id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0610026 | Rob van Stee | Leah Epstein and Rob van Stee | Covering selfish machines | null | null | null | null | cs.GT | null | We consider the machine covering problem for selfish related machines. For a
constant number of machines, m, we show a monotone polynomial time
approximation scheme (PTAS) with running time that is linear in the number of
jobs. It uses a new technique for reducing the number of jobs while remaining
close to the optimal solution. We also present an FPTAS for the classical
machine covering problem (the previous best result was a PTAS) and use this to
give a monotone FPTAS.
Additionally, we give a monotone approximation algorithm with approximation
ratio \min(m,(2+\eps)s_1/s_m) where \eps>0 can be chosen arbitrarily small and
s_i is the (real) speed of machine i. Finally we give improved results for two
machines.
Our paper presents the first results for this problem in the context of
selfish machines.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 13:20:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"van Stee",
"Rob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0610027 | Ranko Lazic | Stephane Demri and Ranko Lazic | LTL with the Freeze Quantifier and Register Automata | 29 pages | null | null | null | cs.LO cs.CC | null | A data word is a sequence of pairs of a letter from a finite alphabet and an
element from an infinite set, where the latter can only be compared for
equality. To reason about data words, linear temporal logic is extended by the
freeze quantifier, which stores the element at the current word position into a
register, for equality comparisons deeper in the formula. By translations from
the logic to alternating automata with registers and then to faulty counter
automata whose counters may erroneously increase at any time, and from faulty
and error-free counter automata to the logic, we obtain a complete complexity
table for logical fragments defined by varying the set of temporal operators
and the number of registers. In particular, the logic with future-time
operators and 1 register is decidable but not primitive recursive over finite
data words. Adding past-time operators or 1 more register, or switching to
infinite data words, cause undecidability.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 15:47:22 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Feb 2008 17:52:00 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Apr 2008 16:31:15 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Demri",
"Stephane",
""
],
[
"Lazic",
"Ranko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0610028 | Olivier Zendra | Olivier Zendra (INRIA Lorraine - LORIA, LORIA) | Memory and compiler optimizations for low-power and -energy | ICOOOLPS'2006 was co-located with the 20th European Conference on
Object-Oriented Programming (ECOOP'2006) | Dans 1st ECOOP Workshop on Implementation, Compilation,
Optimization of Object-Oriented Languages, Programs and Systems
(ICOOOLPS'2006). (2006) | null | null | cs.PL cs.PF | null | Embedded systems become more and more widespread, especially autonomous ones,
and clearly tend to be ubiquitous. In such systems, low-power and low-energy
usage get ever more crucial. Furthermore, these issues also become paramount in
(massively) multi-processors systems, either in one machine or more widely in a
grid. The various problems faced pertain to autonomy, power supply
possibilities, thermal dissipation, or even sheer energy cost. Although it has
since long been studied in harware, energy optimization is more recent in
software. In this paper, we thus aim at raising awareness to low-power and
low-energy issues in the language and compilation community. We thus broadly
but briefly survey techniques and solutions to this energy issue, focusing on a
few specific aspects in the context of compiler optimizations and memory
management.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 17:58:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zendra",
"Olivier",
"",
"INRIA Lorraine - LORIA, LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0610029 | Alberto Accomazzi | Carolyn S. Grant, Alberto Accomazzi, Donna Thompson, Edwin Henneken,
Guenther Eichhorn, Michael J. Kurtz, and Stephen S. Murray | Data in the ADS -- Understanding How to Use it Better | 4 pages; submitted to the proceedings of the Library and Information
Services in Astronomy V; to be published by ASP Conference Proceedings | null | null | null | cs.DL cs.DB | null | The Smithsonian/NASA ADS Abstract Service contains a wealth of data for
astronomers and librarians alike, yet the vast majority of usage consists of
rudimentary searches. Hints on how to obtain more focused search results by
using more of the various capabilities of the ADS are presented, including
searching by affiliation. We also discuss the classification of articles by
content and by referee status.
The ADS is funded by NASA Grant NNG06GG68G-16613687.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 18:51:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grant",
"Carolyn S.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Thompson",
"Donna",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0610030 | Alberto Accomazzi | Donna M. Thompson, Alberto Accomazzi, Guenther Eichhorn, Carolyn
Grant, Edwin Henneken, Michael J. Kurtz, Elizabeth Bohlen, Stephen S. Murray | Paper to Screen: Processing Historical Scans in the ADS | 4 pages; submitted to the proceedings of Library and Information
Services in Astronomy; to be published in the ASP Conference Series | null | null | null | cs.DL cs.HC | null | The NASA Astrophysics Data System in conjunction with the Wolbach Library at
the Harvard-Smithsonian Center for Astrophysics is working on a project to
microfilm historical observatory publications. The microfilm is then scanned
for inclusion in the ADS. The ADS currently contains over 700,000 scanned pages
of volumes of historical literature. Many of these volumes lack clear
pagination or other bibliographic data that are necessary to take advantage of
the searching capabilities of the ADS. This paper will address some of the
interesting challenges that needed to be resolved during the processing of the
Observatory Reports included in the ADS.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 18:58:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thompson",
"Donna M.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Grant",
"Carolyn",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0610031 | Simeon Warner | Simeon Warner, Jeroen Bekaert, Carl Lagoze, Xiaoming Liu, Sandy
Payette, Herbert Van de Sompel | Pathways: Augmenting interoperability across scholarly repositories | 18 pages. Accepted for International Journal on Digital Libraries
special issue on Digital Libraries and eScience | null | 10.1007/s00799-007-0016-7 | null | cs.DL | null | In the emerging eScience environment, repositories of papers, datasets,
software, etc., should be the foundation of a global and natively-digital
scholarly communications system. The current infrastructure falls far short of
this goal. Cross-repository interoperability must be augmented to support the
many workflows and value-chains involved in scholarly communication. This will
not be achieved through the promotion of single repository architecture or
content representation, but instead requires an interoperability framework to
connect the many heterogeneous systems that will exist.
We present a simple data model and service architecture that augments
repository interoperability to enable scholarly value-chains to be implemented.
We describe an experiment that demonstrates how the proposed infrastructure can
be deployed to implement the workflow involved in the creation of an overlay
journal over several different repository systems (Fedora, aDORe, DSpace and
arXiv).
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 19:55:09 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Warner",
"Simeon",
""
],
[
"Bekaert",
"Jeroen",
""
],
[
"Lagoze",
"Carl",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Payette",
"Sandy",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0610032 | Mathys Walma | Mathys Walma | Pipelined Feed-Forward Cyclic Redundancy Check (CRC) Calculation | admin note: Paper removed for copyright reasons | null | null | null | cs.NI | null | This paper discusses a method for pipelining the calculation of CRC's, such
as ITU/CCITT CRC32, into a mostly feed-forward architecture. This method allows
several benefits such as independent scaling of circuit frequency and data
throughput. Additionally it allows calculation over packet tails (packet length
not a multiple of CRC input width). Finally it offers the ability to update a
CRC where a subset of data in the packet has changed.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 21:44:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Walma",
"Mathys",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610033 | Marco Cuturi | Marco Cuturi, Jean-Philippe Vert, Oystein Birkenes, Tomoko Matsui | A kernel for time series based on global alignments | null | null | 10.1109/ICASSP.2007.366260 | null | cs.CV cs.LG | null | We propose in this paper a new family of kernels to handle times series,
notably speech data, within the framework of kernel methods which includes
popular algorithms such as the Support Vector Machine. These kernels elaborate
on the well known Dynamic Time Warping (DTW) family of distances by considering
the same set of elementary operations, namely substitutions and repetitions of
tokens, to map a sequence onto another. Associating to each of these operations
a given score, DTW algorithms use dynamic programming techniques to compute an
optimal sequence of operations with high overall score. In this paper we
consider instead the score spanned by all possible alignments, take a smoothed
version of their maximum and derive a kernel out of this formulation. We prove
that this kernel is positive definite under favorable conditions and show how
it can be tuned effectively for practical applications as we report encouraging
results on a speech recognition task.
| [
{
"version": "v1",
"created": "Fri, 6 Oct 2006 04:45:32 GMT"
}
] | 2009-11-27T00:00:00 | [
[
"Cuturi",
"Marco",
""
],
[
"Vert",
"Jean-Philippe",
""
],
[
"Birkenes",
"Oystein",
""
],
[
"Matsui",
"Tomoko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0610034 | Erich Graedel | Erich Graedel and Igor Walukiewicz | Postinal Determinacy of Games with Infinitely Many Priorities | This paper has been replaced due to a typo in the title | null | null | null | cs.LO cs.GT | null | We study two-player games of infinite duration that are played on finite or
infinite game graphs. A winning strategy for such a game is positional if it
only depends on the current position, and not on the history of the play. A
game is positionally determined if, from each position, one of the two players
has a positional winning strategy.
The theory of such games is well studied for winning conditions that are
defined in terms of a mapping that assigns to each position a priority from a
finite set. Specifically, in Muller games the winner of a play is determined by
the set of those priorities that have been seen infinitely often; an important
special case are parity games where the least (or greatest) priority occurring
infinitely often determines the winner. It is well-known that parity games are
positionally determined whereas Muller games are determined via finite-memory
strategies.
In this paper, we extend this theory to the case of games with infinitely
many priorities. Such games arise in several application areas, for instance in
pushdown games with winning conditions depending on stack contents.
For parity games there are several generalisations to the case of infinitely
many priorities. While max-parity games over omega or min-parity games over
larger ordinals than omega require strategies with infinite memory, we can
prove that min-parity games with priorities in omega are positionally
determined. Indeed, it turns out that the min-parity condition over omega is
the only infinitary Muller condition that guarantees positional determinacy on
all game graphs.
| [
{
"version": "v1",
"created": "Fri, 6 Oct 2006 11:05:55 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Aug 2012 08:07:29 GMT"
}
] | 2012-08-29T00:00:00 | [
[
"Graedel",
"Erich",
""
],
[
"Walukiewicz",
"Igor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0610035 | Erich Graedel | Erich Graedel and Igor Walukiewicz | Positional Determinacy of Games with Infinitely Many Priorities | null | Logical Methods in Computer Science, Volume 2, Issue 4 (November
3, 2006) lmcs:2242 | 10.2168/LMCS-2(4:6)2006 | null | cs.LO cs.GT | null | We study two-player games of infinite duration that are played on finite or
infinite game graphs. A winning strategy for such a game is positional if it
only depends on the current position, and not on the history of the play. A
game is positionally determined if, from each position, one of the two players
has a positional winning strategy.
The theory of such games is well studied for winning conditions that are
defined in terms of a mapping that assigns to each position a priority from a
finite set. Specifically, in Muller games the winner of a play is determined by
the set of those priorities that have been seen infinitely often; an important
special case are parity games where the least (or greatest) priority occurring
infinitely often determines the winner. It is well-known that parity games are
positionally determined whereas Muller games are determined via finite-memory
strategies.
In this paper, we extend this theory to the case of games with infinitely
many priorities. Such games arise in several application areas, for instance in
pushdown games with winning conditions depending on stack contents.
For parity games there are several generalisations to the case of infinitely
many priorities. While max-parity games over omega or min-parity games over
larger ordinals than omega require strategies with infinite memory, we can
prove that min-parity games with priorities in omega are positionally
determined. Indeed, it turns out that the min-parity condition over omega is
the only infinitary Muller condition that guarantees positional determinacy on
all game graphs.
| [
{
"version": "v1",
"created": "Fri, 6 Oct 2006 11:07:37 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Nov 2006 12:53:01 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Graedel",
"Erich",
""
],
[
"Walukiewicz",
"Igor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0610036 | Koji Nuida | Koji Nuida, Manabu Hagiwara, Hajime Watanabe, and Hideki Imai | Optimization of Memory Usage in Tardos's Fingerprinting Codes | 12 pages, 1 figure; (v2) tables revised, typos corrected, comments on
some recent works added; (v3) submitted version, title changed from "Optimal
probabilistic fingerprinting codes using optimal finite random variables
related to numerical quadrature" | null | null | null | cs.CR cs.NA | null | It is known that Tardos's collusion-secure probabilistic fingerprinting code
(Tardos code; STOC'03) has length of theoretically minimal order with respect
to the number of colluding users. However, Tardos code uses certain continuous
probability distribution in codeword generation, which creates some problems
for practical use, in particular, it requires large extra memory. A solution
proposed so far is to use some finite probability distributions instead. In
this paper, we determine the optimal finite distribution in order to decrease
extra memory amount. By our result, the extra memory is reduced to 1/32 of the
original, or even becomes needless, in some practical setting. Moreover, the
code length is also reduced, e.g. to about 20.6% of Tardos code asymptotically.
