id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0609093 | Rocco A. Servedio | Jon Feldman, Ryan O'Donnell, Rocco A. Servedio | PAC Learning Mixtures of Axis-Aligned Gaussians with No Separation
Assumption | 19 pages; no figures; preliminary abridged version appeared in
Proceedings of 19th Annual Conference on Learning Theory (COLT) 2006 | Proceedings of 19th Annual Conference on Learning Theory (COLT),
Pittsburgh, PA, pp. 20--34, 2006 | null | null | cs.LG | null | We propose and analyze a new vantage point for the learning of mixtures of
Gaussians: namely, the PAC-style model of learning probability distributions
introduced by Kearns et al. Here the task is to construct a hypothesis mixture
of Gaussians that is statistically indistinguishable from the actual mixture
generating the data; specifically, the KL-divergence should be at most epsilon.
In this scenario, we give a poly(n/epsilon)-time algorithm that learns the
class of mixtures of any constant number of axis-aligned Gaussians in
n-dimensional Euclidean space. Our algorithm makes no assumptions about the
separation between the means of the Gaussians, nor does it have any dependence
on the minimum mixing weight. This is in contrast to learning results known in
the ``clustering'' model, where such assumptions are unavoidable.
Our algorithm relies on the method of moments, and a subalgorithm developed
in previous work by the authors (FOCS 2005) for a discrete mixture-learning
problem.
| [
{
"version": "v1",
"created": "Sat, 16 Sep 2006 14:43:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"O'Donnell",
"Ryan",
""
],
[
"Servedio",
"Rocco A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0609094 | Igal Sason | Gil Wiechman and Igal Sason | An Improved Sphere-Packing Bound Targeting Codes of Short to Moderate
Block Lengths and Applications | To be presented in the 44th Allerton conference, 27-29 September
2006. The full paper version was submitted to the IEEE Trans. on Information
Theory, August 2006 (see http://www.ee.technion.ac.il/people/sason/ISP.pdf) | null | null | null | cs.IT math.IT | null | This paper derives an improved sphere-packing (ISP) bound targeting codes of
short to moderate block lengths. We first review the 1967 sphere-packing (SP67)
bound for discrete memoryless channels, and a recent improvement by Valembois
and Fossorier. These concepts are used for the derivation of a new lower bound
on the decoding error probability (referred to as the ISP bound) which is
uniformly tighter than the SP67 bound and its recent improved version. Under a
mild condition, the ISP bound is applicable to general memoryless channels, and
some of its applications are exemplified. Its tightness is studied by comparing
it with bounds on the ML decoding error probability. It is exemplified that the
ISP bound suggests an interesting alternative to the 1959 sphere-packing (SP59)
bound of Shannon for the Gaussian channel, especially for digital modulations
of high spectral efficiency.
| [
{
"version": "v1",
"created": "Sun, 17 Sep 2006 21:21:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wiechman",
"Gil",
""
],
[
"Sason",
"Igal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609095 | Joachim Wehler | Joachim Wehler | Free Choice Petri Nets without frozen tokens and Bipolar Synchronization
Systems | null | null | null | null | cs.LO | null | Bipolar synchronization systems (BP-systems) constitute a class of coloured
Petri nets, well suited for modeling the control flow of discrete, dynamical
systems. Every BP-system has an underlying ordinary Petri net, which is a
T-system. Moreover, it has a second ordinary net attached, which is a
free-choice system. We prove that a BP-system is live and safe if the T-system
and the free-choice system are live and safe and if the free-choice system has
no frozen tokens. This result is the converse of a theorem of Genrich and
Thiagarajan and proves an elder conjecture. The proof compares the different
Petri nets by Petri net morphisms and makes use of the classical theory of
free-choice systems
| [
{
"version": "v1",
"created": "Sun, 17 Sep 2006 17:42:41 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Sep 2007 19:58:01 GMT"
}
] | 2007-09-10T00:00:00 | [
[
"Wehler",
"Joachim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609096 | David Doty | David Doty and Philippe Moser | Finite-State Dimension and Lossy Decompressors | We found that Theorem 3.11, which was basically the motive for this
paper, was already proven by Sheinwald, Ziv, and Lempel in 1991 and 1995
papers | null | null | null | cs.CC cs.IT math.IT | null | This paper examines information-theoretic questions regarding the difficulty
of compressing data versus the difficulty of decompressing data and the role
that information loss plays in this interaction. Finite-state compression and
decompression are shown to be of equivalent difficulty, even when the
decompressors are allowed to be lossy.
Inspired by Kolmogorov complexity, this paper defines the optimal
*decompression *ratio achievable on an infinite sequence by finite-state
decompressors (that is, finite-state transducers outputting the sequence in
question). It is shown that the optimal compression ratio achievable on a
sequence S by any *information lossless* finite state compressor, known as the
finite-state dimension of S, is equal to the optimal decompression ratio
achievable on S by any finite-state decompressor. This result implies a new
decompression characterization of finite-state dimension in terms of lossy
finite-state transducers.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 05:00:39 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Nov 2006 02:38:06 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Doty",
"David",
""
],
[
"Moser",
"Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609097 | Ketan Savla | Ketan Savla, Francesco Bullo and Emilio Frazzoli | Traveing Salesperson Problems for a double integrator | null | null | null | null | cs.RO | null | In this paper we propose some novel path planning strategies for a double
integrator with bounded velocity and bounded control inputs. First, we study
the following version of the Traveling Salesperson Problem (TSP): given a set
of points in $\real^d$, find the fastest tour over the point set for a double
integrator. We first give asymptotic bounds on the time taken to complete such
a tour in the worst-case. Then, we study a stochastic version of the TSP for
double integrator where the points are randomly sampled from a uniform
distribution in a compact environment in $\real^2$ and $\real^3$. We propose
novel algorithms that perform within a constant factor of the optimal strategy
with high probability. Lastly, we study a dynamic TSP: given a stochastic
process that generates targets, is there a policy which guarantees that the
number of unvisited targets does not diverge over time? If such stable policies
exist, what is the minimum wait for a target? We propose novel stabilizing
receding-horizon algorithms whose performances are within a constant factor
from the optimum with high probability, in $\real^2$ as well as $\real^3$. We
also argue that these algorithms give identical performances for a particular
nonholonomic vehicle, Dubins vehicle.
| [
{
"version": "v1",
"created": "Sun, 17 Sep 2006 23:38:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Savla",
"Ketan",
""
],
[
"Bullo",
"Francesco",
""
],
[
"Frazzoli",
"Emilio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0609098 | Sang-Seon Byun | Sang-Seon Byun, Chuck Yoo | Reducing the Makespan in Hierarchical Reliable Multicast Tree | 26 pages, 9 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.NI | null | In hierarchical reliable multicast environment, makespan is the time that is
required to fully and successfully transmit a packet from the sender to all
receivers. Low makespan is vital for achieving high throughput with a TCP-like
window based sending scheme. In hierarchical reliable multicast methods, the
number of repair servers and their locations influence the makespan. In this
paper we propose a new method to decide the locations of repair servers that
can reduce the makespan in hierarchical reliable multicast networks. Our method
has a formulation based on mixed integer programming to analyze the makespan
minimization problem. A notable aspect of the formulation is that heterogeneous
links and packet losses are taken into account in the formulation. Three
different heuristics are presented to find the locations of repair servers in
reasonable time in the formulation. Through simulations, three heuristics are
carefully analyzed and compared on networks with different sizes. We also
evaluate our proposals on PGM (Pragmatic General Multicast) reliable multicast
protocol using ns-2 simulation. The results show that the our best heuristic is
close to the lower bound by a factor of 2.3 in terms of makespan and by a
factor of 5.5 in terms of the number of repair servers.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 03:10:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Byun",
"Sang-Seon",
""
],
[
"Yoo",
"Chuck",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609099 | Igal Sason | Igal Sason and Idan Goldenberg | Coding for Parallel Channels: Gallager Bounds and Applications to
Repeat-Accumulate Codes | 5 pages, 4 figures. To be presented in the IEEE Conference for
Electrical Engineers in Israel, Eilat, Nov. 15-17, 2006. The full paper
version was submitted to the IEEE Trans. on Information Theory in June 2006,
and is available at http://arxiv.org/abs/cs.IT/0607002 | null | null | null | cs.IT math.IT | null | This paper is focused on the performance analysis of binary linear block
codes (or ensembles) whose transmission takes place over independent and
memoryless parallel channels. New upper bounds on the maximum-likelihood (ML)
decoding error probability are derived. The framework of the second version of
the Duman and Salehi (DS2) bounds is generalized to the case of parallel
channels, along with the derivation of optimized tilting measures. The
connection between the generalized DS2 and the 1961 Gallager bounds, known
previously for a single channel, is revisited for the case of parallel
channels. The new bounds are used to obtain improved inner bounds on the
attainable channel regions under ML decoding. These improved bounds are applied
to ensembles of turbo-like codes, focusing on repeat-accumulate codes and their
recent variations.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 06:26:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sason",
"Igal",
""
],
[
"Goldenberg",
"Idan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609100 | Florent Ranchin | Florent Ranchin (CEREMADE), Antonin Chambolle (CMAP), Fran\c{c}oise
Dibos (LAGA) | Total Variation Minimization and Graph Cuts for Moving Objects
Segmentation | null | null | null | null | cs.CV | null | In this paper, we are interested in the application to video segmentation of
the discrete shape optimization problem involving the shape weighted perimeter
and an additional term depending on a parameter. Based on recent works and in
particular the one of Darbon and Sigelle, we justify the equivalence of the
shape optimization problem and a weighted total variation regularization. For
solving this problem, we adapt the projection algorithm proposed recently for
solving the basic TV regularization problem. Another solution to the shape
optimization investigated here is the graph cut technique. Both methods have
the advantage to lead to a global minimum. Since we can distinguish moving
objects from static elements of a scene by analyzing norm of the optical flow
vectors, we choose the optical flow norm as initial data. In order to have the
contour as close as possible to an edge in the image, we use a classical edge
detector function as the weight of the weighted total variation. This model has
been used in one of our former works. We also apply the same methods to a video
segmentation model used by Jehan-Besson, Barlaud and Aubert. In this case, only
standard perimeter is incorporated in the shape functional. We also propose
another way for finding moving objects by using an a contrario detection of
objects on the image obtained by solving the Rudin-Osher-Fatemi Total Variation
regularization problem.We can notice the segmentation can be associated to a
level set in the former methods.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 06:40:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ranchin",
"Florent",
"",
"CEREMADE"
],
[
"Chambolle",
"Antonin",
"",
"CMAP"
],
[
"Dibos",
"Françoise",
"",
"LAGA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0609101 | Francesco Zamponi | Fabrizio Altarelli, Remi Monasson, Francesco Zamponi | Can rare SAT formulas be easily recognized? On the efficiency of message
passing algorithms for K-SAT at large clause-to-variable ratios | 8 pages of text and 7 of appendices; updated to take into account
comments received on the first version; to be published on J.Phys.A:Math.Gen | J. Phys. A: Math. Theor. 40, 867-886 (2007) | 10.1088/1751-8113/40/5/001 | null | cs.CC cond-mat.stat-mech | null | For large clause-to-variable ratio, typical K-SAT instances drawn from the
uniform distribution have no solution. We argue, based on statistical mechanics
calculations using the replica and cavity methods, that rare satisfiable
instances from the uniform distribution are very similar to typical instances
drawn from the so-called planted distribution, where instances are chosen
uniformly between the ones that admit a given solution. It then follows, from a
recent article by Feige, Mossel and Vilenchik, that these rare instances can be
easily recognized (in O(log N) time and with probability close to 1) by a
simple message-passing algorithm.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 08:38:16 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Dec 2006 15:58:26 GMT"
}
] | 2015-06-25T00:00:00 | [
[
"Altarelli",
"Fabrizio",
""
],
[
"Monasson",
"Remi",
""
],
[
"Zamponi",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
cs/0609102 | Patrick Dehornoy | Patrick Dehornoy (LMNO) | Using groups for investigating rewrite systems | null | null | null | null | cs.LO | null | We describe several technical tools that prove to be efficient for
investigating the rewrite systems associated with a family of algebraic laws,
and might be useful for more general rewrite systems. These tools consist in
introducing a monoid of partial operators, listing the monoid relations
expressing the possible local confluence of the rewrite system, then
introducing the group presented by these relations, and finally replacing the
initial rewrite system with a internal process entirely sitting in the latter
group. When the approach can be completed, one typically obtains a practical
method for constructing algebras satisfying prescribed laws and for solving the
associated word problem.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 12:34:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dehornoy",
"Patrick",
"",
"LMNO"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609103 | Bodo Manthey | Bodo Manthey | Minimum-weight Cycle Covers and Their Approximability | To appear in the Proceedings of the 33rd Workshop on Graph-Theoretic
Concepts in Computer Science (WG 2007). Minor changes | null | null | null | cs.DS cs.CC cs.DM | null | A cycle cover of a graph is a set of cycles such that every vertex is part of
exactly one cycle. An L-cycle cover is a cycle cover in which the length of
every cycle is in the set L.
