id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0611151 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA) | Collaborative design : managing task interdependencies and multiple
perspectives | null | Interacting With Computers 18, 1 (2006) 1-20 | null | null | cs.HC | null | This paper focuses on two characteristics of collaborative design with
respect to cooperative work: the importance of work interdependencies linked to
the nature of design problems; and the fundamental function of design
cooperative work arrangement which is the confrontation and combination of
perspectives. These two intrinsic characteristics of the design work stress
specific cooperative processes: coordination processes in order to manage task
interdependencies, establishment of common ground and negotiation mechanisms in
order to manage the integration of multiple perspectives in design.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 16:22:18 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 09:05:31 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0611152 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA), G\'eraldine Martin, Elisabeth
Lavigne | Viewpoints in co-design: a field study in concurrent engineering | null | Design Studies 26, 3 (2005) 215-241 | null | null | cs.HC | null | We present a field study aimed at analysing the use of viewpoints in
co-design meetings. A viewpoint is a representation characterised by a certain
combination of constraints. Three types of viewpoints are distinguished:
prescribed viewpoint, discipline-specific viewpoint and integrated viewpoint.
The contribution of our work consists in characterising the viewpoints of
various stakeholders involved in co-design ("design office" disciplines, and
production and maintenance disciplines), the dynamics of viewpoints
confrontation and the cooperative modes that enable these different viewpoints
to be integrated.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 16:24:20 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 09:03:34 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Martin",
"Géraldine",
""
],
[
"Lavigne",
"Elisabeth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0611153 | Francoise Detienne | Patrick D'Astous, Fran\c{c}oise D\'etienne (INRIA), Willemien Visser
(INRIA), Pierre Robillard | Changing our view on design evaluation meetings methodology: a study of
software technical review meetings | null | Design Studies (2004) | null | null | cs.HC | null | By contrast to design meetings, design evaluation meetings (DEMs) have
generally been considered as situations in which, according to DEMs
methodologies, design activities are quite marginal. In a study of DEMs in
software development, i.e. in technical review meetings following a particular
review methodology, we showed: (i) the occurrence of design activities as part
of an argumentation process; (ii) the relative importance of cognitive
synchronisation as a prerequisite for evaluation; (iii) the important role
played in evaluation by argumentation that makes explicit the underlying design
rationale (DR). On the basis of our results, we discuss the potential for using
DR methodologies in this kind of meetings.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 16:55:30 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 09:02:33 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"D'Astous",
"Patrick",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Visser",
"Willemien",
"",
"INRIA"
],
[
"Robillard",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0611154 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA) | Assessing the cognitive consequences of the object-oriented approach: a
survey of empirical research on object-oriented design by individuals and
teams | null | Interacting with Computers 9 (1997) 47-72 | null | null | cs.HC | null | This paper presents a state-of-art review of empirical research on
object-oriented (OO) design. Many claims about the cognitive benefits of the OO
paradigm have been made by its advocates. These claims concern the ease of
designing and reusing software at the individual level as well as the benefits
of this paradigm at the team level. Since these claims are cognitive in nature,
its seems important to assess them empirically. After a brief presentation of
the main concepts of the OO paradigm, the claims about the superiority of OO
design are outlined. The core of this paper consists of a review of empirical
studies of OOD. We first discuss results concerning OOD by individuals. On the
basis of empirical work, we (1) analyse the design activity of novice OO
designers, (2) compare OO design with procedural design and, (3) discuss a
typology of problems relevant for the OO approach. Then we assess the claims
about naturalness and ease of OO design. The next part discusses results on OO
software reuse. On the basis of empirical work, we (1) compare reuse in the OO
versus procedural paradigm, (2) discuss the potential for OO software reuse and
(3) analyse reuse activity in the OO paradigm. Then we assess claims on
reusability. The final part reviews empirical work on OO design by teams. We
present results on communication, coordination, knowledge dissemination and
interactions with clients. Then we assess claims about OOD at the software
design team level. In a general conclusion, we discuss the limitations of these
studies and give some directions for future research.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 16:57:41 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 12:50:34 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0611155 | Deepak Sridhara | Christine A. Kelley, Deepak Sridhara, and Joachim Rosenthal | Zig-zag and Replacement Product Graphs and LDPC Codes | Submitted to Journal of Advances in Mathematics of Communications,
Aug. 2007 | null | null | null | cs.IT math.IT | null | The performance of codes defined from graphs depends on the expansion
property of the underlying graph in a crucial way. Graph products, such as the
zig-zag product and replacement product provide new infinite families of
constant degree expander graphs. The paper investigates the use of zig-zag and
replacement product graphs for the construction of codes on graphs. A
modification of the zig-zag product is also introduced, which can operate on
two unbalanced biregular bipartite graphs.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 03:36:22 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Aug 2007 13:06:44 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Kelley",
"Christine A.",
""
],
[
"Sridhara",
"Deepak",
""
],
[
"Rosenthal",
"Joachim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611156 | K Vinodh | Petros Elia, K. Vinodh, M. Anand and P. Vijay Kumar | D-MG Tradeoff and Optimal Codes for a Class of AF and DF Cooperative
Communication Protocols | 17 pages, 5 figures | null | null | null | cs.IT math.IT | null | We consider cooperative relay communication in a fading channel environment
under the Orthogonal Amplify and Forward (OAF) and Orthogonal and
Non-Orthogonal Selection Decode and Forward (OSDF and NSDF) protocols. For all
these protocols, we compute the Diversity-Multiplexing Gain Tradeoff (DMT). We
construct DMT optimal codes for the protocols which are sphere decodable and,
in certain cases, incur minimum possible delay. Our results establish that the
DMT of the OAF protocol is identical to the DMT of the Non-Orthogonal Amplify
and Forward (NAF) protocol. Two variants of the NSDF protocol are considered:
fixed-NSDF and variable-NSDF protocol. In the variable-NSDF protocol, the
fraction of time duration for which the source alone transmits is allowed to
vary with the rate of communication. Among the class of static
amplify-and-forward and decode-and-forward protocols, the variable-NSDF
protocol is shown to have the best known DMT for any number of relays apart
from the two-relay case. When there are two relays, the variable-NSDF protocol
is shown to improve on the DMT of the best previously-known protocol for higher
values of the multiplexing gain. Our results also establish that the fixed-NSDF
protocol has a better DMT than the NAF protocol for any number of relays.
Finally, we present a DMT optimal code construction for the NAF protocol.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 07:26:10 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Elia",
"Petros",
""
],
[
"Vinodh",
"K.",
""
],
[
"Anand",
"M.",
""
],
[
"Kumar",
"P. Vijay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611157 | Mira Gonen | Reuven Cohen, Mira Gonen, Avishai Wool | Bounding the Bias of Tree-Like Sampling in IP Topologies | 12 pages, 1 figure | null | null | null | cs.NI | null | It is widely believed that the Internet's AS-graph degree distribution obeys
a power-law form. Most of the evidence showing the power-law distribution is
based on BGP data. However, it was recently argued that since BGP collects data
in a tree-like fashion, it only produces a sample of the degree distribution,
and this sample may be biased. This argument was backed by simulation data and
mathematical analysis, which demonstrated that under certain conditions a tree
sampling procedure can produce an artificail power-law in the degree
distribution. Thus, although the observed degree distribution of the AS-graph
follows a power-law, this phenomenon may be an artifact of the sampling
process. In this work we provide some evidence to the contrary. We show, by
analysis and simulation, that when the underlying graph degree distribution
obeys a power-law with an exponent larger than 2, a tree-like sampling process
produces a negligible bias in the sampled degree distribution. Furthermore,
recent data collected from the DIMES project, which is not based on BGP
sampling, indicates that the underlying AS-graph indeed obeys a power-law
degree distribution with an exponent larger than 2. By combining this empirical
data with our analysis, we conclude that the bias in the degree distribution
calculated from BGP data is negligible.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 08:59:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Reuven",
""
],
[
"Gonen",
"Mira",
""
],
[
"Wool",
"Avishai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0611158 | Francoise Detienne | Michael Baker, Fran\c{c}oise D\'etienne (INRIA), Kristine Lundt,
Arnauld S\'ejourn\'e | Articulation entre \'{e}laboration de solutions et argumentation
polyphonique | null | Dans EPIQUE'2003 (2003) | null | null | cs.HC | null | In this paper, we propose an analytical framework that aims to bring out the
nature of participants' contributions to co-design meetings, in a way that
synthesises content and function dimensions, together with the dimension of
dialogicality. We term the resulting global vision of contribution, the
"interactive profile".
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 13:28:29 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Feb 2007 08:10:20 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Baker",
"Michael",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Lundt",
"Kristine",
""
],
[
"Séjourné",
"Arnauld",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0611159 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA), Jean-Marie Burkhardt, Willemien
Visser (INRIA) | Cognitive Effort in Collective Software Design: Methodological
Perspectives in Cognitive Ergonomics | null | Dans 2nd Workshop on Empirical Software Engineering (2003) 17-25 | null | null | cs.HC | null | Empirical software engineering is concerned with measuring, or estimating,
both the effort put into the software process and the quality of its product.
We defend the idea that measuring process effort and product quality and
establishing a relation between the two cannot be performed without a model of
cognitive and collective activities involved in software design, and without
measurement of these activities. This is the object of our field, i.e.
Cognitive Ergonomics of design. After a brief presentation of its theoretical
and methodological foundations, we will discuss a cognitive approach to design
activities and its potential to provide new directions in ESE. Then we will
present and discuss an illustration of the methodological directions we have
proposed for the analysis and measurement of cognitive activities in the
context of collective software design. The two situations analysed are
technical review meetings, and Request For Comments-like procedures in Open
Source Software design.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 09:50:30 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 18:59:25 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Burkhardt",
"Jean-Marie",
"",
"INRIA"
],
[
"Visser",
"Willemien",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0611160 | Kai-Uwe Schmidt | Kai-Uwe Schmidt | Complementary Sets, Generalized Reed-Muller Codes, and Power Control for
OFDM | null | IEEE Trans. Inf. Theory, vol. 53, no. 2, pp. 808-814, 2007 | 10.1109/TIT.2006.889723 | null | cs.IT math.IT | null | The use of error-correcting codes for tight control of the peak-to-mean
envelope power ratio (PMEPR) in orthogonal frequency-division multiplexing
(OFDM) transmission is considered in this correspondence. By generalizing a
result by Paterson, it is shown that each q-phase (q is even) sequence of
length 2^m lies in a complementary set of size 2^{k+1}, where k is a
nonnegative integer that can be easily determined from the generalized Boolean
function associated with the sequence. For small k this result provides a
reasonably tight bound for the PMEPR of q-phase sequences of length 2^m. A new
2^h-ary generalization of the classical Reed-Muller code is then used together
with the result on complementary sets to derive flexible OFDM coding schemes
with low PMEPR. These codes include the codes developed by Davis and Jedwab as
a special case. In certain situations the codes in the present correspondence
are similar to Paterson's code constructions and often outperform them.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 10:38:59 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Schmidt",
"Kai-Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611161 | Kai-Uwe Schmidt | Kai-Uwe Schmidt | On the Peak-to-Mean Envelope Power Ratio of Phase-Shifted Binary Codes | minor revisions, accepted for IEEE Trans. Commun. | IEEE Trans. Commun., vol. 56, no. 11, pp. 1816-1823, 2008 | 10.1109/TCOMM.2008.060652 | null | cs.IT math.IT | null | The peak-to-mean envelope power ratio (PMEPR) of a code employed in
orthogonal frequency-division multiplexing (OFDM) systems can be reduced by
permuting its coordinates and by rotating each coordinate by a fixed phase
shift. Motivated by some previous designs of phase shifts using suboptimal
methods, the following question is considered in this paper. For a given binary
code, how much PMEPR reduction can be achieved when the phase shifts are taken
from a 2^h-ary phase-shift keying (2^h-PSK) constellation? A lower bound on the
achievable PMEPR is established, which is related to the covering radius of the
binary code. Generally speaking, the achievable region of the PMEPR shrinks as
the covering radius of the binary code decreases. The bound is then applied to
some well understood codes, including nonredundant BPSK signaling, BCH codes
and their duals, Reed-Muller codes, and convolutional codes. It is demonstrated
that most (presumably not optimal) phase-shift designs from the literature
attain or approach our bound.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 11:05:41 GMT"
},
{
"version": "v2",
"created": "Fri, 25 May 2007 10:32:51 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Schmidt",
"Kai-Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611162 | Kai-Uwe Schmidt | Kai-Uwe Schmidt | Quaternary Constant-Amplitude Codes for Multicode CDMA | This is the revised journal version | IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1824-1832, April 2009 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A constant-amplitude code is a code that reduces the peak-to-average power
ratio (PAPR) in multicode code-division multiple access (MC-CDMA) systems to
the favorable value 1. In this paper quaternary constant-amplitude codes (codes
over Z_4) of length 2^m with error-correction capabilities are studied. These
codes exist for every positive integer m, while binary constant-amplitude codes
cannot exist if m is odd. Every word of such a code corresponds to a function
from the binary m-tuples to Z_4 having the bent property, i.e., its Fourier
transform has magnitudes 2^{m/2}. Several constructions of such functions are
presented, which are exploited in connection with algebraic codes over Z_4 (in
particular quaternary Reed-Muller, Kerdock, and Delsarte-Goethals codes) to
construct families of quaternary constant-amplitude codes. Mappings from binary
to quaternary constant-amplitude codes are presented as well.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 11:18:51 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Sep 2009 18:04:41 GMT"
}
] | 2009-09-24T00:00:00 | [
[
"Schmidt",
"Kai-Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0611163 | Dimitris Kalles | Dimitris Kalles (Hellenic Open University) | On Measuring the Impact of Human Actions in the Machine Learning of a
Board Game's Playing Policies | Contains 19 pages, 10 figures, 8 tables. Submitted to a journal | null | null | null | cs.AI cs.GT cs.NE | null | We investigate systematically the impact of human intervention in the
training of computer players in a strategy board game. In that game, computer
players utilise reinforcement learning with neural networks for evolving their
playing strategies and demonstrate a slow learning speed. Human intervention
can significantly enhance learning performance, but carry-ing it out
systematically seems to be more of a problem of an integrated game development
environment as opposed to automatic evolutionary learning.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:30:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalles",
"Dimitris",
"",
"Hellenic Open University"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0611164 | Dimitris Kalles | Dimitris Kalles (Hellenic Open University) | Player co-modelling in a strategy board game: discovering how to play
fast | Contains 19 pages, 6 figures, 7 tables. Submitted to a journal | null | null | null | cs.AI cs.LG | null | In this paper we experiment with a 2-player strategy board game where playing
models are evolved using reinforcement learning and neural networks. The models
are evolved to speed up automatic game development based on human involvement
at varying levels of sophistication and density when compared to fully
autonomous playing. The experimental results suggest a clear and measurable
association between the ability to win games and the ability to do that fast,
while at the same time demonstrating that there is a minimum level of human
involvement beyond which no learning really occurs.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:36:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalles",
"Dimitris",
"",
"Hellenic Open University"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0611165 | Valmir Barbosa | Ricardo C. Correa, Valmir C. Barbosa | Partially ordered distributed computations on asynchronous
point-to-point networks | null | Parallel Computing 35 (2009), 12-28 | 10.1016/j.parco.2008.09.011 | null | cs.DC | null | Asynchronous executions of a distributed algorithm differ from each other due
to the nondeterminism in the order in which the messages exchanged are handled.