Finally, we address some other practical issues such as approximation errors
which are inevitable in any real implementation.
| [
{
"version": "v1",
"created": "Fri, 6 Oct 2006 14:07:57 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2006 10:47:00 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Jan 2008 18:31:29 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Nuida",
"Koji",
""
],
[
"Hagiwara",
"Manabu",
""
],
[
"Watanabe",
"Hajime",
""
],
[
"Imai",
"Hideki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0610037 | Nan Liu | Nan Liu and Sennur Ulukus | The Capacity Region of a Class of Discrete Degraded Interference
Channels | 7 pages, 1 figure; presented at the 44th annual Allerton Conference
on Communication, Control and Computing, September 27-29, 2006 | null | null | null | cs.IT math.IT | null | We provide a single-letter characterization for the capacity region of a
class of discrete degraded interference channels (DDICs). The class of DDICs
considered includes the discrete additive degraded interference channel (DADIC)
studied by Benzel. We show that for the class of DDICs studied, encoder
cooperation does not increase the capacity region, and therefore, the capacity
region of the class of DDICs is the same as the capacity region of the
corresponding degraded broadcast channel.
| [
{
"version": "v1",
"created": "Fri, 6 Oct 2006 19:42:27 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610038 | Hannes Hutzelmeyer | Hannes Hutzelmeyer | Church's thesis is questioned by new calculation paradigm | 32 pages | null | null | null | cs.LO | null | Church's thesis claims that all effecticely calculable functions are
recursive. A shortcoming of the various definitions of recursive functions lies
in the fact that it is not a matter of a syntactical check to find out if an
entity gives rise to a function. Eight new ideas for a precise setup of
arithmetical logic and its metalanguage give the proper environment for the
construction of a special computer, the ARBACUS computer. Computers do not come
to a necessary halt; it is requested that calculators are constructed on the
basis of computers in a way that they always come to a halt, then all
calculations are effective. The ARBATOR is defined as a calculator with
two-layer-computation. It allows for the calculation of all primitive recursive
functions, but multi-level-arbation also allows for the calculation of other
arbative functions that are not primitive recursive. The new paradigm of
calculation does not have the above mentioned shortcoming. The defenders of
Church's thesis are challenged to show that exotic arbative functions are
recursive and to put forward a recursive function that is not arbative. A
construction with three-tier-multi-level-arbation that includes a
diagonalisation leads to the extravagant yet calculable Snark-function that is
not arbative. As long as it is not shown that all exotic arbative functions and
particularily the Snark-function are arithmetically representable Goedel's
first incompleteness sentence is in limbo.
| [
{
"version": "v1",
"created": "Sat, 7 Oct 2006 12:53:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutzelmeyer",
"Hannes",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610039 | Neil Rubens | Neil Rubens | The Application of Fuzzy Logic to the Construction of the Ranking
Function of Information Retrieval Systems | null | N. Rubens. The application of fuzzy logic to the construction of
the ranking function of information retrieval systems. Computer Modelling and
New Technologies, 10(1):20-27, 2006 | null | null | cs.IR cs.AI | null | The quality of the ranking function is an important factor that determines
the quality of the Information Retrieval system. Each document is assigned a
score by the ranking function; the score indicates the likelihood of relevance
of the document given a query. In the vector space model, the ranking function
is defined by a mathematic expression. We propose a fuzzy logic (FL) approach
to defining the ranking function. FL provides a convenient way of converting
knowledge expressed in a natural language into fuzzy logic rules. The resulting
ranking function could be easily viewed, extended, and verified: * if (tf is
high) and (idf is high) > (relevance is high); * if (overlap is high) >
(relevance is high). By using above FL rules, we are able to achieve
performance approximately equal to the state of the art search engine Apache
Lucene (deltaP10 +0.92%; deltaMAP -0.1%). The fuzzy logic approach allows
combining the logic-based model with the vector model. The resulting model
possesses simplicity and formalism of the logic based model, and the
flexibility and performance of the vector model.
| [
{
"version": "v1",
"created": "Sun, 8 Oct 2006 05:34:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rubens",
"Neil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610040 | Yun Deng | Yun Deng, Tony T. Lee | Crosstalk-free Conjugate Networks for Optical Multicast Switching | 10 pages | null | 10.1109/JLT.2006.882249 | null | cs.NI | null | High-speed photonic switching networks can switch optical signals at the rate
of several terabits per second. However, they suffer from an intrinsic
crosstalk problem when two optical signals cross at the same switch element. To
avoid crosstalk, active connections must be node-disjoint in the switching
network. In this paper, we propose a sequence of decomposition and merge
operations, called conjugate transformation, performed on each switch element
to tackle this problem. The network resulting from this transformation is
called conjugate network. By using the numbering-schemes of networks, we prove
that if the route assignments in the original network are link-disjoint, their
corresponding ones in the conjugate network would be node-disjoint. Thus,
traditional nonblocking switching networks can be transformed into
crosstalk-free optical switches in a routine manner. Furthermore, we show that
crosstalk-free multicast switches can also be obtained from existing
nonblocking multicast switches via the same conjugate transformation.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 16:49:22 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Deng",
"Yun",
""
],
[
"Lee",
"Tony T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610041 | Jeremy Fix | J\'er\'emy Fix (INRIA Lorraine - LORIA), Julien Vitay (INRIA Lorraine
- LORIA), Nicolas Rougier (INRIA Lorraine - LORIA) | A Computational Model of Spatial Memory Anticipation during Visual
Search | null | Dans Anticipatory Behavior in Adaptive Learning Systems 2006
(2006) | null | null | cs.NE | null | Some visual search tasks require to memorize the location of stimuli that
have been previously scanned. Considerations about the eye movements raise the
question of how we are able to maintain a coherent memory, despite the frequent
drastically changes in the perception. In this article, we present a
computational model that is able to anticipate the consequences of the eye
movements on the visual perception in order to update a spatial memory
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 11:42:27 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Fix",
"Jérémy",
"",
"INRIA Lorraine - LORIA"
],
[
"Vitay",
"Julien",
"",
"INRIA Lorraine\n - LORIA"
],
[
"Rougier",
"Nicolas",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0610042 | Sergey Gubin | Sergey Gubin | A Polynomial Time Algorithm for The Traveling Salesman Problem | 8 pages. Simplified | Complementary to Yannakakis' Theorem, 22nd MCCCC, University of
Nevada, Las Vegas, 2008, p.8 | null | null | cs.DM cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ATSP polytope can be expressed by asymmetric polynomial size linear
program.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 13:15:12 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 17:34:51 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Sep 2008 05:02:16 GMT"
}
] | 2008-11-10T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0610043 | Zengyou He | Zengyou He | Farthest-Point Heuristic based Initialization Methods for K-Modes
Clustering | 7 pages | null | null | null | cs.AI | null | The k-modes algorithm has become a popular technique in solving categorical
data clustering problems in different application domains. However, the
algorithm requires random selection of initial points for the clusters.
Different initial points often lead to considerable distinct clustering
results. In this paper we present an experimental study on applying a
farthest-point heuristic based initialization method to k-modes clustering to
improve its performance. Experiments show that new initialization method leads
to better clustering accuracy than random selection initialization method for
k-modes clustering.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 12:12:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610044 | Thierry Turletti | Thierry Turletti (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes),
Yongho Seok (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes) | M\'{e}canismes de Transmission Multipoint pour R\'{e}seaux Locaux Sans
Fil IEEE 802.11 | null | null | null | null | cs.NI | null | Le standard IEEE 802.11 est inefficace pour la transmission multim\'{e}dia en
multipoint. En particulier, les paquets multipoints sont envoy\'{e}s en boucle
ouverte de la m\^{e}me mani\`{e}re que les paquets broadcast. L'absence
d'acquittements rend impossible la mise en oeuvre de m\'{e}canismes de
contr\^{o}le de congestion, de m\'{e}canisme de fiabilisation de la
transmission ainsi que d'algorithmes d'adaptation du d\'{e}bit de transmission
physique. Dans ce rapport, nous proposons de nouveaux m\'{e}canismes de
ransmission multipoint qui se basent sur une approche leader pour renvoyer des
acquittements. Nous nous interessons \`{a} des solutions pratiques qui sont
suceptibles d'\^{e}tre implant\'{e}s dans les cartes r\'{e}seaux sans fil
actuelles et futures et qui restent compatibles avec les stations IEEE 802.11
standards. Nous proposons deux m\'{e}canismes pour adapter le d\'{e}bit de
transmission physique des flots multipoints: un m\'{e}canisme simplifi\'{e}
appel\'{e} LB-ARF et un m\'{e}canisme plus robuste appel\'{e} RRAM. Nos
simulations montrent que pour des environnements statiques, un m\'{e}canisme
aussi simple que LB-ARF suffit pour obtenir de bonnes performances. Le
m\'{e}canisme RRAM est quant \`{a} lui aussi efficace dans des environnements
statiques que lorsque les stations sont mobiles.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 12:49:13 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Turletti",
"Thierry",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Seok",
"Yongho",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610045 | Reza Rashidi Far | Reza Rashidi Far, Tamer Oraby, Wlodzimierz Bryc and Roland Speicher | Spectra of large block matrices | 40 pages, 6 figures | null | null | null | cs.IT math.IT math.OA | null | In a frequency selective slow-fading channel in a MIMO system, the channel
matrix is of the form of a block matrix. This paper proposes a method to
calculate the limit of the eigenvalue distribution of block matrices if the
size of the blocks tends to infinity. While it considers random matrices, it
takes an operator-valued free probability approach to achieve this goal. Using
this method, one derives a system of equations, which can be solved numerically
to compute the desired eigenvalue distribution. The paper initially tackles the
problem for square block matrices, then extends the solution to rectangular
block matrices. Finally, it deals with Wishart type block matrices. For two
special cases, the results of our approach are compared with results from
simulations. The first scenario investigates the limit eigenvalue distribution
of block Toeplitz matrices. The second scenario deals with the distribution of
Wishart type block matrices for a frequency selective slow-fading channel in a
MIMO system for two different cases of $n_R=n_T$ and $n_R=2n_T$. Using this
method, one may calculate the capacity and the Signal-to-Interference-and-Noise
Ratio in large MIMO systems.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 14:45:37 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Far",
"Reza Rashidi",
""
],
[
"Oraby",
"Tamer",
""
],
[
"Bryc",
"Wlodzimierz",
""
],
[
"Speicher",
"Roland",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OA",
"description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry",
"span": "(Operator Algebras)"
}
] |
cs/0610046 | Daniel Lemire | Daniel Lemire | Streaming Maximum-Minimum Filter Using No More than Three Comparisons
per Element | to appear in Nordic Journal of Computing | Daniel Lemire, Streaming Maximum-Minimum Filter Using No More than
Three Comparisons per Element, Nordic Journal of Computing, Volume 13, Number
4, pages 328-339, 2006 | null | null | cs.DS | null | The running maximum-minimum (max-min) filter computes the maxima and minima
over running windows of size w. This filter has numerous applications in signal
processing and time series analysis. We present an easy-to-implement online
algorithm requiring no more than 3 comparisons per element, in the worst case.
Comparatively, no algorithm is known to compute the running maximum (or
minimum) filter in 1.5 comparisons per element, in the worst case. Our
algorithm has reduced latency and memory usage.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 22:09:42 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2006 02:01:49 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Feb 2007 21:18:33 GMT"
},
{
"version": "v4",
"created": "Tue, 13 Mar 2007 00:41:20 GMT"
},
{
"version": "v5",
"created": "Thu, 22 Mar 2007 01:19:11 GMT"
}
] | 2012-01-16T00:00:00 | [
[
"Lemire",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0610047 | Haim Permuter Henry | Haim Permuter, Paul Cuff, Benjamin Van Roy and Tsachy Weissman | Capacity of the Trapdoor Channel with Feedback | null | null | null | null | cs.IT math.IT | null | We establish that the feedback capacity of the trapdoor channel is the
logarithm of the golden ratio and provide a simple communication scheme that
achieves capacity. As part of the analysis, we formulate a class of dynamic
programs that characterize capacities of unifilar finite-state channels. The
trapdoor channel is an instance that admits a simple analytic solution.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2006 22:09:45 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Permuter",
"Haim",
""
],
[
"Cuff",
"Paul",
""
],
[
"Van Roy",
"Benjamin",
""
],
[
"Weissman",
"Tsachy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610048 | Stephen D. Miller | Nathan Keller, Stephen D. Miller, Ilya Mironov, and Ramarathnam
Venkatesan | MV3: A new word based stream cipher using rapid mixing and revolving
buffers | 27 pages, shortened version will appear in "Topics in Cryptology -
CT-RSA 2007" | null | null | null | cs.CR cs.DM math.CO | null | MV3 is a new word based stream cipher for encrypting long streams of data. A
direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word
version will obviously need vast amounts of memory. This scaling issue
necessitates a look for new components and principles, as well as mathematical
analysis to justify their use. Our approach, like RC4's, is based on rapidly
mixing random walks on directed graphs (that is, walks which reach a random
state quickly, from any starting point). We begin with some well understood
walks, and then introduce nonlinearity in their steps in order to improve
security and show long term statistical correlations are negligible. To
minimize the short term correlations, as well as to deter attacks using
equations involving successive outputs, we provide a method for sequencing the
outputs derived from the walk using three revolving buffers. The cipher is fast
-- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor.
A word based cipher needs to output more bits per step, which exposes more
correlations for attacks. Moreover we seek simplicity of construction and
transparent analysis. To meet these requirements, we use a larger state and
claim security corresponding to only a fraction of it. Our design is for an
adequately secure word-based cipher; our very preliminary estimate puts the
security close to exhaustive search for keys of size < 256 bits.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 01:23:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Keller",
"Nathan",
""
],
[
"Miller",
"Stephen D.",
""
],
[
"Mironov",
"Ilya",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0610049 | Carlos Gershenson | Edgar Morin | Restricted Complexity, General Complexity | 25 pages. Presented at the Colloquium "Intelligence de la complexit'e
: 'epist'emologie et pragmatique", Cerisy-La-Salle, France, June 26th, 2005.
