id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0701042 | Stephan Tinguely | Amos Lapidoth, Stephan Tinguely | Sending a Bivariate Gaussian Source over a Gaussian MAC with Feedback | 5 pages, submitted to the IEEE International Symposium on Information
Theory 2007 | null | null | null | cs.IT math.IT | null | We consider the problem of transmitting a bivariate Gaussian source over a
two-user additive Gaussian multiple-access channel with feedback. Each of the
transmitters observes one of the source components and tries to describe it to
the common receiver. We are interested in the minimal mean squared error at
which the receiver can reconstruct each of the source components.
In the ``symmetric case'' we show that, below a certain signal-to-noise ratio
threshold which is determined by the source correlation, feedback is useless
and the minimal distortion is achieved by uncoded transmission. For the general
case we give necessary conditions for the achievability of a distortion pair.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 17:20:08 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Lapidoth",
"Amos",
""
],
[
"Tinguely",
"Stephan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701043 | Urs Niesen | Urs Niesen, Devavrat Shah, Gregory Wornell | Adaptive Alternating Minimization Algorithms | 12 pages, to appear in IEEE Transactions on Information Theory | IEEE Transactions on Information Theory, vol. 55, pp. 1423-1429,
March 2009 | null | null | cs.IT math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The classical alternating minimization (or projection) algorithm has been
successful in the context of solving optimization problems over two variables.
The iterative nature and simplicity of the algorithm has led to its application
to many areas such as signal processing, information theory, control, and
finance. A general set of sufficient conditions for the convergence and
correctness of the algorithm is quite well-known when the underlying problem
parameters are fixed. In many practical situations, however, the underlying
problem parameters are changing over time, and the use of an adaptive algorithm
is more appropriate. In this paper, we study such an adaptive version of the
alternating minimization algorithm. As a main result of this paper, we provide
a general set of sufficient conditions for the convergence and correctness of
the adaptive algorithm. Perhaps surprisingly, these conditions seem to be the
minimal ones one would expect in such an adaptive setting. We present
applications of our results to adaptive decomposition of mixtures, adaptive
log-optimal portfolio selection, and adaptive filter design.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:41:38 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Oct 2008 13:47:48 GMT"
}
] | 2010-08-24T00:00:00 | [
[
"Niesen",
"Urs",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0701044 | Tej Singh | Sunder Lal and Tej Singh | New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings | 9 pages | null | null | null | cs.CR | null | This paper presents an identity based multi-proxy multi-signcryption scheme
from pairings. In this scheme a proxy signcrypter group could authorized as a
proxy agent by the coopration of all members in the original signcryption
group. Then the proxy signcryption can be generated by the cooperation of all
the signcrypters in the authorized proxy signcrypter group on the behalf of the
original signcrypter group. As compared to the scheme of Liu and Xiao, the
proposed scheme provides public verifiability of the signature along with
simplified key management.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:02:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Singh",
"Tej",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0701045 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: Another O(n) Test | 14 pages; changes: (i) a test for non-strict convexity is added; (ii)
the proofs are gathered in a separate section; (iii) a more detailed abstract
is given | null | null | null | cs.CG cs.DS | null | An n-gon is defined as a sequence \P=(V_0,...,V_{n-1}) of n points on the
plane. An n-gon \P is said to be convex if the boundary of the convex hull of
the set {V_0,...,V_{n-1}} of the vertices of \P coincides with the union of the
edges [V_0,V_1],...,[V_{n-1},V_0]; if at that no three vertices of \P are
collinear then \P is called strictly convex. We prove that an n-gon \P with
n\ge3 is strictly convex if and only if a cyclic shift of the sequence
(\al_0,...,\al_{n-1})\in[0,2\pi)^n of the angles between the x-axis and the
vectors V_1-V_0,...,V_0-V_{n-1} is strictly monotone. A ``non-strict'' version
of this result is also proved.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:51:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2007 22:57:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0701046 | Andrea Forte | Andrea G. Forte, Henning Schulzrinne | Cooperation Between Stations in Wireless Networks | 16 pages, 49 references, 12 figures, 3 tables | null | null | cucs-044-06 | cs.NI | null | In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as
layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are
critical, particularly for real-time applications such as VoIP. We propose a
novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate
with each other and share useful information about the network in which they
move. We show how we can achieve seamless L2 and L3 handoffs regardless of the
authentication mechanism used and without any changes to either the
infrastructure or the protocol. In particular, we provide a working
implementation of CR and show how, with CR, MNs can achieve a total L2+L3
handoff time of less than 16 ms in an open network and of about 21 ms in an
IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks,
