id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0610126 | Marcus Hutter | Marcus Hutter and Shane Legg | Fitness Uniform Optimization | 25 double-column pages, 12 figures | IEEE Transactions on Evolutionary Computation, 10:5 (2006) 568-589 | 10.1109/TEVC.2005.863127 | IDSIA-16-06 | cs.NE cs.LG | null | In evolutionary algorithms, the fitness of a population increases with time
by mutating and recombining individuals and by a biased selection of more fit
individuals. The right selection pressure is critical in ensuring sufficient
optimization progress on the one hand and in preserving genetic diversity to be
able to escape from local optima on the other hand. Motivated by a universal
similarity relation on the individuals, we propose a new selection scheme,
which is uniform in the fitness values. It generates selection pressure toward
sparsely populated fitness regions, not necessarily toward higher fitness, as
is the case for all other selection schemes. We show analytically on a simple
example that the new selection scheme can be much more effective than standard
selection schemes. We also propose a new deletion scheme which achieves a
similar result via deletion and show how such a scheme preserves genetic
diversity more effectively than standard approaches. We compare the performance
of the new schemes to tournament selection and random deletion on an artificial
deceptive problem and a range of NP-hard problems: traveling salesman, set
covering and satisfiability.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 16:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
],
[
"Legg",
"Shane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0610127 | Serban Vlad E. | Serban E. Vlad | The intersection and the union of the asynchronous systems | The 14-th Conference on Applied and Industrial Mathematics CAIM 2006,
Satellite Conference of ICM2006, Chisinau, Moldova, August 17-19, 2006 | null | null | null | cs.GL | null | The asynchronous systems $f$ are the models of the asynchronous circuits from
digital electrical engineering. They are multi-valued functions that associate
to each input $u:\mathbf{R}\to \{0,1\}^{m}$ a set of states $x\in f(u),$ where
$x:\mathbf{R}\to \{0,1\}^{n}.$ The intersection of the systems allows adding
supplementary conditions in modeling and the union of the systems allows
considering the validity of one of two systems in modeling, for example when
testing the asynchronous circuits and the circuit is supposed to be 'good' or
'bad'. The purpose of the paper is that of analyzing the intersection and the
union against the initial/final states, initial/final time, initial/final state
functions, subsystems, dual systems, inverse systems, Cartesian product of
systems, parallel connection and serial connection of systems.
| [
{
"version": "v1",
"created": "Fri, 20 Oct 2006 21:33:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0610128 | Daniel Lemire | Daniel Lemire and Owen Kaser | Hierarchical Bin Buffering: Online Local Moments for Dynamic External
Memory Arrays | null | ACM Transactions on Algorithms 4(1): 14 (2008) | 10.1145/1328911.1328925 | null | cs.DS cs.DB | http://creativecommons.org/publicdomain/zero/1.0/ | Local moments are used for local regression, to compute statistical measures
such as sums, averages, and standard deviations, and to approximate probability
distributions. We consider the case where the data source is a very large I/O
array of size n and we want to compute the first N local moments, for some
constant N. Without precomputation, this requires O(n) time. We develop a
sequence of algorithms of increasing sophistication that use precomputation and
additional buffer space to speed up queries. The simpler algorithms partition
the I/O array into consecutive ranges called bins, and they are applicable not
only to local-moment queries, but also to algebraic queries (MAX, AVERAGE, SUM,
etc.). With N buffers of size sqrt{n}, time complexity drops to O(sqrt n). A
more sophisticated approach uses hierarchical buffering and has a logarithmic
time complexity (O(b log_b n)), when using N hierarchical buffers of size n/b.
Using Overlapped Bin Buffering, we show that only a single buffer is needed, as
with wavelet-based algorithms, but using much less storage. Applications exist
in multidimensional and statistical databases over massive data sets,
interactive image processing, and visualization.
| [
{
"version": "v1",
"created": "Sat, 21 Oct 2006 00:30:57 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Aug 2007 15:42:52 GMT"
},
{
"version": "v3",
"created": "Sun, 26 Apr 2020 21:39:09 GMT"
}
] | 2020-04-28T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0610129 | Haluk Bingol | Ismail Gunes, Haluk Bingol | Community Detection in Complex Networks Using Agents | 5 pages | null | null | null | cs.MA cs.CY | null | Community structure identification has been one of the most popular research
areas in recent years due to its applicability to the wide scale of
disciplines. To detect communities in varied topics, there have been many
algorithms proposed so far. However, most of them still have some drawbacks to
be addressed. In this paper, we present an agent-based based community
detection algorithm. The algorithm that is a stochastic one makes use of agents
by forcing them to perform biased moves in a smart way. Using the information
collected by the traverses of these agents in the network, the network
structure is revealed. Also, the network modularity is used for determining the
number of communities. Our algorithm removes the need for prior knowledge about
the network such as number of the communities or any threshold values.
Furthermore, the definite community structure is provided as a result instead
of giving some structures requiring further processes. Besides, the
computational and time costs are optimized because of using thread like working
agents. The algorithm is tested on three network data of different types and
sizes named Zachary karate club, college football and political books. For all
three networks, the real network structures are identified in almost every run.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 06:34:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gunes",
"Ismail",
""
],
[
"Bingol",
"Haluk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0610130 | Evgueni Haroutunian | Evgueni A. Haroutunian (Associate Member, IEEE) | On Bounds for $E$-capacity of DMC | null | null | null | null | cs.IT math.IT | null | Random coding, expurgated and sphere packing bounds are derived by method of
types and method of graph decomposition for $E$-capacity of discrete memoryless
channel (DMC). Three decoding rules are considered, the random coding bound is
attainable by each of the three rules, but the expurgated bound is achievable
only by maximum-likelihood decoding. Sphere packing bound is obtained by very
simple combinatorial reasonings of the method of types. The paper joins and
reviews the results of previous hard achievable publications.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 07:23:01 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Haroutunian",
"Evgueni A.",
"",
"Associate Member, IEEE"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610131 | Frederic Vivien | Loris Marchal (INRIA Rh\^one-Alpes, LIP), Veronika Rehn (INRIA
Rh\^one-Alpes, LIP), Yves Robert (INRIA Rh\^one-Alpes, LIP), Fr\'ed\'eric
Vivien (INRIA Rh\^one-Alpes, LIP) | Scheduling and data redistribution strategies on star platforms | null | null | null | null | cs.DC | null | In this work we are interested in the problem of scheduling and
redistributing data on master-slave platforms. We consider the case were the
workers possess initial loads, some of which having to be redistributed in
order to balance their completion times. We examine two different scenarios.
The first model assumes that the data consists of independent and identical
tasks. We prove the NP-completeness in the strong sense for the general case,
and we present two optimal algorithms for special platform types. Furthermore
we propose three heuristics for the general case. Simulations consolidate the
theoretical results. The second data model is based on Divisible Load Theory.
This problem can be solved in polynomial time by a combination of linear
programming and simple analytical manipulations.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 07:45:01 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Marchal",
"Loris",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Rehn",
"Veronika",
"",
"INRIA\n Rhône-Alpes, LIP"
],
[
"Robert",
"Yves",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Vivien",
"Frédéric",
"",
"INRIA Rhône-Alpes, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0610132 | Kwankyu Lee | Kwankyu Lee, Michael E. O'Sullivan | List Decoding of Hermitian Codes using Groebner Bases | 19 pages, 2 figures | null | null | null | cs.IT cs.SC math.IT | null | List decoding of Hermitian codes is reformulated to allow an efficient and
simple algorithm for the interpolation step. The algorithm is developed using
the theory of Groebner bases of modules. The computational complexity of the
algorithm seems comparable to previously known algorithms achieving the same
task, and the algorithm is better suited for hardware implementation.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 07:52:42 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Lee",
"Kwankyu",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610133 | Thomas Silverston | Thomas Silverston and Olivier Fourmaux | P2P IPTV Measurement: A Comparison Study | 10 pages | null | null | null | cs.NI cs.MM | null | With the success of P2P file sharing, new emerging P2P applications arise on
the Internet for streaming content like voice (VoIP) or live video (IPTV).
Nowadays, there are lots of works measuring P2P file sharing or P2P telephony
systems, but there is still no comprehensive study about P2P IPTV, whereas it
should be massively used in the future. During the last FIFA world cup, we
measured network traffic generated by P2P IPTV applications like PPlive,
PPstream, TVants and Sopcast. In this paper we analyze some of our results
during the same games for the applications. We focus on traffic statistics and
churn of peers within these P2P networks. Our objectives are threefold: we
point out the traffic generated to understand the impact they will have on the
network, we try to infer the mechanisms of such applications and highlight
differences, and we give some insights about the users' behavior.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 13:55:28 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Nov 2006 14:23:31 GMT"
},
{
"version": "v3",
"created": "Mon, 15 Jan 2007 13:34:09 GMT"
},
{
"version": "v4",
"created": "Thu, 19 Apr 2007 13:45:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Silverston",
"Thomas",
""
],
[
"Fourmaux",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0610134 | Richard Clegg Dr | Richard G. Clegg, Maurice Dodson | A Markov Chain based method for generating long-range dependence | 8 pages, 2 figures | Phys. Rev. E 72, 026118 2005 | 10.1103/PhysRevE.72.026118 | null | cs.NI cs.PF math.ST stat.TH | null | This paper describes a model for generating time series which exhibit the
statistical phenomenon known as long-range dependence (LRD). A Markov Modulated
Process based upon an infinite Markov chain is described. The work described is
motivated by applications in telecommunications where LRD is a known property
of time-series measured on the internet. The process can generate a time series
exhibiting LRD with known parameters and is particularly suitable for modelling
internet traffic since the time series is in terms of ones and zeros which can
be interpreted as data packets and inter-packet gaps. The method is extremely
simple computationally and analytically and could prove more tractable than
other methods described in the literature
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 13:54:18 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Clegg",
"Richard G.",
""
],
[
"Dodson",
"Maurice",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0610135 | Richard Clegg Dr | Richard G. Clegg | Markov-modulated on/off processes for long-range dependent internet
traffic | 33 pages, 13 figures. Revised after comments and changed format.
Added diagrams about queue overflow probabilities | null | null | null | cs.NI cs.DM cs.PF math.ST stat.TH | null | The aim of this paper is to use a very simple queuing model to compare a
number of models from the literature which have been used to replicate the
statistical nature of internet traffic and, in particular, the long-range
dependence of this traffic. The four models all have the form of discrete time
Markov-modulated processes (two other models are introduced for comparison
purposes).
While it is often stated that long-range dependence has a critical effect on
queuing performance, it appears that the models used here do not well
replicated the queuing performance of real internet traffic. In particular,
they fail to replicate the mean queue length (and hence the mean delay) and the
probability of the queue length exceeding a given level.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 14:30:15 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Nov 2006 15:09:51 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Dec 2006 13:47:51 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Clegg",
"Richard G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0610136 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK) | Bounds on the coefficients of the characteristic and minimal polynomials | null | Journal of Inequalities in Pure and Applied Mathematics 8, 2
(2007) art. 31, 6pp | null | null | cs.SC | null | This note presents absolute bounds on the size of the coefficients of the
characteristic and minimal polynomials depending on the size of the
coefficients of the associated matrix. Moreover, we present algorithms to
compute more precise input-dependant bounds on these coefficients. Such bounds
are e.g. useful to perform deterministic chinese remaindering of the
characteristic or minimal polynomial of an integer matrix.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 08:24:08 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jan 2007 15:20:52 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Feb 2007 18:41:39 GMT"
},
{
"version": "v4",
"created": "Fri, 21 Sep 2007 07:53:10 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0610137 | Silvano Dal Zilio | Lucia Acciai (LIF), Michele Boreale, Silvano Dal Zilio (LIF) | A Concurrent Calculus with Atomic Transactions | 29 pages | null | null | null | cs.LO cs.DC | null | The Software Transactional Memory (STM) model is an original approach for
controlling concurrent accesses to ressources without the need for explicit
lock-based synchronization mechanisms. A key feature of STM is to provide a way
to group sequences of read and write actions inside atomic blocks, similar to
database transactions, whose whole effect should occur atomically. In this
paper, we investigate STM from a process algebra perspective and define an
extension of asynchronous CCS with atomic blocks of actions. Our goal is not
only to set a formal ground for reasoning on STM implementations but also to
understand how this model fits with other concurrency control mechanisms. We
also view this calculus as a test bed for extending process calculi with atomic
transactions. This is an interesting direction for investigation since, for the
most part, actual works that mix transactions with process calculi consider
compensating transactions, a model that lacks all the well-known ACID
properties. We show that the addition of atomic transactions results in a very
expressive calculus, enough to easily encode other concurrent primitives such
as guarded choice and multiset-synchronization (\`{a} la join-calculus). The
correctness of our encodings is proved using a suitable notion of bisimulation
equivalence. The equivalence is then applied to prove interesting ``laws of
transactions'' and to obtain a simple normal form for transactions.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 08:26:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Acciai",
"Lucia",
"",
"LIF"
],
[
"Boreale",
"Michele",
"",
"LIF"
],
[
"Zilio",
"Silvano Dal",
"",
"LIF"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0610138 | Anant Sahai | Anant Sahai | Why block length and delay behave differently if feedback is present | 42 pages, 22 figures | null | null | null | cs.IT math.IT | null | For output-symmetric DMCs at even moderately high rates, fixed-block-length
communication systems show no improvements in their error exponents with
feedback. In this paper, we study systems with fixed end-to-end delay and show
that feedback generally provides dramatic gains in the error exponents.