Translated from French by Carlos Gershenson | null | 10.1142/9789812707420_0002 | null | cs.CC nlin.AO | null | Why has the problematic of complexity appeared so late? And why would it be
justified?
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 07:59:18 GMT"
}
] | 2016-11-23T00:00:00 | [
[
"Morin",
"Edgar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/0610050 | Tony Lee T. | Tony T. Lee | The Mathematical Parallels Between Packet Switching and Information
Transmission | 21 pages, 25 figures, Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT cs.NI math.IT | null | All communication networks comprise of transmission systems and switching
systems, even though they are usually treated as two separate issues.
Communication channels are generally disturbed by noise from various sources.
In circuit switched networks, reliable communication requires the
error-tolerant transmission of bits over noisy channels. In packet switched
networks, however, not only can bits be corrupted with noise, but resources
along connection paths are also subject to contention. Thus, quality of service
(QoS) is determined by buffer delays and packet losses. The theme of this paper
is to show that transmission noise and packet contention actually have similar
characteristics and can be tamed by comparable means to achieve reliable
communication, and a number of analogies between switching and transmission are
identified. The sampling theorem of bandlimited signals provides the
cornerstone of digital communication and signal processing. Recently, the
Birkhoff-von Neumann decomposition of traffic matrices has been widely applied
to packet switches. With respect to the complexity reduction of packet
switching, we show that the decomposition of a doubly stochastic traffic matrix
plays a similar role to that of the sampling theorem in digital transmission.
We conclude that packet switching systems are governed by mathematical laws
that are similar to those of digital transmission systems as envisioned by
Shannon in his seminal 1948 paper, A Mathematical Theory of Communication.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 08:09:23 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 03:15:44 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Lee",
"Tony T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610051 | Philippe Trebuchet | Mohab Safey El Din (INRIA Rocquencourt), Philippe Trebuchet (INRIA
Rocquencourt) | Strong bi-homogeneous B\'{e}zout theorem and its use in effective real
algebraic geometry | null | null | null | null | cs.SC | null | Let f1, ..., fs be a polynomial family in Q[X1,..., Xn] (with s less than n)
of degree bounded by D. Suppose that f1, ..., fs generates a radical ideal, and
defines a smooth algebraic variety V. Consider a projection P. We prove that
the degree of the critical locus of P restricted to V is bounded by
D^s(D-1)^(n-s) times binomial of n and n-s. This result is obtained in two
steps. First the critical points of P restricted to V are characterized as
projections of the solutions of Lagrange's system for which a bi-homogeneous
structure is exhibited. Secondly we prove a bi-homogeneous B\'ezout Theorem,
which bounds the sum of the degrees of the equidimensional components of the
radical of an ideal generated by a bi-homogeneous polynomial family. This
result is improved when f1,..., fs is a regular sequence. Moreover, we use
Lagrange's system to design an algorithm computing at least one point in each
connected component of a smooth real algebraic set. This algorithm generalizes,
to the non equidimensional case, the one of Safey El Din and Schost. The
evaluation of the output size of this algorithm gives new upper bounds on the
first Betti number of a smooth real algebraic set. Finally, we estimate its
arithmetic complexity and prove that in the worst cases it is polynomial in n,
s, D^s(D-1)^(n-s) and the binomial of n and n-s, and the complexity of
evaluation of f1,..., fs.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 15:02:07 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Oct 2006 15:16:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Din",
"Mohab Safey El",
"",
"INRIA Rocquencourt"
],
[
"Trebuchet",
"Philippe",
"",
"INRIA\n Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0610052 | Chih-Chun Wang | Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1)
Purdue University, (2) Princeton University) | Finite-Dimensional Bounds on Zm and Binary LDPC Codes with Belief
Propagation Decoders | to appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | This paper focuses on finite-dimensional upper and lower bounds on decodable
thresholds of Zm and binary low-density parity-check (LDPC) codes, assuming
belief propagation decoding on memoryless channels. A concrete framework is
presented, admitting systematic searches for new bounds. Two noise measures are
considered: the Bhattacharyya noise parameter and the soft bit value for a
maximum a posteriori probability (MAP) decoder on the uncoded channel. For Zm
LDPC codes, an iterative m-dimensional bound is derived for
m-ary-input/symmetric-output channels, which gives a sufficient stability
condition for Zm LDPC codes and is complemented by a matched necessary
stability condition introduced herein. Applications to coded modulation and to
codes with non-equiprobable distributed codewords are also discussed.
For binary codes, two new lower bounds are provided for symmetric channels,
including a two-dimensional iterative bound and a one-dimensional non-iterative
bound, the latter of which is the best known bound that is tight for binary
symmetric channels (BSCs), and is a strict improvement over the bound derived
by the channel degradation argument. By adopting the reverse channel
perspective, upper and lower bounds on the decodable Bhattacharyya noise
parameter are derived for non-symmetric channels, which coincides with the
existing bound for symmetric channels.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 16:02:58 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wang",
"Chih-Chun",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610053 | Enrique ter Horst A | Henryk Gzyl, Enrique ter Horst, Samuel Malone | Towards a Bayesian framework for option pricing | null | null | null | null | cs.CE q-fin.PR | null | In this paper, we describe a general method for constructing the posterior
distribution of an option price. Our framework takes as inputs the prior
distributions of the parameters of the stochastic process followed by the
underlying, as well as the likelihood function implied by the observed price
history for the underlying. Our work extends that of Karolyi (1993) and
Darsinos and Satchell (2001), but with the crucial difference that the
likelihood function we use for inference is that which is directly implied by
the underlying, rather than imposed in an ad hoc manner via the introduction of
a function representing "measurement error." As such, an important problem
still relevant for our method is that of model risk, and we address this issue
by describing how to perform a Bayesian averaging of parameter inferences based
on the different models considered using our framework.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 19:37:37 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Gzyl",
"Henryk",
""
],
[
"ter Horst",
"Enrique",
""
],
[
"Malone",
"Samuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.PR",
"description": "Valuation and hedging of financial securities, their derivatives, and structured products",
"span": "(Pricing of Securities)"
}
] |
cs/0610054 | Mitchell Harris | Nachum Dershowitz, Mitchell A. Harris, and Guan-Shieng Huang | Enumeration Problems Related to Ground Horn Theories | 4 pages, before journal submission | null | null | null | cs.LO cs.DM | null | We investigate the enumeration of varieties of boolean theories related to
Horn clauses. We describe a number of combinatorial equivalences among
different characterizations and calculate the number of different theories in
$n$ variables for slightly different characterizations. The method of counting
is via counting models using a satisfiability checker.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 19:28:19 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Feb 2008 22:14:08 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Dershowitz",
"Nachum",
""
],
[
"Harris",
"Mitchell A.",
""
],
[
"Huang",
"Guan-Shieng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0610055 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis) | Extending the Calculus of Constructions with Tarski's fix-point theorem | null | null | null | null | cs.LO | null | We propose to use Tarski's least fixpoint theorem as a basis to define
recursive functions in the calculus of inductive constructions. This widens the
class of functions that can be modeled in type-theory based theorem proving
tool to potentially non-terminating functions. This is only possible if we
extend the logical framework by adding the axioms that correspond to classical
logic. We claim that the extended framework makes it possible to reason about
terminating and non-terminating computations and we show that common facilities
of the calculus of inductive construction, like program extraction can be
extended to also handle the new functions.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 12:50:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610056 | Philipp Mayr | Philipp Mayr | Constructing experimental indicators for Open Access documents | 9 pages, 3 figures | null | 10.3152/147154406781775940 | null | cs.DL | null | The ongoing paradigm change in the scholarly publication system ('science is
turning to e-science') makes it necessary to construct alternative evaluation
criteria/metrics which appropriately take into account the unique
characteristics of electronic publications and other research output in digital
formats. Today, major parts of scholarly Open Access (OA) publications and the
self-archiving area are not well covered in the traditional citation and
indexing databases. The growing share and importance of freely accessible
research output demands new approaches/metrics for measuring and for evaluating
of these new types of scientific publications. In this paper we propose a
simple quantitative method which establishes indicators by measuring the
access/download pattern of OA documents and other web entities of a single web
server. The experimental indicators (search engine, backlink and direct access
indicator) are constructed based on standard local web usage data. This new
type of web-based indicator is developed to model the specific demand for
better study/evaluation of the accessibility, visibility and interlinking of
open accessible documents. We conclude that e-science will need new stable
e-indicators.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 07:10:52 GMT"
}
] | 2019-01-15T00:00:00 | [
[
"Mayr",
"Philipp",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0610057 | Pierre Loidreau | P. Loidreau | Properties of codes in rank metric | 18 pages, 1 figure | null | null | null | cs.DM cs.IT math.IT | null | We study properties of rank metric and codes in rank metric over finite
fields. We show that in rank metric perfect codes do not exist. We derive an
existence bound that is the equivalent of the Gilbert--Varshamov bound in
Hamming metric. We study the asymptotic behavior of the minimum rank distance
of codes satisfying GV. We derive the probability distribution of minimum rank
distance for random and random $\F{q}$-linear codes. We give an asymptotic
equivalent of their average minimum rank distance and show that random
$\F{q}$-linear codes are on GV bound for rank metric.
We show that the covering density of optimum codes whose codewords can be
seen as square matrices is lower bounded by a function depending only on the
error-correcting capability of the codes. We show that there are quasi-perfect
codes in rank metric over fields of characteristic 2.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 07:58:39 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Loidreau",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610058 | Andrew Krizhanovsky A | A. V. Smirnov, T. V. Levashova, M. P. Pashkin, N. G. Shilov, A. A.
Krizhanovsky, A. M. Kashevnik, and A. S. Komarova | Context-sensitive access to e-document corpus | 9 pages, 1 figure, short version of this paper was presented at the
International Conference Corpus Linguistics 2006. October 10-14, St.
Petersburg, Russia | null | null | null | cs.IR | null | The methodology of context-sensitive access to e-documents considers context
as a problem model based on the knowledge extracted from the application
domain, and presented in the form of application ontology. Efficient access to
an information in the text form is needed. Wiki resources as a modern text
format provides huge number of text in a semi formalized structure. At the
first stage of the methodology, documents are indexed against the ontology
representing macro-situation. The indexing method uses a topic tree as a middle
layer between documents and the application ontology. At the second stage
documents relevant to the current situation (the abstract and operational
contexts) are identified and sorted by degree of relevance. Abstract context is
a problem-oriented ontology-based model. Operational context is an
instantiation of the abstract context with data provided by the information
sources. The following parts of the methodology are described: (i) metrics for
measuring similarity of e-documents to ontology, (ii) a document index storing
results of indexing of e-documents against the ontology; (iii) a method for
identification of relevant e-documents based on semantic similarity measures.
