id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0612085 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | The Parma Polyhedra Library: Toward a Complete Set of Numerical
Abstractions for the Analysis and Verification of Hardware and Software
Systems | 38 pages, 2 figures, 3 listings, 3 tables | null | null | Quaderno 457 | cs.MS cs.PL | null | Since its inception as a student project in 2001, initially just for the
handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library
has been continuously improved and extended by joining scrupulous research on
the theoretical foundations of (possibly non-convex) numerical abstractions to
a total adherence to the best available practices in software development. Even
though it is still not fully mature and functionally complete, the Parma
Polyhedra Library already offers a combination of functionality, reliability,
usability and performance that is not matched by similar, freely available
libraries. In this paper, we present the main features of the current version
of the library, emphasizing those that distinguish it from other similar
libraries and those that are important for applications in the field of
analysis and verification of hardware and software systems.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 10:15:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0612086 | Pierre Sutra | Pierre Sutra (INRIA Rocquencourt), Marc Shapiro (INRIA Rocquencourt),
Jo\~ao Pedro Barreto (INESC-ID) | An asynchronous, decentralised commitment protocol for semantic
optimistic replication | null | null | null | null | cs.DB cs.NI | null | We study large-scale distributed cooperative systems that use optimistic
replication. We represent a system as a graph of actions (operations) connected
by edges that reify semantic constraints between actions. Constraint types
include conflict, execution order, dependence, and atomicity. The local state
is some schedule that conforms to the constraints; because of conflicts, client
state is only tentative. For consistency, site schedules should converge; we
designed a decentralised, asynchronous commitment protocol. Each client makes a
proposal, reflecting its tentative and{\slash}or preferred schedules. Our
protocol distributes the proposals, which it decomposes into
semantically-meaningful units called candidates, and runs an election between
comparable candidates. A candidate wins when it receives a majority or a
plurality. The protocol is fully asynchronous: each site executes its tentative
schedule independently, and determines locally when a candidate has won an
election. The committed schedule is as close as possible to the preferences
expressed by clients.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 16:22:12 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Oct 2007 14:21:04 GMT"
}
] | 2007-10-08T00:00:00 | [
[
"Sutra",
"Pierre",
"",
"INRIA Rocquencourt"
],
[
"Shapiro",
"Marc",
"",
"INRIA Rocquencourt"
],
[
"Barreto",
"João Pedro",
"",
"INESC-ID"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612087 | Lester Ingber | Lester Ingber | Statistical mechanics of neocortical interactions: Portfolio of
Physiological Indicators | null | null | null | null | cs.CE cs.IT cs.NE math.IT q-bio.QM | null | There are several kinds of non-invasive imaging methods that are used to
collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is
difficult to get resolution of information processing using any one of these
methods. Approaches to integrate data sources may help to get better resolution
of data and better correlations to behavioral phenomena ranging from attention
to diagnoses of disease. The approach taken here is to use algorithms developed
for the author's Trading in Risk Dimensions (TRD) code using modern methods of
copula portfolio risk management, with joint probability distributions derived
from the author's model of statistical mechanics of neocortical interactions
(SMNI). The author's Adaptive Simulated Annealing (ASA) code is for
optimizations of training sets, as well as for importance-sampling. Marginal
distributions will be evolved to determine their expected duration and
stability using algorithms developed by the author, i.e., PATHTREE and PATHINT
codes.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 21:02:03 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Ingber",
"Lester",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
cs/0612088 | Julien Robert | Julien Robert and Nicolas Schabanel | Non-Clairvoyant Batch Sets Scheduling: Fairness is Fair enough | 12 pages, 1 figure | null | null | null | cs.DC cs.DS | null | Scheduling questions arise naturally in many different areas among which
operating system design, compiling,... In real life systems, the
characteristics of the jobs (such as release time and processing time) are
usually unknown and unpredictable beforehand. The system is typically unaware
of the remaining work in each job or of the ability of the job to take
advantage of more resources. Following these observations, we adopt the job
model by Edmonds et al (2000, 2003) in which the jobs go through a sequence of
different phases. Each phase consists of a certain quantity of work and a
speed-up function that models how it takes advantage of the number of
processors it receives. We consider the non-clairvoyant online setting where a
collection of jobs arrives at time 0. We consider the metrics setflowtime
introduced by Robert et al (2007). The goal is to minimize the sum of the
completion time of the sets, where a set is completed when all of its jobs are
done. If the input consists of a single set of jobs, this is simply the
makespan of the jobs; and if the input consists of a collection of singleton
sets, it is simply the flowtime of the jobs. We show that the non-clairvoyant
strategy EQUIoEQUI that evenly splits the available processors among the still
unserved sets and then evenly splits these processors among the still
uncompleted jobs of each unserved set, achieves a competitive ratio
(2+\sqrt3+o(1))\frac{ln n}{lnln n} for the setflowtime minimization and that
this is asymptotically optimal (up to a constant factor), where n is the size
of the largest set. For makespan minimization, we show that the non-clairvoyant
strategy EQUI achieves a competitive ratio of (1+o(1))\frac{ln n}{lnln n},
which is again asymptotically optimal.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 15:19:59 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2006 21:55:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Julien",
""
],
[
"Schabanel",
"Nicolas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0612089 | Damien Woods | Damien Woods, Turlough Neary | On the time complexity of 2-tag systems and small universal Turing
machines | Slightly expanded and updated from conference version | FOCS 2006: 47th Annual IEEE Symposium on Foundations of Computer
Science, IEEE, pages 439-446, Berkeley, CA | 10.1109/FOCS.2006.58 | null | cs.CC cs.DS | null | We show that 2-tag systems efficiently simulate Turing machines. As a
corollary we find that the small universal Turing machines of Rogozhin, Minsky
and others simulate Turing machines in polynomial time. This is an exponential
improvement on the previously known simulation time overhead and improves a
forty year old result in the area of small universal Turing machines.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 15:59:45 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Woods",
"Damien",
""
],
[
"Neary",
"Turlough",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0612090 | Vita Hinze-Hoare | Vita Hinze-Hoare | A Review of Papers that have a bearing on an Analysis of User
Interactions in A Collaborative On-line Laboratory | null | null | null | null | cs.HC | null | A number of papers have been reviewed in the areas of HCI, CSCW, CSCL. These
have been analyzed with a view to extract the ideas relevant to a consideration
of user interactions in a collaborative on line laboratory which is being under
development for use in the ITO BSc course at Southampton University. The
construction of new theoretical models is to be based upon principles of
collaborative HCI design and constructivist and situational educational theory.
An investigation of the review papers it is hoped will lead towards a
methodology/framework that can be used as guidance for collaborative learning
systems and these will need to be developed alongside the requirements as they
change during the development cycles. The primary outcome will be the analysis
and re-design of the online e-learning laboratory together with a measure of
its efficacy in the learning process.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 22:24:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0612091 | Jerome Vanclay | Jerome K Vanclay | Bias in the journal impact factor | 9 pages, 8 figures; one reference corrected | Scientometrics 78(1):3-12 (2009) | 10.1007/s11192-008-1778-4 | null | cs.DL q-bio.OT | null | The ISI journal impact factor (JIF) is based on a sample that may represent
half the whole-of-life citations to some journals, but a small fraction (<10%)
of the citations accruing to other journals. This disproportionate sampling
means that the JIF provides a misleading indication of the true impact of
journals, biased in favour of journals that have a rapid rather than a
prolonged impact. Many journals exhibit a consistent pattern of citation
accrual from year to year, so it may be possible to adjust the JIF to provide a
more reliable indication of a journal's impact.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 00:17:03 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jan 2007 06:01:57 GMT"
}
] | 2008-12-23T00:00:00 | [
[
"Vanclay",
"Jerome K",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
}
] |
cs/0612092 | Ahmed Sidky Ahmed Sidky | Ahmed Sidky, James Arthur | Agile Adoption Process Framework | This is a reference document containing an overview of the adoption
framework along with all the indicators used for the assessment of the agile
practices | null | null | null | cs.SE | null | Today many organizations aspire to adopt agile processes in hope of
overcoming some of the difficulties they are facing with their current software
development process. There is no structured framework for the agile adoption
process. This paper presents a 3-Stage process framework that assists
organization and guides organizations through their agile adoption efforts. The
Process Framework has been received significantly positive feedback from
experts and leaders in agile adoption industry.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 16:35:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidky",
"Ahmed",
""
],
[
"Arthur",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0612093 | Jo\~ao Barros | Miguel S. Silva, Francisco Martins, Luis Lopes, Joao Barros | A Calculus for Sensor Networks | 24 pages, 1 figure, submitted for publication | null | null | null | cs.DC cs.PL | null | We consider the problem of providing a rigorous model for programming
wireless sensor networks. Assuming that collisions, packet losses, and errors
are dealt with at the lower layers of the protocol stack, we propose a Calculus
for Sensor Networks (CSN) that captures the main abstractions for programming
applications for this class of devices. Besides providing the syntax and
semantics for the calculus, we show its expressiveness by providing
implementations for several examples of typical operations on sensor networks.
Also included is a detailed discussion of possible extensions to CSN that
enable the modeling of other important features of these networks such as
sensor state, sampling strategies, and network security.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 14:45:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Silva",
"Miguel S.",
""
],
[
"Martins",
"Francisco",
""
],
[
"Lopes",
"Luis",
""
],
[
"Barros",
"Joao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0612094 | Alexandre Sedoglavic | Alexandre Sedoglavic (INRIA Futurs, LIFL) | Reduction of Algebraic Parametric Systems by Rectification of their
Affine Expanded Lie Symmetries | Before analysing an algebraic system (differential or not), one can
generally reduce the number of parameters defining the system behavior by
studying the system's Lie symmetries | Dans Algebraic Biology 2007 4545 (2007) 277--291 | null | null | cs.SC | null | Lie group theory states that knowledge of a $m$-parameters solvable group of
symmetries of a system of ordinary differential equations allows to reduce by
$m$ the number of equations. We apply this principle by finding some
\emph{affine derivations} that induces \emph{expanded} Lie point symmetries of
considered system. By rewriting original problem in an invariant coordinates
set for these symmetries, we \emph{reduce} the number of involved parameters.
We present an algorithm based on this standpoint whose arithmetic complexity is
\emph{quasi-polynomial} in input's size.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 14:58:15 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Sedoglavic",
"Alexandre",
"",
"INRIA Futurs, LIFL"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0612095 | Paul Vitanyi | Pieter Adriaans (University of Amsterdam), Paul Vitanyi (CWI and
University of Amsterdam) | Approximation of the Two-Part MDL Code | 14 pages, LaTeX, no figures, IEEE Trans Inform. Th., to appear | null | null | null | cs.LG cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Approximation of the optimal two-part MDL code for given data, through
successive monotonically length-decreasing two-part MDL codes, has the
following properties: (i) computation of each step may take arbitrarily long;
(ii) we may not know when we reach the optimum, or whether we will reach the
optimum at all; (iii) the sequence of models generated may not monotonically
improve the goodness of fit; but (iv) the model associated with the optimum has
(almost) the best goodness of fit. To express the practically interesting
goodness of fit of individual models for individual data sets we have to rely
on Kolmogorov complexity.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 16:18:30 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Sep 2008 15:51:15 GMT"
}
] | 2008-09-15T00:00:00 | [
[
"Adriaans",
"Pieter",
"",
"University of Amsterdam"
],
[
"Vitanyi",
"Paul",
"",
"CWI and\n University of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612096 | David N. Levin | David N. Levin | Using state space differential geometry for nonlinear blind source
separation | Contains 14 pages and 3 figures. For related papers, see
http://www.geocities.com/dlevin2001/ . New version is identical to original
version except for URL in the byline | Journal of Applied Physics 103, 044906 (2008) | 10.1063/1.2826943 | null | cs.LG cs.SD | null | Given a time series of multicomponent measurements of an evolving stimulus,
nonlinear blind source separation (BSS) seeks to find a "source" time series,
comprised of statistically independent combinations of the measured components.
In this paper, we seek a source time series with local velocity cross
correlations that vanish everywhere in stimulus state space. However, in an
earlier paper the local velocity correlation matrix was shown to constitute a
metric on state space. Therefore, nonlinear BSS maps onto a problem of
differential geometry: given the metric observed in the measurement coordinate
system, find another coordinate system in which the metric is diagonal
everywhere. We show how to determine if the observed data are separable in this
way, and, if they are, we show how to construct the required transformation to
the source coordinate system, which is essentially unique except for an unknown
rotation that can be found by applying the methods of linear BSS. Thus, the
proposed technique solves nonlinear BSS in many situations or, at least,
reduces it to linear BSS, without the use of probabilistic, parametric, or
iterative procedures. This paper also describes a generalization of this
methodology that performs nonlinear independent subspace separation. In every
case, the resulting decomposition of the observed data is an intrinsic property
of the stimulus' evolution in the sense that it does not depend on the way the
observer chooses to view it (e.g., the choice of the observing machine's
sensors). In other words, the decomposition is a property of the evolution of
the "real" stimulus that is "out there" broadcasting energy to the observer.