although many of the concepts and problems addressed here apply to any kind of
mobile network.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 20:01:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Forte",
"Andrea G.",
""
],
[
"Schulzrinne",
"Henning",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701047 | {\L}ukasz D\c{e}bowski | Lukasz Debowski | On vocabulary size of grammar-based codes | 5 pages, accepted to ISIT 2007 and corrected | 2007 IEEE International Symposium on Information Theory, 91-95 | 10.1109/ISIT.2007.4557209 | null | cs.IT cs.CL math.IT | null | We discuss inequalities holding between the vocabulary size, i.e., the number
of distinct nonterminal symbols in a grammar-based compression for a string,
and the excess length of the respective universal code, i.e., the code-based
analog of algorithmic mutual information. The aim is to strengthen inequalities
which were discussed in a weaker form in linguistics but shed some light on
redundancy of efficiently computable codes. The main contribution of the paper
is a construction of universal grammar-based codes for which the excess lengths
can be bounded easily.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 13:00:23 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2007 18:12:18 GMT"
}
] | 2020-03-11T00:00:00 | [
[
"Debowski",
"Lukasz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701048 | Samar Agnihotri | Samar Agnihotri and Pavan Nuggehalli | Energy Conscious Interactive Communication for Sensor Networks | 6 pages, 1 figure. Minor revision: fixed a couple of typos | null | null | null | cs.IT math.IT | null | In this work, we are concerned with maximizing the lifetime of a cluster of
sensors engaged in single-hop communication with a base-station. In a
data-gathering network, the spatio-temporal correlation in sensor data induces
data-redundancy. Also, the interaction between two communicating parties is
well-known to reduce the communication complexity. This paper proposes a
formalism that exploits these two opportunities to reduce the number of bits
transmitted by a sensor node in a cluster, hence enhancing its lifetime. We
argue that our approach has several inherent advantages in scenarios where the
sensor nodes are acutely energy and computing-power constrained, but the
base-station is not so. This provides us an opportunity to develop
communication protocols, where most of the computing and communication is done
by the base-station.
The proposed framework casts the sensor nodes and base-station communication
problem as the problem of multiple informants with correlated information
communicating with a recipient and attempts to extend extant work on
interactive communication between an informant-recipient pair to such
scenarios. Our work makes four major contributions. Firstly, we explicitly show
that in such scenarios interaction can help in reducing the communication
complexity. Secondly, we show that the order in which the informants
communicate with the recipient may determine the communication complexity.
Thirdly, we provide the framework to compute the $m$-message communication
complexity in such scenarios. Lastly, we prove that in a typical sensor network
scenario, the proposed formalism significantly reduces the communication and
computational complexities.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 16:07:26 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jan 2007 09:53:18 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Agnihotri",
"Samar",
""
],
[
"Nuggehalli",
"Pavan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701049 | Barnaby Martin | Barnaby Martin | On the Complexity of a Derivative Chess Problem | null | null | null | null | cs.CC | null | We introduce QUEENS, a derivative chess problem based on the classical
n-queens problem. We prove that QUEENS is NP-complete, with respect to
polynomial-time reductions.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 16:45:55 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 15:40:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martin",
"Barnaby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701050 | Olivier Rioul | Olivier Rioul | A Simple Proof of the Entropy-Power Inequality via Properties of Mutual
Information | 5 pages, accepted for presentation at the IEEE International
Symposium on Information Theory 2007 | null | 10.1109/ISIT.2007.4557202 | null | cs.IT math.IT | null | While most useful information theoretic inequalities can be deduced from the
basic properties of entropy or mutual information, Shannon's entropy power
inequality (EPI) seems to be an exception: available information theoretic
proofs of the EPI hinge on integral representations of differential entropy
using either Fisher's information (FI) or minimum mean-square error (MMSE). In
this paper, we first present a unified view of proofs via FI and MMSE, showing
that they are essentially dual versions of the same proof, and then fill the
gap by providing a new, simple proof of the EPI, which is solely based on the
properties of mutual information and sidesteps both FI or MMSE representations.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 16:35:58 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Apr 2007 13:33:49 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Rioul",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701051 | Samar Agnihotri | Samar Agnihotri and Pavan Nuggehalli | Coding, Scheduling, and Cooperation in Wireless Sensor Networks | 10 pages, 1 figure | null | null | null | cs.IT math.IT | null | We consider a single-hop data gathering sensor cluster consisting of a set of
sensors that need to transmit data periodically to a base-station. We are
interested in maximizing the lifetime of this network. Even though the setting
of our problem is very simple, it turns out that the solution is far from easy.