In many situations of interest, the asynchronous executions induced by
restricting nondeterminism are more efficient, in an application-specific
sense, than the others. In this work, we define partially ordered executions of
a distributed algorithm as the executions satisfying some restricted orders of
their actions in two different frameworks, those of the so-called event- and
pulse-driven computations. The aim of these restrictions is to characterize
asynchronous executions that are likely to be more efficient for some important
classes of applications. Also, an asynchronous algorithm that ensures the
occurrence of partially ordered executions is given for each case. Two of the
applications that we believe may benefit from the restricted nondeterminism are
backtrack search, in the event-driven case, and iterative algorithms for
systems of linear equations, in the pulse-driven case.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 13:01:36 GMT"
}
] | 2016-11-11T00:00:00 | [
[
"Correa",
"Ricardo C.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0611166 | Dimitris Kalles | Dimitris Kalles, Athanassios Papagelis | Lossless fitness inheritance in genetic algorithms for decision trees | Contains 23 pages, 6 figures, 12 tables. Text last updated as of
March 6, 2009. Submitted to a journal | null | null | null | cs.AI cs.DS cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When genetic algorithms are used to evolve decision trees, key tree quality
parameters can be recursively computed and re-used across generations of
partially similar decision trees. Simply storing instance indices at leaves is
enough for fitness to be piecewise computed in a lossless fashion. We show the
derivation of the (substantial) expected speed-up on two bounding case problems
and trace the attractive property of lossless fitness inheritance to the
divide-and-conquer nature of decision trees. The theoretical results are
supported by experimental evidence.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:20:15 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2009 22:43:31 GMT"
}
] | 2009-03-11T00:00:00 | [
[
"Kalles",
"Dimitris",
""
],
[
"Papagelis",
"Athanassios",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0612001 | Matthew Delacorte | Matthew Delacorte | Polynomial Time Symmetry and Isomorphism Testing for Connected Graphs | null | null | null | null | cs.DM | null | We use the concept of a Kirchhoff resistor network (alternatively random walk
on a network) to probe connected graphs and produce symmetry revealing
canonical labelings of the graph(s) nodes and edges.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 14:08:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delacorte",
"Matthew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0612002 | Willemien Visser | Willemien Visser (INRIA Rocquencourt), Brigitte Trousse (INRIA Sophia
Antipolis) | Reuse of designs: Desperately seeking an interdisciplinary cognitive
approach | null | Dans IJCAI Thirteenth International Joint Conference on Artificial
Intelligence Workshop "Reuse of designs: An interdisciplinary cognitive
approach" (1993) | null | null | cs.HC cs.AI | null | This text analyses the papers accepted for the workshop "Reuse of designs: an
interdisciplinary cognitive approach". Several dimensions and questions
considered as important (by the authors and/or by us) are addressed: What about
the "interdisciplinary cognitive" character of the approaches adopted by the
authors? Is design indeed a domain where the use of CBR is particularly
suitable? Are there important distinctions between CBR and other approaches?
Which types of knowledge -other than cases- is being, or might be, used in CBR
systems? With respect to cases: are there different "types" of case and
different types of case use? which formats are adopted for their
representation? do cases have "components"? how are cases organised in the case
memory? Concerning their retrieval: which types of index are used? on which
types of relation is retrieval based? how does one retrieve only a selected
number of cases, i.e., how does one retrieve only the "best" cases? which
processes and strategies are used, by the system and by its user? Finally, some
important aspects of CBR system development are shortly discussed: should CBR
systems be assistance or autonomous systems? how can case knowledge be
"acquired"? what about the empirical evaluation of CBR systems? The conclusion
points out some lacking points: not much attention is paid to the user, and few
papers have indeed adopted an interdisciplinary cognitive approach.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:38:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
],
[
"Trousse",
"Brigitte",
"",
"INRIA Sophia\n Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612003 | Shuvendu Lahiri | Shuvendu K. Lahiri, Thomas Ball, Byron Cook | Predicate Abstraction via Symbolic Decision Procedures | The final accepted paper for Logical Methods in Computer Science,
special issue on CAV 2005. Editor Sriram Rajamani ([email protected]).
Please perform make to build the paper. The pdf file is paper.pdf, and the
comments for the referee's is present in referee_comments | Logical Methods in Computer Science, Volume 3, Issue 2 (April 24,
2007) lmcs:2218 | 10.2168/LMCS-3(2:1)2007 | null | cs.LO cs.PL cs.SC | null | We present a new approach for performing predicate abstraction based on
symbolic decision procedures. Intuitively, a symbolic decision procedure for a
theory takes a set of predicates in the theory and symbolically executes a
decision procedure on all the subsets over the set of predicates. The result of
the symbolic decision procedure is a shared expression (represented by a
directed acyclic graph) that implicitly represents the answer to a predicate
abstraction query.
We present symbolic decision procedures for the logic of Equality and
Uninterpreted Functions (EUF) and Difference logic (DIFF) and show that these
procedures run in pseudo-polynomial (rather than exponential) time. We then
provide a method to construct symbolic decision procedures for simple mixed
theories (including the two theories mentioned above) using an extension of the
Nelson-Oppen combination method. We present preliminary evaluation of our
Procedure on predicate abstraction benchmarks from device driver verification
in SLAM.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 19:56:11 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Apr 2007 09:58:05 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Lahiri",
"Shuvendu K.",
""
],
[
"Ball",
"Thomas",
""
],
[
"Cook",
"Byron",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0612004 | Francoise Detienne | Jean-Marie Burkhardt (LEI), Fran\c{c}oise D\'etienne (INRIA), Susan
Wiedenbeck | Object-Oriented Program Comprehension: Effect of Expertise, Task and
Phase | null | Empirical Software Engineering (2002) | null | null | cs.HC | null | The goal of our study is to evaluate the effect on program comprehension of
three factors that have not previously been studied in a single experiment.
These factors are programmer expertise (expert vs. novice), programming task
(documentation vs. reuse), and the development of understanding over time
(phase 1 vs. phase 2). This study is carried out in the context of the mental
model approach to comprehension based on van Dijk and Kintsch's model (1983).
One key aspect of this model is the distinction between two kinds of
representation the reader might construct from a text: 1) the textbase, which
refers to what is said in the text and how it is said, and 2) the situation
model, which represents the situation referred to by the text. We have
evaluated the effect of the three factors mentioned above on the development of
both the textbase (or program model) and the situation model in object-oriented
program comprehension. We found a four-way interaction of expertise, phase,
task and type of model. For the documentation group we found that experts and
novices differ in the elaboration of their situation model but not their
program model. There was no interaction of expertise with phase and type of
model in the documentation group. For the reuse group, there was a three-way
interaction between phase, expertise and type of model. For the novice reuse
group, the effect of the phase was to increase the construction of the
situation model but not the program model. With respect to the task, our
results show that novices do not spontaneously construct a strong situation
model but are able to do so if the task demands it.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:42:06 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 16:56:39 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Burkhardt",
"Jean-Marie",
"",
"LEI"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Wiedenbeck",
"Susan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612005 | Francoise Detienne | Patrick D'Astous, Pierre Robillard, Fran\c{c}oise D\'etienne (INRIA),
Willemien Visser (INRIA Rocquencourt) | Quantitative Measurements of the Influence of Participant Roles during
Peer Review Meetings | null | Empirical Software Engineering 6 (2001) 143-159 | null | null | cs.HC | null | Peer review meetings (PRMs) are formal meetings during which peers
systematically analyze artifacts to improve their quality and report on
non-conformities. This paper presents an approach based on protocol analysis
for quantifying the influence of participant roles during PRMs. Three views are
used to characterize the seven defined participant roles. The project view
defines three roles supervisor, procedure expert and developer. The meeting
view defines two roles: author and reviewer, and the task view defines the
roles reflecting direct and indirect interest in the artifact under review. The
analysis, based on log-linear modeling, shows that review activities have
different patterns, depending on their focus: form or content. The influence of
each role is analyzed with respect to this focus. Interpretation of the
quantitative data leads to the suggestion that PRMs could be improved by
creating three different types of reviews, each of which collects together
specific roles: form review, cognitive synchronization review and content
review.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:43:22 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 13:53:03 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"D'Astous",
"Patrick",
"",
"INRIA"
],
[
"Robillard",
"Pierre",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612006 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Evocation and elaboration of solutions: Different types of
problem-solving actions. An empirical study on the design of an aerospace
artifact | null | Dans COGNITIVA 90. At the crossroads of Artificial Intelligence,
Cognitive science, and Neuroscience (1991) 689-696 | null | null | cs.HC | null | An observational study was conducted on a professional designer working on a
design project in aerospace industry. The protocol data were analyzed in order
to gain insight into the actions the designer used for the development of a
solution to the corresponding problem. Different processes are described: from
the "simple" evocation of a solution existing in memory, to the elaboration of
a "new" solution out of mnesic entities without any clear link to the current
problem. Control is addressed in so far as it concerns the priority among the
different types of development processes: the progression from evocation of a
"standard" solution to elaboration of a "new" solution is supposed to
correspond to the resulting order, that is, the one in which the designer's
activity proceeds. Short discussions of * the double status of "problem" and
"solution," * the problem/solution knowledge units in memory and their access,
and * the different abstraction levels on which problem and solution
representations are developed, are illustrated by the results.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:49:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612007 | Juyul Lee | Juyul Lee and Nihar Jindal | High SNR Analysis for MIMO Broadcast Channels: Dirty Paper Coding vs.
Linear Precoding | 33 pages; Submitted to IEEE Transactions on Information Theory | null | 10.1109/ISIT.2005.1523760 | null | cs.IT math.IT | null | We study the MIMO broadcast channel and compare the achievable throughput for
the optimal strategy of dirty paper coding to that achieved with sub-optimal
and lower complexity linear precoding (e.g., zero-forcing and block
diagonalization) transmission. Both strategies utilize all available spatial
dimensions and therefore have the same multiplexing gain, but an absolute
difference in terms of throughput does exist. The sum rate difference between
the two strategies is analytically computed at asymptotically high SNR, and it
is seen that this asymptotic statistic provides an accurate characterization at
even moderate SNR levels. Furthermore, the difference is not affected by
asymmetric channel behavior when each user a has different average SNR.