Wikipedia (wiki resource) is used as a corpus of e-documents for approach
evaluation in a case study. Text categorization, the presence of metadata, and
an existence of a lot of articles related to different topics characterize the
corpus.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 08:02:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smirnov",
"A. V.",
""
],
[
"Levashova",
"T. V.",
""
],
[
"Pashkin",
"M. P.",
""
],
[
"Shilov",
"N. G.",
""
],
[
"Krizhanovsky",
"A. A.",
""
],
[
"Kashevnik",
"A. M.",
""
],
[
"Komarova",
"A. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0610059 | Claire Jonchery | Claire Jonchery (MAP5), Fran\c{c}oise Dibos (LAGA, IG), Georges
Koepfler (MAP5) | Camera motion estimation through planar deformation determination | 21 pages, version modifi\'ee accept\'e le 20 mars 2008 | Journal of Mathematical Imaging and Vision 32, 1 (2008) 73-87 | 10.1007/s10851-008-0086-1 | null | cs.CV | null | In this paper, we propose a global method for estimating the motion of a
camera which films a static scene. Our approach is direct, fast and robust, and
deals with adjacent frames of a sequence. It is based on a quadratic
approximation of the deformation between two images, in the case of a scene
with constant depth in the camera coordinate system. This condition is very
restrictive but we show that provided translation and depth inverse variations
are small enough, the error on optical flow involved by the approximation of
depths by a constant is small. In this context, we propose a new model of
camera motion, that allows to separate the image deformation in a similarity
and a ``purely'' projective application, due to change of optical axis
direction. This model leads to a quadratic approximation of image deformation
that we estimate with an M-estimator; we can immediatly deduce camera motion
parameters.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 09:31:52 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Mar 2008 15:25:01 GMT"
}
] | 2008-09-29T00:00:00 | [
[
"Jonchery",
"Claire",
"",
"MAP5"
],
[
"Dibos",
"Françoise",
"",
"LAGA, IG"
],
[
"Koepfler",
"Georges",
"",
"MAP5"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0610060 | Mark Levene | Mark Levene and Judit Bar-Ilan | Comparing Typical Opening Move Choices Made by Humans and Chess Engines | 12 pages, 1 figure, 6 tables | null | null | null | cs.AI | null | The opening book is an important component of a chess engine, and thus
computer chess programmers have been developing automated methods to improve
the quality of their books. For chess, which has a very rich opening theory,
large databases of high-quality games can be used as the basis of an opening
book, from which statistics relating to move choices from given positions can
be collected. In order to find out whether the opening books used by modern
chess engines in machine versus machine competitions are ``comparable'' to
those used by chess players in human versus human competitions, we carried out
analysis on 26 test positions using statistics from two opening books one
compiled from humans' games and the other from machines' games. Our analysis
using several nonparametric measures, shows that, overall, there is a strong
association between humans' and machines' choices of opening moves when using a
book to guide their choices.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 10:26:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Levene",
"Mark",
""
],
[
"Bar-Ilan",
"Judit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610061 | Thomas Michel | Gerhard Wunder, Thomas Michel | The Delay-Limited Capacity Region of OFDM Broadcast Channels | null | null | null | null | cs.IT math.IT | null | In this work, the delay limited capacity (DLC) of orthogonal frequency
division multiplexing (OFDM) systems is investigated. The analysis is organized
into two parts. In the first part, the impact of system parameters on the OFDM
DLC is analyzed in a general setting. The main results are that under weak
assumptions the maximum achievable single user DLC is almost independent of the
distribution of the path attenuations in the low signal-to-noise (SNR) region
but depends strongly on the delay spread. In the high SNR region the roles are
exchanged. Here, the impact of delay spread is negligible while the impact of
the distribution becomes dominant. The relevant asymptotic quantities are
derived without employing simplifying assumptions on the OFDM correlation
structure. Moreover, for both cases it is shown that the DLC is maximized if
the total channel energy is uniformly spread, i.e. the power delay profile is
uniform. It is worth pointing out that since universal bounds are obtained the
results can also be used for other classes of parallel channels with block
fading characteristic. The second part extends the setting to the broadcast
channel and studies the corresponding OFDM DLC BC region. An algorithm for
computing the OFDM BC DLC region is presented. To derive simple but smart
resource allocation strategies, the principle of rate water-filling employing
order statistics is introduced. This yields analytical lower bounds on the OFDM
DLC region based on orthogonal frequency division multiple access (OFDMA) and
ordinal channel state information (CSI). Finally, the schemes are compared to
an algorithm using full CSI.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 10:42:41 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wunder",
"Gerhard",
""
],
[
"Michel",
"Thomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610062 | Frederic Blanqui | Frederic Blanqui (INRIA Lorraine - LORIA) | A type-based termination criterion for dependently-typed higher-order
rewrite systems | Colloque avec actes et comit\'{e} de lecture. internationale | Dans 15th International Conference on Rewriting Techniques and
Applications - RTA'04 (2004) 15 p | null | null | cs.LO cs.PL | null | Several authors devised type-based termination criteria for ML-like languages
allowing non-structural recursive calls. We extend these works to general
rewriting and dependent types, hence providing a powerful termination criterion
for the combination of rewriting and beta-reduction in the Calculus of
Constructions.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 12:47:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blanqui",
"Frederic",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0610063 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LRI), Jean-Pierre Jouannaud (LRI), Mitsuhiro
Okada | The Calculus of Algebraic Constructions | null | Dans Rewriting Techniques and Applications, 10th International
Conference, RTA-99 1631 (1999) | null | null | cs.LO | null | This paper is concerned with the foundations of the Calculus of Algebraic
Constructions (CAC), an extension of the Calculus of Constructions by inductive
data types. CAC generalizes inductive types equipped with higher-order
primitive recursion, by providing definitions of functions by pattern-matching
which capture recursor definitions for arbitrary non-dependent and
non-polymorphic inductive types satisfying a strictly positivity condition. CAC
also generalizes the first-order framework of abstract data types by providing
dependent types and higher-order rewrite rules.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 13:45:46 GMT"
},
{
"version": "v2",
"created": "Tue, 27 May 2008 14:54:46 GMT"
}
] | 2008-05-27T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LRI"
],
[
"Jouannaud",
"Jean-Pierre",
"",
"LRI"
],
[
"Okada",
"Mitsuhiro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610064 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LRI) | Termination and Confluence of Higher-Order Rewrite Systems | null | Dans Rewriting Techniques and Applications, 11th International
Conference, RTA 2000 1833 (2000) | null | null | cs.LO | null | In the last twenty years, several approaches to higher-order rewriting have
been proposed, among which Klop's Combinatory Rewrite Systems (CRSs), Nipkow's
Higher-order Rewrite Systems (HRSs) and Jouannaud and Okada's higher-order
algebraic specification languages, of which only the last one considers typed
terms. The later approach has been extended by Jouannaud, Okada and the present
author into Inductive Data Type Systems (IDTSs). In this paper, we extend IDTSs
with the CRS higher-order pattern-matching mechanism, resulting in simply-typed
CRSs. Then, we show how the termination criterion developed for IDTSs with
first-order pattern-matching, called the General Schema, can be extended so as
to prove the strong normalization of IDTSs with higher-order pattern-matching.
Next, we compare the unified approach with HRSs. We first prove that the
extended General Schema can also be applied to HRSs. Second, we show how
Nipkow's higher-order critical pair analysis technique for proving local
confluence can be applied to IDTSs.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 13:47:47 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610065 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LRI) | Definitions by Rewriting in the Calculus of Constructions | Best student paper (Kleene Award) | Dans 16th Annual IEEE Symposium on Logic in Computer Science
(2001) | null | null | cs.LO | null | The main novelty of this paper is to consider an extension of the Calculus of
Constructions where predicates can be defined with a general form of rewrite
rules. We prove the strong normalization of the reduction relation generated by
the beta-rule and the user-defined rules under some general syntactic
conditions including confluence. As examples, we show that two important
systems satisfy these conditions: a sub-system of the Calculus of Inductive
Constructions which is the basis of the proof assistant Coq, and the Natural
Deduction Modulo a large class of equational theories.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 13:48:36 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610066 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LRI), Jean-Pierre Jouannaud (LRI), Mitsuhiro
Okada | Inductive-data-type Systems | Theoretical Computer Science (2002) | null | 10.1016/S0304-3975(00)00347-9 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a previous work ("Abstract Data Type Systems", TCS 173(2), 1997), the last
two authors presented a combined language made of a (strongly normalizing)
algebraic rewrite system and a typed lambda-calculus enriched by
pattern-matching definitions following a certain format, called the "General
Schema", which generalizes the usual recursor definitions for natural numbers
and similar "basic inductive types". This combined language was shown to be
strongly normalizing. The purpose of this paper is to reformulate and extend
the General Schema in order to make it easily extensible, to capture a more
general class of inductive types, called "strictly positive", and to ease the
strong normalization proof of the resulting system. This result provides a
computation model for the combination of an algebraic specification language
based on abstract data types and of a strongly typed functional language with
strictly positive inductive types.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 13:54:42 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Sep 2013 17:40:37 GMT"
}
] | 2013-09-17T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LRI"
],
[
"Jouannaud",
"Jean-Pierre",
"",
"LRI"
],
[
"Okada",
"Mitsuhiro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610067 | W Saba | Walid S. Saba | Language, logic and ontology: uncovering the structure of commonsense
knowledge | 30 pages, 7 figures, 3 tables under revision for a journal submission | null | null | null | cs.AI math.LO | null | The purpose of this paper is twofold: (i) we argue that the structure of
commonsense knowledge must be discovered, rather than invented; and (ii) we
argue that natural language, which is the best known theory of our (shared)
commonsense knowledge, should itself be used as a guide to discovering the
structure of commonsense knowledge. In addition to suggesting a systematic
method to the discovery of the structure of commonsense knowledge, the method
we propose seems to also provide an explanation for a number of phenomena in
natural language, such as metaphor, intensionality, and the semantics of
nominal compounds. Admittedly, our ultimate goal is quite ambitious, and it is
no less than the systematic 'discovery' of a well-typed ontology of commonsense
knowledge, and the subsequent formulation of the long-awaited goal of a meaning
algebra.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 14:04:28 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2006 15:01:55 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Oct 2006 18:59:21 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Saba",
"Walid S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/0610068 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LRI) | Type theory and rewriting | English version of my PhD thesis | null | null | null | cs.LO | null | We study the properties, in particular termination, of dependent types
systems for lambda calculus and rewriting.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 14:09:16 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2007 08:54:59 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610069 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Futurs) | An Isabelle formalization of protocol-independent secrecy with an
application to e-commerce | null | null | null | null | cs.LO | null | A protocol-independent secrecy theorem is established and applied to several
non-trivial protocols. In particular, it is applied to protocols proposed for
protecting the computation results of free-roaming mobile agents doing
comparison shopping. All the results presented here have been formally proved
in Isabelle by building on Larry Paulson's inductive approach. This therefore
provides a library of general theorems that can be applied to other protocols.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 14:20:28 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610070 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LIX) | Inductive types in the Calculus of Algebraic Constructions | null | Dans Typed Lambda Calculi and Applications, 6th International
Conference, TLCA 2003 2701 (2003) | null | null | cs.LO | null | In a previous work, we proved that almost all of the Calculus of Inductive
Constructions (CIC), which is the basis of the proof assistant Coq, can be seen
as a Calculus of Algebraic Constructions (CAC), an extension of the Calculus of
Constructions with functions and predicates defined by higher-order rewrite
rules. In this paper, we not only prove that CIC as a whole can be seen as a
CAC, but also that it can be extended with non-free constructors,
pattern-matching on defined symbols, non-strictly positive types and
inductive-recursive types.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 15:18:13 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LIX"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610071 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LIX) | Rewriting modulo in Deduction modulo | null | Dans Rewriting Techniques and Applications, 14th International
Conference, RTA 2003 2706 (2003) | null | null | cs.LO | null | We study the termination of rewriting modulo a set of equations in the
Calculus of Algebraic Constructions, an extension of the Calculus of
Constructions with functions and predicates defined by higher-order rewrite
rules. In a previous work, we defined general syntactic conditions based on the
notion of computable closure for ensuring the termination of the combination of
rewriting and beta-reduction. Here, we show that this result is preserved when
considering rewriting modulo a set of equations if the equivalence classes
generated by these equations are finite, the equations are linear and satisfy
general syntactic conditions also based on the notion of computable closure.
This includes equations like associativity and commutativity, and provides an
original treatment of termination modulo equations.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2006 15:21:50 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LIX"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610072 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA, LIX) | Definitions by rewriting in the Calculus of Constructions | Journal version of LICS'01 | Mathematical Structures in Computer Science 15, 1 (2005) 37-92 | 10.1017/S0960129504004426 | Journal version of LICS'01 | cs.LO | null | This paper presents general syntactic conditions ensuring the strong
normalization and the logical consistency of the Calculus of Algebraic
Constructions, an extension of the Calculus of Constructions with functions and
predicates defined by higher-order rewrite rules. On the one hand, the Calculus
of Constructions is a powerful type system in which one can formalize the
propositions and natural deduction proofs of higher-order logic. On the other
hand, rewriting is a simple and powerful computation paradigm. The combination
of both allows, among other things, to develop formal proofs with a reduced
size and more automation compared with more traditional proof assistants. The
main novelty is to consider a general form of rewriting at the predicate-level
which generalizes the strong elimination of the Calculus of Inductive
Constructions.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 11:47:54 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA, LIX"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610073 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA) | Inductive types in the Calculus of Algebraic Constructions | Journal version of TLCA'03 | Fundamenta Informaticae 65, 1-2 (2005) 61-86 | null | Journal version of TLCA'03 | cs.LO | null | In a previous work, we proved that an important part of the Calculus of
Inductive Constructions (CIC), the basis of the Coq proof assistant, can be
seen as a Calculus of Algebraic Constructions (CAC), an extension of the
Calculus of Constructions with functions and predicates defined by higher-order
rewrite rules. In this paper, we prove that almost all CIC can be seen as a
CAC, and that it can be further extended with non-strictly positive types and
inductive-recursive types together with non-free constructors and
pattern-matching on defined symbols.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 11:48:39 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610074 | Georg Schmidt | Georg Schmidt, Vladimir R. Sidorenko, and Martin Bossert | Collaborative Decoding of Interleaved Reed-Solomon Codes and
Concatenated Code Designs | 20 pages, 7 figures | null | null | null | cs.IT math.IT | null | Interleaved Reed-Solomon codes are applied in numerous data processing, data
transmission, and data storage systems. They are generated by interleaving
several codewords of ordinary Reed-Solomon codes. Usually, these codewords are
decoded independently by classical algebraic decoding methods. However, by
collaborative algebraic decoding approaches, such interleaved schemes allow the
correction of error patterns beyond half the minimum distance, provided that
the errors in the received signal occur in bursts. In this work, collaborative
decoding of interleaved Reed-Solomon codes by multi-sequence shift-register
synthesis is considered and analyzed. Based on the framework of interleaved
Reed-Solomon codes, concatenated code designs are investigated, which are
obtained by interleaving several Reed-Solomon codes, and concatenating them
with an inner block code.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 18:02:47 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2006 20:23:44 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Schmidt",
"Georg",
""
],
[
"Sidorenko",
"Vladimir R.",
""
],
[
"Bossert",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610075 | Marek Czachor | Diederik Aerts, Marek Czachor, Bart De Moor | On Geometric Algebra representation of Binary Spatter Codes | preliminary version | null | null | null | cs.AI quant-ph | null | Kanerva's Binary Spatter Codes are reformulated in terms of geometric
algebra. The key ingredient of the construction is the representation of XOR
binding in terms of geometric product.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 18:48:22 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2006 13:56:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aerts",
"Diederik",
""
],
[
"Czachor",
"Marek",
""
],
[
"De Moor",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0610076 | Willy Valdivia-Granda | Willy Valdivia-Granda, William Perrizo, Edward Deckard, Francis Larson | Peano Count Trees (P-Trees) and Rule Association Mining for Gene
Expression Profiling of Microarray Data | null | 2002 International Conference in Bioinformatics. Bangkok, Thailand | null | null | cs.DS cs.IR q-bio.MN | null | The greatest challenge in maximizing the use of gene expression data is to
develop new computational tools capable of interconnecting and interpreting the
results from different organisms and experimental settings. We propose an
integrative and comprehensive approach including a super-chip containing data
from microarray experiments collected on different species subjected to hypoxic
and anoxic stress. A data mining technology called Peano count tree (P-trees)
is used to represent genomic data in multidimensions. Each microarray spot is
presented as a pixel with its corresponding red/green intensity feature bands.