The complexity arises from several competing system-level opportunities
available to reduce the energy consumed in radio transmission. First, sensor
data is spatially and temporally correlated. Recent advances in distributed
source-coding allow us to take advantage of these correlations to reduce the
number of transmitted bits, with concomitant savings in energy. Second, it is
also well-known that channel-coding can be used to reduce transmission energy
by increasing transmission time. Finally, sensor nodes are cooperative, unlike
nodes in an ad hoc network that are often modeled as competitive, allowing us
to take full advantage of the first two opportunities for the purpose of
maximizing cluster lifetime. In this paper, we pose the problem of maximizing
lifetime as a max-min optimization problem subject to the constraint of
successful data collection and limited energy supply at each node. By
introducing the notion of instantaneous decoding, we are able to simplify this
optimization problem into a joint scheduling and time allocation problem. We
show that even with our ample simplification, the problem remains NP-hard. We
provide some algorithms, heuristics and insight for various scenarios. Our
chief contribution is to illustrate both the challenges and gains provided by
joint source-channel coding and scheduling.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 16:46:50 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Agnihotri",
"Samar",
""
],
[
"Nuggehalli",
"Pavan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701052 | Michel Verleysen | Geoffroy Simon (DICE-MLG), Amaury Lendasse (DICE-MLG), Marie Cottrell
(SAMOS, Matisse), Jean-Claude Fort (SAMOS, Matisse), Michel Verleysen (SAMOS,
Matisse, Dice-MLG) | Time Series Forecasting: Obtaining Long Term Trends with Self-Organizing
Maps | \`{a} la suite de la conf\'{e}rence ANNPR, Florence 2003 | Pattern Recognition Letter 26 n0; 12 (05/2005) 1795-1808 | null | null | cs.LG math.ST stat.TH | null | Kohonen self-organisation maps are a well know classification tool, commonly
used in a wide variety of problems, but with limited applications in time
series forecasting context. In this paper, we propose a forecasting method
specifically designed for multi-dimensional long-term trends prediction, with a
double application of the Kohonen algorithm. Practical applications of the
method are also presented.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 17:03:31 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Simon",
"Geoffroy",
"",
"DICE-MLG"
],
[
"Lendasse",
"Amaury",
"",
"DICE-MLG"
],
[
"Cottrell",
"Marie",
"",
"SAMOS, Matisse"
],
[
"Fort",
"Jean-Claude",
"",
"SAMOS, Matisse"
],
[
"Verleysen",
"Michel",
"",
"SAMOS,\n Matisse, Dice-MLG"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0701053 | Deqiang Chen | Deqiang Chen, Kambiz Azarian and J. Nicholas Laneman | A Case For Amplify-Forward Relaying in the Block-Fading Multi-Access
Channel | null | null | null | null | cs.IT math.IT | null | This paper demonstrates the significant gains that multi-access users can
achieve from sharing a single amplify-forward relay in slow fading
environments. The proposed protocol, namely the multi-access relay
amplify-forward, allows for a low-complexity relay and achieves the optimal
diversity-multiplexing trade-off at high multiplexing gains. Analysis of the
protocol reveals that it uniformly dominates the compress-forward strategy and
further outperforms the dynamic decode-forward protocol at high multiplexing
gains. An interesting feature of the proposed protocol is that, at high
multiplexing gains, it resembles a multiple-input single-output system, and at
low multiplexing gains, it provides each user with the same
diversity-multiplexing trade-off as if there is no contention for the relay
from the other users.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 21:27:28 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Chen",
"Deqiang",
""
],
[
"Azarian",
"Kambiz",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701054 | Nathan Segerlind | Nathan Segerlind | Nearly-Exponential Size Lower Bounds for Symbolic Quantifier Elimination
Algorithms and OBDD-Based Proofs of Unsatisfiability | 40 pages, 3 figures. First public draft, comments welcome. Also
submitted at ECCC | null | null | null | cs.CC cs.LO | null | We demonstrate a family of propositional formulas in conjunctive normal form
so that a formula of size $N$ requires size $2^{\Omega(\sqrt[7]{N/logN})}$ to
refute using the tree-like OBDD refutation system of Atserias, Kolaitis and
Vardi with respect to all variable orderings. All known symbolic quantifier
elimination algorithms for satisfiability generate tree-like proofs when run on