Weighted sum rate maximization is also considered, and a similar quantification
of the throughput difference between the two strategies is performed. In the
process, it is shown that allocating user powers in direct proportion to user
weights asymptotically maximizes weighted sum rate. For multiple antenna users,
uniform power allocation across the receive antennas is applied after
distributing power proportional to the user weight.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 01:46:17 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2006 00:05:52 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Lee",
"Juyul",
""
],
[
"Jindal",
"Nihar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612008 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA) | Design Strategies and Knowledge in Object-Oriented Programming: Effects
of Experience | null | Human-Computer Interaction 10, 2-3 (1995) 129-170 | null | null | cs.HC | null | An empirical study was conducted to analyse design strategies and knowledge
used in object-oriented software design. Eight professional programmers
experienced with procedural programming languages and either experienced or not
experienced in object-oriented design strategies related to two central aspects
of the object-oriented paradigm: (1) associating actions, i.e., execution
steps, of a complex plan to different objects and revising a complex plan, and
(2) defining simple plans at different levels in the class hierarchy. As
regards the development of complex plans elements attached to different
objects, our results show that, for beginners in OOP, the description of
objects and the description of actions are not always integrated in an early
design phase, particularly for the declarative problem whereas, for the
programmers experienced in OOP, the description of objects and the description
of actions tend to be integrated in their first drafts of solutions whichever
the problem type. The analysis of design strategies reveal the use of different
knowledge according to subjects' language experience: (1) schemas related to
procedural languages; actions are organized in an execution order, or (2)
schemas related to object-oriented languages; actions and objects are
integrated, and actions are organised around objects.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 11:42:02 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 13:53:45 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612009 | Flore Barcellini | Flore Barcellini (INRIA Rocquencourt), Fran\c{c}oise D\'etienne (INRIA
Rocquencourt), Jean-Marie Burkhardt (LEI) | Users' participation to the design process in an Open Source Software
online community | null | Dans 18th Annual Workshop on Psychology of Programming Interest
Group PPIG'05 (2006) 99-114 | null | null | cs.HC | null | The objective of this research is to analyse the ways members of open-source
software communities participate in design. In particular we focus on how users
of an Open Source (OS) programming language (Python) participate in adding new
functionalities to the language. Indeed, in the OS communities, users are
highly skilled in computer sciences; they do not correspond to the common
representation of end-users and can potentially participate to the design
process. Our study characterizes the Python galaxy and analyses a formal
process to introduce new functionalities to the language called Python
Enhancement Proposal (PEP) from the idea of language evolution to the PEP
implementation. The analysis of a particular pushed-by-users PEP from one
application domain community (financial), shows: that the design process is
distributed and specialized between online and physical interactions spaces;
and there are some cross participants between users and developers communities
which may reveal boundary spanners roles.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 11:42:44 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Barcellini",
"Flore",
"",
"INRIA Rocquencourt"
],
[
"Détienne",
"Françoise",
"",
"INRIA\n Rocquencourt"
],
[
"Burkhardt",
"Jean-Marie",
"",
"LEI"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612010 | Francoise Detienne | Willemien Visser (INRIA Rocquencourt, INRIA), Fran\c{c}oise D\'etienne
(INRIA Rocquencourt, INRIA) | Articulation entre composantes verbale et graphico-gestuelle de
l'interaction dans des r\'{e}unions de conception architecturale | null | Dans SCAN'05 (2005) | null | null | cs.HC | null | This study is focused on the role of external representations, e.g.,
skteches, in collaborative architectural design. In particular, we analyse (1)
the use of graphico-gestural modalities and, (2) the articulation modes between
graphico-gestural and verbal modalities in design interaction. We have
elaborated a first classification which distinguishes between two modes of
articulation, articulation in integrated activities versus articulation in
parallel activities.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 11:43:08 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 09:04:37 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt, INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA Rocquencourt, INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612011 | Hua Xiao | Hua Xiao, Amir H. Banihashemi | Estimation of Bit and Frame Error Rates of Low-Density Parity-Check
Codes on Binary Symmetric Channels | 15 pages, 5 figures, submitted to IEEE Transactions on Communications
on Apr. 24, 2006, revised on Oct. 31, 2006 and Jan. 30, 2007 | null | null | null | cs.IT math.IT | null | A method for estimating the performance of low-density parity-check (LDPC)
codes decoded by hard-decision iterative decoding algorithms on binary
symmetric channels (BSC) is proposed. Based on the enumeration of the smallest
weight error patterns that can not be all corrected by the decoder, this method
estimates both the frame error rate (FER) and the bit error rate (BER) of a
given LDPC code with very good precision for all crossover probabilities of
practical interest. Through a number of examples, we show that the proposed
method can be effectively applied to both regular and irregular LDPC codes and
to a variety of hard-decision iterative decoding algorithms. Compared with the
conventional Monte Carlo simulation, the proposed method has a much smaller
computational complexity, particularly for lower error rates.
| [
{
"version": "v1",
"created": "Sun, 3 Dec 2006 03:07:25 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jan 2007 22:04:37 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Xiao",
"Hua",
""
],
[
"Banihashemi",
"Amir H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612012 | Hariharan Narayanan | Hariharan Narayanan | Geographic Gossip on Geometric Random Graphs via Affine Combinations | 15 pages, submitted | null | null | null | cs.MA cs.IT math.IT | null | In recent times, a considerable amount of work has been devoted to the
development and analysis of gossip algorithms in Geometric Random Graphs. In a
recently introduced model termed "Geographic Gossip," each node is aware of its
position but possesses no further information. Traditionally, gossip protocols
have always used convex linear combinations to achieve averaging. We develop a
new protocol for Geographic Gossip, in which counter-intuitively, we use {\it
non-convex affine combinations} as updates in addition to convex combinations
to accelerate the averaging process. The dependence of the number of
transmissions used by our algorithm on the number of sensors $n$ is $n
\exp(O(\log \log n)^2) = n^{1 + o(1)}$. For the previous algorithm, this
dependence was $\tilde{O}(n^{1.5})$. The exponent 1+ o(1) of our algorithm is
asymptotically optimal. Our algorithm involves a hierarchical structure of
$\log \log n$ depth and is not completely decentralized. However, the extent of
control exercised by a sensor on another is restricted to switching the other
on or off.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 03:20:25 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Narayanan",
"Hariharan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612013 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan, Rajkumar Buyya, James Broberg and Kris
Bubendorfer | Economy-based Content Replication for Peering Content Delivery Networks | Technical Report, GRIDS-TR-2006-20, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia | null | null | null | cs.DC | null | Existing Content Delivery Networks (CDNs) exhibit the nature of closed
delivery networks which do not cooperate with other CDNs and in practice,
islands of CDNs are formed. The logical separation between contents and
services in this context results in two content networking domains. In addition
to that, meeting the Quality of Service requirements of users according to
negotiated Service Level Agreement is crucial for a CDN. Present trends in
content networks and content networking capabilities give rise to the interest
in interconnecting content networks. Hence, in this paper, we present an open,
scalable, and Service-Oriented Architecture (SOA)-based system that assist the
creation of open Content and Service Delivery Networks (CSDNs), which scale and
supports sharing of resources through peering with other CSDNs. To encourage
resource sharing and peering arrangements between different CDN providers at
global level, we propose using market-based models by introducing an
economy-based strategy for content replication.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 06:29:16 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Dec 2006 23:24:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Broberg",
"James",
""
],
[
"Bubendorfer",
"Kris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0612014 | Russell K. Standish | Russell K. Standish | Going Stupid with EcoLab | null | Simulation, Vol 84, 611-618 (2008) | 10.1177/0037549708097 | null | cs.MA | null | In 2005, Railsback et al. proposed a very simple model ({\em Stupid
Model}) that could be implemented within a couple of hours, and later
extended to demonstrate the use of common ABM platform functionality. They
provided implementations of the model in several agent based modelling
platforms, and compared the platforms for ease of implementation of this simple
model, and performance. In this paper, I implement Railsback et al's Stupid
Model in the EcoLab simulation platform, a C++ based modelling platform,
demonstrating that it is a feasible platform for these sorts of models, and
compare the performance of the implementation with Repast, Mason and Swarm
versions.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 11:02:28 GMT"
}
] | 2008-11-12T00:00:00 | [
[
"Standish",
"Russell K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0612015 | Josep Rif\`a | J. Rif\`a, F. Solov'eva, M. Villanueva | On the intersection of additive perfect codes | Submitted to Trans. Inform. Theory | null | null | null | cs.IT math.IT | null | The intersection problem for additive (extended and non-extended) perfect
codes, i.e. which are the possibilities for the number of codewords in the
intersection of two additive codes C1 and C2 of the same length, is
investigated. Lower and upper bounds for the intersection number are computed
and, for any value between these bounds, codes which have this given
intersection value are constructed. For all these codes the abelian group
structure of the intersection is characterized. The parameters of this abelian
group structure corresponding to the intersection codes are computed and lower
and upper bounds for these parameters are established. Finally, constructions
of codes the intersection of which fits any parameters between these bounds are
given.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 12:00:21 GMT"
}
] | 2022-04-26T00:00:00 | [
[
"Rifà",
"J.",
""
],
[
"Solov'eva",
"F.",
""
],
[
"Villanueva",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612016 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA) | Memory of past designs: distinctive roles in individual and collective
design | null | Cognitive Technology Journal 1, 8 (2003) 16-24 | null | null | cs.HC | null | Empirical studies on design have emphasised the role of memory of past
solutions. Design involves the use of generic knowledge as well as episodic
knowledge about past designs for analogous problems : in this way, it involves
the reuse of past designs. We analyse this mechanism of reuse from a
socio-cognitive viewpoint. According to a purely cognitive approach, reuse
involves cognitive mechanisms linked to the problem solving activity itself.
Our socio-cognitive approach accounts for these phenomena as well as reuse
mechanisms linked to cooperation, in particular coordination, and
confrontation/integration of viewpoints.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 13:48:22 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 12:47:49 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612017 | Francoise Detienne | G\'eraldine Martin, Fran\c{c}oise D\'etienne (INRIA), Elisabeth
Lavigne | Confrontation of viewpoints in a concurrent engineering process | null | Integrated design and manufacturing in mechanical
engineeringKluwer Academic Publishers (Ed.) (2002) | null | null | cs.HC | null | We present an empirical study aimed at analysing the use of viewpoints in an
industrial Concurrent Engineering context. Our focus is on the viewpoints
expressed in the argumentative process taking place in evaluation meetings. Our
results show that arguments enabling a viewpoint or proposal to be defended are
often characterized by the use of constraints. One result involved the way in
which the proposals for solutions are assessed during these meetings. We have
revealed the existence of specific assessment modes in these meetings as well
as their combination. Then, we show that, even if some constraints are
apparently identically used by the different specialists involved in meetings,
various meanings and weightings are associated with these constraints by these
different specialists.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 13:49:09 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 12:49:22 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Martin",
"Géraldine",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Lavigne",
"Elisabeth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612018 | Francoise Detienne | Jean-Marie Burkhardt (INRIA, LEI), Fran\c{c}oise D\'etienne (INRIA),
Susan Wiedenbeck | Mental Representations Constructed by Experts and Novices in
Object-Oriented Program Comprehension | null | Dans Human-Computer Interaction, INTERACT'97 (1997) | null | null | cs.HC | null | Previous studies on program comprehension were carried out largely in the
context of procedural languages. Our purpose is to develop and evaluate a
cognitive model of object-oriented (OO) program understanding. Our model is
based on the van Dijk and Kintsch's model of text understanding (1983). One key
aspect of this theoretical approach is the distinction between two kinds of
representation the reader might construct from a text: the textbase and the
situation model. On the basis of results of an experiment we have conducted, we
evaluate the cognitive validity of this distinction in OO program
understanding. We examine how the construction of these two representations is
differentially affected by the programmer's expertise and how they evolve
differentially over time.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 13:50:07 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 12:49:52 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Burkhardt",
"Jean-Marie",
"",
"INRIA, LEI"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Wiedenbeck",
"Susan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612019 | Jacob Ziv | Jacob Ziv | On Finite Memory Universal Data Compression and Classification of
Individual Sequences | The manuscrip was errneously replaced by a different one on a
differnt topic, thus erasing the oricinal manuscript | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | Consider the case where consecutive blocks of N letters of a semi-infinite
individual sequence X over a finite-alphabet are being compressed into binary
sequences by some one-to-one mapping. No a-priori information about X is
available at the encoder, which must therefore adopt a universal
data-compression algorithm. It is known that if the universal LZ77 data
compression algorithm is successively applied to N-blocks then the best
error-free compression for the particular individual sequence X is achieved, as
$N$ tends to infinity. The best possible compression that may be achieved by
any universal data compression algorithm for finite N-blocks is discussed. It
is demonstrated that context tree coding essentially achieves it. Next,
consider a device called classifier (or discriminator) that observes an
individual training sequence X. The classifier's task is to examine individual
test sequences of length N and decide whether the test N-sequence has the same
features as those that are captured by the training sequence X, or is
sufficiently different, according to some appropriatecriterion. Here again, it
is demonstrated that a particular universal context classifier with a
storage-space complexity that is linear in N, is essentially optimal. This may
contribute a theoretical "individual sequence" justification for the
Probabilistic Suffix Tree (PST) approach in learning theory and in
computational biology.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 15:38:47 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Dec 2006 06:48:41 GMT"
},
{
"version": "v3",
"created": "Fri, 1 Jun 2007 16:52:27 GMT"
},
{
"version": "v4",
"created": "Mon, 1 Oct 2007 10:01:48 GMT"
},
{
"version": "v5",
"created": "Tue, 22 Jan 2013 19:00:08 GMT"
},
{
"version": "v6",
"created": "Thu, 24 Jan 2013 05:23:10 GMT"
}
] | 2013-01-25T00:00:00 | [
[
"Ziv",
"Jacob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612020 | Francoise Detienne | G\'eraldine Martin, Fran\c{c}oise D\'etienne (INRIA), Elisabeth
Lavigne | Analysing viewpoints in design through the argumentation process | null | Dans INTERACT 2001 (2001) 521-529 | null | null | cs.OH | null | We present an empirical study aimed at analysing the use of viewpoints in an
industrial Concurrent Engineering context. Our focus is on the viewpoints
expressed in the argumentative process taking place in evaluation meetings. Our
results show that arguments enabling a viewpoint or proposal to be defended are
often characterized by the use of constraints. Firstly, we show that, even if
some constraints are apparently identically used by the different specialists
involved in meetings, various meanings and weightings are associated with these
constraints by these different specialists. Secondly, we show that the implicit
or explicit nature of constraints depends on several interlocutive factors.
Thirdly, we show that an argument often covers not only one constraint but a
network of constraints. The type of combination reflects viewpoints which have
specific status in the meeting. Then, we will propose a first model of the
dynamics of viewpoints confrontation/integration.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 16:26:26 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Martin",
"Géraldine",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Lavigne",
"Elisabeth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0612021 | Francoise Detienne | Fran\c{c}oise D\'etienne, Willemien Visser | Multimodality and parallelism in design interaction: co-designers'
alignment and coalitions | null | Dans COOP'2006 Volume 137 (2006) 118-131 | null | null | cs.HC | null | This paper presents an analysis of various forms of articulation between
graphico-gestural and verbal modalities in parallel interactions between
designers in a collaborative design situation. Based on our methodological
framework, we illustrate several forms of multimodal articulations, that is,
integrated and non-integrated, through extracts from a corpus on an
architectural design meeting. These modes reveal alignment or disalignment
between designers, with respect to the focus of their activities. They also
show different forms of coalition.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 16:27:32 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Mar 2007 20:14:42 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
""
],
[
"Visser",
"Willemien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612022 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Both Generic Design and Different Forms of Designing | null | Dans Wonderground, the 2006 DRS (Design Research Society)
International Conference (2006) | null | null | cs.HC | null | This paper defends an augmented cognitively oriented "generic-design
hypothesis": There are both significant similarities between the design
activities implemented in different situations and crucial differences between
these and other cognitive activities; yet, characteristics of a design
situation (i.e., related to the designers, the artefact, and other task
variables influencing these two) introduce specificities in the corresponding
design activities and cognitive structures that are used. We thus combine the
generic-design hypothesis with that of different "forms" of designing. In this
paper, outlining a number of directions that need further elaboration, we
propose a series of candidate dimensions underlying such forms of design.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 16:28:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612023 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA), Jean-Fran\c{c}ois Rouet, Jean-Marie
Burkhardt (INRIA, LEI), Catherine Deleuze-Dordron | Reusing processes and documenting processes: toward an integrated
framework | null | Dans ECCE8 (1996) 139-144 | null | null | cs.HC | null | This paper presents a cognitive typology of reuse processes, and a cognitive
typology of documenting processes. Empirical studies on design with reuse and
on software documenting provide evidence for a generalized cognitive model.
