id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
cs/0610126
Marcus Hutter
Marcus Hutter and Shane Legg
Fitness Uniform Optimization
25 double-column pages, 12 figures
IEEE Transactions on Evolutionary Computation, 10:5 (2006) 568-589
10.1109/TEVC.2005.863127
IDSIA-16-06
cs.NE cs.LG
null
In evolutionary algorithms, the fitness of a population increases with time by mutating and recombining individuals and by a biased selection of more fit individuals. The right selection pressure is critical in ensuring sufficient optimization progress on the one hand and in preserving genetic diversity to be able to escape from local optima on the other hand. Motivated by a universal similarity relation on the individuals, we propose a new selection scheme, which is uniform in the fitness values. It generates selection pressure toward sparsely populated fitness regions, not necessarily toward higher fitness, as is the case for all other selection schemes. We show analytically on a simple example that the new selection scheme can be much more effective than standard selection schemes. We also propose a new deletion scheme which achieves a similar result via deletion and show how such a scheme preserves genetic diversity more effectively than standard approaches. We compare the performance of the new schemes to tournament selection and random deletion on an artificial deceptive problem and a range of NP-hard problems: traveling salesman, set covering and satisfiability.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 16:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Legg", "Shane", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0610127
Serban Vlad E.
Serban E. Vlad
The intersection and the union of the asynchronous systems
The 14-th Conference on Applied and Industrial Mathematics CAIM 2006, Satellite Conference of ICM2006, Chisinau, Moldova, August 17-19, 2006
null
null
null
cs.GL
null
The asynchronous systems $f$ are the models of the asynchronous circuits from digital electrical engineering. They are multi-valued functions that associate to each input $u:\mathbf{R}\to \{0,1\}^{m}$ a set of states $x\in f(u),$ where $x:\mathbf{R}\to \{0,1\}^{n}.$ The intersection of the systems allows adding supplementary conditions in modeling and the union of the systems allows considering the validity of one of two systems in modeling, for example when testing the asynchronous circuits and the circuit is supposed to be 'good' or 'bad'. The purpose of the paper is that of analyzing the intersection and the union against the initial/final states, initial/final time, initial/final state functions, subsystems, dual systems, inverse systems, Cartesian product of systems, parallel connection and serial connection of systems.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 21:33:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0610128
Daniel Lemire
Daniel Lemire and Owen Kaser
Hierarchical Bin Buffering: Online Local Moments for Dynamic External Memory Arrays
null
ACM Transactions on Algorithms 4(1): 14 (2008)
10.1145/1328911.1328925
null
cs.DS cs.DB
http://creativecommons.org/publicdomain/zero/1.0/
Local moments are used for local regression, to compute statistical measures such as sums, averages, and standard deviations, and to approximate probability distributions. We consider the case where the data source is a very large I/O array of size n and we want to compute the first N local moments, for some constant N. Without precomputation, this requires O(n) time. We develop a sequence of algorithms of increasing sophistication that use precomputation and additional buffer space to speed up queries. The simpler algorithms partition the I/O array into consecutive ranges called bins, and they are applicable not only to local-moment queries, but also to algebraic queries (MAX, AVERAGE, SUM, etc.). With N buffers of size sqrt{n}, time complexity drops to O(sqrt n). A more sophisticated approach uses hierarchical buffering and has a logarithmic time complexity (O(b log_b n)), when using N hierarchical buffers of size n/b. Using Overlapped Bin Buffering, we show that only a single buffer is needed, as with wavelet-based algorithms, but using much less storage. Applications exist in multidimensional and statistical databases over massive data sets, interactive image processing, and visualization.
[ { "version": "v1", "created": "Sat, 21 Oct 2006 00:30:57 GMT" }, { "version": "v2", "created": "Fri, 24 Aug 2007 15:42:52 GMT" }, { "version": "v3", "created": "Sun, 26 Apr 2020 21:39:09 GMT" } ]
2020-04-28T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Kaser", "Owen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0610129
Haluk Bingol
Ismail Gunes, Haluk Bingol
Community Detection in Complex Networks Using Agents
5 pages
null
null
null
cs.MA cs.CY
null
Community structure identification has been one of the most popular research areas in recent years due to its applicability to the wide scale of disciplines. To detect communities in varied topics, there have been many algorithms proposed so far. However, most of them still have some drawbacks to be addressed. In this paper, we present an agent-based based community detection algorithm. The algorithm that is a stochastic one makes use of agents by forcing them to perform biased moves in a smart way. Using the information collected by the traverses of these agents in the network, the network structure is revealed. Also, the network modularity is used for determining the number of communities. Our algorithm removes the need for prior knowledge about the network such as number of the communities or any threshold values. Furthermore, the definite community structure is provided as a result instead of giving some structures requiring further processes. Besides, the computational and time costs are optimized because of using thread like working agents. The algorithm is tested on three network data of different types and sizes named Zachary karate club, college football and political books. For all three networks, the real network structures are identified in almost every run.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 06:34:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Gunes", "Ismail", "" ], [ "Bingol", "Haluk", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0610130
Evgueni Haroutunian
Evgueni A. Haroutunian (Associate Member, IEEE)
On Bounds for $E$-capacity of DMC
null
null
null
null
cs.IT math.IT
null
Random coding, expurgated and sphere packing bounds are derived by method of types and method of graph decomposition for $E$-capacity of discrete memoryless channel (DMC). Three decoding rules are considered, the random coding bound is attainable by each of the three rules, but the expurgated bound is achievable only by maximum-likelihood decoding. Sphere packing bound is obtained by very simple combinatorial reasonings of the method of types. The paper joins and reviews the results of previous hard achievable publications.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 07:23:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Haroutunian", "Evgueni A.", "", "Associate Member, IEEE" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610131
Frederic Vivien
Loris Marchal (INRIA Rh\^one-Alpes, LIP), Veronika Rehn (INRIA Rh\^one-Alpes, LIP), Yves Robert (INRIA Rh\^one-Alpes, LIP), Fr\'ed\'eric Vivien (INRIA Rh\^one-Alpes, LIP)
Scheduling and data redistribution strategies on star platforms
null
null
null
null
cs.DC
null
In this work we are interested in the problem of scheduling and redistributing data on master-slave platforms. We consider the case were the workers possess initial loads, some of which having to be redistributed in order to balance their completion times. We examine two different scenarios. The first model assumes that the data consists of independent and identical tasks. We prove the NP-completeness in the strong sense for the general case, and we present two optimal algorithms for special platform types. Furthermore we propose three heuristics for the general case. Simulations consolidate the theoretical results. The second data model is based on Divisible Load Theory. This problem can be solved in polynomial time by a combination of linear programming and simple analytical manipulations.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 07:45:01 GMT" } ]
2016-08-16T00:00:00
[ [ "Marchal", "Loris", "", "INRIA Rhône-Alpes, LIP" ], [ "Rehn", "Veronika", "", "INRIA\n Rhône-Alpes, LIP" ], [ "Robert", "Yves", "", "INRIA Rhône-Alpes, LIP" ], [ "Vivien", "Frédéric", "", "INRIA Rhône-Alpes, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0610132
Kwankyu Lee
Kwankyu Lee, Michael E. O'Sullivan
List Decoding of Hermitian Codes using Groebner Bases
19 pages, 2 figures
null
null
null
cs.IT cs.SC math.IT
null
List decoding of Hermitian codes is reformulated to allow an efficient and simple algorithm for the interpolation step. The algorithm is developed using the theory of Groebner bases of modules. The computational complexity of the algorithm seems comparable to previously known algorithms achieving the same task, and the algorithm is better suited for hardware implementation.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 07:52:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Lee", "Kwankyu", "" ], [ "O'Sullivan", "Michael E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610133
Thomas Silverston
Thomas Silverston and Olivier Fourmaux
P2P IPTV Measurement: A Comparison Study
10 pages
null
null
null
cs.NI cs.MM
null
With the success of P2P file sharing, new emerging P2P applications arise on the Internet for streaming content like voice (VoIP) or live video (IPTV). Nowadays, there are lots of works measuring P2P file sharing or P2P telephony systems, but there is still no comprehensive study about P2P IPTV, whereas it should be massively used in the future. During the last FIFA world cup, we measured network traffic generated by P2P IPTV applications like PPlive, PPstream, TVants and Sopcast. In this paper we analyze some of our results during the same games for the applications. We focus on traffic statistics and churn of peers within these P2P networks. Our objectives are threefold: we point out the traffic generated to understand the impact they will have on the network, we try to infer the mechanisms of such applications and highlight differences, and we give some insights about the users' behavior.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 13:55:28 GMT" }, { "version": "v2", "created": "Thu, 2 Nov 2006 14:23:31 GMT" }, { "version": "v3", "created": "Mon, 15 Jan 2007 13:34:09 GMT" }, { "version": "v4", "created": "Thu, 19 Apr 2007 13:45:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Silverston", "Thomas", "" ], [ "Fourmaux", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0610134
Richard Clegg Dr
Richard G. Clegg, Maurice Dodson
A Markov Chain based method for generating long-range dependence
8 pages, 2 figures
Phys. Rev. E 72, 026118 2005
10.1103/PhysRevE.72.026118
null
cs.NI cs.PF math.ST stat.TH
null
This paper describes a model for generating time series which exhibit the statistical phenomenon known as long-range dependence (LRD). A Markov Modulated Process based upon an infinite Markov chain is described. The work described is motivated by applications in telecommunications where LRD is a known property of time-series measured on the internet. The process can generate a time series exhibiting LRD with known parameters and is particularly suitable for modelling internet traffic since the time series is in terms of ones and zeros which can be interpreted as data packets and inter-packet gaps. The method is extremely simple computationally and analytically and could prove more tractable than other methods described in the literature
[ { "version": "v1", "created": "Mon, 23 Oct 2006 13:54:18 GMT" } ]
2011-11-10T00:00:00
[ [ "Clegg", "Richard G.", "" ], [ "Dodson", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0610135
Richard Clegg Dr
Richard G. Clegg
Markov-modulated on/off processes for long-range dependent internet traffic
33 pages, 13 figures. Revised after comments and changed format. Added diagrams about queue overflow probabilities
null
null
null
cs.NI cs.DM cs.PF math.ST stat.TH
null
The aim of this paper is to use a very simple queuing model to compare a number of models from the literature which have been used to replicate the statistical nature of internet traffic and, in particular, the long-range dependence of this traffic. The four models all have the form of discrete time Markov-modulated processes (two other models are introduced for comparison purposes). While it is often stated that long-range dependence has a critical effect on queuing performance, it appears that the models used here do not well replicated the queuing performance of real internet traffic. In particular, they fail to replicate the mean queue length (and hence the mean delay) and the probability of the queue length exceeding a given level.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 14:30:15 GMT" }, { "version": "v2", "created": "Sat, 4 Nov 2006 15:09:51 GMT" }, { "version": "v3", "created": "Mon, 18 Dec 2006 13:47:51 GMT" } ]
2011-11-10T00:00:00
[ [ "Clegg", "Richard G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0610136
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK)
Bounds on the coefficients of the characteristic and minimal polynomials
null
Journal of Inequalities in Pure and Applied Mathematics 8, 2 (2007) art. 31, 6pp
null
null
cs.SC
null
This note presents absolute bounds on the size of the coefficients of the characteristic and minimal polynomials depending on the size of the coefficients of the associated matrix. Moreover, we present algorithms to compute more precise input-dependant bounds on these coefficients. Such bounds are e.g. useful to perform deterministic chinese remaindering of the characteristic or minimal polynomial of an integer matrix.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 08:24:08 GMT" }, { "version": "v2", "created": "Fri, 26 Jan 2007 15:20:52 GMT" }, { "version": "v3", "created": "Mon, 5 Feb 2007 18:41:39 GMT" }, { "version": "v4", "created": "Fri, 21 Sep 2007 07:53:10 GMT" } ]