The technique is illustrated with analytic and numerical examples.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 22:32:18 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Levin",
"David N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
cs/0612097 | Bari\c{s} Nakibo\u{g}lu | B. Nakiboglu, R. G. Gallager | Error Exponents for Variable-length Block Codes with Feedback and Cost
Constraints | null | IEEE Transactions on Information Theory, 54(3):945-963, March 2008 | 10.1109/TIT.2007.915913 10.1109/ISIT.2006.261677 | null | cs.IT math.IT | null | Variable-length block-coding schemes are investigated for discrete memoryless
channels with ideal feedback under cost constraints. Upper and lower bounds are
found for the minimum achievable probability of decoding error $P_{e,\min}$ as
a function of constraints $R, \AV$, and $\bar \tau$ on the transmission rate,
average cost, and average block length respectively. For given $R$ and $\AV$,
the lower and upper bounds to the exponent $-(\ln P_{e,\min})/\bar \tau$ are
asymptotically equal as $\bar \tau \to \infty$. The resulting reliability
function, $\lim_{\bar \tau\to \infty} (-\ln P_{e,\min})/\bar \tau$, as a
function of $R$ and $\AV$, is concave in the pair $(R, \AV)$ and generalizes
the linear reliability function of Burnashev to include cost constraints. The
results are generalized to a class of discrete-time memoryless channels with
arbitrary alphabets, including additive Gaussian noise channels with amplitude
and power constraints.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 02:37:33 GMT"
}
] | 2020-01-03T00:00:00 | [
[
"Nakiboglu",
"B.",
""
],
[
"Gallager",
"R. G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612098 | Manik Lal Das | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak | Algorithms and Approaches of Proxy Signature: A Survey | 29 pages | null | null | null | cs.CR | null | Numerous research studies have been investigated on proxy signatures over the
last decade. This survey reviews the research progress on proxy signatures,
analyzes a few notable proposals, and provides an overall remark of these
proposals.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 06:09:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"Manik Lal",
""
],
[
"Saxena",
"Ashutosh",
""
],
[
"Phatak",
"Deepak B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0612099 | Jo\~ao Barros | Rui A. Costa, Joao Barros | Network Information Flow in Small World Networks | 23 pages, 8 fitures, submitted to the IEEE Transactions on
Information Theory, November 2006 | null | 10.1109/WIOPT.2006.1666504 | null | cs.IT cs.DM math.IT | null | Recent results from statistical physics show that large classes of complex
networks, both man-made and of natural origin, are characterized by high
clustering properties yet strikingly short path lengths between pairs of nodes.
This class of networks are said to have a small-world topology. In the context
of communication networks, navigable small-world topologies, i.e. those which
admit efficient distributed routing algorithms, are deemed particularly
effective, for example in resource discovery tasks and peer-to-peer
applications. Breaking with the traditional approach to small-world topologies
that privileges graph parameters pertaining to connectivity, and intrigued by
the fundamental limits of communication in networks that exploit this type of
topology, we investigate the capacity of these networks from the perspective of
network information flow. Our contribution includes upper and lower bounds for
the capacity of standard and navigable small-world models, and the somewhat
surprising result that, with high probability, random rewiring does not alter
the capacity of a small-world network.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 09:11:41 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Costa",
"Rui A.",
""
],
[
"Barros",
"Joao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612100 | Rob van Stee | Leah Epstein and Rob van Stee | Improved results for a memory allocation problem | null | null | null | null | cs.DS | null | We consider a memory allocation problem that can be modeled as a version of
bin packing where items may be split, but each bin may contain at most two
(parts of) items. A 3/2-approximation algorithm and an NP-hardness proof for
this problem was given by Chung et al. We give a simpler 3/2-approximation
algorithm for it which is in fact an online algorithm. This algorithm also has
good performance for the more general case where each bin may contain at most k
parts of items. We show that this general case is also strongly NP-hard.
Additionally, we give an efficient 7/5-approximation algorithm.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 13:39:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"van Stee",
"Rob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0612101 | Maxime Guillaud | M. Guillaud, M. Debbah, A. L. Moustakas | Maximum Entropy MIMO Wireless Channel Models | Submitted to IEEE Trans. Information Theory Dec. 2006; 16 pages, 4
figures | null | null | null | cs.IT math.IT | null | In this contribution, models of wireless channels are derived from the
maximum entropy principle, for several cases where only limited information
about the propagation environment is available. First, analytical models are
derived for the cases where certain parameters (channel energy, average energy,
spatial correlation matrix) are known deterministically. Frequently, these
parameters are unknown (typically because the received energy or the spatial
correlation varies with the user position), but still known to represent
meaningful system characteristics. In these cases, analytical channel models
are derived by assigning entropy-maximizing distributions to these parameters,
and marginalizing them out. For the MIMO case with spatial correlation, we show
that the distribution of the covariance matrices is conveniently handled
through its eigenvalues. The entropy-maximizing distribution of the covariance
matrix is shown to be a Wishart distribution. Furthermore, the corresponding
probability density function of the channel matrix is shown to be described
analytically by a function of the channel Frobenius norm. This technique can
provide channel models incorporating the effect of shadow fading and spatial
correlation between antennas without the need to assume explicit values for
these parameters. The results are compared in terms of mutual information to
the classical i.i.d. Gaussian model.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 14:41:25 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Guillaud",
"M.",
""
],
[
"Debbah",
"M.",
""
],
[
"Moustakas",
"A. L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612102 | Nilesh Dalvi | Nilesh Dalvi and Dan Suciu | The Dichotomy of Conjunctive Queries on Probabilistic Structures | null | null | null | null | cs.DB | null | We show that for every conjunctive query, the complexity of evaluating it on
a probabilistic database is either \PTIME or #\P-complete, and we give an
algorithm for deciding whether a given conjunctive query is \PTIME or
#\P-complete. The dichotomy property is a fundamental result on query
evaluation on probabilistic databases and it gives a complete classification of
the complexity of conjunctive queries.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 21:11:05 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 06:51:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dalvi",
"Nilesh",
""
],
[
"Suciu",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612103 | Vibhor Rastogi | Vibhor Rastogi, Dan Suciu, Sungho Hong | The Boundary Between Privacy and Utility in Data Anonymization | null | null | null | null | cs.DB | null | We consider the privacy problem in data publishing: given a relation I
containing sensitive information 'anonymize' it to obtain a view V such that,
on one hand attackers cannot learn any sensitive information from V, and on the
other hand legitimate users can use V to compute useful statistics on I. These
are conflicting goals. We use a definition of privacy that is derived from
existing ones in the literature, which relates the a priori probability of a
given tuple t, Pr(t), with the a posteriori probability, Pr(t | V), and propose
a novel and quite practical definition for utility. Our main result is the
following. Denoting n the size of I and m the size of the domain from which I
was drawn (i.e. n < m) then: when the a priori probability is Pr(t) =
Omega(n/sqrt(m)) for some t, there exists no useful anonymization algorithm,
while when Pr(t) = O(n/m) for all tuples t, then we give a concrete
anonymization algorithm that is both private and useful. Our algorithm is quite
different from the k-anonymization algorithm studied intensively in the
literature, and is based on random deletions and insertions to I.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 00:21:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rastogi",
"Vibhor",
""
],
[
"Suciu",
"Dan",
""
],
[
"Hong",
"Sungho",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612104 | Keki Burjorjee | Keki Burjorjee | Sufficient Conditions for Coarse-Graining Evolutionary Dynamics | 19 pages, 1 figure. Accepted to the Foundations of Genetic Algorithms
Conference 2007 (FOGA IX) | null | null | null | cs.NE cs.AI | null | It is commonly assumed that the ability to track the frequencies of a set of
schemata in the evolving population of an infinite population genetic algorithm
(IPGA) under different fitness functions will advance efforts to obtain a
theory of adaptation for the simple GA. Unfortunately, for IPGAs with long
genomes and non-trivial fitness functions there do not currently exist
theoretical results that allow such a study. We develop a simple framework for
analyzing the dynamics of an infinite population evolutionary algorithm (IPEA).
This framework derives its simplicity from its abstract nature. In particular
we make no commitment to the data-structure of the genomes, the kind of
variation performed, or the number of parents involved in a variation
operation. We use this framework to derive abstract conditions under which the
dynamics of an IPEA can be coarse-grained. We then use this result to derive
concrete conditions under which it becomes computationally feasible to closely
approximate the frequencies of a family of schemata of relatively low order
over multiple generations, even when the bitstsrings in the evolving population
of the IPGA are long.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 02:18:17 GMT"
},
{
"version": "v2",
"created": "Sat, 5 May 2007 02:25:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burjorjee",
"Keki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612105 | Elankovan Sundararajan Mr. | Elankovan Sundararajan and Aaron Harwood | Towards Parallel Computing on the Internet: Applications, Architectures,
Models and Programming Tools | 39 pages, 9 figures | null | null | null | cs.DC cs.PF | null | The development of Internet wide resources for general purpose parallel
computing poses the challenging task of matching computation and communication
complexity. A number of parallel computing models exist that address this for
traditional parallel architectures, and there are a number of emerging models
that attempt to do this for large scale Internet-based systems like
computational grids. In this survey we cover the three fundamental aspects --
application, architecture and model, and we show how they have been developed
over the last decade. We also cover programming tools that are currently being
used for parallel programming in computational grids. The trend in conventional
computational models are to put emphasis on efficient communication between
participating nodes by adapting different types of communication to network
conditions. Effects of dynamism and uncertainties that arise in large scale
systems are evidently important to understand and yet there is currently little
work that addresses this from a parallel computing perspective.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 06:38:21 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Dec 2006 00:51:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sundararajan",
"Elankovan",
""
],
[
"Harwood",
"Aaron",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0612106 | Yu Zhang | Slawomir Lasota, David Nowak, Yu Zhang | On Completeness of Logical Relations for Monadic Types | 20 pages, full version of the paper published at ASIAN'2006, with the
same title | Advances in Computer Science - ASIAN 2006, Secure Software, 11th
Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006,
Proceedings, volume 4435 of Lecture Notes in Computer Science, pages 223-230,
Springer | 10.1007/978-3-540-77505-8_17 | null | cs.LO cs.PL | null | Software security can be ensured by specifying and verifying security
properties of software using formal methods with strong theoretical bases. In
particular, programs can be modeled in the framework of lambda-calculi, and
interesting properties can be expressed formally by contextual equivalence
(a.k.a. observational equivalence). Furthermore, imperative features, which
exist in most real-life software, can be nicely expressed in the so-called
computational lambda-calculus. Contextual equivalence is difficult to prove
directly, but we can often use logical relations as a tool to establish it in
lambda-calculi. We have already defined logical relations for the computational
lambda-calculus in previous work. We devote this paper to the study of their
completeness w.r.t. contextual equivalence in the computational
lambda-calculus.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 09:02:32 GMT"
}
] | 2009-04-08T00:00:00 | [
[
"Lasota",
"Slawomir",
""
],
[
"Nowak",
"David",
""
],
[
"Zhang",
"Yu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0612107 | Friedhelm. R. Drepper | Friedhelm R. Drepper | Voiced speech as secondary response of a self-consistent fundamental
drive | 13 pages with 3 figures | null | null | null | cs.SD nlin.AO | null | Voiced segments of speech are assumed to be composed of non-stationary
acoustic objects which can be described as stationary response of a
non-stationary fundamental drive (FD) process and which are furthermore suited
to reconstruct the hidden FD by using a voice adapted (self-consistent)
part-tone decomposition of the speech signal. The universality and robustness
of human pitch perception encourages the reconstruction of a band-limited FD in
the frequency range of the pitch. The self-consistent decomposition of voiced
continuants generates several part-tones which can be confirmed to be
topologically equivalent to corresponding acoustic modes of the excitation on
the transmitter side. As topologically equivalent image of a glottal master
oscillator, the self-consistent FD is suited to serve as low frequency part of
the basic time-scale separation of auditive perception and to describe the
broadband voiced excitation as entrained (synchronized) and/or modulated
primary response. Being guided by the acoustic correlates of pitch and loudness
perception, the time-scale separation avoids the conventional assumption of
stationary excitation and represents the basic decoding step of an advanced
precision transmission protocol of self-consistent (voiced) acoustic objects.
The present study is focussed on the adaptation of the trajectories (contours)
of the centre filter frequency of the part-tones to the chirp of the glottal
master oscillator.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 12:39:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Drepper",
"Friedhelm R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/0612108 | Fabien Mathieu | Dmitry Lebedev (INRIA Rocquencourt), Fabien Mathieu (INRIA
Rocquencourt), Laurent Viennot (INRIA Rocquencourt), Anh-Tuan Gai (INRIA
Rocquencourt), Julien Reynier (INRIA Rocquencourt, INRIA Rocquencourt),
Fabien De Montgolfier (INRIA Rocquencourt) | On Using Matching Theory to Understand P2P Network Design | null | null | null | null | cs.NI cs.GT | null | This paper aims to provide insight into stability of collaboration choices in
P2P networks. We study networks where exchanges between nodes are driven by the
desire to receive the best service available. This is the case for most
existing P2P networks. We explore an evolution model derived from stable
roommates theory that accounts for heterogeneity between nodes. We show that
most P2P applications can be modeled using stable matching theory. This is the
case whenever preference lists can be deduced from the exchange policy. In many
cases, the preferences lists are characterized by an interesting acyclic
property. We show that P2P networks with acyclic preferences possess a unique
stable state with good convergence properties.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 15:19:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lebedev",
"Dmitry",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA\n Rocquencourt"
],
[
"Viennot",
"Laurent",
"",
"INRIA Rocquencourt"
],
[
"Gai",
"Anh-Tuan",
"",
"INRIA\n Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt, INRIA Rocquencourt"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0612109 | Vicen G\'omez Cerd\`a | Vicenc Gomez, J. M. Mooij, H. J. Kappen | Truncating the loop series expansion for Belief Propagation | 31 pages, 12 figures, submitted to Journal of Machine Learning
Research | The Journal of Machine Learning Research, 8(Sep):1987--2016, 2007 | null | null | cs.AI | null | Recently, M. Chertkov and V.Y. Chernyak derived an exact expression for the
partition sum (normalization constant) corresponding to a graphical model,
which is an expansion around the Belief Propagation solution. By adding
correction terms to the BP free energy, one for each "generalized loop" in the
factor graph, the exact partition sum is obtained. However, the usually
enormous number of generalized loops generally prohibits summation over all
correction terms. In this article we introduce Truncated Loop Series BP
(TLSBP), a particular way of truncating the loop series of M. Chertkov and V.Y.