A new upper bound (the uncertainty-focusing bound) is given on the
probability of symbol error in a fixed-delay communication system with
feedback. This bound turns out to have a similar form to Viterbi's bound used
for the block error probability of convolutional codes as a function of the
fixed constraint length. The uncertainty-focusing bound is shown to be
asymptotically achievable with noiseless feedback for erasure channels as well
as any output-symmetric DMC that has strictly positive zero-error capacity.
Furthermore, it can be achieved in a delay-universal (anytime) fashion even if
the feedback itself is delayed by a small amount. Finally, it is shown that for
end-to-end delay, it is generally possible at high rates to beat the
sphere-packing bound for general DMCs -- thereby providing a counterexample to
a conjecture of Pinsker.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 13:28:14 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 03:51:29 GMT"
}
] | 2007-12-06T00:00:00 | [
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610139 | Anant Sahai | Anant Sahai | How to beat the sphere-packing bound with feedback | 9 pages, 3 figures, corrected typos and increased font size.
Submitted to IT Transactions | null | null | null | cs.IT math.IT | null | The sphere-packing bound $E_{sp}(R)$ bounds the reliability function for
fixed-length block-codes. For symmetric channels, it remains a valid bound even
when strictly causal noiseless feedback is allowed from the decoder to the
encoder. To beat the bound, the problem must be changed. While it has long been
known that variable-length block codes can do better when trading-off error
probability with expected block-length, this correspondence shows that the {\em
fixed-delay} setting also presents such an opportunity for generic channels.
While $E_{sp}(R)$ continues to bound the tradeoff between bit error and fixed
end-to-end latency for symmetric channels used {\em without} feedback, a new
bound called the ``focusing bound'' gives the limits on what can be done with
feedback. If low-rate reliable flow-control is free (ie. the noisy channel has
strictly positive zero-error capacity), then the focusing bound can be
asymptotically achieved. Even when the channel has no zero-error capacity, it
is possible to substantially beat the sphere-packing bound by synthesizing an
appropriately reliable channel to carry the flow-control information.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 14:10:09 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Oct 2006 16:10:37 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610140 | Leonid Makarov | Leonid Makarov and Peter Komarov | Constant for associative patterns ensemble | 6 pages | null | null | null | cs.AI | null | Creation procedure of associative patterns ensemble in terms of formal logic
with using neural net-work (NN) model is formulated. It is shown that the
associative patterns set is created by means of unique procedure of NN work
which having individual parameters of entrance stimulus transformation. It is
ascer-tained that the quantity of the selected associative patterns possesses
is a constant.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 16:27:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Makarov",
"Leonid",
""
],
[
"Komarov",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610141 | Anant Sahai | Anant Sahai | Stabilization using both noisy and noiseless feedback | 9 pages, 5 figures, originally presented at MTNS 06 | null | null | null | cs.IT math.IT | null | When designing a distributed control system, the system designer has a choice
in how to connect the different units through communication channels. In
practice, noiseless and noisy channels may coexist. Using the standard toy
example of scalar stabilization, this paper shows how a small amount of
noiseless feedback can perform a ``supervisory'' role and thereby boost the
effectiveness of noisy feedback.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 18:32:32 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610142 | Anant Sahai | Mukul Agarwal, Anant Sahai, and Sanjoy Mitter | Coding into a source: a direct inverse Rate-Distortion theorem | 18 pages, 3 figure, orginally presented at Allerton 06 | null | null | null | cs.IT math.IT | null | Shannon proved that if we can transmit bits reliably at rates larger than the
rate distortion function $R(D)$, then we can transmit this source to within a
distortion $D$. We answer the converse question ``If we can transmit a source
to within a distortion $D$, can we transmit bits reliably at rates less than
the rate distortion function?'' in the affirmative. This can be viewed as a
direct converse of the rate distortion theorem.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 18:49:37 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Agarwal",
"Mukul",
""
],
[
"Sahai",
"Anant",
""
],
[
"Mitter",
"Sanjoy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610143 | Anant Sahai | Anant Sahai and Sanjoy Mitter | Source coding and channel requirements for unstable processes | 37 pages, 9 figures. Cleaned up typos and reformatted paper for
increased clarity | null | null | null | cs.IT math.IT | null | Our understanding of information in systems has been based on the foundation
of memoryless processes. Extensions to stable Markov and auto-regressive
processes are classical. Berger proved a source coding theorem for the
marginally unstable Wiener process, but the infinite-horizon exponentially
unstable case has been open since Gray's 1970 paper. There were also no
theorems showing what is needed to communicate such processes across noisy
channels.
In this work, we give a fixed-rate source-coding theorem for the
infinite-horizon problem of coding an exponentially unstable Markov process.
The encoding naturally results in two distinct bitstreams that have
qualitatively different QoS requirements for communicating over a noisy medium.
The first stream captures the information that is accumulating within the
nonstationary process and requires sufficient anytime reliability from the
channel used to communicate the process. The second stream captures the
historical information that dissipates within the process and is essentially
classical. This historical information can also be identified with a natural
stable counterpart to the unstable process. A converse demonstrating the
fundamentally layered nature of unstable sources is given by means of
information-embedding ideas.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 19:00:27 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 04:16:11 GMT"
}
] | 2007-12-06T00:00:00 | [
[
"Sahai",
"Anant",
""
],
[
"Mitter",
"Sanjoy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610144 | Anant Sahai | Cheng Chang, Stark Draper, and Anant Sahai | Lossless coding for distributed streaming sources | 40 pages, 11 figures, submitted to IT Transactions | null | null | null | cs.IT math.IT | null | Distributed source coding is traditionally viewed in the block coding context
-- all the source symbols are known in advance at the encoders. This paper
instead considers a streaming setting in which iid source symbol pairs are
revealed to the separate encoders in real time and need to be reconstructed at
the decoder with some tolerable end-to-end delay using finite rate noiseless
channels. A sequential random binning argument is used to derive a lower bound
on the error exponent with delay and show that both ML decoding and universal
decoding achieve the same positive error exponents inside the traditional
Slepian-Wolf rate region. The error events are different from the block-coding
error events and give rise to slightly different exponents. Because the
sequential random binning scheme is also universal over delays, the resulting
code eventually reconstructs every source symbol correctly with probability 1.
| [
{
"version": "v1",
"created": "Wed, 25 Oct 2006 00:20:55 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chang",
"Cheng",
""
],
[
"Draper",
"Stark",
""
],
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610145 | Peter Berlin | Peter Berlin, Baris Nakiboglu, Bixio Rimoldi, Emre Telatar | A Simple Converse of Burnashev's Reliability | 10 pages, 1 figure, updated missing reference | IEEE Transactions on Information Theory, 55(7):3074-3080, July
2009 | 10.1109/TIT.2009.2021322 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a remarkable paper published in 1976, Burnashev determined the reliability
function of variable-length block codes over discrete memoryless channels with
feedback. Subsequently, an alternative achievability proof was obtained by
Yamamoto and Itoh via a particularly simple and instructive scheme. Their idea
is to alternate between a communication and a confirmation phase until the
receiver detects the codeword used by the sender to acknowledge that the
message is correct. We provide a converse that parallels the Yamamoto-Itoh
achievability construction. Besides being simpler than the original, the
proposed converse suggests that a communication and a confirmation phase are
implicit in any scheme for which the probability of error decreases with the
largest possible exponent. The proposed converse also makes it intuitively
clear why the terms that appear in Burnashev's exponent are necessary.
| [
{
"version": "v1",
"created": "Wed, 25 Oct 2006 15:51:01 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 18:58:36 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Sep 2008 19:31:06 GMT"
}
] | 2018-03-20T00:00:00 | [
[
"Berlin",
"Peter",
""
],
[
"Nakiboglu",
"Baris",
""
],
[
"Rimoldi",
"Bixio",
""
],
[
"Telatar",
"Emre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610146 | Anant Sahai | Anant Sahai and Sanjoy Mitter | The necessity and sufficiency of anytime capacity for stabilization of a
linear system over a noisy communication link, Part II: vector systems | 20 pages, 6 figures: significantly shortened and streamlined,
improved example with a better bound | null | null | null | cs.IT math.IT | null | In part I, we reviewed how Shannon's classical notion of capacity is not
sufficient to characterize a noisy communication channel if the channel is
intended to be used as part of a feedback loop to stabilize an unstable scalar
linear system. While classical capacity is not enough, a sense of capacity
(parametrized by reliability) called "anytime capacity" is both necessary and
sufficient for channel evaluation in this context. The rate required is the log
of the open-loop system gain and the required reliability comes from the
desired sense of stability. Sufficiency is maintained even in cases with noisy
observations and without any explicit feedback between the observer and the
controller. This established the asymptotic equivalence between scalar
stabilization problems and delay-universal communication problems with
feedback.
Here in part II, the vector-state generalizations are established and it is
the magnitudes of the unstable eigenvalues that play an essential role. To deal
with such systems, the concept of the anytime rate-region is introduced. This
is the region of rates that the channel can support while still meeting
potentially different anytime reliability targets for parallel message streams.
All the scalar results generalize on an eigenvalue by eigenvalue basis. When
there is no explicit feedback of the noisy channel outputs, the intrinsic delay
of the unstable system tells us what the feedback delay needs to be while
evaluating the anytime-rate-region for the channel. An example involving a
binary erasure channel is used to illustrate how differentiated service is
required in any separation-based control architecture.
| [
{
"version": "v1",
"created": "Wed, 25 Oct 2006 21:51:26 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 04:22:13 GMT"
}
] | 2007-12-06T00:00:00 | [
[
"Sahai",
"Anant",
""
],
[
"Mitter",
"Sanjoy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610147 | Kun-Hong Liu | Kun-hong Liu, Yong Xu, De-shuang Huang, Min Cheng | Grooming of Dynamic Traffic in WDM Star and Tree Networks Using Genetic
Algorithm | 15 pages | Photonic Network Communications,Volume 15, Number 2, 2008 | 10.1007/s11107-007-0103-0 | null | cs.NI | null | The advances in WDM technology lead to the great interest in traffic grooming
problems. As traffic often changes from time to time, the problem of grooming
dynamic traffic is of great practical value. In this paper, we discuss dynamic
grooming of traffic in star and tree networks. A genetic algorithm (GA) based
approach is proposed to support arbitrary dynamic traffic patterns, which
minimizes the number of ADM's and wavelengths. To evaluate the algorithm,
tighter bounds are derived. Computer simulation results show that our algorithm
is efficient in reducing both the numbers of ADM's and wavelengths in tree and
star networks.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 02:56:54 GMT"
}
] | 2008-04-20T00:00:00 | [
[
"Liu",
"Kun-hong",
""
],
[
"Xu",
"Yong",
""
],
[
"Huang",
"De-shuang",
""
],
[
"Cheng",
"Min",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610148 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Decoder Error Probability of MRD Codes | 6 pages, 2 figures. Presented at ITW 2006, Chengdu, China | null | null | null | cs.IT math.IT | null | In this paper, we first introduce the concept of elementary linear subspace,
which has similar properties to those of a set of coordinates. Using this new
concept, we derive properties of maximum rank distance (MRD) codes that
parallel those of maximum distance separable (MDS) codes. Using these
properties, we show that the decoder error probability of MRD codes with error
correction capability t decreases exponentially with t^2 based on the
assumption that all errors with the same rank are equally likely. We argue that
the channel based on this assumption is an approximation of a channel corrupted
by crisscross errors.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 03:12:31 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610149 | Anna Frid | A. Frid | Canonical decomposition of catenation of factorial languages | Submitted | null | null | null | cs.LO | null | According to a previous result by S. V. Avgustinovich and the author, each
factorial language admits a unique canonical decomposition to a catenation of
factorial languages. In this paper, we analyze the appearance of the canonical
decomposition of a catenation of two factorial languages whose canonical
decompositions are given.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 06:38:30 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Dec 2006 06:11:17 GMT"
},
{
"version": "v3",
"created": "Wed, 31 Jan 2007 07:56:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Frid",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610150 | Evgueni Haroutunian | Evgueni A. Haroutunian (Associate Member, IEEE) and Parandzem M.
Hakobyan | On LAO Testing of Multiple Hypotheses for Many Independent Objects | null | null | null | null | cs.IT math.IT | null | The problem of many hypotheses logarithmically asymptotically optimal (LAO)
testing for a model consisting of three or more independent objects is solved.
It is supposed that $M$ probability distributions are known and each object
independently of others follows to one of them. The matrix of asymptotic
interdependencies (reliability--reliability functions) of all possible pairs of
the error probability exponents (reliabilities) in optimal testing for this
model is studied.
This problem was introduced (and solved for the case of two objects and two
given probability distributions) by Ahlswede and Haroutunian. The model with
two independent objects with $M$ hypotheses was explored by Haroutunian and
Hakobyan.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 06:42:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Haroutunian",
"Evgueni A.",
"",
"Associate Member, IEEE"
],
[
"Hakobyan",
"Parandzem M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610151 | Anant Sahai | Anant Sahai | Anytime coding on the infinite bandwidth AWGN channel: A sequential
semi-orthogonal optimal code | 12 pages, 6 figures, submitted to IT Transactions | null | null | null | cs.IT math.IT | null | It is well known that orthogonal coding can be used to approach the Shannon
capacity of the power-constrained AWGN channel without a bandwidth constraint.