2011-11-10T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0610137
Silvano Dal Zilio
Lucia Acciai (LIF), Michele Boreale, Silvano Dal Zilio (LIF)
A Concurrent Calculus with Atomic Transactions
29 pages
null
null
null
cs.LO cs.DC
null
The Software Transactional Memory (STM) model is an original approach for controlling concurrent accesses to ressources without the need for explicit lock-based synchronization mechanisms. A key feature of STM is to provide a way to group sequences of read and write actions inside atomic blocks, similar to database transactions, whose whole effect should occur atomically. In this paper, we investigate STM from a process algebra perspective and define an extension of asynchronous CCS with atomic blocks of actions. Our goal is not only to set a formal ground for reasoning on STM implementations but also to understand how this model fits with other concurrency control mechanisms. We also view this calculus as a test bed for extending process calculi with atomic transactions. This is an interesting direction for investigation since, for the most part, actual works that mix transactions with process calculi consider compensating transactions, a model that lacks all the well-known ACID properties. We show that the addition of atomic transactions results in a very expressive calculus, enough to easily encode other concurrent primitives such as guarded choice and multiset-synchronization (\`{a} la join-calculus). The correctness of our encodings is proved using a suitable notion of bisimulation equivalence. The equivalence is then applied to prove interesting ``laws of transactions'' and to obtain a simple normal form for transactions.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 08:26:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Acciai", "Lucia", "", "LIF" ], [ "Boreale", "Michele", "", "LIF" ], [ "Zilio", "Silvano Dal", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0610138
Anant Sahai
Anant Sahai
Why block length and delay behave differently if feedback is present
42 pages, 22 figures
null
null
null
cs.IT math.IT
null
For output-symmetric DMCs at even moderately high rates, fixed-block-length communication systems show no improvements in their error exponents with feedback. In this paper, we study systems with fixed end-to-end delay and show that feedback generally provides dramatic gains in the error exponents. A new upper bound (the uncertainty-focusing bound) is given on the probability of symbol error in a fixed-delay communication system with feedback. This bound turns out to have a similar form to Viterbi's bound used for the block error probability of convolutional codes as a function of the fixed constraint length. The uncertainty-focusing bound is shown to be asymptotically achievable with noiseless feedback for erasure channels as well as any output-symmetric DMC that has strictly positive zero-error capacity. Furthermore, it can be achieved in a delay-universal (anytime) fashion even if the feedback itself is delayed by a small amount. Finally, it is shown that for end-to-end delay, it is generally possible at high rates to beat the sphere-packing bound for general DMCs -- thereby providing a counterexample to a conjecture of Pinsker.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 13:28:14 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2007 03:51:29 GMT" } ]
2007-12-06T00:00:00
[ [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610139
Anant Sahai
Anant Sahai
How to beat the sphere-packing bound with feedback
9 pages, 3 figures, corrected typos and increased font size. Submitted to IT Transactions
null
null
null
cs.IT math.IT
null
The sphere-packing bound $E_{sp}(R)$ bounds the reliability function for fixed-length block-codes. For symmetric channels, it remains a valid bound even when strictly causal noiseless feedback is allowed from the decoder to the encoder. To beat the bound, the problem must be changed. While it has long been known that variable-length block codes can do better when trading-off error probability with expected block-length, this correspondence shows that the {\em fixed-delay} setting also presents such an opportunity for generic channels. While $E_{sp}(R)$ continues to bound the tradeoff between bit error and fixed end-to-end latency for symmetric channels used {\em without} feedback, a new bound called the ``focusing bound'' gives the limits on what can be done with feedback. If low-rate reliable flow-control is free (ie. the noisy channel has strictly positive zero-error capacity), then the focusing bound can be asymptotically achieved. Even when the channel has no zero-error capacity, it is possible to substantially beat the sphere-packing bound by synthesizing an appropriately reliable channel to carry the flow-control information.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 14:10:09 GMT" }, { "version": "v2", "created": "Thu, 26 Oct 2006 16:10:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610140
Leonid Makarov
Leonid Makarov and Peter Komarov
Constant for associative patterns ensemble
6 pages
null
null
null
cs.AI
null
Creation procedure of associative patterns ensemble in terms of formal logic with using neural net-work (NN) model is formulated. It is shown that the associative patterns set is created by means of unique procedure of NN work which having individual parameters of entrance stimulus transformation. It is ascer-tained that the quantity of the selected associative patterns possesses is a constant.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 16:27:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Makarov", "Leonid", "" ], [ "Komarov", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610141
Anant Sahai
Anant Sahai
Stabilization using both noisy and noiseless feedback
9 pages, 5 figures, originally presented at MTNS 06
null
null
null
cs.IT math.IT
null
When designing a distributed control system, the system designer has a choice in how to connect the different units through communication channels. In practice, noiseless and noisy channels may coexist. Using the standard toy example of scalar stabilization, this paper shows how a small amount of noiseless feedback can perform a ``supervisory'' role and thereby boost the effectiveness of noisy feedback.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 18:32:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610142
Anant Sahai
Mukul Agarwal, Anant Sahai, and Sanjoy Mitter
Coding into a source: a direct inverse Rate-Distortion theorem
18 pages, 3 figure, orginally presented at Allerton 06
null
null
null
cs.IT math.IT
null
Shannon proved that if we can transmit bits reliably at rates larger than the rate distortion function $R(D)$, then we can transmit this source to within a distortion $D$. We answer the converse question ``If we can transmit a source to within a distortion $D$, can we transmit bits reliably at rates less than the rate distortion function?'' in the affirmative. This can be viewed as a direct converse of the rate distortion theorem.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 18:49:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Agarwal", "Mukul", "" ], [ "Sahai", "Anant", "" ], [ "Mitter", "Sanjoy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610143
Anant Sahai
Anant Sahai and Sanjoy Mitter
Source coding and channel requirements for unstable processes
37 pages, 9 figures. Cleaned up typos and reformatted paper for increased clarity
null
null
null
cs.IT math.IT
null
Our understanding of information in systems has been based on the foundation of memoryless processes. Extensions to stable Markov and auto-regressive processes are classical. Berger proved a source coding theorem for the marginally unstable Wiener process, but the infinite-horizon exponentially unstable case has been open since Gray's 1970 paper. There were also no theorems showing what is needed to communicate such processes across noisy channels. In this work, we give a fixed-rate source-coding theorem for the infinite-horizon problem of coding an exponentially unstable Markov process. The encoding naturally results in two distinct bitstreams that have qualitatively different QoS requirements for communicating over a noisy medium. The first stream captures the information that is accumulating within the nonstationary process and requires sufficient anytime reliability from the channel used to communicate the process. The second stream captures the historical information that dissipates within the process and is essentially classical. This historical information can also be identified with a natural stable counterpart to the unstable process. A converse demonstrating the fundamentally layered nature of unstable sources is given by means of information-embedding ideas.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 19:00:27 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2007 04:16:11 GMT" } ]
2007-12-06T00:00:00
[ [ "Sahai", "Anant", "" ], [ "Mitter", "Sanjoy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610144
Anant Sahai
Cheng Chang, Stark Draper, and Anant Sahai
Lossless coding for distributed streaming sources
40 pages, 11 figures, submitted to IT Transactions
null
null
null
cs.IT math.IT
null
Distributed source coding is traditionally viewed in the block coding context -- all the source symbols are known in advance at the encoders. This paper instead considers a streaming setting in which iid source symbol pairs are revealed to the separate encoders in real time and need to be reconstructed at the decoder with some tolerable end-to-end delay using finite rate noiseless channels. A sequential random binning argument is used to derive a lower bound on the error exponent with delay and show that both ML decoding and universal decoding achieve the same positive error exponents inside the traditional Slepian-Wolf rate region. The error events are different from the block-coding error events and give rise to slightly different exponents. Because the sequential random binning scheme is also universal over delays, the resulting code eventually reconstructs every source symbol correctly with probability 1.
[ { "version": "v1", "created": "Wed, 25 Oct 2006 00:20:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Chang", "Cheng", "" ], [ "Draper", "Stark", "" ], [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610145
Peter Berlin
Peter Berlin, Baris Nakiboglu, Bixio Rimoldi, Emre Telatar
A Simple Converse of Burnashev's Reliability
10 pages, 1 figure, updated missing reference
IEEE Transactions on Information Theory, 55(7):3074-3080, July 2009
10.1109/TIT.2009.2021322
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a remarkable paper published in 1976, Burnashev determined the reliability function of variable-length block codes over discrete memoryless channels with feedback. Subsequently, an alternative achievability proof was obtained by Yamamoto and Itoh via a particularly simple and instructive scheme. Their idea is to alternate between a communication and a confirmation phase until the receiver detects the codeword used by the sender to acknowledge that the message is correct. We provide a converse that parallels the Yamamoto-Itoh achievability construction. Besides being simpler than the original, the proposed converse suggests that a communication and a confirmation phase are implicit in any scheme for which the probability of error decreases with the largest possible exponent. The proposed converse also makes it intuitively clear why the terms that appear in Burnashev's exponent are necessary.
[ { "version": "v1", "created": "Wed, 25 Oct 2006 15:51:01 GMT" }, { "version": "v2", "created": "Tue, 31 Oct 2006 18:58:36 GMT" }, { "version": "v3", "created": "Tue, 23 Sep 2008 19:31:06 GMT" } ]
2018-03-20T00:00:00
[ [ "Berlin", "Peter", "" ], [ "Nakiboglu", "Baris", "" ], [ "Rimoldi", "Bixio", "" ], [ "Telatar", "Emre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610146
Anant Sahai
Anant Sahai and Sanjoy Mitter
The necessity and sufficiency of anytime capacity for stabilization of a linear system over a noisy communication link, Part II: vector systems
20 pages, 6 figures: significantly shortened and streamlined, improved example with a better bound
null
null
null
cs.IT math.IT
null
In part I, we reviewed how Shannon's classical notion of capacity is not sufficient to characterize a noisy communication channel if the channel is intended to be used as part of a feedback loop to stabilize an unstable scalar linear system. While classical capacity is not enough, a sense of capacity (parametrized by reliability) called "anytime capacity" is both necessary and sufficient for channel evaluation in this context. The rate required is the log of the open-loop system gain and the required reliability comes from the desired sense of stability. Sufficiency is maintained even in cases with noisy observations and without any explicit feedback between the observer and the controller. This established the asymptotic equivalence between scalar stabilization problems and delay-universal communication problems with feedback. Here in part II, the vector-state generalizations are established and it is the magnitudes of the unstable eigenvalues that play an essential role. To deal with such systems, the concept of the anytime rate-region is introduced. This is the region of rates that the channel can support while still meeting potentially different anytime reliability targets for parallel message streams. All the scalar results generalize on an eigenvalue by eigenvalue basis. When there is no explicit feedback of the noisy channel outputs, the intrinsic delay of the unstable system tells us what the feedback delay needs to be while evaluating the anytime-rate-region for the channel. An example involving a binary erasure channel is used to illustrate how differentiated service is required in any separation-based control architecture.
