id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
cs/0610026
Rob van Stee
Leah Epstein and Rob van Stee
Covering selfish machines
null
null
null
null
cs.GT
null
We consider the machine covering problem for selfish related machines. For a constant number of machines, m, we show a monotone polynomial time approximation scheme (PTAS) with running time that is linear in the number of jobs. It uses a new technique for reducing the number of jobs while remaining close to the optimal solution. We also present an FPTAS for the classical machine covering problem (the previous best result was a PTAS) and use this to give a monotone FPTAS. Additionally, we give a monotone approximation algorithm with approximation ratio \min(m,(2+\eps)s_1/s_m) where \eps>0 can be chosen arbitrarily small and s_i is the (real) speed of machine i. Finally we give improved results for two machines. Our paper presents the first results for this problem in the context of selfish machines.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 13:20:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Epstein", "Leah", "" ], [ "van Stee", "Rob", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0610027
Ranko Lazic
Stephane Demri and Ranko Lazic
LTL with the Freeze Quantifier and Register Automata
29 pages
null
null
null
cs.LO cs.CC
null
A data word is a sequence of pairs of a letter from a finite alphabet and an element from an infinite set, where the latter can only be compared for equality. To reason about data words, linear temporal logic is extended by the freeze quantifier, which stores the element at the current word position into a register, for equality comparisons deeper in the formula. By translations from the logic to alternating automata with registers and then to faulty counter automata whose counters may erroneously increase at any time, and from faulty and error-free counter automata to the logic, we obtain a complete complexity table for logical fragments defined by varying the set of temporal operators and the number of registers. In particular, the logic with future-time operators and 1 register is decidable but not primitive recursive over finite data words. Adding past-time operators or 1 more register, or switching to infinite data words, cause undecidability.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 15:47:22 GMT" }, { "version": "v2", "created": "Wed, 13 Feb 2008 17:52:00 GMT" }, { "version": "v3", "created": "Thu, 3 Apr 2008 16:31:15 GMT" } ]
2008-04-03T00:00:00
[ [ "Demri", "Stephane", "" ], [ "Lazic", "Ranko", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0610028
Olivier Zendra
Olivier Zendra (INRIA Lorraine - LORIA, LORIA)
Memory and compiler optimizations for low-power and -energy
ICOOOLPS'2006 was co-located with the 20th European Conference on Object-Oriented Programming (ECOOP'2006)
Dans 1st ECOOP Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS'2006). (2006)
null
null
cs.PL cs.PF
null
Embedded systems become more and more widespread, especially autonomous ones, and clearly tend to be ubiquitous. In such systems, low-power and low-energy usage get ever more crucial. Furthermore, these issues also become paramount in (massively) multi-processors systems, either in one machine or more widely in a grid. The various problems faced pertain to autonomy, power supply possibilities, thermal dissipation, or even sheer energy cost. Although it has since long been studied in harware, energy optimization is more recent in software. In this paper, we thus aim at raising awareness to low-power and low-energy issues in the language and compilation community. We thus broadly but briefly survey techniques and solutions to this energy issue, focusing on a few specific aspects in the context of compiler optimizations and memory management.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 17:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Zendra", "Olivier", "", "INRIA Lorraine - LORIA, LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0610029
Alberto Accomazzi
Carolyn S. Grant, Alberto Accomazzi, Donna Thompson, Edwin Henneken, Guenther Eichhorn, Michael J. Kurtz, and Stephen S. Murray
Data in the ADS -- Understanding How to Use it Better
4 pages; submitted to the proceedings of the Library and Information Services in Astronomy V; to be published by ASP Conference Proceedings
null
null
null
cs.DL cs.DB
null
The Smithsonian/NASA ADS Abstract Service contains a wealth of data for astronomers and librarians alike, yet the vast majority of usage consists of rudimentary searches. Hints on how to obtain more focused search results by using more of the various capabilities of the ADS are presented, including searching by affiliation. We also discuss the classification of articles by content and by referee status. The ADS is funded by NASA Grant NNG06GG68G-16613687.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 18:51:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Grant", "Carolyn S.", "" ], [ "Accomazzi", "Alberto", "" ], [ "Thompson", "Donna", "" ], [ "Henneken", "Edwin", "" ], [ "Eichhorn", "Guenther", "" ], [ "Kurtz", "Michael J.", "" ], [ "Murray", "Stephen S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0610030
Alberto Accomazzi
Donna M. Thompson, Alberto Accomazzi, Guenther Eichhorn, Carolyn Grant, Edwin Henneken, Michael J. Kurtz, Elizabeth Bohlen, Stephen S. Murray
Paper to Screen: Processing Historical Scans in the ADS
4 pages; submitted to the proceedings of Library and Information Services in Astronomy; to be published in the ASP Conference Series
null
null
null
cs.DL cs.HC
null
The NASA Astrophysics Data System in conjunction with the Wolbach Library at the Harvard-Smithsonian Center for Astrophysics is working on a project to microfilm historical observatory publications. The microfilm is then scanned for inclusion in the ADS. The ADS currently contains over 700,000 scanned pages of volumes of historical literature. Many of these volumes lack clear pagination or other bibliographic data that are necessary to take advantage of the searching capabilities of the ADS. This paper will address some of the interesting challenges that needed to be resolved during the processing of the Observatory Reports included in the ADS.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 18:58:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Thompson", "Donna M.", "" ], [ "Accomazzi", "Alberto", "" ], [ "Eichhorn", "Guenther", "" ], [ "Grant", "Carolyn", "" ], [ "Henneken", "Edwin", "" ], [ "Kurtz", "Michael J.", "" ], [ "Bohlen", "Elizabeth", "" ], [ "Murray", "Stephen S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0610031
Simeon Warner
Simeon Warner, Jeroen Bekaert, Carl Lagoze, Xiaoming Liu, Sandy Payette, Herbert Van de Sompel
Pathways: Augmenting interoperability across scholarly repositories
18 pages. Accepted for International Journal on Digital Libraries special issue on Digital Libraries and eScience
null
10.1007/s00799-007-0016-7
null
cs.DL
null
In the emerging eScience environment, repositories of papers, datasets, software, etc., should be the foundation of a global and natively-digital scholarly communications system. The current infrastructure falls far short of this goal. Cross-repository interoperability must be augmented to support the many workflows and value-chains involved in scholarly communication. This will not be achieved through the promotion of single repository architecture or content representation, but instead requires an interoperability framework to connect the many heterogeneous systems that will exist. We present a simple data model and service architecture that augments repository interoperability to enable scholarly value-chains to be implemented. We describe an experiment that demonstrates how the proposed infrastructure can be deployed to implement the workflow involved in the creation of an overlay journal over several different repository systems (Fedora, aDORe, DSpace and arXiv).
[ { "version": "v1", "created": "Thu, 5 Oct 2006 19:55:09 GMT" } ]
2007-06-13T00:00:00
[ [ "Warner", "Simeon", "" ], [ "Bekaert", "Jeroen", "" ], [ "Lagoze", "Carl", "" ], [ "Liu", "Xiaoming", "" ], [ "Payette", "Sandy", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0610032
Mathys Walma
Mathys Walma
Pipelined Feed-Forward Cyclic Redundancy Check (CRC) Calculation
admin note: Paper removed for copyright reasons
null
null
null
cs.NI
null
This paper discusses a method for pipelining the calculation of CRC's, such as ITU/CCITT CRC32, into a mostly feed-forward architecture. This method allows several benefits such as independent scaling of circuit frequency and data throughput. Additionally it allows calculation over packet tails (packet length not a multiple of CRC input width). Finally it offers the ability to update a CRC where a subset of data in the packet has changed.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 21:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Walma", "Mathys", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610033
Marco Cuturi
Marco Cuturi, Jean-Philippe Vert, Oystein Birkenes, Tomoko Matsui
A kernel for time series based on global alignments
null
null
10.1109/ICASSP.2007.366260
null
cs.CV cs.LG
null
We propose in this paper a new family of kernels to handle times series, notably speech data, within the framework of kernel methods which includes popular algorithms such as the Support Vector Machine. These kernels elaborate on the well known Dynamic Time Warping (DTW) family of distances by considering the same set of elementary operations, namely substitutions and repetitions of tokens, to map a sequence onto another. Associating to each of these operations a given score, DTW algorithms use dynamic programming techniques to compute an optimal sequence of operations with high overall score. In this paper we consider instead the score spanned by all possible alignments, take a smoothed version of their maximum and derive a kernel out of this formulation. We prove that this kernel is positive definite under favorable conditions and show how it can be tuned effectively for practical applications as we report encouraging results on a speech recognition task.
[ { "version": "v1", "created": "Fri, 6 Oct 2006 04:45:32 GMT" } ]
2009-11-27T00:00:00
[ [ "Cuturi", "Marco", "" ], [ "Vert", "Jean-Philippe", "" ], [ "Birkenes", "Oystein", "" ], [ "Matsui", "Tomoko", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0610034
Erich Graedel
Erich Graedel and Igor Walukiewicz
Postinal Determinacy of Games with Infinitely Many Priorities
This paper has been replaced due to a typo in the title
null
null
null
cs.LO cs.GT
null
We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs.
[ { "version": "v1", "created": "Fri, 6 Oct 2006 11:05:55 GMT" }, { "version": "v2", "created": "Tue, 28 Aug 2012 08:07:29 GMT" } ]
2012-08-29T00:00:00
[ [ "Graedel", "Erich", "" ], [ "Walukiewicz", "Igor", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0610035
Erich Graedel
Erich Graedel and Igor Walukiewicz
Positional Determinacy of Games with Infinitely Many Priorities
null
Logical Methods in Computer Science, Volume 2, Issue 4 (November 3, 2006) lmcs:2242
10.2168/LMCS-2(4:6)2006
null
cs.LO cs.GT
null
We study two-player games of infinite duration that are played on finite or infinite game graphs. A winning strategy for such a game is positional if it only depends on the current position, and not on the history of the play. A game is positionally determined if, from each position, one of the two players has a positional winning strategy. The theory of such games is well studied for winning conditions that are defined in terms of a mapping that assigns to each position a priority from a finite set. Specifically, in Muller games the winner of a play is determined by the set of those priorities that have been seen infinitely often; an important special case are parity games where the least (or greatest) priority occurring infinitely often determines the winner. It is well-known that parity games are positionally determined whereas Muller games are determined via finite-memory strategies. In this paper, we extend this theory to the case of games with infinitely many priorities. Such games arise in several application areas, for instance in pushdown games with winning conditions depending on stack contents. For parity games there are several generalisations to the case of infinitely many priorities. While max-parity games over omega or min-parity games over larger ordinals than omega require strategies with infinite memory, we can prove that min-parity games with priorities in omega are positionally determined. Indeed, it turns out that the min-parity condition over omega is the only infinitary Muller condition that guarantees positional determinacy on all game graphs.
[ { "version": "v1", "created": "Fri, 6 Oct 2006 11:07:37 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2006 12:53:01 GMT" } ]
2017-01-11T00:00:00
[ [ "Graedel", "Erich", "" ], [ "Walukiewicz", "Igor", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0610036
Koji Nuida
Koji Nuida, Manabu Hagiwara, Hajime Watanabe, and Hideki Imai
Optimization of Memory Usage in Tardos's Fingerprinting Codes
12 pages, 1 figure; (v2) tables revised, typos corrected, comments on some recent works added; (v3) submitted version, title changed from "Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature"
null
null
null
cs.CR cs.NA
null
It is known that Tardos's collusion-secure probabilistic fingerprinting code (Tardos code; STOC'03) has length of theoretically minimal order with respect to the number of colluding users. However, Tardos code uses certain continuous probability distribution in codeword generation, which creates some problems for practical use, in particular, it requires large extra memory. A solution proposed so far is to use some finite probability distributions instead. In this paper, we determine the optimal finite distribution in order to decrease extra memory amount. By our result, the extra memory is reduced to 1/32 of the original, or even becomes needless, in some practical setting. Moreover, the code length is also reduced, e.g. to about 20.6% of Tardos code asymptotically. Finally, we address some other practical issues such as approximation errors which are inevitable in any real implementation.
[ { "version": "v1", "created": "Fri, 6 Oct 2006 14:07:57 GMT" }, { "version": "v2", "created": "Wed, 27 Dec 2006 10:47:00 GMT" }, { "version": "v3", "created": "Tue, 15 Jan 2008 18:31:29 GMT" } ]
2008-01-15T00:00:00
[ [ "Nuida", "Koji", "" ], [ "Hagiwara", "Manabu", "" ], [ "Watanabe", "Hajime", "" ], [ "Imai", "Hideki", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0610037
Nan Liu
Nan Liu and Sennur Ulukus
The Capacity Region of a Class of Discrete Degraded Interference Channels
7 pages, 1 figure; presented at the 44th annual Allerton Conference on Communication, Control and Computing, September 27-29, 2006
null
null
null
cs.IT math.IT
null
We provide a single-letter characterization for the capacity region of a class of discrete degraded interference channels (DDICs). The class of DDICs considered includes the discrete additive degraded interference channel (DADIC) studied by Benzel. We show that for the class of DDICs studied, encoder cooperation does not increase the capacity region, and therefore, the capacity region of the class of DDICs is the same as the capacity region of the corresponding degraded broadcast channel.