Chernyak by considering generalized loops as compositions of simple loops. We
analyze the performance of TLSBP in different scenarios, including the Ising
model, regular random graphs and on Promedas, a large probabilistic medical
diagnostic system. We show that TLSBP often improves upon the accuracy of the
BP solution, at the expense of increased computation time. We also show that
the performance of TLSBP strongly depends on the degree of interaction between
the variables. For weak interactions, truncating the series leads to
significant improvements, whereas for strong interactions it can be
ineffective, even if a high number of terms is considered.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 17:29:28 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jul 2007 08:59:01 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Gomez",
"Vicenc",
""
],
[
"Mooij",
"J. M.",
""
],
[
"Kappen",
"H. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0612110 | James Hamilton | James Hamilton | Architecture for Modular Data Centers | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Several factors are driving high-scale deployments of large data centers
built upon commodity components. These commodity clusters are far cheaper than
mainframe systems of the past but they bring serious heat and power density
issues. Also the high failure rate of the individual components drives
significant administrative costs. This proposal outlines an architecture for
data center design based upon 20'x8'x8' modules that substantially changes how
these systems are acquired, administered, and then later recycled.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 19:36:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hamilton",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612111 | Russell Sears | Russell Sears, Catharine van Ingen | Fragmentation in Large Object Repositories | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Fragmentation leads to unpredictable and degraded application performance.
While these problems have been studied in detail for desktop filesystem
workloads, this study examines newer systems such as scalable object stores and
multimedia repositories. Such systems use a get/put interface to store objects.
In principle, databases and filesystems can support such applications
efficiently, allowing system designers to focus on complexity, deployment cost
and manageability. Although theoretical work proves that certain storage
policies behave optimally for some workloads, these policies often behave
poorly in practice. Most storage benchmarks focus on short-term behavior or do
not measure fragmentation. We compare SQL Server to NTFS and find that
fragmentation dominates performance when object sizes exceed 256KB-1MB. NTFS
handles fragmentation better than SQL Server. Although the performance curves
will vary with other systems and workloads, we expect the same interactions
between fragmentation and free space to apply. It is well-known that
fragmentation is related to the percentage free space. We found that the ratio
of free space to object size also impacts performance. Surprisingly, in both
systems, storing objects of a single size causes fragmentation, and changing
the size of write requests affects fragmentation. These problems could be
addressed with simple changes to the filesystem and database interfaces. It is
our hope that an improved understanding of fragmentation will lead to
predictable storage systems that require less maintenance after deployment.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 21:51:15 GMT"
}
] | 2009-08-21T00:00:00 | [
[
"Sears",
"Russell",
""
],
[
"van Ingen",
"Catharine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612112 | Boris Baryshnikov | Boris Baryshnikov, Cipri Clinciu, Conor Cunningham, Leo Giakoumakis,
Slava Oks, Stefano Stefani | Managing Query Compilation Memory Consumption to Improve DBMS Throughput | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | While there are known performance trade-offs between database page buffer
pool and query execution memory allocation policies, little has been written on
the impact of query compilation memory use on overall throughput of the
database management system (DBMS). We present a new aspect of the query
optimization problem and offer a solution implemented in Microsoft SQL Server
2005. The solution provides stable throughput for a range of workloads even
when memory requests outstrip the ability of the hardware to service those
requests.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 21:51:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baryshnikov",
"Boris",
""
],
[
"Clinciu",
"Cipri",
""
],
[
"Cunningham",
"Conor",
""
],
[
"Giakoumakis",
"Leo",
""
],
[
"Oks",
"Slava",
""
],
[
"Stefani",
"Stefano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612113 | Paul Greenfield | Paul Greenfield, Alan Fekete, Julian Jang, Dean Kuo, Surya Nepal | Isolation Support for Service-based Applications: A Position Paper | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | In this paper, we propose an approach to providing the benefits of isolation
in service-oriented applications where it is not feasible to hold traditional
locks for ACID transactions. Our technique, called "Promises", provides an
uniform view for clients which covers a wide range of implementation techniques
on the service side, all allowing the client to check a condition and then
later rely on that condition still holding.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:08:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greenfield",
"Paul",
""
],
[
"Fekete",
"Alan",
""
],
[
"Jang",
"Julian",
""
],
[
"Kuo",
"Dean",
""
],
[
"Nepal",
"Surya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612114 | Alexander Bohm | Alexander B\"ohm, Carl-Christian Kanne, Guido Moerkotte | Demaq: A Foundation for Declarative XML Message Processing | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | This paper gives an overview of Demaq, an XML message processing system
operating on the foundation of transactional XML message queues. We focus on
the syntax and semantics of its fully declarative, rule-based application
language and demonstrate our message-based programming paradigm in the context
of a case study. Further, we discuss optimization opportunities for executing
Demaq programs.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:29:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Böhm",
"Alexander",
""
],
[
"Kanne",
"Carl-Christian",
""
],
[
"Moerkotte",
"Guido",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612115 | Roger Barga | Roger S. Barga, Jonathan Goldstein, Mohamed Ali, Mingsheng Hong | Consistent Streaming Through Time: A Vision for Event Stream Processing | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Event processing will play an increasingly important role in constructing
enterprise applications that can immediately react to business critical events.
Various technologies have been proposed in recent years, such as event
processing, data streams and asynchronous messaging (e.g. pub/sub). We believe
these technologies share a common processing model and differ only in target
workload, including query language features and consistency requirements. We
argue that integrating these technologies is the next step in a natural
progression. In this paper, we present an overview and discuss the foundations
of CEDR, an event streaming system that embraces a temporal stream model to
unify and further enrich query language features, handle imperfections in event
delivery and define correctness guarantees. We describe specific contributions
made so far and outline next steps in developing the CEDR system.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:40:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barga",
"Roger S.",
""
],
[
"Goldstein",
"Jonathan",
""
],
[
"Ali",
"Mohamed",
""
],
[
"Hong",
"Mingsheng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612116 | Norman Danner | Norman Danner and James S. Royer | Adventures in time and space | Corrected version to appear in Logical Methods in Computer Science | Logical Methods in Computer Science, Volume 3, Issue 1 (March 12,
2007) lmcs:2231 | 10.2168/LMCS-3(1:9)2007 | null | cs.LO cs.PL | null | This paper investigates what is essentially a call-by-value version of PCF
under a complexity-theoretically motivated type system. The programming
formalism, ATR, has its first-order programs characterize the polynomial-time
computable functions, and its second-order programs characterize the type-2
basic feasible functionals of Mehlhorn and of Cook and Urquhart. (The ATR-types
are confined to levels 0, 1, and 2.) The type system comes in two parts, one
that primarily restricts the sizes of values of expressions and a second that
primarily restricts the time required to evaluate expressions. The
size-restricted part is motivated by Bellantoni and Cook's and Leivant's
implicit characterizations of polynomial-time. The time-restricting part is an
affine version of Barber and Plotkin's DILL. Two semantics are constructed for
ATR. The first is a pruning of the naive denotational semantics for ATR. This
pruning removes certain functions that cause otherwise feasible forms of
recursion to go wrong. The second semantics is a model for ATR's time
complexity relative to a certain abstract machine. This model provides a
setting for complexity recurrences arising from ATR recursions, the solutions
of which yield second-order polynomial time bounds. The time-complexity
semantics is also shown to be sound relative to the costs of interpretation on
the abstract machine.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 23:54:20 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Feb 2007 21:32:55 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Mar 2007 12:09:20 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Royer",
"James S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0612117 | Seiji Miyoshi | Masahiro Urakami, Seiji Miyoshi, Masato Okada | Statistical Mechanics of On-line Learning when a Moving Teacher Goes
around an Unlearnable True Teacher | 12 pages, 5 pages | null | 10.1143/JPSJ.76.044003 | null | cs.LG cond-mat.dis-nn | null | In the framework of on-line learning, a learning machine might move around a
teacher due to the differences in structures or output functions between the
teacher and the learning machine. In this paper we analyze the generalization
performance of a new student supervised by a moving machine. A model composed
of a fixed true teacher, a moving teacher, and a student is treated
theoretically using statistical mechanics, where the true teacher is a
nonmonotonic perceptron and the others are simple perceptrons. Calculating the
generalization errors numerically, we show that the generalization errors of a
student can temporarily become smaller than that of a moving teacher, even if
the student only uses examples from the moving teacher. However, the
generalization error of the student eventually becomes the same value with that
of the moving teacher. This behavior is qualitatively different from that of a
linear model.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 00:25:04 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Urakami",
"Masahiro",
""
],
[
"Miyoshi",
"Seiji",
""
],
[
"Okada",
"Masato",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
}
] |
cs/0612118 | Sujay Sanghavi | Sujay Sanghavi, Bruce Hajek, and Laurent Massoulie | Gossiping with Multiple Messages | Accepted to IEEE INFOCOM 2007 | null | null | null | cs.NI cs.IT math.IT | null | This paper investigates the dissemination of multiple pieces of information
in large networks where users contact each other in a random uncoordinated
manner, and users upload one piece per unit time. The underlying motivation is
the design and analysis of piece selection protocols for peer-to-peer networks
which disseminate files by dividing them into pieces. We first investigate
one-sided protocols, where piece selection is based on the states of either the
transmitter or the receiver. We show that any such protocol relying only on
pushes, or alternatively only on pulls, is inefficient in disseminating all
pieces to all users. We propose a hybrid one-sided piece selection protocol --
INTERLEAVE -- and show that by using both pushes and pulls it disseminates $k$
pieces from a single source to $n$ users in $10(k+\log n)$ time, while obeying
the constraint that each user can upload at most one piece in one unit of time,
with high probability for large $n$. An optimal, unrealistic centralized
protocol would take $k+\log_2 n$ time in this setting. Moreover, efficient
dissemination is also possible if the source implements forward erasure coding,
and users push the latest-released coded pieces (but do not pull). We also
investigate two-sided protocols where piece selection is based on the states of
both the transmitter and the receiver. We show that it is possible to
disseminate $n$ pieces to $n$ users in $n+O(\log n)$ time, starting from an
initial state where each user has a unique piece.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 06:34:18 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sanghavi",
"Sujay",
""
],
[
"Hajek",
"Bruce",
""
],
[
"Massoulie",
"Laurent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612119 | Philippe Saux Picart | Cyril Brunie (LACO), Philippe Saux Picart (LM) | Symmetric Subresultants and Applications | null | null | null | null | cs.SC | null | Schur's transforms of a polynomial are used to count its roots in the unit
disk. These are generalized them by introducing the sequence of symmetric
sub-resultants of two polynomials. Although they do have a determinantal
definition, we show that they satisfy a structure theorem which allows us to
compute them with a type of Euclidean division. As a consequence, a fast
algorithm based on a dichotomic process and FFT is designed. We prove also that
these symmetric sub-resultants have a deep link with Toeplitz matrices.
Finally, we propose a new algorithm of inversion for such matrices. It has the
same cost as those already known, however it is fraction-free and consequently
well adapted to computer algebra.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 08:20:11 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 17:49:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brunie",
"Cyril",
"",
"LACO"
],
[
"Picart",
"Philippe Saux",
"",
"LM"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0612120 | Francesco Ranzato | Francesco Ranzato and Francesco Tapparo | Generalizing the Paige-Tarjan Algorithm by Abstract Interpretation | Keywords: Abstract interpretation, abstract model checking, strong
preservation, Paige-Tarjan algorithm, refinement algorithm | null | null | null | cs.LO | null | The Paige and Tarjan algorithm (PT) for computing the coarsest refinement of
a state partition which is a bisimulation on some Kripke structure is well
known. It is also well known in model checking that bisimulation is equivalent
to strong preservation of CTL, or, equivalently, of Hennessy-Milner logic.
Drawing on these observations, we analyze the basic steps of the PT algorithm
from an abstract interpretation perspective, which allows us to reason on
strong preservation in the context of generic inductively defined (temporal)
languages and of possibly non-partitioning abstract models specified by
abstract interpretation. This leads us to design a generalized Paige-Tarjan
algorithm, called GPT, for computing the minimal refinement of an abstract
interpretation-based model that strongly preserves some given language. It
turns out that PT is a straight instance of GPT on the domain of state
partitions for the case of strong preservation of Hennessy-Milner logic. We
provide a number of examples showing that GPT is of general use. We first show
how a well-known efficient algorithm for computing stuttering equivalence can
be viewed as a simple instance of GPT. We then instantiate GPT in order to
design a new efficient algorithm for computing simulation equivalence that is
competitive with the best available algorithms. Finally, we show how GPT allows
to compute new strongly preserving abstract models by providing an efficient
algorithm that computes the coarsest refinement of a given partition that
strongly preserves the language generated by the reachability operator.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 19:45:34 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2006 11:16:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ranzato",
"Francesco",
""
],
[
"Tapparo",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0612121 | Stefan Funke | Stefan Funke, Soeren Laue, Zvi Lotker, Rouven Naujoks | Power Assignment Problems in Wireless Communication | 13 pages | null | null | null | cs.CG cs.AR cs.NI | null | A fundamental class of problems in wireless communication is concerned with
the assignment of suitable transmission powers to wireless devices/stations
such that the resulting communication graph satisfies certain desired
properties and the overall energy consumed is minimized. Many concrete
communication tasks in a wireless network like broadcast, multicast,
point-to-point routing, creation of a communication backbone, etc. can be
regarded as such a power assignment problem.