[ { "version": "v1", "created": "Wed, 25 Oct 2006 21:51:26 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2007 04:22:13 GMT" } ]
2007-12-06T00:00:00
[ [ "Sahai", "Anant", "" ], [ "Mitter", "Sanjoy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610147
Kun-Hong Liu
Kun-hong Liu, Yong Xu, De-shuang Huang, Min Cheng
Grooming of Dynamic Traffic in WDM Star and Tree Networks Using Genetic Algorithm
15 pages
Photonic Network Communications,Volume 15, Number 2, 2008
10.1007/s11107-007-0103-0
null
cs.NI
null
The advances in WDM technology lead to the great interest in traffic grooming problems. As traffic often changes from time to time, the problem of grooming dynamic traffic is of great practical value. In this paper, we discuss dynamic grooming of traffic in star and tree networks. A genetic algorithm (GA) based approach is proposed to support arbitrary dynamic traffic patterns, which minimizes the number of ADM's and wavelengths. To evaluate the algorithm, tighter bounds are derived. Computer simulation results show that our algorithm is efficient in reducing both the numbers of ADM's and wavelengths in tree and star networks.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 02:56:54 GMT" } ]
2008-04-20T00:00:00
[ [ "Liu", "Kun-hong", "" ], [ "Xu", "Yong", "" ], [ "Huang", "De-shuang", "" ], [ "Cheng", "Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610148
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Decoder Error Probability of MRD Codes
6 pages, 2 figures. Presented at ITW 2006, Chengdu, China
null
null
null
cs.IT math.IT
null
In this paper, we first introduce the concept of elementary linear subspace, which has similar properties to those of a set of coordinates. Using this new concept, we derive properties of maximum rank distance (MRD) codes that parallel those of maximum distance separable (MDS) codes. Using these properties, we show that the decoder error probability of MRD codes with error correction capability t decreases exponentially with t^2 based on the assumption that all errors with the same rank are equally likely. We argue that the channel based on this assumption is an approximation of a channel corrupted by crisscross errors.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 03:12:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610149
Anna Frid
A. Frid
Canonical decomposition of catenation of factorial languages
Submitted
null
null
null
cs.LO
null
According to a previous result by S. V. Avgustinovich and the author, each factorial language admits a unique canonical decomposition to a catenation of factorial languages. In this paper, we analyze the appearance of the canonical decomposition of a catenation of two factorial languages whose canonical decompositions are given.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 06:38:30 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2006 06:11:17 GMT" }, { "version": "v3", "created": "Wed, 31 Jan 2007 07:56:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Frid", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610150
Evgueni Haroutunian
Evgueni A. Haroutunian (Associate Member, IEEE) and Parandzem M. Hakobyan
On LAO Testing of Multiple Hypotheses for Many Independent Objects
null
null
null
null
cs.IT math.IT
null
The problem of many hypotheses logarithmically asymptotically optimal (LAO) testing for a model consisting of three or more independent objects is solved. It is supposed that $M$ probability distributions are known and each object independently of others follows to one of them. The matrix of asymptotic interdependencies (reliability--reliability functions) of all possible pairs of the error probability exponents (reliabilities) in optimal testing for this model is studied. This problem was introduced (and solved for the case of two objects and two given probability distributions) by Ahlswede and Haroutunian. The model with two independent objects with $M$ hypotheses was explored by Haroutunian and Hakobyan.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 06:42:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Haroutunian", "Evgueni A.", "", "Associate Member, IEEE" ], [ "Hakobyan", "Parandzem M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610151
Anant Sahai
Anant Sahai
Anytime coding on the infinite bandwidth AWGN channel: A sequential semi-orthogonal optimal code
12 pages, 6 figures, submitted to IT Transactions
null
null
null
cs.IT math.IT
null
It is well known that orthogonal coding can be used to approach the Shannon capacity of the power-constrained AWGN channel without a bandwidth constraint. This correspondence describes a semi-orthogonal variation of pulse position modulation that is sequential in nature -- bits can be ``streamed across'' without having to buffer up blocks of bits at the transmitter. ML decoding results in an exponentially small probability of error as a function of tolerated receiver delay and thus eventually a zero probability of error on every transmitted bit. In the high-rate regime, a matching upper bound is given on the delay error exponent. We close with some comments on the case with feedback and the connections to the capacity per unit cost problem.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 10:01:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610152
Arindam Mitra
Arindam Mitra
An unbreakable cryptosystem for common people
Pdf
null
null
null
cs.CR
null
It has been found that an algorithm can generate true random numbers on classical computer. The algorithm can be used to generate unbreakable message PIN (personal identification number) and password.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 14:22:20 GMT" }, { "version": "v2", "created": "Wed, 7 Feb 2007 15:50:29 GMT" }, { "version": "v3", "created": "Wed, 14 Mar 2007 13:16:18 GMT" }, { "version": "v4", "created": "Tue, 21 Aug 2007 15:33:22 GMT" }, { "version": "v5", "created": "Thu, 23 Aug 2007 15:11:14 GMT" } ]
2007-08-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0610153
Michael Stay
Cristian S. Calude and Michael A. Stay
Most Programs Stop Quickly or Never Halt
Shortened abstract and changed format of references to match Adv. Appl. Math guidelines
null
null
CDMTCS-284
cs.IT math.IT
null
Since many real-world problems arising in the fields of compiler optimisation, automated software engineering, formal proof systems, and so forth are equivalent to the Halting Problem--the most notorious undecidable problem--there is a growing interest, not only academically, in understanding the problem better and in providing alternative solutions. Halting computations can be recognised by simply running them; the main difficulty is to detect non-halting programs. Our approach is to have the probability space extend over both space and time and to consider the probability that a random $N$-bit program has halted by a random time. We postulate an a priori computable probability distribution on all possible runtimes and we prove that given an integer k>0, we can effectively compute a time bound T such that the probability that an N-bit program will eventually halt given that it has not halted by T is smaller than 2^{-k}. We also show that the set of halting programs (which is computably enumerable, but not computable) can be written as a disjoint union of a computable set and a set of effectively vanishing probability. Finally, we show that ``long'' runtimes are effectively rare. More formally, the set of times at which an N-bit program can stop after the time 2^{N+constant} has effectively zero density.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 16:27:53 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2006 07:39:05 GMT" }, { "version": "v3", "created": "Sun, 7 Jan 2007 01:07:05 GMT" }, { "version": "v4", "created": "Fri, 26 Jan 2007 20:39:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Calude", "Cristian S.", "" ], [ "Stay", "Michael A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610154
Johan Bollen
Johan Bollen and Herbert Van de Sompel
Usage Impact Factor: the effects of sample characteristics on usage-based impact metrics
13 pages, 7 figures
Journal of the American Society for Information Science and Technology, 59(1), 2008
null
null
cs.DL
null
There exist ample demonstrations that indicators of scholarly impact analogous to the citation-based ISI Impact Factor can be derived from usage data. However, contrary to the ISI IF which is based on citation data generated by the global community of scholarly authors, so far usage can only be practically recorded at a local level leading to community-specific assessments of scholarly impact that are difficult to generalize to the global scholarly community. We define a journal Usage Impact Factor which mimics the definition of the Thomson Scientific's ISI Impact Factor. Usage Impact Factor rankings are calculated on the basis of a large-scale usage data set recorded for the California State University system from 2003 to 2005. The resulting journal rankings are then compared to Thomson Scientific's ISI Impact Factor which is used as a baseline indicator of general impact. Our results indicate that impact as derived from California State University usage reflects the particular scientific and demographic characteristics of its communities.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 16:39:53 GMT" }, { "version": "v2", "created": "Thu, 26 Oct 2006 20:04:35 GMT" } ]
2007-09-26T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0610155
Ping Li
Ping Li, Trevor J. Hastie, Kenneth W. Church
Nonlinear Estimators and Tail Bounds for Dimension Reduction in $l_1$ Using Cauchy Random Projections
null
null
null
null
cs.DS cs.IR cs.LG
null
For dimension reduction in $l_1$, the method of {\em Cauchy random projections} multiplies the original data matrix $\mathbf{A} \in\mathbb{R}^{n\times D}$ with a random matrix $\mathbf{R} \in \mathbb{R}^{D\times k}$ ($k\ll\min(n,D)$) whose entries are i.i.d. samples of the standard Cauchy C(0,1). Because of the impossibility results, one can not hope to recover the pairwise $l_1$ distances in $\mathbf{A}$ from $\mathbf{B} = \mathbf{AR} \in \mathbb{R}^{n\times k}$, using linear estimators without incurring large errors. However, nonlinear estimators are still useful for certain applications in data stream computation, information retrieval, learning, and data mining. We propose three types of nonlinear estimators: the bias-corrected sample median estimator, the bias-corrected geometric mean estimator, and the bias-corrected maximum likelihood estimator. The sample median estimator and the geometric mean estimator are asymptotically (as $k\to \infty$) equivalent but the latter is more accurate at small $k$. We derive explicit tail bounds for the geometric mean estimator and establish an analog of the Johnson-Lindenstrauss (JL) lemma for dimension reduction in $l_1$, which is weaker than the classical JL lemma for dimension reduction in $l_2$. Asymptotically, both the sample median estimator and the geometric mean estimators are about 80% efficient compared to the maximum likelihood estimator (MLE). We analyze the moments of the MLE and propose approximating the distribution of the MLE by an inverse Gaussian.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 07:08:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Ping", "" ], [ "Hastie", "Trevor J.", "" ], [ "Church", "Kenneth W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0610156
Fadi Badra
Mathieu D'Aquin (INRIA Lorraine - LORIA, KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine - LORIA)
Adaptation Knowledge Discovery from a Case Base
null
Proceedings of the 17th European Conference on Artificial Intelligence (ECAI-06), Trento G. Brewka (Ed.) (2006) 795--796
null
null
cs.AI
null
In case-based reasoning, the adaptation step depends in general on domain-dependent knowledge, which motivates studies on adaptation knowledge acquisition (AKA). CABAMAKA is an AKA system based on principles of knowledge discovery from databases. This system explores the variations within the case base to elicit adaptation knowledge. It has been successfully tested in an application of case-based decision support to breast cancer treatment.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 10:08:32 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Aquin", "Mathieu", "", "INRIA Lorraine - LORIA, KMI" ], [ "Badra", "Fadi", "", "INRIA\n Lorraine - LORIA" ], [ "Lafrogne", "Sandrine", "", "INRIA Lorraine - LORIA" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ], [ "Szathmary", "Laszlo", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610157
Kun-Hong Liu
Kun-hong Liu, Yong Xu, De-Shuang Huang
A Genetic Algorithm Approach to the Grooming of Dynamic Traffic in Tree and Star Networks with Bifurcation
16 pages; Guangxi, Guilin, Proceeding of the 10th International Conference on Intelligent Technologies, pp. 524-533
null
null
null
cs.NI
null
Traffic grooming is widely employed to reduce the number of ADM's and wavelengths. We consider the problem of grooming of dynamic traffic in WDM tree and star networks in this paper. To achieve better results, we used the bifurcation techniques to the grooming of arbitrary dynamic traffic in a strictly non-blocking manner in networks. Three splitting methods, including Traffic-Cutting, Traffic-Dividing and Synthesized-Splitting were proposed. A genetic algorithm (GA) approach based on these methods was proposed to tackle such grooming problems in tree and star networks. The performance of these algorithms was tested under different conditions in star and tree networks. Computer simulation results showed that our algorithm is efficient in reducing both the numbers of ADM's and wavelengths.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 12:05:21 GMT" } ]
2010-03-05T00:00:00
[ [ "Liu", "Kun-hong", "" ], [ "Xu", "Yong", "" ], [ "Huang", "De-Shuang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0610158
Babajide Afolabi
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
Considering users' behaviours in improving the responses of an information base
null
Dans I International Conference on Multidisciplinary Information Sciences and Technologies (2006)
null
null
cs.LG cs.IR
null
In this paper, our aim is to propose a model that helps in the efficient use of an information system by users, within the organization represented by the IS, in order to resolve their decisional problems. In other words we want to aid the user within an organization in obtaining the information that corresponds to his needs (informational needs that result from his decisional problems). This type of information system is what we refer to as economic intelligence system because of its support for economic intelligence processes of the organisation. Our assumption is that every EI process begins with the identification of the decisional problem which is translated into an informational need. This need is then translated into one or many information search problems (ISP). We also assumed that an ISP is expressed in terms of the user's expectations and that these expectations determine the activities or the behaviors of the user, when he/she uses an IS. The model we are proposing is used for the conception of the IS so that the process of retrieving of solution(s) or the responses given by the system to an ISP is based on these behaviours and correspond to the needs of the user.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 16:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Afolabi", "Babajide", "", "LORIA" ], [ "Thiery", "Odile", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0610159
Vaneet Aggarwal
Vaneet Aggarwal, A. Robert Calderbank
Boolean Functions, Projection Operators and Quantum Error Correcting Codes
Submitted to IEEE Transactions on Information Theory, October 2006, to appear in IEEE Transactions on Information Theory, 2008
IEEE Trans. Inf. Theory, vol. 54, no. 4, pp.1700-1707, Apr. 2008.
10.1109/TIT.2008.917720
null
cs.IT math.IT quant-ph
null
This paper describes a fundamental correspondence between Boolean functions and projection operators in Hilbert space. The correspondence is widely applicable, and it is used in this paper to provide a common mathematical framework for the design of both additive and non-additive quantum error correcting codes. The new framework leads to the construction of a variety of codes including an infinite class of codes that extend the original ((5,6,2)) code found by Rains [21]. It also extends to operator quantum error correcting codes.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 16:50:41 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2007 20:58:22 GMT" }, { "version": "v3", "created": "Mon, 24 Sep 2007 13:20:15 GMT" } ]
2009-04-14T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Calderbank", "A. Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0610160
G.Susinder Rajan
G. Susinder Rajan, B. Sundar Rajan
A Non-Orthogonal Distributed Space-Time Coded Protocol Part II-Code Construction and DM-G Tradeoff
Proceedings 2006 IEEE Information Theory Workshop, Chengdu, China (5 pages, No figures)
Proceedings of IEEE ITW'06, Chengdu, China, October 22-26, 2006, pp. 488-492
null
null
cs.IT math.IT
null
This is the second part of a two-part series of papers. In this paper, for the generalized non-orthogonal amplify and forward (GNAF) protocol presented in Part-I, a construction of a new family of distributed space-time codes based on Co-ordinate Interleaved Orthogonal Designs (CIOD) which result in reduced Maximum Likelihood (ML) decoding complexity at the destination is proposed. Further, it is established that the recently proposed Toeplitz space-time codes as well as space-time block codes (STBCs) from cyclic division algebras can be used in GNAF protocol. Finally, a lower bound on the optimal Diversity-Multiplexing Gain (DM-G) tradeoff for the GNAF protocol is established and it is shown that this bound approaches the transmit diversity bound asymptotically as the number of relays and the number of channels uses increases.
[ { "version": "v1", "created": "Sun, 29 Oct 2006 12:49:49 GMT" } ]
2007-07-16T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610161
B.Sundar Rajan
G. Susinder Rajan, B. Sundar Rajan
A Non-Orthogonal Distributed Space-Time Coded Protocol Part I: Signal Model and Design Criteria
5 pages, 2 figures, Proceedings of 2006 IEEE Information Theory Workshop (ITW'06), (A typo in equation (1) in the proceedings has been corrected.)
Proceedings of 2006 IEEE Information Theory Workshop (ITW'06), Oct. 22-26, 2006, Chengdu, China, pp.385-389
null
null
cs.IT math.IT
null
In this two-part series of papers, a generalized non-orthogonal amplify and forward (GNAF) protocol which generalizes several known cooperative diversity protocols is proposed. Transmission in the GNAF protocol comprises of two phases - the broadcast phase and the cooperation phase. In the broadcast phase, the source broadcasts its information to the relays as well as the destination. In the cooperation phase, the source and the relays together transmit a space-time code in a distributed fashion. The GNAF protocol relaxes the constraints imposed by the protocol of Jing and Hassibi on the code structure. In Part-I of this paper, a code design criteria is obtained and it is shown that the GNAF protocol is delay efficient and coding gain efficient as well. Moreover GNAF protocol enables the use of sphere decoders at the destination with a non-exponential Maximum likelihood (ML) decoding complexity. In Part-II, several low decoding complexity code constructions are studied and a lower bound on the Diversity-Multiplexing Gain tradeoff of the GNAF protocol is obtained.