This correspondence describes a semi-orthogonal variation of pulse position
modulation that is sequential in nature -- bits can be ``streamed across''
without having to buffer up blocks of bits at the transmitter. ML decoding
results in an exponentially small probability of error as a function of
tolerated receiver delay and thus eventually a zero probability of error on
every transmitted bit. In the high-rate regime, a matching upper bound is given
on the delay error exponent. We close with some comments on the case with
feedback and the connections to the capacity per unit cost problem.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 10:01:38 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610152 | Arindam Mitra | Arindam Mitra | An unbreakable cryptosystem for common people | Pdf | null | null | null | cs.CR | null | It has been found that an algorithm can generate true random numbers on
classical computer. The algorithm can be used to generate unbreakable message
PIN (personal identification number) and password.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 14:22:20 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Feb 2007 15:50:29 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Mar 2007 13:16:18 GMT"
},
{
"version": "v4",
"created": "Tue, 21 Aug 2007 15:33:22 GMT"
},
{
"version": "v5",
"created": "Thu, 23 Aug 2007 15:11:14 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0610153 | Michael Stay | Cristian S. Calude and Michael A. Stay | Most Programs Stop Quickly or Never Halt | Shortened abstract and changed format of references to match Adv.
Appl. Math guidelines | null | null | CDMTCS-284 | cs.IT math.IT | null | Since many real-world problems arising in the fields of compiler
optimisation, automated software engineering, formal proof systems, and so
forth are equivalent to the Halting Problem--the most notorious undecidable
problem--there is a growing interest, not only academically, in understanding
the problem better and in providing alternative solutions. Halting computations
can be recognised by simply running them; the main difficulty is to detect
non-halting programs. Our approach is to have the probability space extend over
both space and time and to consider the probability that a random $N$-bit
program has halted by a random time. We postulate an a priori computable
probability distribution on all possible runtimes and we prove that given an
integer k>0, we can effectively compute a time bound T such that the
probability that an N-bit program will eventually halt given that it has not
halted by T is smaller than 2^{-k}. We also show that the set of halting
programs (which is computably enumerable, but not computable) can be written as
a disjoint union of a computable set and a set of effectively vanishing
probability. Finally, we show that ``long'' runtimes are effectively rare. More
formally, the set of times at which an N-bit program can stop after the time
2^{N+constant} has effectively zero density.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 16:27:53 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Dec 2006 07:39:05 GMT"
},
{
"version": "v3",
"created": "Sun, 7 Jan 2007 01:07:05 GMT"
},
{
"version": "v4",
"created": "Fri, 26 Jan 2007 20:39:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Calude",
"Cristian S.",
""
],
[
"Stay",
"Michael A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610154 | Johan Bollen | Johan Bollen and Herbert Van de Sompel | Usage Impact Factor: the effects of sample characteristics on
usage-based impact metrics | 13 pages, 7 figures | Journal of the American Society for Information Science and
Technology, 59(1), 2008 | null | null | cs.DL | null | There exist ample demonstrations that indicators of scholarly impact
analogous to the citation-based ISI Impact Factor can be derived from usage
data. However, contrary to the ISI IF which is based on citation data generated
by the global community of scholarly authors, so far usage can only be
practically recorded at a local level leading to community-specific assessments
of scholarly impact that are difficult to generalize to the global scholarly
community. We define a journal Usage Impact Factor which mimics the definition
of the Thomson Scientific's ISI Impact Factor. Usage Impact Factor rankings are
calculated on the basis of a large-scale usage data set recorded for the
California State University system from 2003 to 2005. The resulting journal
rankings are then compared to Thomson Scientific's ISI Impact Factor which is
used as a baseline indicator of general impact. Our results indicate that
impact as derived from California State University usage reflects the
particular scientific and demographic characteristics of its communities.
| [
{
"version": "v1",
"created": "Thu, 26 Oct 2006 16:39:53 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Oct 2006 20:04:35 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0610155 | Ping Li | Ping Li, Trevor J. Hastie, Kenneth W. Church | Nonlinear Estimators and Tail Bounds for Dimension Reduction in $l_1$
Using Cauchy Random Projections | null | null | null | null | cs.DS cs.IR cs.LG | null | For dimension reduction in $l_1$, the method of {\em Cauchy random
projections} multiplies the original data matrix $\mathbf{A}
\in\mathbb{R}^{n\times D}$ with a random matrix $\mathbf{R} \in
\mathbb{R}^{D\times k}$ ($k\ll\min(n,D)$) whose entries are i.i.d. samples of
the standard Cauchy C(0,1). Because of the impossibility results, one can not
hope to recover the pairwise $l_1$ distances in $\mathbf{A}$ from $\mathbf{B} =
\mathbf{AR} \in \mathbb{R}^{n\times k}$, using linear estimators without
incurring large errors. However, nonlinear estimators are still useful for
certain applications in data stream computation, information retrieval,
learning, and data mining.
We propose three types of nonlinear estimators: the bias-corrected sample
median estimator, the bias-corrected geometric mean estimator, and the
bias-corrected maximum likelihood estimator. The sample median estimator and
the geometric mean estimator are asymptotically (as $k\to \infty$) equivalent
but the latter is more accurate at small $k$. We derive explicit tail bounds
for the geometric mean estimator and establish an analog of the
Johnson-Lindenstrauss (JL) lemma for dimension reduction in $l_1$, which is
weaker than the classical JL lemma for dimension reduction in $l_2$.
Asymptotically, both the sample median estimator and the geometric mean
estimators are about 80% efficient compared to the maximum likelihood estimator
(MLE). We analyze the moments of the MLE and propose approximating the
distribution of the MLE by an inverse Gaussian.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 07:08:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Ping",
""
],
[
"Hastie",
"Trevor J.",
""
],
[
"Church",
"Kenneth W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0610156 | Fadi Badra | Mathieu D'Aquin (INRIA Lorraine - LORIA, KMI), Fadi Badra (INRIA
Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber
(INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo
Szathmary (INRIA Lorraine - LORIA) | Adaptation Knowledge Discovery from a Case Base | null | Proceedings of the 17th European Conference on Artificial
Intelligence (ECAI-06), Trento G. Brewka (Ed.) (2006) 795--796 | null | null | cs.AI | null | In case-based reasoning, the adaptation step depends in general on
domain-dependent knowledge, which motivates studies on adaptation knowledge
acquisition (AKA). CABAMAKA is an AKA system based on principles of knowledge
discovery from databases. This system explores the variations within the case
base to elicit adaptation knowledge. It has been successfully tested in an
application of case-based decision support to breast cancer treatment.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 10:08:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"D'Aquin",
"Mathieu",
"",
"INRIA Lorraine - LORIA, KMI"
],
[
"Badra",
"Fadi",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Lafrogne",
"Sandrine",
"",
"INRIA Lorraine - LORIA"
],
[
"Lieber",
"Jean",
"",
"INRIA Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
],
[
"Szathmary",
"Laszlo",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610157 | Kun-Hong Liu | Kun-hong Liu, Yong Xu, De-Shuang Huang | A Genetic Algorithm Approach to the Grooming of Dynamic Traffic in Tree
and Star Networks with Bifurcation | 16 pages; Guangxi, Guilin, Proceeding of the 10th International
Conference on Intelligent Technologies, pp. 524-533 | null | null | null | cs.NI | null | Traffic grooming is widely employed to reduce the number of ADM's and
wavelengths. We consider the problem of grooming of dynamic traffic in WDM tree
and star networks in this paper. To achieve better results, we used the
bifurcation techniques to the grooming of arbitrary dynamic traffic in a
strictly non-blocking manner in networks. Three splitting methods, including
Traffic-Cutting, Traffic-Dividing and Synthesized-Splitting were proposed. A
genetic algorithm (GA) approach based on these methods was proposed to tackle
such grooming problems in tree and star networks. The performance of these
algorithms was tested under different conditions in star and tree networks.
Computer simulation results showed that our algorithm is efficient in reducing
both the numbers of ADM's and wavelengths.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 12:05:21 GMT"
}
] | 2010-03-05T00:00:00 | [
[
"Liu",
"Kun-hong",
""
],
[
"Xu",
"Yong",
""
],
[
"Huang",
"De-Shuang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0610158 | Babajide Afolabi | Babajide Afolabi (LORIA), Odile Thiery (LORIA) | Considering users' behaviours in improving the responses of an
information base | null | Dans I International Conference on Multidisciplinary Information
Sciences and Technologies (2006) | null | null | cs.LG cs.IR | null | In this paper, our aim is to propose a model that helps in the efficient use
of an information system by users, within the organization represented by the
IS, in order to resolve their decisional problems. In other words we want to
aid the user within an organization in obtaining the information that
corresponds to his needs (informational needs that result from his decisional
problems). This type of information system is what we refer to as economic
intelligence system because of its support for economic intelligence processes
of the organisation. Our assumption is that every EI process begins with the
identification of the decisional problem which is translated into an
informational need. This need is then translated into one or many information
search problems (ISP). We also assumed that an ISP is expressed in terms of the
user's expectations and that these expectations determine the activities or the
behaviors of the user, when he/she uses an IS. The model we are proposing is
used for the conception of the IS so that the process of retrieving of
solution(s) or the responses given by the system to an ISP is based on these
behaviours and correspond to the needs of the user.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 16:02:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Afolabi",
"Babajide",
"",
"LORIA"
],
[
"Thiery",
"Odile",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0610159 | Vaneet Aggarwal | Vaneet Aggarwal, A. Robert Calderbank | Boolean Functions, Projection Operators and Quantum Error Correcting
Codes | Submitted to IEEE Transactions on Information Theory, October 2006,
to appear in IEEE Transactions on Information Theory, 2008 | IEEE Trans. Inf. Theory, vol. 54, no. 4, pp.1700-1707, Apr. 2008. | 10.1109/TIT.2008.917720 | null | cs.IT math.IT quant-ph | null | This paper describes a fundamental correspondence between Boolean functions
and projection operators in Hilbert space. The correspondence is widely
applicable, and it is used in this paper to provide a common mathematical
framework for the design of both additive and non-additive quantum error
correcting codes. The new framework leads to the construction of a variety of
codes including an infinite class of codes that extend the original ((5,6,2))
code found by Rains [21]. It also extends to operator quantum error correcting
codes.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2006 16:50:41 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2007 20:58:22 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Sep 2007 13:20:15 GMT"
}
] | 2009-04-14T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Calderbank",
"A. Robert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0610160 | G.Susinder Rajan | G. Susinder Rajan, B. Sundar Rajan | A Non-Orthogonal Distributed Space-Time Coded Protocol Part II-Code
Construction and DM-G Tradeoff | Proceedings 2006 IEEE Information Theory Workshop, Chengdu, China (5
pages, No figures) | Proceedings of IEEE ITW'06, Chengdu, China, October 22-26, 2006,
pp. 488-492 | null | null | cs.IT math.IT | null | This is the second part of a two-part series of papers. In this paper, for
the generalized non-orthogonal amplify and forward (GNAF) protocol presented in
Part-I, a construction of a new family of distributed space-time codes based on
Co-ordinate Interleaved Orthogonal Designs (CIOD) which result in reduced
Maximum Likelihood (ML) decoding complexity at the destination is proposed.
Further, it is established that the recently proposed Toeplitz space-time codes
as well as space-time block codes (STBCs) from cyclic division algebras can be
used in GNAF protocol. Finally, a lower bound on the optimal
Diversity-Multiplexing Gain (DM-G) tradeoff for the GNAF protocol is
established and it is shown that this bound approaches the transmit diversity
bound asymptotically as the number of relays and the number of channels uses
increases.
| [
{
"version": "v1",
"created": "Sun, 29 Oct 2006 12:49:49 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610161 | B.Sundar Rajan | G. Susinder Rajan, B. Sundar Rajan | A Non-Orthogonal Distributed Space-Time Coded Protocol Part I: Signal
Model and Design Criteria | 5 pages, 2 figures, Proceedings of 2006 IEEE Information Theory
Workshop (ITW'06), (A typo in equation (1) in the proceedings has been
corrected.) | Proceedings of 2006 IEEE Information Theory Workshop (ITW'06),
Oct. 22-26, 2006, Chengdu, China, pp.385-389 | null | null | cs.IT math.IT | null | In this two-part series of papers, a generalized non-orthogonal amplify and
forward (GNAF) protocol which generalizes several known cooperative diversity
protocols is proposed. Transmission in the GNAF protocol comprises of two
phases - the broadcast phase and the cooperation phase. In the broadcast phase,
the source broadcasts its information to the relays as well as the destination.
In the cooperation phase, the source and the relays together transmit a
space-time code in a distributed fashion. The GNAF protocol relaxes the
constraints imposed by the protocol of Jing and Hassibi on the code structure.
In Part-I of this paper, a code design criteria is obtained and it is shown
that the GNAF protocol is delay efficient and coding gain efficient as well.
Moreover GNAF protocol enables the use of sphere decoders at the destination
with a non-exponential Maximum likelihood (ML) decoding complexity. In Part-II,
several low decoding complexity code constructions are studied and a lower
bound on the Diversity-Multiplexing Gain tradeoff of the GNAF protocol is
obtained.
| [
{
"version": "v1",
"created": "Sun, 29 Oct 2006 13:43:39 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610162 | B.Sundar Rajan | Sanjay Karmakar, B. Sundar Rajan | Multigroup-Decodable STBCs from Clifford Algebras | 5 pages, 1 figure, Proceedings of 2006 IEEE Information Theory
Workshop (ITW 2006) | Proceedings of 2006 IEEE Information Theory Workshop (ITW 2006),
October 22-26, 2006, Chengdu, China, pp.448-452 | null | null | cs.IT math.IT | null | A Space-Time Block Code (STBC) in $K$ symbols (variables) is called $g$-group
decodable STBC if its maximum-likelihood decoding metric can be written as a
sum of $g$ terms such that each term is a function of a subset of the $K$
variables and each variable appears in only one term. In this paper we provide
a general structure of the weight matrices of multi-group decodable codes using
Clifford algebras. Without assuming that the number of variables in each group
to be the same, a method of explicitly constructing the weight matrices of
full-diversity, delay-optimal $g$-group decodable codes is presented for
arbitrary number of antennas. For the special case of $N_t=2^a$ we construct
two subclass of codes: (i) A class of $2a$-group decodable codes with rate
$\frac{a}{2^{(a-1)}}$, which is, equivalently, a class of Single-Symbol
Decodable codes, (ii) A class of $(2a-2)$-group decodable with rate
$\frac{(a-1)}{2^{(a-2)}}$, i.e., a class of Double-Symbol Decodable codes.
