leszek Skoczylas
Jacek Michalski, Leszek Skoczylas
A comparative analysis of the geometrical surface texture of a real and virtual model of a tooth flank of a cylindrical gear
32 pages, 10 figures
null
null
null
cs.CE
null
The paper presents the methodology of modelling tooth flanks of cylindrical gears in the Cad environment. The modelling consists in a computer simulation of gear generation. A model of tooth flanks is an envelope curve of a family of envelopes that originate from the rolling motion of a solid tool model in relation to a solid model of the cylindrical gear. The surface stereometry and topography of the tooth flanks, hobbed and chiselled by Fellows method, are compared to their numerical models. Metrological measurements of the real gears were carried out using a coordinated measuring machine and a two - and a three-dimensional profilometer. A computer simulation of the gear generation was performed in the Mechanical Desktop environment.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 14:05:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Michalski", "Jacek", "" ], [ "Skoczylas", "Leszek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0609088
Xiaofei Huang
Xiaofei Huang
Deriving the Normalized Min-Sum Algorithm from Cooperative Optimization
Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006
null
10.1109/ITW2.2006.323788
null
cs.IT math.IT
null
The normalized min-sum algorithm can achieve near-optimal performance at decoding LDPC codes. However, it is a critical question to understand the mathematical principle underlying the algorithm. Traditionally, people thought that the normalized min-sum algorithm is a good approximation to the sum-product algorithm, the best known algorithm for decoding LDPC codes and Turbo codes. This paper offers an alternative approach to understand the normalized min-sum algorithm. The algorithm is derived directly from cooperative optimization, a newly discovered general method for global/combinatorial optimization. This approach provides us another theoretical basis for the algorithm and offers new insights on its power and limitation. It also gives us a general framework for designing new decoding algorithms.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 23:47:03 GMT" } ]
2016-11-15T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609089
Xiaofei Huang
Xiaofei Huang, Suquan Ding, Zhixing Yang, Youshou Wu
Fast Min-Sum Algorithms for Decoding of LDPC over GF(q)
Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006
null
10.1109/ITW2.2006.323764
null
cs.IT math.IT
null
In this paper, we present a fast min-sum algorithm for decoding LDPC codes over GF(q). Our algorithm is different from the one presented by David Declercq and Marc Fossorier in ISIT 05 only at the way of speeding up the horizontal scan in the min-sum algorithm. The Declercq and Fossorier's algorithm speeds up the computation by reducing the number of configurations, while our algorithm uses the dynamic programming instead. Compared with the configuration reduction algorithm, the dynamic programming one is simpler at the design stage because it has less parameters to tune. Furthermore, it does not have the performance degradation problem caused by the configuration reduction because it searches the whole configuration space efficiently through dynamic programming. Both algorithms have the same level of complexity and use simple operations which are suitable for hardware implementations.
[ { "version": "v1", "created": "Fri, 15 Sep 2006 23:58:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Huang", "Xiaofei", "" ], [ "Ding", "Suquan", "" ], [ "Yang", "Zhixing", "" ], [ "Wu", "Youshou", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609090
Xiaofei Huang
Xiaofei Huang
Single-Scan Min-Sum Algorithms for Fast Decoding of LDPC Codes
Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006
null
10.1109/ITW2.2006.323774
null
cs.IT math.IT
null
Many implementations for decoding LDPC codes are based on the (normalized/offset) min-sum algorithm due to its satisfactory performance and simplicity in operations. Usually, each iteration of the min-sum algorithm contains two scans, the horizontal scan and the vertical scan. This paper presents a single-scan version of the min-sum algorithm to speed up the decoding process. It can also reduce memory usage or wiring because it only needs the addressing from check nodes to variable nodes while the original min-sum algorithm requires that addressing plus the addressing from variable nodes to check nodes. To cut down memory usage or wiring further, another version of the single-scan min-sum algorithm is presented where the messages of the algorithm are represented by single bit values instead of using fixed point ones. The software implementation has shown that the single-scan min-sum algorithm is more than twice as fast as the original min-sum algorithm.
[ { "version": "v1", "created": "Sat, 16 Sep 2006 00:08:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0609091
Patrick Dehornoy
Patrick Dehornoy (LMNO)
Using shifted conjugacy in braid-based cryptography
null
null
null
null
cs.CR
null
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self-distributive law. Conjugation is an example of such an operation, but there are other examples, in particular the shifted conjugation on Artin's braid group B\_oo, and the finite Laver tables. In both cases, the underlying structures have a high combinatorial complexity, and they lead to difficult problems.
[ { "version": "v1", "created": "Sat, 16 Sep 2006 10:55:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Dehornoy", "Patrick", "", "LMNO" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0609092
Pavel Emelyanov
P. Emelyanov
Analysis of Equality Relationships for Imperative Programs
31 pages, 10 figures, 2 tables, 1 appendix
null
null
null
cs.PL
null
In this article, we discuss a flow--sensitive analysis of equality relationships for imperative programs. We describe its semantic domains, general purpose operations over abstract computational states (term evaluation and identification, semantic completion, widening operator, etc.) and semantic transformers corresponding to program constructs. We summarize our experiences from the last few years concerning this analysis and give attention to applications of analysis of automatically generated code. Among other illustrating examples, we consider a program for which the analysis diverges without a widening operator and results of analyzing residual programs produced by some automatic partial evaluator. An example of analysis of a program generated by this evaluator is given.
[ { "version": "v1", "created": "Sat, 16 Sep 2006 12:22:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Emelyanov", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]