Each bad is stored separately in a reorganized 8-separate (bSQ) file format.
Each bSQ is converted to a quadrant base tree structure (P-tree) from which a
superchip is represented as expression P-trees (EP-trees) and repression
P-trees (RP-trees). The use of association rule mining is proposed to derived
to meanigingfully organize signal transduction pathways taking in consideration
evolutionary considerations. We argue that the genetic constitution of an
organism (K) can be represented by the total number of genes belonging to two
groups. The group X constitutes genes (X1,Xn) and they can be represented as 1
or 0 depending on whether the gene was expressed or not. The second group of Y
genes (Y1,Yn) is expressed at different levels. These genes have a very high
repression, high expression, very repressed or highly repressed. However, many
genes of the group Y are specie specific and modulated by the products and
combinations of genes of the group X. In this paper, we introduce the dSQ and
P-tree technology; the biological implications of association rule mining using
X and Y gene groups and some advances in the integration of this information
using the BRAIN architecture.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 19:55:32 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Oct 2006 18:27:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Valdivia-Granda",
"Willy",
""
],
[
"Perrizo",
"William",
""
],
[
"Deckard",
"Edward",
""
],
[
"Larson",
"Francis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
}
] |
cs/0610077 | Niranjay Ravindran | Niranjay Ravindran and Nihar Jindal | MIMO Broadcast Channels with Block Diagonalization and Finite Rate
Feedback | 4 pages, 3 figures, submitted to International Conference on
Acoustics, Speech, and Signal Processing (ICASSP) 2007 | null | null | null | cs.IT math.IT | null | Block diagonalization is a linear precoding technique for the multiple
antenna broadcast (downlink) channel that involves transmission of multiple
data streams to each receiver such that no multi-user interference is
experienced at any of the receivers. This low-complexity scheme operates only a
few dB away from capacity but does require very accurate channel knowledge at
the transmitter, which can be very difficult to obtain in fading scenarios. We
consider a limited feedback system where each receiver knows its channel
perfectly, but the transmitter is only provided with a finite number of channel
feedback bits from each receiver. Using a random vector quantization argument,
we quantify the throughput loss due to imperfect channel knowledge as a
function of the feedback level. The quality of channel knowledge must improve
proportional to the SNR in order to prevent interference-limitations, and we
show that scaling the number of feedback bits linearly with the system SNR is
sufficient to maintain a bounded rate loss. Finally, we investigate a simple
scalar quantization scheme that is seen to achieve the same scaling behavior as
vector quantization.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 20:16:16 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Ravindran",
"Niranjay",
""
],
[
"Jindal",
"Nihar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610078 | Fehmi Ben Abdesslem | Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias de Amorim, Katia
Obraczka, Ignacio Solis, and Serge Fdida | Rapid Prototyping over IEEE 802.11 | Changed content. 12 pages | null | null | null | cs.NI | null | This paper introduces Prawn, a tool for prototyping communication protocols
over IEEE 802.11 networks. Prawn allows researchers to conduct both functional
assessment and performance evaluation as an inherent part of the protocol
design process. Since Prawn runs on real IEEE 802.11 nodes, prototypes can be
evaluated and adjusted under realistic conditions. Once the prototype has been
extensively tested and thoroughly validated, and its functional design tuned
accordingly, it is then ready for implementation. Prawn facilitates prototype
development by providing: (i) a set of building blocks that implement common
functions needed by a wide range of wireless protocols (e.g., neighbor
discovery, link quality assessment, message transmission and reception), and
(ii) an API that allows protocol designers to access Prawn primitives. We show
through a number of case studies how Prawn supports prototyping as part of
protocol design and, as a result of enabling deployment and testing under
real-world scenarios, how Prawn provides useful feedback on protocol operation
and performance.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 15:29:44 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Feb 2007 21:41:58 GMT"
},
{
"version": "v3",
"created": "Tue, 22 May 2007 16:24:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abdesslem",
"Fehmi Ben",
""
],
[
"Iannone",
"Luigi",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Obraczka",
"Katia",
""
],
[
"Solis",
"Ignacio",
""
],
[
"Fdida",
"Serge",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610079 | Shengtian Yang | Shengtian Yang, Peiliang Qiu | An Enhanced Covering Lemma for Multiterminal Source Coding | To appear in Proc. 2006 IEEE Information Theory Workshop, October
22-26, 2006, Chengdu, China. (5 pages) | null | 10.1109/ITW2.2006.323809 | null | cs.IT math.IT | null | An enhanced covering lemma for a Markov chain is proved in this paper, and
then the distributed source coding problem of correlated general sources with
one average distortion criterion under fixed-length coding is investigated.
Based on the enhanced lemma, a sufficient and necessary condition for
determining the achievability of rate-distortion triples is given.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 00:22:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Yang",
"Shengtian",
""
],
[
"Qiu",
"Peiliang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610080 | Martin Ziegler | St\'ephane Le Roux and Martin Ziegler | Computable Closed Euclidean Subsets with and without Computable Points | Included helpful remarks of J.Miller and of X.Zheng | null | null | null | cs.LO math.LO | null | The empty set of course contains no computable point. On the other hand,
surprising results due to Zaslavskii, Tseitin, Kreisel, and Lacombe assert the
existence of NON-empty co-r.e. closed sets devoid of computable points: sets
which are `large' in the sense of positive Lebesgue measure. We observe that a
certain size is in fact necessary: every non-empty co-r.e. closed real set
without computable points has continuum cardinality.
This leads us to investigate for various classes of computable real subsets
whether they necessarily contain a (not necessarily effectively findable)
computable point.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 07:45:05 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2006 08:51:38 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Dec 2006 14:26:00 GMT"
},
{
"version": "v4",
"created": "Mon, 12 Mar 2007 10:32:27 GMT"
},
{
"version": "v5",
"created": "Fri, 22 Jun 2007 18:18:23 GMT"
}
] | 2011-08-04T00:00:00 | [
[
"Roux",
"Stéphane Le",
""
],
[
"Ziegler",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/0610081 | Lars Birkedal | Lars Birkedal, Noah Torp-Smith, Hongseok Yang | Semantics of Separation-Logic Typing and Higher-order Frame Rules
for<br> Algol-like Languages | null | Logical Methods in Computer Science, Volume 2, Issue 5 (November
3, 2006) lmcs:2232 | 10.2168/LMCS-2(5:1)2006 | null | cs.LO | null | We show how to give a coherent semantics to programs that are well-specified
in a version of separation logic for a language with higher types: idealized
algol extended with heaps (but with immutable stack variables). In particular,
we provide simple sound rules for deriving higher-order frame rules, allowing
for local reasoning.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 08:21:31 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Nov 2006 13:02:58 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Birkedal",
"Lars",
""
],
[
"Torp-Smith",
"Noah",
""
],
[
"Yang",
"Hongseok",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610082 | Sander Stepanov Dr. | Sander Stepanov, Ofer Hadar | Theoretical analysis of network cranback protocols performance | null | null | null | null | cs.IT math.IT | null | Suggested the decision of the network cranback protocols performance
analyzing problem from Eyal Felstine, Reuven Cohen and Ofer Hadar, " Crankback
Prediction in Hierarchical ATM networks", Journal of Network and Systems
Management, Vol. 10, No. 3, September 2002. It show that the false alarm
probability and probability of successful way crossing can be calculated. The
main optimization equations are developed for cranback protocol parameters by
using analytical expressions for statistical protocol characteristics.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 11:21:42 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Stepanov",
"Sander",
""
],
[
"Hadar",
"Ofer",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610083 | Sander Stepanov Dr. | Sander Stepanov | Estimation of the traffic in the binary channel for data networks | null | null | null | null | cs.IT math.IT | null | It is impossible to provide an effective utilization of communication
networks without the analysis of the quantitative characteristics of the
traffic in real time. The constant supervision of all channels of the data
practically is impracticable because requires transfer of the significant
additional information on a network and large resources expenses for devices of
the control. Thus, the task on traffic estimation with small expenses in real
time is the urgent.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 11:47:07 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Stepanov",
"Sander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610084 | Thomas Claveirole | Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, and Yannis
Viniotis | Share and Disperse: How to Resist Against Aggregator Compromises in
Sensor Networks | 9 pages, 3 figures, 2 tables | null | null | null | cs.NI cs.CR | null | A common approach to overcome the limited nature of sensor networks is to
aggregate data at intermediate nodes. A challenging issue in this context is to
guarantee end-to-end security mainly because sensor networks are extremely
vulnerable to node compromises. In order to secure data aggregation, in this
paper we propose three schemes that rely on multipath routing. The first one
guarantees data confidentiality through secret sharing, while the second and
third ones provide data availability through information dispersal. Based on
qualitative analysis and implementation, we show that, by applying these
schemes, a sensor network can achieve data confidentiality, authenticity, and
protection against denial of service attacks even in the presence of multiple
compromised nodes.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 13:01:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Claveirole",
"Thomas",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Abdalla",
"Michel",
""
],
[
"Viniotis",
"Yannis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0610085 | Farn Wang | Farn Wang | Symbolic Simulation-Checking of Dense-Time Systems | 16 pages, 1 figure | null | null | null | cs.LO cs.SE | null | Intuitively, an (implementation) automata is simulated by a (specification)
automata if every externally observable transition by the implementation
automata can also be made by the specification automata. In this work, we
present a symbolic algorithm for the simulation-checking of timed automatas. We
first present a simulation-checking procedure that operates on state spaces,
representable with convex polyhedra, of timed automatas. We then present
techniques to represent those intermediate result convex polyhedra with zones
and make the procedure an algorithm. We then discuss how to handle Zeno states
in the implementation automata. Finally, we have endeavored to realize the
algorithm and report the performance of our algorithm in the experiment.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 18:02:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0610086 | Stephen A. Fenner | S. A. Fenner, Y. Zhang | The central nature of the Hidden Subgroup problem | 12 pages, no figures. Corrected Proposition 3.3 and added discussion
relating it to results of Childs and van Dam (quant-ph/0507190). Adjusted
Definition 2.2 and the proof of Proposition 3.3 to fix a minor bug. Other
minor corrections/clarifications. Updated references | null | null | null | cs.CC quant-ph | null | We show that several problems that figure prominently in quantum computing,
including Hidden Coset, Hidden Shift, and Orbit Coset, are equivalent or
reducible to Hidden Subgroup for a large variety of groups. We also show that,
over permutation groups, the decision version and search version of Hidden
Subgroup are polynomial-time equivalent. For Hidden Subgroup over dihedral
groups, such an equivalence can be obtained if the order of the group is
smooth. Finally, we give nonadaptive program checkers for Hidden Subgroup and
its decision version.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 18:24:18 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Nov 2006 23:46:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fenner",
"S. A.",
""
],
[
"Zhang",
"Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0610087 | Henry Jerez | Joud Khoury, Henry N Jerez, Nicolas Nehme-Antoun, Chaouki Abdallah | An Application of the Mobile Transient Internet Architecture to IP
Mobility and Inter-Operability | null | null | null | null | cs.NI | null | We introduce an application of a mobile transient network architecture on top
of the current Internet. This paper is an application extension to a conceptual
mobile network architecture. It attempts to specifically reinforce some of the
powerful notions exposed by the architecture from an application perspective.
Of these notions, we explore the network expansion layer, an overlay of
components and services, that enables a persistent identification network and
other required services. The overlay abstraction introduces several benefits of
which mobility and communication across heterogenous network structures are of
interest to this paper. We present implementations of several components and
protocols including gateways, Agents and the Open Device Access Protocol. Our
present identification network implementation exploits the current
implementation of the Handle System through the use of distributed, global and
persistent identifiers called handles. Handles are used to identify and locate
devices and services abstracting any physical location or network association
from the communicating ends. A communication framework is finally demonstrated
that would allow for mobile devices on the public Internet to have persistent
identifiers and thus be persistently accessible either directly or indirectly.