Simulation results show that the DSD codes of this paper perform better than
previously known Quasi-Orthogonal Designs.
| [
{
"version": "v1",
"created": "Sun, 29 Oct 2006 23:11:48 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Karmakar",
"Sanjay",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610163 | Rajiv Ranjan Mr. | Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya | A Taxonomy of Peer-to-Peer Based Complex Queries: a Grid perspective | null | null | null | null | cs.NI cs.DC cs.DS | null | Grid superscheduling requires support for efficient and scalable discovery of
resources. Resource discovery activities involve searching for the appropriate
resource types that match the user's job requirements. To accomplish this goal,
a resource discovery system that supports the desired look-up operation is
mandatory. Various kinds of solutions to this problem have been suggested,
including the centralised and hierarchical information server approach.
However, both of these approaches have serious limitations in regards to
scalability, fault-tolerance and network congestion. To overcome these
limitations, organising resource information using Peer-to-Peer (P2P) network
model has been proposed. Existing approaches advocate an extension to
structured P2P protocols, to support the Grid resource information system
(GRIS). In this paper, we identify issues related to the design of such an
efficient, scalable, fault-tolerant, consistent and practical GRIS system using
a P2P network model. We compile these issues into various taxonomies in
sections III and IV. Further, we look into existing works that apply P2P based
network protocols to GRIS. We think that this taxonomy and its mapping to
relevant systems would be useful for academic and industry based researchers
who are engaged in the design of scalable Grid systems.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 08:30:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ranjan",
"Rajiv",
""
],
[
"Harwood",
"Aaron",
""
],
[
"Buyya",
"Rajkumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0610164 | Bageshri Karkare | Bageshri Karkare (Sathe) and Uday Khedker | Complexity of Data Flow Analysis for Non-Separable Frameworks | Published in the International Conference on Programming Languages
and Compilers (PLC) 2006, Las Vegas, U.S.A | null | null | null | cs.PL | null | The complexity of round robin method of intraprocedural data flow analysis is
measured in number of iterations over the control flow graph. Existing
complexity bounds realistically explain the complexity of only Bit-vector
frameworks which are separable. In this paper we define the complexity bounds
for non-separable frameworks by quantifying the interdependences among the data
flow information of program entities using an Entity Dependence Graph.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 08:39:04 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 09:09:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karkare",
"Bageshri",
"",
"Sathe"
],
[
"Khedker",
"Uday",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0610165 | Daowen Qiu | Fuchun Liu, Daowen Qiu, Hongyan Xing, and Zhujun Fan | Decentralized Failure Diagnosis of Stochastic Discrete Event Systems | 25 pages. Comments and criticisms are welcome | IEEE Transactions on Automatic Control, 53 (2) (2008) 535-546. | null | null | cs.AI | null | Recently, the diagnosability of {\it stochastic discrete event systems}
(SDESs) was investigated in the literature, and, the failure diagnosis
considered was {\it centralized}. In this paper, we propose an approach to {\it
decentralized} failure diagnosis of SDESs, where the stochastic system uses
multiple local diagnosers to detect failures and each local diagnoser possesses
its own information. In a way, the centralized failure diagnosis of SDESs can
be viewed as a special case of the decentralized failure diagnosis presented in
this paper with only one projection. The main contributions are as follows: (1)
We formalize the notion of codiagnosability for stochastic automata, which
means that a failure can be detected by at least one local stochastic diagnoser
within a finite delay. (2) We construct a codiagnoser from a given stochastic
automaton with multiple projections, and the codiagnoser associated with the
local diagnosers is used to test codiagnosability condition of SDESs. (3) We
deal with a number of basic properties of the codiagnoser. In particular, a
necessary and sufficient condition for the codiagnosability of SDESs is
presented. (4) We give a computing method in detail to check whether
codiagnosability is violated. And (5) some examples are described to illustrate
the applications of the codiagnosability and its computing method.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 09:59:31 GMT"
}
] | 2010-03-10T00:00:00 | [
[
"Liu",
"Fuchun",
""
],
[
"Qiu",
"Daowen",
""
],
[
"Xing",
"Hongyan",
""
],
[
"Fan",
"Zhujun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610166 | Thierry Cachat | Thierry Cachat (LIAFA) | Tree Automata Make Ordinal Theory Easy | null | Foundations of Software Technology and Theoretical Computer
Science, 26th International Conference, 2006, Proceedings. FSTTCS 2006 (2006)
286-297 | null | null | cs.GT | null | We give a new simple proof of the decidability of the First Order Theory of
(omega^omega^i,+) and the Monadic Second Order Theory of (omega^i,<), improving
the complexity in both cases. Our algorithm is based on tree automata and a new
representation of (sets of) ordinals by (infinite) trees.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 11:05:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cachat",
"Thierry",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0610167 | Adrian Paschke | Adrian Paschke | ECA-RuleML: An Approach combining ECA Rules with temporal interval-based
KR Event/Action Logics and Transactional Update Logics | Republished in Paschke, A.: ECA-RuleML/ECA-LP: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. of Rule Markup
Languages (RuleML'06), Athens, Georgia, USA, 2006 | null | null | IBIS, TUM, Technical Report 11/05 | cs.AI cs.LO cs.MA cs.SE | null | An important problem to be addressed within Event-Driven Architecture (EDA)
is how to correctly and efficiently capture and process the event/action-based
logic. This paper endeavors to bridge the gap between the Knowledge
Representation (KR) approaches based on durable events/actions and such
formalisms as event calculus, on one hand, and event-condition-action (ECA)
reaction rules extending the approach of active databases that view events as
instantaneous occurrences and/or sequences of events, on the other. We propose
formalism based on reaction rules (ECA rules) and a novel interval-based event
logic and present concrete RuleML-based syntax, semantics and implementation.
We further evaluate this approach theoretically, experimentally and on an
example derived from common industry use cases and illustrate its benefits.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 11:56:08 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Nov 2006 06:44:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0610168 | Dele Oluwade PhD | Dele Oluwade | Presentation Theorems for Coded Character Sets | 14 pages, including a page of symbols and a page containing a table | null | null | null | cs.DM | null | The notion of 'presentation', as used in combinatorial group theory, is
applied to coded character sets(CCSs) - sets which facilitate the interchange
of messages in a digital computer network(DCN) . By grouping each element of
the set into two portions and using the idea of group presentation(whereby a
group is specified by its set of generators and its set of relators), the
presentation of a CCS is described. This is illustrated using the Extended
Binary Coded Decimal Interchange Code(EBCDIC) which is one of the most popular
CCSs in DCNs.
Key words: Group presentation, coded character set, digital computer network
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 16:03:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Oluwade",
"Dele",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0610169 | Alireza Bayesteh | Alireza Bayesteh and Amir Keyvan Khandani | On the User Selection for MIMO Broadcast Channels | 57 pages 5 figures | null | null | Technical Report #2005-16 | cs.IT math.IT | null | In this paper, a downlink communication system, in which a Base Station (BS)
equipped with $M$ antennas communicates with $N$ users each equipped with $K$
receive antennas, is considered. An efficient suboptimum algorithm is proposed
for selecting a set of users in order to maximize the sum-rate throughput of
the system. For the asymptotic case when $N$ tends to infinity, the necessary
and sufficient conditions in order to achieve the maximum sum-rate throughput,
such that the difference between the achievable sum-rate and the maximum value
approaches zero, is derived. The complexity of our algorithm is investigated in
terms of the required amount of feedback from the users to the base station, as
well as the number of searches required for selecting the users. It is shown
that the proposed method is capable of achieving a large portion of the
sum-rate capacity, with a very low complexity.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 16:21:39 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir Keyvan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0610170 | Istvan Szita | Istvan Szita and Andras Lorincz | Low-complexity modular policies: learning to play Pac-Man and a new
framework beyond MDPs | 23 pages | null | null | null | cs.LG cs.AI | null | In this paper we propose a method that learns to play Pac-Man. We define a
set of high-level observation and action modules. Actions are temporally
extended, and multiple action modules may be in effect concurrently. A decision
of the agent is represented as a rule-based policy. For learning, we apply the
cross-entropy method, a recent global optimization algorithm. The learned
policies reached better score than the hand-crafted policy, and neared the
score of average human players. We argue that learning is successful mainly
because (i) the policy space includes the combination of individual actions and
thus it is sufficiently rich, (ii) the search is biased towards low-complexity
policies and low complexity solutions can be found quickly if they exist. Based
on these principles, we formulate a new theoretical framework, which can be
found in the Appendix as supporting material.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2006 16:44:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0610171 | Annalisa Marzuoli | Annalisa Marzuoli and Mario Rasetti | Coupling of quantum angular momenta: an insight into analogic/discrete
and local/global models of computation | 17 pages, 1 figure; Workshop `Natural processes and models of
computation' Bologna (Italy) June 16-18 2005; to appear in Natural Computing | Natural Computing Vol 6, No.2 (2007) 151-168 | 10.1007/s11047-006-9018-4 | null | cs.CC quant-ph | null | In the past few years there has been a tumultuous activity aimed at
introducing novel conceptual schemes for quantum computing. The approach
proposed in (Marzuoli A and Rasetti M 2002, 2005a) relies on the (re)coupling
theory of SU(2) angular momenta and can be viewed as a generalization to
arbitrary values of the spin variables of the usual quantum-circuit model based
on `qubits' and Boolean gates. Computational states belong to
finite-dimensional Hilbert spaces labelled by both discrete and continuous
parameters, and unitary gates may depend on quantum numbers ranging over finite
sets of values as well as continuous (angular) variables. Such a framework is
an ideal playground to discuss discrete (digital) and analogic computational
processes, together with their relationships occuring when a consistent
semiclassical limit takes place on discrete quantum gates. When working with
purely discrete unitary gates, the simulator is naturally modelled as families
of quantum finite states--machines which in turn represent discrete versions of
topological quantum computation models. We argue that our model embodies a sort
of unifying paradigm for computing inspired by Nature and, even more
ambitiously, a universal setting in which suitably encoded quantum symbolic
manipulations of combinatorial, topological and algebraic problems might find
their `natural' computational reference model.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 15:44:08 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Marzuoli",
"Annalisa",
""
],
[
"Rasetti",
"Mario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0610172 | DaoShun Wang | DaoShun Wang, Feng Yi, Xiaobo Li, Ping Luo and Yiqi Dai | On the Analysis and Generalization of Extended Visual Cryptography
Schemes | null | null | null | null | cs.CR | null | An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al.
[3] to protect a binary secret image with meaningful (innocent-looking) shares.
This is implemented by concatenating an extended matrix to each basis matrix.
The minimum size of the extended matrix was obtained from a hypergraph coloring
model and the scheme was designed for binary images only [3]. In this paper, we
give a more concise derivation for this matrix extension for color images.
Furthermore, we present a (k, n) scheme to protect multiple color images with
meaningful shares. This scheme is an extension of the (n, n) VCS for multiple
binary images proposed in Droste scheme [2].
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 03:43:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"DaoShun",
""
],
[
"Yi",
"Feng",
""
],
[
"Li",
"Xiaobo",
""
],
[
"Luo",
"Ping",
""
],
[
"Dai",
"Yiqi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0610173 | Shi Xiao | Shi Xiao and Gaoxi Xiao | On Degree-Based Decentralized Search in Complex Networks | 6 pages, 3 figs, shortly published by ECCS'06 | null | null | null | cs.PF | null | Decentralized search aims to find the target node in a large network by using
only local information. The applications of it include peer-to-peer file
sharing, web search and anything else that requires locating a specific target
in a complex system. In this paper, we examine the degree-based decentralized
search method. Specifically, we evaluate the efficiency of the method in
different cases with different amounts of available local information. In
addition, we propose a simple refinement algorithm for significantly shortening
the length of the route that has been found. Some insights useful for the
future developments of efficient decentralized search schemes have been
achieved.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 10:09:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Xiao",
"Shi",
""
],
[
"Xiao",
"Gaoxi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0610174 | Marko Samer | Marko Samer, Stefan Szeider | A Fixed-Parameter Algorithm for #SAT with Parameter Incidence Treewidth | 9 pages, 1 figure | null | null | null | cs.DS cs.CC cs.LO | null | We present an efficient fixed-parameter algorithm for #SAT parameterized by
the incidence treewidth, i.e., the treewidth of the bipartite graph whose
vertices are the variables and clauses of the given CNF formula; a variable and
a clause are joined by an edge if and only if the variable occurs in the
clause. Our algorithm runs in time O(4^k k l N), where k denotes the incidence
treewidth, l denotes the size of a largest clause, and N denotes the number of
nodes of the tree-decomposition.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 12:58:36 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 20:56:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samer",
"Marko",
""
],
[
"Szeider",
"Stefan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0610175 | Florentin Smarandache | Jean Dezert, Florentin Smarandache | DSmT: A new paradigm shift for information fusion | 11 pages. Presented to Cogis06 International Conference, Paris,
France, 2006 | null | null | null | cs.AI | null | The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been and
still remains of primal importance for the development of reliable information
fusion systems. In this short survey paper, we present the theory of plausible
and paradoxical reasoning, known as DSmT (Dezert-Smarandache Theory) in
literature, developed for dealing with imprecise, uncertain and potentially
highly conflicting sources of information. DSmT is a new paradigm shift for
information fusion and recent publications have shown the interest and the
potential ability of DSmT to solve fusion problems where Dempster's rule used
in Dempster-Shafer Theory (DST) provides counter-intuitive results or fails to
provide useful result at all. This paper is focused on the foundations of DSmT
and on its main rules of combination (classic, hybrid and Proportional Conflict
Redistribution rules). Shafer's model on which is based DST appears as a
particular and specific case of DSm hybrid model which can be easily handled by
DSmT as well. Several simple but illustrative examples are given throughout
this paper to show the interest and the generality of this new theory.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 14:50:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dezert",
"Jean",
""
],
[
"Smarandache",
"Florentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0611001 | Michael Elkin | Michael Elkin | A near-optimal fully dynamic distributed algorithm for maintaining
sparse spanners | null | null | null | null | cs.DS | null | In this paper we devise an extremely efficient fully dynamic distributed
algorithm for maintaining sparse spanners. Our resuls also include the first
fully dynamic centralized algorithm for the problem with non-trivial bounds for
both incremental and decremental update. Finally, we devise a very efficient
streaming algorithm for the problem.