First, these studies emphasize the cyclical nature of design: cycles of
planning, writing and revising occur. Second, natural language documentation
follows the hierarchy of cognitive entities manipulated during design.
Similarly software reuse involves exploiting various types of knowledge
depending on the phase of design in which reuse is involved. We suggest that
these observations can be explained based on cognitive models of text
processing: the van Dijk and Kintsch (1983) model of text comprehension, and
the Hayes and Flower (1980) model of text production. Based on our generalized
cognitive model, we suggest a framework for documenting reusable components.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 18:45:55 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 12:51:02 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Rouet",
"Jean-François",
"",
"INRIA, LEI"
],
[
"Burkhardt",
"Jean-Marie",
"",
"INRIA, LEI"
],
[
"Deleuze-Dordron",
"Catherine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612024 | Guanding Yu | Peng Cheng, Guanding Yu, Zhaoyang Zhang, Hsiao-Hwa Chen and Peiliang
Qiu | On the Maximum Sum-rate Capacity of Cognitive Multiple Access Channel | 3 pages, 4 figures | null | null | null | cs.IT math.IT | null | We consider the communication scenario where multiple cognitive users wish to
communicate to the same receiver, in the presence of primary transmission. The
cognitive transmitters are assumed to have the side information about the
primary transmission. The capacity region of cognitive users is formulated
under the constraint that the capacity of primary transmission is not changed
as if no cognitive users exist. Moreover, the maximum sum-rate point of the
capacity region is characterized, by optimally allocating the power of each
cognitive user to transmit its own information.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 05:27:28 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Cheng",
"Peng",
""
],
[
"Yu",
"Guanding",
""
],
[
"Zhang",
"Zhaoyang",
""
],
[
"Chen",
"Hsiao-Hwa",
""
],
[
"Qiu",
"Peiliang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612025 | Paul Vitanyi | Paul M.B. Vitanyi (CWI and University of Amsterdam) | Registers | 5 pages, LaTeX, Entry in: Encyclopedia of Algorithms, Ming-Yang Kao,
Ed., Springer, To appear | null | null | null | cs.DC | null | Entry in: Encyclopedia of Algorithms, Ming-Yang Kao, Ed., Springer, To
appear.
Synonyms: Wait-free registers, wait-free shared variables, asynchronous
communication hardware. Problem Definition: Consider a system of asynchronous
processes that communicate among themselves by only executing read and write
operations on a set of shared variables (also known as shared registers). The
system has no global clock or other synchronization primitives.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 16:51:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and University of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0612026 | Trung Nguyen | Trung Nguyen, Jean-Daniel Boissonnat, Frederic Falzon and Christian
Knauer | A disk-covering problem with application in optical interferometry | 10 pages, 8 figures | null | null | null | cs.CG | null | Given a disk O in the plane called the objective, we want to find n small
disks P_1,...,P_n called the pupils such that $\bigcup_{i,j=1}^n P_i \ominus
P_j \supseteq O$, where $\ominus$ denotes the Minkowski difference operator,
while minimizing the number of pupils, the sum of the radii or the total area
of the pupils. This problem is motivated by the construction of very large
telescopes from several smaller ones by so-called Optical Aperture Synthesis.
In this paper, we provide exact, approximate and heuristic solutions to several
variations of the problem.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 15:36:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nguyen",
"Trung",
""
],
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Falzon",
"Frederic",
""
],
[
"Knauer",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0612027 | Igor Grabec | Igor Grabec | Experimental Information and Statistical Modeling of Physical Laws | an article submitted to "IEEE Transactions on Information Theory" | null | null | null | cs.IT cs.IR math.IT | null | Statistical modeling of physical laws connects experiments with mathematical
descriptions of natural phenomena. The modeling is based on the probability
density of measured variables expressed by experimental data via a kernel
estimator. As an objective kernel the scattering function determined by
calibration of the instrument is introduced. This function provides for a new
definition of experimental information and redundancy of experimentation in
terms of information entropy. The redundancy increases with the number of
experiments, while the experimental information converges to a value that
describes the complexity of the data. The difference between the redundancy and
the experimental information is proposed as the model cost function. From its
minimum, a proper number of data in the model is estimated. As an optimal,
nonparametric estimator of the relation between measured variables the
conditional average extracted from the kernel estimator is proposed. The
modeling is demonstrated on noisy chaotic data.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 13:08:24 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Grabec",
"Igor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612028 | Alexey Stepanov | Fedor V. Fomin, Serge Gaspers, Saket Saurabh, Alexey A. Stepanov | Using Combinatorics to Prune Search Trees: Independent and Dominating
Set | This paper has been withdrawn | null | null | null | cs.DS cs.DM | null | This paper has been withdrawn by the author.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 14:42:56 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Dec 2006 09:39:26 GMT"
}
] | 2008-07-07T00:00:00 | [
[
"Fomin",
"Fedor V.",
""
],
[
"Gaspers",
"Serge",
""
],
[
"Saurabh",
"Saket",
""
],
[
"Stepanov",
"Alexey A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0612029 | Ming-Zhe Chen | Ming-Zhe Chen | A Classification of 6R Manipulators | 4 pages | null | null | null | cs.RO | null | This paper presents a classification of generic 6-revolute jointed (6R)
manipulators using homotopy class of their critical point manifold. A part of
classification is listed in this paper because of the complexity of homotopy
class of 4-torus. The results of this classification will serve future research
of the classification and topological properties of maniplators joint space and
workspace.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 16:04:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Ming-Zhe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0612030 | Joris Mooij | Joris Mooij and Bert Kappen | Loop corrections for approximate inference | Technical report, 38 pages, 14 figures | Journal of Machine Learning Research 8(May):1113-1143, 2007 | null | null | cs.AI cs.IT cs.LG math.IT | null | We propose a method for improving approximate inference methods that corrects
for the influence of loops in the graphical model. The method is applicable to
arbitrary factor graphs, provided that the size of the Markov blankets is not
too large. It is an alternative implementation of an idea introduced recently
by Montanari and Rizzo (2005). In its simplest form, which amounts to the
assumption that no loops are present, the method reduces to the minimal Cluster
Variation Method approximation (which uses maximal factors as outer clusters).
On the other hand, using estimates of the effect of loops (obtained by some
approximate inference algorithm) and applying the Loop Correcting (LC) method
usually gives significantly better results than applying the approximate
inference algorithm directly without loop corrections. Indeed, we often observe
that the loop corrected error is approximately the square of the error of the
approximate inference method used to estimate the effect of loops. We compare
different variants of the Loop Correcting method with other approximate
inference methods on a variety of graphical models, including "real world"
networks, and conclude that the LC approach generally obtains the most accurate
results.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 15:57:44 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Mooij",
"Joris",
""
],
[
"Kappen",
"Bert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612031 | Andrew McGregor | Andrew McGregor and S. Muthukrishnan | Estimating Aggregate Properties on Probabilistic Streams | 11 pages | null | null | null | cs.DS cs.DB | null | The probabilistic-stream model was introduced by Jayram et al. \cite{JKV07}.
It is a generalization of the data stream model that is suited to handling
``probabilistic'' data where each item of the stream represents a probability
distribution over a set of possible events. Therefore, a probabilistic stream
determines a distribution over potentially a very large number of classical
"deterministic" streams where each item is deterministically one of the domain
values. The probabilistic model is applicable for not only analyzing streams
where the input has uncertainties (such as sensor data streams that measure
physical processes) but also where the streams are derived from the input data
by post-processing, such as tagging or reconciling inconsistent and poor
quality data.
We present streaming algorithms for computing commonly used aggregates on a
probabilistic stream. We present the first known, one pass streaming algorithm
for estimating the \AVG, improving results in \cite{JKV07}. We present the
first known streaming algorithms for estimating the number of \DISTINCT items
on probabilistic streams. Further, we present extensions to other aggregates
such as the repeat rate, quantiles, etc. In all cases, our algorithms work with
provable accuracy guarantees and within the space constraints of the data
stream model.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 23:34:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGregor",
"Andrew",
""
],
[
"Muthukrishnan",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612032 | Marat Burnashev V. | Marat V. Burnashev | Code Spectrum and Reliability Function: Binary Symmetric Channel | 23 pages, to be published in Problems of Information Transmission | Problems of Information Transmission, vol. 42, no. 4, pp. 3-22,
2006 | null | null | cs.IT math.IT | null | A new approach for upper bounding the channel reliability function using the
code spectrum is described. It allows to treat in a unified way both a low and
a high rate cases. In particular, the earlier known upper bounds are improved,
and a new derivation of the sphere-packing bound is presented.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 02:14:08 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Burnashev",
"Marat V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612033 | Andr\'e Kempe | Andr\'e Kempe | Acronym-Meaning Extraction from Corpora Using Multi-Tape Weighted
Finite-State Machines | 6 pages, LaTeX | null | null | 2006/019 (at Xerox Research Centre Europe, France) | cs.CL cs.DS cs.SC | null | The automatic extraction of acronyms and their meaning from corpora is an
important sub-task of text mining. It can be seen as a special case of string
alignment, where a text chunk is aligned with an acronym. Alternative
alignments have different cost, and ideally the least costly one should give
the correct meaning of the acronym. We show how this approach can be
implemented by means of a 3-tape weighted finite-state machine (3-WFSM) which
reads a text chunk on tape 1 and an acronym on tape 2, and generates all
alternative alignments on tape 3. The 3-WFSM can be automatically generated
from a simple regular expression. No additional algorithms are required at any
stage. Our 3-WFSM has a size of 27 states and 64 transitions, and finds the
best analysis of an acronym in a few milliseconds.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 10:13:12 GMT"
}
] | 2009-08-03T00:00:00 | [
[
"Kempe",
"André",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0612034 | Jean-Marc Fran\c{c}ois | Jean-Marc Francois and Guy Leduc | Predictable Disruption Tolerant Networks and Delivery Guarantees | 9 pages | null | null | null | cs.NI | null | This article studies disruption tolerant networks (DTNs) where each node
knows the probabilistic distribution of contacts with other nodes. It proposes
a framework that allows one to formalize the behaviour of such a network. It
generalizes extreme cases that have been studied before where (a) either nodes
only know their contact frequency with each other or (b) they have a perfect
knowledge of who meets who and when. This paper then gives an example of how
this framework can be used; it shows how one can find a packet forwarding
algorithm optimized to meet the 'delay/bandwidth consumption' trade-off:
packets are duplicated so as to (statistically) guarantee a given delay or
delivery probability, but not too much so as to reduce the bandwidth, energy,
and memory consumption.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 13:57:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Francois",
"Jean-Marc",
""
],
[
"Leduc",
"Guy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612035 | Vincent Gramoli | Antonio Fernandez (LADYR), Vincent Gramoli (IRISA), Ernesto Jimenez
(EUI), Anne-Marie Kermarrec (IRISA), Michel Raynal (IRISA) | Distributed Slicing in Dynamic Systems | null | null | null | null | cs.DC | null | Peer to peer (P2P) systems are moving from application specific architectures
to a generic service oriented design philosophy. This raises interesting
problems in connection with providing useful P2P middleware services that are
capable of dealing with resource assignment and management in a large-scale,
heterogeneous and unreliable environment. One such service, the slicing
service, has been proposed to allow for an automatic partitioning of P2P
networks into groups (slices) that represent a controllable amount of some
resource and that are also relatively homogeneous with respect to that
resource, in the face of churn and other failures. In this report we propose
two algorithms to solve the distributed slicing problem. The first algorithm
improves upon an existing algorithm that is based on gossip-based sorting of a
set of uniform random numbers. We speed up convergence via a heuristic for
gossip peer selection. The second algorithm is based on a different approach:
statistical approximation of the rank of nodes in the ordering. The
scalability, efficiency and resilience to dynamics of both algorithms relies on
their gossip-based models. We present theoretical and experimental results to
prove the viability of these algorithms.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 13:57:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fernandez",
"Antonio",
"",
"LADYR"
],
[
"Gramoli",
"Vincent",
"",
"IRISA"
],
[
"Jimenez",
"Ernesto",
"",
"EUI"
],
[
"Kermarrec",
"Anne-Marie",
"",
"IRISA"
],
[
"Raynal",
"Michel",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0612036 | Fr\'ed\'eric Vivien | Jack Dongarra, Jean-Francois Pineau, Yves Robert, Zhiao Shi, and
Frederic Vivien | Revisiting Matrix Product on Master-Worker Platforms | null | null | null | null | cs.DC cs.MS | null | This paper is aimed at designing efficient parallel matrix-product algorithms
for heterogeneous master-worker platforms. While matrix-product is
well-understood for homogeneous 2D-arrays of processors (e.g., Cannon algorithm
and ScaLAPACK outer product algorithm), there are three key hypotheses that
render our work original and innovative:
- Centralized data. We assume that all matrix files originate from, and must
be returned to, the master.
- Heterogeneous star-shaped platforms. We target fully heterogeneous
platforms, where computational resources have different computing powers.