unsatisfiable CNFs, so this lower bound applies to the run-times of these
algorithms. Furthermore, the lower bound generalizes earlier results on
OBDD-based proofs of unsatisfiability in that it applies for all variable
orderings, it applies when the clauses are processed according to an arbitrary
schedule, and it applies when variables are eliminated via quantification.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 01:16:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Segerlind",
"Nathan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701055 | Leif Hanlen | Leif Hanlen, Thushara Abhayapala | Bounds on Space-Time-Frequency Dimensionality | accepted Australian Communication Theory Workshop | null | null | null | cs.IT math.IT | null | We bound the number of electromagnetic signals which may be observed over a
frequency range $2W$ for a time $T$ within a region of space enclosed by a
radius $R$. Our result implies that broadband fields in space cannot be
arbitrarily complex: there is a finite amount of information which may be
extracted from a region of space via electromagnetic radiation.
Three-dimensional space allows a trade-off between large carrier frequency
and bandwidth. We demonstrate applications in super-resolution and broadband
communication.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 00:01:24 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hanlen",
"Leif",
""
],
[
"Abhayapala",
"Thushara",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701056 | Leif Hanlen | Leif Hanlen Thushara Abhayapala | Space-Time-Frequency Degrees of Freedom: Fundamental Limits for Spatial
Information | null | null | null | null | cs.IT math.IT | null | We bound the number of electromagnetic signals which may be observed over a
frequency range $[F-W,F+W]$ a time interval $[0,T]$ within a sphere of radius
$R$. We show that the such constrained signals may be represented by a series
expansion whose terms are bounded exponentially to zero beyond a threshold. Our
result implies there is a finite amount of information which may be extracted
from a region of space via electromagnetic radiation.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 00:10:06 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Abhayapala",
"Leif Hanlen Thushara",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701057 | Xiaofei Huang | Xiaofei Huang | Cooperative Optimization for Energy Minimization: A Case Study of Stereo
Matching | null | null | null | null | cs.CV cs.AI | null | Often times, individuals working together as a team can solve hard problems
beyond the capability of any individual in the team. Cooperative optimization
is a newly proposed general method for attacking hard optimization problems
inspired by cooperation principles in team playing. It has an established
theoretical foundation and has demonstrated outstanding performances in solving
real-world optimization problems. With some general settings, a cooperative
optimization algorithm has a unique equilibrium and converges to it with an
exponential rate regardless initial conditions and insensitive to
perturbations. It also possesses a number of global optimality conditions for
identifying global optima so that it can terminate its search process
efficiently. This paper offers a general description of cooperative
optimization, addresses a number of design issues, and presents a case study to
demonstrate its power.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 01:03:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0701058 | Amin Mobasher | Amin Mobasher and Amir K. Khandani | Precoding in Multiple-Antenna Broadcast Systems with a Probabilistic
Viewpoint | null | null | null | UW-E&CE#2007-02 | cs.IT math.IT | null | In this paper, we investigate the minimum average transmit energy that can be
obtained in multiple antenna broadcast systems with channel inversion
technique. The achievable gain can be significantly higher than the
conventional gains that are mentioned in methods like perturbation technique of
Peel, et al. In order to obtain this gain, we introduce a Selective Mapping
(SLM) technique (based on random coding arguments). We propose to implement the
SLM method by using nested lattice codes in a trellis precoding framework.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 02:45:10 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Apr 2007 16:08:28 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Mobasher",
"Amin",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701059 | Samar Agnihotri | Samar Agnihotri and Pavan Nuggehalli | Enhancing Sensor Network Lifetime Using Interactive Communication | 5 pages. To appear in ISIT-2007 (Final version). Major revision wrt