[ { "version": "v1", "created": "Fri, 6 Oct 2006 19:42:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610038
Hannes Hutzelmeyer
Hannes Hutzelmeyer
Church's thesis is questioned by new calculation paradigm
32 pages
null
null
null
cs.LO
null
Church's thesis claims that all effecticely calculable functions are recursive. A shortcoming of the various definitions of recursive functions lies in the fact that it is not a matter of a syntactical check to find out if an entity gives rise to a function. Eight new ideas for a precise setup of arithmetical logic and its metalanguage give the proper environment for the construction of a special computer, the ARBACUS computer. Computers do not come to a necessary halt; it is requested that calculators are constructed on the basis of computers in a way that they always come to a halt, then all calculations are effective. The ARBATOR is defined as a calculator with two-layer-computation. It allows for the calculation of all primitive recursive functions, but multi-level-arbation also allows for the calculation of other arbative functions that are not primitive recursive. The new paradigm of calculation does not have the above mentioned shortcoming. The defenders of Church's thesis are challenged to show that exotic arbative functions are recursive and to put forward a recursive function that is not arbative. A construction with three-tier-multi-level-arbation that includes a diagonalisation leads to the extravagant yet calculable Snark-function that is not arbative. As long as it is not shown that all exotic arbative functions and particularily the Snark-function are arithmetically representable Goedel's first incompleteness sentence is in limbo.
[ { "version": "v1", "created": "Sat, 7 Oct 2006 12:53:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutzelmeyer", "Hannes", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610039
Neil Rubens
Neil Rubens
The Application of Fuzzy Logic to the Construction of the Ranking Function of Information Retrieval Systems
null
N. Rubens. The application of fuzzy logic to the construction of the ranking function of information retrieval systems. Computer Modelling and New Technologies, 10(1):20-27, 2006
null
null
cs.IR cs.AI
null
The quality of the ranking function is an important factor that determines the quality of the Information Retrieval system. Each document is assigned a score by the ranking function; the score indicates the likelihood of relevance of the document given a query. In the vector space model, the ranking function is defined by a mathematic expression. We propose a fuzzy logic (FL) approach to defining the ranking function. FL provides a convenient way of converting knowledge expressed in a natural language into fuzzy logic rules. The resulting ranking function could be easily viewed, extended, and verified: * if (tf is high) and (idf is high) > (relevance is high); * if (overlap is high) > (relevance is high). By using above FL rules, we are able to achieve performance approximately equal to the state of the art search engine Apache Lucene (deltaP10 +0.92%; deltaMAP -0.1%). The fuzzy logic approach allows combining the logic-based model with the vector model. The resulting model possesses simplicity and formalism of the logic based model, and the flexibility and performance of the vector model.
[ { "version": "v1", "created": "Sun, 8 Oct 2006 05:34:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Rubens", "Neil", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610040
Yun Deng
Yun Deng, Tony T. Lee
Crosstalk-free Conjugate Networks for Optical Multicast Switching
10 pages
null
10.1109/JLT.2006.882249
null
cs.NI
null
High-speed photonic switching networks can switch optical signals at the rate of several terabits per second. However, they suffer from an intrinsic crosstalk problem when two optical signals cross at the same switch element. To avoid crosstalk, active connections must be node-disjoint in the switching network. In this paper, we propose a sequence of decomposition and merge operations, called conjugate transformation, performed on each switch element to tackle this problem. The network resulting from this transformation is called conjugate network. By using the numbering-schemes of networks, we prove that if the route assignments in the original network are link-disjoint, their corresponding ones in the conjugate network would be node-disjoint. Thus, traditional nonblocking switching networks can be transformed into crosstalk-free optical switches in a routine manner. Furthermore, we show that crosstalk-free multicast switches can also be obtained from existing nonblocking multicast switches via the same conjugate transformation.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 16:49:22 GMT" } ]
2009-11-11T00:00:00
[ [ "Deng", "Yun", "" ], [ "Lee", "Tony T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610041
Jeremy Fix
J\'er\'emy Fix (INRIA Lorraine - LORIA), Julien Vitay (INRIA Lorraine - LORIA), Nicolas Rougier (INRIA Lorraine - LORIA)
A Computational Model of Spatial Memory Anticipation during Visual Search
null
Dans Anticipatory Behavior in Adaptive Learning Systems 2006 (2006)
null
null
cs.NE
null
Some visual search tasks require to memorize the location of stimuli that have been previously scanned. Considerations about the eye movements raise the question of how we are able to maintain a coherent memory, despite the frequent drastically changes in the perception. In this article, we present a computational model that is able to anticipate the consequences of the eye movements on the visual perception in order to update a spatial memory
[ { "version": "v1", "created": "Mon, 9 Oct 2006 11:42:27 GMT" } ]
2016-08-16T00:00:00
[ [ "Fix", "Jérémy", "", "INRIA Lorraine - LORIA" ], [ "Vitay", "Julien", "", "INRIA Lorraine\n - LORIA" ], [ "Rougier", "Nicolas", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0610042
Sergey Gubin
Sergey Gubin
A Polynomial Time Algorithm for The Traveling Salesman Problem
8 pages. Simplified
Complementary to Yannakakis' Theorem, 22nd MCCCC, University of Nevada, Las Vegas, 2008, p.8
null
null
cs.DM cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ATSP polytope can be expressed by asymmetric polynomial size linear program.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 13:15:12 GMT" }, { "version": "v2", "created": "Thu, 9 Nov 2006 17:34:51 GMT" }, { "version": "v3", "created": "Thu, 25 Sep 2008 05:02:16 GMT" } ]
2008-11-10T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0610043
Zengyou He
Zengyou He
Farthest-Point Heuristic based Initialization Methods for K-Modes Clustering
7 pages
null
null
null
cs.AI
null
The k-modes algorithm has become a popular technique in solving categorical data clustering problems in different application domains. However, the algorithm requires random selection of initial points for the clusters. Different initial points often lead to considerable distinct clustering results. In this paper we present an experimental study on applying a farthest-point heuristic based initialization method to k-modes clustering to improve its performance. Experiments show that new initialization method leads to better clustering accuracy than random selection initialization method for k-modes clustering.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 12:12:45 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610044
Thierry Turletti
Thierry Turletti (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Yongho Seok (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes)
M\'{e}canismes de Transmission Multipoint pour R\'{e}seaux Locaux Sans Fil IEEE 802.11
null
null
null
null
cs.NI
null
Le standard IEEE 802.11 est inefficace pour la transmission multim\'{e}dia en multipoint. En particulier, les paquets multipoints sont envoy\'{e}s en boucle ouverte de la m\^{e}me mani\`{e}re que les paquets broadcast. L'absence d'acquittements rend impossible la mise en oeuvre de m\'{e}canismes de contr\^{o}le de congestion, de m\'{e}canisme de fiabilisation de la transmission ainsi que d'algorithmes d'adaptation du d\'{e}bit de transmission physique. Dans ce rapport, nous proposons de nouveaux m\'{e}canismes de ransmission multipoint qui se basent sur une approche leader pour renvoyer des acquittements. Nous nous interessons \`{a} des solutions pratiques qui sont suceptibles d'\^{e}tre implant\'{e}s dans les cartes r\'{e}seaux sans fil actuelles et futures et qui restent compatibles avec les stations IEEE 802.11 standards. Nous proposons deux m\'{e}canismes pour adapter le d\'{e}bit de transmission physique des flots multipoints: un m\'{e}canisme simplifi\'{e} appel\'{e} LB-ARF et un m\'{e}canisme plus robuste appel\'{e} RRAM. Nos simulations montrent que pour des environnements statiques, un m\'{e}canisme aussi simple que LB-ARF suffit pour obtenir de bonnes performances. Le m\'{e}canisme RRAM est quant \`{a} lui aussi efficace dans des environnements statiques que lorsque les stations sont mobiles.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 12:49:13 GMT" } ]
2016-08-16T00:00:00
[ [ "Turletti", "Thierry", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Seok", "Yongho", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610045
Reza Rashidi Far
Reza Rashidi Far, Tamer Oraby, Wlodzimierz Bryc and Roland Speicher
Spectra of large block matrices
40 pages, 6 figures
null
null
null
cs.IT math.IT math.OA
null
In a frequency selective slow-fading channel in a MIMO system, the channel matrix is of the form of a block matrix. This paper proposes a method to calculate the limit of the eigenvalue distribution of block matrices if the size of the blocks tends to infinity. While it considers random matrices, it takes an operator-valued free probability approach to achieve this goal. Using this method, one derives a system of equations, which can be solved numerically to compute the desired eigenvalue distribution. The paper initially tackles the problem for square block matrices, then extends the solution to rectangular block matrices. Finally, it deals with Wishart type block matrices. For two special cases, the results of our approach are compared with results from simulations. The first scenario investigates the limit eigenvalue distribution of block Toeplitz matrices. The second scenario deals with the distribution of Wishart type block matrices for a frequency selective slow-fading channel in a MIMO system for two different cases of $n_R=n_T$ and $n_R=2n_T$. Using this method, one may calculate the capacity and the Signal-to-Interference-and-Noise Ratio in large MIMO systems.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 14:45:37 GMT" } ]
2011-11-10T00:00:00
[ [ "Far", "Reza Rashidi", "" ], [ "Oraby", "Tamer", "" ], [ "Bryc", "Wlodzimierz", "" ], [ "Speicher", "Roland", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OA", "description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry", "span": "(Operator Algebras)" } ]
cs/0610046
Daniel Lemire
Daniel Lemire
Streaming Maximum-Minimum Filter Using No More than Three Comparisons per Element
to appear in Nordic Journal of Computing
Daniel Lemire, Streaming Maximum-Minimum Filter Using No More than Three Comparisons per Element, Nordic Journal of Computing, Volume 13, Number 4, pages 328-339, 2006
null
null
cs.DS
null
The running maximum-minimum (max-min) filter computes the maxima and minima over running windows of size w. This filter has numerous applications in signal processing and time series analysis. We present an easy-to-implement online algorithm requiring no more than 3 comparisons per element, in the worst case. Comparatively, no algorithm is known to compute the running maximum (or minimum) filter in 1.5 comparisons per element, in the worst case. Our algorithm has reduced latency and memory usage.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 22:09:42 GMT" }, { "version": "v2", "created": "Thu, 12 Oct 2006 02:01:49 GMT" }, { "version": "v3", "created": "Tue, 20 Feb 2007 21:18:33 GMT" }, { "version": "v4", "created": "Tue, 13 Mar 2007 00:41:20 GMT" }, { "version": "v5", "created": "Thu, 22 Mar 2007 01:19:11 GMT" } ]
2012-01-16T00:00:00
[ [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0610047
Haim Permuter Henry
Haim Permuter, Paul Cuff, Benjamin Van Roy and Tsachy Weissman
Capacity of the Trapdoor Channel with Feedback
null
null
null
null
cs.IT math.IT
null
We establish that the feedback capacity of the trapdoor channel is the logarithm of the golden ratio and provide a simple communication scheme that achieves capacity. As part of the analysis, we formulate a class of dynamic programs that characterize capacities of unifilar finite-state channels. The trapdoor channel is an instance that admits a simple analytic solution.
[ { "version": "v1", "created": "Mon, 9 Oct 2006 22:09:45 GMT" } ]
2009-09-29T00:00:00
[ [ "Permuter", "Haim", "" ], [ "Cuff", "Paul", "" ], [ "Van Roy", "Benjamin", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610048
Stephen D. Miller
Nathan Keller, Stephen D. Miller, Ilya Mironov, and Ramarathnam Venkatesan
MV3: A new word based stream cipher using rapid mixing and revolving buffers
27 pages, shortened version will appear in "Topics in Cryptology - CT-RSA 2007"
null
null
null
cs.CR cs.DM math.CO
null
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new components and principles, as well as mathematical analysis to justify their use. Our approach, like RC4's, is based on rapidly mixing random walks on directed graphs (that is, walks which reach a random state quickly, from any starting point). We begin with some well understood walks, and then introduce nonlinearity in their steps in order to improve security and show long term statistical correlations are negligible. To minimize the short term correlations, as well as to deter attacks using equations involving successive outputs, we provide a method for sequencing the outputs derived from the walk using three revolving buffers. The cipher is fast -- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor. A word based cipher needs to output more bits per step, which exposes more correlations for attacks. Moreover we seek simplicity of construction and transparent analysis. To meet these requirements, we use a larger state and claim security corresponding to only a fraction of it. Our design is for an adequately secure word-based cipher; our very preliminary estimate puts the security close to exhaustive search for keys of size < 256 bits.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 01:23:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Keller", "Nathan", "" ], [ "Miller", "Stephen D.", "" ], [ "Mironov", "Ilya", "" ], [ "Venkatesan", "Ramarathnam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
cs/0610049
Carlos Gershenson
Edgar Morin
Restricted Complexity, General Complexity
25 pages. Presented at the Colloquium "Intelligence de la complexit'e : 'epist'emologie et pragmatique", Cerisy-La-Salle, France, June 26th, 2005. Translated from French by Carlos Gershenson
null
10.1142/9789812707420_0002
null
cs.CC nlin.AO
null
Why has the problematic of complexity appeared so late? And why would it be justified?