- Limited memory. Because we investigate the parallelization of large
problems, we cannot assume that full matrix panels can be stored in the worker
memories and re-used for subsequent updates (as in ScaLAPACK).
We have devised efficient algorithms for resource selection (deciding which
workers to enroll) and communication ordering (both for input and result
messages), and we report a set of numerical experiments on various platforms at
Ecole Normale Superieure de Lyon and the University of Tennessee. However, we
point out that in this first version of the report, experiments are limited to
homogeneous platforms.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 14:34:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dongarra",
"Jack",
""
],
[
"Pineau",
"Jean-Francois",
""
],
[
"Robert",
"Yves",
""
],
[
"Shi",
"Zhiao",
""
],
[
"Vivien",
"Frederic",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0612037 | Jerome Leroux | J\'er\^ome Leroux (LaBRI) | Least Significant Digit First Presburger Automata | null | null | null | null | cs.DS | null | Since 1969 \cite{C-MST69,S-SMJ77}, we know that any Presburger-definable set
\cite{P-PCM29} (a set of integer vectors satisfying a formula in the
first-order additive theory of the integers) can be represented by a
state-based symmbolic representation, called in this paper Finite Digit Vector
Automata (FDVA). Efficient algorithms for manipulating these sets have been
recently developed. However, the problem of deciding if a FDVA represents such
a set, is a well-known hard problem first solved by Muchnik in 1991 with a
quadruply-exponential time algorithm. In this paper, we show how to determine
in polynomial time whether a FDVA represents a Presburger-definable set, and we
provide in this positive case a polynomial time algorithm that constructs a
Presburger-formula that defines the same set.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 14:55:36 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Leroux",
"Jérôme",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0612038 | Vladimir Anashin | Vladimir Anashin | Non-Archimedean analysis, T-functions, and cryptography | 53 pages, 9 figures, LaTeX 2e. Lecture notes of a 20-hour course at
the International Summer School `Mathematical Methods and Technologies in
Computer Security' at Lomonosov Moscow State University, July 9--23, 2006 | null | null | null | cs.CR math.DS | null | These are lecture notes of a 20-hour course at the International Summer
School \emph{Mathematical Methods and Technologies in Computer Security} at
Lomonosov Moscow State University, July 9--23, 2006.
Loosely speaking, a $T$-function is a map of $n$-bit words into $n$-bit words
such that each $i$-th bit of image depends only on low-order bits $0,..., i$ of
the pre-image. For example, all arithmetic operations (addition,
multiplication) are $T$-functions, all bitwise logical operations ($\XOR$,
$\AND$, etc.) are $T$-functions. Any composition of $T$-functions is a
$T$-function as well. Thus $T$-functions are natural computer word-oriented
functions.
It turns out that $T$-functions are continuous (and often differentiable!)
functions with respect to the so-called 2-adic distance. This observation gives
a powerful tool to apply 2-adic analysis to construct wide classes of
$T$-functions with provable cryptographic properties (long period, balance,
uniform distribution, high linear complexity, etc.); these functions currently
are being used in new generation of fast stream ciphers. We consider these
ciphers as specific automata that could be associated to dynamical systems on
the space of 2-adic integers. From this view the lectures could be considered
as a course in cryptographic applications of the non-Archimedean dynamics; the
latter has recently attracted significant attention in connection with
applications to physics, biology and cognitive sciences.
During the course listeners study non-Archimedean machinery and its
applications to stream cipher design.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 15:11:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anashin",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
cs/0612039 | Raghav Aras | Raghav Aras (INRIA Lorraine - LORIA), Alain Dutech (INRIA Lorraine -
LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA) | Computing the Equilibria of Bimatrix Games using Dominance Heuristics | null | null | null | null | cs.GT | null | We propose a formulation of a general-sum bimatrix game as a bipartite
directed graph with the objective of establishing a correspondence between the
set of the relevant structures of the graph (in particular elementary cycles)
and the set of the Nash equilibria of the game. We show that finding the set of
elementary cycles of the graph permits the computation of the set of
equilibria. For games whose graphs have a sparse adjacency matrix, this serves
as a good heuristic for computing the set of equilibria. The heuristic also
allows the discarding of sections of the support space that do not yield any
equilibrium, thus serving as a useful pre-processing step for algorithms that
compute the equilibria through support enumeration.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 15:55:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aras",
"Raghav",
"",
"INRIA Lorraine - LORIA"
],
[
"Dutech",
"Alain",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0612040 | Dmitri Krioukov | Dmitri Krioukov, Fan Chung, kc claffy, Marina Fomenkov, Alessandro
Vespignani, Walter Willinger | The Workshop on Internet Topology (WIT) Report | null | ACM SIGCOMM Computer Communication Review (CCR), v.37, n.1,
p.69-73, 2007 | 10.1145/1198255.1198267 | null | cs.NI | null | Internet topology analysis has recently experienced a surge of interest in
computer science, physics, and the mathematical sciences. However, researchers
from these different disciplines tend to approach the same problem from
different angles. As a result, the field of Internet topology analysis and
modeling must untangle sets of inconsistent findings, conflicting claims, and
contradicting statements.
On May 10-12, 2006, CAIDA hosted the Workshop on Internet topology (WIT). By
bringing together a group of researchers spanning the areas of computer
science, physics, and the mathematical sciences, the workshop aimed to improve
communication across these scientific disciplines, enable interdisciplinary
crossfertilization, identify commonalities in the different approaches, promote
synergy where it exists, and utilize the richness that results from exploring
similar problems from multiple perspectives.
This report describes the findings of the workshop, outlines a set of
relevant open research problems identified by participants, and concludes with
recommendations that can benefit all scientific communities interested in
Internet topology research.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 07:56:52 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Krioukov",
"Dmitri",
""
],
[
"Chung",
"Fan",
""
],
[
"claffy",
"kc",
""
],
[
"Fomenkov",
"Marina",
""
],
[
"Vespignani",
"Alessandro",
""
],
[
"Willinger",
"Walter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612041 | Andr\'e Kempe | Andr\'e Kempe | Viterbi Algorithm Generalized for n-Tape Best-Path Search | 12 pages, 3 figures, LaTeX (+ .eps) | Proc. FSMNLP 2009, Pretoria, South Africa. July 21-24. (improved
version). | null | null | cs.CL cs.DS cs.SC | null | We present a generalization of the Viterbi algorithm for identifying the path
with minimal (resp. maximal) weight in a n-tape weighted finite-state machine
(n-WFSM), that accepts a given n-tuple of input strings (s_1,... s_n). It also
allows us to compile the best transduction of a given input n-tuple by a
weighted (n+m)-WFSM (transducer) with n input and m output tapes. Our algorithm
has a worst-case time complexity of O(|s|^n |E| log (|s|^n |Q|)), where n and
|s| are the number and average length of the strings in the n-tuple, and |Q|
and |E| the number of states and transitions in the n-WFSM, respectively. A
straight forward alternative, consisting in intersection followed by classical
shortest-distance search, operates in O(|s|^n (|E|+|Q|) log (|s|^n |Q|)) time.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 08:42:46 GMT"
}
] | 2009-08-03T00:00:00 | [
[
"Kempe",
"André",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0612042 | Gesualdo Scutari | Sergio Barbarossa and Gesualdo Scutari | Decentralized Maximum Likelihood Estimation for Sensor Networks Composed
of Nonlinearly Coupled Dynamical Systems | Journal paper accepted on IEEE Transactions on Signal Processing | null | 10.1109/TSP.2007.893921 | null | cs.DC cs.IT math.IT | null | In this paper we propose a decentralized sensor network scheme capable to
reach a globally optimum maximum likelihood (ML) estimate through
self-synchronization of nonlinearly coupled dynamical systems. Each node of the
network is composed of a sensor and a first-order dynamical system initialized
with the local measurements. Nearby nodes interact with each other exchanging
their state value and the final estimate is associated to the state derivative
of each dynamical system. We derive the conditions on the coupling mechanism
guaranteeing that, if the network observes one common phenomenon, each node
converges to the globally optimal ML estimate. We prove that the synchronized
state is globally asymptotically stable if the coupling strength exceeds a
given threshold. Acting on a single parameter, the coupling strength, we show
how, in the case of nonlinear coupling, the network behavior can switch from a
global consensus system to a spatial clustering system. Finally, we show the
effect of the network topology on the scalability properties of the network and
we validate our theoretical findings with simulation results.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 17:22:48 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Barbarossa",
"Sergio",
""
],
[
"Scutari",
"Gesualdo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612043 | Paul Vitanyi | R. Cilibrasi (CWI), Z. Lotker (CWI), A. Navarra (LaBRI - Univ.
Bordeaux 1), S. Perennes (CNRS/INRIA/Univ. Nice), P. Vitanyi (CWI/Univ.
Amsterdam) | About the Lifespan of Peer to Peer Networks | 15 pages, LaTeX, 1 figure, Proc. 10th Int'nl Conf. Principles Of
Distributed Systems (OPODIS), Lecture Notes in Computer Science, Vol. 4305,
Springer Verlag, Berlin, 2006, 290--305 | null | null | null | cs.DC cs.IR | null | We analyze the ability of peer to peer networks to deliver a complete file
among the peers. Early on we motivate a broad generalization of network
behavior organizing it into one of two successive phases. According to this
view the network has two main states: first centralized - few sources (roots)
hold the complete file, and next distributed - peers hold some parts (chunks)
of the file such that the entire network has the whole file, but no individual
has it. In the distributed state we study two scenarios, first, when the peers
are ``patient'', i.e, do not leave the system until they obtain the complete
file; second, peers are ``impatient'' and almost always leave the network
before obtaining the complete file.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 16:20:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cilibrasi",
"R.",
"",
"CWI"
],
[
"Lotker",
"Z.",
"",
"CWI"
],
[
"Navarra",
"A.",
"",
"LaBRI - Univ.\n Bordeaux 1"
],
[
"Perennes",
"S.",
"",
"CNRS/INRIA/Univ. Nice"
],
[
"Vitanyi",
"P.",
"",
"CWI/Univ.\n Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0612044 | Lifeng Lai | Lifeng Lai and Hesham El Gamal | The Relay-Eavesdropper Channel: Cooperation for Secrecy | 33 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | This paper establishes the utility of user cooperation in facilitating secure
wireless communications. In particular, the four-terminal relay-eavesdropper
channel is introduced and an outer-bound on the optimal rate-equivocation
region is derived. Several cooperation strategies are then devised and the
corresponding achievable rate-equivocation region are characterized. Of
particular interest is the novel Noise-Forwarding (NF) strategy, where the
relay node sends codewords independent of the source message to confuse the
eavesdropper. This strategy is used to illustrate the deaf helper phenomenon,
where the relay is able to facilitate secure communications while being totally
ignorant of the transmitted messages. Furthermore, NF is shown to increase the
secrecy capacity in the reversely degraded scenario, where the relay node fails
to offer performance gains in the classical setting. The gain offered by the
proposed cooperation strategies is then proved theoretically and validated
numerically in the additive White Gaussian Noise (AWGN) channel.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 17:15:14 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612045 | Vincent Borrel | Vincent Borrel, Franck Legendre, Marcelo Dias de Amorim, Serge Fdida | SIMPS: Using Sociology for Personal Mobility | null | null | null | null | cs.NI | null | Assessing mobility in a thorough fashion is a crucial step toward more
efficient mobile network design. Recent research on mobility has focused on two
main points: analyzing models and studying their impact on data transport.
These works investigate the consequences of mobility. In this paper, instead,
we focus on the causes of mobility. Starting from established research in
sociology, we propose SIMPS, a mobility model of human crowd motion. This model
defines two complimentary behaviors, namely socialize and isolate, that
regulate an individual with regard to her/his own sociability level. SIMPS
leads to results that agree with scaling laws observed both in small-scale and
large-scale human motion. Although our model defines only two simple individual
behaviors, we observe many emerging collective behaviors (group
formation/splitting, path formation, and evolution). To our knowledge, SIMPS is
the first model in the networking community that tackles the roots governing
mobility.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 21:29:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borrel",
"Vincent",
""
],
[
"Legendre",
"Franck",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Fdida",
"Serge",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612046 | Kristina Lerman | Kristina Lerman | Social Networks and Social Information Filtering on Digg | 8 pages, 5 figures Submitted to the International Conference on
Weblogs and Social Media | null | null | null | cs.HC cs.AI cs.IR | null | The new social media sites -- blogs, wikis, Flickr and Digg, among others --
underscore the transformation of the Web to a participatory medium in which
users are actively creating, evaluating and distributing information. Digg is a
social news aggregator which allows users to submit links to, vote on and
discuss news stories. Each day Digg selects a handful of stories to feature on
its front page. Rather than rely on the opinion of a few editors, Digg
aggregates opinions of thousands of its users to decide which stories to
promote to the front page.