version 2 | null | null | null | cs.IT math.IT | null | We are concerned with maximizing the lifetime of a data-gathering wireless
sensor network consisting of set of nodes directly communicating with a
base-station. We model this scenario as the m-message interactive communication
between multiple correlated informants (sensor nodes) and a recipient
(base-station). With this framework, we show that m-message interactive
communication can indeed enhance network lifetime. Both worst-case and
average-case performances are considered.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 03:31:38 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2007 08:54:43 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Apr 2007 09:26:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Agnihotri",
"Samar",
""
],
[
"Nuggehalli",
"Pavan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701060 | Andreas Klappenecker | Salah A. Aly, Andreas Klappenecker, Pradeep Kiran Sarvepalli | Duadic Group Algebra Codes | 5 pages | null | null | null | cs.IT math.IT quant-ph | null | Duadic group algebra codes are a generalization of quadratic residue codes.
This paper settles an open problem raised by Zhu concerning the existence of
duadic group algebra codes. These codes can be used to construct degenerate
quantum stabilizer codes that have the nice feature that many errors of small
weight do not need error correction; this fact is illustrated by an example.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 04:36:41 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Klappenecker",
"Andreas",
""
],
[
"Sarvepalli",
"Pradeep Kiran",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0701061 | Jia Liu | Jia Liu, Y. Thomas Hou, and Hanif D. Sherali | Conjugate Gradient Projection Approach for Multi-Antenna Gaussian
Broadcast Channels | null | null | null | null | cs.IT math.IT | null | It has been shown recently that the dirty-paper coding is the optimal
strategy for maximizing the sum rate of multiple-input multiple-output Gaussian
broadcast channels (MIMO BC). Moreover, by the channel duality, the nonconvex
MIMO BC sum rate problem can be transformed to the convex dual MIMO
multiple-access channel (MIMO MAC) problem with a sum power constraint. In this
paper, we design an efficient algorithm based on conjugate gradient projection
(CGP) to solve the MIMO BC maximum sum rate problem. Our proposed CGP algorithm
solves the dual sum power MAC problem by utilizing the powerful concept of
Hessian conjugacy. We also develop a rigorous algorithm to solve the projection
problem. We show that CGP enjoys provable convergence, nice scalability, and
great efficiency for large MIMO BC systems.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 05:15:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Liu",
"Jia",
""
],
[
"Hou",
"Y. Thomas",
""
],
[
"Sherali",
"Hanif D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701062 | Sichao Yang | Sichao Yang and Ralf Koetter | Network Coding over a Noisy Relay : a Belief Propagation Approach | null | null | null | null | cs.IT math.IT | null | In recent years, network coding has been investigated as a method to obtain
improvements in wireless networks. A typical assumption of previous work is
that relay nodes performing network coding can decode the messages from sources
perfectly. On a simple relay network, we design a scheme to obtain network
coding gain even when the relay node cannot perfectly decode its received
messages. In our scheme, the operation at the relay node resembles message
passing in belief propagation, sending the logarithm likelihood ratio (LLR) of
the network coded message to the destination. Simulation results demonstrate
the gain obtained over different channel conditions. The goal of this paper is
not to give a theoretical result, but to point to possible interaction of
network coding with user cooperation in noisy scenario. The extrinsic
information transfer (EXIT) chart is shown to be a useful engineering tool to
analyze the performance of joint channel coding and network coding in the
network.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 07:02:35 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Yang",
"Sichao",
""
],
[
"Koetter",
"Ralf",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701063 | Keigo Takeuchi | Keigo Takeuchi, Toshiyuki Tanaka | Hierarchical Decoupling Principle of a MIMO-CDMA Channel in Asymptotic
Limits | null | null | null | null | cs.IT math.IT | null | We analyze an uplink of a fast flat fading MIMO-CDMA channel in the case
where the data symbol vector for each user follows an arbitrary distribution.