[ { "version": "v1", "created": "Tue, 10 Oct 2006 07:59:18 GMT" } ]
2016-11-23T00:00:00
[ [ "Morin", "Edgar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
cs/0610050
Tony Lee T.
Tony T. Lee
The Mathematical Parallels Between Packet Switching and Information Transmission
21 pages, 25 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT cs.NI math.IT
null
All communication networks comprise of transmission systems and switching systems, even though they are usually treated as two separate issues. Communication channels are generally disturbed by noise from various sources. In circuit switched networks, reliable communication requires the error-tolerant transmission of bits over noisy channels. In packet switched networks, however, not only can bits be corrupted with noise, but resources along connection paths are also subject to contention. Thus, quality of service (QoS) is determined by buffer delays and packet losses. The theme of this paper is to show that transmission noise and packet contention actually have similar characteristics and can be tamed by comparable means to achieve reliable communication, and a number of analogies between switching and transmission are identified. The sampling theorem of bandlimited signals provides the cornerstone of digital communication and signal processing. Recently, the Birkhoff-von Neumann decomposition of traffic matrices has been widely applied to packet switches. With respect to the complexity reduction of packet switching, we show that the decomposition of a doubly stochastic traffic matrix plays a similar role to that of the sampling theorem in digital transmission. We conclude that packet switching systems are governed by mathematical laws that are similar to those of digital transmission systems as envisioned by Shannon in his seminal 1948 paper, A Mathematical Theory of Communication.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 08:09:23 GMT" }, { "version": "v2", "created": "Wed, 22 Nov 2006 03:15:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Lee", "Tony T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610051
Philippe Trebuchet
Mohab Safey El Din (INRIA Rocquencourt), Philippe Trebuchet (INRIA Rocquencourt)
Strong bi-homogeneous B\'{e}zout theorem and its use in effective real algebraic geometry
null
null
null
null
cs.SC
null
Let f1, ..., fs be a polynomial family in Q[X1,..., Xn] (with s less than n) of degree bounded by D. Suppose that f1, ..., fs generates a radical ideal, and defines a smooth algebraic variety V. Consider a projection P. We prove that the degree of the critical locus of P restricted to V is bounded by D^s(D-1)^(n-s) times binomial of n and n-s. This result is obtained in two steps. First the critical points of P restricted to V are characterized as projections of the solutions of Lagrange's system for which a bi-homogeneous structure is exhibited. Secondly we prove a bi-homogeneous B\'ezout Theorem, which bounds the sum of the degrees of the equidimensional components of the radical of an ideal generated by a bi-homogeneous polynomial family. This result is improved when f1,..., fs is a regular sequence. Moreover, we use Lagrange's system to design an algorithm computing at least one point in each connected component of a smooth real algebraic set. This algorithm generalizes, to the non equidimensional case, the one of Safey El Din and Schost. The evaluation of the output size of this algorithm gives new upper bounds on the first Betti number of a smooth real algebraic set. Finally, we estimate its arithmetic complexity and prove that in the worst cases it is polynomial in n, s, D^s(D-1)^(n-s) and the binomial of n and n-s, and the complexity of evaluation of f1,..., fs.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 15:02:07 GMT" }, { "version": "v2", "created": "Fri, 20 Oct 2006 15:16:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Din", "Mohab Safey El", "", "INRIA Rocquencourt" ], [ "Trebuchet", "Philippe", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0610052
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Finite-Dimensional Bounds on Zm and Binary LDPC Codes with Belief Propagation Decoders
to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper focuses on finite-dimensional upper and lower bounds on decodable thresholds of Zm and binary low-density parity-check (LDPC) codes, assuming belief propagation decoding on memoryless channels. A concrete framework is presented, admitting systematic searches for new bounds. Two noise measures are considered: the Bhattacharyya noise parameter and the soft bit value for a maximum a posteriori probability (MAP) decoder on the uncoded channel. For Zm LDPC codes, an iterative m-dimensional bound is derived for m-ary-input/symmetric-output channels, which gives a sufficient stability condition for Zm LDPC codes and is complemented by a matched necessary stability condition introduced herein. Applications to coded modulation and to codes with non-equiprobable distributed codewords are also discussed. For binary codes, two new lower bounds are provided for symmetric channels, including a two-dimensional iterative bound and a one-dimensional non-iterative bound, the latter of which is the best known bound that is tight for binary symmetric channels (BSCs), and is a strict improvement over the bound derived by the channel degradation argument. By adopting the reverse channel perspective, upper and lower bounds on the decodable Bhattacharyya noise parameter are derived for non-symmetric channels, which coincides with the existing bound for symmetric channels.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 16:02:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610053
Enrique ter Horst A
Henryk Gzyl, Enrique ter Horst, Samuel Malone
Towards a Bayesian framework for option pricing
null
null
null
null
cs.CE q-fin.PR
null
In this paper, we describe a general method for constructing the posterior distribution of an option price. Our framework takes as inputs the prior distributions of the parameters of the stochastic process followed by the underlying, as well as the likelihood function implied by the observed price history for the underlying. Our work extends that of Karolyi (1993) and Darsinos and Satchell (2001), but with the crucial difference that the likelihood function we use for inference is that which is directly implied by the underlying, rather than imposed in an ad hoc manner via the introduction of a function representing "measurement error." As such, an important problem still relevant for our method is that of model risk, and we address this issue by describing how to perform a Bayesian averaging of parameter inferences based on the different models considered using our framework.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 19:37:37 GMT" } ]
2008-12-02T00:00:00
[ [ "Gzyl", "Henryk", "" ], [ "ter Horst", "Enrique", "" ], [ "Malone", "Samuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Finance", "code": "q-fin.PR", "description": "Valuation and hedging of financial securities, their derivatives, and structured products", "span": "(Pricing of Securities)" } ]
cs/0610054
Mitchell Harris
Nachum Dershowitz, Mitchell A. Harris, and Guan-Shieng Huang
Enumeration Problems Related to Ground Horn Theories
4 pages, before journal submission
null
null
null
cs.LO cs.DM
null
We investigate the enumeration of varieties of boolean theories related to Horn clauses. We describe a number of combinatorial equivalences among different characterizations and calculate the number of different theories in $n$ variables for slightly different characterizations. The method of counting is via counting models using a satisfiability checker.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 19:28:19 GMT" }, { "version": "v2", "created": "Mon, 4 Feb 2008 22:14:08 GMT" } ]
2008-02-05T00:00:00
[ [ "Dershowitz", "Nachum", "" ], [ "Harris", "Mitchell A.", "" ], [ "Huang", "Guan-Shieng", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0610055
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Extending the Calculus of Constructions with Tarski's fix-point theorem
null
null
null
null
cs.LO
null
We propose to use Tarski's least fixpoint theorem as a basis to define recursive functions in the calculus of inductive constructions. This widens the class of functions that can be modeled in type-theory based theorem proving tool to potentially non-terminating functions. This is only possible if we extend the logical framework by adding the axioms that correspond to classical logic. We claim that the extended framework makes it possible to reason about terminating and non-terminating computations and we show that common facilities of the calculus of inductive construction, like program extraction can be extended to also handle the new functions.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 12:50:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610056
Philipp Mayr
Philipp Mayr
Constructing experimental indicators for Open Access documents
9 pages, 3 figures
null
10.3152/147154406781775940
null
cs.DL
null
The ongoing paradigm change in the scholarly publication system ('science is turning to e-science') makes it necessary to construct alternative evaluation criteria/metrics which appropriately take into account the unique characteristics of electronic publications and other research output in digital formats. Today, major parts of scholarly Open Access (OA) publications and the self-archiving area are not well covered in the traditional citation and indexing databases. The growing share and importance of freely accessible research output demands new approaches/metrics for measuring and for evaluating of these new types of scientific publications. In this paper we propose a simple quantitative method which establishes indicators by measuring the access/download pattern of OA documents and other web entities of a single web server. The experimental indicators (search engine, backlink and direct access indicator) are constructed based on standard local web usage data. This new type of web-based indicator is developed to model the specific demand for better study/evaluation of the accessibility, visibility and interlinking of open accessible documents. We conclude that e-science will need new stable e-indicators.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 07:10:52 GMT" } ]
2019-01-15T00:00:00
[ [ "Mayr", "Philipp", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0610057
Pierre Loidreau
P. Loidreau
Properties of codes in rank metric
18 pages, 1 figure
null
null
null
cs.DM cs.IT math.IT
null
We study properties of rank metric and codes in rank metric over finite fields. We show that in rank metric perfect codes do not exist. We derive an existence bound that is the equivalent of the Gilbert--Varshamov bound in Hamming metric. We study the asymptotic behavior of the minimum rank distance of codes satisfying GV. We derive the probability distribution of minimum rank distance for random and random $\F{q}$-linear codes. We give an asymptotic equivalent of their average minimum rank distance and show that random $\F{q}$-linear codes are on GV bound for rank metric. We show that the covering density of optimum codes whose codewords can be seen as square matrices is lower bounded by a function depending only on the error-correcting capability of the codes. We show that there are quasi-perfect codes in rank metric over fields of characteristic 2.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 07:58:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Loidreau", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610058
Andrew Krizhanovsky A
A. V. Smirnov, T. V. Levashova, M. P. Pashkin, N. G. Shilov, A. A. Krizhanovsky, A. M. Kashevnik, and A. S. Komarova
Context-sensitive access to e-document corpus
9 pages, 1 figure, short version of this paper was presented at the International Conference Corpus Linguistics 2006. October 10-14, St. Petersburg, Russia
null
null
null
cs.IR
null
The methodology of context-sensitive access to e-documents considers context as a problem model based on the knowledge extracted from the application domain, and presented in the form of application ontology. Efficient access to an information in the text form is needed. Wiki resources as a modern text format provides huge number of text in a semi formalized structure. At the first stage of the methodology, documents are indexed against the ontology representing macro-situation. The indexing method uses a topic tree as a middle layer between documents and the application ontology. At the second stage documents relevant to the current situation (the abstract and operational contexts) are identified and sorted by degree of relevance. Abstract context is a problem-oriented ontology-based model. Operational context is an instantiation of the abstract context with data provided by the information sources. The following parts of the methodology are described: (i) metrics for measuring similarity of e-documents to ontology, (ii) a document index storing results of indexing of e-documents against the ontology; (iii) a method for identification of relevant e-documents based on semantic similarity measures. Wikipedia (wiki resource) is used as a corpus of e-documents for approach evaluation in a case study. Text categorization, the presence of metadata, and an existence of a lot of articles related to different topics characterize the corpus.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 08:02:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Smirnov", "A. V.", "" ], [ "Levashova", "T. V.", "" ], [ "Pashkin", "M. P.", "" ], [ "Shilov", "N. G.", "" ], [ "Krizhanovsky", "A. A.", "" ], [ "Kashevnik", "A. M.", "" ], [ "Komarova", "A. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0610059
Claire Jonchery
Claire Jonchery (MAP5), Fran\c{c}oise Dibos (LAGA, IG), Georges Koepfler (MAP5)
Camera motion estimation through planar deformation determination
21 pages, version modifi\'ee accept\'e le 20 mars 2008
Journal of Mathematical Imaging and Vision 32, 1 (2008) 73-87
10.1007/s10851-008-0086-1
null
cs.CV
null
In this paper, we propose a global method for estimating the motion of a camera which films a static scene. Our approach is direct, fast and robust, and deals with adjacent frames of a sequence. It is based on a quadratic approximation of the deformation between two images, in the case of a scene with constant depth in the camera coordinate system. This condition is very restrictive but we show that provided translation and depth inverse variations are small enough, the error on optical flow involved by the approximation of depths by a constant is small. In this context, we propose a new model of camera motion, that allows to separate the image deformation in a similarity and a ``purely'' projective application, due to change of optical axis direction. This model leads to a quadratic approximation of image deformation that we estimate with an M-estimator; we can immediatly deduce camera motion parameters.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 09:31:52 GMT" }, { "version": "v2", "created": "Thu, 27 Mar 2008 15:25:01 GMT" } ]
2008-09-29T00:00:00
[ [ "Jonchery", "Claire", "", "MAP5" ], [ "Dibos", "Françoise", "", "LAGA, IG" ], [ "Koepfler", "Georges", "", "MAP5" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0610060
Mark Levene
Mark Levene and Judit Bar-Ilan
Comparing Typical Opening Move Choices Made by Humans and Chess Engines
12 pages, 1 figure, 6 tables
null
null
null
cs.AI
null
The opening book is an important component of a chess engine, and thus computer chess programmers have been developing automated methods to improve the quality of their books. For chess, which has a very rich opening theory, large databases of high-quality games can be used as the basis of an opening book, from which statistics relating to move choices from given positions can be collected. In order to find out whether the opening books used by modern chess engines in machine versus machine competitions are ``comparable'' to those used by chess players in human versus human competitions, we carried out analysis on 26 test positions using statistics from two opening books one compiled from humans' games and the other from machines' games. Our analysis using several nonparametric measures, shows that, overall, there is a strong association between humans' and machines' choices of opening moves when using a book to guide their choices.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 10:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Levene", "Mark", "" ], [ "Bar-Ilan", "Judit", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610061