We investigate how well L-cycle covers of minimum weight can be approximated.
For undirected graphs, we devise a polynomial-time approximation algorithm that
achieves a constant approximation ratio for all sets L. On the other hand, we
prove that the problem cannot be approximated within a factor of 2-eps for
certain sets L.
For directed graphs, we present a polynomial-time approximation algorithm
that achieves an approximation ratio of O(n), where $n$ is the number of
vertices. This is asymptotically optimal: We show that the problem cannot be
approximated within a factor of o(n).
To contrast the results for cycle covers of minimum weight, we show that the
problem of computing L-cycle covers of maximum weight can, at least in
principle, be approximated arbitrarily well.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 13:22:39 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 16:14:32 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 14:58:11 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Manthey",
"Bodo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609104 | Thomas Wies | Thomas Wies, Viktor Kuncak, Karen Zee, Andreas Podelski, Martin Rinard | On Verifying Complex Properties using Symbolic Shape Analysis | null | null | null | MPI-I-2006-2-001 | cs.PL cs.LO cs.SE | null | One of the main challenges in the verification of software systems is the
analysis of unbounded data structures with dynamic memory allocation, such as
linked data structures and arrays. We describe Bohne, a new analysis for
verifying data structures. Bohne verifies data structure operations and shows
that 1) the operations preserve data structure invariants and 2) the operations
satisfy their specifications expressed in terms of changes to the set of
objects stored in the data structure. During the analysis, Bohne infers loop
invariants in the form of disjunctions of universally quantified Boolean
combinations of formulas. To synthesize loop invariants of this form, Bohne
uses a combination of decision procedures for Monadic Second-Order Logic over
trees, SMT-LIB decision procedures (currently CVC Lite), and an automated
reasoner within the Isabelle interactive theorem prover. This architecture
shows that synthesized loop invariants can serve as a useful communication
mechanism between different decision procedures. Using Bohne, we have verified
operations on data structures such as linked lists with iterators and back
pointers, trees with and without parent pointers, two-level skip lists, array
data structures, and sorted lists. We have deployed Bohne in the Hob and Jahob
data structure analysis systems, enabling us to combine Bohne with analyses of
data structure clients and apply it in the context of larger programs. This
report describes the Bohne algorithm as well as techniques that Bohne uses to
reduce the ammount of annotations and the running time of the analysis.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 14:52:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wies",
"Thomas",
""
],
[
"Kuncak",
"Viktor",
""
],
[
"Zee",
"Karen",
""
],
[
"Podelski",
"Andreas",
""
],
[
"Rinard",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609105 | Lavrenov Alexandre n | A. Lavrenov | Binomial multichannel algorithm | 11 pages, 2 tables, 8 schemes | null | null | null | cs.CR | null | The binomial multichannel algorithm is proposed. Some its properties are
discussed.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 17:28:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavrenov",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0609106 | Yufang Xi | Yufang Xi and Edmund M. Yeh | Throughput Optimal Distributed Control of Stochastic Wireless Networks | 12 pages, six figures, submitted to Transactions on Networking | null | null | null | cs.NI | null | The Maximum Differential Backlog (MDB) control policy of Tassiulas and
Ephremides has been shown to adaptively maximize the stable throughput of
multi-hop wireless networks with random traffic arrivals and queueing. The
practical implementation of the MDB policy in wireless networks with mutually
interfering links, however, requires the development of distributed
optimization algorithms. Within the context of CDMA-based multi-hop wireless
networks, we develop a set of node-based scaled gradient projection power
control algorithms which solves the MDB optimization problem in a distributed
manner using low communication overhead. As these algorithms require time to
converge to a neighborhood of the optimum, the optimal rates determined by the
MDB policy can only be found iteratively over time. For this, we show that the
iterative MDB policy with convergence time remains throughput optimal.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2006 21:20:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xi",
"Yufang",
""
],
[
"Yeh",
"Edmund M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609107 | Gerard Henry Edmond Duchamp | G\'erard Henry Edmond Duchamp (LIPN), Allan I. Solomon (LPTMC), Pawel
Blasiak (LPTMC), Karol A. Penson (LPTMC), Andrzej Horzela (LPTMC) | A multipurpose Hopf deformation of the Algebra of Feynman-like Diagrams | 5 pages | null | null | null | cs.OH math-ph math.MP | null | We construct a three parameter deformation of the Hopf algebra
$\mathbf{LDIAG}$. This new algebra is a true Hopf deformation which reduces to
$\mathbf{LDIAG}$ on one hand and to $\mathbf{MQSym}$ on the other, relating
$\mathbf{LDIAG}$ to other Hopf algebras of interest in contemporary physics.
Further, its product law reproduces that of the algebra of polyzeta functions.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 09:08:45 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Oct 2006 05:41:51 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
],
[
"Solomon",
"Allan I.",
"",
"LPTMC"
],
[
"Blasiak",
"Pawel",
"",
"LPTMC"
],
[
"Penson",
"Karol A.",
"",
"LPTMC"
],
[
"Horzela",
"Andrzej",
"",
"LPTMC"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
cs/0609108 | Victor Dalmau | Victor Dalmau | Generalized Majority-Minority Operations are Tractable | null | Logical Methods in Computer Science, Volume 2, Issue 4 (September
28, 2006) lmcs:2237 | 10.2168/LMCS-2(4:1)2006 | null | cs.CC cs.LO | null | Generalized majority-minority (GMM) operations are introduced as a common
generalization of near unanimity operations and Mal'tsev operations on finite
sets. We show that every instance of the constraint satisfaction problem (CSP),
where all constraint relations are invariant under a (fixed) GMM operation, is
solvable in polynomial time. This constitutes one of the largest tractable
cases of the CSP.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 15:12:46 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2006 12:19:56 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Dalmau",
"Victor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609109 | Pascal Weil | Bruno Courcelle (LaBRI), Pascal Weil (LaBRI) | The recognizability of sets of graphs is a robust property | null | Theoretical Computer Science 342 (2005) 173-228 | null | null | cs.LO math.LO | null | Once the set of finite graphs is equipped with an algebra structure (arising
from the definition of operations that generalize the concatenation of words),
one can define the notion of a recognizable set of graphs in terms of finite
congruences. Applications to the construction of efficient algorithms and to
the theory of context-free sets of graphs follow naturally. The class of
recognizable sets depends on the signature of graph operations. We consider
three signatures related respectively to Hyperedge Replacement (HR)
context-free graph grammars, to Vertex Replacement (VR) context-free graph
grammars, and to modular decompositions of graphs. We compare the corresponding
classes of recognizable sets. We show that they are robust in the sense that
many variants of each signature (where in particular operations are defined by
quantifier-free formulas, a quite flexible framework) yield the same notions of
recognizability. We prove that for graphs without large complete bipartite
subgraphs, HR-recognizability and VR-recognizability coincide. The same
combinatorial condition equates HR-context-free and VR-context-free sets of
graphs. Inasmuch as possible, results are formulated in the more general
framework of relational structures.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 15:18:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Courcelle",
"Bruno",
"",
"LaBRI"
],
[
"Weil",
"Pascal",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/0609110 | Pascal Weil | Pascal Weil (LaBRI) | Algebraic recognizability of languages | null | Mathematical Foundations of Computer Science 2004, Tch\`{e}que,
R\'{e}publique (2004) 149-175 | null | null | cs.LO | null | Recognizable languages of finite words are part of every computer science
cursus, and they are routinely described as a cornerstone for applications and
for theory. We would like to briefly explore why that is, and how this
word-related notion extends to more complex models, such as those developed for
modeling distributed or timed behaviors.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 15:21:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Weil",
"Pascal",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609111 | Tran Cao Son | Le-Chi Tuan, Chitta Baral, Tran Cao Son | A State-Based Regression Formulation for Domains with Sensing
Actions<br> and Incomplete Information | 34 pages, 7 Figures | Logical Methods in Computer Science, Volume 2, Issue 4 (October 2,
2006) lmcs:2238 | 10.2168/LMCS-2(4:2)2006 | null | cs.AI | null | We present a state-based regression function for planning domains where an
agent does not have complete information and may have sensing actions. We
consider binary domains and employ a three-valued characterization of domains
with sensing actions to define the regression function. We prove the soundness
and completeness of our regression formulation with respect to the definition
of progression. More specifically, we show that (i) a plan obtained through
regression for a planning problem is indeed a progression solution of that
planning problem, and that (ii) for each plan found through progression, using
regression one obtains that plan or an equivalent one.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 21:33:07 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2006 23:22:12 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Tuan",
"Le-Chi",
""
],
[
"Baral",
"Chitta",
""
],
[
"Son",
"Tran Cao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0609112 | Lane A. Hemaspaandra | Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg
Rothe | A Richer Understanding of the Complexity of Election Systems | null | null | null | URCS TR-2006-903 | cs.GT cs.CC cs.MA | null | We provide an overview of some recent progress on the complexity of election
systems. The issues studied include the complexity of the winner, manipulation,
bribery, and control problems.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2006 22:57:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0609113 | Pascal Weil | Zoltan Esik, Pascal Weil (LaBRI) | Algebraic recognizability of regular tree languages | null | Theoretical Computer Science 340 (2005) 291-321 | null | null | cs.DM | null | We propose a new algebraic framework to discuss and classify recognizable
tree languages, and to characterize interesting classes of such languages. Our
algebraic tool, called preclones, encompasses the classical notion of syntactic
Sigma-algebra or minimal tree automaton, but adds new expressivity to it. The
main result in this paper is a variety theorem \`{a} la Eilenberg, but we also
discuss important examples of logically defined classes of recognizable tree
languages, whose characterization and decidability was established in recent
papers (by Benedikt and S\'{e}goufin, and by Bojanczyk and Walukiewicz) and can
be naturally formulated in terms of pseudovarieties of preclones. Finally, this
paper constitutes the foundation for another paper by the same authors, where
first-order definable tree languages receive an algebraic characterization.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 06:47:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Esik",
"Zoltan",
"",
"LaBRI"
],
[
"Weil",
"Pascal",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609114 | Abdou Wahidi Bello | Abdou Wahidi Bello (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes) | A VFRoe scheme for 1D shallow water flows : wetting and drying
simulation | null | null | null | null | cs.NA | null | A finite-volume method for the one-dimensional shallow-water equations
including topographic source terms is presented. Exploiting an original idea by
Leroux, the system of partial-differential equations is completed by a trivial
equation for the bathymetry. By applying a change of variable, the system is
given a celerity-speed formulation, and linearized. As a result, an approximate
Riemann solver preserving the positivity of the celerity can be constructed,
permitting wetting and drying flow simulations to be performed. Finally, the
simulation of numerical test cases is presented.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 09:22:13 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Bello",
"Abdou Wahidi",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0609115 | Clemence Magnien | Matthieu Latapy, Clemence Magnien (LIP6 - CNRS and UPMC, France) | Measuring Fundamental Properties of Real-World Complex Networks | null | null | null | null | cs.NI cond-mat.stat-mech cs.DS | null | Complex networks, modeled as large graphs, received much attention during
these last years. However, data on such networks is only available through
intricate measurement procedures. Until recently, most studies assumed that
these procedures eventually lead to samples large enough to be representative
of the whole, at least concerning some key properties. This has crucial impact
on network modeling and simulation, which rely on these properties.
Recent contributions proved that this approach may be misleading, but no
solution has been proposed. We provide here the first practical way to
distinguish between cases where it is indeed misleading, and cases where the
observed properties may be trusted. It consists in studying how the properties
of interest evolve when the sample grows, and in particular whether they reach
a steady state or not.
In order to illustrate this method and to demonstrate its relevance, we apply
it to data-sets on complex network measurements that are representative of the
ones commonly used. The obtained results show that the method fulfills its
goals very well. We moreover identify some properties which seem easier to
evaluate in practice, thus opening interesting perspectives.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 13:38:41 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2007 11:36:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Latapy",
"Matthieu",
"",
"LIP6 - CNRS and UPMC, France"
],
[
"Magnien",
"Clemence",
"",
"LIP6 - CNRS and UPMC, France"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0609116 | Clemence Magnien | Matthieu Latapy (LIAFA - CNRS, Universite Paris 7) | Theory and Practice of Triangle Problems in Very Large (Sparse
(Power-Law)) Graphs | null | null | null | null | cs.DS cond-mat.stat-mech cs.NI | null | Finding, counting and/or listing triangles (three vertices with three edges)
in large graphs are natural fundamental problems, which received recently much
attention because of their importance in complex network analysis. We provide
here a detailed state of the art on these problems, in a unified way. We note
that, until now, authors paid surprisingly little attention to space
complexity, despite its both fundamental and practical interest. We give the
space complexities of known algorithms and discuss their implications. Then we
propose improvements of a known algorithm, as well as a new algorithm, which
are time optimal for triangle listing and beats previous algorithms concerning
space complexity. They have the additional advantage of performing better on
power-law graphs, which we also study. We finally show with an experimental
study that these two algorithms perform very well in practice, allowing to
handle cases that were previously out of reach.