This paper considers several problems of that kind; for example one problem
studied before in \cite{Carrots, Bilo} aims to select and assign powers to $k$
of the stations such that all other stations are within reach of at least one
of the selected stations. We improve the running time for obtaining a
$(1+\epsilon)$-approximate solution for this problem from
$n^{((\alpha/\epsilon)^{O(d)})}$ as reported by Bilo et al. (\cite{Bilo}) to
$O(n+ {(\frac{k^{2d+1}}{\epsilon^d})}^{\min{\{2k, (\alpha/\epsilon)^{O(d)}
\}}})$ that is, we obtain a running time that is \emph{linear} in the network
size. Further results include a constant approximation algorithm for the TSP
problem under squared (non-metric!) edge costs, which can be employed to
implement a novel data aggregation protocol, as well as efficient schemes to
perform $k$-hop multicasts.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 12:53:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Funke",
"Stefan",
""
],
[
"Laue",
"Soeren",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Naujoks",
"Rouven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612122 | Joerg Wagner | Joerg Wagner, Boris Rankov, and Armin Wittneben | Large N Analysis of Amplify-and-Forward MIMO Relay Channels with
Correlated Rayleigh Fading | submitted for publication to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | In this correspondence the cumulants of the mutual information of the flat
Rayleigh fading amplify-and-forward MIMO relay channel without direct link
between source and destination are derived in the large array limit. The
analysis is based on the replica trick and covers both spatially independent
and correlated fading in the first and the second hop, while beamforming at all
terminals is restricted to deterministic weight matrices. Expressions for mean
and variance of the mutual information are obtained. Their parameters are
determined by a nonlinear equation system. All higher cumulants are shown to
vanish as the number of antennas n goes to infinity. In conclusion the
distribution of the mutual information I becomes Gaussian in the large n limit
and is completely characterized by the expressions obtained for mean and
variance of I. Comparisons with simulation results show that the asymptotic
results serve as excellent approximations for systems with only few antennas at
each node. The derivation of the results follows the technique formalized by
Moustakas et al. in [1]. Although the evaluations are more involved for the
MIMO relay channel compared to point-to-point MIMO channels, the structure of
the results is surprisingly simple again. In particular an elegant formula for
the mean of the mutual information is obtained, i.e., the ergodic capacity of
the two-hop amplify-and-forward MIMO relay channel without direct link.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 15:42:57 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wagner",
"Joerg",
""
],
[
"Rankov",
"Boris",
""
],
[
"Wittneben",
"Armin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612123 | Andreas W. Liehr | Lioudmila Belenkaia, Michael Bohnert and Andreas W. Liehr | Electronic Laboratory Notebook Assisting Reflectance Spectrometry in
Legal Medicine | 5 pages, 2 figures | null | 10.1177/2211068212443960 | null | cs.DB cs.DL cs.IR | null | Reflectance spectrometry is a fast and reliable method for the
characterisation of human skin if the spectra are analysed with respect to a
physical model describing the optical properties of human skin. For a field
study performed at the Institute of Legal Medicine and the Freiburg Materials
Research Center of the University of Freiburg an electronic laboratory notebook
has been developed, which assists in the recording, management, and analysis of
reflectance spectra. The core of the electronic laboratory notebook is a MySQL
database. It is filled with primary data via a web interface programmed in
Java, which also enables the user to browse the database and access the results
of data analysis. These are carried out by Matlab, Tcl and
Python scripts, which retrieve the primary data from the electronic
laboratory notebook, perform the analysis, and store the results in the
database for further usage.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 13:29:27 GMT"
}
] | 2020-04-07T00:00:00 | [
[
"Belenkaia",
"Lioudmila",
""
],
[
"Bohnert",
"Michael",
""
],
[
"Liehr",
"Andreas W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0612124 | Emmanuel Candes | Emmanuel J. Candes and Paige A. Randall | Highly robust error correction by convex programming | 23 pages, 2 figures | null | null | null | cs.IT math.IT math.PR math.ST stat.TH | null | This paper discusses a stylized communications problem where one wishes to
transmit a real-valued signal x in R^n (a block of n pieces of information) to
a remote receiver. We ask whether it is possible to transmit this information
reliably when a fraction of the transmitted codeword is corrupted by arbitrary
gross errors, and when in addition, all the entries of the codeword are
contaminated by smaller errors (e.g. quantization errors).
We show that if one encodes the information as Ax where A is a suitable m by
n coding matrix (m >= n), there are two decoding schemes that allow the
recovery of the block of n pieces of information x with nearly the same
accuracy as if no gross errors occur upon transmission (or equivalently as if
one has an oracle supplying perfect information about the sites and amplitudes
of the gross errors). Moreover, both decoding strategies are very concrete and
only involve solving simple convex optimization programs, either a linear
program or a second-order cone program. We complement our study with numerical
simulations showing that the encoder/decoder pair performs remarkably well.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 18:05:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Candes",
"Emmanuel J.",
""
],
[
"Randall",
"Paige A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0612125 | Anolan Milanes | Anolan Milan\'es, Noemi Rodriguez and Bruno Schulze | Heterogeneous Strong Computation Migration | This is the pre-peer reviewed version of the following article:
Milan\'es, A., Rodriguez, N. and Schulze, B. (2008), State of the art in
heterogeneous strong migration of computations. Concurrency and Computation:
Practice and Experience, 20: 1485-1508, which has been published in final
form at http://onlinelibrary.wiley.com/doi/10.1002/cpe.1287/abstract | Concurrency and Computation: Practice and Experience, 20:
1485-1508 | 10.1002/cpe.1287 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The continuous increase in performance requirements, for both scientific
computation and industry, motivates the need of a powerful computing
infrastructure. The Grid appeared as a solution for inexpensive execution of
heavy applications in a parallel and distributed manner. It allows combining
resources independently of their physical location and architecture to form a
global resource pool available to all grid users. However, grid environments
are highly unstable and unpredictable. Adaptability is a crucial issue in this
context, in order to guarantee an appropriate quality of service to users.
Migration is a technique frequently used for achieving adaptation. The
objective of this report is to survey the problem of strong migration in
heterogeneous environments like the grids', the related implementation issues
and the current solutions.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 18:27:25 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Oct 2010 00:41:45 GMT"
}
] | 2010-10-05T00:00:00 | [
[
"Milanés",
"Anolan",
""
],
[
"Rodriguez",
"Noemi",
""
],
[
"Schulze",
"Bruno",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0612126 | Petr Ivankov | Petr R. Ivankov, Nikolay P. Ivankov | The virtual reality framework for engineering objects | null | null | null | null | cs.CE cs.MS | null | A framework for virtual reality of engineering objects has been developed.
This framework may simulate different equipment related to virtual reality.
Framework supports 6D dynamics, ordinary differential equations, finite
formulas, vector and matrix operations. The framework also supports embedding
of external software.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 19:19:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
],
[
"Ivankov",
"Nikolay P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0612127 | Mohamed Y. Eltabakh | Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref | bdbms -- A Database Management System for Biological Data | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Biologists are increasingly using databases for storing and managing their
data. Biological databases typically consist of a mixture of raw data,
metadata, sequences, annotations, and related data obtained from various
sources. Current database technology lacks several functionalities that are
needed by biological databases. In this paper, we introduce bdbms, an
extensible prototype database management system for supporting biological data.
bdbms extends the functionalities of current DBMSs to include: (1) Annotation
and provenance management including storage, indexing, manipulation, and
querying of annotation and provenance as first class objects in bdbms, (2)
Local dependency tracking to track the dependencies and derivations among data
items, (3) Update authorization to support data curation via content-based
authorization, in contrast to identity-based authorization, and (4) New access
methods and their supporting operators that support pattern matching on various
types of compressed biological data types. This paper presents the design of
bdbms along with the techniques proposed to support these functionalities
including an extension to SQL. We also outline some open issues in building
bdbms.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:32:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eltabakh",
"Mohamed Y.",
""
],
[
"Ouzzani",
"Mourad",
""
],
[
"Aref",
"Walid G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612128 | Daniel Gyllstrom | Daniel Gyllstrom, Eugene Wu, Hee-Jin Chae, Yanlei Diao, Patrick
Stahlberg, Gordon Anderson | SASE: Complex Event Processing over Streams | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | RFID technology is gaining adoption on an increasing scale for tracking and
monitoring purposes. Wide deployments of RFID devices will soon generate an
unprecedented volume of data. Emerging applications require the RFID data to be
filtered and correlated for complex pattern detection and transformed to events
that provide meaningful, actionable information to end applications. In this
work, we design and develop SASE, a com-plex event processing system that
performs such data-information transformation over real-time streams. We design
a complex event language for specifying application logic for such
transformation, devise new query processing techniques to effi-ciently
implement the language, and develop a comprehensive system that collects,
cleans, and processes RFID data for deliv-ery of relevant, timely information
as well as storing necessary data for future querying. We demonstrate an
initial prototype of SASE through a real-world retail management scenario.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:38:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gyllstrom",
"Daniel",
""
],
[
"Wu",
"Eugene",
""
],
[
"Chae",
"Hee-Jin",
""
],
[
"Diao",
"Yanlei",
""
],
[
"Stahlberg",
"Patrick",
""
],
[
"Anderson",
"Gordon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612129 | Bishwaranjan Bhattacharjee | Bishwaranjan Bhattacharjee, Vuk Ercegovac, Joseph Glider, Richard
Golding, Guy Lohman, Volke Markl, Hamid Pirahesh, Jun Rao, Robert Rees,
Frederick Reiss, Eugene Shekita, Garret Swart | Impliance: A Next Generation Information Management Appliance | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | ably successful in building a large market and adapting to the changes of the
last three decades, its impact on the broader market of information management
is surprisingly limited. If we were to design an information management system
from scratch, based upon today's requirements and hardware capabilities, would
it look anything like today's database systems?" In this paper, we introduce
Impliance, a next-generation information management system consisting of
hardware and software components integrated to form an easy-to-administer
appliance that can store, retrieve, and analyze all types of structured,
semi-structured, and unstructured information. We first summarize the trends
that will shape information management for the foreseeable future. Those trends
imply three major requirements for Impliance: (1) to be able to store, manage,
and uniformly query all data, not just structured records; (2) to be able to
scale out as the volume of this data grows; and (3) to be simple and robust in
operation. We then describe four key ideas that are uniquely combined in
Impliance to address these requirements, namely the ideas of: (a) integrating
software and off-the-shelf hardware into a generic information appliance; (b)
automatically discovering, organizing, and managing all data - unstructured as
well as structured - in a uniform way; (c) achieving scale-out by exploiting
simple, massive parallel processing, and (d) virtualizing compute and storage
resources to unify, simplify, and streamline the management of Impliance.
Impliance is an ambitious, long-term effort to define simpler, more robust, and
more scalable information systems for tomorrow's enterprises.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:49:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bhattacharjee",
"Bishwaranjan",
""
],
[
"Ercegovac",
"Vuk",
""
],
[
"Glider",
"Joseph",
""
],
[
"Golding",
"Richard",
""
],
[
"Lohman",
"Guy",
""
],
[
"Markl",
"Volke",
""
],
[
"Pirahesh",
"Hamid",
""
],
[
"Rao",
"Jun",
""
],
[
"Rees",
"Robert",
""
],
[
"Reiss",
"Frederick",
""
],
[
"Shekita",
"Eugene",
""
],
[
"Swart",
"Garret",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612130 | Fabien Mathieu | Anh-Tuan Gai (INRIA Rocquencourt), Fabien Mathieu (INRIA
Rocquencourt), Julien Reynier (INRIA Rocquencourt), Fabien De Montgolfier
(INRIA Rocquencourt) | Stratification in P2P Networks - Application to BitTorrent | null | null | null | null | cs.NI | null | We introduce a model for decentralized networks with collaborating peers. The
model is based on the stable matching theory which is applied to systems with a
global ranking utility function. We consider the dynamics of peers searching
for efficient collaborators and we prove that a unique stable solution exists.
We prove that the system converges towards the stable solution and analyze its
speed of convergence. We also study the stratification properties of the model,
both when all collaborations are possible and for random possible
collaborations. We present the corresponding fluid limit on the choice of
collaborators in the random case. As a practical example, we study the
BitTorrent Tit-for-Tat policy. For this system, our model provides an
interesting insight on peer download rates and a possible way to optimize peer
strategy.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 21:11:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gai",
"Anh-Tuan",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA\n Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612131 | Amine Chigani | Amine Chigani James D. Arthur Shawn Bohner | Architecting Network-Centric Software Systems: A Style-Based Beginning | 10 pages, 3 figures, 2 table, Submitted to Software Engineering
Workshop 2007 | null | null | null | cs.SE | null | With the advent of potent network technology, software development has
evolved from traditional platform-centric construction to network-centric
evolution. This change involves largely the way we reason about systems as
evidenced in the introduction of Network- Centric Operations (NCO).
Unfortunately, it has resulted in conflicting interpretations of how to map NCO
concepts to the field of software architecture. In this paper, we capture the
core concepts and goals of NCO, investigate the implications of these concepts
and goals on software architecture, and identify the operational
characteristics that distinguish network-centric software systems from other
systems. More importantly, we use architectural design principles to propose an
outline for a network-centric architectural style that helps in characterizing
network-centric software systems and that provides a means by which their
distinguishing operational characteristics can be realized.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 01:00:32 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Dec 2006 03:07:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bohner",
"Amine Chigani James D. Arthur Shawn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0612132 | Lokman Meho | Lokman I. Meho, Kiduk Yang | A New Era in Citation and Bibliometric Analyses: Web of Science, Scopus,
and Google Scholar | 49 pages, accepted for publication in the Journal of the American
Society for Information Science and Technology | null | null | null | cs.DL cs.IR | null | Academic institutions, federal agencies, publishers, editors, authors, and
librarians increasingly rely on citation analysis for making hiring, promotion,
tenure, funding, and/or reviewer and journal evaluation and selection
decisions. The Institute for Scientific Information's (ISI) citation databases
have been used for decades as a starting point and often as the only tools for
locating citations and/or conducting citation analyses. ISI databases (or Web
of Science), however, may no longer be adequate as the only or even the main
sources of citations because new databases and tools that allow citation
searching are now available. Whether these new databases and tools complement
or represent alternatives to Web of Science (WoS) is important to explore.