Thomas Michel
Gerhard Wunder, Thomas Michel
The Delay-Limited Capacity Region of OFDM Broadcast Channels
null
null
null
null
cs.IT math.IT
null
In this work, the delay limited capacity (DLC) of orthogonal frequency division multiplexing (OFDM) systems is investigated. The analysis is organized into two parts. In the first part, the impact of system parameters on the OFDM DLC is analyzed in a general setting. The main results are that under weak assumptions the maximum achievable single user DLC is almost independent of the distribution of the path attenuations in the low signal-to-noise (SNR) region but depends strongly on the delay spread. In the high SNR region the roles are exchanged. Here, the impact of delay spread is negligible while the impact of the distribution becomes dominant. The relevant asymptotic quantities are derived without employing simplifying assumptions on the OFDM correlation structure. Moreover, for both cases it is shown that the DLC is maximized if the total channel energy is uniformly spread, i.e. the power delay profile is uniform. It is worth pointing out that since universal bounds are obtained the results can also be used for other classes of parallel channels with block fading characteristic. The second part extends the setting to the broadcast channel and studies the corresponding OFDM DLC BC region. An algorithm for computing the OFDM BC DLC region is presented. To derive simple but smart resource allocation strategies, the principle of rate water-filling employing order statistics is introduced. This yields analytical lower bounds on the OFDM DLC region based on orthogonal frequency division multiple access (OFDMA) and ordinal channel state information (CSI). Finally, the schemes are compared to an algorithm using full CSI.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 10:42:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Wunder", "Gerhard", "" ], [ "Michel", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610062
Frederic Blanqui
Frederic Blanqui (INRIA Lorraine - LORIA)
A type-based termination criterion for dependently-typed higher-order rewrite systems
Colloque avec actes et comit\'{e} de lecture. internationale
Dans 15th International Conference on Rewriting Techniques and Applications - RTA'04 (2004) 15 p
null
null
cs.LO cs.PL
null
Several authors devised type-based termination criteria for ML-like languages allowing non-structural recursive calls. We extend these works to general rewriting and dependent types, hence providing a powerful termination criterion for the combination of rewriting and beta-reduction in the Calculus of Constructions.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 12:47:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Blanqui", "Frederic", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0610063
Frederic Blanqui
Fr\'ed\'eric Blanqui (LRI), Jean-Pierre Jouannaud (LRI), Mitsuhiro Okada
The Calculus of Algebraic Constructions
null
Dans Rewriting Techniques and Applications, 10th International Conference, RTA-99 1631 (1999)
null
null
cs.LO
null
This paper is concerned with the foundations of the Calculus of Algebraic Constructions (CAC), an extension of the Calculus of Constructions by inductive data types. CAC generalizes inductive types equipped with higher-order primitive recursion, by providing definitions of functions by pattern-matching which capture recursor definitions for arbitrary non-dependent and non-polymorphic inductive types satisfying a strictly positivity condition. CAC also generalizes the first-order framework of abstract data types by providing dependent types and higher-order rewrite rules.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 13:45:46 GMT" }, { "version": "v2", "created": "Tue, 27 May 2008 14:54:46 GMT" } ]
2008-05-27T00:00:00
[ [ "Blanqui", "Frédéric", "", "LRI" ], [ "Jouannaud", "Jean-Pierre", "", "LRI" ], [ "Okada", "Mitsuhiro", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610064
Frederic Blanqui
Fr\'ed\'eric Blanqui (LRI)
Termination and Confluence of Higher-Order Rewrite Systems
null
Dans Rewriting Techniques and Applications, 11th International Conference, RTA 2000 1833 (2000)
null
null
cs.LO
null
In the last twenty years, several approaches to higher-order rewriting have been proposed, among which Klop's Combinatory Rewrite Systems (CRSs), Nipkow's Higher-order Rewrite Systems (HRSs) and Jouannaud and Okada's higher-order algebraic specification languages, of which only the last one considers typed terms. The later approach has been extended by Jouannaud, Okada and the present author into Inductive Data Type Systems (IDTSs). In this paper, we extend IDTSs with the CRS higher-order pattern-matching mechanism, resulting in simply-typed CRSs. Then, we show how the termination criterion developed for IDTSs with first-order pattern-matching, called the General Schema, can be extended so as to prove the strong normalization of IDTSs with higher-order pattern-matching. Next, we compare the unified approach with HRSs. We first prove that the extended General Schema can also be applied to HRSs. Second, we show how Nipkow's higher-order critical pair analysis technique for proving local confluence can be applied to IDTSs.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 13:47:47 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610065
Frederic Blanqui
Fr\'ed\'eric Blanqui (LRI)
Definitions by Rewriting in the Calculus of Constructions
Best student paper (Kleene Award)
Dans 16th Annual IEEE Symposium on Logic in Computer Science (2001)
null
null
cs.LO
null
The main novelty of this paper is to consider an extension of the Calculus of Constructions where predicates can be defined with a general form of rewrite rules. We prove the strong normalization of the reduction relation generated by the beta-rule and the user-defined rules under some general syntactic conditions including confluence. As examples, we show that two important systems satisfy these conditions: a sub-system of the Calculus of Inductive Constructions which is the basis of the proof assistant Coq, and the Natural Deduction Modulo a large class of equational theories.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 13:48:36 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610066
Frederic Blanqui
Fr\'ed\'eric Blanqui (LRI), Jean-Pierre Jouannaud (LRI), Mitsuhiro Okada
Inductive-data-type Systems
Theoretical Computer Science (2002)
null
10.1016/S0304-3975(00)00347-9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a previous work ("Abstract Data Type Systems", TCS 173(2), 1997), the last two authors presented a combined language made of a (strongly normalizing) algebraic rewrite system and a typed lambda-calculus enriched by pattern-matching definitions following a certain format, called the "General Schema", which generalizes the usual recursor definitions for natural numbers and similar "basic inductive types". This combined language was shown to be strongly normalizing. The purpose of this paper is to reformulate and extend the General Schema in order to make it easily extensible, to capture a more general class of inductive types, called "strictly positive", and to ease the strong normalization proof of the resulting system. This result provides a computation model for the combination of an algebraic specification language based on abstract data types and of a strongly typed functional language with strictly positive inductive types.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 13:54:42 GMT" }, { "version": "v2", "created": "Mon, 16 Sep 2013 17:40:37 GMT" } ]
2013-09-17T00:00:00
[ [ "Blanqui", "Frédéric", "", "LRI" ], [ "Jouannaud", "Jean-Pierre", "", "LRI" ], [ "Okada", "Mitsuhiro", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610067
W Saba
Walid S. Saba
Language, logic and ontology: uncovering the structure of commonsense knowledge
30 pages, 7 figures, 3 tables under revision for a journal submission
null
null
null
cs.AI math.LO
null
The purpose of this paper is twofold: (i) we argue that the structure of commonsense knowledge must be discovered, rather than invented; and (ii) we argue that natural language, which is the best known theory of our (shared) commonsense knowledge, should itself be used as a guide to discovering the structure of commonsense knowledge. In addition to suggesting a systematic method to the discovery of the structure of commonsense knowledge, the method we propose seems to also provide an explanation for a number of phenomena in natural language, such as metaphor, intensionality, and the semantics of nominal compounds. Admittedly, our ultimate goal is quite ambitious, and it is no less than the systematic 'discovery' of a well-typed ontology of commonsense knowledge, and the subsequent formulation of the long-awaited goal of a meaning algebra.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 14:04:28 GMT" }, { "version": "v2", "created": "Thu, 12 Oct 2006 15:01:55 GMT" }, { "version": "v3", "created": "Tue, 17 Oct 2006 18:59:21 GMT" } ]
2007-06-13T00:00:00
[ [ "Saba", "Walid S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
cs/0610068
Frederic Blanqui
Fr\'ed\'eric Blanqui (LRI)
Type theory and rewriting
English version of my PhD thesis
null
null
null
cs.LO
null
We study the properties, in particular termination, of dependent types systems for lambda calculus and rewriting.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 14:09:16 GMT" }, { "version": "v2", "created": "Thu, 22 Feb 2007 08:54:59 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610069
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Futurs)
An Isabelle formalization of protocol-independent secrecy with an application to e-commerce
null
null
null
null
cs.LO
null
A protocol-independent secrecy theorem is established and applied to several non-trivial protocols. In particular, it is applied to protocols proposed for protecting the computation results of free-roaming mobile agents doing comparison shopping. All the results presented here have been formally proved in Isabelle by building on Larry Paulson's inductive approach. This therefore provides a library of general theorems that can be applied to other protocols.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 14:20:28 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610070
Frederic Blanqui
Fr\'ed\'eric Blanqui (LIX)
Inductive types in the Calculus of Algebraic Constructions
null
Dans Typed Lambda Calculi and Applications, 6th International Conference, TLCA 2003 2701 (2003)
null
null
cs.LO
null
In a previous work, we proved that almost all of the Calculus of Inductive Constructions (CIC), which is the basis of the proof assistant Coq, can be seen as a Calculus of Algebraic Constructions (CAC), an extension of the Calculus of Constructions with functions and predicates defined by higher-order rewrite rules. In this paper, we not only prove that CIC as a whole can be seen as a CAC, but also that it can be extended with non-free constructors, pattern-matching on defined symbols, non-strictly positive types and inductive-recursive types.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 15:18:13 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "LIX" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610071
Frederic Blanqui
Fr\'ed\'eric Blanqui (LIX)
Rewriting modulo in Deduction modulo
null
Dans Rewriting Techniques and Applications, 14th International Conference, RTA 2003 2706 (2003)
null
null
cs.LO
null
We study the termination of rewriting modulo a set of equations in the Calculus of Algebraic Constructions, an extension of the Calculus of Constructions with functions and predicates defined by higher-order rewrite rules. In a previous work, we defined general syntactic conditions based on the notion of computable closure for ensuring the termination of the combination of rewriting and beta-reduction. Here, we show that this result is preserved when considering rewriting modulo a set of equations if the equivalence classes generated by these equations are finite, the equations are linear and satisfy general syntactic conditions also based on the notion of computable closure. This includes equations like associativity and commutativity, and provides an original treatment of termination modulo equations.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 15:21:50 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "LIX" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610072
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA, LIX)
Definitions by rewriting in the Calculus of Constructions
Journal version of LICS'01
Mathematical Structures in Computer Science 15, 1 (2005) 37-92
10.1017/S0960129504004426
Journal version of LICS'01
cs.LO
null
This paper presents general syntactic conditions ensuring the strong normalization and the logical consistency of the Calculus of Algebraic Constructions, an extension of the Calculus of Constructions with functions and predicates defined by higher-order rewrite rules. On the one hand, the Calculus of Constructions is a powerful type system in which one can formalize the propositions and natural deduction proofs of higher-order logic. On the other hand, rewriting is a simple and powerful computation paradigm. The combination of both allows, among other things, to develop formal proofs with a reduced size and more automation compared with more traditional proof assistants. The main novelty is to consider a general form of rewriting at the predicate-level which generalizes the strong elimination of the Calculus of Inductive Constructions.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 11:47:54 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA, LIX" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610073
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA)
Inductive types in the Calculus of Algebraic Constructions
Journal version of TLCA'03
Fundamenta Informaticae 65, 1-2 (2005) 61-86
null
Journal version of TLCA'03
cs.LO
null
In a previous work, we proved that an important part of the Calculus of Inductive Constructions (CIC), the basis of the Coq proof assistant, can be seen as a Calculus of Algebraic Constructions (CAC), an extension of the Calculus of Constructions with functions and predicates defined by higher-order rewrite rules. In this paper, we prove that almost all CIC can be seen as a CAC, and that it can be further extended with non-strictly positive types and inductive-recursive types together with non-free constructors and pattern-matching on defined symbols.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 11:48:39 GMT" } ]
2016-08-16T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610074
Georg Schmidt
Georg Schmidt, Vladimir R. Sidorenko, and Martin Bossert
Collaborative Decoding of Interleaved Reed-Solomon Codes and Concatenated Code Designs
20 pages, 7 figures
null
null
null
cs.IT math.IT
null
Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction of error patterns beyond half the minimum distance, provided that the errors in the received signal occur in bursts. In this work, collaborative decoding of interleaved Reed-Solomon codes by multi-sequence shift-register synthesis is considered and analyzed. Based on the framework of interleaved Reed-Solomon codes, concatenated code designs are investigated, which are obtained by interleaving several Reed-Solomon codes, and concatenating them with an inner block code.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 18:02:47 GMT" }, { "version": "v2", "created": "Thu, 12 Oct 2006 20:23:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Georg", "" ], [ "Sidorenko", "Vladimir R.", "" ], [ "Bossert", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610075
Marek Czachor
Diederik Aerts, Marek Czachor, Bart De Moor
On Geometric Algebra representation of Binary Spatter Codes
preliminary version
null
null
null
cs.AI quant-ph
null