Digg users can designate other users as ``friends'' and easily track friends'
activities: what new stories they submitted, commented on or read. The friends
interface acts as a \emph{social filtering} system, recommending to user
stories his or her friends liked or found interesting. By tracking the votes
received by newly submitted stories over time, we showed that social filtering
is an effective information filtering approach. Specifically, we showed that
(a) users tend to like stories submitted by friends and (b) users tend to like
stories their friends read and liked. As a byproduct of social filtering,
social networks also play a role in promoting stories to Digg's front page,
potentially leading to ``tyranny of the minority'' situation where a
disproportionate number of front page stories comes from the same small group
of interconnected users. Despite this, social filtering is a promising new
technology that can be used to personalize and tailor information to individual
users: for example, through personal front pages.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:38:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0612047 | Kristina Lerman | Kristina Lerman and Laurie Jones | Social Browsing on Flickr | 8 pages; submitted to the International Conference on Weblogs and
Social Media | null | null | null | cs.HC cs.AI | null | The new social media sites - blogs, wikis, del.icio.us and Flickr, among
others - underscore the transformation of the Web to a participatory medium in
which users are actively creating, evaluating and distributing information. The
photo-sharing site Flickr, for example, allows users to upload photographs,
view photos created by others, comment on those photos, etc. As is common to
other social media sites, Flickr allows users to designate others as
``contacts'' and to track their activities in real time. The contacts (or
friends) lists form the social network backbone of social media sites. We claim
that these social networks facilitate new ways of interacting with information,
e.g., through what we call social browsing. The contacts interface on Flickr
enables users to see latest images submitted by their friends. Through an
extensive analysis of Flickr data, we show that social browsing through the
contacts' photo streams is one of the primary methods by which users find new
images on Flickr. This finding has implications for creating personalized
recommendation systems based on the user's declared contacts lists.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:41:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Laurie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612048 | Changjia Chen | chunxi li and changjia chen | Queue Model of Leaf Degree Keeping Process in Gnutella Network | 3 pages, 6 figures | null | null | null | cs.NI cs.PF | null | Leaf degree keeping process of Gnutella is discussed in this paper. Queue
system based on rules of Gnutella protocol are introduced to modeling this
process. The leaf degree distributions resulted from the queue system and from
our real measurement are compared. The well match of those distributions reveal
that the leaf degree distribution in Gnutella network should not be power law
or power law like as reported before. It is more likely a distribution driven
by certain queue process specified by the protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 00:44:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"li",
"chunxi",
""
],
[
"chen",
"changjia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0612049 | Mylene Pischella Ms | Mylene Pischella, Jean-Claude Belfiore | Power Control in Distributed Cooperative OFDMA Cellular Networks | Withdrawn | null | null | null | cs.IT math.IT | null | This paper has been withdrawn by the author.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 14:10:39 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2007 09:02:37 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Aug 2007 07:35:49 GMT"
},
{
"version": "v4",
"created": "Wed, 19 Sep 2007 10:37:24 GMT"
}
] | 2007-09-19T00:00:00 | [
[
"Pischella",
"Mylene",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612050 | Laurent Buse | Laurent Bus\'e (INRIA Sophia Antipolis), Bernard Mourrain (INRIA
Sophia Antipolis) | Explicit factors of some iterated resultants and discriminants | Selected for presentation at the conference MEGA 2007 (Strobl,
Austria, June 25th - 29th) | Mathematics of Computation / Mathematics of Computation of the
American Mathematical Society 78 (2009) 345--386 | null | null | cs.SC math.AC math.AG | null | In this paper, the result of applying iterative univariate resultant
constructions to multivariate polynomials is analyzed. We consider the input
polynomials as generic polynomials of a given degree and exhibit explicit
decompositions into irreducible factors of several constructions involving two
times iterated univariate resultants and discriminants over the integer
universal ring of coefficients of the entry polynomials. Cases involving from
two to four generic polynomials and resultants or discriminants in one of their
variables are treated. The decompositions into irreducible factors we get are
obtained by exploiting fundamental properties of the univariate resultants and
discriminants and induction on the degree of the polynomials. As a consequence,
each irreducible factor can be separately and explicitly computed in terms of a
certain multivariate resultant. With this approach, we also obtain as direct
corollaries some results conjectured by Collins and McCallum which correspond
to the case of polynomials whose coefficients are themselves generic
polynomials in other variables. Finally, a geometric interpretation of the
algebraic factorization of the iterated discriminant of a single polynomial is
detailled.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 14:10:38 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Oct 2007 17:02:20 GMT"
}
] | 2008-10-29T00:00:00 | [
[
"Busé",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Mourrain",
"Bernard",
"",
"INRIA\n Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
cs/0612051 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | On the Decoder Error Probability of Bounded Rank-Distance Decoders for
Maximum Rank Distance Codes | 5 pages. To appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | In this paper, we first introduce the concept of elementary linear subspace,
which has similar properties to those of a set of coordinates. We then use
elementary linear subspaces to derive properties of maximum rank distance (MRD)
codes that parallel those of maximum distance separable codes. Using these
properties, we show that, for MRD codes with error correction capability t, the
decoder error probability of bounded rank distance decoders decreases
exponentially with t^2 based on the assumption that all errors with the same
rank are equally likely.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 15:29:15 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 18:19:41 GMT"
}
] | 2008-03-03T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612052 | Jon Feldman | Jon Feldman, S. Muthukrishnan, Martin Pal, Cliff Stein | Budget Optimization in Search-Based Advertising Auctions | null | null | null | null | cs.DS cs.CE cs.GT | null | Internet search companies sell advertisement slots based on users' search
queries via an auction. While there has been a lot of attention on the auction
process and its game-theoretic aspects, our focus is on the advertisers. In
particular, the advertisers have to solve a complex optimization problem of how
to place bids on the keywords of their interest so that they can maximize their
return (the number of user clicks on their ads) for a given budget. We model
the entire process and study this budget optimization problem. While most
variants are NP hard, we show, perhaps surprisingly, that simply randomizing
between two uniform strategies that bid equally on all the keywords works well.
More precisely, this strategy gets at least 1-1/e fraction of the maximum
clicks possible. Such uniform strategies are likely to be practical. We also
present inapproximability results, and optimal algorithms for variants of the
budget optimization problem.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 17:33:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Pal",
"Martin",
""
],
[
"Stein",
"Cliff",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0612053 | Xiaofei Huang | Xiaofei Huang, Xiaowu Huang | Deriving Schrodinger Equation From A Soft-Decision Iterative Decoding
Algorithm | An extended abstract version of this paper has been presented at
International Conference on Quantum Foundation and Technology, August, 2006,
HangZhou, China (ICQFT'06) | null | null | null | cs.IT math.IT | null | The belief propagation algorithm has been recognized in the information
theory community as a soft-decision iterative decoding algorithm. It is the
most powerful algorithm found so far for attacking hard optimization problems
in channel decoding. Quantum mechanics is the foundation of modern physics with
the time-independent Schrodinger equation being one of the most important
equations. This paper shows that the equation can be derived from a generalized
belief propagation algorithm. Such a connection on a mathematical basis might
shed new insights into the foundations of quantum mechanics and quantum
computing.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 18:06:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Huang",
"Xiaofei",
""
],
[
"Huang",
"Xiaowu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612054 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | Lightweight security mechanism for PSTN-VoIP cooperation | 6 pages, 5 figures | null | null | null | cs.CR cs.MM | null | In this paper we describe a new, lightweight security mechanism for PSTN-VoIP
cooperation that is based on two information hiding techniques: digital
watermarking and steganography. Proposed scheme is especially suitable for
PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular
application of IP Telephony systems. With the use of this mechanism we
authenticate end-to-end transmitted voice between PSTN users. Additionally we
improve IP part traffic security (both media stream and VoIP signalling
messages). Exemplary scenario is presented for SIP signalling protocol along
with SIP-T extension and H.248/Megaco protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:05:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0612055 | Milan Ruzic | Anna Pagh and Rasmus Pagh and Milan Ruzic | Linear Probing with Constant Independence | 13 pages | null | null | null | cs.DS cs.DB | null | Hashing with linear probing dates back to the 1950s, and is among the most
studied algorithms. In recent years it has become one of the most important
hash table organizations since it uses the cache of modern computers very well.
Unfortunately, previous analysis rely either on complicated and space consuming
hash functions, or on the unrealistic assumption of free access to a truly
random hash function. Already Carter and Wegman, in their seminal paper on
universal hashing, raised the question of extending their analysis to linear
probing. However, we show in this paper that linear probing using a pairwise
independent family may have expected {\em logarithmic} cost per operation. On
the positive side, we show that 5-wise independence is enough to ensure
constant expected time per operation. This resolves the question of finding a
space and time efficient hash function that provably ensures good performance
for linear probing.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:50:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pagh",
"Anna",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Ruzic",
"Milan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612056 | Gayathree U | U. Gayathree | Conscious Intelligent Systems - Part 1 : I X I | null | null | null | null | cs.AI | null | Did natural consciousness and intelligent systems arise out of a path that
was co-evolutionary to evolution? Can we explain human self-consciousness as
having risen out of such an evolutionary path? If so how could it have been?
In this first part of a two-part paper (titled IXI), we take a learning
system perspective to the problem of consciousness and intelligent systems, an
approach that may look unseasonable in this age of fMRI's and high tech
neuroscience.
We posit conscious intelligent systems in natural environments and wonder how
natural factors influence their design paths. Such a perspective allows us to
explain seamlessly a variety of natural factors, factors ranging from the rise
and presence of the human mind, man's sense of I, his self-consciousness and
his looping thought processes to factors like reproduction, incubation,
extinction, sleep, the richness of natural behavior, etc. It even allows us to
speculate on a possible human evolution scenario and other natural phenomena.
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2006 17:18:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayathree",
"U.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612057 | Gayathree U | U. Gayathree | Conscious Intelligent Systems - Part II - Mind, Thought, Language and
Understanding | null | null | null | null | cs.AI | null | This is the second part of a paper on Conscious Intelligent Systems. We use
the understanding gained in the first part (Conscious Intelligent Systems Part
1: IXI (arxiv id cs.AI/0612056)) to look at understanding. We see how the
presence of mind affects understanding and intelligent systems; we see that the
presence of mind necessitates language. The rise of language in turn has
important effects on understanding. We discuss the humanoid question and how
the question of self-consciousness (and by association mind/thought/language)
would affect humanoids too.
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2006 17:28:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayathree",
"U.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612058 | Eric Vigoda | Daniel Stefankovic, Santosh Vempala, Eric Vigoda | Adaptive Simulated Annealing: A Near-optimal Connection between Sampling
and Counting | null | null | null | null | cs.DS cs.DM | null | We present a near-optimal reduction from approximately counting the
cardinality of a discrete set to approximately sampling elements of the set. An
important application of our work is to approximating the partition function
$Z$ of a discrete system, such as the Ising model, matchings or colorings of a
graph. The typical approach to estimating the partition function $Z(\beta^*)$
at some desired inverse temperature $\beta^*$ is to define a sequence, which we
call a {\em cooling schedule}, $\beta_0=0<\beta_1<...<\beta_\ell=\beta^*$ where
Z(0) is trivial to compute and the ratios $Z(\beta_{i+1})/Z(\beta_i)$ are easy
to estimate by sampling from the distribution corresponding to $Z(\beta_i)$.
Previous approaches required a cooling schedule of length $O^*(\ln{A})$ where
$A=Z(0)$, thereby ensuring that each ratio $Z(\beta_{i+1})/Z(\beta_i)$ is
bounded. We present a cooling schedule of length $\ell=O^*(\sqrt{\ln{A}})$.
For well-studied problems such as estimating the partition function of the
Ising model, or approximating the number of colorings or matchings of a graph,
our cooling schedule is of length $O^*(\sqrt{n})$, which implies an overall
savings of $O^*(n)$ in the running time of the approximate counting algorithm
(since roughly $\ell$ samples are needed to estimate each ratio).
| [
{
"version": "v1",
"created": "Sun, 10 Dec 2006 20:00:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stefankovic",
"Daniel",
""
],
[
"Vempala",
"Santosh",
""
],
[
"Vigoda",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0612059 | Herve Jegou | Simon Malinowski (IRISA / INRIA Rennes), Herv\'e J\'egou (IRISA /
INRIA Rennes, INRIA Rh\^one-Alpes / GRAVIR-IMAG), Christine Guillemot (IRISA
/ INRIA Rennes) | Synchronization recovery and state model reduction for soft decoding of
variable length codes | null | IEEE transactions on information theory (2006) | null | null | cs.NI cs.IT math.IT | null | Variable length codes exhibit de-synchronization problems when transmitted
over noisy channels. Trellis decoding techniques based on Maximum A Posteriori
(MAP) estimators are often used to minimize the error rate on the estimated
sequence. If the number of symbols and/or bits transmitted are known by the
decoder, termination constraints can be incorporated in the decoding process.
All the paths in the trellis which do not lead to a valid sequence length are
suppressed. This paper presents an analytic method to assess the expected error
resilience of a VLC when trellis decoding with a sequence length constraint is
used. The approach is based on the computation, for a given code, of the amount
of information brought by the constraint. It is then shown that this quantity
as well as the probability that the VLC decoder does not re-synchronize in a
strict sense, are not significantly altered by appropriate trellis states
aggregation. This proves that the performance obtained by running a
length-constrained Viterbi decoder on aggregated state models approaches the
one obtained with the bit/symbol trellis, with a significantly reduced
complexity. It is then shown that the complexity can be further decreased by
projecting the state model on two state models of reduced size.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 15:52:12 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Malinowski",
"Simon",
"",
"IRISA / INRIA Rennes"
],
[
"Jégou",
"Hervé",
"",
"IRISA /\n INRIA Rennes, INRIA Rhône-Alpes / GRAVIR-IMAG"
],
[
"Guillemot",
"Christine",
"",
"IRISA\n / INRIA Rennes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612060 | Sreyash Kenkre | Sreyash Kenkre, Sundar Vishwanathan | The Common Prefix Problem On Trees | 8 pages | null | null | null | cs.DS cs.CC | null | We present a theoretical study of a problem arising in database query
optimization, which we call as The Common Prefix Problem. We present a
$(1-o(1))$ factor approximation algorithm for this problem, when the underlying
graph is a binary tree. We then use a result of Feige and Kogan to show that
even on stars, the problem is hard to approximate.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 12:32:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kenkre",
"Sreyash",
""
],
[
"Vishwanathan",
"Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0612061 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Trustworthy content push | 4 pages, 4 eps figures | Wireless Communications and Networking Conference, 2007.WCNC 2007.