Using a group of 15 library and information science faculty members as a case
study, this paper examines the effects of using Scopus and Google Scholar (GS)
on the citation counts and rankings of scholars as measured by WoS. The paper
discusses the strengths and weaknesses of WoS, Scopus, and GS, their overlap
and uniqueness, quality and language of the citations, and the implications of
the findings for citation analysis. The project involved citation searching for
approximately 1,100 scholarly works published by the study group and over 200
works by a test group (an additional 10 faculty members). Overall, more than
10,000 citing and purportedly citing documents were examined. WoS data took
about 100 hours of collecting and processing time, Scopus consumed 200 hours,
and GS a grueling 3,000 hours.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 14:47:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Meho",
"Lokman I.",
""
],
[
"Yang",
"Kiduk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0612133 | Paul Vitanyi | Paul M.B. Vitanyi (CWI and University of Amsterdam), Zvi Lotker (Ben
Gurion University, Beer Sheva) | Tales of Huffman | LaTex 8 pages | null | null | null | cs.IT cs.CC math.IT | null | We study the new problem of Huffman-like codes subject to individual
restrictions on the code-word lengths of a subset of the source words. These
are prefix codes with minimal expected code-word length for a random source
where additionally the code-word lengths of a subset of the source words is
prescribed, possibly differently for every such source word. Based on a
structural analysis of properties of optimal solutions, we construct an
efficient dynamic programming algorithm for this problem, and for an integer
programming problem that may be of independent interest.
| [
{
"version": "v1",
"created": "Mon, 25 Dec 2006 15:09:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and University of Amsterdam"
],
[
"Lotker",
"Zvi",
"",
"Ben\n Gurion University, Beer Sheva"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612134 | Ketan Mulmuley D | Ketan D Mulmuley, Milind Sohoni | Geometric Complexity Theory II: Towards explicit obstructions for
embeddings among class varieties | 46 pages | null | null | null | cs.CC math.AG math.RT | null | In part I we reduced the arithmetic (characteristic zero) version of the P
\not \subseteq NP conjecture to the problem of showing that a variety
associated with the complexity class NP cannot be embedded in the variety
associated the complexity class P. We call these class varieties.
In this paper, this approach is developed further, reducing the nonexistence
problems, such as the P vs. NP and related lower bound problems, to existence
problems: specifically to proving existence of obstructions to such embeddings
among class varieties. It gives two results towards explicit construction of
such obstructions.
The first result is a generalization of the Borel-Weil theorem to a class of
orbit closures, which include class varieties. The recond result is a weaker
form of a conjectured analogue of the second fundamental theorem of invariant
theory for the class variety associated with the complexity class NC. These
results indicate that the fundamental lower bound problems in complexity theory
are intimately linked with explicit construction problems in algebraic geometry
and representation theory.
| [
{
"version": "v1",
"created": "Mon, 25 Dec 2006 18:51:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mulmuley",
"Ketan D",
""
],
[
"Sohoni",
"Milind",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
] |
cs/0612135 | Eric Rondeau | Idriss Diouri (CRAN), Jean-Philippe Georges (CRAN), Eric Rondeau
(CRAN) | Accommodation of the Service Offered by the Network for Networked
Control Systems | 8 pages | 2nd workshop on Networked Control Systems : Tolerant to faults
(23/11/2006) 8 pages | null | null | cs.NI | null | Networked Controlled Systems (NCSs) are more and more used in industrial
applications. They are strongly connected to real-time constraints because
important delays induced by the network can lead to an unstable process
control. Usually, the network used in NCSs is shared with many others
applications requiring different Quality of Service. The objective of this
paper is to optimize the tuning of the network scheduling mechanisms in taking
into account the level of Quality of Control. The goal is to maximize the
bandwidth allocation for unconstrained frames in guarantying that the control
constraints are respected. In this paper, we focus on switched Ethernet network
implementing the Classification of Service (IEEE 802.1p) based on a Weighted
Round Robin policy.
| [
{
"version": "v1",
"created": "Tue, 26 Dec 2006 20:17:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diouri",
"Idriss",
"",
"CRAN"
],
[
"Georges",
"Jean-Philippe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612136 | Dmitrii Manin | Dmitrii Manin | Experiments on predictability of word in context and information rate in
natural language | 14 pages, 3 figures | Manin, D.Yu. 2006. Experiments on predictability of word in
context and information rate in natural language. J. Information Processes
(electronic publication, http://www.jip.ru), 6 (3), 229-236 | null | null | cs.IT math.IT | null | Based on data from a large-scale experiment with human subjects, we conclude
that the logarithm of probability to guess a word in context (unpredictability)
depends linearly on the word length. This result holds both for poetry and
prose, even though with prose, the subjects don't know the length of the
omitted word. We hypothesize that this effect reflects a tendency of natural
language to have an even information rate.
| [
{
"version": "v1",
"created": "Wed, 27 Dec 2006 07:19:32 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Manin",
"Dmitrii",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0612137 | Eric Robinson | Eric Robinson, David DeWitt | Turning Cluster Management into Data Management: A System Overview | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | This paper introduces the CondorJ2 cluster management system. Traditionally,
cluster management systems such as Condor employ a process-oriented approach
with little or no use of modern database system technology. In contrast,
CondorJ2 employs a data-centric, 3-tier web-application architecture for all
system functions (e.g., job submission, monitoring and scheduling; node
configuration, monitoring and management, etc.) except for job execution.
Employing a data-oriented approach allows the core challenge (i.e., managing
and coordinating a large set of distributed computing resources) to be
transformed from a relatively low-level systems problem into a more abstract,
higher-level data management problem. Preliminary results suggest that
CondorJ2's use of standard 3-tier software represents a significant step
forward to the design and implementation of large clusters (1,000 to 10,000
nodes).
| [
{
"version": "v1",
"created": "Wed, 27 Dec 2006 22:21:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robinson",
"Eric",
""
],
[
"DeWitt",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0612138 | Alexander Haubold | Alexander Haubold, John R. Kender | Accommodating Sample Size Effect on Similarity Measures in Speaker
Clustering | null | null | null | null | cs.SD cs.MM | null | We investigate the symmetric Kullback-Leibler (KL2) distance in speaker
clustering and its unreported effects for differently-sized feature matrices.
Speaker data is represented as Mel Frequency Cepstral Coefficient (MFCC)
vectors, and features are compared using the KL2 metric to form clusters of
speech segments for each speaker. We make two observations with respect to
clustering based on KL2: 1.) The accuracy of clustering is strongly dependent
on the absolute lengths of the speech segments and their extracted feature
vectors. 2.) The accuracy of the similarity measure strongly degrades with the
length of the shorter of the two speech segments. These effects of length can
be attributed to the measure of covariance used in KL2. We demonstrate an
empirical correction of this sample-size effect that increases clustering
accuracy. We draw parallels to two Vector Quantization-based (VQ) similarity
measures, one which exhibits an equivalent effect of sample size, and the
second being less influenced by it.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:39:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0612139 | Alexander Haubold | Alexander Haubold, John R. Kender | Alignment of Speech to Highly Imperfect Text Transcriptions | null | null | null | null | cs.SD cs.MM | null | We introduce a novel and inexpensive approach for the temporal alignment of
speech to highly imperfect transcripts from automatic speech recognition (ASR).
Transcripts are generated for extended lecture and presentation videos, which
in some cases feature more than 30 speakers with different accents, resulting
in highly varying transcription qualities. In our approach we detect a subset
of phonemes in the speech track, and align them to the sequence of phonemes
extracted from the transcript. We report on the results for 4 speech-transcript
sets ranging from 22 to 108 minutes. The alignment performance is promising,
showing a correct matching of phonemes within 10, 20, 30 second error margins
for more than 60%, 75%, 90% of text, respectively, on average.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:45:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0612140 | Valmir Barbosa | Valmir C. Barbosa, Fernando M.L. Ferreira, Daniel V. Kling, Eduardo
Lopes, Fabio Protti, Eber A. Schmitz | On simulating nondeterministic stochastic activity networks | null | European Journal of Operational Research 198 (2009), 266-274 | 10.1016/j.ejor.2008.06.010 | null | cs.DM | null | In this work we deal with a mechanism for process simulation called a
NonDeterministic Stochastic Activity Network (NDSAN). An NDSAN consists
basically of a set of activities along with precedence relations involving
these activities, which determine their order of execution. Activity durations
are stochastic, given by continuous, nonnegative random variables. The
nondeterministic behavior of an NDSAN is based on two additional possibilities:
(i) by associating choice probabilities with groups of activities, some
branches of execution may not be taken; (ii) by allowing iterated executions of
groups of activities according to predetermined probabilities, the number of
times an activity must be executed is not determined a priori. These properties
lead to a rich variety of activity networks, capable of modeling many real
situations in process engineering, project design, and troubleshooting. We
describe a recursive simulation algorithm for NDSANs, whose repeated execution
produces a close approximation to the probability distribution of the
completion time of the entire network. We also report on real-world case
studies.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 12:46:57 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Mar 2007 15:43:09 GMT"
}
] | 2009-03-23T00:00:00 | [
[
"Barbosa",
"Valmir C.",
""
],
[
"Ferreira",
"Fernando M. L.",
""
],
[
"Kling",
"Daniel V.",
""
],
[
"Lopes",
"Eduardo",
""
],
[
"Protti",
"Fabio",
""
],
[
"Schmitz",
"Eber A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0612141 | Christian Tanguy | Annie Druault-Vicard, Christian Tanguy | Exact Failure Frequency Calculations for Extended Systems | null | null | null | null | cs.PF | null | This paper shows how the steady-state availability and failure frequency can
be calculated in a single pass for very large systems, when the availability is
expressed as a product of matrices. We apply the general procedure to
$k$-out-of-$n$:G and linear consecutive $k$-out-of-$n$:F systems, and to a
simple ladder network in which each edge and node may fail. We also give the
associated generating functions when the components have identical
availabilities and failure rates. For large systems, the failure rate of the
whole system is asymptotically proportional to its size. This paves the way to
ready-to-use formulae for various architectures, as well as proof that the
differential operator approach to failure frequency calculations is very useful
and straightforward.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:35:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Druault-Vicard",
"Annie",
""
],
[
"Tanguy",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0612142 | Christian Tanguy | Christian Tanguy | What is the probability of connecting two points ? | a few critical polynomials are at the end of the .tex source file | J. Phys. A: Math. Theor. 40 (2007) 14099-14116 | 10.1088/1751-8113/40/47/005 | null | cs.DM cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The two-terminal reliability, known as the pair connectedness or connectivity
function in percolation theory, may actually be expressed as a product of
transfer matrices in which the probability of operation of each link and site
is exactly taken into account. When link and site probabilities are $p$ and
$\rho$, it obeys an asymptotic power-law behavior, for which the scaling factor
is the transfer matrix's eigenvalue of largest modulus. The location of the
complex zeros of the two-terminal reliability polynomial exhibits structural
transitions as $0 \leq \rho \leq 1$.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:39:26 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jul 2008 15:41:39 GMT"
}
] | 2008-07-03T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0612143 | Christian Tanguy | Christian Tanguy | Exact solutions for the two- and all-terminal reliabilities of a simple
ladder network | null | null | null | null | cs.PF | null | The exact calculation of network reliability in a probabilistic context has
been a long-standing issue of practical importance, but a difficult one, even
for planar graphs, with perfect nodes and with edges of identical reliability
p. Many approaches (determination of bounds, sums of disjoint products
algorithms, Monte Carlo evaluations, studies of the reliability polynomials,
etc.) can only provide approximations when the network's size increases. We
consider here a ladder graph of arbitrary size corresponding to real-life
network configurations, and give the exact, analytical solutions for the all-
and two-terminal reliabilities. These solutions use transfer matrices, in which
individual reliabilities of edges and nodes are taken into account. The special
case of identical edge and node reliabilities -- p and rho, respectively -- is
solved. We show that the zeros of the two-terminal reliability polynomial
exhibit structures which differ substantially for seemingly similar networks,
and we compare the sensitivity of various edges. We discuss how the present
work may be further extended to lead to a catalog of exactly solvable networks
in terms of reliability, which could be useful as elementary bricks for a new
and improved set of bounds or benchmarks in the general case.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:43:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701001 | Ashutosh Gore | Ashutosh Deepak Gore, Srikanth Jagabathula, Abhay Karandikar | On High Spatial Reuse Link Scheduling in STDMA Wireless Ad Hoc Networks | 10 pages (double column), 10 figures | null | null | null | cs.PF cs.NI | null | Graph-based algorithms for point-to-point link scheduling in Spatial reuse
Time Division Multiple Access (STDMA) wireless ad hoc networks often result in
a significant number of transmissions having low Signal to Interference and
Noise density Ratio (SINR) at intended receivers, leading to low throughput. To
overcome this problem, we propose a new algorithm for STDMA link scheduling
based on a graph model of the network as well as SINR computations. The
performance of our algorithm is evaluated in terms of spatial reuse and
computational complexity. Simulation results demonstrate that our algorithm
achieves better performance than existing algorithms.
| [
{
"version": "v1",
"created": "Tue, 2 Jan 2007 14:14:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gore",
"Ashutosh Deepak",
""
],
[
"Jagabathula",
"Srikanth",
""
],
[
"Karandikar",
"Abhay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701002 | Semih Serbetli | Semih Serbetli and Aylin Yener | Relay Assisted F/TDMA Ad Hoc Networks: Node Classification, Power
Allocation and Relaying Strategies | 26 pages, 1 table, 9 figures | null | null | null | cs.IT math.IT | null | This paper considers the design of relay assisted F/TDMA ad hoc networks with
multiple relay nodes each of which assists the transmission of a predefined
subset of source nodes to their respective destinations. Considering the sum
capacity as the performance metric, we solve the problem of optimally
allocating the total power of each relay node between the transmissions it is
assisting. We consider four different relay transmission strategies, namely
regenerative decode-and-forward (RDF), nonregenerative decode-and-forward
(NDF), amplify-and-forward (AF) and compress-and-forward (CF). We first obtain
the optimum power allocation policies for the relay nodes that employ a uniform
relaying strategy for all nodes. We show that the optimum power allocation for
the RDF and NDF cases are modified water-filling solutions. We observe that for
a given relay transmit power, NDF always outperforms RDF whereas CF always
provides higher sum capacity than AF. When CF and NDF are compared, it is
observed that either of CF or NDF may outperform the other in different
scenarios. This observation suggests that the sum capacity can be further
improved by having each relay adopt its relaying strategy in helping different
source nodes. We investigate this problem next and determine the optimum power
allocation and relaying strategy for each source node that relay nodes assist.