| [
{
"version": "v1",
"created": "Wed, 1 Nov 2006 09:36:20 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Elkin",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0611002 | Sergio Servetto | Sergio D. Servetto (Cornell University) | Lattice Quantization with Side Information: Codes, Asymptotics, and
Applications in Sensor Networks | Final version, to appear in the IEEE Transactions on Information
Theory, in February 2007 (first submission: March 2002) | IEEE Transactions on Information Theory; 53(2):714-731, 2007. | null | null | cs.IT math.IT | null | We consider the problem of rate/distortion with side information available
only at the decoder. For the case of jointly-Gaussian source X and side
information Y, and mean-squared error distortion, Wyner proved in 1976 that the
rate/distortion function for this problem is identical to the conditional
rate/distortion function R_{X|Y}, assuming the side information Y is available
at the encoder. In this paper we construct a structured class of asymptotically
optimal quantizers for this problem: under the assumption of high correlation
between source X and side information Y, we show there exist quantizers within
our class whose performance comes arbitrarily close to Wyner's bound. As an
application illustrating the relevance of the high-correlation asymptotics, we
also explore the use of these quantizers in the context of a problem of data
compression for sensor networks, in a setup involving a large number of devices
collecting highly correlated measurements within a confined area. An important
feature of our formulation is that, although the per-node throughput of the
network tends to zero as network size increases, so does the amount of
information generated by each transmitter. This is a situation likely to be
encountered often in practice, which allows us to cast under new--and more
``optimistic''--light some negative results on the transport capacity of
large-scale wireless networks.
| [
{
"version": "v1",
"created": "Wed, 1 Nov 2006 08:38:14 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611003 | Sergio Servetto | An-swol Hu and Sergio D. Servetto (Cornell University) | A Scalable Protocol for Cooperative Time Synchronization Using Spatial
Averaging | Submitted to the IEEE/ACM Transactions on Networking, October 2006.
See also cs.IT/0503031 | null | null | null | cs.NI cs.IT math.IT | null | Time synchronization is an important aspect of sensor network operation.
However, it is well known that synchronization error accumulates over multiple
hops. This presents a challenge for large-scale, multi-hop sensor networks with
a large number of nodes distributed over wide areas. In this work, we present a
protocol that uses spatial averaging to reduce error accumulation in
large-scale networks. We provide an analysis to quantify the synchronization
improvement achieved using spatial averaging and find that in a basic
cooperative network, the skew and offset variance decrease approximately as
$1/\bar{N}$ where $\bar{N}$ is the number of cooperating nodes. For general
networks, simulation results and a comparison to basic cooperative network
results are used to illustrate the improvement in synchronization performance.
| [
{
"version": "v1",
"created": "Wed, 1 Nov 2006 08:47:12 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hu",
"An-swol",
"",
"Cornell University"
],
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611004 | Lars Birkedal | Lars Birkedal and Rasmus E. M{\o}gelberg and Rasmus Lerchedahl
Petersen | Linear Abadi and Plotkin Logic | null | Logical Methods in Computer Science, Volume 2, Issue 5 (November
3, 2006) lmcs:2233 | 10.2168/LMCS-2(5:2)2006 | null | cs.LO | null | We present a formalization of a version of Abadi and
Plotkin's logic for parametricity for a polymorphic dual
intuitionistic/linear type theory with fixed points, and show, following
Plotkin's suggestions, that it can be used to define a wide collection of
types, including existential types, inductive types, coinductive types and
general recursive types. We show that the recursive types satisfy a universal
property called dinaturality, and we develop reasoning principles for the
constructed types. In the case of recursive types, the reasoning principle is a
mixed induction/coinduction principle, with the curious property that
coinduction holds for general relations, but induction only for a limited
collection of ``admissible'' relations. A similar property was observed in
Pitts' 1995 analysis of recursive types in domain theory. In a future paper we
will develop a category theoretic notion of models of the logic presented here,
and show how the results developed in the logic can be transferred to the
models.
| [
{
"version": "v1",
"created": "Wed, 1 Nov 2006 08:50:11 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Nov 2006 14:09:31 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Nov 2006 08:17:08 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Birkedal",
"Lars",
""
],
[
"Møgelberg",
"Rasmus E.",
""
],
[
"Petersen",
"Rasmus Lerchedahl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0611005 | Alberto Pepe Mr | Alberto Pepe and Joanne Yeomans | Protocols for Scholarly Communication | 8 pages, to appear in Library and Information Systems in Astronomy V | null | null | CERN-OPEN-2006-053 | cs.DL | null | CERN, the European Organization for Nuclear Research, has operated an
institutional preprint repository for more than 10 years. The repository
contains over 850,000 records of which more than 450,000 are full-text OA
preprints, mostly in the field of particle physics, and it is integrated with
the library's holdings of books, conference proceedings, journals and other
grey literature. In order to encourage effective propagation and open access to
scholarly material, CERN is implementing a range of innovative library services
into its document repository: automatic keywording, reference extraction,
collaborative management tools and bibliometric tools. Some of these services,
such as user reviewing and automatic metadata extraction, could make up an
interesting testbed for future publishing solutions and certainly provide an
exciting environment for e-science possibilities. The future protocol for
scientific communication should naturally guide authors towards OA publication
and CERN wants to help reach a full open access publishing environment for the
particle physics community and the related sciences in the next few years.
| [
{
"version": "v1",
"created": "Wed, 1 Nov 2006 18:59:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pepe",
"Alberto",
""
],
[
"Yeomans",
"Joanne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0611006 | Julian Togelius | Julian Togelius and Simon M. Lucas | Evolving controllers for simulated car racing | Won the CEC 2005 Best Student Paper Award | Proceedings of the 2005 Congress on Evolutionary Computation,
pages 1906-1913 | null | null | cs.NE cs.LG cs.RO | null | This paper describes the evolution of controllers for racing a simulated
radio-controlled car around a track, modelled on a real physical track. Five
different controller architectures were compared, based on neural networks,
force fields and action sequences. The controllers use either egocentric (first
person), Newtonian (third person) or no information about the state of the car
(open-loop controller). The only controller that was able to evolve good racing
behaviour was based on a neural network acting on egocentric inputs.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 00:47:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Togelius",
"Julian",
""
],
[
"Lucas",
"Simon M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0611007 | Shi Jin | Shi Jin, Matthew R. McKay, Xiqi Gao, Iain B. Collings | MIMO Multichannel Beamforming: SER and Outage Using New Eigenvalue
Distributions of Complex Noncentral Wishart Matrices | 26 pages, 5 figures, to appear in IEEE Transactions on Communications | null | null | null | cs.IT math.IT | null | This paper analyzes MIMO systems with multichannel beamforming in Ricean
fading. Our results apply to a wide class of multichannel systems which
transmit on the eigenmodes of the MIMO channel. We first present new
closed-form expressions for the marginal ordered eigenvalue distributions of
complex noncentral Wishart matrices. These are used to characterize the
statistics of the signal to noise ratio (SNR) on each eigenmode. Based on this,
we present exact symbol error rate (SER) expressions. We also derive
closed-form expressions for the diversity order, array gain, and outage
probability. We show that the global SER performance is dominated by the
subchannel corresponding to the minimum channel singular value. We also show
that, at low outage levels, the outage probability varies inversely with the
Ricean K-factor for cases where transmission is only on the most dominant
subchannel (i.e. a singlechannel beamforming system). Numerical results are
presented to validate the theoretical analysis.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 03:44:03 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Nov 2006 11:33:13 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Jin",
"Shi",
""
],
[
"McKay",
"Matthew R.",
""
],
[
"Gao",
"Xiqi",
""
],
[
"Collings",
"Iain B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611008 | Radoslaw Hofman | Radoslaw Hofman | Why Linear Programming cannot solve large instances of NP-complete
problems in polynomial time | null | null | null | null | cs.CC cs.DM cs.DS cs.NA | null | This article discusses ability of Linear Programming models to be used as
solvers of NP-complete problems. Integer Linear Programming is known as
NP-complete problem, but non-integer Linear Programming problems can be solved
in polynomial time, what places them in P class. During past three years there
appeared some articles using LP to solve NP-complete problems. This methods use
large number of variables (O(n^9)) solving correctly almost all instances that
can be solved in reasonable time. Can they solve infinitively large instances?
This article gives answer to this question.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 08:40:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hofman",
"Radoslaw",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0611009 | Peter J. Stuckey | Christian Schulte and Peter J. Stuckey | Efficient constraint propagation engines | 45 pages, 1 figure, 14 tables | ACM TOPLAS, 31(1) article 2, 2008 | null | null | cs.AI cs.PL | null | This paper presents a model and implementation techniques for speeding up
constraint propagation. Three fundamental approaches to improving constraint
propagation based on propagators as implementations of constraints are
explored: keeping track of which propagators are at fixpoint, choosing which
propagator to apply next, and how to combine several propagators for the same
constraint. We show how idempotence reasoning and events help track fixpoints
more accurately. We improve these methods by using them dynamically (taking
into account current domains to improve accuracy). We define priority-based
approaches to choosing a next propagator and show that dynamic priorities can
improve propagation. We illustrate that the use of multiple propagators for the
same constraint can be advantageous with priorities, and introduce staged
propagators that combine the effects of multiple propagators with priorities
for greater efficiency.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 09:55:07 GMT"
}
] | 2010-09-03T00:00:00 | [
[
"Schulte",
"Christian",
""
],
[
"Stuckey",
"Peter J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0611010 | Diego Ruano | Diego Ruano | On the structure of generalized toric codes | null | The final version can be found in: Journal of Symbolic
Computation. Volume 44, Issue 5, May 2009, Pages 499-506 | null | null | cs.IT math.IT | null | Toric codes are obtained by evaluating rational functions of a nonsingular
toric variety at the algebraic torus. One can extend toric codes to the so
called generalized toric codes. This extension consists on evaluating elements
of an arbitrary polynomial algebra at the algebraic torus instead of a linear
combination of monomials whose exponents are rational points of a convex
polytope. We study their multicyclic and metric structure, and we use them to
express their dual and to estimate their minimum distance.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 14:18:07 GMT"
}
] | 2010-02-25T00:00:00 | [
[
"Ruano",
"Diego",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611011 | Vladimir Vovk | Alexander Gammerman and Vladimir Vovk | Hedging predictions in machine learning | 24 pages; 9 figures; 2 tables; a version of this paper (with
discussion and rejoinder) is to appear in "The Computer Journal" | Computer Journal, 50:151-177, 2007 | 10.1093/comjnl/bxl065 | On-line Compression Modelling Project (New Series), Working Paper 02 | cs.LG | null | Recent advances in machine learning make it possible to design efficient
prediction algorithms for data sets with huge numbers of parameters. This paper
describes a new technique for "hedging" the predictions output by many such
algorithms, including support vector machines, kernel ridge regression, kernel
nearest neighbours, and by many other state-of-the-art methods. The hedged
predictions for the labels of new objects include quantitative measures of
their own accuracy and reliability. These measures are provably valid under the
assumption of randomness, traditional in machine learning: the objects and
their labels are assumed to be generated independently from the same
probability distribution. In particular, it becomes possible to control (up to
statistical fluctuations) the number of erroneous predictions by selecting a
suitable confidence level. Validity being achieved automatically, the remaining
goal of hedged prediction is efficiency: taking full account of the new
objects' features and other available information to produce as accurate
predictions as possible. This can be done successfully using the powerful
machinery of modern machine learning.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 18:44:49 GMT"
}
] | 2011-11-22T00:00:00 | [
[
"Gammerman",
"Alexander",
""
],
[
"Vovk",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0611012 | Shi Jin | Shi Jin, Matthew R. McKay, Xiqi Gao, Iain B. Collings | Asymptotic SER and Outage Probability of MIMO MRC in Correlated Fading | 10 pages, 2 figures, to appear in IEEE Signal Processing Letters | null | 10.1109/LSP.2006.881512 | null | cs.IT math.IT | null | This letter derives the asymptotic symbol error rate (SER) and outage
probability of multiple-input multiple-output (MIMO) maximum ratio combining
(MRC) systems. We consider Rayleigh fading channels with both transmit and
receive spatial correlation. Our results are based on new asymptotic
expressions which we derive for the p.d.f. and c.d.f. of the maximum eigenvalue
of positive-definite quadratic forms in complex Gaussian matrices. We prove
that spatial correlation does not affect the diversity order, but that it
reduces the array gain and hence increases the SER in the high SNR regime.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 11:26:49 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Jin",
"Shi",
""
],
[
"McKay",
"Matthew R.",
""
],
[
"Gao",
"Xiqi",
""
],
[
"Collings",
"Iain B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611013 | Osvaldo Oliveira Jr. | Osvaldo N. Oliveira Jr., Valtencir Zucolotto, Sandra M. Aluisio | Developing strategies to produce better scientific papers: a Recipe for
non-native users of English | 10 pages, 1 figure | null | null | null | cs.OH | null | In this paper we introduce the AMADEUS strategy, which has been used to
produce scientific writing tools for non-native users of English for 15 years,
and emphasize a learn-by-doing approach through which students and novice
writers can improve their scientific writing. More specifically, we provide a
9-step recipe for the students to compile writing material according to a
procedure that has proven efficient in scientific writing courses.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 14:07:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Oliveira",
"Osvaldo N.",
"Jr."