Kanerva's Binary Spatter Codes are reformulated in terms of geometric algebra. The key ingredient of the construction is the representation of XOR binding in terms of geometric product.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 18:48:22 GMT" }, { "version": "v2", "created": "Mon, 23 Oct 2006 13:56:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Aerts", "Diederik", "" ], [ "Czachor", "Marek", "" ], [ "De Moor", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0610076
Willy Valdivia-Granda
Willy Valdivia-Granda, William Perrizo, Edward Deckard, Francis Larson
Peano Count Trees (P-Trees) and Rule Association Mining for Gene Expression Profiling of Microarray Data
null
2002 International Conference in Bioinformatics. Bangkok, Thailand
null
null
cs.DS cs.IR q-bio.MN
null
The greatest challenge in maximizing the use of gene expression data is to develop new computational tools capable of interconnecting and interpreting the results from different organisms and experimental settings. We propose an integrative and comprehensive approach including a super-chip containing data from microarray experiments collected on different species subjected to hypoxic and anoxic stress. A data mining technology called Peano count tree (P-trees) is used to represent genomic data in multidimensions. Each microarray spot is presented as a pixel with its corresponding red/green intensity feature bands. Each bad is stored separately in a reorganized 8-separate (bSQ) file format. Each bSQ is converted to a quadrant base tree structure (P-tree) from which a superchip is represented as expression P-trees (EP-trees) and repression P-trees (RP-trees). The use of association rule mining is proposed to derived to meanigingfully organize signal transduction pathways taking in consideration evolutionary considerations. We argue that the genetic constitution of an organism (K) can be represented by the total number of genes belonging to two groups. The group X constitutes genes (X1,Xn) and they can be represented as 1 or 0 depending on whether the gene was expressed or not. The second group of Y genes (Y1,Yn) is expressed at different levels. These genes have a very high repression, high expression, very repressed or highly repressed. However, many genes of the group Y are specie specific and modulated by the products and combinations of genes of the group X. In this paper, we introduce the dSQ and P-tree technology; the biological implications of association rule mining using X and Y gene groups and some advances in the integration of this information using the BRAIN architecture.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 19:55:32 GMT" }, { "version": "v2", "created": "Fri, 13 Oct 2006 18:27:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Valdivia-Granda", "Willy", "" ], [ "Perrizo", "William", "" ], [ "Deckard", "Edward", "" ], [ "Larson", "Francis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" } ]
cs/0610077
Niranjay Ravindran
Niranjay Ravindran and Nihar Jindal
MIMO Broadcast Channels with Block Diagonalization and Finite Rate Feedback
4 pages, 3 figures, submitted to International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2007
null
null
null
cs.IT math.IT
null
Block diagonalization is a linear precoding technique for the multiple antenna broadcast (downlink) channel that involves transmission of multiple data streams to each receiver such that no multi-user interference is experienced at any of the receivers. This low-complexity scheme operates only a few dB away from capacity but does require very accurate channel knowledge at the transmitter, which can be very difficult to obtain in fading scenarios. We consider a limited feedback system where each receiver knows its channel perfectly, but the transmitter is only provided with a finite number of channel feedback bits from each receiver. Using a random vector quantization argument, we quantify the throughput loss due to imperfect channel knowledge as a function of the feedback level. The quality of channel knowledge must improve proportional to the SNR in order to prevent interference-limitations, and we show that scaling the number of feedback bits linearly with the system SNR is sufficient to maintain a bounded rate loss. Finally, we investigate a simple scalar quantization scheme that is seen to achieve the same scaling behavior as vector quantization.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 20:16:16 GMT" } ]
2007-07-16T00:00:00
[ [ "Ravindran", "Niranjay", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610078
Fehmi Ben Abdesslem
Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias de Amorim, Katia Obraczka, Ignacio Solis, and Serge Fdida
Rapid Prototyping over IEEE 802.11
Changed content. 12 pages
null
null
null
cs.NI
null
This paper introduces Prawn, a tool for prototyping communication protocols over IEEE 802.11 networks. Prawn allows researchers to conduct both functional assessment and performance evaluation as an inherent part of the protocol design process. Since Prawn runs on real IEEE 802.11 nodes, prototypes can be evaluated and adjusted under realistic conditions. Once the prototype has been extensively tested and thoroughly validated, and its functional design tuned accordingly, it is then ready for implementation. Prawn facilitates prototype development by providing: (i) a set of building blocks that implement common functions needed by a wide range of wireless protocols (e.g., neighbor discovery, link quality assessment, message transmission and reception), and (ii) an API that allows protocol designers to access Prawn primitives. We show through a number of case studies how Prawn supports prototyping as part of protocol design and, as a result of enabling deployment and testing under real-world scenarios, how Prawn provides useful feedback on protocol operation and performance.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 15:29:44 GMT" }, { "version": "v2", "created": "Sat, 3 Feb 2007 21:41:58 GMT" }, { "version": "v3", "created": "Tue, 22 May 2007 16:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Abdesslem", "Fehmi Ben", "" ], [ "Iannone", "Luigi", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Obraczka", "Katia", "" ], [ "Solis", "Ignacio", "" ], [ "Fdida", "Serge", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610079
Shengtian Yang
Shengtian Yang, Peiliang Qiu
An Enhanced Covering Lemma for Multiterminal Source Coding
To appear in Proc. 2006 IEEE Information Theory Workshop, October 22-26, 2006, Chengdu, China. (5 pages)
null
10.1109/ITW2.2006.323809
null
cs.IT math.IT
null
An enhanced covering lemma for a Markov chain is proved in this paper, and then the distributed source coding problem of correlated general sources with one average distortion criterion under fixed-length coding is investigated. Based on the enhanced lemma, a sufficient and necessary condition for determining the achievability of rate-distortion triples is given.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 00:22:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Yang", "Shengtian", "" ], [ "Qiu", "Peiliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610080
Martin Ziegler
St\'ephane Le Roux and Martin Ziegler
Computable Closed Euclidean Subsets with and without Computable Points
Included helpful remarks of J.Miller and of X.Zheng
null
null
null
cs.LO math.LO
null
The empty set of course contains no computable point. On the other hand, surprising results due to Zaslavskii, Tseitin, Kreisel, and Lacombe assert the existence of NON-empty co-r.e. closed sets devoid of computable points: sets which are `large' in the sense of positive Lebesgue measure. We observe that a certain size is in fact necessary: every non-empty co-r.e. closed real set without computable points has continuum cardinality. This leads us to investigate for various classes of computable real subsets whether they necessarily contain a (not necessarily effectively findable) computable point.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 07:45:05 GMT" }, { "version": "v2", "created": "Mon, 23 Oct 2006 08:51:38 GMT" }, { "version": "v3", "created": "Thu, 14 Dec 2006 14:26:00 GMT" }, { "version": "v4", "created": "Mon, 12 Mar 2007 10:32:27 GMT" }, { "version": "v5", "created": "Fri, 22 Jun 2007 18:18:23 GMT" } ]
2011-08-04T00:00:00
[ [ "Roux", "Stéphane Le", "" ], [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
cs/0610081
Lars Birkedal
Lars Birkedal, Noah Torp-Smith, Hongseok Yang
Semantics of Separation-Logic Typing and Higher-order Frame Rules for<br> Algol-like Languages
null
Logical Methods in Computer Science, Volume 2, Issue 5 (November 3, 2006) lmcs:2232
10.2168/LMCS-2(5:1)2006
null
cs.LO
null
We show how to give a coherent semantics to programs that are well-specified in a version of separation logic for a language with higher types: idealized algol extended with heaps (but with immutable stack variables). In particular, we provide simple sound rules for deriving higher-order frame rules, allowing for local reasoning.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 08:21:31 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2006 13:02:58 GMT" } ]
2017-01-11T00:00:00
[ [ "Birkedal", "Lars", "" ], [ "Torp-Smith", "Noah", "" ], [ "Yang", "Hongseok", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610082
Sander Stepanov Dr.
Sander Stepanov, Ofer Hadar
Theoretical analysis of network cranback protocols performance
null
null
null
null
cs.IT math.IT
null
Suggested the decision of the network cranback protocols performance analyzing problem from Eyal Felstine, Reuven Cohen and Ofer Hadar, " Crankback Prediction in Hierarchical ATM networks", Journal of Network and Systems Management, Vol. 10, No. 3, September 2002. It show that the false alarm probability and probability of successful way crossing can be calculated. The main optimization equations are developed for cranback protocol parameters by using analytical expressions for statistical protocol characteristics.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 11:21:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "Sander", "" ], [ "Hadar", "Ofer", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610083
Sander Stepanov Dr.
Sander Stepanov
Estimation of the traffic in the binary channel for data networks
null
null
null
null
cs.IT math.IT
null
It is impossible to provide an effective utilization of communication networks without the analysis of the quantitative characteristics of the traffic in real time. The constant supervision of all channels of the data practically is impracticable because requires transfer of the significant additional information on a network and large resources expenses for devices of the control. Thus, the task on traffic estimation with small expenses in real time is the urgent.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 11:47:07 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "Sander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610084
Thomas Claveirole
Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, and Yannis Viniotis
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks
9 pages, 3 figures, 2 tables
null
null
null
cs.NI cs.CR
null
A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. In order to secure data aggregation, in this paper we propose three schemes that rely on multipath routing. The first one guarantees data confidentiality through secret sharing, while the second and third ones provide data availability through information dispersal. Based on qualitative analysis and implementation, we show that, by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 13:01:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Claveirole", "Thomas", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Abdalla", "Michel", "" ], [ "Viniotis", "Yannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0610085
Farn Wang
Farn Wang
Symbolic Simulation-Checking of Dense-Time Systems
16 pages, 1 figure
null
null
null
cs.LO cs.SE
null
Intuitively, an (implementation) automata is simulated by a (specification) automata if every externally observable transition by the implementation automata can also be made by the specification automata. In this work, we present a symbolic algorithm for the simulation-checking of timed automatas. We first present a simulation-checking procedure that operates on state spaces, representable with convex polyhedra, of timed automatas. We then present techniques to represent those intermediate result convex polyhedra with zones and make the procedure an algorithm. We then discuss how to handle Zeno states in the implementation automata. Finally, we have endeavored to realize the algorithm and report the performance of our algorithm in the experiment.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 18:02:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0610086
Stephen A. Fenner
S. A. Fenner, Y. Zhang
The central nature of the Hidden Subgroup problem
12 pages, no figures. Corrected Proposition 3.3 and added discussion relating it to results of Childs and van Dam (quant-ph/0507190). Adjusted Definition 2.2 and the proof of Proposition 3.3 to fix a minor bug. Other minor corrections/clarifications. Updated references
null
null
null
cs.CC quant-ph
null
We show that several problems that figure prominently in quantum computing, including Hidden Coset, Hidden Shift, and Orbit Coset, are equivalent or reducible to Hidden Subgroup for a large variety of groups. We also show that, over permutation groups, the decision version and search version of Hidden Subgroup are polynomial-time equivalent. For Hidden Subgroup over dihedral groups, such an equivalence can be obtained if the order of the group is smooth. Finally, we give nonadaptive program checkers for Hidden Subgroup and its decision version.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 18:24:18 GMT" }, { "version": "v2", "created": "Fri, 17 Nov 2006 23:46:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Fenner", "S. A.", "" ], [ "Zhang", "Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0610087
Henry Jerez
Joud Khoury, Henry N Jerez, Nicolas Nehme-Antoun, Chaouki Abdallah
An Application of the Mobile Transient Internet Architecture to IP Mobility and Inter-Operability
null
null
null
null
cs.NI
null
We introduce an application of a mobile transient network architecture on top of the current Internet. This paper is an application extension to a conceptual mobile network architecture. It attempts to specifically reinforce some of the powerful notions exposed by the architecture from an application perspective. Of these notions, we explore the network expansion layer, an overlay of components and services, that enables a persistent identification network and other required services. The overlay abstraction introduces several benefits of which mobility and communication across heterogenous network structures are of interest to this paper. We present implementations of several components and protocols including gateways, Agents and the Open Device Access Protocol. Our present identification network implementation exploits the current implementation of the Handle System through the use of distributed, global and persistent identifiers called handles. Handles are used to identify and locate devices and services abstracting any physical location or network association from the communicating ends. A communication framework is finally demonstrated that would allow for mobile devices on the public Internet to have persistent identifiers and thus be persistently accessible either directly or indirectly. This application expands IP inter-operability beyond its current boundaries.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 22:12:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Khoury", "Joud", "" ], [ "Jerez", "Henry N", "" ], [ "Nehme-Antoun", "Nicolas", "" ], [ "Abdallah", "Chaouki", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610088
Amelia Sparavigna
A. Sparavigna and B. Montrucchio
Vector field visualization with streamlines
9 pges, 7 figures
null
null
null
cs.GR
null
We have recently developed an algorithm for vector field visualization with oriented streamlines, able to depict the flow directions everywhere in a dense vector field and the sense of the local orientations. The algorithm has useful applications in the visualization of the director field in nematic liquid crystals. Here we propose an improvement of the algorithm able to enhance the visualization of the local magnitude of the field. This new approach of the algorithm is compared with the same procedure applied to the Line Integral Convolution (LIC) visualization.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 09:25:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Sparavigna", "A.", "" ], [ "Montrucchio", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0610089