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 14:17:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Latapy",
"Matthieu",
"",
"LIAFA - CNRS, Universite Paris 7"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609117 | Xudong Ma | Xudong Ma and En-hui Yang | Constructing LDPC Codes by 2-Lifts | 11 pages, 7 figures | Proceeding of IEEE International Symposium on Information Theory
(ISIT) 2007 | null | null | cs.IT math.IT | null | We propose a new low-density parity-check code construction scheme based on
2-lifts. The proposed codes have an advantage of admitting efficient hardware
implementations. With the motivation of designing codes with low error floors,
we present an analysis of the low-weight stopping set distributions of the
proposed codes. Based on this analysis, we propose design criteria for
designing codes with low error floors. Numerical results show that the
resulting codes have low error probabilities over binary erasure channels.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 02:14:22 GMT"
}
] | 2009-08-27T00:00:00 | [
[
"Ma",
"Xudong",
""
],
[
"Yang",
"En-hui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609118 | Prahladavaradan Sampath | Prahladavaradan Sampath | Duality of Fix-Points for Distributive Lattices | 7 pages | null | null | null | cs.DS cs.DM | null | We present a novel algorithm for calculating fix-points. The algorithm
calculates fix-points of an endo-function f on a distributive lattice, by
performing reachability computation a graph derived from the dual of f; this is
in comparison to traditional algorithms that are based on iterated application
of f until a fix-point is reached.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 17:34:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sampath",
"Prahladavaradan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609119 | Adrian Paschke | Adrian Paschke | Verification, Validation and Integrity of Distributed and Interchanged
Rule Based Policies and Contracts in the Semantic Web | A.Paschke: Verification, Validation, Integrity of Rule Based Policies
and Contracts in the Semantic Web, 2nd International Semantic Web Policy
Workshop (SWPW'06), Nov. 5-9, 2006, Athens, GA, USA | A.Paschke: Verification, Validation, Integrity of Rule Based
Policies and Contracts in the Semantic Web, 2nd International Semantic Web
Policy Workshop (SWPW'06), Nov. 5-9, 2006, Athens, GA, USA | null | null | cs.AI cs.SE | null | Rule-based policy and contract systems have rarely been studied in terms of
their software engineering properties. This is a serious omission, because in
rule-based policy or contract representation languages rules are being used as
a declarative programming language to formalize real-world decision logic and
create IS production systems upon. This paper adopts an SE methodology from
extreme programming, namely test driven development, and discusses how it can
be adapted to verification, validation and integrity testing (V&V&I) of policy
and contract specifications. Since, the test-driven approach focuses on the
behavioral aspects and the drawn conclusions instead of the structure of the
rule base and the causes of faults, it is independent of the complexity of the
rule language and the system under test and thus much easier to use and
understand for the rule engineer and the user.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 11:50:24 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 08:50:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609120 | Adrian Paschke | Adrian Paschke | Rule-based Knowledge Representation for Service Level Agreement | Doctoral Symposium of 4th Conf. on Multiagent System Technologies
(MATES'06), Germany, 2006 | null | null | null | cs.AI cs.DB cs.LO cs.MA cs.SE | null | Automated management and monitoring of service contracts like Service Level
Agreements (SLAs) or higher-level policies is vital for efficient and reliable
distributed service-oriented architectures (SOA) with high quality of ser-vice
(QoS) levels. IT service provider need to manage, execute and maintain
thousands of SLAs for different customers and different types of services,
which needs new levels of flexibility and automation not available with the
current technol-ogy. I propose a novel rule-based knowledge representation (KR)
for SLA rules and a respective rule-based service level management (RBSLM)
framework. My rule-based approach based on logic programming provides several
advantages including automated rule chaining allowing for compact knowledge
representation and high levels of automation as well as flexibility to adapt to
rapidly changing business requirements. Therewith, I address an urgent need
service-oriented busi-nesses do have nowadays which is to dynamically change
their business and contractual logic in order to adapt to rapidly changing
business environments and to overcome the restricting nature of slow change
cycles.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 12:04:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609121 | Steven de Rooij | Steven de Rooij and Paul Vitanyi | Approximating Rate-Distortion Graphs of Individual Data: Experiments in
Lossy Compression and Denoising | 22 pages, submitted to IEEE transactions on information theory | null | null | null | cs.IT math.IT | null | Classical rate-distortion theory requires knowledge of an elusive source
distribution. Instead, we analyze rate-distortion properties of individual
objects using the recently developed algorithmic rate-distortion theory. The
latter is based on the noncomputable notion of Kolmogorov complexity. To apply
the theory we approximate the Kolmogorov complexity by standard data
compression techniques, and perform a number of experiments with lossy
compression and denoising of objects from different domains. We also introduce
a natural generalization to lossy compression with side information. To
maintain full generality we need to address a difficult searching problem.
While our solutions are therefore not time efficient, we do observe good
denoising and compression performance.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 12:13:49 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"de Rooij",
"Steven",
""
],
[
"Vitanyi",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609122 | Melda Yuksel | Melda Yuksel, Elza Erkip | Multi-Antenna Cooperative Wireless Systems: A Diversity-Multiplexing
Tradeoff Perspective | version 1: 58 pages, 15 figures, Submitted to IEEE Transactions on
Information Theory, version 2: Final version, to appear IEEE IT, title
changed, extra figures added | null | null | null | cs.IT math.IT | null | We consider a general multiple antenna network with multiple sources,
multiple destinations and multiple relays in terms of the
diversity-multiplexing tradeoff (DMT). We examine several subcases of this most
general problem taking into account the processing capability of the relays
(half-duplex or full-duplex), and the network geometry (clustered or
non-clustered). We first study the multiple antenna relay channel with a
full-duplex relay to understand the effect of increased degrees of freedom in
the direct link. We find DMT upper bounds and investigate the achievable
performance of decode-and-forward (DF), and compress-and-forward (CF)
protocols. Our results suggest that while DF is DMT optimal when all terminals
have one antenna each, it may not maintain its good performance when the
degrees of freedom in the direct link is increased, whereas CF continues to
perform optimally. We also study the multiple antenna relay channel with a
half-duplex relay. We show that the half-duplex DMT behavior can significantly
be different from the full-duplex case. We find that CF is DMT optimal for
half-duplex relaying as well, and is the first protocol known to achieve the
half-duplex relay DMT. We next study the multiple-access relay channel (MARC)
DMT. Finally, we investigate a system with a single source-destination pair and
multiple relays, each node with a single antenna, and show that even under the
idealistic assumption of full-duplex relays and a clustered network, this
virtual multi-input multi-output (MIMO) system can never fully mimic a real
MIMO DMT. For cooperative systems with multiple sources and multiple
destinations the same limitation remains to be in effect.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2006 23:00:59 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Jul 2007 03:57:23 GMT"
}
] | 2007-07-22T00:00:00 | [
[
"Yuksel",
"Melda",
""
],
[
"Erkip",
"Elza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609123 | Xiang Huang | Xiang Huang, Xiaolin Wu | Optimal Design of Multiple Description Lattice Vector Quantizers | Submitted to IEEE Trans. on Information Theory, Sep 2006 (30 pages, 7
figures) | null | null | null | cs.IT math.IT | null | In the design of multiple description lattice vector quantizers (MDLVQ),
index assignment plays a critical role. In addition, one also needs to choose
the Voronoi cell size of the central lattice v, the sublattice index N, and the
number of side descriptions K to minimize the expected MDLVQ distortion, given
the total entropy rate of all side descriptions Rt and description loss
probability p. In this paper we propose a linear-time MDLVQ index assignment
algorithm for any K >= 2 balanced descriptions in any dimensions, based on a
new construction of so-called K-fraction lattice. The algorithm is greedy in
nature but is proven to be asymptotically (N -> infinity) optimal for any K >=
2 balanced descriptions in any dimensions, given Rt and p. The result is
stronger when K = 2: the optimality holds for finite N as well, under some mild
conditions. For K > 2, a local adjustment algorithm is developed to augment the
greedy index assignment, and conjectured to be optimal for finite N.
Our algorithmic study also leads to better understanding of v, N and K in
optimal MDLVQ design. For K = 2 we derive, for the first time, a
non-asymptotical closed form expression of the expected distortion of optimal
MDLVQ in p, Rt, N. For K > 2, we tighten the current asymptotic formula of the
expected distortion, relating the optimal values of N and K to p and Rt more
precisely.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 02:14:03 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Huang",
"Xiang",
""
],
[
"Wu",
"Xiaolin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609124 | Micaela Mayero | Micaela Mayero (INRIA Futurs) | The Three Gap Theorem (Steinhauss Conjecture) | null | Types for Proofs and Programs: International Workshop, TYPES'99,
L\"{o}keberg, Sweden, June 1999. Selected Papers (2000) 162 | null | null | cs.LO | null | We deal with the distribution of N points placed consecutively around the
circle by a fixed angle of a. From the proof of Tony van Ravenstein, we propose
a detailed proof of the Steinhaus conjecture whose result is the following: the
N points partition the circle into gaps of at most three different lengths. We
study the mathematical notions required for the proof of this theorem revealed
during a formal proof carried out in Coq.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 11:30:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mayero",
"Micaela",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0609125 | Goren Gordon | Goren Gordon and Uri Einziger-Lowicz | Problem Evolution: A new approach to problem solving systems | 10 pages, 2 figures | null | null | null | cs.NE | null | In this paper we present a novel tool to evaluate problem solving systems.
Instead of using a system to solve a problem, we suggest using the problem to
evaluate the system. By finding a numerical representation of a problem's
complexity, one can implement genetic algorithm to search for the most complex
problem the given system can solve. This allows a comparison between different
systems that solve the same set of problems. In this paper we implement this
approach on pattern recognition neural networks to try and find the most
complex pattern a given configuration can solve. The complexity of the pattern
is calculated using linguistic complexity. The results demonstrate the power of
the problem evolution approach in ranking different neural network
configurations according to their pattern recognition abilities. Future
research and implementations of this technique are also discussed.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 12:40:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gordon",
"Goren",
""
],
[
"Einziger-Lowicz",
"Uri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0609126 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Simeon Warner, Paul Ginsparg,
Guenther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Donna Thompson,
Elizabeth Bohlen, Stephen S. Murray | E-prints and Journal Articles in Astronomy: a Productive Co-existence | 8 pages, 4 figures, submitted to Learned Publishing | Learn.Publ.20:16-22,2007 | 10.1087/095315107779490661 | null | cs.DL astro-ph | null | Are the e-prints (electronic preprints) from the arXiv repository being used
instead of the journal articles? In this paper we show that the e-prints have
not undermined the usage of journal papers in the astrophysics community. As
soon as the journal article is published, the astronomical community prefers to
read the journal article and the use of e-prints through the NASA Astrophysics
Data System drops to zero. This suggests that the majority of astronomers have
access to institutional subscriptions and that they choose to read the journal
article when given the choice. Within the NASA Astrophysics Data System they
are given this choice, because the e-print and the journal article are treated
equally, since both are just one click away. In other words, the e-prints have
not undermined journal use in the astrophysics community and thus currently do
not pose a financial threat to the publishers. We present readership data for
the arXiv category "astro-ph" and the 4 core journals in astronomy
(Astrophysical Journal, Astronomical Journal, Monthly Notices of the Royal
Astronomical Society and Astronomy & Astrophysics). Furthermore, we show that
the half-life (the point where the use of an article drops to half the use of a
newly published article) for an e-print is shorter than for a journal paper.