],
[
"Zucolotto",
"Valtencir",
""
],
[
"Aluisio",
"Sandra M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0611014 | Rainer Luetticke | Erik Braun, Rainer Luetticke, Ingo Gloeckner, Hermann Helbig | Interactive Problem Solving in Prolog | 4 pages, 1 figure, accepted for publication: Interactive computer
aided learning (ICL) 2006, International Conference in Villach (Austria).
Paper was not published because the authors were not able to participate on
the conference | null | null | null | cs.HC cs.CY cs.PL | null | This paper presents an environment for solving Prolog problems which has been
implemented as a module for the virtual laboratory VILAB. During the problem
solving processes the learners get fast adaptive feedback. As a result
analysing the learner's actions the system suggests the use of suitable
auxiliary predicates which will also be checked for proper implementation. The
focus of the environment has been set on robustness and the integration in
VILAB.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 14:34:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Braun",
"Erik",
""
],
[
"Luetticke",
"Rainer",
""
],
[
"Gloeckner",
"Ingo",
""
],
[
"Helbig",
"Hermann",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0611015 | Kenneth Shum | Kenneth W. Shum and Chi Wan Sung | On the Fairness of Rate Allocation in Gaussian Multiple Access Channel
and Broadcast Channel | 26 pages | null | null | null | cs.IT math.IT | null | The capacity region of a channel consists of all achievable rate vectors.
Picking a particular point in the capacity region is synonymous with rate
allocation. The issue of fairness in rate allocation is addressed in this
paper. We review several notions of fairness, including max-min fairness,
proportional fairness and Nash bargaining solution. Their efficiencies for
general multiuser channels are discussed. We apply these ideas to the Gaussian
multiple access channel (MAC) and the Gaussian broadcast channel (BC). We show
that in the Gaussian MAC, max-min fairness and proportional fairness coincide.
For both Gaussian MAC and BC, we devise efficient algorithms that locate the
fair point in the capacity region. Some elementary properties of fair rate
allocations are proved.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 16:17:45 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Shum",
"Kenneth W.",
""
],
[
"Sung",
"Chi Wan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611016 | Damien Martin-Guillerez | Damien Martin-Guillerez (IRISA / INRIA Rennes), Michel Ban\^atre
(IRISA / INRIA Rennes), Paul Couderc (IRISA / INRIA Rennes) | Increasing Data Resilience of Mobile Devices with a Collaborative Backup
Service | null | null | null | null | cs.NI | null | Whoever has had his cell phone stolen knows how frustrating it is to be
unable to get his contact list back. To avoid data loss when losing or
destroying a mobile device like a PDA or a cell phone, data is usually
backed-up to a fixed station. However, in the time between the last backup and
the failure, important data can have been produced and then lost. To handle
this issue, we propose a transparent collaborative backup system. Indeed, by
saving data on other mobile devices between two connections to a global
infrastructure, we can resist to such scenarios. In this paper, after a general
description of such a system, we present a way to replicate data on mobile
devices to attain a prerequired resilience for the backup.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 17:16:26 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Martin-Guillerez",
"Damien",
"",
"IRISA / INRIA Rennes"
],
[
"Banâtre",
"Michel",
"",
"IRISA / INRIA Rennes"
],
[
"Couderc",
"Paul",
"",
"IRISA / INRIA Rennes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0611017 | Wei Kang | W. Kang, S. Ulukus | A New Data Processing Inequality and Its Applications in Distributed
Source and Channel Coding | 45 pages, 3 figures, submitted to IEEE Trans. Information Theory | null | 10.1109/TIT.2010.2090211 | null | cs.IT math.IT | null | In the distributed coding of correlated sources, the problem of
characterizing the joint probability distribution of a pair of random variables
satisfying an n-letter Markov chain arises. The exact solution of this problem
is intractable. In this paper, we seek a single-letter necessary condition for
this n-letter Markov chain. To this end, we propose a new data processing
inequality on a new measure of correlation by means of spectrum analysis. Based
on this new data processing inequality, we provide a single-letter necessary
condition for the required joint probability distribution. We apply our results
to two specific examples involving the distributed coding of correlated
sources: multi-terminal rate-distortion region and multiple access channel with
correlated sources, and propose new necessary conditions for these two
problems.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 21:09:46 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Kang",
"W.",
""
],
[
"Ulukus",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611018 | Riccardo Pucella | Hubie Chen | Logic Column 17: A Rendezvous of Logic, Complexity, and Algebra | 30 pages | null | null | null | cs.LO | null | This article surveys recent advances in applying algebraic techniques to
constraint satisfaction problems.
| [
{
"version": "v1",
"created": "Fri, 3 Nov 2006 21:51:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0611019 | Vincent Limouzy | Binh-Minh Bui-Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy
(LIAFA), Fabien De Montgolfier (LIAFA) | Algorithmic Aspects of a General Modular Decomposition Theory | null | null | null | null | cs.DS | null | A new general decomposition theory inspired from modular graph decomposition
is presented. This helps unifying modular decomposition on different
structures, including (but not restricted to) graphs. Moreover, even in the
case of graphs, the terminology ``module'' not only captures the classical
graph modules but also allows to handle 2-connected components, star-cutsets,
and other vertex subsets. The main result is that most of the nice algorithmic
tools developed for modular decomposition of graphs still apply efficiently on
our generalisation of modules. Besides, when an essential axiom is satisfied,
almost all the important properties can be retrieved. For this case, an
algorithm given by Ehrenfeucht, Gabow, McConnell and Sullivan 1994 is
generalised and yields a very efficient solution to the associated
decomposition problem.
| [
{
"version": "v1",
"created": "Sat, 4 Nov 2006 18:32:23 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Nov 2007 10:20:28 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Bui-Xuan",
"Binh-Minh",
"",
"LIRMM"
],
[
"Habib",
"Michel",
"",
"LIAFA"
],
[
"Limouzy",
"Vincent",
"",
"LIAFA"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0611020 | Joy Bose | J. Bose, S.B. Furber, J.L. Shapiro | An associative memory for the on-line recognition and prediction of
temporal sequences | Published in IJCNN 2005, Montreal, Canada | null | 10.1109/IJCNN.2005.1556028 | null | cs.NE cs.AI | null | This paper presents the design of an associative memory with feedback that is
capable of on-line temporal sequence learning. A framework for on-line sequence
learning has been proposed, and different sequence learning models have been
analysed according to this framework. The network model is an associative
memory with a separate store for the sequence context of a symbol. A sparse
distributed memory is used to gain scalability. The context store combines the
functionality of a neural layer with a shift register. The sensitivity of the
machine to the sequence context is controllable, resulting in different
characteristic behaviours. The model can store and predict on-line sequences of
various types and length. Numerical simulations on the model have been carried
out to determine its properties.
| [
{
"version": "v1",
"created": "Sun, 5 Nov 2006 01:15:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bose",
"J.",
""
],
[
"Furber",
"S. B.",
""
],
[
"Shapiro",
"J. L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0611021 | Serban Vlad E. | Serban E. Vlad | Relatively inertial delays | the Eleventh Symposium of Mathematics and its Applications, November
2-5, 2006, Timisoara, Romania | null | null | null | cs.OH | null | The paper studies the relatively inertial delays that represent one of the
most important concepts in the modeling of the asynchronous circuits.
| [
{
"version": "v1",
"created": "Sun, 5 Nov 2006 08:31:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0611022 | Anurag Ganguli | Anurag Ganguli, Jorge Cortes, Francesco Bullo | Multirobot rendezvous with visibility sensors in nonconvex environments | 21 pages | null | null | null | cs.RO | null | This paper presents a coordination algorithm for mobile autonomous robots.
Relying upon distributed sensing the robots achieve rendezvous, that is, they
move to a common location. Each robot is a point mass moving in a nonconvex
environment according to an omnidirectional kinematic model. Each robot is
equipped with line-of-sight limited-range sensors, i.e., a robot can measure
the relative position of any object (robots or environment boundary) if and
only if the object is within a given distance and there are no obstacles
in-between. The algorithm is designed using the notions of robust visibility,
connectivity-preserving constraint sets, and proximity graphs. Simulations
illustrate the theoretical results on the correctness of the proposed
algorithm, and its performance in asynchronous setups and with sensor
measurement and control errors.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 02:50:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganguli",
"Anurag",
""
],
[
"Cortes",
"Jorge",
""
],
[
"Bullo",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0611023 | Surender Baswana | Surender Baswana | Faster Streaming algorithms for graph spanners | 16 pages | null | null | null | cs.DS | null | Given an undirected graph $G=(V,E)$ on $n$ vertices, $m$ edges, and an
integer $t\ge 1$, a subgraph $(V,E_S)$, $E_S\subseteq E$ is called a
$t$-spanner if for any pair of vertices $u,v \in V$, the distance between them
in the subgraph is at most $t$ times the actual distance. We present streaming
algorithms for computing a $t$-spanner of essentially optimal size-stretch
trade offs for any undirected graph.
Our first algorithm is for the classical streaming model and works for
unweighted graphs only. The algorithm performs a single pass on the stream of
edges and requires $O(m)$ time to process the entire stream of edges. This
drastically improves the previous best single pass streaming algorithm for
computing a $t$-spanner which requires $\theta(mn^{\frac{2}{t}})$ time to
process the stream and computes spanner with size slightly larger than the
optimal.
Our second algorithm is for {\em StreamSort} model introduced by Aggarwal et
al. [FOCS 2004], which is the streaming model augmented with a sorting
primitive. The {\em StreamSort} model has been shown to be a more powerful and
still very realistic model than the streaming model for massive data sets
applications. Our algorithm, which works of weighted graphs as well, performs
$O(t)$ passes using $O(\log n)$ bits of working memory only.
Our both the algorithms require elementary data structures.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 03:09:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baswana",
"Surender",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0611024 | Tony Lee T. | Tony T. Lee and Tong Ye | A Relational Approach to Functional Decomposition of Logic Circuits | 29 pages, 12 figures, submitted to Discrete Applied Mathematics | null | null | null | cs.DM cs.LG | null | Functional decomposition of logic circuits has profound influence on all
quality aspects of the cost-effective implementation of modern digital systems.
In this paper, a relational approach to the decomposition of logic circuits is
proposed. This approach is parallel to the normalization of relational
databases, they are governed by the same concepts of functional dependency (FD)
and multi-valued dependency (MVD). It is manifest that the functional
decomposition of switching function actually exploits the same idea and serves
a similar purpose as database normalization. Partitions play an important role
in the decomposition. The interdependency of two partitions can be represented
by a bipartite graph. We demonstrate that both FD and MVD can be represented by
bipartite graphs with specific topological properties, which are delineated by
partitions of minterms. It follows that our algorithms are procedures of
constructing those specific bipartite graphs of interest to meet the
information-lossless criteria of functional decomposition.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 08:43:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Tony T.",
""
],
[
"Ye",
"Tong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0611025 | Javier Larrosa | Javier Larrosa, Federico Heras, Simon de Givry | A Logical Approach to Efficient Max-SAT solving | null | null | null | null | cs.AI cs.LO | null | Weighted Max-SAT is the optimization version of SAT and many important
problems can be naturally encoded as such. Solving weighted Max-SAT is an
important problem from both a theoretical and a practical point of view. In
recent years, there has been considerable interest in finding efficient solving
techniques. Most of this work focus on the computation of good quality lower
bounds to be used within a branch and bound DPLL-like algorithm. Most often,
these lower bounds are described in a procedural way. Because of that, it is
difficult to realize the {\em logic} that is behind.
In this paper we introduce an original framework for Max-SAT that stresses
the parallelism with classical SAT. Then, we extend the two basic SAT solving
techniques: {\em search} and {\em inference}. We show that many algorithmic
{\em tricks} used in state-of-the-art Max-SAT solvers are easily expressable in
{\em logic} terms with our framework in a unified manner.
Besides, we introduce an original search algorithm that performs a restricted
amount of {\em weighted resolution} at each visited node. We empirically
compare our algorithm with a variety of solving alternatives on several
benchmarks. Our experiments, which constitute to the best of our knowledge the
most comprehensive Max-sat evaluation ever reported, show that our algorithm is
generally orders of magnitude faster than any competitor.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 12:39:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Larrosa",
"Javier",
""
],
[
"Heras",
"Federico",
""
],
[
"de Givry",
"Simon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0611026 | Susanne Salmon-Alt | Susanne Salmon-Alt (ATILF), Laurent Romary (INRIA Lorraine - LORIA),
Jean-Marie Pierrel (ATILF) | Un mod\`ele g\'en\'erique d'organisation de corpus en ligne: application
\`a la FReeBank | null | Traitement Automatique des Langues (TAL) 45 (2006) 145-169 | null | null | cs.CL | null | The few available French resources for evaluating linguistic models or
algorithms on other linguistic levels than morpho-syntax are either
insufficient from quantitative as well as qualitative point of view or not
freely accessible. Based on this fact, the FREEBANK project intends to create
French corpora constructed using manually revised output from a hybrid
Constraint Grammar parser and annotated on several linguistic levels
(structure, morpho-syntax, syntax, coreference), with the objective to make
them available on-line for research purposes. Therefore, we will focus on using
standard annotation schemes, integration of existing resources and maintenance
allowing for continuous enrichment of the annotations. Prior to the actual
presentation of the prototype that has been implemented, this paper describes a
generic model for the organization and deployment of a linguistic resource
archive, in compliance with the various works currently conducted within
international standardization initiatives (TEI and ISO/TC 37/SC 4).