We observe that optimum power allocation for relay nodes with hybrid relaying
strategies provides higher sum capacity than pure RDF, NDF, AF or CF relaying
strategies.
| [
{
"version": "v1",
"created": "Tue, 2 Jan 2007 12:14:26 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Serbetli",
"Semih",
""
],
[
"Yener",
"Aylin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701003 | Jens Christian Claussen | Jens Christian Claussen (University Kiel) | Magnification Laws of Winner-Relaxing and Winner-Enhancing Kohonen
Feature Maps | 6 pages, 3 figures. ESMTB 2002 Milano. For the extended journal
version see cond-mat/0208414 | pp. 17-22 in : V. Capasso (Ed.): Mathematical Modeling & Computing
in Biology and Medicine, Miriam Series, Progetto Leonardo, Bologna (2003) | null | null | cs.NE cs.IT math.IT | null | Self-Organizing Maps are models for unsupervised representation formation of
cortical receptor fields by stimuli-driven self-organization in laterally
coupled winner-take-all feedforward structures. This paper discusses
modifications of the original Kohonen model that were motivated by a potential
function, in their ability to set up a neural mapping of maximal mutual
information. Enhancing the winner update, instead of relaxing it, results in an
algorithm that generates an infomax map corresponding to magnification exponent
of one. Despite there may be more than one algorithm showing the same
magnification exponent, the magnification law is an experimentally accessible
quantity and therefore suitable for quantitative description of neural
optimization principles.
| [
{
"version": "v1",
"created": "Sat, 30 Dec 2006 11:48:32 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Claussen",
"Jens Christian",
"",
"University Kiel"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701004 | Sumit Ganguly | Sumit Ganguly | An algebraic approach to complexity of data stream computations | Revised version | null | null | null | cs.CC | null | We consider a basic problem in the general data streaming model, namely, to
estimate a vector $f \in \Z^n$ that is arbitrarily updated (i.e., incremented
or decremented) coordinate-wise. The estimate $\hat{f} \in \Z^n$ must satisfy
$\norm{\hat{f}-f}_{\infty}\le \epsilon\norm{f}_1 $, that is, $\forall i
~(\abs{\hat{f}_i - f_i} \le \epsilon \norm{f}_1)$. It is known to have
$\tilde{O}(\epsilon^{-1})$ randomized space upper bound \cite{cm:jalgo},
$\Omega(\epsilon^{-1} \log (\epsilon n))$ space lower bound
\cite{bkmt:sirocco03} and deterministic space upper bound of
$\tilde{\Omega}(\epsilon^{-2})$ bits.\footnote{The $\tilde{O}$ and
$\tilde{\Omega}$ notations suppress poly-logarithmic factors in $n, \log
\epsilon^{-1}, \norm{f}_{\infty}$ and $\log \delta^{-1}$, where, $\delta$ is
the error probability (for randomized algorithm).} We show that any
deterministic algorithm for this problem requires space $\Omega(\epsilon^{-2}
(\log \norm{f}_1))$ bits.
| [
{
"version": "v1",
"created": "Tue, 2 Jan 2007 18:12:52 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Aug 2007 04:22:21 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Feb 2008 12:01:48 GMT"
},
{
"version": "v4",
"created": "Sun, 6 Apr 2008 05:07:19 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Ganguly",
"Sumit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701005 | Christian Tanguy | Christian Tanguy | Exact solutions for the two- and all-terminal reliabilities of the
Brecht-Colbourn ladder and the generalized fan | null | null | null | null | cs.PF | null | The two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the
generalized fan have been calculated exactly for arbitrary size as well as
arbitrary individual edge and node reliabilities, using transfer matrices of
dimension four at most. While the all-terminal reliabilities of these graphs
are identical, the special case of identical edge ($p$) and node ($\rho$)
reliabilities shows that their two-terminal reliabilities are quite distinct,
as demonstrated by their generating functions and the locations of the zeros of
the reliability polynomials, which undergo structural transitions at $\rho =
\displaystyle {1/2}$.
| [
{
"version": "v1",
"created": "Sat, 30 Dec 2006 17:26:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701006 | Stefan Laendner | Stefan Laendner, Thorsten Hehn, Olgica Milenkovic, and Johannes B.
Huber | The Trapping Redundancy of Linear Block Codes | 12 pages, 4 tables, 1 figure, accepted for publication in IEEE
Transactions on Information Theory | null | 10.1109/TIT.2008.2008134 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We generalize the notion of the stopping redundancy in order to study the
smallest size of a trapping set in Tanner graphs of linear block codes. In this
context, we introduce the notion of the trapping redundancy of a code, which
quantifies the relationship between the number of redundant rows in any
parity-check matrix of a given code and the size of its smallest trapping set.
Trapping sets with certain parameter sizes are known to cause error-floors in
the performance curves of iterative belief propagation decoders, and it is
therefore important to identify decoding matrices that avoid such sets. Bounds
on the trapping redundancy are obtained using probabilistic and constructive
methods, and the analysis covers both general and elementary trapping sets.
Numerical values for these bounds are computed for the [2640,1320] Margulis
code and the class of projective geometry codes, and compared with some new
code-specific trapping set size estimates.
| [
{
"version": "v1",
"created": "Sat, 30 Dec 2006 23:39:23 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jan 2008 10:10:44 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Sep 2008 17:16:03 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Laendner",
"Stefan",
""
],
[
"Hehn",
"Thorsten",
""
],
[
"Milenkovic",
"Olgica",
""
],
[
"Huber",
"Johannes B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701007 | Hamed Hatami | Hamed Hatami and Ruzbeh Tusserkani | On the Complexity of the Circular Chromatic Number | null | Journal of Graph Theory. 47(3) (2004) pp. 226-230 | null | null | cs.CG | null | Circular chromatic number, $\chi_c$ is a natural generalization of chromatic
number. It is known that it is \NP-hard to determine whether or not an
arbitrary graph $G$ satisfies $\chi(G) = \chi_c(G)$. In this paper we prove
that this problem is \NP-hard even if the chromatic number of the graph is
known. This answers a question of Xuding Zhu. Also we prove that for all
positive integers $k \ge 2$ and $n \ge 3$, for a given graph $G$ with
$\chi(G)=n$, it is \NP-complete to verify if $\chi_c(G) \le n- \frac{1}{k}$.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 04:48:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Tusserkani",
"Ruzbeh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0701008 | Hamed Hatami | Hamed Hatami and Hossein Maserrat | On the Computational Complexity of Defining Sets | null | Journal of Discrete Applied Mathematics .149(1-3) (2005) pp.
101-110 | null | null | cs.CC | null | Suppose we have a family ${\cal F}$ of sets. For every $S \in {\cal F}$, a
set $D \subseteq S$ is a {\sf defining set} for $({\cal F},S)$ if $S$ is the
only element of $\cal{F}$ that contains $D$ as a subset. This concept has been
studied in numerous cases, such as vertex colorings, perfect matchings,
dominating sets, block designs, geodetics, orientations, and Latin squares.
In this paper, first, we propose the concept of a defining set of a logical
formula, and we prove that the computational complexity of such a problem is
$\Sigma_2$-complete.
We also show that the computational complexity of the following problem about
the defining set of vertex colorings of graphs is $\Sigma_2$-complete:
{\sc Instance:} A graph $G$ with a vertex coloring $c$ and an integer $k$.
{\sc Question:} If ${\cal C}(G)$ be the set of all $\chi(G)$-colorings of
$G$, then does $({\cal C}(G),c)$ have a defining set of size at most $k$?
Moreover, we study the computational complexity of some other variants of
this problem.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 05:47:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Maserrat",
"Hossein",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701009 | Hamed Hatami | Peyman Afshani and Hamed Hatami | Approximation and Inapproximability Results for Maximum Clique of Disc
Graphs in High Dimensions | Final version | Information Processing Letters. 105(3) (2008) pp. 83-87 | null | null | cs.CG math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove algorithmic and hardness results for the problem of finding the
largest set of a fixed diameter in the Euclidean space. In particular, we prove
that if $A^*$ is the largest subset of diameter $r$ of $n$ points in the
Euclidean space, then for every $\epsilon>0$ there exists a polynomial time
algorithm that outputs a set $B$ of size at least $|A^*|$ and of diameter at
most $r(\sqrt{2}+\epsilon)$. On the hardness side, roughly speaking, we show
that unless $P=NP$ for every $\epsilon>0$ it is not possible to guarantee the
diameter $r(\sqrt{4/3}-\epsilon)$ for $B$ even if the algorithm is allowed to
output a set of size $({95\over 94}-\epsilon)^{-1}|A^*|$.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 06:14:03 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Mar 2009 20:07:33 GMT"
}
] | 2009-03-15T00:00:00 | [
[
"Afshani",
"Peyman",
""
],
[
"Hatami",
"Hamed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
cs/0701010 | Ahmed Sidky Ahmed Sidky | Ahmed Sidky, James Arthur | Determining the Applicability of Agile Practices to Mission and
Life-critical Systems | null | null | null | null | cs.SE | null | Adopting agile practices brings about many benefits and improvements to the
system being developed. However, in mission and life-critical systems, adopting
an inappropriate agile practice has detrimental impacts on the system in
various phases of its lifecycle as well as precludes desired qualities from
being actualized. This paper presents a three-stage process that provides
guidance to organizations on how to identify the agile practices they can
benefit from without causing any impact to the mission and life critical system
being developed.
| [
{
"version": "v1",
"created": "Mon, 1 Jan 2007 05:08:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidky",
"Ahmed",
""
],
[
"Arthur",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0701011 | Michael Baer | Michael B. Baer | Infinite-Alphabet Prefix Codes Optimal for $\beta$-Exponential Penalties | 5 pages, 2 figures (with 3 illustrations total), accepted to ISIT
2007 | null | null | null | cs.IT cs.DS math.IT | null | Let $P = \{p(i)\}$ be a measure of strictly positive probabilities on the set
of nonnegative integers. Although the countable number of inputs prevents usage
of the Huffman algorithm, there are nontrivial $P$ for which known methods find
a source code that is optimal in the sense of minimizing expected codeword
length. For some applications, however, a source code should instead minimize
one of a family of nonlinear objective functions, $\beta$-exponential means,
those of the form $\log_a \sum_i p(i) a^{n(i)}$, where $n(i)$ is the length of
the $i$th codeword and $a$ is a positive constant. Applications of such
minimizations include a problem of maximizing the chance of message receipt in
single-shot communications ($a<1$) and a problem of minimizing the chance of
buffer overflow in a queueing system ($a>1$). This paper introduces methods for
finding codes optimal for such exponential means. One method applies to
geometric distributions, while another applies to distributions with lighter
tails. The latter algorithm is applied to Poisson distributions. Both are
extended to minimizing maximum pointwise redundancy.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 03:39:46 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Apr 2007 04:35:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701012 | Michael Baer | Michael B. Baer | $D$-ary Bounded-Length Huffman Coding | 5 pages, 2 figures, accepted to ISIT 2007 | null | null | null | cs.IT cs.DS math.IT | null | Efficient optimal prefix coding has long been accomplished via the Huffman
algorithm. However, there is still room for improvement and exploration
regarding variants of the Huffman problem. Length-limited Huffman coding,
useful for many practical applications, is one such variant, in which codes are
restricted to the set of codes in which none of the $n$ codewords is longer
than a given length, $l_{\max}$. Binary length-limited coding can be done in
$O(n l_{\max})$ time and O(n) space via the widely used Package-Merge
algorithm. In this paper the Package-Merge approach is generalized without
increasing complexity in order to introduce a minimum codeword length,
$l_{\min}$, to allow for objective functions other than the minimization of
expected codeword length, and to be applicable to both binary and nonbinary
codes; nonbinary codes were previously addressed using a slower dynamic
programming approach. These extensions have various applications -- including
faster decompression -- and can be used to solve the problem of finding an
optimal code with limited fringe, that is, finding the best code among codes
with a maximum difference between the longest and shortest codewords. The
previously proposed method for solving this problem was nonpolynomial time,
whereas solving this using the novel algorithm requires only $O(n (l_{\max}-
l_{\min})^2)$ time and O(n) space.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 03:42:09 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Apr 2007 04:31:52 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701013 | Zengyou He | Zengyou He, Xaiofei Xu, Shengchun Deng | Attribute Value Weighting in K-Modes Clustering | 15 pages | null | null | Tr-06-0615 | cs.AI | null | In this paper, the traditional k-modes clustering algorithm is extended by
weighting attribute value matches in dissimilarity computation. The use of
attribute value weighting technique makes it possible to generate clusters with
stronger intra-similarities, and therefore achieve better clustering
performance. Experimental results on real life datasets show that these value
weighting based k-modes algorithms are superior to the standard k-modes
algorithm with respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 09:06:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xaiofei",
""
],
[
"Deng",
"Shengchun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0701014 | Moustapha Diaby | Moustapha Diaby | A Reply to Hofman On: "Why LP cannot solve large instances of
NP-complete problems in polynomial time" | 2 page; 1 table; clarification of some unclear statements | null | null | null | cs.CC | null | Using an approach that seems to be patterned after that of Yannakakis, Hofman
argues that an NP-complete problem cannot be formulated as a polynomial
bounded-sized linear programming problem. He then goes on to propose a
"construct" that he claims to be a counter-example to recently published linear
programming formulations of the Traveling Salesman Problem (TSP) and the
Quadratic Assignment Problems (QAP), respectively. In this paper, we show that
Hofman's construct is flawed, and provide further proof that his
"counter-example" is invalid.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 11:26:26 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 00:39:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701015 | Pierre Sens | Pierre Sens (INRIA Rocquencourt), Luciana Arantes (INRIA
Rocquencourt), Mathieu Bouillaguet (INRIA Rocquencourt), V\'eronique Martin
(INRIA Rocquencourt), Fabiola Greve (DCC) | Asynchronous Implementation of Failure Detectors with partial
connectivity and unknown participants | null | null | null | null | cs.DC | null | We consider the problem of failure detection in dynamic networks such as
MANETs. Unreliable failure detectors are classical mechanisms which provide
information about process failures. However, most of current implementations
consider that the network is fully connected and that the initial number of
nodes of the system is known. This assumption is not applicable to dynamic
environments. Furthermore, such implementations are usually timer-based while
in dynamic networks there is no upper bound for communication delays since
nodes can move. This paper presents an asynchronous implementation of a failure
detector for unknown and mobile networks. Our approach does not rely on timers
and neither the composition nor the number of nodes in the system are known. We
prove that our algorithm can implement failure detectors of class <>S when
behavioral properties and connectivity conditions are satisfied by the
underlying system.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 12:52:58 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Dec 2007 13:17:04 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Sens",
"Pierre",
"",
"INRIA Rocquencourt"
],
[
"Arantes",
"Luciana",
"",
"INRIA\n Rocquencourt"
],
[
"Bouillaguet",
"Mathieu",
"",
"INRIA Rocquencourt"
],
[
"Martin",
"Véronique",
"",
"INRIA Rocquencourt"
],
[
"Greve",
"Fabiola",
"",
"DCC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0701016 | Oded Kafri | Oded Kafri | The Second Law and Informatics | 20 pages 6 figures | null | null | null | cs.IT math.IT | null | A unification of thermodynamics and information theory is proposed. It is
argued that similarly to the randomness due to collisions in thermal systems,
the quenched randomness that exists in data files in informatics systems
contributes to entropy. Therefore, it is possible to define equilibrium and to
calculate temperature for informatics systems. The obtained temperature yields
correctly the Shannon information balance in informatics systems and is
consistent with the Clausius inequality and the Carnot cycle.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 16:02:43 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Apr 2007 14:02:55 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Kafri",
"Oded",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701017 | Giacomo Bacci | Giacomo Bacci, Marco Luise, H. Vincent Poor and Antonia M. Tulino | Energy-Efficient Power Control in Impulse Radio UWB Wireless Networks | Submitted to the IEEE Journal on Selected Topics in Signal Processing
- Special issue on Performance Limits of Ultra-Wideband Systems | null | 10.1109/JSTSP.2007.906588 | null | cs.IT math.IT | null | In this paper, a game-theoretic model for studying power control for wireless
data networks in frequency-selective multipath environments is analyzed. The
uplink of an impulse-radio ultrawideband system is considered. The effects of
self-interference and multiple-access interference on the performance of
generic Rake receivers are investigated for synchronous systems. Focusing on
energy efficiency, a noncooperative game is proposed in which users in the
network are allowed to choose their transmit powers to maximize their own
utilities, and the Nash equilibrium for the proposed game is derived. It is
shown that, due to the frequency selective multipath, the noncooperative
solution is achieved at different signal-to-interference-plus-noise ratios,
depending on the channel realization and the type of Rake receiver employed. A
large-system analysis is performed to derive explicit expressions for the
achieved utilities. The Pareto-optimal (cooperative) solution is also discussed
and compared with the noncooperative approach.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 22:22:32 GMT"
},
{
"version": "v2",
"created": "Wed, 9 May 2007 08:43:01 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Bacci",
"Giacomo",
""
],
[
"Luise",
"Marco",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Tulino",
"Antonia M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701018 | Alexander Barg | Andrew Duggan and Alexander Barg | Performance Analysis of Algebraic Soft-Decision Decoding of Reed-Solomon
Codes | 10 pages, 4 figures, submitted for publication | null | null | null | cs.IT math.IT | null | We investigate the decoding region for Algebraic Soft-Decision Decoding (ASD)
of Reed-Solomon codes in a discrete, memoryless, additive-noise channel. An
expression is derived for the error correction radius within which the
soft-decision decoder produces a list that contains the transmitted codeword.