The ADS is funded by NASA Grant NNG06GG68G. arXiv receives funding from NSF
award #0404553
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 14:16:00 GMT"
}
] | 2009-04-09T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Warner",
"Simeon",
""
],
[
"Ginsparg",
"Paul",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null
] |
cs/0609127 | Ethan Kim | Anil Ada, Melanie Coggan, Paul Di Marco, Alain Doyon, Liam Flookes,
Samuli Heilala, Ethan Kim, Jonathan Li On Wing, Louis-Francois
Preville-Ratelle, Sue Whitesides, and Nuo Yu | On Bus Graph Realizability | Tech Report in School of Computer Science, McGill University Poster
version of this paper was presented at the International Symposium on Graph
Drawing 2006 | null | null | SOCS-TR-2006.1 | cs.CG cs.DM | null | In this paper, we consider the following graph embedding problem: Given a
bipartite graph G = (V1; V2;E), where the maximum degree of vertices in V2 is
4, can G be embedded on a two dimensional grid such that each vertex in V1 is
drawn as a line segment along a grid line, each vertex in V2 is drawn as a
point at a grid point, and each edge e = (u; v) for some u 2 V1 and v 2 V2 is
drawn as a line segment connecting u and v, perpendicular to the line segment
for u? We show that this problem is NP-complete, and sketch how our proof
techniques can be used to show the hardness of several other related problems.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 18:01:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ada",
"Anil",
""
],
[
"Coggan",
"Melanie",
""
],
[
"Di Marco",
"Paul",
""
],
[
"Doyon",
"Alain",
""
],
[
"Flookes",
"Liam",
""
],
[
"Heilala",
"Samuli",
""
],
[
"Kim",
"Ethan",
""
],
[
"Wing",
"Jonathan Li On",
""
],
[
"Preville-Ratelle",
"Louis-Francois",
""
],
[
"Whitesides",
"Sue",
""
],
[
"Yu",
"Nuo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0609128 | Marcin Kaminski | Josep Diaz and Marcin Kaminski | Max-Cut and Max-Bisection are NP-hard on unit disk graphs | null | null | null | null | cs.DS cs.CC | null | We prove that the Max-Cut and Max-Bisection problems are NP-hard on unit disk
graphs. We also show that $\lambda$-precision graphs are planar for $\lambda$ >
1 / \sqrt{2}$.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 18:17:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaz",
"Josep",
""
],
[
"Kaminski",
"Marcin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0609129 | Alessandro Rosa | Alessandro Rosa | One approach to the digital visualization of hedgehogs in holomorphic
dynamics | 29 pages, 51 figures | Electronic Journal of Differential Equations and Control
Processes, n.1, 2007 | null | null | cs.MS math.DS | null | In the field of holomorphic dynamics in one complex variable, hedgehog is the
local invariant set arising about a Cremer point and endowed with a very
complicate shape as well as relating to very weak numerical conditions. We give
a solution to the open problem of its digital visualization, featuring either a
time saving approach and a far-reaching insight.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2006 18:53:17 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Sep 2006 23:11:02 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Rosa",
"Alessandro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
cs/0609130 | Salvatore Caporaso | Salvatore Caporaso | A Predicative Harmonization of the Time and Provable Hierarchies | 11 pages | null | null | null | cs.LO cs.CC | null | A decidable transfinite hierarchy is defined by assigning ordinals to the
programs of an imperative language. It singles out: the classes TIMEF(n^c) and
TIMEF(n_c); the finite Grzegorczyk classes at and above the elementary level,
and the \Sigma_k-IND fragments of PA. Limited operators, diagonalization, and
majorization functions are not used.
| [
{
"version": "v1",
"created": "Sat, 23 Sep 2006 14:28:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caporaso",
"Salvatore",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0609131 | Ran Ren | Ran Ren, Madan mohan Manokar, Yaogang Shi, Baoyu Zheng | A Fast Block Matching Algorithm for Video Motion Estimation Based on
Particle Swarm Optimization and Motion Prejudgment | 10 pages, 12 figures, submitted to ACM Symposium of Applied
Computing(SAC) | null | null | null | cs.MM | null | In this paper, we propose a fast 2-D block-based motion estimation algorithm
called Particle Swarm Optimization - Zero-motion Prejudgment(PSO-ZMP) which
consists of three sequential routines: 1)Zero-motion prejudgment. The routine
aims at finding static macroblocks(MB) which do not need to perform remaining
search thus reduces the computational cost; 2)Predictive image coding and 3)PSO
matching routine. Simulation results obtained show that the proposed PSO-ZMP
algorithm achieves over 10 times of computation less than Diamond Search(DS)
and 5 times less than the recent proposed Adaptive Rood Pattern
Searching(ARPS). Meanwhile the PSNR performances using PSO-ZMP are very close
to that using DS and ARPS in some less-motioned sequences. While in some
sequences containing dense and complex motion contents, the PSNR performances
of PSO-ZMP are several dB lower than that using DS and ARPS but in an
acceptable degree.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 09:55:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ren",
"Ran",
""
],
[
"Manokar",
"Madan mohan",
""
],
[
"Shi",
"Yaogang",
""
],
[
"Zheng",
"Baoyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0609132 | Jochen Gruber | Jochen Gruber | Semantic Description of Parameters in Web Service Annotations | 7 pages, 3 figures | null | null | null | cs.AI | null | A modification of OWL-S regarding parameter description is proposed. It is
strictly based on Description Logic. In addition to class description of
parameters it also allows the modelling of relations between parameters and the
precise description of the size of data to be supplied to a service. In
particular, it solves two major issues identified within current proposals for
a Semantic Web Service annotation standard.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 17:29:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gruber",
"Jochen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0609133 | Adeline Nazarenko | Touria A\"it El Mekki (LERIA), Adeline Nazarenko (LIPN) | An application-oriented terminology evaluation: the case of back-of-the
book indexes | 4 pages | Workshop on Terminology design: quality criteria and evaluation
methods (TermEval), Italie (2006) 18-21 | null | null | cs.AI cs.IR | null | This paper addresses the problem of computational terminology evaluation not
per se but in a specific application context. This paper describes the
evaluation procedure that has been used to assess the validity of our overall
indexing approach and the quality of the IndDoc indexing tool. Even if
user-oriented extended evaluation is irreplaceable, we argue that early
evaluations are possible and they are useful for development guidance.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 19:59:20 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Mekki",
"Touria Aït El",
"",
"LERIA"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609134 | Adeline Nazarenko | Touria A\"it El Mekki (LIPN), Adeline Nazarenko (LERIA) | Using NLP to build the hypertextuel network of a back-of-the-book index | null | Proceedings of the International Conference on Recent Advances in
Natural Language Processing (RANLP) (2005) 316-320 | null | null | cs.AI cs.IR | null | Relying on the idea that back-of-the-book indexes are traditional devices for
navigation through large documents, we have developed a method to build a
hypertextual network that helps the navigation in a document. Building such an
hypertextual network requires selecting a list of descriptors, identifying the
relevant text segments to associate with each descriptor and finally ranking
the descriptors and reference segments by relevance order. We propose a
specific document segmentation method and a relevance measure for information
ranking. The algorithms are tested on 4 corpora (of different types and
domains) without human intervention or any semantic knowledge.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 20:00:58 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Mekki",
"Touria Aït El",
"",
"LIPN"
],
[
"Nazarenko",
"Adeline",
"",
"LERIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609135 | Adeline Nazarenko | Erick Alphonse (MIG), Sophie Aubin (LIPN), Philippe Bessi\`eres (MIG),
Gilles Bisson (Leibniz - IMAG), Thierry Hamon (LIPN), Sandrine Lagarrigue
(INRA-ENSAR), Adeline Nazarenko (LIPN), Alain-Pierre Manine (MIG), Claire
N\'edellec (MIG), Mohamed Ould Abdel Vetah (MIG), Thierry Poibeau (LIPN),
Davy Weissenbacher (LIPN) | Event-based Information Extraction for the biomedical domain: the
Caderige project | null | Proceedings of the International Joint Workshop on Natural
Language Processing in Biomedicine and Its Applications (COLING'04), Suisse
(2004) 43-39 | null | null | cs.AI cs.IR | null | This paper gives an overview of the Caderige project. This project involves
teams from different areas (biology, machine learning, natural language
processing) in order to develop high-level analysis tools for extracting
structured information from biological bibliographical databases, especially
Medline. The paper gives an overview of the approach and compares it to the
state of the art.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 20:03:06 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Alphonse",
"Erick",
"",
"MIG"
],
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Bessières",
"Philippe",
"",
"MIG"
],
[
"Bisson",
"Gilles",
"",
"Leibniz - IMAG"
],
[
"Hamon",
"Thierry",
"",
"LIPN"
],
[
"Lagarrigue",
"Sandrine",
"",
"INRA-ENSAR"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
],
[
"Manine",
"Alain-Pierre",
"",
"MIG"
],
[
"Nédellec",
"Claire",
"",
"MIG"
],
[
"Vetah",
"Mohamed Ould Abdel",
"",
"MIG"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
],
[
"Weissenbacher",
"Davy",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609136 | Adeline Nazarenko | Adeline Nazarenko (LIPN), Erick Alphonse (LIPN), Julien Derivi\`ere
(LIPN), Thierry Hamon (LIPN), Guillaume Vauvert (LIPN), Davy Weissenbacher
(LIPN) | The ALVIS Format for Linguistically Annotated Documents | null | Proceedings of the fifth international conference on Language
Resources and Evaluation, LREC 2006 (2006) 1782-1786 | null | null | cs.AI | null | The paper describes the ALVIS annotation format designed for the indexing of
large collections of documents in topic-specific search engines. This paper is
exemplified on the biological domain and on MedLine abstracts, as developing a
specialized search engine for biologists is one of the ALVIS case studies. The
ALVIS principle for linguistic annotations is based on existing works and
standard propositions. We made the choice of stand-off annotations rather than
inserted mark-up. Annotations are encoded as XML elements which form the
linguistic subsection of the document record.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 20:04:01 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Nazarenko",
"Adeline",
"",
"LIPN"
],
[
"Alphonse",
"Erick",
"",
"LIPN"
],
[
"Derivière",
"Julien",
"",
"LIPN"
],
[
"Hamon",
"Thierry",
"",
"LIPN"
],
[
"Vauvert",
"Guillaume",
"",
"LIPN"
],
[
"Weissenbacher",
"Davy",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0609137 | Adeline Nazarenko | Claire N\'edellec (MIG), Adeline Nazarenko (LIPN) | Ontologies and Information Extraction | null | LIPN Internal Report (2005) | null | null | cs.AI cs.IR | null | This report argues that, even in the simplest cases, IE is an ontology-driven
process. It is not a mere text filtering method based on simple pattern
matching and keywords, because the extracted pieces of texts are interpreted
with respect to a predefined partial domain model. This report shows that
depending on the nature and the depth of the interpretation to be done for
extracting the information, more or less knowledge must be involved. This
report is mainly illustrated in biology, a domain in which there are critical
needs for content-based exploration of the scientific literature and which
becomes a major application domain for IE.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 20:10:35 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Nédellec",
"Claire",
"",
"MIG"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0609138 | Teemu Roos | Teemu Roos, Petri Myllym\"aki, Jorma Rissanen | MDL Denoising Revisited | Submitted to IEEE Transactions on Information Theory, June 2006 | null | 10.1109/TSP.2009.2021633 | null | cs.IT math.IT | null | We refine and extend an earlier MDL denoising criterion for wavelet-based
denoising. We start by showing that the denoising problem can be reformulated
as a clustering problem, where the goal is to obtain separate clusters for
informative and non-informative wavelet coefficients, respectively. This
suggests two refinements, adding a code-length for the model index, and
extending the model in order to account for subband-dependent coefficient
distributions. A third refinement is derivation of soft thresholding inspired
by predictive universal coding with weighted mixtures. We propose a practical
method incorporating all three refinements, which is shown to achieve good
performance and robustness in denoising both artificial and natural signals.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2006 12:12:25 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Roos",
"Teemu",
""
],
[
"Myllymäki",
"Petri",
""
],
[
"Rissanen",
"Jorma",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609139 | Sekhar Tatikonda | Sekhar Tatikonda and Sanjoy Mitter | The Capacity of Channels with Feedback | null | null | null | null | cs.IT math.IT | null | We introduce a general framework for treating channels with memory and
feedback. First, we generalize Massey's concept of directed information and use
it to characterize the feedback capacity of general channels. Second, we
present coding results for Markov channels. This requires determining
appropriate sufficient statistics at the encoder and decoder. Third, a dynamic
programming framework for computing the capacity of Markov channels is
presented. Fourth, it is shown that the average cost optimality equation (ACOE)
can be viewed as an implicit single-letter characterization of the capacity.
Fifth, scenarios with simple sufficient statistics are described.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2006 14:04:12 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Tatikonda",
"Sekhar",
""
],
[
"Mitter",
"Sanjoy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609140 | Baris Perk E | Baris E. Perk, J. J. E. Slotine | Motion Primitives for Robotic Flight Control | The paper has been revised with small editorial changes and updated
references | null | null | null | cs.RO cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a simple framework for learning aggressive maneuvers in flight
control of UAVs. Having inspired from biological environment, dynamic movement
primitives are analyzed and extended using nonlinear contraction theory.