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 14:37:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Salmon-Alt",
"Susanne",
"",
"ATILF"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
],
[
"Pierrel",
"Jean-Marie",
"",
"ATILF"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0611027 | Daniel Augot | Raghav Bhaskar (INRIA Rocquencourt), Paul M\"uhlethaler (INRIA
Rocquencourt), Daniel Augot (INRIA Rocquencourt), Cdric Adjih (INRIA
Rocquencourt), Saadi Boudjit (INRIA Rocquencourt), Anis Laouiti (INRIA
Rocquencourt) | Efficient and Dynamic Group Key Agreement in Ad hoc Networks | null | null | null | null | cs.CR | null | Confidentiality, integrity and authentication are more relevant issues in Ad
hoc networks than in wired fixed networks. One way to address these issues is
the use of symmetric key cryptography, relying on a secret key shared by all
members of the network. But establishing and maintaining such a key (also
called the session key) is a non-trivial problem. We show that Group Key
Agreement (GKA) protocols are suitable for establishing and maintaining such a
session key in these dynamic networks. We take an existing GKA protocol, which
is robust to connectivity losses and discuss all the issues for good
functioning of this protocol in Ad hoc networks. We give implementation details
and network parameters, which significantly reduce the computational burden of
using public key cryptography in such networks.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 15:18:47 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Bhaskar",
"Raghav",
"",
"INRIA Rocquencourt"
],
[
"Mühlethaler",
"Paul",
"",
"INRIA\n Rocquencourt"
],
[
"Augot",
"Daniel",
"",
"INRIA Rocquencourt"
],
[
"Adjih",
"Cdric",
"",
"INRIA\n Rocquencourt"
],
[
"Boudjit",
"Saadi",
"",
"INRIA Rocquencourt"
],
[
"Laouiti",
"Anis",
"",
"INRIA\n Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0611028 | Navin Kashyap | Navin Kashyap | A Decomposition Theory for Binary Linear Codes | 37 pages, 4 figures; submitted to IEEE Transactions on Information
Theory, Nov 2006; revised June 2007 | null | 10.1109/TIT.2008.924700 | null | cs.DM cs.IT math.IT | null | The decomposition theory of matroids initiated by Paul Seymour in the 1980's
has had an enormous impact on research in matroid theory. This theory, when
applied to matrices over the binary field, yields a powerful decomposition
theory for binary linear codes. In this paper, we give an overview of this code
decomposition theory, and discuss some of its implications in the context of
the recently discovered formulation of maximum-likelihood (ML) decoding of a
binary linear code over a discrete memoryless channel as a linear programming
problem. We translate matroid-theoretic results of Gr\"otschel and Truemper
from the combinatorial optimization literature to give examples of non-trivial
families of codes for which the ML decoding problem can be solved in time
polynomial in the length of the code. One such family is that consisting of
codes $C$ for which the codeword polytope is identical to the Koetter-Vontobel
fundamental polytope derived from the entire dual code $C^\perp$. However, we
also show that such families of codes are not good in a coding-theoretic sense
-- either their dimension or their minimum distance must grow sub-linearly with
codelength. As a consequence, we have that decoding by linear programming, when
applied to good codes, cannot avoid failing occasionally due to the presence of
pseudocodewords.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 19:35:18 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Jun 2007 02:30:02 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Kashyap",
"Navin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611029 | Timo Latvala | Armin Biere, Keijo Heljanko, Tommi Junttila, Timo Latvala, and Viktor
Schuppan | Linear Encodings of Bounded LTL Model Checking | Final version for Logical Methods in Computer Science CAV 2005
special issue | Logical Methods in Computer Science, Volume 2, Issue 5 (November
15, 2006) lmcs:2236 | 10.2168/LMCS-2(5:5)2006 | null | cs.LO | null | We consider the problem of bounded model checking (BMC) for linear temporal
logic (LTL). We present several efficient encodings that have size linear in
the bound. Furthermore, we show how the encodings can be extended to LTL with
past operators (PLTL). The generalised encoding is still of linear size, but
cannot detect minimal length counterexamples. By using the virtual unrolling
technique minimal length counterexamples can be captured, however, the size of
the encoding is quadratic in the specification. We also extend virtual
unrolling to Buchi automata, enabling them to accept minimal length
counterexamples.
Our BMC encodings can be made incremental in order to benefit from
incremental SAT technology. With fairly small modifications the incremental
encoding can be further enhanced with a termination check, allowing us to prove
properties with BMC. Experiments clearly show that our new encodings improve
performance of BMC considerably, particularly in the case of the incremental
encoding, and that they are very competitive for finding bugs. An analysis of
the liveness-to-safety transformation reveals many similarities to the BMC
encodings in this paper. Using the liveness-to-safety translation with
BDD-based invariant checking results in an efficient method to find shortest
counterexamples that complements the BMC-based approach.
| [
{
"version": "v1",
"created": "Tue, 7 Nov 2006 00:07:26 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Nov 2006 15:49:53 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Nov 2006 09:04:11 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Biere",
"Armin",
""
],
[
"Heljanko",
"Keijo",
""
],
[
"Junttila",
"Tommi",
""
],
[
"Latvala",
"Timo",
""
],
[
"Schuppan",
"Viktor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0611030 | Ambedkar Dukkipati | Ambedkar Dukkipati | Nonextensive Pythagoras' Theorem | 19 pages | null | null | null | cs.IT math.IT | null | Kullback-Leibler relative-entropy, in cases involving distributions resulting
from relative-entropy minimization, has a celebrated property reminiscent of
squared Euclidean distance: it satisfies an analogue of the Pythagoras'
theorem. And hence, this property is referred to as Pythagoras' theorem of
relative-entropy minimization or triangle equality and plays a fundamental role
in geometrical approaches of statistical estimation theory like information
geometry. Equvalent of Pythagoras' theorem in the generalized nonextensive
formalism is established in (Dukkipati at el., Physica A, 361 (2006) 124-138).
In this paper we give a detailed account of it.
| [
{
"version": "v1",
"created": "Tue, 7 Nov 2006 16:10:43 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Sep 2007 11:41:20 GMT"
}
] | 2007-09-12T00:00:00 | [
[
"Dukkipati",
"Ambedkar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611031 | Scot Anderson | Scot Anderson, Peter Revesz | Efficient Threshold Aggregation of Moving Objects | Technical report on spatiotemporal aggregation prior to journal
submission | null | null | null | cs.DB | null | Calculating aggregation operators of moving point objects, using time as a
continuous variable, presents unique problems when querying for congestion in a
moving and changing (or dynamic) query space. We present a set of congestion
query operators, based on a threshold value, that estimate the following 5
aggregation operations in d-dimensions. 1) We call the count of point objects
that intersect the dynamic query space during the query time interval, the
CountRange. 2) We call the Maximum (or Minimum) congestion in the dynamic query
space at any time during the query time interval, the MaxCount (or MinCount).
3) We call the sum of time that the dynamic query space is congested, the
ThresholdSum. 4) We call the number of times that the dynamic query space is
congested, the ThresholdCount. And 5) we call the average length of time of all
the time intervals when the dynamic query space is congested, the
ThresholdAverage. These operators rely on a novel approach to transforming the
problem of selection based on position to a problem of selection based on a
threshold. These operators can be used to predict concentrations of migrating
birds that may carry disease such as Bird Flu and hence the information may be
used to predict high risk areas. On a smaller scale, those operators are also
applicable to maintaining safety in airplane operations. We present the theory
of our estimation operators and provide algorithms for exact operators. The
implementations of those operators, and experiments, which include data from
more than 7500 queries, indicate that our estimation operators produce fast,
efficient results with error under 5%.
| [
{
"version": "v1",
"created": "Tue, 7 Nov 2006 18:23:34 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 19:19:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anderson",
"Scot",
""
],
[
"Revesz",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0611032 | Valmir Barbosa | Andre Nathan, Valmir C. Barbosa | V-like formations in flocks of artificial birds | null | Artificial Life 14 (2008), 179-188 | 10.1162/artl.2008.14.2.179 | null | cs.NE | null | We consider flocks of artificial birds and study the emergence of V-like
formations during flight. We introduce a small set of fully distributed
positioning rules to guide the birds' movements and demonstrate, by means of
simulations, that they tend to lead to stabilization into several of the
well-known V-like formations that have been observed in nature. We also provide
quantitative indicators that we believe are closely related to achieving V-like
formations, and study their behavior over a large set of independent
simulations.
| [
{
"version": "v1",
"created": "Tue, 7 Nov 2006 20:25:28 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Apr 2007 23:01:48 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Nathan",
"Andre",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0611033 | Maria Naya Plasencia | Maria Naya Plasencia (INRIA Rocquencourt) | Cryptanalyse de Achterbahn-128/80 | null | null | null | null | cs.CR | null | This paper presents two attacks against Achterbahn-128/80, the last version
of one of the stream cipher proposals in the eSTREAM project. The attack
against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack
against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits.
These attacks are based on an improvement of the attack due to Hell and
Johansson against Achterbahn version 2 and also on an algorithm that makes
profit of the short lengths of the constituent registers.
*****
Ce papier pr\'{e}sente deux attaques sur Achterbahn-128/80, la derni\`{e}re
version d'un des algorithmes propos\'{e}s dans le cadre de eSTREAM. L'attaque
sur la version de 80 bits, Achterbahn-80, est en 2^{56.32}. L'attaque sur
Achterbahn-128 a besoin de 2^{75.4} calculs et 2^{61} bits de suite chiffrante.
Ces attaques sont bas\'{e}es sur une am\'{e}lioration de l'attaque propos\'{e}e
par Hell et Johansson sur la version 2 d'Achterbahn et aussi sur un algorithme
qui tire profit des petites longueurs des registres.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 07:48:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plasencia",
"Maria Naya",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0611034 | Veronika Rehn | Yves Robert (INRIA Rh\^one-Alpes, LIP), Anne Benoit (INRIA
Rh\^one-Alpes, LIP), Veronika Rehn (INRIA Rh\^one-Alpes, LIP) | Strategies for Replica Placement in Tree Networks | null | null | null | null | cs.DC | null | In this paper, we discuss and compare several policies to place replicas in
tree networks, subject to server capacity and QoS constraints. The client
requests are known beforehand, while the number and location of the servers are
to be determined. The standard approach in the literature is to enforce that
all requests of a client be served by the closest server in the tree. We
introduce and study two new policies. In the first policy, all requests from a
given client are still processed by the same server, but this server can be
located anywhere in the path from the client to the root. In the second policy,
the requests of a given client can be processed by multiple servers. One major
contribution of this paper is to assess the impact of these new policies on the
total replication cost. Another important goal is to assess the impact of
server heterogeneity, both from a theoretical and a practical perspective. In
this paper, we establish several new complexity results, and provide several
efficient polynomial heuristics for NP-complete instances of the problem. These
heuristics are compared to an absolute lower bound provided by the formulation
of the problem in terms of the solution of an integer linear program.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 08:16:55 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Robert",
"Yves",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Benoit",
"Anne",
"",
"INRIA\n Rhône-Alpes, LIP"
],
[
"Rehn",
"Veronika",
"",
"INRIA Rhône-Alpes, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0611035 | Claudio Bettini | Claudio Bettini, X. Sean Wang, Sushil Jajodia | The Role of Quasi-identifiers in k-Anonymity Revisited | 17 pages. Submitted for publication | null | null | RT-11-06 | cs.DB cs.CR | null | The concept of k-anonymity, used in the recent literature to formally
evaluate the privacy preservation of published tables, was introduced based on
the notion of quasi-identifiers (or QI for short). The process of obtaining
k-anonymity for a given private table is first to recognize the QIs in the
table, and then to anonymize the QI values, the latter being called
k-anonymization. While k-anonymization is usually rigorously validated by the
authors, the definition of QI remains mostly informal, and different authors
seem to have different interpretations of the concept of QI. The purpose of
this paper is to provide a formal underpinning of QI and examine the
correctness and incorrectness of various interpretations of QI in our formal
framework. We observe that in cases where the concept has been used correctly,
its application has been conservative; this note provides a formal
understanding of the conservative nature in such cases.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 15:03:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bettini",
"Claudio",
""
],
[
"Wang",
"X. Sean",
""
],
[
"Jajodia",
"Sushil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0611036 | Annie Bouyer | Anne Durand (CRAI), Pierre Drap (CRAI), Elise Meyer (CRAI), Pierre
Grussenmeyer (CRAI), Jean-Pierre Perrin (CRAI) | Intra-site Level Cultural Heritage Documentation: Combination of Survey,
Modeling and Imagery Data in a Web Information System | null | null | null | null | cs.DL | null | Cultural heritage documentation induces the use of computerized techniques to
manage and preserve the information produced. Geographical information systems
have proved their potentialities in this scope, but they are not always adapted
for the management of features at the scale of a particular archaeological
site. Moreover, computer applications in archaeology are often technology
driven and software constrained. Thus, we propose a tool that tries to avoid
these difficulties. We are developing an information system that works over the
Internet and that is joined with a web site. Aims are to assist the work of
archaeological sites managers and to be a documentation tool about these sites,
dedicated to everyone. We devote therefore our system both to the professionals
who are in charge of the site, and to the general public who visits it or who
wants to have information on it. The system permits to do exploratory analyses
of the data, especially at spatial and temporal levels. We propose to record
metadata about the archaeological features in XML and to access these features
through interactive 2D and 3D representations, and through queries systems
(keywords and images). The 2D images, photos, or vectors are generated in SVG,
while 3D models are generated in X3D. Archaeological features are also
automatically integrated in a MySQL database. The web site is an exchange
platform with the information system and is written in PHP. Our first
application case is the medieval castle of Vianden, Luxembourg.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 17:35:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durand",
"Anne",
"",
"CRAI"
],
[
"Drap",
"Pierre",
"",
"CRAI"
],
[
"Meyer",
"Elise",
"",
"CRAI"
],
[
"Grussenmeyer",
"Pierre",
"",
"CRAI"
],
[
"Perrin",
"Jean-Pierre",
"",
"CRAI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0611037 | Michael Baer | Michael B. Baer | On Conditional Branches in Optimal Decision Trees | 5 pages, 2 illustrations; conference version of cs.PF/0604016,
accepted to ISIT 2007 | null | null | null | cs.PF cs.IT math.IT | null | The decision tree is one of the most fundamental programming abstractions. A
commonly used type of decision tree is the alphabetic binary tree, which uses
(without loss of generality) ``less than'' versus ''greater than or equal to''
tests in order to determine one of $n$ outcome events. The process of finding
an optimal alphabetic binary tree for a known probability distribution on
outcome events usually has the underlying assumption that the cost (time) per
decision is uniform and thus independent of the outcome of the decision. This
assumption, however, is incorrect in the case of software to be optimized for a
given microprocessor, e.g., in compiling switch statements or in fine-tuning
program bottlenecks. The operation of the microprocessor generally means that
the cost for the more likely decision outcome can or will be less -- often far
less -- than the less likely decision outcome. Here we formulate a variety of
$O(n^3)$-time $O(n^2)$-space dynamic programming algorithms to solve such
optimal binary decision tree problems, optimizing for the behavior of
processors with predictive branch capabilities, both static and dynamic. In the
static case, we use existing results to arrive at entropy-based performance
bounds. Solutions to this formulation are often faster in practice than
``optimal'' decision trees as formulated in the literature, and, for small
problems, are easily worth the extra complexity in finding the better solution.