The error radius for ASD is shown to be larger than that of Guruswami-Sudan
hard-decision decoding for a subset of low-rate codes. These results are also
extended to multivariable interpolation in the sense of Parvaresh and Vardy. An
upper bound is then presented for ASD's probability of error, where an error is
defined as the event that the decoder selects an erroneous codeword from its
list. This new definition gives a more accurate bound on the probability of
error of ASD than the results available in the literature.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 01:43:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Duggan",
"Andrew",
""
],
[
"Barg",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701019 | John Shea | Tan F. Wong, Tat M. Lok, and John M. Shea | Flow-optimized Cooperative Transmission for the Relay Channel | Submitted to Transactions on Information Theory, December 2006. 34
pages, 4 figures. Correction, March 26, 2007. Revision, September 13, 2007:
Revised text and provided additional proofs regarding diversity-multiplexing
tradeoffs and delay-limited rates with optimal long-term power control | null | null | null | cs.IT math.IT | null | This paper describes an approach for half-duplex cooperative transmission in
a classical three-node relay channel. Assuming availability of channel state
information at nodes, the approach makes use of this information to optimize
distinct flows through the direct link from the source to the destination and
the path via the relay, respectively. It is shown that such a design can
effectively harness diversity advantage of the relay channel in both high-rate
and low-rate scenarios. When the rate requirement is low, the proposed design
gives a second-order outage diversity performance approaching that of
full-duplex relaying. When the rate requirement becomes asymptotically large,
the design still gives a close-to-second-order outage diversity performance.
The design also achieves the best diversity-multiplexing tradeoff possible for
the relay channel. With optimal long-term power control over the fading relay
channel, the proposed design achieves a delay-limited rate performance that is
only 3.0dB (5.4dB) worse than the capacity performance of the additive white
Gaussian channel in low- (high-) rate scenarios.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 02:08:44 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 19:02:18 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Sep 2007 01:43:48 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Wong",
"Tan F.",
""
],
[
"Lok",
"Tat M.",
""
],
[
"Shea",
"John M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701020 | Sumit Ganguly | Sumit Ganguly | A nearly optimal and deterministic summary structure for update data
streams | Withdrawn | null | null | null | cs.DS | null | The paper has been withdrawn due to an error in Lemma 1.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 09:03:08 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 15:11:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganguly",
"Sumit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0701021 | Franco Milicchio | Franco Milicchio | The Unix KISS: A Case Study | Removed from arXiv and other sources | null | null | null | cs.OS cs.GL | null | In this paper we show that the initial philosophy used in designing and
developing UNIX in early times has been forgotten due to "fast practices". We
question the leitmotif that microkernels, though being by design adherent to
the KISS principle, have a number of context switches higher than their
monolithic counterparts, running a test suite and verify the results with
standard statistical validation tests. We advocate a wiser distribution of
shared libraries by statistically analyzing the weight of each shared object in
a typical UNIX system, showing that the majority of shared libraries exist in a
common space for no real evidence of need. Finally we examine the UNIX heritage
with an historical point of view, noticing how habits swiftly replaced the
intents of the original authors, moving the focus from the earliest purpose of
is avoiding complications, keeping a system simple to use and maintain.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 09:45:28 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jul 2013 14:09:11 GMT"
}
] | 2013-07-08T00:00:00 | [
[
"Milicchio",
"Franco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0701022 | Mateusz Zakrzewski | Mateusz Zakrzewski | Definable functions in the simply typed lambda-calculus | Submitted to TLCA 2007 | null | null | null | cs.LO | null | It is a common knowledge that the integer functions definable in simply typed
lambda-calculus are exactly the extended polynomials. This is indeed the case
when one interprets integers over the type (p->p)->p->p where p is a base type
and/or equality is taken as beta-conversion. It is commonly believed that the
same holds for beta-eta equality and for integers represented over any fixed
type of the form (t->t)->t->t. In this paper we show that this opinion is not
quite true.
We prove that the class of functions strictly definable in simply typed
lambda-calculus is considerably larger than the extended polynomials. Namely,
we define F as the class of strictly definable functions and G as a class that
contains extended polynomials and two additional functions, or more precisely,
two function schemas, and is closed under composition. We prove that G is a
subset of F.
We conjecture that G exactly characterizes strictly definable functions, i.e.
G=F, and we gather some evidence for this conjecture proving, for example, that
every skewly representable finite range function is strictly representable over
(t->t)->t->t for some t.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 17:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zakrzewski",
"Mateusz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701023 | Sergey Gubin | Sergey Gubin | A Polynomial Time Algorithm for 3-SAT | 9 pages. The version consolidates results and shares know-how | null | null | null | cs.CC cs.DM cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Article describes a class of efficient algorithms for 3SAT and their
generalizations on SAT.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 18:16:30 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 17:55:26 GMT"
},
{
"version": "v3",
"created": "Mon, 28 Apr 2008 22:57:05 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Jul 2008 07:28:03 GMT"
}
] | 2008-07-15T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701024 | Yingbin Liang | Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz) | Secure Communication over Fading Channels | Submitted to IEEE Transactions on Information Theory, Special Issue
on Information Theoretic Security, November 2006 | null | null | null | cs.IT cs.CR math.IT | null | The fading broadcast channel with confidential messages (BCC) is
investigated, where a source node has common information for two receivers
(receivers 1 and 2), and has confidential information intended only for
receiver 1. The confidential information needs to be kept as secret as possible
from receiver 2. The broadcast channel from the source node to receivers 1 and
2 is corrupted by multiplicative fading gain coefficients in addition to
additive Gaussian noise terms. The channel state information (CSI) is assumed
to be known at both the transmitter and the receivers. The parallel BCC with
independent subchannels is first studied, which serves as an
information-theoretic model for the fading BCC. The secrecy capacity region of
the parallel BCC is established. This result is then specialized to give the
secrecy capacity region of the parallel BCC with degraded subchannels. The
secrecy capacity region is then established for the parallel Gaussian BCC, and
the optimal source power allocations that achieve the boundary of the secrecy
capacity region are derived. In particular, the secrecy capacity region is
established for the basic Gaussian BCC. The secrecy capacity results are then
applied to study the fading BCC. Both the ergodic and outage performances are
studied.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 18:49:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Liang",
"Yingbin",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701025 | Merouane Debbah | O. Ryan and M. Debbah | Free deconvolution for signal processing applications | 15 pages. submitted to IT Transactions on Information theoru | null | null | null | cs.IT math.IT | null | Situations in many fields of research, such as digital communications,
nuclear physics and mathematical finance, can be modelled with random matrices.
When the matrices get large, free probability theory is an invaluable tool for
describing the asymptotic behaviour of many systems. It will be shown how free
probability can be used to aid in source detection for certain systems. Sample
covariance matrices for systems with noise are the starting point in our source
detection problem. Multiplicative free deconvolution is shown to be a method
which can aid in expressing limit eigenvalue distributions for sample
covariance matrices, and to simplify estimators for eigenvalue distributions of
covariance matrices.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 18:53:14 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Ryan",
"O.",
""
],
[
"Debbah",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701026 | Yunghsiang Han | Po-Ning Chen, Yunghsiang S. Han, Carlos R. P. Hartmann and Hong-Bin Wu | Analysis of Sequential Decoding Complexity Using the Berry-Esseen
Inequality | Submitted to the IEEE Trans. on Information Theory, 30 pages, 9
figures | null | null | null | cs.IT math.IT | null | his study presents a novel technique to estimate the computational complexity
of sequential decoding using the Berry-Esseen theorem. Unlike the theoretical
bounds determined by the conventional central limit theorem argument, which
often holds only for sufficiently large codeword length, the new bound obtained
from the Berry-Esseen theorem is valid for any blocklength. The accuracy of the
new bound is then examined for two sequential decoding algorithms, an
ordering-free variant of the generalized Dijkstra's algorithm (GDA)(or
simplified GDA) and the maximum-likelihood sequential decoding algorithm
(MLSDA). Empirically investigating codes of small blocklength reveals that the
theoretical upper bound for the simplified GDA almost matches the simulation
results as the signal-to-noise ratio (SNR) per information bit ($\gamma_b$) is
greater than or equal to 8 dB. However, the theoretical bound may become
markedly higher than the simulated average complexity when $\gamma_b$ is small.