The spectral efficiency of the channel with CSI at the receiver is evaluated
analytically with the replica method. The main result is that the hierarchical
decoupling principle holds in the MIMO-CDMA channel, i.e., the MIMO-CDMA
channel is decoupled into a bank of single-user MIMO channels in the many-user
limit, and each single-user MIMO channel is further decoupled into a bank of
scalar Gaussian channels in the many-antenna limit for a fading model with a
limited number of scatterers.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 10:08:55 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Takeuchi",
"Keigo",
""
],
[
"Tanaka",
"Toshiyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701064 | Kai Engelhardt | Kai Engelhardt and Yoram Moses | Causing Communication Closure: Safe Program Composition with Reliable
Non-FIFO Channels | null | null | null | null | cs.DC | null | A semantic framework for analyzing safe composition of distributed programs
is presented. Its applicability is illustrated by a study of program
composition when communication is reliable but not necessarily FIFO\@. In this
model, special care must be taken to ensure that messages do not accidentally
overtake one another in the composed program. We show that barriers do not
exist in this model. Indeed, no program that sends or receives messages can
automatically be composed with arbitrary programs without jeopardizing their
intended behavior. Safety of composition becomes context-sensitive and new
tools are needed for ensuring it. A notion of \emph{sealing} is defined, where
if a program $P$ is immediately followed by a program $Q$ that seals $P$ then
$P$ will be communication-closed--it will execute as if it runs in isolation.
The investigation of sealing in this model reveals a novel connection between
Lamport causality and safe composition. A characterization of sealable programs
is given, as well as efficient algorithms for testing if $Q$ seals $P$ and for
constructing a seal for a significant class of programs. It is shown that every
sealable program that is open to interference on $O(n^2)$ channels can be
sealed using O(n) messages.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 12:18:14 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Engelhardt",
"Kai",
""
],
[
"Moses",
"Yoram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0701065 | Ioannis Chatzigeorgiou | I. Chatzigeorgiou, M. R. D. Rodrigues, I. J. Wassell, R. Carrasco | Can Punctured Rate-1/2 Turbo Codes Achieve a Lower Error Floor than
their Rate-1/3 Parent Codes? | 5 pages, 7 figures, Proceedings of the 2006 IEEE Information Theory
Workshop, Chengdu, China, October 22-26, 2006 | null | 10.1109/ITW2.2006.323763 | null | cs.IT math.IT | null | In this paper we concentrate on rate-1/3 systematic parallel concatenated
convolutional codes and their rate-1/2 punctured child codes. Assuming
maximum-likelihood decoding over an additive white Gaussian channel, we
demonstrate that a rate-1/2 non-systematic child code can exhibit a lower error
floor than that of its rate-1/3 parent code, if a particular condition is met.
However, assuming iterative decoding, convergence of the non-systematic code
towards low bit-error rates is problematic. To alleviate this problem, we
propose rate-1/2 partially-systematic codes that can still achieve a lower
error floor than that of their rate-1/3 parent codes. Results obtained from
extrinsic information transfer charts and simulations support our conclusion.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 16:32:59 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Chatzigeorgiou",
"I.",
""
],
[
"Rodrigues",
"M. R. D.",
""
],
[
"Wassell",
"I. J.",
""
],
[
"Carrasco",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701066 | Lucile Sassatelli | Lucile Sassatelli and David Declercq | Non-binary Hybrid LDPC Codes: Structure, Decoding and Optimization | null | IEEE 2006 Information Theory Workshop, Chengdu, China, Oct.2006,
in proceedings | null | null | cs.IT math.IT | null | In this paper, we propose to study and optimize a very general class of LDPC
codes whose variable nodes belong to finite sets with different orders. We
named this class of codes Hybrid LDPC codes. Although efficient optimization
techniques exist for binary LDPC codes and more recently for non-binary LDPC
codes, they both exhibit drawbacks due to different reasons. Our goal is to
capitalize on the advantages of both families by building codes with binary (or
small finite set order) and non-binary parts in their factor graph
representation. The class of Hybrid LDPC codes is obviously larger than
existing types of codes, which gives more degrees of freedom to find good codes
where the existing codes show their limits. We give two examples where hybrid
LDPC codes show their interest.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 17:50:57 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Sassatelli",
"Lucile",
""
],
[
"Declercq",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701067 | G.Susinder Rajan | G. Susinder Rajan, Anshoo Tandon and B. Sundar Rajan | On Four-group ML Decodable Distributed Space Time Codes for Cooperative
Communication | To appear in Proceedings of WCNC 2007, Hong Kong, March 11-15, 2007.