Accordingly, primitives of an observed movement are stably combined and
concatenated. We demonstrate our results experimentally on the Quanser
Helicopter, in which we first imitate aggressive maneuvers and then use them as
primitives to achieve new maneuvers that can fly over an obstacle.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2006 19:06:59 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Oct 2008 14:08:17 GMT"
}
] | 2008-10-15T00:00:00 | [
[
"Perk",
"Baris E.",
""
],
[
"Slotine",
"J. J. E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0609141 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: A Minimal O(n) Test | 14 pages | null | null | null | cs.CG cs.CC math.CO math.MG | null | An O(n) test for polygon convexity is stated and proved. It is also proved
that the test is minimal in a certain exact sense.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2006 19:23:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
cs/0609142 | Bruno Scherrer | Bruno Scherrer (INRIA Lorraine - LORIA) | Modular self-organization | null | null | null | null | cs.AI | null | The aim of this paper is to provide a sound framework for addressing a
difficult problem: the automatic construction of an autonomous agent's modular
architecture. We combine results from two apparently uncorrelated domains:
Autonomous planning through Markov Decision Processes and a General Data
Clustering Approach using a kernel-like method. Our fundamental idea is that
the former is a good framework for addressing autonomy whereas the latter
allows to tackle self-organizing problems.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 07:52:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Scherrer",
"Bruno",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0609143 | Adrian Paschke | Adrian Paschke | ECA-LP / ECA-RuleML: A Homogeneous Event-Condition-Action Logic
Programming Language | Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and
Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA,
Nov. 2006 | Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and
Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA,
Nov. 2006 | null | null | cs.AI cs.LO cs.SE | null | Event-driven reactive functionalities are an urgent need in nowadays
distributed service-oriented applications and (Semantic) Web-based
environments. An important problem to be addressed is how to correctly and
efficiently capture and process the event-based behavioral, reactive logic
represented as ECA rules in combination with other conditional decision logic
which is represented as derivation rules. In this paper we elaborate on a
homogeneous integration approach which combines derivation rules, reaction
rules (ECA rules) and other rule types such as integrity constraint into the
general framework of logic programming. The developed ECA-LP language provides
expressive features such as ID-based updates with support for external and
self-updates of the intensional and extensional knowledge, transac-tions
including integrity testing and an event algebra to define and process complex
events and actions based on a novel interval-based Event Calculus variant.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 14:36:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609144 | Richard McClatchey | E. Jimenez-Ruiz, R. Berlanga, I. Sanz, R. McClatchey, R. Danger, D.
Manset, J. Paraire, A. Rios | The Management and Integration of Biomedical Knowledge: Application in
the Health-e-Child Project (Position Paper) | 6 pages; 2 figures. Proceedings of the 1st International Workshop on
Ontology content and evaluation in Enterprise | null | null | null | cs.DB | null | The Health-e-Child project aims to develop an integrated healthcare platform
for European paediatrics. In order to achieve a comprehensive view of childrens
health, a complex integration of biomedical data, information, and knowledge is
necessary. Ontologies will be used to formally define this domain knowledge and
will form the basis for the medical knowledge management system. This paper
introduces an innovative methodology for the vertical integration of biomedical
knowledge. This approach will be largely clinician-centered and will enable the
definition of ontology fragments, connections between them (semantic bridges)
and enriched ontology fragments (views). The strategy for the specification and
capture of fragments, bridges and views is outlined with preliminary examples
demonstrated in the collection of biomedical information from hospital
databases, biomedical ontologies, and biomedical public databases.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 15:21:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jimenez-Ruiz",
"E.",
""
],
[
"Berlanga",
"R.",
""
],
[
"Sanz",
"I.",
""
],
[
"McClatchey",
"R.",
""
],
[
"Danger",
"R.",
""
],
[
"Manset",
"D.",
""
],
[
"Paraire",
"J.",
""
],
[
"Rios",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0609145 | Alexandre d'Aspremont | Alexandre d'Aspremont, Laurent El Ghaoui | A Semidefinite Relaxation for Air Traffic Flow Scheduling | Submitted to RIVF 2007 | null | null | null | cs.CE | null | We first formulate the problem of optimally scheduling air traffic low with
sector capacity constraints as a mixed integer linear program. We then use
semidefinite relaxation techniques to form a convex relaxation of that problem.
Finally, we present a randomization algorithm to further improve the quality of
the solution. Because of the specific structure of the air traffic flow
problem, the relaxation has a single semidefinite constraint of size dn where d
is the maximum delay and n the number of flights.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 15:34:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
],
[
"Ghaoui",
"Laurent El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0609146 | Karunakaran Murali Krishnan | K. Murali Krishnan, Rajdeep Singh, L. Sunil Chandran and Priti Shankar | A Combinatorial Family of Near Regular LDPC Codes | 5 pages 3 figures | ISIT 2007 | null | null | cs.IT math.IT | null | An elementary combinatorial Tanner graph construction for a family of
near-regular low density parity check codes achieving high girth is presented.
The construction allows flexibility in the choice of design parameters like
rate, average degree, girth and block length of the code and yields an
asymptotic family. The complexity of constructing codes in the family grows
only quadratically with the block length.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 17:20:43 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Krishnan",
"K. Murali",
""
],
[
"Singh",
"Rajdeep",
""
],
[
"Chandran",
"L. Sunil",
""
],
[
"Shankar",
"Priti",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609147 | Marius Marin | Marius Marin, Arie van Deursen, Leon Moonen | Identifying Crosscutting Concerns Using Fan-in Analysis | 34+4 pages; Extended version [Marin et al. 2004a] | ACM Transactions on Software Engineering and Methodology, 2007 | null | TUD-SERG-2006-013 | cs.SE | null | Aspect mining is a reverse engineering process that aims at finding
crosscutting concerns in existing systems. This paper proposes an aspect mining
approach based on determining methods that are called from many different
places, and hence have a high fan-in, which can be seen as a symptom of
crosscutting functionality. The approach is semi-automatic, and consists of
three steps: metric calculation, method filtering, and call site analysis.
Carrying out these steps is an interactive process supported by an Eclipse
plug-in called FINT. Fan-in analysis has been applied to three open source Java
systems, totaling around 200,000 lines of code. The most interesting concerns
identified are discussed in detail, which includes several concerns not
previously discussed in the aspect-oriented literature. The results show that a
significant number of crosscutting concerns can be recognized using fan-in
analysis, and each of the three steps can be supported by tools.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 17:50:19 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Feb 2007 17:44:02 GMT"
}
] | 2007-06-27T00:00:00 | [
[
"Marin",
"Marius",
""
],
[
"van Deursen",
"Arie",
""
],
[
"Moonen",
"Leon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0609148 | Roxana Smarandache | Roxana Smarandache, Ali E. Pusane, Pascal O. Vontobel, Daniel J.
Costello Jr | Pseudo-Codeword Performance Analysis for LDPC Convolutional Codes | 26 pages, 6 figures, 2 tables | null | null | null | cs.IT math.IT | null | Message-passing iterative decoders for low-density parity-check (LDPC) block
codes are known to be subject to decoding failures due to so-called
pseudo-codewords. These failures can cause the large signal-to-noise ratio
performance of message-passing iterative decoding to be worse than that
predicted by the maximum-likelihood decoding union bound. In this paper we
address the pseudo-codeword problem from the convolutional-code perspective. In
particular, we compare the performance of LDPC convolutional codes with that of
their ``wrapped'' quasi-cyclic block versions and we show that the minimum
pseudo-weight of an LDPC convolutional code is at least as large as the minimum
pseudo-weight of an underlying quasi-cyclic code. This result, which parallels
a well-known relationship between the minimum Hamming weight of convolutional
codes and the minimum Hamming weight of their quasi-cyclic counterparts, is due
to the fact that every pseudo-codeword in the convolutional code induces a
pseudo-codeword in the block code with pseudo-weight no larger than that of the
convolutional code's pseudo-codeword. This difference in the weight spectra
leads to improved performance at low-to-moderate signal-to-noise ratios for the
convolutional code, a conclusion supported by simulation results.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 02:27:52 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Smarandache",
"Roxana",
""
],
[
"Pusane",
"Ali E.",
""
],
[
"Vontobel",
"Pascal O.",
""
],
[
"Costello",
"Daniel J.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609149 | Qing Zhao | Qing Zhao and Brian M. Sadler | Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory
Policy | 20 pages, 7 figures, submitted to IEEE Signal Processing Magazine | null | null | null | cs.NI | null | In this article, we first provide a taxonomy of dynamic spectrum access. We
then focus on opportunistic spectrum access, the overlay approach under the
hierarchical access model of dynamic spectrum access. we aim to provide an
overview of challenges and recent developments in both technological and
regulatory aspects of opportunistic spectrum access.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 08:05:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhao",
"Qing",
""
],
[
"Sadler",
"Brian M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609150 | Eric Rondeau | Belynda Brahimi (CRAN), Christophe Aubrun (CRAN), Eric Rondeau (CRAN) | Modelling and Simulation of Scheduling Policies Implemented in Ethernet
Switch by Using Coloured Petri Nets | 8 pages | 11th IEEE International Conference on Emerging Technologies and
Factory Automation, Tch\`{e}que, R\'{e}publique (2006) 667 - 674 | null | null | cs.NI | null | The objective of this paper is to propose models enabling to study the
behaviour of Ethernet switch for Networked Control Systems. Two scheduler
policies are analyzed: the static priority and the WRR (Weighted Round Robin).
The modelling work is based on Coloured Petri Nets. A temporal validation step
based on the simulation of these modelling, shows that the obtained results are
near to the expected behaviour of these scheduler policies.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 07:59:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brahimi",
"Belynda",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609151 | Eric Rondeau | Nikolai Vatanski, Jean-Philippe Georges (CRAN), Christophe Aubrun
(CRAN), Eric Rondeau (CRAN), Sirkka-Liisa J\"ams\"a Jounela | Control compensation based on upper bound delay in networked control
systems | 6 pages | 17th International Symposium on Mathematical Theory of Networks
and Systems (MTNS), Japon (2006) | null | null | cs.NI | null | Recent interest in networked control systems (NCS) has instigated research in
both communication networks and control. Analysis of NCSs has usually been
performed from either the network or the control point of view, but not many
papers exist where the analysis of both is done in the same context. In this
paper an overall analysis of the networked control system is presented. First,
the procedure of obtaining the upper bound delay value for packet transmission
in the switched Ethernet network is presented. Next, the obtained delay
estimate is utilised in delay compensation for improving the Quality of
Performance (QoP) of the control systems. The presented upper bound delay
algorithm applies ideas from network calculus theory. For the improvement of
QoP, two delay compensation strategies, the Smith predictor based and the
robust control based delay compensation strategies, are presented and compared.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 08:00:24 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Vatanski",
"Nikolai",
"",
"CRAN"
],
[
"Georges",
"Jean-Philippe",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
],
[
"Jounela",
"Sirkka-Liisa Jämsä",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609152 | Eric Rondeau | Jean-Philippe Georges (CRAN), Nikolai Vatanski, Eric Rondeau (CRAN),
Sirkka-Liisa J\"ams\"a Jounela | Use of upper bound delay estimate in stability analysis and robust
control compensation in networked control systems | 6 pages | 12th IFAC Symposium on Information Control Problems in
Manufacturing, INCOM 2006, St-Etienne, France (16/05/2006) CDROM | null | null | cs.NI | null | Recent interest in networked control systems (NCS) has instigated research in
various areas of both communication networks and control. The analysis of NCS
has often been performed either from the network, or the control point of view
and not many papers exist were the analysis of both is done in the same
context. Here a simple overall analysis is presented. In the paper the
procedure of obtaining the upper bound delay value in the switched Ethernet
network is proposed and the obtained delay estimate is used in stability
analysis of the feedback loop and in the control compensation. The upper bound
delay algorithm is based on the network calculus theory, the stability analysis
uses the small gain theorem, and control compensating strategy is based on
Smith predictor, where however the upper bound delay is utilised in obtaining
the delay estimate.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 13:27:44 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Georges",
"Jean-Philippe",
"",
"CRAN"
],
[
"Vatanski",
"Nikolai",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
],
[
"Jounela",
"Sirkka-Liisa Jämsä",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0609153 | Pavel Dmitriev | Pavel Dmitriev, Carl Lagoze | Mining Generalized Graph Patterns based on User Examples | 11 pages, 11 figures. A short version of this paper appears in
proceedings of ICDM-2006 conference | null | null | null | cs.DS cs.LG | null | There has been a lot of recent interest in mining patterns from graphs.
Often, the exact structure of the patterns of interest is not known. This
happens, for example, when molecular structures are mined to discover fragments
useful as features in chemical compound classification task, or when web sites
are mined to discover sets of web pages representing logical documents. Such
patterns are often generated from a few small subgraphs (cores), according to
certain generalization rules (GRs). We call such patterns "generalized
patterns"(GPs). While being structurally different, GPs often perform the same
function in the network. Previously proposed approaches to mining GPs either
assumed that the cores and the GRs are given, or that all interesting GPs are
frequent. These are strong assumptions, which often do not hold in practical
applications. In this paper, we propose an approach to mining GPs that is free
from the above assumptions. Given a small number of GPs selected by the user,
our algorithm discovers all GPs similar to the user examples. First, a machine
learning-style approach is used to find the cores. Second, generalizations of
the cores in the graph are computed to identify GPs. Evaluation on synthetic
data, generated using real cores and GRs from biological and web domains,
demonstrates effectiveness of our approach.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 18:42:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dmitriev",
"Pavel",
""
],
[
"Lagoze",
"Carl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0609154 | Michael Chertkov | Michael Chertkov and Vladimir Y. Chernyak | Loop Calculus Helps to Improve Belief Propagation and Linear Programming
Decodings of Low-Density-Parity-Check Codes | 10 pages, 2 figures; Invited talk at 44-th annual Allerton Conference
on Communications, Control and Computing, Sep 27-Sep 29, 2006 | null | null | LAUR-06-6751 | cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT | null | We illustrate the utility of the recently developed loop calculus for
improving the Belief Propagation (BP) algorithm. If the algorithm that
minimizes the Bethe free energy fails we modify the free energy by accounting
for a critical loop in a graphical representation of the code. The
log-likelihood specific critical loop is found by means of the loop calculus.