[ { "version": "v1", "created": "Sun, 29 Oct 2006 13:43:39 GMT" } ]
2007-07-16T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610162
B.Sundar Rajan
Sanjay Karmakar, B. Sundar Rajan
Multigroup-Decodable STBCs from Clifford Algebras
5 pages, 1 figure, Proceedings of 2006 IEEE Information Theory Workshop (ITW 2006)
Proceedings of 2006 IEEE Information Theory Workshop (ITW 2006), October 22-26, 2006, Chengdu, China, pp.448-452
null
null
cs.IT math.IT
null
A Space-Time Block Code (STBC) in $K$ symbols (variables) is called $g$-group decodable STBC if its maximum-likelihood decoding metric can be written as a sum of $g$ terms such that each term is a function of a subset of the $K$ variables and each variable appears in only one term. In this paper we provide a general structure of the weight matrices of multi-group decodable codes using Clifford algebras. Without assuming that the number of variables in each group to be the same, a method of explicitly constructing the weight matrices of full-diversity, delay-optimal $g$-group decodable codes is presented for arbitrary number of antennas. For the special case of $N_t=2^a$ we construct two subclass of codes: (i) A class of $2a$-group decodable codes with rate $\frac{a}{2^{(a-1)}}$, which is, equivalently, a class of Single-Symbol Decodable codes, (ii) A class of $(2a-2)$-group decodable with rate $\frac{(a-1)}{2^{(a-2)}}$, i.e., a class of Double-Symbol Decodable codes. Simulation results show that the DSD codes of this paper perform better than previously known Quasi-Orthogonal Designs.
[ { "version": "v1", "created": "Sun, 29 Oct 2006 23:11:48 GMT" } ]
2007-07-16T00:00:00
[ [ "Karmakar", "Sanjay", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610163
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
A Taxonomy of Peer-to-Peer Based Complex Queries: a Grid perspective
null
null
null
null
cs.NI cs.DC cs.DS
null
Grid superscheduling requires support for efficient and scalable discovery of resources. Resource discovery activities involve searching for the appropriate resource types that match the user's job requirements. To accomplish this goal, a resource discovery system that supports the desired look-up operation is mandatory. Various kinds of solutions to this problem have been suggested, including the centralised and hierarchical information server approach. However, both of these approaches have serious limitations in regards to scalability, fault-tolerance and network congestion. To overcome these limitations, organising resource information using Peer-to-Peer (P2P) network model has been proposed. Existing approaches advocate an extension to structured P2P protocols, to support the Grid resource information system (GRIS). In this paper, we identify issues related to the design of such an efficient, scalable, fault-tolerant, consistent and practical GRIS system using a P2P network model. We compile these issues into various taxonomies in sections III and IV. Further, we look into existing works that apply P2P based network protocols to GRIS. We think that this taxonomy and its mapping to relevant systems would be useful for academic and industry based researchers who are engaged in the design of scalable Grid systems.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 08:30:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0610164
Bageshri Karkare
Bageshri Karkare (Sathe) and Uday Khedker
Complexity of Data Flow Analysis for Non-Separable Frameworks
Published in the International Conference on Programming Languages and Compilers (PLC) 2006, Las Vegas, U.S.A
null
null
null
cs.PL
null
The complexity of round robin method of intraprocedural data flow analysis is measured in number of iterations over the control flow graph. Existing complexity bounds realistically explain the complexity of only Bit-vector frameworks which are separable. In this paper we define the complexity bounds for non-separable frameworks by quantifying the interdependences among the data flow information of program entities using an Entity Dependence Graph.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 08:39:04 GMT" }, { "version": "v2", "created": "Tue, 31 Oct 2006 09:09:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Karkare", "Bageshri", "", "Sathe" ], [ "Khedker", "Uday", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0610165
Daowen Qiu
Fuchun Liu, Daowen Qiu, Hongyan Xing, and Zhujun Fan
Decentralized Failure Diagnosis of Stochastic Discrete Event Systems
25 pages. Comments and criticisms are welcome
IEEE Transactions on Automatic Control, 53 (2) (2008) 535-546.
null
null
cs.AI
null
Recently, the diagnosability of {\it stochastic discrete event systems} (SDESs) was investigated in the literature, and, the failure diagnosis considered was {\it centralized}. In this paper, we propose an approach to {\it decentralized} failure diagnosis of SDESs, where the stochastic system uses multiple local diagnosers to detect failures and each local diagnoser possesses its own information. In a way, the centralized failure diagnosis of SDESs can be viewed as a special case of the decentralized failure diagnosis presented in this paper with only one projection. The main contributions are as follows: (1) We formalize the notion of codiagnosability for stochastic automata, which means that a failure can be detected by at least one local stochastic diagnoser within a finite delay. (2) We construct a codiagnoser from a given stochastic automaton with multiple projections, and the codiagnoser associated with the local diagnosers is used to test codiagnosability condition of SDESs. (3) We deal with a number of basic properties of the codiagnoser. In particular, a necessary and sufficient condition for the codiagnosability of SDESs is presented. (4) We give a computing method in detail to check whether codiagnosability is violated. And (5) some examples are described to illustrate the applications of the codiagnosability and its computing method.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 09:59:31 GMT" } ]
2010-03-10T00:00:00
[ [ "Liu", "Fuchun", "" ], [ "Qiu", "Daowen", "" ], [ "Xing", "Hongyan", "" ], [ "Fan", "Zhujun", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610166
Thierry Cachat
Thierry Cachat (LIAFA)
Tree Automata Make Ordinal Theory Easy
null
Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, 2006, Proceedings. FSTTCS 2006 (2006) 286-297
null
null
cs.GT
null
We give a new simple proof of the decidability of the First Order Theory of (omega^omega^i,+) and the Monadic Second Order Theory of (omega^i,<), improving the complexity in both cases. Our algorithm is based on tree automata and a new representation of (sets of) ordinals by (infinite) trees.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 11:05:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Cachat", "Thierry", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0610167
Adrian Paschke
Adrian Paschke
ECA-RuleML: An Approach combining ECA Rules with temporal interval-based KR Event/Action Logics and Transactional Update Logics
Republished in Paschke, A.: ECA-RuleML/ECA-LP: A Homogeneous Event-Condition-Action Logic Programming Language, Int. Conf. of Rule Markup Languages (RuleML'06), Athens, Georgia, USA, 2006
null
null
IBIS, TUM, Technical Report 11/05
cs.AI cs.LO cs.MA cs.SE
null
An important problem to be addressed within Event-Driven Architecture (EDA) is how to correctly and efficiently capture and process the event/action-based logic. This paper endeavors to bridge the gap between the Knowledge Representation (KR) approaches based on durable events/actions and such formalisms as event calculus, on one hand, and event-condition-action (ECA) reaction rules extending the approach of active databases that view events as instantaneous occurrences and/or sequences of events, on the other. We propose formalism based on reaction rules (ECA rules) and a novel interval-based event logic and present concrete RuleML-based syntax, semantics and implementation. We further evaluate this approach theoretically, experimentally and on an example derived from common industry use cases and illustrate its benefits.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 11:56:08 GMT" }, { "version": "v2", "created": "Fri, 10 Nov 2006 06:44:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0610168
Dele Oluwade PhD
Dele Oluwade
Presentation Theorems for Coded Character Sets
14 pages, including a page of symbols and a page containing a table
null
null
null
cs.DM
null
The notion of 'presentation', as used in combinatorial group theory, is applied to coded character sets(CCSs) - sets which facilitate the interchange of messages in a digital computer network(DCN) . By grouping each element of the set into two portions and using the idea of group presentation(whereby a group is specified by its set of generators and its set of relators), the presentation of a CCS is described. This is illustrated using the Extended Binary Coded Decimal Interchange Code(EBCDIC) which is one of the most popular CCSs in DCNs. Key words: Group presentation, coded character set, digital computer network
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:03:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Oluwade", "Dele", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0610169
Alireza Bayesteh
Alireza Bayesteh and Amir Keyvan Khandani
On the User Selection for MIMO Broadcast Channels
57 pages 5 figures
null
null
Technical Report #2005-16
cs.IT math.IT
null
In this paper, a downlink communication system, in which a Base Station (BS) equipped with $M$ antennas communicates with $N$ users each equipped with $K$ receive antennas, is considered. An efficient suboptimum algorithm is proposed for selecting a set of users in order to maximize the sum-rate throughput of the system. For the asymptotic case when $N$ tends to infinity, the necessary and sufficient conditions in order to achieve the maximum sum-rate throughput, such that the difference between the achievable sum-rate and the maximum value approaches zero, is derived. The complexity of our algorithm is investigated in terms of the required amount of feedback from the users to the base station, as well as the number of searches required for selecting the users. It is shown that the proposed method is capable of achieving a large portion of the sum-rate capacity, with a very low complexity.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:21:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir Keyvan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0610170
Istvan Szita
Istvan Szita and Andras Lorincz
Low-complexity modular policies: learning to play Pac-Man and a new framework beyond MDPs
23 pages
null
null
null
cs.LG cs.AI
null
In this paper we propose a method that learns to play Pac-Man. We define a set of high-level observation and action modules. Actions are temporally extended, and multiple action modules may be in effect concurrently. A decision of the agent is represented as a rule-based policy. For learning, we apply the cross-entropy method, a recent global optimization algorithm. The learned policies reached better score than the hand-crafted policy, and neared the score of average human players. We argue that learning is successful mainly because (i) the policy space includes the combination of individual actions and thus it is sufficiently rich, (ii) the search is biased towards low-complexity policies and low complexity solutions can be found quickly if they exist. Based on these principles, we formulate a new theoretical framework, which can be found in the Appendix as supporting material.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:44:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Szita", "Istvan", "" ], [ "Lorincz", "Andras", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0610171
Annalisa Marzuoli
Annalisa Marzuoli and Mario Rasetti
Coupling of quantum angular momenta: an insight into analogic/discrete and local/global models of computation
17 pages, 1 figure; Workshop `Natural processes and models of computation' Bologna (Italy) June 16-18 2005; to appear in Natural Computing
Natural Computing Vol 6, No.2 (2007) 151-168
10.1007/s11047-006-9018-4
null
cs.CC quant-ph
null
In the past few years there has been a tumultuous activity aimed at introducing novel conceptual schemes for quantum computing. The approach proposed in (Marzuoli A and Rasetti M 2002, 2005a) relies on the (re)coupling theory of SU(2) angular momenta and can be viewed as a generalization to arbitrary values of the spin variables of the usual quantum-circuit model based on `qubits' and Boolean gates. Computational states belong to finite-dimensional Hilbert spaces labelled by both discrete and continuous parameters, and unitary gates may depend on quantum numbers ranging over finite sets of values as well as continuous (angular) variables. Such a framework is an ideal playground to discuss discrete (digital) and analogic computational processes, together with their relationships occuring when a consistent semiclassical limit takes place on discrete quantum gates. When working with purely discrete unitary gates, the simulator is naturally modelled as families of quantum finite states--machines which in turn represent discrete versions of topological quantum computation models. We argue that our model embodies a sort of unifying paradigm for computing inspired by Nature and, even more ambitiously, a universal setting in which suitably encoded quantum symbolic manipulations of combinatorial, topological and algebraic problems might find their `natural' computational reference model.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 15:44:08 GMT" } ]
2007-06-11T00:00:00
[ [ "Marzuoli", "Annalisa", "" ], [ "Rasetti", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0610172
DaoShun Wang
DaoShun Wang, Feng Yi, Xiaobo Li, Ping Luo and Yiqi Dai
On the Analysis and Generalization of Extended Visual Cryptography Schemes
null
null
null
null
cs.CR
null
An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al. [3] to protect a binary secret image with meaningful (innocent-looking) shares. This is implemented by concatenating an extended matrix to each basis matrix. The minimum size of the extended matrix was obtained from a hypergraph coloring model and the scheme was designed for binary images only [3]. In this paper, we give a more concise derivation for this matrix extension for color images. Furthermore, we present a (k, n) scheme to protect multiple color images with meaningful shares. This scheme is an extension of the (n, n) VCS for multiple binary images proposed in Droste scheme [2].