Himanshu Thapliyal
Himanshu Thapliyal and Mark Zwolinski
Reversible Logic to Cryptographic Hardware: A New Paradigm
Published in the proceedings of the The 49th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August 2006. Nominated for the Student Paper Award
null
null
null
cs.CR
null
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed in the working digital circuit. To prevent this type of attack, this paper proposes the use of reversible logic for designing the ALU of a cryptosystem. Ideally, reversible circuits dissipate zero energy. Thus, it would be of great significance to apply reversible logic to designing secure cryptosystems. As far as is known, this is the first attempt to apply reversible logic to developing secure cryptosystems. In a prototype of a reversible ALU for a crypto-processor, reversible designs of adders and Montgomery multipliers are presented. The reversible designs of a carry propagate adder, four-to-two and five-to-two carry save adders are presented using a reversible TSG gate. One of the important properties of the TSG gate is that it can work singly as a reversible full adder. In order to design the reversible Montgomery multiplier, novel reversible sequential circuits are also proposed which are integrated with the proposed adders to design a reversible modulo multiplier. It is intended that this paper will provide a starting point for developing cryptosystems secure against DPA attacks.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 10:19:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Zwolinski", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0610090
Himanshu Thapliyal
Himanshu Thapliyal, Hamid R. Arabnia and A.P Vinod
Combined Integer and Floating Point Multiplication Architecture(CIFM) for FPGAs and Its Reversible Logic Implementation
Published in the proceedings of the The 49th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August 2006. Nominated for the Student Paper Award(12 papers are nominated for Student paper Award among all submissions)
null
10.1109/MWSCAS.2006.382306
null
cs.AR
null
In this paper, the authors propose the idea of a combined integer and floating point multiplier(CIFM) for FPGAs. The authors propose the replacement of existing 18x18 dedicated multipliers in FPGAs with dedicated 24x24 multipliers designed with small 4x4 bit multipliers. It is also proposed that for every dedicated 24x24 bit multiplier block designed with 4x4 bit multipliers, four redundant 4x4 multiplier should be provided to enforce the feature of self repairability (to recover from the faults). In the proposed CIFM reconfigurability at run time is also provided resulting in low power. The major source of motivation for providing the dedicated 24x24 bit multiplier stems from the fact that single precision floating point multiplier requires 24x24 bit integer multiplier for mantissa multiplication. A reconfigurable, self-repairable 24x24 bit multiplier (implemented with 4x4 bit multiply modules) will ideally suit this purpose, making FPGAs more suitable for integer as well floating point operations. A dedicated 4x4 bit multiplier is also proposed in this paper. Moreover, in the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. It is not possible to realize quantum computing without reversible logic. Thus, this paper also paper provides the reversible logic implementation of the proposed CIFM. The reversible CIFM designed and proposed here will form the basis of the completely reversible FPGAs.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 10:39:42 GMT" } ]
2016-11-17T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ], [ "Vinod", "A. P", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0610091
Pedro Miramontes
R. Mansilla, E. K\"oppen, G. Cocho and P. Miramontes
On the Behavior of Journal Impact Factor Rank-Order Distribution
Submitted to the Journal of Informetrics, redundat text cropped, bibliography corrected, new section added, typos corrected
null
null
null
cs.IR physics.soc-ph
null
An empirical law for the rank-order behavior of journal impact factors is found. Using an extensive data base on impact factors including journals on Education, Agrosciences, Geosciences, Biosciences and Environ- mental, Chemical, Computer, Engineering, Material, Mathematical, Medical and Physical Sciences we have found extremely good fits out- performing other rank-order models. Some extensions to other areas of knowledge are discussed.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 17:03:46 GMT" }, { "version": "v2", "created": "Tue, 17 Oct 2006 14:10:01 GMT" }, { "version": "v3", "created": "Thu, 26 Oct 2006 17:54:29 GMT" }, { "version": "v4", "created": "Sun, 24 Dec 2006 06:03:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Mansilla", "R.", "" ], [ "Köppen", "E.", "" ], [ "Cocho", "G.", "" ], [ "Miramontes", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0610092
David Eppstein
David Eppstein
Happy endings for flip graphs
26 pages, 15 figures. Revised and expanded for journal publication
Journal of Computational Geometry 1(1):3-28, 2010
10.20382/jocg.v1i1a2
null
cs.CG math.CO math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the triangulations of a finite point set form a flip graph that can be embedded isometrically into a hypercube, if and only if the point set has no empty convex pentagon. Point sets of this type include convex subsets of lattices, points on two lines, and several other infinite families. As a consequence, flip distance in such point sets can be computed efficiently.
[ { "version": "v1", "created": "Sun, 15 Oct 2006 01:30:48 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2010 06:36:23 GMT" } ]
2016-08-12T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
cs/0610093
Hans van Ditmarsch
H.P. van Ditmarsch and B.P. Kooi
Semantic results for ontic and epistemic change
null
G. Bonanno, W. van der Hoek, and M. Wooldridge (editors), Logic and the Foundations of Game and Decision Theory (LOFT 7), pages 87-117. Texts in Logic and Games, Amsterdam University Press, 2008
null
null
cs.LO cs.AI cs.MA
null
We give some semantic results for an epistemic logic incorporating dynamic operators to describe information changing events. Such events include epistemic changes, where agents become more informed about the non-changing state of the world, and ontic changes, wherein the world changes. The events are executed in information states that are modeled as pointed Kripke models. Our contribution consists of three semantic results. (i) Given two information states, there is an event transforming one into the other. The linguistic correspondent to this is that every consistent formula can be made true in every information state by the execution of an event. (ii) A more technical result is that: every event corresponds to an event in which the postconditions formalizing ontic change are assignments to `true' and `false' only (instead of assignments to arbitrary formulas in the logical language). `Corresponds' means that execution of either event in a given information state results in bisimilar information states. (iii) The third, also technical, result is that every event corresponds to a sequence of events wherein all postconditions are assignments of a single atom only (instead of simultaneous assignments of more than one atom).
[ { "version": "v1", "created": "Sun, 15 Oct 2006 04:48:48 GMT" }, { "version": "v2", "created": "Sat, 7 Jul 2007 05:21:33 GMT" }, { "version": "v3", "created": "Fri, 13 Jul 2007 19:23:39 GMT" }, { "version": "v4", "created": "Tue, 6 Nov 2007 20:30:47 GMT" } ]
2011-11-02T00:00:00
[ [ "van Ditmarsch", "H. P.", "" ], [ "Kooi", "B. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0610094
Ali Mesbah
Ali Mesbah and Arie van Deursen
Migrating Multi-page Web Applications to Single-page AJAX Interfaces
null
Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR'07), IEEE Computer Society, 2007
null
TUD-SERG-2006-018
cs.SE
null
Recently, a new web development technique for creating interactive web applications, dubbed AJAX, has emerged. In this new model, the single-page web interface is composed of individual components which can be updated/replaced independently. With the rise of AJAX web applications classical multi-page web applications are becoming legacy systems. If until a year ago, the concern revolved around migrating legacy systems to web-based settings, today we have a new challenge of migrating web applications to single-page AJAX applications. Gaining an understanding of the navigational model and user interface structure of the source application is the first step in the migration process. In this paper, we explore how reverse engineering techniques can help analyze classic web applications for this purpose. Our approach, using a schema-based clustering technique, extracts a navigational model of web applications, and identifies candidate user interface components to be migrated to a single-page AJAX interface. Additionally, results of a case study, conducted to evaluate our tool, are presented.
[ { "version": "v1", "created": "Sun, 15 Oct 2006 07:36:19 GMT" }, { "version": "v2", "created": "Wed, 3 Jan 2007 14:17:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Mesbah", "Ali", "" ], [ "van Deursen", "Arie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0610095
Omer Gim\'enez Mr.
Omer Gim\'enez
Solving planning domains with polytree causal graphs is NP-complete
null
null
null
null
cs.AI cs.CC
null
We show that solving planning domains on binary variables with polytree causal graph is \NP-complete. This is in contrast to a polynomial-time algorithm of Domshlak and Brafman that solves these planning domains for polytree causal graphs of bounded indegree.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 06:18:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Giménez", "Omer", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0610096
Sandrine Blazy
Sandrine Blazy (CEDRIC)
Partial Evaluation for Program Comprehension
null
Dans ACM Computing Surveys, Symposium on partial evaluation 30, 3 es (1998)
null
null
cs.SE
null
Program comprehension is the most tedious and time consuming task of software maintenance, an important phase of the software life cycle. This is particularly true while maintaining scientific application programs that have been written in Fortran for decades and that are still vital in various domains even though more modern languages are used to implement their user interfaces. Very often, programs have evolved as their application domains increase continually and have become very complex due to extensive modifications. This generality in programs is implemented by input variables whose value does not vary in the context of a given application. Thus, it is very interesting for the maintainer to propagate such information, that is to obtain a simplified program, which behaves like the initial one when used according to the restriction. We have adapted partial evaluation for program comprehension. Our partial evaluator performs mainly two tasks: constant propagation and statements simplification. It includes an interprocedural alias analysis. As our aim is program comprehension rather than optimization, there are two main differences with classical partial evaluation. We do not change the original
[ { "version": "v1", "created": "Mon, 16 Oct 2006 09:05:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Blazy", "Sandrine", "", "CEDRIC" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0610097
Sandrine Blazy
Sandrine Blazy (CEDRIC), Fr\'ed\'eric Gervais (CEDRIC), R\'egine Laleau (CEDRIC)
Reuse of Specification Patterns with the B Method
null
Dans ZB 2003: Formal Specification and Development in Z and B, 2651 (2003) 40-57
null
null
cs.SE
null
This paper describes an approach for reusing specification patterns. Specification patterns are design patterns that are expressed in a formal specification language. Reusing a specification pattern means instantiating it or composing it with other specification patterns. Three levels of composition are defined: juxtaposition, composition with inter-patterns links and unification. This paper shows through examples how to define specification patterns in B, how to reuse them directly in B, and also how to reuse the proofs associated with specification patterns.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 09:07:14 GMT" } ]
2016-08-16T00:00:00
[ [ "Blazy", "Sandrine", "", "CEDRIC" ], [ "Gervais", "Frédéric", "", "CEDRIC" ], [ "Laleau", "Régine", "", "CEDRIC" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0610098
Joseph Y. Halpern
Joseph Y. Halpern and Yoram Moses
Characterizing Solution Concepts in Games Using Knowledge-Based Programs
To appear, IJCAI 2007
null
null
null
cs.GT cs.DC cs.MA
null
We show how solution concepts in games such as Nash equilibrium, correlated equilibrium, rationalizability, and sequential equilibrium can be given a uniform definition in terms of \emph{knowledge-based programs}. Intuitively, all solution concepts are implementations of two knowledge-based programs, one appropriate for games represented in normal form, the other for games represented in extensive form. These knowledge-based programs can be viewed as embodying rationality. The representation works even if (a) information sets do not capture an agent's knowledge, (b) uncertainty is not represented by probability, or (c) the underlying game is not common knowledge.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 13:00:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Moses", "Yoram", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0610099
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Properties of Codes with the Rank Metric
5 pages, 4 figures, accepted to Globecom 2006
null
null
null
cs.IT math.IT
null
In this paper, we study properties of rank metric codes in general and maximum rank distance (MRD) codes in particular. For codes with the rank metric, we first establish Gilbert and sphere-packing bounds, and then obtain the asymptotic forms of these two bounds and the Singleton bound. Based on the asymptotic bounds, we observe that asymptotically Gilbert-Varsharmov bound is exceeded by MRD codes and sphere-packing bound cannot be attained. We also establish bounds on the rank covering radius of maximal codes, and show that all MRD codes are maximal codes and all the MRD codes known so far achieve the maximum rank covering radius.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 20:16:42 GMT" }, { "version": "v2", "created": "Wed, 25 Oct 2006 02:52:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610100
Henry Jerez
Henry N Jerez, Joud Khoury, Chaouki Abdallah
A Mobile Transient Internet Architecture
null
null
null
null
cs.NI cs.IT math.IT
null
This paper describes a new architecture for transient mobile networks destined to merge existing and future network architectures, communication implementations and protocol operations by introducing a new paradigm to data delivery and identification. The main goal of our research is to enable seamless end-to-end communication between mobile and stationary devices across multiple networks and through multiple communication environments. The architecture establishes a set of infrastructure components and protocols that set the ground for a Persistent Identification Network (PIN). The basis for the operation of PIN is an identification space consisting of unique location independent identifiers similar to the ones implemented in the Handle system. Persistent Identifiers are used to identify and locate Digital Entities which can include devices, services, users and even traffic. The architecture establishes a primary connection independent logical structure that can operate over conventional networks or more advanced peer-to-peer aggregation networks. Communication is based on routing pools and novel protocols for routing data across several abstraction levels of the network, regardless of the end-points' current association and state...