This application expands IP inter-operability beyond its current boundaries.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 22:12:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Khoury",
"Joud",
""
],
[
"Jerez",
"Henry N",
""
],
[
"Nehme-Antoun",
"Nicolas",
""
],
[
"Abdallah",
"Chaouki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610088 | Amelia Sparavigna | A. Sparavigna and B. Montrucchio | Vector field visualization with streamlines | 9 pges, 7 figures | null | null | null | cs.GR | null | We have recently developed an algorithm for vector field visualization with
oriented streamlines, able to depict the flow directions everywhere in a dense
vector field and the sense of the local orientations. The algorithm has useful
applications in the visualization of the director field in nematic liquid
crystals. Here we propose an improvement of the algorithm able to enhance the
visualization of the local magnitude of the field. This new approach of the
algorithm is compared with the same procedure applied to the Line Integral
Convolution (LIC) visualization.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 09:25:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sparavigna",
"A.",
""
],
[
"Montrucchio",
"B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0610089 | Himanshu Thapliyal | Himanshu Thapliyal and Mark Zwolinski | Reversible Logic to Cryptographic Hardware: A New Paradigm | Published in the proceedings of the The 49th IEEE International
Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August
2006. Nominated for the Student Paper Award | null | null | null | cs.CR | null | Differential Power Analysis (DPA) presents a major challenge to
mathematically-secure cryptographic protocols. Attackers can break the
encryption by measuring the energy consumed in the working digital circuit. To
prevent this type of attack, this paper proposes the use of reversible logic
for designing the ALU of a cryptosystem. Ideally, reversible circuits dissipate
zero energy. Thus, it would be of great significance to apply reversible logic
to designing secure cryptosystems. As far as is known, this is the first
attempt to apply reversible logic to developing secure cryptosystems. In a
prototype of a reversible ALU for a crypto-processor, reversible designs of
adders and Montgomery multipliers are presented. The reversible designs of a
carry propagate adder, four-to-two and five-to-two carry save adders are
presented using a reversible TSG gate. One of the important properties of the
TSG gate is that it can work singly as a reversible full adder. In order to
design the reversible Montgomery multiplier, novel reversible sequential
circuits are also proposed which are integrated with the proposed adders to
design a reversible modulo multiplier. It is intended that this paper will
provide a starting point for developing cryptosystems secure against DPA
attacks.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 10:19:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Zwolinski",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0610090 | Himanshu Thapliyal | Himanshu Thapliyal, Hamid R. Arabnia and A.P Vinod | Combined Integer and Floating Point Multiplication Architecture(CIFM)
for FPGAs and Its Reversible Logic Implementation | Published in the proceedings of the The 49th IEEE International
Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August
2006. Nominated for the Student Paper Award(12 papers are nominated for
Student paper Award among all submissions) | null | 10.1109/MWSCAS.2006.382306 | null | cs.AR | null | In this paper, the authors propose the idea of a combined integer and
floating point multiplier(CIFM) for FPGAs. The authors propose the replacement
of existing 18x18 dedicated multipliers in FPGAs with dedicated 24x24
multipliers designed with small 4x4 bit multipliers. It is also proposed that
for every dedicated 24x24 bit multiplier block designed with 4x4 bit
multipliers, four redundant 4x4 multiplier should be provided to enforce the
feature of self repairability (to recover from the faults). In the proposed
CIFM reconfigurability at run time is also provided resulting in low power. The
major source of motivation for providing the dedicated 24x24 bit multiplier
stems from the fact that single precision floating point multiplier requires
24x24 bit integer multiplier for mantissa multiplication. A reconfigurable,
self-repairable 24x24 bit multiplier (implemented with 4x4 bit multiply
modules) will ideally suit this purpose, making FPGAs more suitable for integer
as well floating point operations. A dedicated 4x4 bit multiplier is also
proposed in this paper. Moreover, in the recent years, reversible logic has
emerged as a promising technology having its applications in low power CMOS,
quantum computing, nanotechnology, and optical computing. It is not possible to
realize quantum computing without reversible logic. Thus, this paper also paper
provides the reversible logic implementation of the proposed CIFM. The
reversible CIFM designed and proposed here will form the basis of the
completely reversible FPGAs.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 10:39:42 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Vinod",
"A. P",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0610091 | Pedro Miramontes | R. Mansilla, E. K\"oppen, G. Cocho and P. Miramontes | On the Behavior of Journal Impact Factor Rank-Order Distribution | Submitted to the Journal of Informetrics, redundat text cropped,
bibliography corrected, new section added, typos corrected | null | null | null | cs.IR physics.soc-ph | null | An empirical law for the rank-order behavior of journal impact factors is
found. Using an extensive data base on impact factors including journals on
Education, Agrosciences, Geosciences, Biosciences and Environ- mental,
Chemical, Computer, Engineering, Material, Mathematical, Medical and Physical
Sciences we have found extremely good fits out- performing other rank-order
models. Some extensions to other areas of knowledge are discussed.
| [
{
"version": "v1",
"created": "Sat, 14 Oct 2006 17:03:46 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Oct 2006 14:10:01 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Oct 2006 17:54:29 GMT"
},
{
"version": "v4",
"created": "Sun, 24 Dec 2006 06:03:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mansilla",
"R.",
""
],
[
"Köppen",
"E.",
""
],
[
"Cocho",
"G.",
""
],
[
"Miramontes",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0610092 | David Eppstein | David Eppstein | Happy endings for flip graphs | 26 pages, 15 figures. Revised and expanded for journal publication | Journal of Computational Geometry 1(1):3-28, 2010 | 10.20382/jocg.v1i1a2 | null | cs.CG math.CO math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the triangulations of a finite point set form a flip graph that
can be embedded isometrically into a hypercube, if and only if the point set
has no empty convex pentagon. Point sets of this type include convex subsets of
lattices, points on two lines, and several other infinite families. As a
consequence, flip distance in such point sets can be computed efficiently.
| [
{
"version": "v1",
"created": "Sun, 15 Oct 2006 01:30:48 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Feb 2010 06:36:23 GMT"
}
] | 2016-08-12T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
cs/0610093 | Hans van Ditmarsch | H.P. van Ditmarsch and B.P. Kooi | Semantic results for ontic and epistemic change | null | G. Bonanno, W. van der Hoek, and M. Wooldridge (editors), Logic
and the Foundations of Game and Decision Theory (LOFT 7), pages 87-117. Texts
in Logic and Games, Amsterdam University Press, 2008 | null | null | cs.LO cs.AI cs.MA | null | We give some semantic results for an epistemic logic incorporating dynamic
operators to describe information changing events. Such events include
epistemic changes, where agents become more informed about the non-changing
state of the world, and ontic changes, wherein the world changes. The events
are executed in information states that are modeled as pointed Kripke models.
Our contribution consists of three semantic results. (i) Given two information
states, there is an event transforming one into the other. The linguistic
correspondent to this is that every consistent formula can be made true in
every information state by the execution of an event. (ii) A more technical
result is that: every event corresponds to an event in which the postconditions
formalizing ontic change are assignments to `true' and `false' only (instead of
assignments to arbitrary formulas in the logical language). `Corresponds' means
that execution of either event in a given information state results in
bisimilar information states. (iii) The third, also technical, result is that
every event corresponds to a sequence of events wherein all postconditions are
assignments of a single atom only (instead of simultaneous assignments of more
than one atom).
| [
{
"version": "v1",
"created": "Sun, 15 Oct 2006 04:48:48 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Jul 2007 05:21:33 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Jul 2007 19:23:39 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Nov 2007 20:30:47 GMT"
}
] | 2011-11-02T00:00:00 | [
[
"van Ditmarsch",
"H. P.",
""
],
[
"Kooi",
"B. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0610094 | Ali Mesbah | Ali Mesbah and Arie van Deursen | Migrating Multi-page Web Applications to Single-page AJAX Interfaces | null | Proceedings of the 11th European Conference on Software
Maintenance and Reengineering (CSMR'07), IEEE Computer Society, 2007 | null | TUD-SERG-2006-018 | cs.SE | null | Recently, a new web development technique for creating interactive web
applications, dubbed AJAX, has emerged. In this new model, the single-page web
interface is composed of individual components which can be updated/replaced
independently. With the rise of AJAX web applications classical multi-page web
applications are becoming legacy systems. If until a year ago, the concern
revolved around migrating legacy systems to web-based settings, today we have a
new challenge of migrating web applications to single-page AJAX applications.
Gaining an understanding of the navigational model and user interface structure
of the source application is the first step in the migration process. In this
paper, we explore how reverse engineering techniques can help analyze classic
web applications for this purpose. Our approach, using a schema-based
clustering technique, extracts a navigational model of web applications, and
identifies candidate user interface components to be migrated to a single-page
AJAX interface. Additionally, results of a case study, conducted to evaluate
our tool, are presented.
| [
{
"version": "v1",
"created": "Sun, 15 Oct 2006 07:36:19 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jan 2007 14:17:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mesbah",
"Ali",
""
],
[
"van Deursen",
"Arie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0610095 | Omer Gim\'enez Mr. | Omer Gim\'enez | Solving planning domains with polytree causal graphs is NP-complete | null | null | null | null | cs.AI cs.CC | null | We show that solving planning domains on binary variables with polytree
causal graph is \NP-complete. This is in contrast to a polynomial-time
algorithm of Domshlak and Brafman that solves these planning domains for
polytree causal graphs of bounded indegree.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 06:18:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giménez",
"Omer",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0610096 | Sandrine Blazy | Sandrine Blazy (CEDRIC) | Partial Evaluation for Program Comprehension | null | Dans ACM Computing Surveys, Symposium on partial evaluation 30, 3
es (1998) | null | null | cs.SE | null | Program comprehension is the most tedious and time consuming task of software
maintenance, an important phase of the software life cycle. This is
particularly true while maintaining scientific application programs that have
been written in Fortran for decades and that are still vital in various domains
even though more modern languages are used to implement their user interfaces.
Very often, programs have evolved as their application domains increase
continually and have become very complex due to extensive modifications. This
generality in programs is implemented by input variables whose value does not
vary in the context of a given application. Thus, it is very interesting for
the maintainer to propagate such information, that is to obtain a simplified
program, which behaves like the initial one when used according to the
restriction. We have adapted partial evaluation for program comprehension. Our
partial evaluator performs mainly two tasks: constant propagation and
statements simplification. It includes an interprocedural alias analysis. As
our aim is program comprehension rather than optimization, there are two main
differences with classical partial evaluation. We do not change the original
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 09:05:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blazy",
"Sandrine",
"",
"CEDRIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0610097 | Sandrine Blazy | Sandrine Blazy (CEDRIC), Fr\'ed\'eric Gervais (CEDRIC), R\'egine
Laleau (CEDRIC) | Reuse of Specification Patterns with the B Method | null | Dans ZB 2003: Formal Specification and Development in Z and B,
2651 (2003) 40-57 | null | null | cs.SE | null | This paper describes an approach for reusing specification patterns.
Specification patterns are design patterns that are expressed in a formal
specification language. Reusing a specification pattern means instantiating it
or composing it with other specification patterns. Three levels of composition
are defined: juxtaposition, composition with inter-patterns links and
unification. This paper shows through examples how to define specification
patterns in B, how to reuse them directly in B, and also how to reuse the
proofs associated with specification patterns.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 09:07:14 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Blazy",
"Sandrine",
"",
"CEDRIC"
],
[
"Gervais",
"Frédéric",
"",
"CEDRIC"
],
[
"Laleau",
"Régine",
"",
"CEDRIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0610098 | Joseph Y. Halpern | Joseph Y. Halpern and Yoram Moses | Characterizing Solution Concepts in Games Using Knowledge-Based Programs | To appear, IJCAI 2007 | null | null | null | cs.GT cs.DC cs.MA | null | We show how solution concepts in games such as Nash equilibrium, correlated
equilibrium, rationalizability, and sequential equilibrium can be given a
uniform definition in terms of \emph{knowledge-based programs}. Intuitively,
all solution concepts are implementations of two knowledge-based programs, one
appropriate for games represented in normal form, the other for games
represented in extensive form. These knowledge-based programs can be viewed as
embodying rationality. The representation works even if (a) information sets do
not capture an agent's knowledge, (b) uncertainty is not represented by
probability, or (c) the underlying game is not common knowledge.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 13:00:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Moses",
"Yoram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0610099 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Properties of Codes with the Rank Metric | 5 pages, 4 figures, accepted to Globecom 2006 | null | null | null | cs.IT math.IT | null | In this paper, we study properties of rank metric codes in general and
maximum rank distance (MRD) codes in particular. For codes with the rank
metric, we first establish Gilbert and sphere-packing bounds, and then obtain
the asymptotic forms of these two bounds and the Singleton bound. Based on the
asymptotic bounds, we observe that asymptotically Gilbert-Varsharmov bound is
exceeded by MRD codes and sphere-packing bound cannot be attained. We also
establish bounds on the rank covering radius of maximal codes, and show that
all MRD codes are maximal codes and all the MRD codes known so far achieve the
maximum rank covering radius.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2006 20:16:42 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Oct 2006 02:52:32 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610100 | Henry Jerez | Henry N Jerez, Joud Khoury, Chaouki Abdallah | A Mobile Transient Internet Architecture | null | null | null | null | cs.NI cs.IT math.IT | null | This paper describes a new architecture for transient mobile networks
destined to merge existing and future network architectures, communication
implementations and protocol operations by introducing a new paradigm to data
delivery and identification. The main goal of our research is to enable
seamless end-to-end communication between mobile and stationary devices across
multiple networks and through multiple communication environments. The
architecture establishes a set of infrastructure components and protocols that
set the ground for a Persistent Identification Network (PIN). The basis for the
operation of PIN is an identification space consisting of unique location
independent identifiers similar to the ones implemented in the Handle system.
Persistent Identifiers are used to identify and locate Digital Entities which
can include devices, services, users and even traffic. The architecture
establishes a primary connection independent logical structure that can operate
over conventional networks or more advanced peer-to-peer aggregation networks.