IEEE, March 2007 Page(s):2909 - 2912 | 10.1109/WCNC.2007.539 | null | cs.CR | null | Delivery of content to mobile devices gains increasing importance in
industrial environments to support employees in the field. An important
application are e-mail push services like the fashionable Blackberry. These
systems are facing security challenges regarding data transport to, and storage
of the data on the end user equipment. The emerging Trusted Computing
technology offers new answers to these open questions.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 14:35:04 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Oct 2007 06:07:37 GMT"
}
] | 2007-10-17T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0612062 | Federico Calzolari | Federico Calzolari, Michele Mammini, Monica Monachini | Unifying Lexicons in view of a Phonological and Morphological Lexical DB | 4 pages | null | null | null | cs.IR | null | The present work falls in the line of activities promoted by the European
Languguage Resource Association (ELRA) Production Committee (PCom) and raises
issues in methods, procedures and tools for the reusability, creation, and
management of Language Resources. A two-fold purpose lies behind this
experiment. The first aim is to investigate the feasibility, define methods and
procedures for combining two Italian lexical resources that have incompatible
formats and complementary information into a Unified Lexicon (UL). The adopted
strategy and the procedures appointed are described together with the driving
criterion of the merging task, where a balance between human and computational
efforts is pursued. The coverage of the UL has been maximized, by making use of
simple and fast matching procedures. The second aim is to exploit this newly
obtained resource for implementing the phonological and morphological layers of
the CLIPS lexical database. Implementing these new layers and linking them with
the already exisitng syntactic and semantic layers is not a trivial task. The
constraints imposed by the model, the impact at the architectural level and the
solution adopted in order to make the whole database `speak' efficiently are
presented. Advantages vs. disadvantages are discussed.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 14:45:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calzolari",
"Federico",
""
],
[
"Mammini",
"Michele",
""
],
[
"Monachini",
"Monica",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0612063 | Lunjin Lu | Lunjin Lu | Improving Precision of Type Analysis Using Non-Discriminative Union | 47 pages, 5 tables, to appear in Theory and Practice of Logic
Programming | Theory and Practice of Logic Programming, 8 (1): 33-80, 2008 | null | null | cs.PL | null | This paper presents a new type analysis for logic programs. The analysis is
performed with a priori type definitions; and type expressions are formed from
a fixed alphabet of type constructors. Non-discriminative union is used to join
type information from different sources without loss of precision. An operation
that is performed repeatedly during an analysis is to detect if a fixpoint has
been reached. This is reduced to checking the emptiness of types. Due to the
use of non-discriminative union, the fundamental problem of checking the
emptiness of types is more complex in the proposed type analysis than in other
type analyses with a priori type definitions. The experimental results,
however, show that use of tabling reduces the effect to a small fraction of
analysis time on a set of benchmarks.
Keywords: Type analysis, Non-discriminative union, Abstract interpretation,
Tabling
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 03:09:44 GMT"
}
] | 2010-12-16T00:00:00 | [
[
"Lu",
"Lunjin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0612064 | Yuri Borissov Ph.D. | Yuri Borissov and Moon Ho Lee | Bounds on Key Appearance Equivocation for Substitution Ciphers | 3 pages, typos corrected, submitted to IEEE Transactions on
Information Theory | null | null | null | cs.IT cs.CR math.IT | null | The average conditional entropy of the key given the message and its
corresponding cryptogram, H(K|M,C), which is reffer as a key appearance
equivocation, was proposed as a theoretical measure of the strength of the
cipher system under a known-plaintext attack by Dunham in 1980. In the same
work (among other things), lower and upper bounds for H(S}_{M}|M^L,C^L) are
found and its asymptotic behaviour as a function of cryptogram length L is
described for simple substitution ciphers i.e. when the key space S_{M} is the
symmetric group acting on a discrete alphabet M. In the present paper we
consider the same problem when the key space is an arbitrary subgroup K of
S_{M} and generalize Dunham's result.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 03:19:43 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Jan 2007 08:30:39 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Borissov",
"Yuri",
""
],
[
"Lee",
"Moon Ho",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612065 | Anuj Kumar | Garud Iyengar and Anuj Kumar | An equilibrium model for matching impatient demand and patient supply
over time | 15 pages, 4 figures | null | null | null | cs.GT q-fin.TR | null | We present a simple dynamic equilibrium model for an online exchange where
both buyers and sellers arrive according to a exogenously defined stochastic
process. The structure of this exchange is motivated by the limit order book
mechanism used in stock markets. Both buyers and sellers are elastic in the
price-quantity space; however, only the sellers are assumed to be patient, i.e.
only the sellers have a price - time elasticity, whereas the buyers are assumed
to be impatient. Sellers select their selling price as a best response to all
the other sellers' strategies. We define and establish the existence of the
equilibrium in this model and show how to numerically compute this equilibrium.
We also show how to compute other relevant quantities such as the equilibrium
expected time to sale and equilibrium expected order density, as well as the
expected order density conditioned on current selling price. We derive a closed
form for the equilibrium distribution when the demand is price independent. At
this equilibrium the selling (limit order) price distribution is power tailed
as is empirically observed in order driven financial markets.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 05:00:11 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Mar 2007 09:55:37 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Iyengar",
"Garud",
""
],
[
"Kumar",
"Anuj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.TR",
"description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making",
"span": "(Trading and Market Microstructure)"
}
] |
cs/0612066 | Karim El Defrawy | Karim El Defrawy, Athina Markopoulou and Katerina Argyraki | Optimal Filtering for DDoS Attacks | 13 pages, 14 figures | null | null | null | cs.NI | null | Distributed Denial-of-Service (DDoS) attacks are a major problem in the
Internet today. In one form of a DDoS attack, a large number of compromised
hosts send unwanted traffic to the victim, thus exhausting the resources of the
victim and preventing it from serving its legitimate clients. One of the main
mechanisms that have been proposed to deal with DDoS is filtering, which allows
routers to selectively block unwanted traffic. Given the magnitude of DDoS
attacks and the high cost of filters in the routers today, the successful
mitigation of a DDoS attack using filtering crucially depends on the efficient
allocation of filtering resources. In this paper, we consider a single router,
typically the gateway of the victim, with a limited number of available
filters. We study how to optimally allocate filters to attack sources, or
entire domains of attack sources, so as to maximize the amount of good traffic
preserved, under a constraint on the number of filters. We formulate the
problem as an optimization problem and solve it optimally using dynamic
programming, study the properties of the optimal allocation, experiment with a
simple heuristic and evaluate our solutions for a range of realistic
attack-scenarios. First, we look at a single-tier where the collateral damage
is high due to the filtering at the granularity of domains. Second, we look at
the two-tier problem where we have an additional constraint on the number of
filters and the filtering is performed on the granularity of attackers and
domains.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 04:52:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Defrawy",
"Karim El",
""
],
[
"Markopoulou",
"Athina",
""
],
[
"Argyraki",
"Katerina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612067 | Jianwen Zhang | Jianwen Zhang, Marc A. Armand | Retrieving Reed-Solomon coded data under interpolation-based list
decoding | 10 pages. Submitted to IEEE information theory for possible
publication | null | null | null | cs.IT math.IT | null | A transform that enables generator-matrix-based Reed-Solomon (RS) coded data
to be recovered under interpolation-based list decoding is presented. The
transform matrix needs to be computed only once and the transformation of an
element from the output list to the desired RS coded data block incurs $k^{2}$
field multiplications, given a code of dimension $k$.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 05:08:05 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Zhang",
"Jianwen",
""
],
[
"Armand",
"Marc A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612068 | Esben Rune Hansen | Esben Rune Hansen and Henrik Reif Andersen | Interactive Configuration by Regular String Constraints | Tech Report | null | null | null | cs.AI | null | A product configurator which is complete, backtrack free and able to compute
the valid domains at any state of the configuration can be constructed by
building a Binary Decision Diagram (BDD). Despite the fact that the size of the
BDD is exponential in the number of variables in the worst case, BDDs have
proved to work very well in practice. Current BDD-based techniques can only
handle interactive configuration with small finite domains. In this paper we
extend the approach to handle string variables constrained by regular
expressions. The user is allowed to change the strings by adding letters at the
end of the string. We show how to make a data structure that can perform fast
valid domain computations given some assignment on the set of string variables.
We first show how to do this by using one large DFA. Since this approach is
too space consuming to be of practical use, we construct a data structure that
simulates the large DFA and in most practical cases are much more space
efficient. As an example a configuration problem on $n$ string variables with
only one solution in which each string variable is assigned to a value of
length of $k$ the former structure will use $\Omega(k^n)$ space whereas the
latter only need $O(kn)$. We also show how this framework easily can be
combined with the recent BDD techniques to allow both boolean, integer and
string variables in the configuration problem.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 16:21:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hansen",
"Esben Rune",
""
],
[
"Andersen",
"Henrik Reif",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612069 | Manuel Bodirsky | Manuel Bodirsky | Cores of Countably Categorical Structures | null | Logical Methods in Computer Science, Volume 3, Issue 1 (January
25, 2007) lmcs:2224 | 10.2168/LMCS-3(1:2)2007 | null | cs.LO | null | A relational structure is a core, if all its endomorphisms are embeddings.
This notion is important for computational complexity classification of
constraint satisfaction problems. It is a fundamental fact that every finite
structure has a core, i.e., has an endomorphism such that the structure induced
by its image is a core; moreover, the core is unique up to isomorphism. Weprove
that every \omega -categorical structure has a core. Moreover, every
\omega-categorical structure is homomorphically equivalent to a model-complete
core, which is unique up to isomorphism, and which is finite or \omega
-categorical. We discuss consequences for constraint satisfaction with \omega
-categorical templates.
| [
{
"version": "v1",
"created": "Wed, 13 Dec 2006 09:59:56 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jan 2007 16:13:48 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Bodirsky",
"Manuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0612070 | Ilya Safro Mr. | Sergey Benditkis, Illya Safro | Generalizations of the Hanoi Towers Problem | null | null | null | null | cs.DM | null | Our theme bases on the classical Hanoi Towers Problem. In this paper we will
define a new problem, permitting some positions, that were not legal in the
classical problem. Our goal is to find an optimal (shortest possible) sequence
of discs' moves. Besides that, we will research all versions of 3-pegs
classical problem with some special constraints, when some types of moves are
disallowed.
| [
{
"version": "v1",
"created": "Wed, 13 Dec 2006 22:30:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benditkis",
"Sergey",
""
],
[
"Safro",
"Illya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0612071 | Francis Heylighen | Francis Heylighen | Why is Open Access Development so Successful? Stigmergic organization
and the economics of information | null | in: B. Lutterbeck, M. Baerwolff & R. A. Gehring (eds.), Open
Source Jahrbuch 2007, Lehmanns Media, 2007 | null | ECCO Working Paper 2006-06 | cs.CY cs.DL physics.soc-ph | null | The explosive development of "free" or "open source" information goods
contravenes the conventional wisdom that markets and commercial organizations
are necessary to efficiently supply products. This paper proposes a theoretical
explanation for this phenomenon, using concepts from economics and theories of
self-organization. Once available on the Internet, information is intrinsically
not a scarce good, as it can be replicated virtually without cost. Moreover,
freely distributing information is profitable to its creator, since it improves
the quality of the information, and enhances the creator's reputation. This
provides a sufficient incentive for people to contribute to open access
projects. Unlike traditional organizations, open access communities are open,
distributed and self-organizing. Coordination is achieved through stigmergy:
listings of "work-in-progress" direct potential contributors to the tasks where
their contribution is most likely to be fruitful. This obviates the need both
for centralized planning and for the "invisible hand" of the market.
| [
{
"version": "v1",
"created": "Thu, 14 Dec 2006 12:15:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heylighen",
"Francis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0612072 | Zoya Svitkina | S. Muthukrishnan, Martin Pal and Zoya Svitkina | Stochastic Models for Budget Optimization in Search-Based Advertising | null | null | null | null | cs.DS cs.GT | null | Internet search companies sell advertisement slots based on users' search
queries via an auction. Advertisers have to determine how to place bids on the
keywords of their interest in order to maximize their return for a given
budget: this is the budget optimization problem. The solution depends on the
distribution of future queries.
In this paper, we formulate stochastic versions of the budget optimization
problem based on natural probabilistic models of distribution over future
queries, and address two questions that arise.
[Evaluation] Given a solution, can we evaluate the expected value of the
objective function?
[Optimization] Can we find a solution that maximizes the objective function
in expectation?
Our main results are approximation and complexity results for these two
problems in our three stochastic models. In particular, our algorithmic results
show that simple prefix strategies that bid on all cheap keywords up to some
level are either optimal or good approximations for many cases; we show other
cases to be NP-hard.
| [
{
"version": "v1",
"created": "Thu, 14 Dec 2006 21:13:57 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Sep 2007 20:36:33 GMT"
}
] | 2007-09-24T00:00:00 | [
[
"Muthukrishnan",
"S.",
""
],
[
"Pal",
"Martin",
""
],
[
"Svitkina",
"Zoya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0612073 | N. Prasanth Anthapadmanabhan | N. Prasanth Anthapadmanabhan, Alexander Barg and Ilya Dumer | On the Fingerprinting Capacity Under the Marking Assumption | final version, 12 pages, 2 figures, to appear in IEEE Trans. on
Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008,
simplified proofs in Sections II and III, changes in Theorem 4.1 | null | null | null | cs.IT cs.CR math.IT | null | We address the maximum attainable rate of fingerprinting codes under the
marking assumption, studying lower and upper bounds on the value of the rate
for various sizes of the attacker coalition. Lower bounds are obtained by
considering typical coalitions, which represents a new idea in the area of
fingerprinting and enables us to improve the previously known lower bounds for
coalitions of size two and three. For upper bounds, the fingerprinting problem
is modelled as a communications problem. It is shown that the maximum code rate
is bounded above by the capacity of a certain class of channels, which are
similar to the multiple-access channel. Converse coding theorems proved in the
paper provide new upper bounds on fingerprinting capacity.