The general method is tested using an example of the Linear Programming (LP)
decoding, that can be viewed as a special limit of the BP decoding. Considering
the (155,64,20) code that performs over Additive-White-Gaussian-Noise channel
we show that the loop calculus improves the LP decoding and corrects all
previously found dangerous configurations of log-likelihoods related to
pseudo-codewords with low effective distance, thus reducing the code's
error-floor.
| [
{
"version": "v1",
"created": "Thu, 28 Sep 2006 04:16:32 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chertkov",
"Michael",
""
],
[
"Chernyak",
"Vladimir Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609155 | Benjamin Belzer | Ying Zhu, Taikun Cheng, Krishnamoorthy Sivakumar, and Benjamin J.
Belzer | Detection of Markov Random Fields on Two-Dimensional Intersymbol
Interference Channels | 8 pages, 17 figures | null | null | null | cs.IT math.IT | null | We present a novel iterative algorithm for detection of binary Markov random
fields (MRFs) corrupted by two-dimensional (2D) intersymbol interference (ISI)
and additive white Gaussian noise (AWGN). We assume a first-order binary MRF as
a simple model for correlated images. We assume a 2D digital storage channel,
where the MRF is interleaved before being written and then read by a 2D
transducer; such channels occur in recently proposed optical disk storage
systems. The detection algorithm is a concatenation of two
soft-input/soft-output (SISO) detectors: an iterative row-column soft-decision
feedback (IRCSDF) ISI detector, and a MRF detector. The MRF detector is a SISO
version of the stochastic relaxation algorithm by Geman and Geman in IEEE
Trans. Pattern Anal. and Mach. Intell., Nov. 1984. On the 2 x 2 averaging-mask
ISI channel, at a bit error rate (BER) of 10^{-5}, the concatenated algorithm
achieves SNR savings of between 0.5 and 2.0 dB over the IRCSDF detector alone;
the savings increase as the MRFs become more correlated, or as the SNR
decreases. The algorithm is also fairly robust to mismatches between the
assumed and actual MRF parameters.
| [
{
"version": "v1",
"created": "Wed, 27 Sep 2006 23:47:00 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Zhu",
"Ying",
""
],
[
"Cheng",
"Taikun",
""
],
[
"Sivakumar",
"Krishnamoorthy",
""
],
[
"Belzer",
"Benjamin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609156 | Massoud Amini | Hadi Rahiminia, Massoud Amini | Entangled Graphs | Part of M.Sc. Thesis of the first author | null | null | null | cs.IT cs.DM math.IT | null | In this paper we prove a separability criterion for mixed states in $\mathbb
C^p\otimes\mathbb C^q$. We also show that the density matrix of a graph with
only one entangled edge is entangled.
| [
{
"version": "v1",
"created": "Thu, 28 Sep 2006 10:26:59 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rahiminia",
"Hadi",
""
],
[
"Amini",
"Massoud",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609157 | Mohammad Rezaeian | Mohammad Rezaeian | Sensor Scheduling for Optimal Observability Using Estimation Entropy | 5 pages, submitted to 2007 IEEE PerCom/PerSeNS conference | null | 10.1109/PERCOMW.2007.105 | null | cs.IT cs.AI math.IT | null | We consider sensor scheduling as the optimal observability problem for
partially observable Markov decision processes (POMDP). This model fits to the
cases where a Markov process is observed by a single sensor which needs to be
dynamically adjusted or by a set of sensors which are selected one at a time in
a way that maximizes the information acquisition from the process. Similar to
conventional POMDP problems, in this model the control action is based on all
past measurements; however here this action is not for the control of state
process, which is autonomous, but it is for influencing the measurement of that
process. This POMDP is a controlled version of the hidden Markov process, and
we show that its optimal observability problem can be formulated as an average
cost Markov decision process (MDP) scheduling problem. In this problem, a
policy is a rule for selecting sensors or adjusting the measuring device based
on the measurement history. Given a policy, we can evaluate the estimation
entropy for the joint state-measurement processes which inversely measures the
observability of state process for that policy. Considering estimation entropy
as the cost of a policy, we show that the problem of finding optimal policy is
equivalent to an average cost MDP scheduling problem where the cost function is
the entropy function over the belief space. This allows the application of the
policy iteration algorithm for finding the policy achieving minimum estimation
entropy, thus optimum observability.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 11:38:53 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Sep 2006 21:00:58 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Rezaeian",
"Mohammad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609158 | Kwok-Wo Wong | Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law | A Fast Image Encryption Scheme based on Chaotic Standard Map | 16 pages, 7 figures | null | null | null | cs.CR cs.MM | null | In recent years, a variety of effective chaos-based image encryption schemes
have been proposed. The typical structure of these schemes has the permutation
and the diffusion stages performed alternatively. The confusion and diffusion
effect is solely contributed by the permutation and the diffusion stage,
respectively. As a result, more overall rounds than necessary are required to
achieve a certain level of security. In this paper, we suggest to introduce
certain diffusion effect in the confusion stage by simple sequential
add-and-shift operations. The purpose is to reduce the workload of the
time-consuming diffusion part so that fewer overall rounds and hence a shorter
encryption time is needed. Simulation results show that at a similar
performance level, the proposed cryptosystem needs less than one-third the
encryption time of an existing cryptosystem. The effective acceleration of the
encryption speed is thus achieved.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 07:36:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wong",
"Kwok-Wo",
""
],
[
"Kwok",
"Bernie Sin-Hung",
""
],
[
"Law",
"Wing-Shing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0609159 | Maria Bras-Amor\'os | Maria Bras-Amor\'os, Michael E. O'Sullivan | Duality for Several Families of Evaluation Codes | Added references | null | null | null | cs.IT cs.DM math.IT | null | We consider generalizations of Reed-Muller codes, toric codes, and codes from
certain plane curves, such as those defined by norm and trace functions on
finite fields. In each case we are interested in codes defined by evaluating
arbitrary subsets of monomials, and in identifying when the dual codes are also
obtained by evaluating monomials. We then move to the context of order domain
theory, in which the subsets of monomials can be chosen to optimize decoding
performance using the Berlekamp-Massey-Sakata algorithm with majority voting.
We show that for the codes under consideration these subsets are well-behaved
and the dual codes are also defined by monomials.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 10:00:03 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Dec 2006 19:30:21 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Bras-Amorós",
"Maria",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609160 | Maria Bras-Amor\'os | Maria Bras-Amor\'os, Michael E. O'Sullivan | Redundancies of Correction-Capability-Optimized Reed-Muller Codes | null | null | null | null | cs.IT cs.DM math.IT | null | This article is focused on some variations of Reed-Muller codes that yield
improvements to the rate for a prescribed decoding performance under the
Berlekamp-Massey-Sakata algorithm with majority voting. Explicit formulas for
the redundancies of the new codes are given.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 10:13:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Bras-Amorós",
"Maria",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609161 | Maria Bras-Amor\'os | Maria Bras-Amor\'os, Michael E. O'Sullivan | The Order Bound on the Minimum Distance of the One-Point Codes
Associated to a Garcia-Stichtenoth Tower of Function Fields | A new section is added in which the order bound is derived | null | null | null | cs.IT cs.DM math.IT | null | Garcia and Stichtenoth discovered two towers of function fields that meet the
Drinfeld-Vl\u{a}du\c{t} bound on the ratio of the number of points to the
genus. For one of these towers, Garcia, Pellikaan and Torres derived a
recursive description of the Weierstrass semigroups associated to a tower of
points on the associated curves. In this article, a non-recursive description
of the semigroups is given and from this the enumeration of each of the
semigroups is derived as well as its inverse. This enables us to find an
explicit formula for the order (Feng-Rao) bound on the minimum distance of the
associated one-point codes.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 10:26:46 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Nov 2006 16:54:03 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Bras-Amorós",
"Maria",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609162 | Maria Bras-Amor\'os | Maria Bras-Amor\'os, Michael E. O'Sullivan | On Semigroups Generated by Two Consecutive Integers and Improved
Hermitian Codes | Added references | null | null | null | cs.IT cs.DM math.IT | null | Analysis of the Berlekamp-Massey-Sakata algorithm for decoding one-point
codes leads to two methods for improving code rate. One method, due to Feng and
Rao, removes parity checks that may be recovered by their majority voting
algorithm. The second method is to design the code to correct only those error
vectors of a given weight that are also geometrically generic. In this work,
formulae are given for the redundancies of Hermitian codes optimized with
respect to these criteria as well as the formula for the order bound on the
minimum distance. The results proceed from an analysis of numerical semigroups
generated by two consecutive integers. The formula for the redundancy of
optimal Hermitian codes correcting a given number of errors answers an open
question stated by Pellikaan and Torres in 1999.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 10:41:08 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Nov 2006 17:06:45 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Bras-Amorós",
"Maria",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0609163 | Shay Kutten | Amos Korman and Shay Kutten | Labeling Schemes with Queries | null | null | null | null | cs.DC | null | We study the question of ``how robust are the known lower bounds of labeling
schemes when one increases the number of consulted labels''. Let $f$ be a
function on pairs of vertices. An $f$-labeling scheme for a family of graphs
$\cF$ labels the vertices of all graphs in $\cF$ such that for every graph
$G\in\cF$ and every two vertices $u,v\in G$, the value $f(u,v)$ can be inferred
by merely inspecting the labels of $u$ and $v$.
This paper introduces a natural generalization: the notion of $f$-labeling
schemes with queries, in which the value $f(u,v)$ can be inferred by inspecting
not only the labels of $u$ and $v$ but possibly the labels of some additional
vertices. We show that inspecting the label of a single additional vertex (one
{\em query}) enables us to reduce the label size of many labeling schemes
significantly.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 12:31:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Korman",
"Amos",
""
],
[
"Kutten",
"Shay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0609164 | Ikuo Moritani | S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama | Conditional Expressions for Blind Deconvolution: Multi-point form | 4 pages, 3 figures, conference | null | null | null | cs.CV | null | We present conditional expression (CE) for finding blurs convolved in given
images. The CE is given in terms of the zero-values of the blurs evaluated at
multi-point. The CE can detect multiple blur all at once. We illustrate the
multiple blur-detection by using a test image.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 13:48:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aogaki",
"S.",
""
],
[
"Moritani",
"I.",
""
],
[
"Sugai",
"T.",
""
],
[
"Takeutchi",
"F.",
""
],
[
"Toyama",
"F. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0609165 | Ikuo Moritani | S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama | Simple method to eliminate blur based on Lane and Bates algorithm | 3 pages, 2 figures, conference | null | null | null | cs.CV | null | A simple search method for finding a blur convolved in a given image is
presented. The method can be easily extended to a large blur. The method has
been experimentally tested with a model blurred image.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 13:50:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aogaki",
"S.",
""
],
[
"Moritani",
"I.",
""
],
[
"Sugai",
"T.",
""
],
[
"Takeutchi",
"F.",
""
],
[
"Toyama",
"F. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0609166 | Xuan Zheng | Martin J. Strauss, Xuan Zheng | Private Approximate Heavy Hitters | 17 pages, submitted | null | null | null | cs.CR | null | We consider the problem of private computation of approximate Heavy Hitters.