[ { "version": "v1", "created": "Tue, 31 Oct 2006 03:43:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "DaoShun", "" ], [ "Yi", "Feng", "" ], [ "Li", "Xiaobo", "" ], [ "Luo", "Ping", "" ], [ "Dai", "Yiqi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0610173
Shi Xiao
Shi Xiao and Gaoxi Xiao
On Degree-Based Decentralized Search in Complex Networks
6 pages, 3 figs, shortly published by ECCS'06
null
null
null
cs.PF
null
Decentralized search aims to find the target node in a large network by using only local information. The applications of it include peer-to-peer file sharing, web search and anything else that requires locating a specific target in a complex system. In this paper, we examine the degree-based decentralized search method. Specifically, we evaluate the efficiency of the method in different cases with different amounts of available local information. In addition, we propose a simple refinement algorithm for significantly shortening the length of the route that has been found. Some insights useful for the future developments of efficient decentralized search schemes have been achieved.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 10:09:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Xiao", "Shi", "" ], [ "Xiao", "Gaoxi", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0610174
Marko Samer
Marko Samer, Stefan Szeider
A Fixed-Parameter Algorithm for #SAT with Parameter Incidence Treewidth
9 pages, 1 figure
null
null
null
cs.DS cs.CC cs.LO
null
We present an efficient fixed-parameter algorithm for #SAT parameterized by the incidence treewidth, i.e., the treewidth of the bipartite graph whose vertices are the variables and clauses of the given CNF formula; a variable and a clause are joined by an edge if and only if the variable occurs in the clause. Our algorithm runs in time O(4^k k l N), where k denotes the incidence treewidth, l denotes the size of a largest clause, and N denotes the number of nodes of the tree-decomposition.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 12:58:36 GMT" }, { "version": "v2", "created": "Wed, 21 Feb 2007 20:56:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Samer", "Marko", "" ], [ "Szeider", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0610175
Florentin Smarandache
Jean Dezert, Florentin Smarandache
DSmT: A new paradigm shift for information fusion
11 pages. Presented to Cogis06 International Conference, Paris, France, 2006
null
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been and still remains of primal importance for the development of reliable information fusion systems. In this short survey paper, we present the theory of plausible and paradoxical reasoning, known as DSmT (Dezert-Smarandache Theory) in literature, developed for dealing with imprecise, uncertain and potentially highly conflicting sources of information. DSmT is a new paradigm shift for information fusion and recent publications have shown the interest and the potential ability of DSmT to solve fusion problems where Dempster's rule used in Dempster-Shafer Theory (DST) provides counter-intuitive results or fails to provide useful result at all. This paper is focused on the foundations of DSmT and on its main rules of combination (classic, hybrid and Proportional Conflict Redistribution rules). Shafer's model on which is based DST appears as a particular and specific case of DSm hybrid model which can be easily handled by DSmT as well. Several simple but illustrative examples are given throughout this paper to show the interest and the generality of this new theory.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 14:50:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Dezert", "Jean", "" ], [ "Smarandache", "Florentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0611001
Michael Elkin
Michael Elkin
A near-optimal fully dynamic distributed algorithm for maintaining sparse spanners
null
null
null
null
cs.DS
null
In this paper we devise an extremely efficient fully dynamic distributed algorithm for maintaining sparse spanners. Our resuls also include the first fully dynamic centralized algorithm for the problem with non-trivial bounds for both incremental and decremental update. Finally, we devise a very efficient streaming algorithm for the problem.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 09:36:20 GMT" } ]
2009-09-29T00:00:00
[ [ "Elkin", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0611002
Sergio Servetto
Sergio D. Servetto (Cornell University)
Lattice Quantization with Side Information: Codes, Asymptotics, and Applications in Sensor Networks
Final version, to appear in the IEEE Transactions on Information Theory, in February 2007 (first submission: March 2002)
IEEE Transactions on Information Theory; 53(2):714-731, 2007.
null
null
cs.IT math.IT
null
We consider the problem of rate/distortion with side information available only at the decoder. For the case of jointly-Gaussian source X and side information Y, and mean-squared error distortion, Wyner proved in 1976 that the rate/distortion function for this problem is identical to the conditional rate/distortion function R_{X|Y}, assuming the side information Y is available at the encoder. In this paper we construct a structured class of asymptotically optimal quantizers for this problem: under the assumption of high correlation between source X and side information Y, we show there exist quantizers within our class whose performance comes arbitrarily close to Wyner's bound. As an application illustrating the relevance of the high-correlation asymptotics, we also explore the use of these quantizers in the context of a problem of data compression for sensor networks, in a setup involving a large number of devices collecting highly correlated measurements within a confined area. An important feature of our formulation is that, although the per-node throughput of the network tends to zero as network size increases, so does the amount of information generated by each transmitter. This is a situation likely to be encountered often in practice, which allows us to cast under new--and more ``optimistic''--light some negative results on the transport capacity of large-scale wireless networks.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 08:38:14 GMT" } ]
2007-07-16T00:00:00
[ [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611003
Sergio Servetto
An-swol Hu and Sergio D. Servetto (Cornell University)
A Scalable Protocol for Cooperative Time Synchronization Using Spatial Averaging
Submitted to the IEEE/ACM Transactions on Networking, October 2006. See also cs.IT/0503031
null
null
null
cs.NI cs.IT math.IT
null
Time synchronization is an important aspect of sensor network operation. However, it is well known that synchronization error accumulates over multiple hops. This presents a challenge for large-scale, multi-hop sensor networks with a large number of nodes distributed over wide areas. In this work, we present a protocol that uses spatial averaging to reduce error accumulation in large-scale networks. We provide an analysis to quantify the synchronization improvement achieved using spatial averaging and find that in a basic cooperative network, the skew and offset variance decrease approximately as $1/\bar{N}$ where $\bar{N}$ is the number of cooperating nodes. For general networks, simulation results and a comparison to basic cooperative network results are used to illustrate the improvement in synchronization performance.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 08:47:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Hu", "An-swol", "", "Cornell University" ], [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611004
Lars Birkedal
Lars Birkedal and Rasmus E. M{\o}gelberg and Rasmus Lerchedahl Petersen
Linear Abadi and Plotkin Logic
null
Logical Methods in Computer Science, Volume 2, Issue 5 (November 3, 2006) lmcs:2233
10.2168/LMCS-2(5:2)2006
null
cs.LO
null
We present a formalization of a version of Abadi and Plotkin's logic for parametricity for a polymorphic dual intuitionistic/linear type theory with fixed points, and show, following Plotkin's suggestions, that it can be used to define a wide collection of types, including existential types, inductive types, coinductive types and general recursive types. We show that the recursive types satisfy a universal property called dinaturality, and we develop reasoning principles for the constructed types. In the case of recursive types, the reasoning principle is a mixed induction/coinduction principle, with the curious property that coinduction holds for general relations, but induction only for a limited collection of ``admissible'' relations. A similar property was observed in Pitts' 1995 analysis of recursive types in domain theory. In a future paper we will develop a category theoretic notion of models of the logic presented here, and show how the results developed in the logic can be transferred to the models.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 08:50:11 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2006 14:09:31 GMT" }, { "version": "v3", "created": "Sat, 4 Nov 2006 08:17:08 GMT" } ]
2017-01-11T00:00:00
[ [ "Birkedal", "Lars", "" ], [ "Møgelberg", "Rasmus E.", "" ], [ "Petersen", "Rasmus Lerchedahl", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0611005
Alberto Pepe Mr
Alberto Pepe and Joanne Yeomans
Protocols for Scholarly Communication
8 pages, to appear in Library and Information Systems in Astronomy V
null
null
CERN-OPEN-2006-053
cs.DL
null
CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full open access publishing environment for the particle physics community and the related sciences in the next few years.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 18:59:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Yeomans", "Joanne", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0611006
Julian Togelius
Julian Togelius and Simon M. Lucas
Evolving controllers for simulated car racing
Won the CEC 2005 Best Student Paper Award
Proceedings of the 2005 Congress on Evolutionary Computation, pages 1906-1913
null
null
cs.NE cs.LG cs.RO
null
This paper describes the evolution of controllers for racing a simulated radio-controlled car around a track, modelled on a real physical track. Five different controller architectures were compared, based on neural networks, force fields and action sequences. The controllers use either egocentric (first person), Newtonian (third person) or no information about the state of the car (open-loop controller). The only controller that was able to evolve good racing behaviour was based on a neural network acting on egocentric inputs.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 00:47:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Togelius", "Julian", "" ], [ "Lucas", "Simon M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0611007
Shi Jin
Shi Jin, Matthew R. McKay, Xiqi Gao, Iain B. Collings
MIMO Multichannel Beamforming: SER and Outage Using New Eigenvalue Distributions of Complex Noncentral Wishart Matrices
26 pages, 5 figures, to appear in IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
This paper analyzes MIMO systems with multichannel beamforming in Ricean fading. Our results apply to a wide class of multichannel systems which transmit on the eigenmodes of the MIMO channel. We first present new closed-form expressions for the marginal ordered eigenvalue distributions of complex noncentral Wishart matrices. These are used to characterize the statistics of the signal to noise ratio (SNR) on each eigenmode. Based on this, we present exact symbol error rate (SER) expressions. We also derive closed-form expressions for the diversity order, array gain, and outage probability. We show that the global SER performance is dominated by the subchannel corresponding to the minimum channel singular value. We also show that, at low outage levels, the outage probability varies inversely with the Ricean K-factor for cases where transmission is only on the most dominant subchannel (i.e. a singlechannel beamforming system). Numerical results are presented to validate the theoretical analysis.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 03:44:03 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2006 11:33:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Jin", "Shi", "" ], [ "McKay", "Matthew R.", "" ], [ "Gao", "Xiqi", "" ], [ "Collings", "Iain B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611008
Radoslaw Hofman
Radoslaw Hofman
Why Linear Programming cannot solve large instances of NP-complete problems in polynomial time
null
null
null
null
cs.CC cs.DM cs.DS cs.NA
null
This article discusses ability of Linear Programming models to be used as solvers of NP-complete problems. Integer Linear Programming is known as NP-complete problem, but non-integer Linear Programming problems can be solved in polynomial time, what places them in P class. During past three years there appeared some articles using LP to solve NP-complete problems. This methods use large number of variables (O(n^9)) solving correctly almost all instances that can be solved in reasonable time. Can they solve infinitively large instances? This article gives answer to this question.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 08:40:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofman", "Radoslaw", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0611009
Peter J. Stuckey
Christian Schulte and Peter J. Stuckey
Efficient constraint propagation engines
45 pages, 1 figure, 14 tables
ACM TOPLAS, 31(1) article 2, 2008
null
null
cs.AI cs.PL
null
This paper presents a model and implementation techniques for speeding up constraint propagation. Three fundamental approaches to improving constraint propagation based on propagators as implementations of constraints are explored: keeping track of which propagators are at fixpoint, choosing which propagator to apply next, and how to combine several propagators for the same constraint. We show how idempotence reasoning and events help track fixpoints more accurately. We improve these methods by using them dynamically (taking into account current domains to improve accuracy). We define priority-based approaches to choosing a next propagator and show that dynamic priorities can improve propagation. We illustrate that the use of multiple propagators for the same constraint can be advantageous with priorities, and introduce staged propagators that combine the effects of multiple propagators with priorities for greater efficiency.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 09:55:07 GMT" } ]
2010-09-03T00:00:00
[ [ "Schulte", "Christian", "" ], [ "Stuckey", "Peter J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0611010
Diego Ruano
Diego Ruano
On the structure of generalized toric codes
null
The final version can be found in: Journal of Symbolic Computation. Volume 44, Issue 5, May 2009, Pages 499-506
null
null
cs.IT math.IT
null
Toric codes are obtained by evaluating rational functions of a nonsingular toric variety at the algebraic torus. One can extend toric codes to the so called generalized toric codes. This extension consists on evaluating elements of an arbitrary polynomial algebra at the algebraic torus instead of a linear combination of monomials whose exponents are rational points of a convex polytope. We study their multicyclic and metric structure, and we use them to express their dual and to estimate their minimum distance.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 14:18:07 GMT" } ]
2010-02-25T00:00:00
[ [ "Ruano", "Diego", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611011
Vladimir Vovk
Alexander Gammerman and Vladimir Vovk
Hedging predictions in machine learning
24 pages; 9 figures; 2 tables; a version of this paper (with discussion and rejoinder) is to appear in "The Computer Journal"
Computer Journal, 50:151-177, 2007
10.1093/comjnl/bxl065
On-line Compression Modelling Project (New Series), Working Paper 02
cs.LG
null
Recent advances in machine learning make it possible to design efficient prediction algorithms for data sets with huge numbers of parameters. This paper describes a new technique for "hedging" the predictions output by many such algorithms, including support vector machines, kernel ridge regression, kernel nearest neighbours, and by many other state-of-the-art methods. The hedged predictions for the labels of new objects include quantitative measures of their own accuracy and reliability. These measures are provably valid under the assumption of randomness, traditional in machine learning: the objects and their labels are assumed to be generated independently from the same probability distribution. In particular, it becomes possible to control (up to statistical fluctuations) the number of erroneous predictions by selecting a suitable confidence level. Validity being achieved automatically, the remaining goal of hedged prediction is efficiency: taking full account of the new objects' features and other available information to produce as accurate predictions as possible. This can be done successfully using the powerful machinery of modern machine learning.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 18:44:49 GMT" } ]
2011-11-22T00:00:00
[ [ "Gammerman", "Alexander", "" ], [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0611012
Shi Jin
Shi Jin, Matthew R. McKay, Xiqi Gao, Iain B. Collings
Asymptotic SER and Outage Probability of MIMO MRC in Correlated Fading
10 pages, 2 figures, to appear in IEEE Signal Processing Letters
null
10.1109/LSP.2006.881512
null
cs.IT math.IT
null
This letter derives the asymptotic symbol error rate (SER) and outage probability of multiple-input multiple-output (MIMO) maximum ratio combining (MRC) systems. We consider Rayleigh fading channels with both transmit and receive spatial correlation. Our results are based on new asymptotic expressions which we derive for the p.d.f. and c.d.f. of the maximum eigenvalue of positive-definite quadratic forms in complex Gaussian matrices. We prove that spatial correlation does not affect the diversity order, but that it reduces the array gain and hence increases the SER in the high SNR regime.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 11:26:49 GMT" } ]
2009-11-11T00:00:00
[ [ "Jin", "Shi", "" ], [ "McKay", "Matthew R.", "" ], [ "Gao", "Xiqi", "" ], [ "Collings", "Iain B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611013
Osvaldo Oliveira Jr.