5 pages, 1 Figure | null | null | null | cs.IT math.IT | null | A construction of a new family of distributed space time codes (DSTCs) having
full diversity and low Maximum Likelihood (ML) decoding complexity is provided
for the two phase based cooperative diversity protocols of Jing-Hassibi and the
recently proposed Generalized Non-orthogonal Amplify and Forward (GNAF)
protocol of Rajan et al. The salient feature of the proposed DSTCs is that they
satisfy the extra constraints imposed by the protocols and are also four-group
ML decodable which leads to significant reduction in ML decoding complexity
compared to all existing DSTC constructions. Moreover these codes have uniform
distribution of power among the relays as well as in time. Also, simulations
results indicate that these codes perform better in comparison with the only
known DSTC with the same rate and decoding complexity, namely the Coordinate
Interleaved Orthogonal Design (CIOD). Furthermore, they perform very close to
DSTCs from field extensions which have same rate but higher decoding
complexity.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 21:12:53 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Tandon",
"Anshoo",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701068 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | Distributed Space-Time Codes for Cooperative Networks with Partial CSI | To appear in Proceedings of WCNC 2007, Hong Kong, March 11-15, 2007 | null | null | null | cs.IT math.IT | null | Design criteria and full-diversity Distributed Space Time Codes (DSTCs) for
the two phase transmission based cooperative diversity protocol of Jing-Hassibi
and the Generalized Nonorthogonal Amplify and Forward (GNAF) protocol are
reported, when the relay nodes are assumed to have knowledge of the phase
component of the source to relay channel gains. It is shown that this under
this partial channel state information (CSI), several well known space time
codes for the colocated MIMO (Multiple Input Multiple Output) channel become
amenable for use as DSTCs. In particular, the well known complex orthogonal
designs, generalized coordinate interleaved orthogonal designs (GCIODs) and
unitary weight single symbol decodable (UW-SSD) codes are shown to satisfy the
required design constraints for DSTCs. Exploiting the relaxed code design
constraints, we propose DSTCs obtained from Clifford Algebras which have low ML
decoding complexity.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 21:20:08 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701069 | Yann Laigle-Chapuy | Fr\'ed\'eric Didier (INRIA Rocquencourt), Yann Laigle-Chapuy (INRIA
Rocquencourt) | Finding low-weight polynomial multiples using discrete logarithm | null | Dans IEEE International Symposium on Information Theory - ISIT'07
(2007) | null | null | cs.CR | null | Finding low-weight multiples of a binary polynomial is a difficult problem
arising in the context of stream ciphers cryptanalysis. The classical algorithm
to solve this problem is based on a time memory trade-off. We will present an
improvement to this approach using discrete logarithm rather than a direct
representation of the involved polynomials. This gives an algorithm which
improves the theoretical complexity, and is also very flexible in practice.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 09:17:59 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jan 2007 16:47:58 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jul 2007 15:39:28 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Didier",
"Frédéric",
"",
"INRIA Rocquencourt"
],
[
"Laigle-Chapuy",
"Yann",
"",
"INRIA\n Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0701070 | Daniel Augot | Daniel Augot, Magali Bardet (LITIS), Jean-Charles Faug\`ere (LIP6) | On formulas for decoding binary cyclic codes | null | IEEE International Symposium on Information Theory, 2007 (ISIT
2007) (2007) 2646-2650 | 10.1109/ISIT.2007.4557618 | null | cs.IT math.IT | null | We adress the problem of the algebraic decoding of any cyclic code up to the
true minimum distance. For this, we use the classical formulation of the
problem, which is to find the error locator polynomial in terms of the syndroms
of the received word. This is usually done with the Berlekamp-Massey algorithm
in the case of BCH codes and related codes, but for the general case, there is
no generic algorithm to decode cyclic codes. Even in the case of the quadratic
residue codes, which are good codes with a very strong algebraic structure,
there is no available general decoding algorithm. For this particular case of
quadratic residue codes, several authors have worked out, by hand, formulas for
the coefficients of the locator polynomial in terms of the syndroms, using the
Newton identities. This work has to be done for each particular quadratic
residue code, and is more and more difficult as the length is growing.