Alice and Bob each hold a vector and, in the vector sum, they want to find the
B largest values along with their indices. While the exact problem requires
linear communication, protocols in the literature solve this problem
approximately using polynomial computation time, polylogarithmic communication,
and constantly many rounds. We show how to solve the problem privately with
comparable cost, in the sense that nothing is learned by Alice and Bob beyond
what is implied by their input, the ideal top-B output, and goodness of
approximation (equivalently, the Euclidean norm of the vector sum). We give
lower bounds showing that the Euclidean norm must leak by any efficient
algorithm.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 16:05:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Strauss",
"Martin J.",
""
],
[
"Zheng",
"Xuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0609167 | V\'ictor Cuevas | Mauricio Osorio and V\'ictor Cuevas | Updates in Answer Set Programming: An Approach Based on Basic Structural
Properties | 30 pages, to be published in Theory and Practice of Logic Programming | null | null | null | cs.LO | null | We have studied the update operator defined for update sequences by Eiter et
al. without tautologies and we have observed that it satisfies an interesting
property This property, which we call Weak Independence of Syntax (WIS), is
similar to one of the postulates proposed by Alchourron, Gardenfors, and
Makinson (AGM); only that in this case it applies to nonmonotonic logic. In
addition, we consider other five additional basic properties about update
programs and we show that the operator of Eiter et al. satisfies them. This
work continues the analysis of the AGM postulates under a refined view that
considers nelson logic as a monotonic logic which allows us to expand our
understanding of answer sets. Moreover, nelson logic helped us to derive an
alternative definition of the operator defined by Eiter et al. avoiding the use
of unnecessary extra atoms.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 17:00:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Osorio",
"Mauricio",
""
],
[
"Cuevas",
"Víctor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610001 | Kunihiko Sadakane | Daisuke Okanohara, Kunihiko Sadakane | Practical Entropy-Compressed Rank/Select Dictionary | null | null | null | null | cs.DS | null | Rank/Select dictionaries are data structures for an ordered set $S \subset
\{0,1,...,n-1\}$ to compute $\rank(x,S)$ (the number of elements in $S$ which
are no greater than $x$), and $\select(i,S)$ (the $i$-th smallest element in
$S$), which are the fundamental components of \emph{succinct data structures}
of strings, trees, graphs, etc. In those data structures, however, only
asymptotic behavior has been considered and their performance for real data is
not satisfactory. In this paper, we propose novel four Rank/Select
dictionaries, esp, recrank, vcode and sdarray, each of which is small if the
number of elements in $S$ is small, and indeed close to $nH_0(S)$ ($H_0(S) \leq
1$ is the zero-th order \textit{empirical entropy} of $S$) in practice, and its
query time is superior to the previous ones. Experimental results reveal the
characteristics of our data structures and also show that these data structures
are superior to existing implementations in both size and query time.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2006 23:52:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Okanohara",
"Daisuke",
""
],
[
"Sadakane",
"Kunihiko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0610002 | Ikuo Moritani | S. Aogaki, I. Moritani, T. Sugai, F. Takeutchi, and F.M. Toyama | Conditional Expressions for Blind Deconvolution: Derivative form | 5 page, 3 figures, conference | null | null | null | cs.CV | null | We developed novel conditional expressions (CEs) for Lane and Bates' blind
deconvolution. The CEs are given in term of the derivatives of the zero-values
of the z-transform of given images. The CEs make it possible to automatically
detect multiple blur convolved in the given images all at once without
performing any analysis of the zero-sheets of the given images. We illustrate
the multiple blur-detection by the CEs for a model image
| [
{
"version": "v1",
"created": "Sat, 30 Sep 2006 08:05:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aogaki",
"S.",
""
],
[
"Moritani",
"I.",
""
],
[
"Sugai",
"T.",
""
],
[
"Takeutchi",
"F.",
""
],
[
"Toyama",
"F. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0610003 | Ittai Abraham | Ittai Abraham, Yair Bartal, Ofer Neiman | Embedding Metrics into Ultrametrics and Graphs into Spanning Trees with
Constant Average Distortion | Extended abstrat apears in SODA 2007 | null | null | null | cs.DM | null | This paper addresses the basic question of how well can a tree approximate
distances of a metric space or a graph. Given a graph, the problem of
constructing a spanning tree in a graph which strongly preserves distances in
the graph is a fundamental problem in network design. We present scaling
distortion embeddings where the distortion scales as a function of $\epsilon$,
with the guarantee that for each $\epsilon$ the distortion of a fraction
$1-\epsilon$ of all pairs is bounded accordingly. Such a bound implies, in
particular, that the \emph{average distortion} and $\ell_q$-distortions are
small. Specifically, our embeddings have \emph{constant} average distortion and
$O(\sqrt{\log n})$ $\ell_2$-distortion. This follows from the following
results: we prove that any metric space embeds into an ultrametric with scaling
distortion $O(\sqrt{1/\epsilon})$. For the graph setting we prove that any
weighted graph contains a spanning tree with scaling distortion
$O(\sqrt{1/\epsilon})$. These bounds are tight even for embedding in arbitrary
trees.
For probabilistic embedding into spanning trees we prove a scaling distortion
of $\tilde{O}(\log^2 (1/\epsilon))$, which implies \emph{constant}
$\ell_q$-distortion for every fixed $q<\infty$.
| [
{
"version": "v1",
"created": "Sun, 1 Oct 2006 10:58:06 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Oct 2006 21:55:51 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Abraham",
"Ittai",
""
],
[
"Bartal",
"Yair",
""
],
[
"Neiman",
"Ofer",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0610004 | Francois Levy | G\'erard B\'echer (GREYC), Patrice Enjalbert (GREYC), Estelle Fiev\'e
(LIMSI), Laurent Gosselin (DS), Fran\c{c}ois L\'evy (LIPN), G\'erard Ligozat
(LIMSI) | Rapport technique du projet OGRE | 92 pages | null | null | null | cs.CL cs.AI | null | This repport concerns automatic understanding of (french) iterative
sentences, i.e. sentences where one single verb has to be interpreted by a more
or less regular plurality of events. A linguistic analysis is proposed along an
extension of Reichenbach's theory, several formal representations are
considered and a corpus of 18000 newspaper extracts is described.
| [
{
"version": "v1",
"created": "Sun, 1 Oct 2006 17:39:44 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Bécher",
"Gérard",
"",
"GREYC"
],
[
"Enjalbert",
"Patrice",
"",
"GREYC"
],
[
"Fievé",
"Estelle",
"",
"LIMSI"
],
[
"Gosselin",
"Laurent",
"",
"DS"
],
[
"Lévy",
"François",
"",
"LIPN"
],
[
"Ligozat",
"Gérard",
"",
"LIMSI"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610005 | Ran Ren | Ran Ren | Domain Wall Displacement Detection Technology Research Report | 4 pages, 0 figures | null | null | null | cs.OH | null | This article introduce a new data storage method called DWDD(Domain Wall
Displacement Detection) and tell you why it succeed.
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 04:38:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ren",
"Ran",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0610006 | Adrian Paschke | Adrian Paschke | A Typed Hybrid Description Logic Programming Language with Polymorphic
Order-Sorted DL-Typed Unification for Semantic Web Type Systems | Full technical report 12/05. Published inn: Proc. of 2nd Int.
Workshop on OWL: Experiences and Directions 2006 (OWLED'06) at ISWC'06,
Athens, Georgia, USA, 2006 | In: Proc. of 2nd Int. Workshop on OWL: Experiences and Directions
2006 (OWLED'06) at ISWC'06, Athens, Georgia, USA, 2006 | null | null | cs.AI | null | In this paper we elaborate on a specific application in the context of hybrid
description logic programs (hybrid DLPs), namely description logic Semantic Web
type systems (DL-types) which are used for term typing of LP rules based on a
polymorphic, order-sorted, hybrid DL-typed unification as procedural semantics
of hybrid DLPs. Using Semantic Web ontologies as type systems facilitates
interchange of domain-independent rules over domain boundaries via dynamically
typing and mapping of explicitly defined type ontologies.
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 08:57:54 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 21:36:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610007 | Guenther Eichhorn | G\"unther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Edwin A.
Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray | Full Text Searching in the Astrophysics Data System | To appear in Library and Information Systems in Astronomy V | null | null | null | cs.DL astro-ph cs.DB | null | The Smithsonian/NASA Astrophysics Data System (ADS) provides a search system
for the astronomy and physics scholarly literature. All major and many smaller
astronomy journals that were published on paper have been scanned back to
volume 1 and are available through the ADS free of charge. All scanned pages
have been converted to text and can be searched through the ADS Full Text
Search System. In addition, searches can be fanned out to several external
search systems to include the literature published in electronic form. Results
from the different search systems are combined into one results list.
The ADS Full Text Search System is available at:
http://adsabs.harvard.edu/fulltext_service.html
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 14:51:45 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Oct 2006 13:11:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eichhorn",
"Günther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin A.",
""
],
[
"Thompson",
"Donna M.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null,
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0610008 | Guenther Eichhorn | G\"unther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Edwin A.
Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray | Connectivity in the Astronomy Digital Library | To appear in Library and Information Systems in Astronomy V | null | null | null | cs.DL astro-ph cs.DB | null | The Astrophysics Data System (ADS) provides an extensive system of links
between the literature and other on-line information. Recently, the journals of
the American Astronomical Society (AAS) and a group of NASA data centers have
collaborated to provide more links between on-line data obtained by space
missions and the on-line journals. Authors can now specify which data sets they
have used in their article. This information is used by the participants to
provide the links between the literature and the data.
The ADS is available at: http://ads.harvard.edu
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 15:06:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eichhorn",
"Günther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin A.",
""
],
[
"Thompson",
"Donna M.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null,
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0610009 | Sylvain Perifel | Pascal Koiran (LIP), Sylvain Perifel (LIP) | VPSPACE and a Transfer Theorem over the Reals | Full version of the paper (appendices of the first version are now
included in the text) | null | null | null | cs.CC | null | We introduce a new class VPSPACE of families of polynomials. Roughly
speaking, a family of polynomials is in VPSPACE if its coefficients can be
computed in polynomial space. Our main theorem is that if (uniform,
constant-free) VPSPACE families can be evaluated efficiently then the class PAR
of decision problems that can be solved in parallel polynomial time over the
real numbers collapses to P. As a result, one must first be able to show that
there are VPSPACE families which are hard to evaluate in order to separate over
the reals P from NP, or even from PAR.
| [
{
"version": "v1",
"created": "Tue, 3 Oct 2006 13:48:44 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 08:24:47 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Koiran",
"Pascal",
"",
"LIP"
],
[
"Perifel",
"Sylvain",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0610010 | Daniel Lemire | Daniel Lemire and Owen Kaser | One-Pass, One-Hash n-Gram Statistics Estimation | Fixed a typo | null | null | TR-06-001 | cs.DB cs.CL | http://creativecommons.org/licenses/by/3.0/ | In multimedia, text or bioinformatics databases, applications query sequences
of n consecutive symbols called n-grams. Estimating the number of distinct
n-grams is a view-size estimation problem. While view sizes can be estimated by
sampling under statistical assumptions, we desire an unassuming algorithm with
universally valid accuracy bounds. Most related work has focused on repeatedly
hashing the data, which is prohibitive for large data sources. We prove that a
one-pass one-hash algorithm is sufficient for accurate estimates if the hashing
is sufficiently independent. To reduce costs further, we investigate recursive
random hashing algorithms and show that they are sufficiently independent in
practice. We compare our running times with exact counts using suffix arrays
and show that, while we use hardly any storage, we are an order of magnitude
faster. The approach further is extended to a one-pass/one-hash computation of
n-gram entropy and iceberg counts. The experiments use a large collection of
English text from the Gutenberg Project as well as synthetic data.
| [
{
"version": "v1",
"created": "Tue, 3 Oct 2006 18:04:22 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Oct 2006 18:58:03 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Oct 2006 18:05:22 GMT"
},
{
"version": "v4",
"created": "Tue, 4 Feb 2014 16:15:57 GMT"
}
] | 2014-02-05T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0610011 | Alberto Accomazzi | Alberto Accomazzi, Gunther Eichhorn, Michael J. Kurtz, Carolyn S.
Grant, Edwin Henneken, Markus Demleitner, Donna Thompson, Elizabeth Bohlen,
Stephen S. Murray | Creation and use of Citations in the ADS | 9 pages; to be published in the proceedings of the conference
"Library and Information Services V," June 2006, Cambridge, MA, USA | null | null | null | cs.DL astro-ph cs.DB cs.IR | null | With over 20 million records, the ADS citation database is regularly used by
researchers and librarians to measure the scientific impact of individuals,
groups, and institutions. In addition to the traditional sources of citations,
the ADS has recently added references extracted from the arXiv e-prints on a
nightly basis. We review the procedures used to harvest and identify the
reference data used in the creation of citations, the policies and procedures
that we follow to avoid double-counting and to eliminate contributions which
may not be scholarly in nature. Finally, we describe how users and institutions
can easily obtain quantitative citation data from the ADS, both interactively
and via web-based programming tools.
The ADS is available at http://ads.harvard.edu.
| [
{
"version": "v1",
"created": "Tue, 3 Oct 2006 21:29:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Accomazzi",
"Alberto",
""
],
[
"Eichhorn",
"Gunther",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null,
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0610012 | N Rajesh Pillai | N Rajesh Pillai, Yogesh Kumar | On Shift Sequences for Interleaved Construction of Sequence Sets with
Low Correlation | Corrected typos. Added special case for v=2 for second problem | null | null | null | cs.IT math.IT | null | Construction of signal sets with low correlation property is of interest to
designers of CDMA systems. One of the preferred ways of constructing such sets
is the interleaved construction which uses two sequences a and b with 2-level
autocorrelation and a shift sequence e. The shift sequence has to satisfy
certain conditions for the resulting signal set to have low correlation
properties. This article shows that the conditions reported in literature are
too strong and gives a version which results in more number of shift sequences.