This can be applied in fast implementation of decoding Huffman codes.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 03:57:33 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Apr 2007 04:38:31 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611038 | Chengshi Liu | Chengshi Liu | Nonsymmetric entropy I: basic concepts and results | 5 pages | null | null | null | cs.IT math.IT | null | A new concept named nonsymmetric entropy which generalizes the concepts of
Boltzman's entropy and shannon's entropy, was introduced. Maximal nonsymmetric
entropy principle was proven. Some important distribution laws were derived
naturally from maximal nonsymmetric entropy principle.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 07:03:44 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Liu",
"Chengshi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611039 | Maurice Margenstern | Maurice Margenstern, Guentcho Skordev | Substitutions for tilings $\{p,q\}$ | null | null | null | 2005-102 (Publications du LITA, local research reports) | cs.CG cs.DM | null | In this paper we consider tiling $\{p, q \}$ of the Euclidean space and of
the hyperbolic space, and its dual graph $\Gamma_{q, p}$ from a combinatorial
point of view. A substitution $\sigma_{q, p}$ on an appropriate finite alphabet
is constructed. The homogeneity of graph $\Gamma_{q, p}$ and its generation
function are the basic tools for the construction. The tree associated with
substitution $\sigma_{q, p}$ is a spanning tree of graph $\Gamma_{q, p}$. Let
$u_n$ be the number of tiles of tiling $\{p, q \}$ of generation $n$. The
characteristic polynomial of the transition matrix of substitution $\sigma_{q,
p}$ is a characteristic polynomial of a linear recurrence. The sequence
$(u_n)_{n \geq 0}$ is a solution of this recurrence. The growth of sequence
$(u_n)_{n \geq 0}$ is given by the dominant root of the characteristic
polynomial.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 07:53:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Margenstern",
"Maurice",
""
],
[
"Skordev",
"Guentcho",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0611040 | Ferruccio Guidi | F. Guidi | The Formal System lambda-delta | 44 pages, final version for ToCL (with minor changes wrt previous) | null | null | UBLCS-2006-25 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The formal system lambda-delta is a typed lambda calculus that pursues the
unification of terms, types, environments and contexts as the main goal.
lambda-delta takes some features from the Automath-related lambda calculi and
some from the pure type systems, but differs from both in that it does not
include the Pi construction while it provides for an abbreviation mechanism at
the level of terms. lambda-delta enjoys some important desirable properties
such as the confluence of reduction, the correctness of types, the uniqueness
of types up to conversion, the subject reduction of the type assignment, the
strong normalization of the typed terms and, as a corollary, the decidability
of type inference problem.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 11:36:58 GMT"
},
{
"version": "v10",
"created": "Thu, 25 Sep 2008 16:52:34 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Nov 2006 14:55:06 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Jan 2007 15:58:59 GMT"
},
{
"version": "v4",
"created": "Mon, 29 Jan 2007 20:36:10 GMT"
},
{
"version": "v5",
"created": "Mon, 30 Apr 2007 13:48:55 GMT"
},
{
"version": "v6",
"created": "Sat, 25 Aug 2007 09:30:54 GMT"
},
{
"version": "v7",
"created": "Tue, 5 Feb 2008 13:00:48 GMT"
},
{
"version": "v8",
"created": "Tue, 12 Feb 2008 10:38:31 GMT"
},
{
"version": "v9",
"created": "Mon, 26 May 2008 17:57:42 GMT"
}
] | 2008-09-25T00:00:00 | [
[
"Guidi",
"F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0611041 | Vladimir P. Gerdt | V. P. Gerdt | Groebner Bases Applied to Systems of Linear Difference Equations | 10 pages, Particles and Nuclei, Letters, to appear | null | null | null | cs.SC | null | In this paper we consider systems of partial (multidimensional) linear
difference equations. Specifically, such systems arise in scientific computing
under discretization of linear partial differential equations and in
computational high energy physics as recurrence relations for multiloop Feynman
integrals. The most universal algorithmic tool for investigation of linear
difference systems is based on their transformation into an equivalent Groebner
basis form. We present an algorithm for this transformation implemented in
Maple. The algorithm and its implementation can be applied to automatic
generation of difference schemes for linear partial differential equations and
to reduction of Feynman integrals. Some illustrative examples are given.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 10:41:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gerdt",
"V. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0611042 | Vita Hinze-Hoare | Vita Hinze-Hoare | CSCR:Computer Supported Collaborative Research | 3 Pages, 2 figures | null | null | null | cs.HC cs.LG | null | It is suggested that a new area of CSCR (Computer Supported Collaborative
Research) is distinguished from CSCW and CSCL and that the demarcation between
the three areas could do with greater clarification and prescription.
| [
{
"version": "v1",
"created": "Thu, 9 Nov 2006 21:10:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0611043 | Young-Han Kim | Young-Han Kim, Seung-Jean Kim | On the Convexity of log det (I + K X^{-1}) | 2 pages | null | null | null | cs.IT math.IT | null | A simple proof is given for the convexity of log det (I+K X^{-1}) in the
positive definite matrix variable X with a given positive semidefinite K.
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 06:41:52 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Kim",
"Young-Han",
""
],
[
"Kim",
"Seung-Jean",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611044 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiyatullov | Protection of the information in a complex CAD system of renovation of
industrial firms | 6 pages, 2 figures, in Russian | null | null | null | cs.CE | null | The threats to security of the information originating owing to involuntary
operations of the users of a CAD, and methods of its protection implemented in
a complex CAD system of renovation of firms are considered: rollback, autosave,
automatic backup copying and electronic subscript. The specificity of a complex
CAD is reflected in necessity of rollback and autosave both of the draw and the
parametric representations of its parts, which are the information models of
the problem-oriented extensions of the CAD
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 07:43:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiyatullov",
"Rustem R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0611045 | Vladimir Migunov | Vladimir V. Migunov | The evolution of the parametric models of drawings (modules) in the
enterprises reconstruction CAD system | 8 pages, no figures, in Russian | null | null | null | cs.CE | null | Progressing methods of drawings creating automation is discussed on the basis
of so-called modules containing parametric representation of a part of the
drawing and the geometrical elements. The stages of evolution of modular
technology of automation of engineering are describing alternatives of applying
of moduluss for simple association of elements of the drawing without
parametric representation with an opportunity of its commenting, for graphic
symbols creating in the schemas of automation and drawings of pipelines, for
storage of the specific properties of elements, for development of the
specialized parts of the project: the axonometric schemas, profiles of outboard
pipe networks etc.
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 07:56:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0611046 | Gian Luca Pozzato | Laura Giordano, Valentina Gliozzi, Nicola Olivetti, and Gian Luca
Pozzato | Analytic Tableaux Calculi for KLM Logics of Nonmonotonic Reasoning | 54 pages + appendix with proofs | null | null | null | cs.LO cs.AI | null | We present tableau calculi for some logics of nonmonotonic reasoning, as
defined by Kraus, Lehmann and Magidor. We give a tableau proof procedure for
all KLM logics, namely preferential, loop-cumulative, cumulative and rational
logics. Our calculi are obtained by introducing suitable modalities to
interpret conditional assertions. We provide a decision procedure for the
logics considered, and we study their complexity.
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 16:49:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Giordano",
"Laura",
""
],
[
"Gliozzi",
"Valentina",
""
],
[
"Olivetti",
"Nicola",
""
],
[
"Pozzato",
"Gian Luca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0611047 | Adrian Paschke | Adrian Paschke | The Reaction RuleML Classification of the Event / Action / State
Processing and Reasoning Space | The Reaction RuleML Classification of the Event / Action / State
Processing and Reasoning Space extracted from Paschke, A.: ECA-RuleML: An
Approach combining ECA Rules with temporal interval-based KR Event/Action
Logics and Transactional Update Logics, Internet-based Information Systems,
Technical University Munich, Technical Report 11 / 2005 | null | null | Paschke, A.: The Reaction RuleML Classification of the Event /
Action / State Processing and Reasoning Space, White Paper, October, 2006 | cs.AI | null | Reaction RuleML is a general, practical, compact and user-friendly
XML-serialized language for the family of reaction rules. In this white paper
we give a review of the history of event / action /state processing and
reaction rule approaches and systems in different domains, define basic
concepts and give a classification of the event, action, state processing and
reasoning space as well as a discussion of relevant / related work
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2006 22:03:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0611048 | Richard Mayr | Parosh Abdulla, Pritha Mahata, Richard Mayr | Dense-Timed Petri Nets: Checking Zenoness, Token liveness and
Boundedness | 61 pages, 18 figures | Logical Methods in Computer Science, Volume 3, Issue 1 (February
7, 2007) lmcs:2223 | 10.2168/LMCS-3(1:1)2007 | null | cs.LO | null | We consider Dense-Timed Petri Nets (TPN), an extension of Petri nets in which
each token is equipped with a real-valued clock and where the semantics is lazy
(i.e., enabled transitions need not fire; time can pass and disable
transitions). We consider the following verification problems for TPNs. (i)
Zenoness: whether there exists a zeno-computation from a given marking, i.e.,
an infinite computation which takes only a finite amount of time. We show
decidability of zenoness for TPNs, thus solving an open problem from [Escrig et
al.]. Furthermore, the related question if there exist arbitrarily fast
computations from a given marking is also decidable. On the other hand,
universal zenoness, i.e., the question if all infinite computations from a
given marking are zeno, is undecidable. (ii) Token liveness: whether a token is
alive in a marking, i.e., whether there is a computation from the marking which
eventually consumes the token. We show decidability of the problem by reducing
it to the coverability problem, which is decidable for TPNs. (iii) Boundedness:
whether the size of the reachable markings is bounded. We consider two versions
of the problem; namely semantic boundedness where only live tokens are taken
into consideration in the markings, and syntactic boundedness where also dead
tokens are considered. We show undecidability of semantic boundedness, while we
prove that syntactic boundedness is decidable through an extension of the
Karp-Miller algorithm.
| [
{
"version": "v1",
"created": "Sat, 11 Nov 2006 00:08:46 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jan 2007 13:33:21 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Abdulla",
"Parosh",
""
],
[
"Mahata",
"Pritha",
""
],
[
"Mayr",
"Richard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0611049 | Argyn Kuketayev | Argyn Kuketayev | On numerical stability of recursive present value computation method | 6 pages, 2 tables | null | null | null | cs.CE cs.NA | null | We analyze numerical stability of a recursive computation scheme of present
value (PV) amd show that the absolute error increases exponentially for
positive discount rates. We show that reversing the direction of calculations
in the recurrence equation yields a robust PV computation routine.
| [
{
"version": "v1",
"created": "Mon, 13 Nov 2006 20:37:42 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Feb 2007 02:06:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuketayev",
"Argyn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0611050 | Hans-Rudolf Thomann | Hans-Rudolf Thomann | HowTo Authenticate and Encrypt | null | null | null | null | cs.CR | null | Recently, various side-channel attacks on widely used encryption methods have
been discovered. Extensive research is currently undertaken to develop new
types of combined encryption and authentication mechanisms. Developers of
security systems ask whether to implement methods recommended by international
standards or to choose one of the new proposals. We explain the nature of the
attacks and how they can be avoided, and recommend a sound, provably secure
solution: the CCM standard.
| [
{
"version": "v1",
"created": "Mon, 13 Nov 2006 13:40:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thomann",
"Hans-Rudolf",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.