Osvaldo N. Oliveira Jr., Valtencir Zucolotto, Sandra M. Aluisio
Developing strategies to produce better scientific papers: a Recipe for non-native users of English
10 pages, 1 figure
null
null
null
cs.OH
null
In this paper we introduce the AMADEUS strategy, which has been used to produce scientific writing tools for non-native users of English for 15 years, and emphasize a learn-by-doing approach through which students and novice writers can improve their scientific writing. More specifically, we provide a 9-step recipe for the students to compile writing material according to a procedure that has proven efficient in scientific writing courses.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 14:07:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Oliveira", "Osvaldo N.", "Jr." ], [ "Zucolotto", "Valtencir", "" ], [ "Aluisio", "Sandra M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0611014
Rainer Luetticke
Erik Braun, Rainer Luetticke, Ingo Gloeckner, Hermann Helbig
Interactive Problem Solving in Prolog
4 pages, 1 figure, accepted for publication: Interactive computer aided learning (ICL) 2006, International Conference in Villach (Austria). Paper was not published because the authors were not able to participate on the conference
null
null
null
cs.HC cs.CY cs.PL
null
This paper presents an environment for solving Prolog problems which has been implemented as a module for the virtual laboratory VILAB. During the problem solving processes the learners get fast adaptive feedback. As a result analysing the learner's actions the system suggests the use of suitable auxiliary predicates which will also be checked for proper implementation. The focus of the environment has been set on robustness and the integration in VILAB.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 14:34:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Braun", "Erik", "" ], [ "Luetticke", "Rainer", "" ], [ "Gloeckner", "Ingo", "" ], [ "Helbig", "Hermann", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0611015
Kenneth Shum
Kenneth W. Shum and Chi Wan Sung
On the Fairness of Rate Allocation in Gaussian Multiple Access Channel and Broadcast Channel
26 pages
null
null
null
cs.IT math.IT
null
The capacity region of a channel consists of all achievable rate vectors. Picking a particular point in the capacity region is synonymous with rate allocation. The issue of fairness in rate allocation is addressed in this paper. We review several notions of fairness, including max-min fairness, proportional fairness and Nash bargaining solution. Their efficiencies for general multiuser channels are discussed. We apply these ideas to the Gaussian multiple access channel (MAC) and the Gaussian broadcast channel (BC). We show that in the Gaussian MAC, max-min fairness and proportional fairness coincide. For both Gaussian MAC and BC, we devise efficient algorithms that locate the fair point in the capacity region. Some elementary properties of fair rate allocations are proved.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 16:17:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Shum", "Kenneth W.", "" ], [ "Sung", "Chi Wan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611016
Damien Martin-Guillerez
Damien Martin-Guillerez (IRISA / INRIA Rennes), Michel Ban\^atre (IRISA / INRIA Rennes), Paul Couderc (IRISA / INRIA Rennes)
Increasing Data Resilience of Mobile Devices with a Collaborative Backup Service
null
null
null
null
cs.NI
null
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact list back. To avoid data loss when losing or destroying a mobile device like a PDA or a cell phone, data is usually backed-up to a fixed station. However, in the time between the last backup and the failure, important data can have been produced and then lost. To handle this issue, we propose a transparent collaborative backup system. Indeed, by saving data on other mobile devices between two connections to a global infrastructure, we can resist to such scenarios. In this paper, after a general description of such a system, we present a way to replicate data on mobile devices to attain a prerequired resilience for the backup.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 17:16:26 GMT" } ]
2016-08-16T00:00:00
[ [ "Martin-Guillerez", "Damien", "", "IRISA / INRIA Rennes" ], [ "Banâtre", "Michel", "", "IRISA / INRIA Rennes" ], [ "Couderc", "Paul", "", "IRISA / INRIA Rennes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0611017
Wei Kang
W. Kang, S. Ulukus
A New Data Processing Inequality and Its Applications in Distributed Source and Channel Coding
45 pages, 3 figures, submitted to IEEE Trans. Information Theory
null
10.1109/TIT.2010.2090211
null
cs.IT math.IT
null
In the distributed coding of correlated sources, the problem of characterizing the joint probability distribution of a pair of random variables satisfying an n-letter Markov chain arises. The exact solution of this problem is intractable. In this paper, we seek a single-letter necessary condition for this n-letter Markov chain. To this end, we propose a new data processing inequality on a new measure of correlation by means of spectrum analysis. Based on this new data processing inequality, we provide a single-letter necessary condition for the required joint probability distribution. We apply our results to two specific examples involving the distributed coding of correlated sources: multi-terminal rate-distortion region and multiple access channel with correlated sources, and propose new necessary conditions for these two problems.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 21:09:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Kang", "W.", "" ], [ "Ulukus", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611018
Riccardo Pucella
Hubie Chen
Logic Column 17: A Rendezvous of Logic, Complexity, and Algebra
30 pages
null
null
null
cs.LO
null
This article surveys recent advances in applying algebraic techniques to constraint satisfaction problems.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 21:51:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0611019
Vincent Limouzy
Binh-Minh Bui-Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy (LIAFA), Fabien De Montgolfier (LIAFA)
Algorithmic Aspects of a General Modular Decomposition Theory
null
null
null
null
cs.DS
null
A new general decomposition theory inspired from modular graph decomposition is presented. This helps unifying modular decomposition on different structures, including (but not restricted to) graphs. Moreover, even in the case of graphs, the terminology ``module'' not only captures the classical graph modules but also allows to handle 2-connected components, star-cutsets, and other vertex subsets. The main result is that most of the nice algorithmic tools developed for modular decomposition of graphs still apply efficiently on our generalisation of modules. Besides, when an essential axiom is satisfied, almost all the important properties can be retrieved. For this case, an algorithm given by Ehrenfeucht, Gabow, McConnell and Sullivan 1994 is generalised and yields a very efficient solution to the associated decomposition problem.
[ { "version": "v1", "created": "Sat, 4 Nov 2006 18:32:23 GMT" }, { "version": "v2", "created": "Tue, 20 Nov 2007 10:20:28 GMT" } ]
2007-11-20T00:00:00
[ [ "Bui-Xuan", "Binh-Minh", "", "LIRMM" ], [ "Habib", "Michel", "", "LIAFA" ], [ "Limouzy", "Vincent", "", "LIAFA" ], [ "De Montgolfier", "Fabien", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0611020
Joy Bose
J. Bose, S.B. Furber, J.L. Shapiro
An associative memory for the on-line recognition and prediction of temporal sequences
Published in IJCNN 2005, Montreal, Canada
null
10.1109/IJCNN.2005.1556028
null
cs.NE cs.AI
null
This paper presents the design of an associative memory with feedback that is capable of on-line temporal sequence learning. A framework for on-line sequence learning has been proposed, and different sequence learning models have been analysed according to this framework. The network model is an associative memory with a separate store for the sequence context of a symbol. A sparse distributed memory is used to gain scalability. The context store combines the functionality of a neural layer with a shift register. The sensitivity of the machine to the sequence context is controllable, resulting in different characteristic behaviours. The model can store and predict on-line sequences of various types and length. Numerical simulations on the model have been carried out to determine its properties.
[ { "version": "v1", "created": "Sun, 5 Nov 2006 01:15:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bose", "J.", "" ], [ "Furber", "S. B.", "" ], [ "Shapiro", "J. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0611021
Serban Vlad E.
Serban E. Vlad
Relatively inertial delays
the Eleventh Symposium of Mathematics and its Applications, November 2-5, 2006, Timisoara, Romania
null
null
null
cs.OH
null
The paper studies the relatively inertial delays that represent one of the most important concepts in the modeling of the asynchronous circuits.
[ { "version": "v1", "created": "Sun, 5 Nov 2006 08:31:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0611022
Anurag Ganguli
Anurag Ganguli, Jorge Cortes, Francesco Bullo
Multirobot rendezvous with visibility sensors in nonconvex environments
21 pages
null
null
null
cs.RO
null
This paper presents a coordination algorithm for mobile autonomous robots. Relying upon distributed sensing the robots achieve rendezvous, that is, they move to a common location. Each robot is a point mass moving in a nonconvex environment according to an omnidirectional kinematic model. Each robot is equipped with line-of-sight limited-range sensors, i.e., a robot can measure the relative position of any object (robots or environment boundary) if and only if the object is within a given distance and there are no obstacles in-between. The algorithm is designed using the notions of robust visibility, connectivity-preserving constraint sets, and proximity graphs. Simulations illustrate the theoretical results on the correctness of the proposed algorithm, and its performance in asynchronous setups and with sensor measurement and control errors.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 02:50:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguli", "Anurag", "" ], [ "Cortes", "Jorge", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0611023
Surender Baswana
Surender Baswana
Faster Streaming algorithms for graph spanners
16 pages
null
null
null
cs.DS
null
Given an undirected graph $G=(V,E)$ on $n$ vertices, $m$ edges, and an integer $t\ge 1$, a subgraph $(V,E_S)$, $E_S\subseteq E$ is called a $t$-spanner if for any pair of vertices $u,v \in V$, the distance between them in the subgraph is at most $t$ times the actual distance. We present streaming algorithms for computing a $t$-spanner of essentially optimal size-stretch trade offs for any undirected graph. Our first algorithm is for the classical streaming model and works for unweighted graphs only. The algorithm performs a single pass on the stream of edges and requires $O(m)$ time to process the entire stream of edges. This drastically improves the previous best single pass streaming algorithm for computing a $t$-spanner which requires $\theta(mn^{\frac{2}{t}})$ time to process the stream and computes spanner with size slightly larger than the optimal. Our second algorithm is for {\em StreamSort} model introduced by Aggarwal et al. [FOCS 2004], which is the streaming model augmented with a sorting primitive. The {\em StreamSort} model has been shown to be a more powerful and still very realistic model than the streaming model for massive data sets applications. Our algorithm, which works of weighted graphs as well, performs $O(t)$ passes using $O(\log n)$ bits of working memory only. Our both the algorithms require elementary data structures.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 03:09:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Baswana", "Surender", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0611024
Tony Lee T.
Tony T. Lee and Tong Ye
A Relational Approach to Functional Decomposition of Logic Circuits
29 pages, 12 figures, submitted to Discrete Applied Mathematics
null
null
null
cs.DM cs.LG
null
Functional decomposition of logic circuits has profound influence on all quality aspects of the cost-effective implementation of modern digital systems. In this paper, a relational approach to the decomposition of logic circuits is proposed. This approach is parallel to the normalization of relational databases, they are governed by the same concepts of functional dependency (FD) and multi-valued dependency (MVD). It is manifest that the functional decomposition of switching function actually exploits the same idea and serves a similar purpose as database normalization. Partitions play an important role in the decomposition. The interdependency of two partitions can be represented by a bipartite graph. We demonstrate that both FD and MVD can be represented by bipartite graphs with specific topological properties, which are delineated by partitions of minterms. It follows that our algorithms are procedures of constructing those specific bipartite graphs of interest to meet the information-lossless criteria of functional decomposition.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 08:43:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Tony T.", "" ], [ "Ye", "Tong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0611025
Javier Larrosa
Javier Larrosa, Federico Heras, Simon de Givry
A Logical Approach to Efficient Max-SAT solving
null
null
null
null
cs.AI cs.LO
null
Weighted Max-SAT is the optimization version of SAT and many important problems can be naturally encoded as such. Solving weighted Max-SAT is an important problem from both a theoretical and a practical point of view. In recent years, there has been considerable interest in finding efficient solving techniques. Most of this work focus on the computation of good quality lower bounds to be used within a branch and bound DPLL-like algorithm. Most often, these lower bounds are described in a procedural way. Because of that, it is difficult to realize the {\em logic} that is behind. In this paper we introduce an original framework for Max-SAT that stresses the parallelism with classical SAT. Then, we extend the two basic SAT solving techniques: {\em search} and {\em inference}. We show that many algorithmic {\em tricks} used in state-of-the-art Max-SAT solvers are easily expressable in {\em logic} terms with our framework in a unified manner. Besides, we introduce an original search algorithm that performs a restricted amount of {\em weighted resolution} at each visited node. We empirically compare our algorithm with a variety of solving alternatives on several benchmarks. Our experiments, which constitute to the best of our knowledge the most comprehensive Max-sat evaluation ever reported, show that our algorithm is generally orders of magnitude faster than any competitor.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 12:39:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Larrosa", "Javier", "" ], [ "Heras", "Federico", "" ], [ "de Givry", "Simon", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0611026
Susanne Salmon-Alt
Susanne Salmon-Alt (ATILF), Laurent Romary (INRIA Lorraine - LORIA), Jean-Marie Pierrel (ATILF)
Un mod\`ele g\'en\'erique d'organisation de corpus en ligne: application \`a la FReeBank
null
Traitement Automatique des Langues (TAL) 45 (2006) 145-169
null
null
cs.CL
null
The few available French resources for evaluating linguistic models or algorithms on other linguistic levels than morpho-syntax are either insufficient from quantitative as well as qualitative point of view or not freely accessible. Based on this fact, the FREEBANK project intends to create French corpora constructed using manually revised output from a hybrid Constraint Grammar parser and annotated on several linguistic levels (structure, morpho-syntax, syntax, coreference), with the objective to make them available on-line for research purposes. Therefore, we will focus on using standard annotation schemes, integration of existing resources and maintenance allowing for continuous enrichment of the annotations. Prior to the actual presentation of the prototype that has been implemented, this paper describes a generic model for the organization and deployment of a linguistic resource archive, in compliance with the various works currently conducted within international standardization initiatives (TEI and ISO/TC 37/SC 4).