An open problem on the existence of shift sequences for attaining an
interleaved set with maximum correlation value bounded by v+2 is also taken up
and solved.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 05:07:42 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jun 2007 09:30:42 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Pillai",
"N Rajesh",
""
],
[
"Kumar",
"Yogesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610013 | Francois Charoy | Khaled Gaaloul (INRIA Lorraine - LORIA), Fran\c{c}ois Charoy (INRIA
Lorraine - LORIA), Claude Godart (INRIA Lorraine - LORIA) | Cooperative Processes for Scientific Workflows | null | Dans 6th International Conference on Computational Science 3, 3993
(2006) 976-979 | null | null | cs.NI | null | The work described in this paper is a contribution to the problems of
managing in data-intensive scientific applications. First, we discuss
scientific workflows and motivate there use in scientific applications. Then,
we introduce the concept of cooperative processes and describe their
interactions and uses in a flexible cooperative workflow system called
\textit{Bonita}. Finally, we propose an approach to integrate and synthesize
the data exchanged by the mapping of data-intensive science into Bonita, using
a binary approach, and illustrate the endeavors done to enhance the performance
computations within a dynamic environment.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 08:21:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gaaloul",
"Khaled",
"",
"INRIA Lorraine - LORIA"
],
[
"Charoy",
"François",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Godart",
"Claude",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610014 | Mathieu Turuani | Max Tuengerthal (Christian-Albrechts-Universit\"at Zu Kiel), Ralf
Kuesters (CHRISTIAN-Albrechts-Universit\"aT Zu Kiel), Mathieu Turuani (INRIA
Lorraine - Loria / Lifc) | Implementing a Unification Algorithm for Protocol Analysis with XOR | null | Dans UNIF'06 - 20th International Workshop on Unification (2006)
1-5 | null | null | cs.CR | null | In this paper, we propose a unification algorithm for the theory $E$ which
combines unification algorithms for $E\_{\std}$ and $E\_{\ACUN}$ (ACUN
properties, like XOR) but compared to the more general combination methods uses
specific properties of the equational theories for further optimizations. Our
optimizations drastically reduce the number of non-deterministic choices, in
particular those for variable identification and linear orderings. This is
important for reducing both the runtime of the unification algorithm and the
number of unifiers in the complete set of unifiers. We emphasize that obtaining
a ``small'' set of unifiers is essential for the efficiency of the constraint
solving procedure within which the unification algorithm is used. The method is
implemented in the CL-Atse tool for security protocol analysis.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 16:04:21 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Tuengerthal",
"Max",
"",
"Christian-Albrechts-Universität Zu Kiel"
],
[
"Kuesters",
"Ralf",
"",
"CHRISTIAN-Albrechts-UniversitäT Zu Kiel"
],
[
"Turuani",
"Mathieu",
"",
"INRIA\n Lorraine - Loria / Lifc"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0610015 | Farid Nouioua | Farid Nouioua (LIPN) | Why did the accident happen? A norm-based reasoning approach | null | Logical Aspects of Computational Linguistics, student
sessionUniversit\'{e} de bordeaux (Ed.) (2005) 31-34 | null | null | cs.AI | null | In this paper we describe an architecture of a system that answer the
question : Why did the accident happen? from the textual description of an
accident. We present briefly the different parts of the architecture and then
we describe with more detail the semantic part of the system i.e. the part in
which the norm-based reasoning is performed on the explicit knowlege extracted
from the text.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 11:32:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610016 | Farid Nouioua | Farid Nouioua (LIPN) | Norm Based Causal Reasoning in Textual Corpus | null | Proceedings of the Sixth International Workshop on Computational
Semantics IWCS-6, France (2005) 396-400 | null | null | cs.AI cs.CL | null | Truth based entailments are not sufficient for a good comprehension of NL. In
fact, it can not deduce implicit information necessary to understand a text. On
the other hand, norm based entailments are able to reach this goal. This idea
was behind the development of Frames (Minsky 75) and Scripts (Schank 77, Schank
79) in the 70's. But these theories are not formalized enough and their
adaptation to new situations is far from being obvious. In this paper, we
present a reasoning system which uses norms in a causal reasoning process in
order to find the cause of an accident from a text describing it.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 11:33:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0610017 | Maruti Satti | Maruti Satti | A Quasigroup Based Cryptographic System | 22 pages, 11 figures | null | null | null | cs.CR | null | This paper presents a quasigroup encryptor that has very good scrambling
properties. We show that the output of the encryptor maximizes the output
entropy and the encrypted output for constant and random inputs is very
similar. The system architecture of the quasigroup encryptor and the
autocorrelation properties of the output sequences are provided.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 12:29:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Satti",
"Maruti",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0610018 | Farid Nouioua | Farid Nouioua (LIPN) | Raisonnement stratifi\'{e} \`{a} base de normes pour inf\'{e}rer les
causes dans un corpus textuel | null | The Seventh International Symposium On Programming and
SystemsUSTHB d'Alger (Ed.) (2005) 81-92 | null | null | cs.AI cs.CL | null | To understand texts written in natural language (LN), we use our knowledge
about the norms of the domain. Norms allow to infer more implicit information
from the text. This kind of information can, in general, be defeasible, but it
remains useful and acceptable while the text do not contradict it explicitly.
In this paper we describe a non-monotonic reasoning system based on the norms
of the car crash domain. The system infers the cause of an accident from its
textual description. The cause of an accident is seen as the most specific norm
which has been violated. The predicates and the rules of the system are
stratified: organized on layers in order to obtain an efficient reasoning.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 13:09:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0610019 | Juan J. Merelo Pr. | Juan J. Samper, Pedro A. Castillo, Lourdes Araujo, J. J. Merelo | NectaRSS, an RSS feed ranking system that implicitly learns user
preferences | Submitted to First Monday. 16 pages | null | null | null | cs.IR cs.HC | null | In this paper a new RSS feed ranking method called NectaRSS is introduced.
The system recommends information to a user based on his/her past choices. User
preferences are automatically acquired, avoiding explicit feedback, and ranking
is based on those preferences distilled to a user profile. NectaRSS uses the
well-known vector space model for user profiles and new documents, and compares
them using information-retrieval techniques, but introduces a novel method for
user profile creation and adaptation from users' past choices. The efficiency
of the proposed method has been tested by embedding it into an intelligent
aggregator (RSS feed reader), which has been used by different and
heterogeneous users. Besides, this paper proves that the ranking of newsitems
yielded by NectaRSS improves its quality with user's choices, and its
superiority over other algorithms that use a different information
representation method.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 15:13:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samper",
"Juan J.",
""
],
[
"Castillo",
"Pedro A.",
""
],
[
"Araujo",
"Lourdes",
""
],
[
"Merelo",
"J. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0610020 | William Gilreath | William F. Gilreath | XString: XML as a String | 27-pages, 2-tables | null | null | null | cs.DB | null | Extensible markup language (XML) is a technology that has been much hyped, so
that XML has become an industry buzzword. Behind the hype is a powerful
technology for data representation in a platform independent manner. As a text
document, however, XML suffers from being too bloated, and requires an XML
parser to access and manipulate it. XString is an encoding method for XML, in
essence, a markup language's markup language. XString gives the benefit of
compressing XML, and allows for easy manipulation and processing of XML source
as a very long string.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 23:21:11 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2006 23:03:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gilreath",
"William F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0610021 | Amir Bennatan | Amir Bennatan and David Burshtein | On the Fading Paper Achievable Region of the Fading MIMO Broadcast
Channel | Manuscript submitted to IEEE Transactions on Information Theory: June
2006, revised: July 2007, accepted: October 2007. The material in this paper
was presented at the 44th Annual Allerton Conference on Communications,
Control and Computing, Monticello, IL, September 2006 | null | null | null | cs.IT math.IT | null | We consider transmission over the ergodic fading multi-antenna broadcast
(MIMO-BC) channel with partial channel state information at the transmitter and
full information at the receiver. Over the equivalent {\it non}-fading channel,
capacity has recently been shown to be achievable using transmission schemes
that were designed for the ``dirty paper'' channel. We focus on a similar
``fading paper'' model. The evaluation of the fading paper capacity is
difficult to obtain. We confine ourselves to the {\it linear-assignment}
capacity, which we define, and use convex analysis methods to prove that its
maximizing distribution is Gaussian. We compare our fading-paper transmission
to an application of dirty paper coding that ignores the partial state
information and assumes the channel is fixed at the average fade. We show that
a gain is easily achieved by appropriately exploiting the information. We also
consider a cooperative upper bound on the sum-rate capacity as suggested by
Sato. We present a numeric example that indicates that our scheme is capable of
realizing much of this upper bound.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 01:32:20 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Oct 2007 22:36:45 GMT"
}
] | 2007-10-14T00:00:00 | [
[
"Bennatan",
"Amir",
""
],
[
"Burshtein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610022 | Venkatesan Guruswami | Venkatesan Guruswami | Iterative Decoding of Low-Density Parity Check Codes (A Survey) | 29 pages | Bulletin of the EATCS, Issue 90, October 2006 | null | null | cs.IT cs.CC math.IT | null | Much progress has been made on decoding algorithms for error-correcting codes
in the last decade. In this article, we give an introduction to some
fundamental results on iterative, message-passing algorithms for low-density
parity check codes. For certain important stochastic channels, this line of
work has enabled getting very close to Shannon capacity with algorithms that
are extremely efficient (both in theory and practice).
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 04:31:52 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Guruswami",
"Venkatesan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610023 | Farid Nouioua | Farid Nouioua (LIPN), Daniel Kayser (LIPN) | Une exp\'{e}rience de s\'{e}mantique inf\'{e}rentielle | null | Actes de TALN'06UCL Presses Universitaires de Louvain (Ed.) (2006)
246-255 | null | null | cs.AI | null | We develop a system which must be able to perform the same inferences that a
human reader of an accident report can do and more particularly to determine
the apparent causes of the accident. We describe the general framework in which
we are situated, linguistic and semantic levels of the analysis and the
inference rules used by the system.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 05:18:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
],
[
"Kayser",
"Daniel",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610024 | Eric Rondeau | Belynda Brahimi (CRAN), Christophe Aubrun (CRAN), Eric Rondeau (CRAN) | Network calculus based FDI approach for switched Ethernet architecture | null | 6th IFAC Symposium on Fault Detection, Supervision and Safety of
Technical Processes, Chine (29/08/2006) 6 pages | null | null | cs.NI | null | The Networked Control Systems (NCS) are complex systems which integrate
information provided by several domians such as automatic control, computer
science, communication network. The work presented in this paper concerns fault
detection, isolation and compensation of communication network. The proposed
method is based on the classical approach of Fault Detection and Isolation and
Fault Tolerant Control (FDI/FTC) currently used in diagnosis. The modelling of
the network to be supervised is based on both couloured petri nets and network
calculus theory often used to represent and analyse the network behaviour. The
goal is to implement inside network devices algorithms enabling to detect,
isolate and compensate communication faults in an autonomous way.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 07:53:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brahimi",
"Belynda",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610025 | M Anand | M. Anand, P. Vijay Kumar | Low Correlation Sequences over the QAM Constellation | 21 pages, 3 figures. To appear in IEEE Transactions on Information
Theory in February 2008 | null | 10.1109/TIT.2007.913512 | null | cs.IT math.IT | null | This paper presents the first concerted look at low correlation sequence
families over QAM constellations of size M^2=4^m and their potential
applicability as spreading sequences in a CDMA setting.
Five constructions are presented, and it is shown how such sequence families
have the ability to transport a larger amount of data as well as enable
variable-rate signalling on the reverse link.
Canonical family CQ has period N, normalized maximum-correlation parameter
theta_max bounded above by A sqrt(N), where 'A' ranges from 1.8 in the 16-QAM
case to 3.0 for large M. In a CDMA setting, each user is enabled to transfer 2m
bits of data per period of the spreading sequence which can be increased to 3m
bits of data by halving the size of the sequence family. The technique used to
construct CQ is easily extended to produce larger sequence families and an
example is provided.
Selected family SQ has a lower value of theta_max but permits only (m+1)-bit
data modulation. The interleaved 16-QAM sequence family IQ has theta_max <=
sqrt(2) sqrt(N) and supports 3-bit data modulation.
The remaining two families are over a quadrature-PAM (Q-PAM) subset of size
2M of the M^2-QAM constellation. Family P has a lower value of theta_max in
comparison with Family SQ, while still permitting (m+1)-bit data modulation.
Interleaved family IP, over the 8-ary Q-PAM constellation, permits 3-bit data
modulation and interestingly, achieves the Welch lower bound on theta_max.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 14:27:46 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jul 2007 11:58:25 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Nov 2007 17:53:06 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Anand",
"M.",
""
],
[
"Kumar",
"P. Vijay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.