Communication is based on routing pools and novel protocols for routing data
across several abstraction levels of the network, regardless of the end-points'
current association and state...
| [
{
"version": "v1",
"created": "Tue, 17 Oct 2006 04:47:06 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Jerez",
"Henry N",
""
],
[
"Khoury",
"Joud",
""
],
[
"Abdallah",
"Chaouki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610101 | Dario Tamascelli | Diego de Falco and Dario Tamascelli | Entropy generation in a model of reversible computation | 13 pages, 6 figures | RAIRO-Inf.Theor.Appl. 40, (2006) 93-105 | 10.1051/ita:2006013 | null | cs.CC quant-ph | null | We present a model in which, due to the quantum nature of the signals
controlling the implementation time of successive unitary computational steps,
\emph{physical} irreversibility appears in the execution of a \emph{logically}
reversible computation.
| [
{
"version": "v1",
"created": "Tue, 17 Oct 2006 08:51:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Falco",
"Diego",
""
],
[
"Tamascelli",
"Dario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0610102 | Arindam Mitra | Arindam Mitra | Quantum communication is possible with pure state | null | null | null | null | cs.IT math.IT | null | It is believed that quantum communication is not possible with a pure
ensemble of states because quantum entropy of pure state is zero. This is
indeed possible due to geometric consequence of entanglement.
| [
{
"version": "v1",
"created": "Tue, 17 Oct 2006 15:42:11 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 15:41:25 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Mar 2008 11:19:34 GMT"
}
] | 2008-03-06T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610103 | Praveen Kumar Gopala | Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal | On the Secrecy Capacity of Fading Channels | 18 pages, 3 figures, Submitted to the IEEE Trans. on Information
Theory | null | null | null | cs.IT math.IT | null | We consider the secure transmission of information over an ergodic fading
channel in the presence of an eavesdropper. Our eavesdropper can be viewed as
the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a
system is characterized under the assumption of asymptotically long coherence
intervals. We first consider the full Channel State Information (CSI) case,
where the transmitter has access to the channel gains of the legitimate
receiver and the eavesdropper. The secrecy capacity under this full CSI
assumption serves as an upper bound for the secrecy capacity when only the CSI
of the legitimate receiver is known at the transmitter, which is characterized
next. In each scenario, the perfect secrecy capacity is obtained along with the
optimal power and rate allocation strategies. We then propose a low-complexity
on/off power allocation strategy that achieves near-optimal performance with
only the main channel CSI. More specifically, this scheme is shown to be
asymptotically optimal as the average SNR goes to infinity, and interestingly,
is shown to attain the secrecy capacity under the full CSI assumption.
Remarkably, our results reveal the positive impact of fading on the secrecy
capacity and establish the critical role of rate adaptation, based on the main
channel CSI, in facilitating secure communications over slow fading channels.
| [
{
"version": "v1",
"created": "Tue, 17 Oct 2006 19:48:47 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gopala",
"Praveen Kumar",
""
],
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610104 | Young-Han Nam | Young-Han Nam, Praveen Kumar Gopala and Hesham El Gamal | ARQ Diversity in Fading Random Access Channels | 24 pages, 6 figures, submitted to IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | null | A cross-layer optimization approach is adopted for the design of symmetric
random access wireless systems. Instead of the traditional collision model, a
more realistic physical layer model is considered. Based on this model, an
Incremental Redundancy Automatic Repeat reQuest (IR-ARQ) scheme, tailored to
jointly combat the effects of collisions, multi-path fading, and additive
noise, is developed. The Diversity-Multiplexing-Delay tradeoff (DMDT) of the
proposed scheme is analyzed for fully-loaded queues, and compared with that of
Gallager tree algorithm for collision resolution and the network-assisted
diversity multiple access (NDMA) protocol of Tsatsanis et al.. The fully-loaded
queue model is then replaced by one with random arrivals, under which these
protocols are compared in terms of the stability region, average delay and
diversity gain. Overall, our analytical and numerical results establish the
superiority of the proposed IR-ARQ scheme and reveal some important insights.
For example, it turns out that the performance is optimized, for a given total
throughput, by maximizing the probability that a certain user sends a new
packet and minimizing the transmission rate employed by each user.
| [
{
"version": "v1",
"created": "Tue, 17 Oct 2006 21:54:12 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Nam",
"Young-Han",
""
],
[
"Gopala",
"Praveen Kumar",
""
],
[
"Gamal",
"Hesham El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610105 | Vitaly Shmatikov | Arvind Narayanan and Vitaly Shmatikov | How To Break Anonymity of the Netflix Prize Dataset | null | null | null | null | cs.CR cs.DB | null | We present a new class of statistical de-anonymization attacks against
high-dimensional micro-data, such as individual preferences, recommendations,
transaction records and so on. Our techniques are robust to perturbation in the
data and tolerate some mistakes in the adversary's background knowledge.
We apply our de-anonymization methodology to the Netflix Prize dataset, which
contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's
largest online movie rental service. We demonstrate that an adversary who knows
only a little bit about an individual subscriber can easily identify this
subscriber's record in the dataset. Using the Internet Movie Database as the
source of background knowledge, we successfully identified the Netflix records
of known users, uncovering their apparent political preferences and other
potentially sensitive information.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 06:03:41 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Nov 2007 05:13:06 GMT"
}
] | 2007-11-22T00:00:00 | [
[
"Narayanan",
"Arvind",
""
],
[
"Shmatikov",
"Vitaly",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0610106 | Praveen Kumar Gopala | Praveen Kumar Gopala, Young-Han Nam and Hesham El Gamal | On the Error Exponents of ARQ Channels with Deadlines | 16 pages, 6 figures, Submitted to the IEEE Trans. on Information
Theory | null | 10.1109/TIT.2007.907431 | null | cs.IT math.IT | null | We consider communication over Automatic Repeat reQuest (ARQ) memoryless
channels with deadlines. In particular, an upper bound L is imposed on the
maximum number of ARQ transmission rounds. In this setup, it is shown that
incremental redundancy ARQ outperforms Forney's memoryless decoding in terms of
the achievable error exponents.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 04:31:03 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gopala",
"Praveen Kumar",
""
],
[
"Nam",
"Young-Han",
""
],
[
"Gamal",
"Hesham El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610107 | Jinhua Jiang | Jinhua Jiang, Yan Xin, and Hari Krishna Garg | Interference Channels with Common Information | 23 pages, 5 figures, submitted to Trans. Inform. Theory | null | null | null | cs.IT math.IT | null | In this paper, we consider the discrete memoryless interference channel with
common information, in which two senders need deliver not only private messages
but also certain common messages to their corresponding receivers. We derive an
achievable rate region for such a channel by exploiting a random coding
strategy, namely cascaded superposition coding. We reveal that the derived
achievable rate region generalizes some important existing results for the
interference channels with or without common information. Furthermore, we
specialize to a class of deterministic interference channels with common
information, and show that the derived achievable rate region is indeed the
capacity region for this class of channels.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 08:58:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Jiang",
"Jinhua",
""
],
[
"Xin",
"Yan",
""
],
[
"Garg",
"Hari Krishna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610108 | Mohand Lagha | Mohand Lagha (AERONAUTIC Department of Blida University, Femto-ST),
Messaoud Bensebti (AERONAUTIC Department of Blida University) | Doppler Spectrum Estimation by Ramanujan Fourier Transforms | null | null | null | null | cs.NA cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Doppler spectrum estimation of a weather radar signal in a classic way
can be made by two methods, temporal one based in the autocorrelation of the
successful signals, whereas the other one uses the estimation of the power
spectral density PSD by using Fourier transforms. We introduces a new tool of
signal processing based on Ramanujan sums cq(n), adapted to the analysis of
arithmetical sequences with several resonances p/q. These sums are almost
periodic according to time n of resonances and aperiodic according to the order
q of resonances. New results will be supplied by the use of Ramanujan Fourier
Transform (RFT) for the estimation of the Doppler spectrum for the weather
radar signal.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 14:43:45 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Feb 2009 19:24:25 GMT"
}
] | 2009-02-01T00:00:00 | [
[
"Lagha",
"Mohand",
"",
"AERONAUTIC Department of Blida University, Femto-ST"
],
[
"Bensebti",
"Messaoud",
"",
"AERONAUTIC Department of Blida University"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0610109 | Mohamed El Baker Nassar | Mohamed El Baker Nassar (INRIA Lorraine - LORIA), Radu State (INRIA
Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA) | Intrusion detection mechanisms for VoIP applications | null | Dans Third annual VoIP security workshop (VSW'06) (2006) | null | null | cs.NI | null | VoIP applications are emerging today as an important component in business
and communication industry. In this paper, we address the intrusion detection
and prevention in VoIP networks and describe how a conceptual solution based on
the Bayes inference approach can be used to reinforce the existent security
mechanisms. Our approach is based on network monitoring and analyzing of the
VoIP-specific traffic. We give a detailed example on attack detection using the
SIP signaling protocol.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 16:44:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nassar",
"Mohamed El Baker",
"",
"INRIA Lorraine - LORIA"
],
[
"State",
"Radu",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Festor",
"Olivier",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610110 | Marc Daumas | Marc Daumas (ELIAUS), David Lester (University of Manchester), Erik
Martin-Dorel (ELIAUS, Lamps), Annick Truffert (LAMPS) | Stochastic Formal Methods for Hybrid Systems | null | null | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a framework to bound the probability that accumulated errors were
never above a given threshold on hybrid systems. Such systems are used for
example to model an aircraft or a nuclear power plant on one side and its
software on the other side. This report contains simple formulas based on
L\'evy's and Markov's inequalities and it presents a formal theory of random
variables with a special focus on producing concrete results. We selected four
very common applications that fit in our framework and cover the common
practices of hybrid systems that evolve for a long time. We compute the number
of bits that remain continuously significant in the first two applications with
a probability of failure around one against a billion, where worst case
analysis considers that no significant bit remains. We are using PVS as such
formal tools force explicit statement of all hypotheses and prevent incorrect
uses of theorems.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 19:57:11 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2006 17:13:53 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Oct 2008 12:29:31 GMT"
},
{
"version": "v4",
"created": "Tue, 24 Feb 2009 13:26:33 GMT"
}
] | 2009-02-24T00:00:00 | [
[
"Daumas",
"Marc",
"",
"ELIAUS"
],
[
"Lester",
"David",
"",
"University of Manchester"
],
[
"Martin-Dorel",
"Erik",
"",
"ELIAUS, Lamps"
],
[
"Truffert",
"Annick",
"",
"LAMPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0610111 | Devavrat Shah | Kyomin Jung and Devavrat Shah | Local approximate inference algorithms | 21 pages, 10 figures | null | null | null | cs.AI | null | We present a new local approximation algorithm for computing Maximum a
Posteriori (MAP) and log-partition function for arbitrary exponential family
distribution represented by a finite-valued pair-wise Markov random field
(MRF), say $G$. Our algorithm is based on decomposition of $G$ into {\em
appropriately} chosen small components; then computing estimates locally in
each of these components and then producing a {\em good} global solution. We
show that if the underlying graph $G$ either excludes some finite-sized graph
as its minor (e.g. Planar graph) or has low doubling dimension (e.g. any graph
with {\em geometry}), then our algorithm will produce solution for both
questions within {\em arbitrary accuracy}. We present a message-passing
implementation of our algorithm for MAP computation using self-avoiding walk of
graph. In order to evaluate the computational cost of this implementation, we
derive novel tight bounds on the size of self-avoiding walk tree for arbitrary
graph.
As a consequence of our algorithmic result, we show that the normalized
log-partition function (also known as free-energy) for a class of {\em regular}
MRFs will converge to a limit, that is computable to an arbitrary accuracy.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 21:51:44 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Feb 2007 13:27:12 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Oct 2007 00:04:51 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"Jung",
"Kyomin",
""
],
[
"Shah",
"Devavrat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610112 | Shengtian Yang | Shengtian Yang, Peiliang Qiu | On the Performance of Lossless Joint Source-Channel Coding Based on
Linear Codes | To appear in Proc. 2006 IEEE Information Theory Workshop, October
22-26, 2006, Chengdu, China. (5 pages, 2 figures) | null | 10.1109/ITW2.2006.323779 | null | cs.IT math.IT | null | A general lossless joint source-channel coding scheme based on linear codes
is proposed and then analyzed in this paper. It is shown that a linear code
with good joint spectrum can be used to establish limit-approaching joint
source-channel coding schemes for arbitrary sources and channels, where the
joint spectrum of the code is a generalization of the input-output weight
distribution.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2006 23:45:00 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Yang",
"Shengtian",
""
],
[
"Qiu",
"Peiliang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610113 | Juan J. Merelo Pr. | A.M. Mora, J.J. Merelo, C. Millan, J. Torrecillas, J.L.J. Laredo | CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit
Path in the Battlefield | null | Published in Proceedings of the Workshop on Nature Inspired
Cooperative Strategies for Optimization. NICSO'2006, Pelta & Krasnogor, (eds)
pp 85-98, Jun. 2006 | null | null | cs.MA cs.CC | null | In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO)
algorithm called CHAC, which has been designed to solve the problem of finding
the path on a map (corresponding to a simulated battlefield) that minimizes
resources while maximizing safety. CHAC has been tested with two different
state transition rules: an aggregative function that combines the heuristic and
pheromone information of both objectives and a second one that is based on the
dominance concept of multiobjective optimization problems. These rules have
been evaluated in several different situations (maps with different degree of
difficulty), and we have found that they yield better results than a greedy
algorithm (taken as baseline) in addition to a military behaviour that is also
better in the tactical sense. The aggregative function, in general, yields
better results than the one based on dominance.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 10:41:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mora",
"A. M.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Millan",
"C.",
""
],
[
"Torrecillas",
"J.",
""
],
[
"Laredo",
"J. L. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0610114 | Hans-Rudolf Thomann | Hans-Rudolf Thomann | Instant Computing - A New Computation Paradigm | Final version, 34 pages. Theorem 3 generalized and strengthened.