It is proved that capacity for fingerprinting against coalitions of size two
and three over the binary alphabet satisfies $0.25 \leq C_{2,2} \leq 0.322$ and
$0.083 \leq C_{3,2} \leq 0.199$ respectively. For coalitions of an arbitrary
fixed size $t,$ we derive an upper bound $(t\ln2)^{-1}$ on fingerprinting
capacity in the binary case. Finally, for general alphabets, we establish upper
bounds on the fingerprinting capacity involving only single-letter mutual
information quantities.
| [
{
"version": "v1",
"created": "Thu, 14 Dec 2006 23:26:35 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jul 2007 16:31:42 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Feb 2008 18:41:59 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Anthapadmanabhan",
"N. Prasanth",
""
],
[
"Barg",
"Alexander",
""
],
[
"Dumer",
"Ilya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612074 | Zengjian Hu | Petra Berenbrink and Colin Cooper and Zengjian Hu | Energy Efficient Randomized Communication in Unknown AdHoc Networks | 15 pages. 1 figure | null | null | null | cs.DC cs.DS | null | This paper studies broadcasting and gossiping algorithms in random and
general AdHoc networks. Our goal is not only to minimise the broadcasting and
gossiping time, but also to minimise the energy consumption, which is measured
in terms of the total number of messages (or transmissions) sent. We assume
that the nodes of the network do not know the network, and that they can only
send with a fixed power, meaning they can not adjust the areas sizes that their
messages cover. We believe that under these circumstances the number of
transmissions is a very good measure for the overall energy consumption.
For random networks, we present a broadcasting algorithm where every node
transmits at most once. We show that our algorithm broadcasts in $O(\log n)$
steps, w.h.p, where $n$ is the number of nodes. We then present a $O(d \log n)$
($d$ is the expected degree) gossiping algorithm using $O(\log n)$ messages per
node.
For general networks with known diameter $D$, we present a randomised
broadcasting algorithm with optimal broadcasting time $O(D \log (n/D) + \log^2
n)$ that uses an expected number of $O(\log^2 n / \log (n/D))$ transmissions
per node. We also show a tradeoff result between the broadcasting time and the
number of transmissions: we construct a network such that any oblivious
algorithmusing a time-invariant distribution requires $\Omega(\log^2 n / \log
(n/D))$ messages per node in order to finish broadcasting in optimal time. This
demonstrates the tightness of our upper bound. We also show that no oblivious
algorithm can complete broadcasting w.h.p. using $o(\log n)$ messages per node.
| [
{
"version": "v1",
"created": "Fri, 15 Dec 2006 03:43:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Cooper",
"Colin",
""
],
[
"Hu",
"Zengjian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0612075 | Sujay Sanghavi | Sujay Sanghavi | Intermediate Performance of Rateless Codes | null | null | null | null | cs.IT math.IT | null | Rateless/fountain codes are designed so that all input symbols can be
recovered from a slightly larger number of coded symbols, with high probability
using an iterative decoder. In this paper we investigate the number of input
symbols that can be recovered by the same decoder, but when the number of coded
symbols available is less than the total number of input symbols. Of course
recovery of all inputs is not possible, and the fraction that can be recovered
will depend on the output degree distribution of the code.
In this paper we (a) outer bound the fraction of inputs that can be recovered
for any output degree distribution of the code, and (b) design degree
distributions which meet/perform close to this bound. Our results are of
interest for real-time systems using rateless codes, and for Raptor-type
two-stage designs.
| [
{
"version": "v1",
"created": "Fri, 15 Dec 2006 04:18:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sanghavi",
"Sujay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612076 | Walid Hachem | Walid Hachem (LTCI), Oleksiy Khorunzhiy, Philippe Loubaton
(IGM-LabInfo), Jamal Najim (LTCI), Leonid Pastur | A New Approach for Capacity Analysis of Large Dimensional Multi-Antenna
Channels | null | null | null | null | cs.IT math.IT math.PR | null | This paper adresses the behaviour of the mutual information of correlated
MIMO Rayleigh channels when the numbers of transmit and receive antennas
converge to infinity at the same rate. Using a new and simple approach based on
Poincar\'{e}-Nash inequality and on an integration by parts formula, it is
rigorously established that the mutual information converges to a Gaussian
random variable whose mean and variance are evaluated. These results confirm
previous evaluations based on the powerful but non rigorous replica method. It
is believed that the tools that are used in this paper are simple, robust, and
of interest for the communications engineering community.
| [
{
"version": "v1",
"created": "Fri, 15 Dec 2006 15:34:38 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hachem",
"Walid",
"",
"LTCI"
],
[
"Khorunzhiy",
"Oleksiy",
"",
"IGM-LabInfo"
],
[
"Loubaton",
"Philippe",
"",
"IGM-LabInfo"
],
[
"Najim",
"Jamal",
"",
"LTCI"
],
[
"Pastur",
"Leonid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0612077 | Markus P\"uschel | Markus P\"uschel and Jos\'e M. F. Moura | Algebraic Signal Processing Theory | 67 pages. Parts have been published in updated form as shown below.
Section XV contains initial ideas for discrete signal processing on graphs.
See also https://www.archive.ece.cmu.edu/~smart/ and newer work in
https://acl.inf.ethz.ch/research/ASP/ | Algebraic Signal Processing Theory: Foundation and 1-D Time &
Algebraic Signal Processing Theory: 1-D Space, both IEEE Trans. SP, 56(8),
2008; Algebraic Signal Processing Theory: 1-D Nearest-Neighbor Models in IEEE
Trans. SP, 60(5), 2012 | 10.1109/TSP.2008.925261; 10.1109/TSP.2008.925259; 10.1109/TSP.2012.2186133 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an algebraic theory of linear signal processing. At the
core of algebraic signal processing is the concept of a linear signal model
defined as a triple (A, M, phi), where familiar concepts like the filter space
and the signal space are cast as an algebra A and a module M, respectively, and
phi generalizes the concept of the z-transform to bijective linear mappings
from a vector space of, e.g., signal samples, into the module M. A signal model
provides the structure for a particular linear signal processing application,
such as infinite and finite discrete time, or infinite or finite discrete
space, or the various forms of multidimensional linear signal processing. As
soon as a signal model is chosen, basic ingredients follow, including the
associated notions of filtering, spectrum, and Fourier transform. The shift
operator is a key concept in the algebraic theory: it is the generator of the
algebra of filters A. Once the shift is chosen, a well-defined methodology
leads to the associated signal model. Different shifts correspond to infinite
and finite time models with associated infinite and finite z-transforms, and to
infinite and finite space models with associated infinite and finite
C-transforms (that we introduce). In particular, we show that the 16 discrete
cosine and sine transforms are Fourier transforms for the finite space models.
Other definitions of the shift naturally lead to new signal models and to new
transforms as associated Fourier transforms in one and higher dimensions,
separable and non-separable. We explain in algebraic terms shift-invariance
(the algebra of filters A is commutative), the role of boundary conditions and
signal extensions, the connections between linear transforms and linear finite
Gauss-Markov fields, and several other concepts and connections.
| [
{
"version": "v1",
"created": "Fri, 15 Dec 2006 20:01:11 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Nov 2019 15:24:51 GMT"
}
] | 2021-05-11T00:00:00 | [
[
"Püschel",
"Markus",
""
],
[
"Moura",
"José M. F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612078 | Wei Dai | Wei Dai, Youjian Liu, Brian Rider | Effect of Finite Rate Feedback on CDMA Signature Optimization and MIMO
Beamforming Vector Selection | 24 pages, submitted to IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | null | We analyze the effect of finite rate feedback on CDMA (code-division multiple
access) signature optimization and MIMO (multi-input-multi-output) beamforming
vector selection. In CDMA signature optimization, for a particular user, the
receiver selects a signature vector from a codebook to best avoid interference
from other users, and then feeds the corresponding index back to the specified
user. For MIMO beamforming vector selection, the receiver chooses a beamforming
vector from a given codebook to maximize throughput, and feeds back the
corresponding index to the transmitter. These two problems are dual: both can
be modeled as selecting a unit norm vector from a finite size codebook to
"match" a randomly generated Gaussian matrix. In signature optimization, the
least match is required while the maximum match is preferred for beamforming
selection.
Assuming that the feedback link is rate limited, our main result is an exact
asymptotic performance formulae where the length of the signature/beamforming
vector, the dimensions of interference/channel matrix, and the feedback rate
approach infinity with constant ratios. The proof rests on a large deviation
principle over a random matrix ensemble. Further, we show that random codebooks
generated from the isotropic distritution are asymptotically optimal not only
on average, but also with probability one.
| [
{
"version": "v1",
"created": "Sat, 16 Dec 2006 20:41:32 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 22:47:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Rider",
"Brian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612079 | Steffen Gr{\o}nneberg | Steffen Gr{\o}nneberg | Executing the same binary on several operating systems | The technique is outdated | null | null | null | cs.OS | null | We notice a way to execute a binary file on Windows and ELF-based systems. It
can be used to create software installers and other applications not exceeding
64 kilo bytes.
| [
{
"version": "v1",
"created": "Sat, 16 Dec 2006 21:37:00 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Apr 2015 14:14:00 GMT"
}
] | 2015-04-14T00:00:00 | [
[
"Grønneberg",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0612080 | Jacob Binia | Jacob Binia | On the Decrease Rate of the Non-Gaussianness of the Sum of Independent
Random Variables | Submitted to the Trasactions of the IEEE on Information Theory | null | null | null | cs.IT math.IT | null | Several proofs of the monotonicity of the non-Gaussianness (divergence with
respect to a Gaussian random variable with identical second order statistics)
of the sum of n independent and identically distributed (i.i.d.) random
variables were published. We give an upper bound on the decrease rate of the
non-Gaussianness which is proportional to the inverse of n, for large n. The
proof is based on the relationship between non-Gaussianness and minimum
mean-square error (MMSE) and causal minimum mean-square error (CMMSE) in the
time-continuous Gaussian channel.
| [
{
"version": "v1",
"created": "Sun, 17 Dec 2006 14:52:04 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Binia",
"Jacob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612081 | Manas Tungare | Manas Tungare, Pardha S. Pyla, Manuel P\'erez-Qui\~nones, and Steve
Harrison | Personal Information Ecosystems and Implications for Design | null | null | null | null | cs.HC | null | Today, people use multiple devices to fulfill their information needs.
However, designers design each device individually, without accounting for the
other devices that users may also use. In many cases, the applications on all
these devices are designed to be functional replicates of each other. We argue
that this results in an over-reliance on data synchronization across devices,
version control nightmares, and increased burden of file management. In this
paper, we present the idea of a \textit{personal information ecosystem}, an
analogy to biological ecosystems, which allows us to discuss the
inter-relationships among these devices to fulfill the information needs of the
user. There is a need for designers to design devices as part of a complete
ecosystem, not as independent devices that simply share data replicated across
them. To help us understand this domain and to facilitate the dialogue and
study of such systems, we present the terminology, classifications of the
interdependencies among different devices, and resulting implications for
design.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 07:53:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tungare",
"Manas",
""
],
[
"Pyla",
"Pardha S.",
""
],
[
"Pérez-Quiñones",
"Manuel",
""
],
[
"Harrison",
"Steve",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612082 | Thierry Despeyroux | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis) | Developing efficient parsers in Prolog: the CLF manual (v1.0) | null | null | null | null | cs.SE | null | This document describes a couple of tools that help to quickly design and
develop computer (formalized) languages. The first one use Flex to perform
lexical analysis and the second is an extention of Prolog DCGs to perfom
syntactical analysis. Initially designed as a new component for the Centaur
system, these tools are now available independently and can be used to
construct efficient Prolog parsers that can be integrated in Prolog or
heterogeneous systems. This is the initial version of the CLF documentation.
Updated version will be available online when necessary.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 08:40:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0612083 | Wenbing Zhao | Wenbing Zhao | A Byzantine Fault Tolerant Distributed Commit Protocol | To appear in the proceedings of the 3rd IEEE International Symposium
on Dependable, Autonomic and Secure Computing, 2007 | null | 10.1109/DASC.2007.10 | null | cs.DC cs.DB | null | In this paper, we present a Byzantine fault tolerant distributed commit
protocol for transactions running over untrusted networks. The traditional
two-phase commit protocol is enhanced by replicating the coordinator and by
running a Byzantine agreement algorithm among the coordinator replicas. Our
protocol can tolerate Byzantine faults at the coordinator replicas and a subset
of malicious faults at the participants. A decision certificate, which includes
a set of registration records and a set of votes from participants, is used to
facilitate the coordinator replicas to reach a Byzantine agreement on the
outcome of each transaction. The certificate also limits the ways a faulty
replica can use towards non-atomic termination of transactions, or semantically
incorrect transaction outcomes.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 09:31:43 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jan 2007 17:27:10 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Aug 2007 04:54:38 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Zhao",
"Wenbing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612084 | Ender Tekin | Ender Tekin and Aylin Yener | Achievable Rates for the General Gaussian Multiple Access Wire-Tap
Channel with Collective Secrecy | Presented at the 44th Annual Allerton Conference on Communication,
Control, and Computing, September 27-29, 2006 | null | null | null | cs.IT cs.CR math.IT | null | We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT).
In this scenario, multiple users communicate with an intended receiver in the
presence of an intelligent and informed eavesdropper who is as capable as the
intended receiver, but has different channel parameters. We aim to provide
perfect secrecy for the transmitters in this multi-access environment. Using
Gaussian codebooks, an achievable secrecy region is determined and the power
allocation that maximizes the achievable sum-rate is found. Numerical results
showing the new rate region are presented. It is shown that the multiple-access
nature of the channel may be utilized to allow users with zero single-user
secrecy capacity to be able to transmit in perfect secrecy. In addition, a new
collaborative scheme is shown that may increase the achievable sum-rate. In
this scheme, a user who would not transmit to maximize the sum rate can help
another user who (i) has positive secrecy capacity to increase its rate, or
(ii) has zero secrecy capacity to achieve a positive secrecy capacity.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 15:33:15 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.