[ { "version": "v1", "created": "Mon, 6 Nov 2006 14:37:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Salmon-Alt", "Susanne", "", "ATILF" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ], [ "Pierrel", "Jean-Marie", "", "ATILF" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0611027
Daniel Augot
Raghav Bhaskar (INRIA Rocquencourt), Paul M\"uhlethaler (INRIA Rocquencourt), Daniel Augot (INRIA Rocquencourt), Cdric Adjih (INRIA Rocquencourt), Saadi Boudjit (INRIA Rocquencourt), Anis Laouiti (INRIA Rocquencourt)
Efficient and Dynamic Group Key Agreement in Ad hoc Networks
null
null
null
null
cs.CR
null
Confidentiality, integrity and authentication are more relevant issues in Ad hoc networks than in wired fixed networks. One way to address these issues is the use of symmetric key cryptography, relying on a secret key shared by all members of the network. But establishing and maintaining such a key (also called the session key) is a non-trivial problem. We show that Group Key Agreement (GKA) protocols are suitable for establishing and maintaining such a session key in these dynamic networks. We take an existing GKA protocol, which is robust to connectivity losses and discuss all the issues for good functioning of this protocol in Ad hoc networks. We give implementation details and network parameters, which significantly reduce the computational burden of using public key cryptography in such networks.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 15:18:47 GMT" } ]
2016-08-16T00:00:00
[ [ "Bhaskar", "Raghav", "", "INRIA Rocquencourt" ], [ "Mühlethaler", "Paul", "", "INRIA\n Rocquencourt" ], [ "Augot", "Daniel", "", "INRIA Rocquencourt" ], [ "Adjih", "Cdric", "", "INRIA\n Rocquencourt" ], [ "Boudjit", "Saadi", "", "INRIA Rocquencourt" ], [ "Laouiti", "Anis", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0611028
Navin Kashyap
Navin Kashyap
A Decomposition Theory for Binary Linear Codes
37 pages, 4 figures; submitted to IEEE Transactions on Information Theory, Nov 2006; revised June 2007
null
10.1109/TIT.2008.924700
null
cs.DM cs.IT math.IT
null
The decomposition theory of matroids initiated by Paul Seymour in the 1980's has had an enormous impact on research in matroid theory. This theory, when applied to matrices over the binary field, yields a powerful decomposition theory for binary linear codes. In this paper, we give an overview of this code decomposition theory, and discuss some of its implications in the context of the recently discovered formulation of maximum-likelihood (ML) decoding of a binary linear code over a discrete memoryless channel as a linear programming problem. We translate matroid-theoretic results of Gr\"otschel and Truemper from the combinatorial optimization literature to give examples of non-trivial families of codes for which the ML decoding problem can be solved in time polynomial in the length of the code. One such family is that consisting of codes $C$ for which the codeword polytope is identical to the Koetter-Vontobel fundamental polytope derived from the entire dual code $C^\perp$. However, we also show that such families of codes are not good in a coding-theoretic sense -- either their dimension or their minimum distance must grow sub-linearly with codelength. As a consequence, we have that decoding by linear programming, when applied to good codes, cannot avoid failing occasionally due to the presence of pseudocodewords.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 19:35:18 GMT" }, { "version": "v2", "created": "Tue, 19 Jun 2007 02:30:02 GMT" } ]
2016-11-18T00:00:00
[ [ "Kashyap", "Navin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611029
Timo Latvala
Armin Biere, Keijo Heljanko, Tommi Junttila, Timo Latvala, and Viktor Schuppan
Linear Encodings of Bounded LTL Model Checking
Final version for Logical Methods in Computer Science CAV 2005 special issue
Logical Methods in Computer Science, Volume 2, Issue 5 (November 15, 2006) lmcs:2236
10.2168/LMCS-2(5:5)2006
null
cs.LO
null
We consider the problem of bounded model checking (BMC) for linear temporal logic (LTL). We present several efficient encodings that have size linear in the bound. Furthermore, we show how the encodings can be extended to LTL with past operators (PLTL). The generalised encoding is still of linear size, but cannot detect minimal length counterexamples. By using the virtual unrolling technique minimal length counterexamples can be captured, however, the size of the encoding is quadratic in the specification. We also extend virtual unrolling to Buchi automata, enabling them to accept minimal length counterexamples. Our BMC encodings can be made incremental in order to benefit from incremental SAT technology. With fairly small modifications the incremental encoding can be further enhanced with a termination check, allowing us to prove properties with BMC. Experiments clearly show that our new encodings improve performance of BMC considerably, particularly in the case of the incremental encoding, and that they are very competitive for finding bugs. An analysis of the liveness-to-safety transformation reveals many similarities to the BMC encodings in this paper. Using the liveness-to-safety translation with BDD-based invariant checking results in an efficient method to find shortest counterexamples that complements the BMC-based approach.
[ { "version": "v1", "created": "Tue, 7 Nov 2006 00:07:26 GMT" }, { "version": "v2", "created": "Wed, 15 Nov 2006 15:49:53 GMT" }, { "version": "v3", "created": "Thu, 16 Nov 2006 09:04:11 GMT" } ]
2017-01-11T00:00:00
[ [ "Biere", "Armin", "" ], [ "Heljanko", "Keijo", "" ], [ "Junttila", "Tommi", "" ], [ "Latvala", "Timo", "" ], [ "Schuppan", "Viktor", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0611030
Ambedkar Dukkipati
Ambedkar Dukkipati
Nonextensive Pythagoras' Theorem
19 pages
null
null
null
cs.IT math.IT
null
Kullback-Leibler relative-entropy, in cases involving distributions resulting from relative-entropy minimization, has a celebrated property reminiscent of squared Euclidean distance: it satisfies an analogue of the Pythagoras' theorem. And hence, this property is referred to as Pythagoras' theorem of relative-entropy minimization or triangle equality and plays a fundamental role in geometrical approaches of statistical estimation theory like information geometry. Equvalent of Pythagoras' theorem in the generalized nonextensive formalism is established in (Dukkipati at el., Physica A, 361 (2006) 124-138). In this paper we give a detailed account of it.
[ { "version": "v1", "created": "Tue, 7 Nov 2006 16:10:43 GMT" }, { "version": "v2", "created": "Wed, 12 Sep 2007 11:41:20 GMT" } ]
2007-09-12T00:00:00
[ [ "Dukkipati", "Ambedkar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611031
Scot Anderson
Scot Anderson, Peter Revesz
Efficient Threshold Aggregation of Moving Objects
Technical report on spatiotemporal aggregation prior to journal submission
null
null
null
cs.DB
null
Calculating aggregation operators of moving point objects, using time as a continuous variable, presents unique problems when querying for congestion in a moving and changing (or dynamic) query space. We present a set of congestion query operators, based on a threshold value, that estimate the following 5 aggregation operations in d-dimensions. 1) We call the count of point objects that intersect the dynamic query space during the query time interval, the CountRange. 2) We call the Maximum (or Minimum) congestion in the dynamic query space at any time during the query time interval, the MaxCount (or MinCount). 3) We call the sum of time that the dynamic query space is congested, the ThresholdSum. 4) We call the number of times that the dynamic query space is congested, the ThresholdCount. And 5) we call the average length of time of all the time intervals when the dynamic query space is congested, the ThresholdAverage. These operators rely on a novel approach to transforming the problem of selection based on position to a problem of selection based on a threshold. These operators can be used to predict concentrations of migrating birds that may carry disease such as Bird Flu and hence the information may be used to predict high risk areas. On a smaller scale, those operators are also applicable to maintaining safety in airplane operations. We present the theory of our estimation operators and provide algorithms for exact operators. The implementations of those operators, and experiments, which include data from more than 7500 queries, indicate that our estimation operators produce fast, efficient results with error under 5%.
[ { "version": "v1", "created": "Tue, 7 Nov 2006 18:23:34 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 19:19:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "Scot", "" ], [ "Revesz", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0611032
Valmir Barbosa
Andre Nathan, Valmir C. Barbosa
V-like formations in flocks of artificial birds
null
Artificial Life 14 (2008), 179-188
10.1162/artl.2008.14.2.179
null
cs.NE
null
We consider flocks of artificial birds and study the emergence of V-like formations during flight. We introduce a small set of fully distributed positioning rules to guide the birds' movements and demonstrate, by means of simulations, that they tend to lead to stabilization into several of the well-known V-like formations that have been observed in nature. We also provide quantitative indicators that we believe are closely related to achieving V-like formations, and study their behavior over a large set of independent simulations.
[ { "version": "v1", "created": "Tue, 7 Nov 2006 20:25:28 GMT" }, { "version": "v2", "created": "Sun, 8 Apr 2007 23:01:48 GMT" } ]
2008-04-11T00:00:00
[ [ "Nathan", "Andre", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0611033
Maria Naya Plasencia
Maria Naya Plasencia (INRIA Rocquencourt)
Cryptanalyse de Achterbahn-128/80
null
null
null
null
cs.CR
null
This paper presents two attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against Achterbahn version 2 and also on an algorithm that makes profit of the short lengths of the constituent registers. ***** Ce papier pr\'{e}sente deux attaques sur Achterbahn-128/80, la derni\`{e}re version d'un des algorithmes propos\'{e}s dans le cadre de eSTREAM. L'attaque sur la version de 80 bits, Achterbahn-80, est en 2^{56.32}. L'attaque sur Achterbahn-128 a besoin de 2^{75.4} calculs et 2^{61} bits de suite chiffrante. Ces attaques sont bas\'{e}es sur une am\'{e}lioration de l'attaque propos\'{e}e par Hell et Johansson sur la version 2 d'Achterbahn et aussi sur un algorithme qui tire profit des petites longueurs des registres.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 07:48:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Plasencia", "Maria Naya", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0611034
Veronika Rehn
Yves Robert (INRIA Rh\^one-Alpes, LIP), Anne Benoit (INRIA Rh\^one-Alpes, LIP), Veronika Rehn (INRIA Rh\^one-Alpes, LIP)
Strategies for Replica Placement in Tree Networks
null
null
null
null
cs.DC
null
In this paper, we discuss and compare several policies to place replicas in tree networks, subject to server capacity and QoS constraints. The client requests are known beforehand, while the number and location of the servers are to be determined. The standard approach in the literature is to enforce that all requests of a client be served by the closest server in the tree. We introduce and study two new policies. In the first policy, all requests from a given client are still processed by the same server, but this server can be located anywhere in the path from the client to the root. In the second policy, the requests of a given client can be processed by multiple servers. One major contribution of this paper is to assess the impact of these new policies on the total replication cost. Another important goal is to assess the impact of server heterogeneity, both from a theoretical and a practical perspective. In this paper, we establish several new complexity results, and provide several efficient polynomial heuristics for NP-complete instances of the problem. These heuristics are compared to an absolute lower bound provided by the formulation of the problem in terms of the solution of an integer linear program.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 08:16:55 GMT" } ]
2016-08-16T00:00:00
[ [ "Robert", "Yves", "", "INRIA Rhône-Alpes, LIP" ], [ "Benoit", "Anne", "", "INRIA\n Rhône-Alpes, LIP" ], [ "Rehn", "Veronika", "", "INRIA Rhône-Alpes, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0611035
Claudio Bettini
Claudio Bettini, X. Sean Wang, Sushil Jajodia
The Role of Quasi-identifiers in k-Anonymity Revisited
17 pages. Submitted for publication
null
null
RT-11-06
cs.DB cs.CR
null
The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anonymization is usually rigorously validated by the authors, the definition of QI remains mostly informal, and different authors seem to have different interpretations of the concept of QI. The purpose of this paper is to provide a formal underpinning of QI and examine the correctness and incorrectness of various interpretations of QI in our formal framework. We observe that in cases where the concept has been used correctly, its application has been conservative; this note provides a formal understanding of the conservative nature in such cases.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 15:03:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bettini", "Claudio", "" ], [ "Wang", "X. Sean", "" ], [ "Jajodia", "Sushil", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0611036
Annie Bouyer
Anne Durand (CRAI), Pierre Drap (CRAI), Elise Meyer (CRAI), Pierre Grussenmeyer (CRAI), Jean-Pierre Perrin (CRAI)
Intra-site Level Cultural Heritage Documentation: Combination of Survey, Modeling and Imagery Data in a Web Information System
null
null
null
null
cs.DL
null
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their potentialities in this scope, but they are not always adapted for the management of features at the scale of a particular archaeological site. Moreover, computer applications in archaeology are often technology driven and software constrained. Thus, we propose a tool that tries to avoid these difficulties. We are developing an information system that works over the Internet and that is joined with a web site. Aims are to assist the work of archaeological sites managers and to be a documentation tool about these sites, dedicated to everyone. We devote therefore our system both to the professionals who are in charge of the site, and to the general public who visits it or who wants to have information on it. The system permits to do exploratory analyses of the data, especially at spatial and temporal levels. We propose to record metadata about the archaeological features in XML and to access these features through interactive 2D and 3D representations, and through queries systems (keywords and images). The 2D images, photos, or vectors are generated in SVG, while 3D models are generated in X3D. Archaeological features are also automatically integrated in a MySQL database. The web site is an exchange platform with the information system and is written in PHP. Our first application case is the medieval castle of Vianden, Luxembourg.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 17:35:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Anne", "", "CRAI" ], [ "Drap", "Pierre", "", "CRAI" ], [ "Meyer", "Elise", "", "CRAI" ], [ "Grussenmeyer", "Pierre", "", "CRAI" ], [ "Perrin", "Jean-Pierre", "", "CRAI" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0611037