For the MLSDA, the theoretical upper bound is quite close to the simulation
results for both high SNR ($\gamma_b\geq 6$ dB) and low SNR ($\gamma_b\leq 2$
dB). Even for moderate SNR, the simulation results and the theoretical bound
differ by at most \makeblue{0.8} on a $\log_{10}$ scale.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 01:07:16 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Aug 2007 00:45:11 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Chen",
"Po-Ning",
""
],
[
"Han",
"Yunghsiang S.",
""
],
[
"Hartmann",
"Carlos R. P.",
""
],
[
"Wu",
"Hong-Bin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701027 | Hari Palaiyanur | Hari Palaiyanur, Cheng Chang, and Anant Sahai | The source coding game with a cheating switcher | 5 pages, 2 figures, submitted to International Symposium on
Information Theory 2007; change in notation throughout paper for version 2 | null | null | null | cs.IT math.IT | null | Berger's paper `The Source Coding Game', IEEE Trans. Inform. Theory, 1971,
considers the problem of finding the rate-distortion function for an
adversarial source comprised of multiple known IID sources. The adversary,
called the `switcher', was allowed only causal access to the source
realizations and the rate-distortion function was obtained through the use of a
type covering lemma. In this paper, the rate-distortion function of the
adversarial source is described, under the assumption that the switcher has
non-causal access to all source realizations. The proof utilizes the type
covering lemma and simple conditional, random `switching' rules. The
rate-distortion function is once again the maximization of the R(D) function
for a region of attainable IID distributions.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 05:38:13 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Apr 2007 21:58:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Palaiyanur",
"Hari",
""
],
[
"Chang",
"Cheng",
""
],
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701028 | Pedro Pury | Juan P. Herrera and Pedro A. Pury | Statistical keyword detection in literary corpora | Published version. 11 pages, 7 figures. SVJour for LaTeX2e | Eur. Phys. J. B 63, 135-146 (2008) | 10.1140/epjb/e2008-00206-x | null | cs.CL cs.IR physics.soc-ph | null | Understanding the complexity of human language requires an appropriate
analysis of the statistical distribution of words in texts. We consider the
information retrieval problem of detecting and ranking the relevant words of a
text by means of statistical information referring to the "spatial" use of the
words. Shannon's entropy of information is used as a tool for automatic keyword
extraction. By using The Origin of Species by Charles Darwin as a
representative text sample, we show the performance of our detector and compare
it with another proposals in the literature. The random shuffled text receives
special attention as a tool for calibrating the ranking indices.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 06:11:16 GMT"
},
{
"version": "v2",
"created": "Fri, 30 May 2008 21:26:09 GMT"
}
] | 2008-06-07T00:00:00 | [
[
"Herrera",
"Juan P.",
""
],
[
"Pury",
"Pedro A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0701029 | Dariusz Ku\'smierek | Dariusz Kusmierek | The Inhabitation Problem for Rank Two Intersection Types | 15 pages | null | null | null | cs.LO | null | We prove that the inhabitation problem for rank two intersection types is
decidable, but (contrary to common belief) EXPTIME-hard. The exponential time
hardness is shown by reduction from the in-place acceptance problem for
alternating Turing machines.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 08:38:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kusmierek",
"Dariusz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701030 | Eric Chen | Eric Zhi Chen | New Constructions of a Family of 2-Generator Quasi-Cyclic Two-Weight
Codes and Related Codes | 4 pages, conference | null | null | null | cs.IT math.IT | null | Based on cyclic simplex codes, a new construction of a family of 2-generator
quasi-cyclic two-weight codes is given. New optimal binary quasi-cyclic [195,
8, 96], [210, 8, 104] and [240, 8, 120] codes, good QC ternary [195, 6, 126],
[208, 6, 135], [221, 6, 144] codes are thus obtained. Furthermre, binary
quasi-cyclic self-complementary codes are also constructed.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 13:39:54 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chen",
"Eric Zhi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701031 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Th\'er\`ese Hardin
(LIP6), Pierre Weis (INRIA Rocquencourt) | On the implementation of construction functions for non-free concrete
data types | null | Dans 16th European Symposium on Programming (2006) | null | null | cs.LO cs.PL | null | Many algorithms use concrete data types with some additional invariants. The
set of values satisfying the invariants is often a set of representatives for
the equivalence classes of some equational theory. For instance, a sorted list
is a particular representative wrt commutativity. Theories like associativity,
neutral element, idempotence, etc. are also very common. Now, when one wants to
combine various invariants, it may be difficult to find the suitable
representatives and to efficiently implement the invariants. The preservation
of invariants throughout the whole program is even more difficult and error
prone. Classically, the programmer solves this problem using a combination of
two techniques: the definition of appropriate construction functions for the
representatives and the consistent usage of these functions ensured via
compiler verifications. The common way of ensuring consistency is to use an
abstract data type for the representatives; unfortunately, pattern matching on
representatives is lost. A more appealing alternative is to define a concrete
data type with private constructors so that both compiler verification and
pattern matching on representatives are granted. In this paper, we detail the
notion of private data type and study the existence of construction functions.
We also describe a prototype, called Moca, that addresses the entire problem
of...
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 16:54:35 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Hardin",
"Thérèse",
"",
"LIP6"
],
[
"Weis",
"Pierre",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701032 | Yves Guiraud | Guillaume Bonfante, Yves Guiraud | Polygraphic programs and polynomial-time functions | Logical Methods in Computer Science (to appear), 37 pages, 1 colour
picture, corrected typos | Logical Methods in Computer Science, Volume 5, Issue 2 (June 3,
2009) lmcs:764 | 10.2168/LMCS-5(2:14)2009 | null | cs.LO cs.CC math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the computational model of polygraphs. For that, we consider
polygraphic programs, a subclass of these objects, as a formal description of
first-order functional programs. We explain their semantics and prove that they
form a Turing-complete computational model. Their algebraic structure is used
by analysis tools, called polygraphic interpretations, for complexity analysis.
In particular, we delineate a subclass of polygraphic programs that compute
exactly the functions that are Turing-computable in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 18:05:48 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Nov 2007 15:59:08 GMT"
},
{
"version": "v3",
"created": "Mon, 11 May 2009 13:11:11 GMT"
},
{
"version": "v4",
"created": "Wed, 3 Jun 2009 19:28:40 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Bonfante",
"Guillaume",
""
],
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
cs/0701033 | Blake Hegerle | Blake Hegerle | A Counterexample to a Proposed Proof of P=NP by S. Gubin | 2 pages | null | null | null | cs.CC | null | In a recent paper by S. Gubin [cs/0701023v1], a polynomial-time solution to
the 3SAT problem was presented as proof that P=NP. The proposed algorithm
cannot be made to work, which I shall demonstrate.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 19:16:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hegerle",
"Blake",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701034 | Giacomo Bacci | Giacomo Bacci, Marco Luise and H. Vincent Poor | Performance of Rake Receivers in IR-UWB Networks Using Energy-Efficient
Power Control | 24 pages, 7 figures. Submitted to the IEEE Transactions on Wireless
Communications | null | 10.1109/TWC.2008.070019 | null | cs.IT math.IT | null | This paper studies the performance of partial-Rake (PRake) receivers in
impulse-radio ultrawideband wireless networks when an energy-efficient power
control scheme is adopted. Due to the large bandwidth of the system, the
multipath channel is assumed to be frequency-selective. By making use of
noncooperative game-theoretic models and large-system analysis tools, explicit
expressions are derived in terms of network parameters to measure the effects
of self-interference and multiple-access interference at a receiving access
point. Performance of the PRake receivers is thus compared in terms of achieved
utilities and loss to that of the all-Rake receiver. Simulation results are
provided to validate the analysis.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 23:15:34 GMT"
},
{
"version": "v2",
"created": "Wed, 9 May 2007 08:50:16 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Bacci",
"Giacomo",
""
],
[
"Luise",
"Marco",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701035 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto
Accomazzi, Carolyn S. Grant, Donna Thompson, Elizabeth Bohlen, Stephen S.
Murray | Finding Astronomical Communities Through Co-readership Analysis | poster presented at the 209th AAS Meeting, 7 pages, 4 figures | null | null | null | cs.DL astro-ph | null | Whenever a large group of people are engaged in an activity, communities will
form. The nature of these communities depends on the relationship considered.
In the group of people who regularly use scholarly literature, a relationship
like ``person i and person j have cited the same paper'' might reveal
communities of people working in a particular field. On this poster, we will
investigate the relationship ``person i and person j have read the same
paper''. Using the data logs of the NASA/Smithsonian Astrophysics Data System
(ADS), we first determine the population that will participate by requiring
that a user queries the ADS at a certain rate. Next, we apply the relationship
to this population. The result of this will be an abstract ``relationship
space'', which we will describe in terms of various ``representations''.
Examples of such ``representations'' are the projection of co-read vectors onto
Principal Components and the spectral density of the co-read network. We will
show that the co-read relationship results in structure, we will describe this
structure and we will provide a first attempt in the classification of this
structure in terms of astronomical communities.
The ADS is funded by NASA Grant NNG06GG68G.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 00:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null
] |
cs/0701036 | Boris Ryabko | Boris Ryabko | Compression-based methods for nonparametric density estimation, on-line
prediction, regression and classification for time series | null | null | null | null | cs.IT math.IT | null | We address the problem of nonparametric estimation of characteristics for
stationary and ergodic time series. We consider finite-alphabet time series and
real-valued ones and the following four problems: i) estimation of the
(limiting) probability (or estimation of the density for real-valued time
series), ii) on-line prediction, iii) regression and iv) classification (or
so-called problems with side information). We show that so-called archivers (or
data compressors) can be used as a tool for solving these problems. In
particular, firstly, it is proven that any so-called universal code (or
universal data compressor) can be used as a basis for constructing
asymptotically optimal methods for the above problems. (By definition, a
universal code can "compress" any sequence generated by a stationary and
ergodic source asymptotically till the Shannon entropy of the source.) And,
secondly, we show experimentally that estimates, which are based on practically
used methods of data compression, have a reasonable precision.
| [
{
"version": "v1",
"created": "Sun, 7 Jan 2007 10:57:38 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Nov 2007 15:12:55 GMT"
}
] | 2007-11-01T00:00:00 | [
[
"Ryabko",
"Boris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701037 | Gene Cooperman | Jason Ansel, Kapil Arya, Gene Cooperman | DMTCP: Transparent Checkpointing for Cluster Computations and the
Desktop | 17 pages; 2 figures, 8 plots, and 2 tables; description of DMTCP;
Version 3: describing checkpointing both for distributed multi-threaded
applications (including MPI), and interactive shell-like languages on
desktop; Revised to reflect version published in IPDPS-09; Software at:
http://dmtcp.sourceforge.net/ | null | null | null | cs.DC cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | DMTCP (Distributed MultiThreaded CheckPointing) is a transparent user-level
checkpointing package for distributed applications. Checkpointing and restart
is demonstrated for a wide range of over 20 well known applications, including
MATLAB, Python, TightVNC, MPICH2, OpenMPI, and runCMS. RunCMS runs as a 680 MB
image in memory that includes 540 dynamic libraries, and is used for the CMS
experiment of the Large Hadron Collider at CERN. DMTCP transparently
checkpoints general cluster computations consisting of many nodes, processes,
and threads; as well as typical desktop applications. On 128 distributed cores
(32 nodes), checkpoint and restart times are typically 2 seconds, with
negligible run-time overhead. Typical checkpoint times are reduced to 0.2
seconds when using forked checkpointing. Experimental results show that
checkpoint time remains nearly constant as the number of nodes increases on a
medium-size cluster.
DMTCP automatically accounts for fork, exec, ssh, mutexes/semaphores, TCP/IP
sockets, UNIX domain sockets, pipes, ptys (pseudo-terminals), terminal modes,
ownership of controlling terminals, signal handlers, open file descriptors,
shared open file descriptors, I/O (including the readline library), shared
memory (via mmap), parent-child process relationships, pid virtualization, and
other operating system artifacts. By emphasizing an unprivileged, user-space
approach, compatibility is maintained across Linux kernels from 2.6.9 through
the current 2.6.28. Since DMTCP is unprivileged and does not require special
kernel modules or kernel patches, DMTCP can be incorporated and distributed as
a checkpoint-restart module within some larger package.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 11:36:50 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2008 08:42:29 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Feb 2009 18:13:25 GMT"
}
] | 2009-02-24T00:00:00 | [
[
"Ansel",
"Jason",
""
],
[
"Arya",
"Kapil",
""
],
[
"Cooperman",
"Gene",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0701038 | Peter Jung | Peter Jung | Approximate Eigenstructure of LTV Channels with Compactly Supported
Spreading | 5 pages, 1 figure, submitted to the 2007 IEEE International Symposium
on Information Theory; condition in Lemma 6 and constants in (26) corrected | null | null | null | cs.IT math.IT | null | In this article we obtain estimates on the approximate eigenstructure of
channels with a spreading function supported only on a set of finite measure
$|U|$.Because in typical application like wireless communication the spreading
function is a random process corresponding to a random Hilbert--Schmidt channel
operator $\BH$ we measure this approximation in terms of the ratio of the
$p$--norm of the deviation from variants of the Weyl symbol calculus to the
$a$--norm of the spreading function itself. This generalizes recent results
obtained for the case $p=2$ and $a=1$. We provide a general approach to this
topic and consider then operators with $|U|<\infty$ in more detail. We show the
relation to pulse shaping and weighted norms of ambiguity functions. Finally we
derive several necessary conditions on $|U|$, such that the approximation error
is below certain levels.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 12:22:40 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Feb 2007 15:51:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Jung",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701039 | Ian Pratt-Hartmann | Ian Pratt-Hartmann | On the Complexity of the Numerically Definite Syllogistic and Related
Fragments | 24 pages 1 figure | null | null | null | cs.LO cs.AI cs.CC | null | In this paper, we determine the complexity of the satisfiability problem for
various logics obtained by adding numerical quantifiers, and other
constructions, to the traditional syllogistic. In addition, we demonstrate the
incompleteness of some recently proposed proof-systems for these logics.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 15:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pratt-Hartmann",
"Ian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701040 | Fumin Zhang | F. Zhang | Curve Tracking Control for Legged Locomotion in Horizontal Plane | 10 pages, 11 figures, Submitted to IEEE Transactions on Automatic
Control | null | null | null | cs.RO | null | We derive a hybrid feedback control law for the lateral leg spring (LLS)
model so that the center of mass of a legged runner follows a curved path in
horizontal plane. The control law enables the runner to change the placement
and the elasticity of its legs to move in a desired direction. Stable motion
along a curved path is achieved using curvature, bearing and relative distance
between the runner and the curve as feedback. Constraints on leg parameters
determine the class of curves that can be followed. We also derive an optimal
control law that stabilizes the orientation of the runner's body relative to
the velocity of the runner's center of mass.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 20:55:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0701041 | Young-Han Kim | Young-Han Kim | A Coding Theorem for a Class of Stationary Channels with Feedback | 23 pages, 5 figures, submitted for publication in IEEE Trans. Inform.
Theory | null | null | null | cs.IT math.IT | null | A coding theorem is proved for a class of stationary channels with feedback
in which the output Y_n = f(X_{n-m}^n, Z_{n-m}^n) is the function of the
current and past m symbols from the channel input X_n and the stationary
ergodic channel noise Z_n. In particular, it is shown that the feedback
capacity is equal to $$ \limp_{n\to\infty} \sup_{p(x^n||y^{n-1})} \frac{1}{n}
I(X^n \to Y^n), $$ where I(X^n \to Y^n) = \sum_{i=1}^n I(X^i; Y_i|Y^{i-1})
denotes the Massey directed information from the channel input to the output,
and the supremum is taken over all causally conditioned distributions
p(x^n||y^{n-1}) = \prod_{i=1}^n p(x_i|x^{i-1},y^{i-1}). The main ideas of the
proof are the Shannon strategy for coding with side information and a new
elementary coding technique for the given channel model without feedback, which
is in a sense dual to Gallager's lossy coding of stationary ergodic sources. A
similar approach gives a simple alternative proof of coding theorems for finite
state channels by Yang-Kavcic-Tatikonda, Chen-Berger, and
Permuter-Weissman-Goldsmith.
| [
{
"version": "v1",
"created": "Sun, 7 Jan 2007 11:42:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Kim",
"Young-Han",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.