[ { "version": "v1", "created": "Tue, 17 Oct 2006 04:47:06 GMT" } ]
2007-07-16T00:00:00
[ [ "Jerez", "Henry N", "" ], [ "Khoury", "Joud", "" ], [ "Abdallah", "Chaouki", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610101
Dario Tamascelli
Diego de Falco and Dario Tamascelli
Entropy generation in a model of reversible computation
13 pages, 6 figures
RAIRO-Inf.Theor.Appl. 40, (2006) 93-105
10.1051/ita:2006013
null
cs.CC quant-ph
null
We present a model in which, due to the quantum nature of the signals controlling the implementation time of successive unitary computational steps, \emph{physical} irreversibility appears in the execution of a \emph{logically} reversible computation.
[ { "version": "v1", "created": "Tue, 17 Oct 2006 08:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "de Falco", "Diego", "" ], [ "Tamascelli", "Dario", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0610102
Arindam Mitra
Arindam Mitra
Quantum communication is possible with pure state
null
null
null
null
cs.IT math.IT
null
It is believed that quantum communication is not possible with a pure ensemble of states because quantum entropy of pure state is zero. This is indeed possible due to geometric consequence of entanglement.
[ { "version": "v1", "created": "Tue, 17 Oct 2006 15:42:11 GMT" }, { "version": "v2", "created": "Thu, 1 Feb 2007 15:41:25 GMT" }, { "version": "v3", "created": "Thu, 6 Mar 2008 11:19:34 GMT" } ]
2008-03-06T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610103
Praveen Kumar Gopala
Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal
On the Secrecy Capacity of Fading Channels
18 pages, 3 figures, Submitted to the IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
null
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full Channel State Information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average SNR goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Remarkably, our results reveal the positive impact of fading on the secrecy capacity and establish the critical role of rate adaptation, based on the main channel CSI, in facilitating secure communications over slow fading channels.
[ { "version": "v1", "created": "Tue, 17 Oct 2006 19:48:47 GMT" } ]
2007-07-16T00:00:00
[ [ "Gopala", "Praveen Kumar", "" ], [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610104
Young-Han Nam
Young-Han Nam, Praveen Kumar Gopala and Hesham El Gamal
ARQ Diversity in Fading Random Access Channels
24 pages, 6 figures, submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
null
A cross-layer optimization approach is adopted for the design of symmetric random access wireless systems. Instead of the traditional collision model, a more realistic physical layer model is considered. Based on this model, an Incremental Redundancy Automatic Repeat reQuest (IR-ARQ) scheme, tailored to jointly combat the effects of collisions, multi-path fading, and additive noise, is developed. The Diversity-Multiplexing-Delay tradeoff (DMDT) of the proposed scheme is analyzed for fully-loaded queues, and compared with that of Gallager tree algorithm for collision resolution and the network-assisted diversity multiple access (NDMA) protocol of Tsatsanis et al.. The fully-loaded queue model is then replaced by one with random arrivals, under which these protocols are compared in terms of the stability region, average delay and diversity gain. Overall, our analytical and numerical results establish the superiority of the proposed IR-ARQ scheme and reveal some important insights. For example, it turns out that the performance is optimized, for a given total throughput, by maximizing the probability that a certain user sends a new packet and minimizing the transmission rate employed by each user.
[ { "version": "v1", "created": "Tue, 17 Oct 2006 21:54:12 GMT" } ]
2007-07-16T00:00:00
[ [ "Nam", "Young-Han", "" ], [ "Gopala", "Praveen Kumar", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610105
Vitaly Shmatikov
Arvind Narayanan and Vitaly Shmatikov
How To Break Anonymity of the Netflix Prize Dataset
null
null
null
null
cs.CR cs.DB
null
We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge. We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service. We demonstrate that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber's record in the dataset. Using the Internet Movie Database as the source of background knowledge, we successfully identified the Netflix records of known users, uncovering their apparent political preferences and other potentially sensitive information.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 06:03:41 GMT" }, { "version": "v2", "created": "Thu, 22 Nov 2007 05:13:06 GMT" } ]
2007-11-22T00:00:00
[ [ "Narayanan", "Arvind", "" ], [ "Shmatikov", "Vitaly", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0610106
Praveen Kumar Gopala
Praveen Kumar Gopala, Young-Han Nam and Hesham El Gamal
On the Error Exponents of ARQ Channels with Deadlines
16 pages, 6 figures, Submitted to the IEEE Trans. on Information Theory
null
10.1109/TIT.2007.907431
null
cs.IT math.IT
null
We consider communication over Automatic Repeat reQuest (ARQ) memoryless channels with deadlines. In particular, an upper bound L is imposed on the maximum number of ARQ transmission rounds. In this setup, it is shown that incremental redundancy ARQ outperforms Forney's memoryless decoding in terms of the achievable error exponents.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 04:31:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Gopala", "Praveen Kumar", "" ], [ "Nam", "Young-Han", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610107
Jinhua Jiang
Jinhua Jiang, Yan Xin, and Hari Krishna Garg
Interference Channels with Common Information
23 pages, 5 figures, submitted to Trans. Inform. Theory
null
null
null
cs.IT math.IT
null
In this paper, we consider the discrete memoryless interference channel with common information, in which two senders need deliver not only private messages but also certain common messages to their corresponding receivers. We derive an achievable rate region for such a channel by exploiting a random coding strategy, namely cascaded superposition coding. We reveal that the derived achievable rate region generalizes some important existing results for the interference channels with or without common information. Furthermore, we specialize to a class of deterministic interference channels with common information, and show that the derived achievable rate region is indeed the capacity region for this class of channels.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 08:58:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Jiang", "Jinhua", "" ], [ "Xin", "Yan", "" ], [ "Garg", "Hari Krishna", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610108
Mohand Lagha
Mohand Lagha (AERONAUTIC Department of Blida University, Femto-ST), Messaoud Bensebti (AERONAUTIC Department of Blida University)
Doppler Spectrum Estimation by Ramanujan Fourier Transforms
null
null
null
null
cs.NA cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Doppler spectrum estimation of a weather radar signal in a classic way can be made by two methods, temporal one based in the autocorrelation of the successful signals, whereas the other one uses the estimation of the power spectral density PSD by using Fourier transforms. We introduces a new tool of signal processing based on Ramanujan sums cq(n), adapted to the analysis of arithmetical sequences with several resonances p/q. These sums are almost periodic according to time n of resonances and aperiodic according to the order q of resonances. New results will be supplied by the use of Ramanujan Fourier Transform (RFT) for the estimation of the Doppler spectrum for the weather radar signal.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 14:43:45 GMT" }, { "version": "v2", "created": "Sun, 1 Feb 2009 19:24:25 GMT" } ]
2009-02-01T00:00:00
[ [ "Lagha", "Mohand", "", "AERONAUTIC Department of Blida University, Femto-ST" ], [ "Bensebti", "Messaoud", "", "AERONAUTIC Department of Blida University" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0610109
Mohamed El Baker Nassar
Mohamed El Baker Nassar (INRIA Lorraine - LORIA), Radu State (INRIA Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
Intrusion detection mechanisms for VoIP applications
null
Dans Third annual VoIP security workshop (VSW'06) (2006)
null
null
cs.NI
null
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference approach can be used to reinforce the existent security mechanisms. Our approach is based on network monitoring and analyzing of the VoIP-specific traffic. We give a detailed example on attack detection using the SIP signaling protocol.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 16:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Nassar", "Mohamed El Baker", "", "INRIA Lorraine - LORIA" ], [ "State", "Radu", "", "INRIA\n Lorraine - LORIA" ], [ "Festor", "Olivier", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610110
Marc Daumas
Marc Daumas (ELIAUS), David Lester (University of Manchester), Erik Martin-Dorel (ELIAUS, Lamps), Annick Truffert (LAMPS)
Stochastic Formal Methods for Hybrid Systems
null
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a framework to bound the probability that accumulated errors were never above a given threshold on hybrid systems. Such systems are used for example to model an aircraft or a nuclear power plant on one side and its software on the other side. This report contains simple formulas based on L\'evy's and Markov's inequalities and it presents a formal theory of random variables with a special focus on producing concrete results. We selected four very common applications that fit in our framework and cover the common practices of hybrid systems that evolve for a long time. We compute the number of bits that remain continuously significant in the first two applications with a probability of failure around one against a billion, where worst case analysis considers that no significant bit remains. We are using PVS as such formal tools force explicit statement of all hypotheses and prevent incorrect uses of theorems.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 19:57:11 GMT" }, { "version": "v2", "created": "Tue, 19 Dec 2006 17:13:53 GMT" }, { "version": "v3", "created": "Fri, 24 Oct 2008 12:29:31 GMT" }, { "version": "v4", "created": "Tue, 24 Feb 2009 13:26:33 GMT" } ]
2009-02-24T00:00:00
[ [ "Daumas", "Marc", "", "ELIAUS" ], [ "Lester", "David", "", "University of Manchester" ], [ "Martin-Dorel", "Erik", "", "ELIAUS, Lamps" ], [ "Truffert", "Annick", "", "LAMPS" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0610111
Devavrat Shah
Kyomin Jung and Devavrat Shah
Local approximate inference algorithms
21 pages, 10 figures
null
null
null
cs.AI
null
We present a new local approximation algorithm for computing Maximum a Posteriori (MAP) and log-partition function for arbitrary exponential family distribution represented by a finite-valued pair-wise Markov random field (MRF), say $G$. Our algorithm is based on decomposition of $G$ into {\em appropriately} chosen small components; then computing estimates locally in each of these components and then producing a {\em good} global solution. We show that if the underlying graph $G$ either excludes some finite-sized graph as its minor (e.g. Planar graph) or has low doubling dimension (e.g. any graph with {\em geometry}), then our algorithm will produce solution for both questions within {\em arbitrary accuracy}. We present a message-passing implementation of our algorithm for MAP computation using self-avoiding walk of graph. In order to evaluate the computational cost of this implementation, we derive novel tight bounds on the size of self-avoiding walk tree for arbitrary graph. As a consequence of our algorithmic result, we show that the normalized log-partition function (also known as free-energy) for a class of {\em regular} MRFs will converge to a limit, that is computable to an arbitrary accuracy.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 21:51:44 GMT" }, { "version": "v2", "created": "Sun, 4 Feb 2007 13:27:12 GMT" }, { "version": "v3", "created": "Wed, 3 Oct 2007 00:04:51 GMT" } ]
2007-10-03T00:00:00
[ [ "Jung", "Kyomin", "" ], [ "Shah", "Devavrat", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610112
Shengtian Yang
Shengtian Yang, Peiliang Qiu
On the Performance of Lossless Joint Source-Channel Coding Based on Linear Codes
To appear in Proc. 2006 IEEE Information Theory Workshop, October 22-26, 2006, Chengdu, China. (5 pages, 2 figures)
null
10.1109/ITW2.2006.323779
null
cs.IT math.IT
null
A general lossless joint source-channel coding scheme based on linear codes is proposed and then analyzed in this paper. It is shown that a linear code with good joint spectrum can be used to establish limit-approaching joint source-channel coding schemes for arbitrary sources and channels, where the joint spectrum of the code is a generalization of the input-output weight distribution.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 23:45:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Yang", "Shengtian", "" ], [ "Qiu", "Peiliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610113
Juan J. Merelo Pr.