Review results implemented. Typos corrected | null | null | null | cs.CC cs.CR quant-ph | null | Voltage peaks on a conventional computer's power lines allow for the
well-known dangerous DPA attacks. We show that measurement of a quantum
computer's transient state during a computational step reveals information
about a complete computation of arbitrary length, which can be extracted by
repeated probing, if the computer is suitably programmed. Instant computing, as
we name this mode of operation, recognizes for any total or partial recursive
function arguments lying in the domain of definition and yields their function
value with arbitrary small error probability in probabilistic linear time. This
implies recognition of (not necessarily recursively enumerable) complements of
recursively enumerable sets and the solution of the halting problem. Future
quantum computers are shown to be likely to allow for instant computing, and
some consequences are pointed out.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 14:11:38 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jan 2008 09:14:29 GMT"
},
{
"version": "v3",
"created": "Sat, 12 Jan 2008 11:12:40 GMT"
}
] | 2008-01-12T00:00:00 | [
[
"Thomann",
"Hans-Rudolf",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0610115 | Xiaohu Shang | Xiaohu Shang, Biao Chen | An Achievable Rate Region for the Gaussian Interference Channel | 15 pages, 6 figures, submitted to IEEE Trans. Inform. Theory; This
paper has been withdrawn by the authors because the content will be
completely covered by another paper that the authors will submit soon | null | null | null | cs.IT math.IT | null | An achievable rate region for the Gaussian interference channel is derived
using Sato's modified frequency division multiplexing idea and a special case
of Han and Kobayashi's rate region (denoted by $\Gmat^\prime$). We show that
the new inner bound includes $\Gmat^\prime$, Sason's rate region $\Dmat$, as
well as the achievable region via TDM/FDM, as its subsets. The advantage of
this improved inner bound over $\Gmat^\prime$ arises due to its inherent
ability to utilize the whole transmit power range on the real line without
violating the power constraint. We also provide analysis to examine the
conditions for the new achievable region to strictly extend $\Gmat^\prime$.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 16:29:05 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Sep 2007 16:52:41 GMT"
}
] | 2007-09-28T00:00:00 | [
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610116 | Tuomo Kakkonen | Tuomo Kakkonen | DepAnn - An Annotation Tool for Dependency Treebanks | null | Proceedings of the 11th ESSLLI Student Session at the 18th
European Summer School in Logic, Language and Information (ESSLLI 2006), pp.
214-225. Malaga, Spain, 2006 | null | null | cs.CL | null | DepAnn is an interactive annotation tool for dependency treebanks, providing
both graphical and text-based annotation interfaces. The tool is aimed for
semi-automatic creation of treebanks. It aids the manual inspection and
correction of automatically created parses, making the annotation process
faster and less error-prone. A novel feature of the tool is that it enables the
user to view outputs from several parsers as the basis for creating the final
tree to be saved to the treebank. DepAnn uses TIGER-XML, an XML-based general
encoding format for both, representing the parser outputs and saving the
annotated treebank. The tool includes an automatic consistency checker for
sentence structures. In addition, the tool enables users to build structures
manually, add comments on the annotations, modify the tagsets, and mark
sentences for further revision.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 17:42:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0610117 | Jeremy Avigad | Jeremy Avigad and Yimu Yin | Quantifier elimination for the reals with a predicate for the powers of
two | null | null | null | null | cs.LO | null | In 1985, van den Dries showed that the theory of the reals with a predicate
for the integer powers of two admits quantifier elimination in an expanded
language, and is hence decidable. He gave a model-theoretic argument, which
provides no apparent bounds on the complexity of a decision procedure. We
provide a syntactic argument that yields a procedure that is primitive
recursive, although not elementary. In particular, we show that it is possible
to eliminate a single block of existential quantifiers in time $2^0_{O(n)}$,
where $n$ is the length of the input formula and $2_k^x$ denotes $k$-fold
iterated exponentiation.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 17:39:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Yin",
"Yimu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610118 | Tuomo Kakkonen | Tuomo Kakkonen, Niko Myller, Erkki Sutinen | Applying Part-of-Seech Enhanced LSA to Automatic Essay Grading | null | Proceedings of the 4th IEEE International Conference on
Information Technology: Research and Education (ITRE 2006). Tel Aviv, Israel,
2006 | null | null | cs.IR cs.CL | null | Latent Semantic Analysis (LSA) is a widely used Information Retrieval method
based on "bag-of-words" assumption. However, according to general conception,
syntax plays a role in representing meaning of sentences. Thus, enhancing LSA
with part-of-speech (POS) information to capture the context of word
occurrences appears to be theoretically feasible extension. The approach is
tested empirically on a automatic essay grading system using LSA for document
similarity comparisons. A comparison on several POS-enhanced LSA models is
reported. Our findings show that the addition of contextual information in the
form of POS tags can raise the accuracy of the LSA-based scoring models up to
10.77 per cent.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 17:50:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
],
[
"Myller",
"Niko",
""
],
[
"Sutinen",
"Erkki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0610119 | Elad Hazan | Elad Hazan | Approximate Convex Optimization by Online Game Playing | null | null | null | null | cs.DS | null | Lagrangian relaxation and approximate optimization algorithms have received
much attention in the last two decades. Typically, the running time of these
methods to obtain a $\epsilon$ approximate solution is proportional to
$\frac{1}{\epsilon^2}$. Recently, Bienstock and Iyengar, following Nesterov,
gave an algorithm for fractional packing linear programs which runs in
$\frac{1}{\epsilon}$ iterations. The latter algorithm requires to solve a
convex quadratic program every iteration - an optimization subroutine which
dominates the theoretical running time.
We give an algorithm for convex programs with strictly convex constraints
which runs in time proportional to $\frac{1}{\epsilon}$. The algorithm does NOT
require to solve any quadratic program, but uses gradient steps and elementary
operations only. Problems which have strictly convex constraints include
maximum entropy frequency estimation, portfolio optimization with loss risk
constraints, and various computational problems in signal processing.
As a side product, we also obtain a simpler version of Bienstock and
Iyengar's result for general linear programming, with similar running time.
We derive these algorithms using a new framework for deriving convex
optimization algorithms from online game playing algorithms, which may be of
independent interest.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2006 22:10:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hazan",
"Elad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0610120 | Russell K. Standish | Russell K. Standish and Duraid Madina | Classdesc and Graphcode: support for scientific programming in C++ | null | null | null | null | cs.MS cs.CE cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object-oriented programming languages such as Java and Objective C have
become popular for implementing agent-based and other object-based simulations
since objects in those languages can {\em reflect} (i.e. make runtime queries
of an object's structure). This allows, for example, a fairly trivial {\em
serialisation} routine (conversion of an object into a binary representation
that can be stored or passed over a network) to be written. However C++ does
not offer this ability, as type information is thrown away at compile time. Yet
C++ is often a preferred development environment, whether for performance
reasons or for its expressive features such as operator overloading.
In scientific coding, changes to a model's codes takes place constantly, as
the model is refined, and different phenomena are studied. Yet traditionally,
facilities such as checkpointing, routines for initialising model parameters
and analysis of model output depend on the underlying model remaining static,
otherwise each time a model is modified, a whole slew of supporting routines
needs to be changed to reflect the new data structures. Reflection offers the
advantage of the simulation framework adapting to the underlying model without
programmer intervention, reducing the effort of modifying the model.
In this paper, we present the {\em Classdesc} system which brings many of the
benefits of object reflection to C++, {\em ClassdescMP} which dramatically
simplifies coding of MPI based parallel programs and {\em
Graphcode} a general purpose data parallel programming environment.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 05:11:21 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 2008 10:08:40 GMT"
}
] | 2008-10-22T00:00:00 | [
[
"Standish",
"Russell K.",
""
],
[
"Madina",
"Duraid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0610121 | Ryutaroh Matsumoto | Ryutaroh Matsumoto | Construction algorithm for network error-correcting codes attaining the
Singleton bound | To appear in IEICE Trans. Fundamentals
(http://ietfec.oxfordjournals.org/), vol. E90-A, no. 9, Sept. 2007. LaTeX2e,
7 pages, using ieice.cls and pstricks.sty. Version 4 adds randomized
construction of network error-correcting codes, comparisons of the proposed
methods to the existing methods, additional explanations in the proof | IEICE Trans. Fundamentals, vol. E90-A, no. 9, pp. 1729-1735,
September 2007 | 10.1093/ietfec/e90-a.9.1729 | null | cs.IT cs.DM cs.NI math.IT | null | We give a centralized deterministic algorithm for constructing linear network
error-correcting codes that attain the Singleton bound of network
error-correcting codes. The proposed algorithm is based on the algorithm by
Jaggi et al. We give estimates on the time complexity and the required symbol
size of the proposed algorithm. We also estimate the probability of a random
choice of local encoding vectors by all intermediate nodes giving a network
error-correcting codes attaining the Singleton bound. We also clarify the
relationship between the robust network coding and the network error-correcting
codes with known locations of errors.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:00:35 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Nov 2006 07:36:43 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Dec 2006 05:28:23 GMT"
},
{
"version": "v4",
"created": "Wed, 9 May 2007 09:07:01 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"Matsumoto",
"Ryutaroh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610122 | Philippe Langlois | Philippe Langlois (LP2A-DALI), Nicolas Louvet (LP2A-DALI) | Faithful Polynomial Evaluation with Compensated Horner Algorithm | null | null | null | null | cs.NA cs.MS | null | This paper presents two sufficient conditions to ensure a faithful evaluation
of polynomial in IEEE-754 floating point arithmetic. Faithfulness means that
the computed value is one of the two floating point neighbours of the exact
result; it can be satisfied using a more accurate algorithm than the classic
Horner scheme. One condition here provided is an apriori bound of the
polynomial condition number derived from the error analysis of the compensated
Horner algorithm. The second condition is both dynamic and validated to check
at the running time the faithfulness of a given evaluation. Numerical
experiments illustrate the behavior of these two conditions and that associated
running time over-cost is really interesting.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:22:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Langlois",
"Philippe",
"",
"LP2A-DALI"
],
[
"Louvet",
"Nicolas",
"",
"LP2A-DALI"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0610123 | Lutz Strassburger | Lutz Strassburger (INRIA Futurs) | Proof Nets and the Identity of Proofs | null | null | null | null | cs.LO | null | These are the notes for a 5-lecture-course given at ESSLLI 2006 in Malaga,
Spain. The URL of the school is http://esslli2006.lcc.uma.es/ . This version
slightly differs from the one which has been distributed at the school because
typos have been removed and comments and suggestions by students have been
worked in. The course is intended to be introductory. That means no prior
knowledge of proof nets is required. However, the student should be familiar
with the basics of propositional logic, and should have seen formal proofs in
some formal deductive system (e.g., sequent calculus, natural deduction,
resolution, tableaux, calculus of structures, Frege-Hilbert-systems, ...). It
is probably helpful if the student knows already what cut elimination is, but
this is not strictly necessary. In these notes, I will introduce the concept of
``proof nets'' from the viewpoint of the problem of the identity of proofs. I
will proceed in a rather informal way. The focus will be more on presenting
ideas than on presenting technical details. The goal of the course is to give
the student an overview of the theory of proof nets and make the vast amount of
literature on the topic easier accessible to the beginner. For introducing the
basic concepts of the theory, I will in the first part of the course stick to
the unit-free multiplicative fragment of linear logic because of its rather
simple notion of proof nets. In the second part of the course we will see proof
nets for more sophisticated logics. This is a basic introduction into proof
nets from the perspective of the identity of proofs. We discuss how deductive
proofs can be translated into proof nets and what a correctness criterion is.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:35:05 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Nov 2006 14:41:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Strassburger",
"Lutz",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610124 | Tuomo Kakkonen | Tuomo Kakkonen | Dependency Treebanks: Methods, Annotation Schemes and Tools | null | Proceedings of the 15th Nordic Conference of Computational
Linguistics (NODALIDA 2005), pp. 94-104. Joensuu, Finland, 2005 | null | null | cs.CL | null | In this paper, current dependencybased treebanks are introduced and analyzed.
The methods used for building the resources, the annotation schemes applied,
and the tools used (such as POS taggers, parsers and annotation software) are
discussed.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 11:48:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0610125 | Radoslaw Hofman | Radoslaw Hofman | Report on article: P=NP Linear programming formulation of the Traveling
Salesman Problem | This version contain more figures, and clearer way to explain counter
example idea for k dimensions | null | null | null | cs.CC cs.DM cs.DS | null | This article presents counter examples for three articles claiming that P=NP.
Articles for which it applies are: Moustapha Diaby "P = NP: Linear programming
formulation of the traveling salesman problem" and "Equality of complexity
classes P and NP: Linear programming formulation of the quadratic assignment
problem", and also Sergey Gubin "A Polynomial Time Algorithm for The Traveling
Salesman Problem"
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 14:01:22 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Oct 2006 13:41:20 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Oct 2006 12:00:02 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Nov 2006 11:19:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hofman",
"Radoslaw",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.