Michael Baer
Michael B. Baer
On Conditional Branches in Optimal Decision Trees
5 pages, 2 illustrations; conference version of cs.PF/0604016, accepted to ISIT 2007
null
null
null
cs.PF cs.IT math.IT
null
The decision tree is one of the most fundamental programming abstractions. A commonly used type of decision tree is the alphabetic binary tree, which uses (without loss of generality) ``less than'' versus ''greater than or equal to'' tests in order to determine one of $n$ outcome events. The process of finding an optimal alphabetic binary tree for a known probability distribution on outcome events usually has the underlying assumption that the cost (time) per decision is uniform and thus independent of the outcome of the decision. This assumption, however, is incorrect in the case of software to be optimized for a given microprocessor, e.g., in compiling switch statements or in fine-tuning program bottlenecks. The operation of the microprocessor generally means that the cost for the more likely decision outcome can or will be less -- often far less -- than the less likely decision outcome. Here we formulate a variety of $O(n^3)$-time $O(n^2)$-space dynamic programming algorithms to solve such optimal binary decision tree problems, optimizing for the behavior of processors with predictive branch capabilities, both static and dynamic. In the static case, we use existing results to arrive at entropy-based performance bounds. Solutions to this formulation are often faster in practice than ``optimal'' decision trees as formulated in the literature, and, for small problems, are easily worth the extra complexity in finding the better solution. This can be applied in fast implementation of decoding Huffman codes.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 03:57:33 GMT" }, { "version": "v2", "created": "Tue, 17 Apr 2007 04:38:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611038
Chengshi Liu
Chengshi Liu
Nonsymmetric entropy I: basic concepts and results
5 pages
null
null
null
cs.IT math.IT
null
A new concept named nonsymmetric entropy which generalizes the concepts of Boltzman's entropy and shannon's entropy, was introduced. Maximal nonsymmetric entropy principle was proven. Some important distribution laws were derived naturally from maximal nonsymmetric entropy principle.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 07:03:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Chengshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611039
Maurice Margenstern
Maurice Margenstern, Guentcho Skordev
Substitutions for tilings $\{p,q\}$
null
null
null
2005-102 (Publications du LITA, local research reports)
cs.CG cs.DM
null
In this paper we consider tiling $\{p, q \}$ of the Euclidean space and of the hyperbolic space, and its dual graph $\Gamma_{q, p}$ from a combinatorial point of view. A substitution $\sigma_{q, p}$ on an appropriate finite alphabet is constructed. The homogeneity of graph $\Gamma_{q, p}$ and its generation function are the basic tools for the construction. The tree associated with substitution $\sigma_{q, p}$ is a spanning tree of graph $\Gamma_{q, p}$. Let $u_n$ be the number of tiles of tiling $\{p, q \}$ of generation $n$. The characteristic polynomial of the transition matrix of substitution $\sigma_{q, p}$ is a characteristic polynomial of a linear recurrence. The sequence $(u_n)_{n \geq 0}$ is a solution of this recurrence. The growth of sequence $(u_n)_{n \geq 0}$ is given by the dominant root of the characteristic polynomial.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 07:53:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Margenstern", "Maurice", "" ], [ "Skordev", "Guentcho", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0611040
Ferruccio Guidi
F. Guidi
The Formal System lambda-delta
44 pages, final version for ToCL (with minor changes wrt previous)
null
null
UBLCS-2006-25
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The formal system lambda-delta is a typed lambda calculus that pursues the unification of terms, types, environments and contexts as the main goal. lambda-delta takes some features from the Automath-related lambda calculi and some from the pure type systems, but differs from both in that it does not include the Pi construction while it provides for an abbreviation mechanism at the level of terms. lambda-delta enjoys some important desirable properties such as the confluence of reduction, the correctness of types, the uniqueness of types up to conversion, the subject reduction of the type assignment, the strong normalization of the typed terms and, as a corollary, the decidability of type inference problem.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 11:36:58 GMT" }, { "version": "v10", "created": "Thu, 25 Sep 2008 16:52:34 GMT" }, { "version": "v2", "created": "Mon, 27 Nov 2006 14:55:06 GMT" }, { "version": "v3", "created": "Thu, 25 Jan 2007 15:58:59 GMT" }, { "version": "v4", "created": "Mon, 29 Jan 2007 20:36:10 GMT" }, { "version": "v5", "created": "Mon, 30 Apr 2007 13:48:55 GMT" }, { "version": "v6", "created": "Sat, 25 Aug 2007 09:30:54 GMT" }, { "version": "v7", "created": "Tue, 5 Feb 2008 13:00:48 GMT" }, { "version": "v8", "created": "Tue, 12 Feb 2008 10:38:31 GMT" }, { "version": "v9", "created": "Mon, 26 May 2008 17:57:42 GMT" } ]
2008-09-25T00:00:00
[ [ "Guidi", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0611041
Vladimir P. Gerdt
V. P. Gerdt
Groebner Bases Applied to Systems of Linear Difference Equations
10 pages, Particles and Nuclei, Letters, to appear
null
null
null
cs.SC
null
In this paper we consider systems of partial (multidimensional) linear difference equations. Specifically, such systems arise in scientific computing under discretization of linear partial differential equations and in computational high energy physics as recurrence relations for multiloop Feynman integrals. The most universal algorithmic tool for investigation of linear difference systems is based on their transformation into an equivalent Groebner basis form. We present an algorithm for this transformation implemented in Maple. The algorithm and its implementation can be applied to automatic generation of difference schemes for linear partial differential equations and to reduction of Feynman integrals. Some illustrative examples are given.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 10:41:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Gerdt", "V. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0611042
Vita Hinze-Hoare
Vita Hinze-Hoare
CSCR:Computer Supported Collaborative Research
3 Pages, 2 figures
null
null
null
cs.HC cs.LG
null
It is suggested that a new area of CSCR (Computer Supported Collaborative Research) is distinguished from CSCW and CSCL and that the demarcation between the three areas could do with greater clarification and prescription.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 21:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0611043
Young-Han Kim
Young-Han Kim, Seung-Jean Kim
On the Convexity of log det (I + K X^{-1})
2 pages
null
null
null
cs.IT math.IT
null
A simple proof is given for the convexity of log det (I+K X^{-1}) in the positive definite matrix variable X with a given positive semidefinite K.
[ { "version": "v1", "created": "Fri, 10 Nov 2006 06:41:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Kim", "Young-Han", "" ], [ "Kim", "Seung-Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0611044
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiyatullov
Protection of the information in a complex CAD system of renovation of industrial firms
6 pages, 2 figures, in Russian
null
null
null
cs.CE
null
The threats to security of the information originating owing to involuntary operations of the users of a CAD, and methods of its protection implemented in a complex CAD system of renovation of firms are considered: rollback, autosave, automatic backup copying and electronic subscript. The specificity of a complex CAD is reflected in necessity of rollback and autosave both of the draw and the parametric representations of its parts, which are the information models of the problem-oriented extensions of the CAD
[ { "version": "v1", "created": "Fri, 10 Nov 2006 07:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiyatullov", "Rustem R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0611045
Vladimir Migunov
Vladimir V. Migunov
The evolution of the parametric models of drawings (modules) in the enterprises reconstruction CAD system
8 pages, no figures, in Russian
null
null
null
cs.CE
null
Progressing methods of drawings creating automation is discussed on the basis of so-called modules containing parametric representation of a part of the drawing and the geometrical elements. The stages of evolution of modular technology of automation of engineering are describing alternatives of applying of moduluss for simple association of elements of the drawing without parametric representation with an opportunity of its commenting, for graphic symbols creating in the schemas of automation and drawings of pipelines, for storage of the specific properties of elements, for development of the specialized parts of the project: the axonometric schemas, profiles of outboard pipe networks etc.
[ { "version": "v1", "created": "Fri, 10 Nov 2006 07:56:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0611046
Gian Luca Pozzato
Laura Giordano, Valentina Gliozzi, Nicola Olivetti, and Gian Luca Pozzato
Analytic Tableaux Calculi for KLM Logics of Nonmonotonic Reasoning
54 pages + appendix with proofs
null
null
null
cs.LO cs.AI
null
We present tableau calculi for some logics of nonmonotonic reasoning, as defined by Kraus, Lehmann and Magidor. We give a tableau proof procedure for all KLM logics, namely preferential, loop-cumulative, cumulative and rational logics. Our calculi are obtained by introducing suitable modalities to interpret conditional assertions. We provide a decision procedure for the logics considered, and we study their complexity.
[ { "version": "v1", "created": "Fri, 10 Nov 2006 16:49:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Giordano", "Laura", "" ], [ "Gliozzi", "Valentina", "" ], [ "Olivetti", "Nicola", "" ], [ "Pozzato", "Gian Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0611047
Adrian Paschke
Adrian Paschke
The Reaction RuleML Classification of the Event / Action / State Processing and Reasoning Space
The Reaction RuleML Classification of the Event / Action / State Processing and Reasoning Space extracted from Paschke, A.: ECA-RuleML: An Approach combining ECA Rules with temporal interval-based KR Event/Action Logics and Transactional Update Logics, Internet-based Information Systems, Technical University Munich, Technical Report 11 / 2005
null
null
Paschke, A.: The Reaction RuleML Classification of the Event / Action / State Processing and Reasoning Space, White Paper, October, 2006
cs.AI
null
Reaction RuleML is a general, practical, compact and user-friendly XML-serialized language for the family of reaction rules. In this white paper we give a review of the history of event / action /state processing and reaction rule approaches and systems in different domains, define basic concepts and give a classification of the event, action, state processing and reasoning space as well as a discussion of relevant / related work
[ { "version": "v1", "created": "Fri, 10 Nov 2006 22:03:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0611048
Richard Mayr
Parosh Abdulla, Pritha Mahata, Richard Mayr
Dense-Timed Petri Nets: Checking Zenoness, Token liveness and Boundedness
61 pages, 18 figures
Logical Methods in Computer Science, Volume 3, Issue 1 (February 7, 2007) lmcs:2223
10.2168/LMCS-3(1:1)2007
null
cs.LO
null
We consider Dense-Timed Petri Nets (TPN), an extension of Petri nets in which each token is equipped with a real-valued clock and where the semantics is lazy (i.e., enabled transitions need not fire; time can pass and disable transitions). We consider the following verification problems for TPNs. (i) Zenoness: whether there exists a zeno-computation from a given marking, i.e., an infinite computation which takes only a finite amount of time. We show decidability of zenoness for TPNs, thus solving an open problem from [Escrig et al.]. Furthermore, the related question if there exist arbitrarily fast computations from a given marking is also decidable. On the other hand, universal zenoness, i.e., the question if all infinite computations from a given marking are zeno, is undecidable. (ii) Token liveness: whether a token is alive in a marking, i.e., whether there is a computation from the marking which eventually consumes the token. We show decidability of the problem by reducing it to the coverability problem, which is decidable for TPNs. (iii) Boundedness: whether the size of the reachable markings is bounded. We consider two versions of the problem; namely semantic boundedness where only live tokens are taken into consideration in the markings, and syntactic boundedness where also dead tokens are considered. We show undecidability of semantic boundedness, while we prove that syntactic boundedness is decidable through an extension of the Karp-Miller algorithm.
[ { "version": "v1", "created": "Sat, 11 Nov 2006 00:08:46 GMT" }, { "version": "v2", "created": "Tue, 23 Jan 2007 13:33:21 GMT" } ]
2017-01-11T00:00:00
[ [ "Abdulla", "Parosh", "" ], [ "Mahata", "Pritha", "" ], [ "Mayr", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0611049
Argyn Kuketayev
Argyn Kuketayev
On numerical stability of recursive present value computation method
6 pages, 2 tables
null
null
null
cs.CE cs.NA
null
We analyze numerical stability of a recursive computation scheme of present value (PV) amd show that the absolute error increases exponentially for positive discount rates. We show that reversing the direction of calculations in the recurrence equation yields a robust PV computation routine.
[ { "version": "v1", "created": "Mon, 13 Nov 2006 20:37:42 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2007 02:06:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuketayev", "Argyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0611050
Hans-Rudolf Thomann
Hans-Rudolf Thomann
HowTo Authenticate and Encrypt
null
null
null
null
cs.CR
null
Recently, various side-channel attacks on widely used encryption methods have been discovered. Extensive research is currently undertaken to develop new types of combined encryption and authentication mechanisms. Developers of security systems ask whether to implement methods recommended by international standards or to choose one of the new proposals. We explain the nature of the attacks and how they can be avoided, and recommend a sound, provably secure solution: the CCM standard.
[ { "version": "v1", "created": "Mon, 13 Nov 2006 13:40:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomann", "Hans-Rudolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]