A.M. Mora, J.J. Merelo, C. Millan, J. Torrecillas, J.L.J. Laredo
CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield
null
Published in Proceedings of the Workshop on Nature Inspired Cooperative Strategies for Optimization. NICSO'2006, Pelta & Krasnogor, (eds) pp 85-98, Jun. 2006
null
null
cs.MA cs.CC
null
In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO) algorithm called CHAC, which has been designed to solve the problem of finding the path on a map (corresponding to a simulated battlefield) that minimizes resources while maximizing safety. CHAC has been tested with two different state transition rules: an aggregative function that combines the heuristic and pheromone information of both objectives and a second one that is based on the dominance concept of multiobjective optimization problems. These rules have been evaluated in several different situations (maps with different degree of difficulty), and we have found that they yield better results than a greedy algorithm (taken as baseline) in addition to a military behaviour that is also better in the tactical sense. The aggregative function, in general, yields better results than the one based on dominance.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 10:41:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Mora", "A. M.", "" ], [ "Merelo", "J. J.", "" ], [ "Millan", "C.", "" ], [ "Torrecillas", "J.", "" ], [ "Laredo", "J. L. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0610114
Hans-Rudolf Thomann
Hans-Rudolf Thomann
Instant Computing - A New Computation Paradigm
Final version, 34 pages. Theorem 3 generalized and strengthened. Review results implemented. Typos corrected
null
null
null
cs.CC cs.CR quant-ph
null
Voltage peaks on a conventional computer's power lines allow for the well-known dangerous DPA attacks. We show that measurement of a quantum computer's transient state during a computational step reveals information about a complete computation of arbitrary length, which can be extracted by repeated probing, if the computer is suitably programmed. Instant computing, as we name this mode of operation, recognizes for any total or partial recursive function arguments lying in the domain of definition and yields their function value with arbitrary small error probability in probabilistic linear time. This implies recognition of (not necessarily recursively enumerable) complements of recursively enumerable sets and the solution of the halting problem. Future quantum computers are shown to be likely to allow for instant computing, and some consequences are pointed out.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 14:11:38 GMT" }, { "version": "v2", "created": "Fri, 11 Jan 2008 09:14:29 GMT" }, { "version": "v3", "created": "Sat, 12 Jan 2008 11:12:40 GMT" } ]
2008-01-12T00:00:00
[ [ "Thomann", "Hans-Rudolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0610115
Xiaohu Shang
Xiaohu Shang, Biao Chen
An Achievable Rate Region for the Gaussian Interference Channel
15 pages, 6 figures, submitted to IEEE Trans. Inform. Theory; This paper has been withdrawn by the authors because the content will be completely covered by another paper that the authors will submit soon
null
null
null
cs.IT math.IT
null
An achievable rate region for the Gaussian interference channel is derived using Sato's modified frequency division multiplexing idea and a special case of Han and Kobayashi's rate region (denoted by $\Gmat^\prime$). We show that the new inner bound includes $\Gmat^\prime$, Sason's rate region $\Dmat$, as well as the achievable region via TDM/FDM, as its subsets. The advantage of this improved inner bound over $\Gmat^\prime$ arises due to its inherent ability to utilize the whole transmit power range on the real line without violating the power constraint. We also provide analysis to examine the conditions for the new achievable region to strictly extend $\Gmat^\prime$.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 16:29:05 GMT" }, { "version": "v2", "created": "Fri, 28 Sep 2007 16:52:41 GMT" } ]
2007-09-28T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610116
Tuomo Kakkonen
Tuomo Kakkonen
DepAnn - An Annotation Tool for Dependency Treebanks
null
Proceedings of the 11th ESSLLI Student Session at the 18th European Summer School in Logic, Language and Information (ESSLLI 2006), pp. 214-225. Malaga, Spain, 2006
null
null
cs.CL
null
DepAnn is an interactive annotation tool for dependency treebanks, providing both graphical and text-based annotation interfaces. The tool is aimed for semi-automatic creation of treebanks. It aids the manual inspection and correction of automatically created parses, making the annotation process faster and less error-prone. A novel feature of the tool is that it enables the user to view outputs from several parsers as the basis for creating the final tree to be saved to the treebank. DepAnn uses TIGER-XML, an XML-based general encoding format for both, representing the parser outputs and saving the annotated treebank. The tool includes an automatic consistency checker for sentence structures. In addition, the tool enables users to build structures manually, add comments on the annotations, modify the tagsets, and mark sentences for further revision.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:42:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0610117
Jeremy Avigad
Jeremy Avigad and Yimu Yin
Quantifier elimination for the reals with a predicate for the powers of two
null
null
null
null
cs.LO
null
In 1985, van den Dries showed that the theory of the reals with a predicate for the integer powers of two admits quantifier elimination in an expanded language, and is hence decidable. He gave a model-theoretic argument, which provides no apparent bounds on the complexity of a decision procedure. We provide a syntactic argument that yields a procedure that is primitive recursive, although not elementary. In particular, we show that it is possible to eliminate a single block of existential quantifiers in time $2^0_{O(n)}$, where $n$ is the length of the input formula and $2_k^x$ denotes $k$-fold iterated exponentiation.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:39:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Yin", "Yimu", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610118
Tuomo Kakkonen
Tuomo Kakkonen, Niko Myller, Erkki Sutinen
Applying Part-of-Seech Enhanced LSA to Automatic Essay Grading
null
Proceedings of the 4th IEEE International Conference on Information Technology: Research and Education (ITRE 2006). Tel Aviv, Israel, 2006
null
null
cs.IR cs.CL
null
Latent Semantic Analysis (LSA) is a widely used Information Retrieval method based on "bag-of-words" assumption. However, according to general conception, syntax plays a role in representing meaning of sentences. Thus, enhancing LSA with part-of-speech (POS) information to capture the context of word occurrences appears to be theoretically feasible extension. The approach is tested empirically on a automatic essay grading system using LSA for document similarity comparisons. A comparison on several POS-enhanced LSA models is reported. Our findings show that the addition of contextual information in the form of POS tags can raise the accuracy of the LSA-based scoring models up to 10.77 per cent.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:50:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ], [ "Myller", "Niko", "" ], [ "Sutinen", "Erkki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0610119
Elad Hazan
Elad Hazan
Approximate Convex Optimization by Online Game Playing
null
null
null
null
cs.DS
null
Lagrangian relaxation and approximate optimization algorithms have received much attention in the last two decades. Typically, the running time of these methods to obtain a $\epsilon$ approximate solution is proportional to $\frac{1}{\epsilon^2}$. Recently, Bienstock and Iyengar, following Nesterov, gave an algorithm for fractional packing linear programs which runs in $\frac{1}{\epsilon}$ iterations. The latter algorithm requires to solve a convex quadratic program every iteration - an optimization subroutine which dominates the theoretical running time. We give an algorithm for convex programs with strictly convex constraints which runs in time proportional to $\frac{1}{\epsilon}$. The algorithm does NOT require to solve any quadratic program, but uses gradient steps and elementary operations only. Problems which have strictly convex constraints include maximum entropy frequency estimation, portfolio optimization with loss risk constraints, and various computational problems in signal processing. As a side product, we also obtain a simpler version of Bienstock and Iyengar's result for general linear programming, with similar running time. We derive these algorithms using a new framework for deriving convex optimization algorithms from online game playing algorithms, which may be of independent interest.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 22:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hazan", "Elad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0610120
Russell K. Standish
Russell K. Standish and Duraid Madina
Classdesc and Graphcode: support for scientific programming in C++
null
null
null
null
cs.MS cs.CE cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object-oriented programming languages such as Java and Objective C have become popular for implementing agent-based and other object-based simulations since objects in those languages can {\em reflect} (i.e. make runtime queries of an object's structure). This allows, for example, a fairly trivial {\em serialisation} routine (conversion of an object into a binary representation that can be stored or passed over a network) to be written. However C++ does not offer this ability, as type information is thrown away at compile time. Yet C++ is often a preferred development environment, whether for performance reasons or for its expressive features such as operator overloading. In scientific coding, changes to a model's codes takes place constantly, as the model is refined, and different phenomena are studied. Yet traditionally, facilities such as checkpointing, routines for initialising model parameters and analysis of model output depend on the underlying model remaining static, otherwise each time a model is modified, a whole slew of supporting routines needs to be changed to reflect the new data structures. Reflection offers the advantage of the simulation framework adapting to the underlying model without programmer intervention, reducing the effort of modifying the model. In this paper, we present the {\em Classdesc} system which brings many of the benefits of object reflection to C++, {\em ClassdescMP} which dramatically simplifies coding of MPI based parallel programs and {\em Graphcode} a general purpose data parallel programming environment.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 05:11:21 GMT" }, { "version": "v2", "created": "Wed, 22 Oct 2008 10:08:40 GMT" } ]
2008-10-22T00:00:00
[ [ "Standish", "Russell K.", "" ], [ "Madina", "Duraid", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0610121
Ryutaroh Matsumoto
Ryutaroh Matsumoto
Construction algorithm for network error-correcting codes attaining the Singleton bound
To appear in IEICE Trans. Fundamentals (http://ietfec.oxfordjournals.org/), vol. E90-A, no. 9, Sept. 2007. LaTeX2e, 7 pages, using ieice.cls and pstricks.sty. Version 4 adds randomized construction of network error-correcting codes, comparisons of the proposed methods to the existing methods, additional explanations in the proof
IEICE Trans. Fundamentals, vol. E90-A, no. 9, pp. 1729-1735, September 2007
10.1093/ietfec/e90-a.9.1729
null
cs.IT cs.DM cs.NI math.IT
null
We give a centralized deterministic algorithm for constructing linear network error-correcting codes that attain the Singleton bound of network error-correcting codes. The proposed algorithm is based on the algorithm by Jaggi et al. We give estimates on the time complexity and the required symbol size of the proposed algorithm. We also estimate the probability of a random choice of local encoding vectors by all intermediate nodes giving a network error-correcting codes attaining the Singleton bound. We also clarify the relationship between the robust network coding and the network error-correcting codes with known locations of errors.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:00:35 GMT" }, { "version": "v2", "created": "Thu, 2 Nov 2006 07:36:43 GMT" }, { "version": "v3", "created": "Fri, 8 Dec 2006 05:28:23 GMT" }, { "version": "v4", "created": "Wed, 9 May 2007 09:07:01 GMT" } ]
2007-09-04T00:00:00
[ [ "Matsumoto", "Ryutaroh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610122
Philippe Langlois
Philippe Langlois (LP2A-DALI), Nicolas Louvet (LP2A-DALI)
Faithful Polynomial Evaluation with Compensated Horner Algorithm
null
null
null
null
cs.NA cs.MS
null
This paper presents two sufficient conditions to ensure a faithful evaluation of polynomial in IEEE-754 floating point arithmetic. Faithfulness means that the computed value is one of the two floating point neighbours of the exact result; it can be satisfied using a more accurate algorithm than the classic Horner scheme. One condition here provided is an apriori bound of the polynomial condition number derived from the error analysis of the compensated Horner algorithm. The second condition is both dynamic and validated to check at the running time the faithfulness of a given evaluation. Numerical experiments illustrate the behavior of these two conditions and that associated running time over-cost is really interesting.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:22:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Langlois", "Philippe", "", "LP2A-DALI" ], [ "Louvet", "Nicolas", "", "LP2A-DALI" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0610123
Lutz Strassburger
Lutz Strassburger (INRIA Futurs)
Proof Nets and the Identity of Proofs
null
null
null
null
cs.LO
null
These are the notes for a 5-lecture-course given at ESSLLI 2006 in Malaga, Spain. The URL of the school is http://esslli2006.lcc.uma.es/ . This version slightly differs from the one which has been distributed at the school because typos have been removed and comments and suggestions by students have been worked in. The course is intended to be introductory. That means no prior knowledge of proof nets is required. However, the student should be familiar with the basics of propositional logic, and should have seen formal proofs in some formal deductive system (e.g., sequent calculus, natural deduction, resolution, tableaux, calculus of structures, Frege-Hilbert-systems, ...). It is probably helpful if the student knows already what cut elimination is, but this is not strictly necessary. In these notes, I will introduce the concept of ``proof nets'' from the viewpoint of the problem of the identity of proofs. I will proceed in a rather informal way. The focus will be more on presenting ideas than on presenting technical details. The goal of the course is to give the student an overview of the theory of proof nets and make the vast amount of literature on the topic easier accessible to the beginner. For introducing the basic concepts of the theory, I will in the first part of the course stick to the unit-free multiplicative fragment of linear logic because of its rather simple notion of proof nets. In the second part of the course we will see proof nets for more sophisticated logics. This is a basic introduction into proof nets from the perspective of the identity of proofs. We discuss how deductive proofs can be translated into proof nets and what a correctness criterion is.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:35:05 GMT" }, { "version": "v2", "created": "Mon, 20 Nov 2006 14:41:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Strassburger", "Lutz", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610124
Tuomo Kakkonen
Tuomo Kakkonen
Dependency Treebanks: Methods, Annotation Schemes and Tools
null
Proceedings of the 15th Nordic Conference of Computational Linguistics (NODALIDA 2005), pp. 94-104. Joensuu, Finland, 2005
null
null
cs.CL
null
In this paper, current dependencybased treebanks are introduced and analyzed. The methods used for building the resources, the annotation schemes applied, and the tools used (such as POS taggers, parsers and annotation software) are discussed.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:48:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0610125
Radoslaw Hofman
Radoslaw Hofman
Report on article: P=NP Linear programming formulation of the Traveling Salesman Problem
This version contain more figures, and clearer way to explain counter example idea for k dimensions
null
null
null
cs.CC cs.DM cs.DS
null
This article presents counter examples for three articles claiming that P=NP. Articles for which it applies are: Moustapha Diaby "P = NP: Linear programming formulation of the traveling salesman problem" and "Equality of complexity classes P and NP: Linear programming formulation of the quadratic assignment problem", and also Sergey Gubin "A Polynomial Time Algorithm for The Traveling Salesman Problem"
[ { "version": "v1", "created": "Fri, 20 Oct 2006 14:01:22 GMT" }, { "version": "v2", "created": "Wed, 25 Oct 2006 13:41:20 GMT" }, { "version": "v3", "created": "Thu, 26 Oct 2006 12:00:02 GMT" }, { "version": "v4", "created": "Thu, 2 Nov 2006 11:19:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofman", "Radoslaw", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]