Furthermore, it is error-prone. We propose to automate these computations,
using elimination theory and Grbner bases. We prove that, by computing
appropriate Grbner bases, one automatically recovers formulas for the
coefficients of the locator polynomial, in terms of the syndroms.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 09:13:41 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Augot",
"Daniel",
"",
"LITIS"
],
[
"Bardet",
"Magali",
"",
"LITIS"
],
[
"Faugère",
"Jean-Charles",
"",
"LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701071 | Nikolaos Laoutaris | Nikolaos Laoutaris, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng | A bounded-degree network formation game | null | null | null | null | cs.GT | null | Motivated by applications in peer-to-peer and overlay networks we define and
study the \emph{Bounded Degree Network Formation} (BDNF) game. In an
$(n,k)$-BDNF game, we are given $n$ nodes, a bound $k$ on the out-degree of
each node, and a weight $w_{vu}$ for each ordered pair $(v,u)$ representing the
traffic rate from node $v$ to node $u$. Each node $v$ uses up to $k$ directed
links to connect to other nodes with an objective to minimize its average
distance, using weights $w_{vu}$, to all other destinations. We study the
existence of pure Nash equilibria for $(n,k)$-BDNF games. We show that if the
weights are arbitrary, then a pure Nash wiring may not exist. Furthermore, it
is NP-hard to determine whether a pure Nash wiring exists for a given
$(n,k)$-BDNF instance. A major focus of this paper is on uniform $(n,k)$-BDNF
games, in which all weights are 1. We describe how to construct a pure Nash
equilibrium wiring given any $n$ and $k$, and establish that in all pure Nash
wirings the cost of individual nodes cannot differ by more than a factor of
nearly 2, whereas the diameter cannot exceed $O(\sqrt{n \log_k n})$. We also
analyze best-response walks on the configuration space defined by the uniform
game, and show that starting from any initial configuration, strong
connectivity is reached within $\Theta(n^2)$ rounds. Convergence to a pure Nash
equilibrium, however, is not guaranteed. We present simulation results that
suggest that loop-free best-response walks always exist, but may not be
polynomially bounded. We also study a special family of \emph{regular} wirings,
the class of Abelian Cayley graphs, in which all nodes imitate the same wiring
pattern, and show that if $n$ is sufficiently large no such regular wiring can
be a pure Nash equilibrium.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 18:59:09 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Aug 2007 03:49:11 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Laoutaris",
"Nikolaos",
""
],
[
"Rajaraman",
"Rajmohan",
""
],
[
"Sundaram",
"Ravi",
""
],
[
"Teng",
"Shang-Hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0701072 | Jakob Vo{\ss} | Jakob Voss | Tagging, Folksonomy & Co - Renaissance of Manual Indexing? | Preprint. 12 pages, 1 figure, 54 references | null | null | null | cs.IR | null | This paper gives an overview of current trends in manual indexing on the Web.
Along with a general rise of user generated content there are more and more
tagging systems that allow users to annotate digital resources with tags
(keywords) and share their annotations with other users. Tagging is frequently
seen in contrast to traditional knowledge organization systems or as something
completely new. This paper shows that tagging should better be seen as a
popular form of manual indexing on the Web. Difference between controlled and
free indexing blurs with sufficient feedback mechanisms. A revised typology of
tagging systems is presented that includes different user roles and knowledge
organization systems with hierarchical relationships and vocabulary control. A
detailed bibliography of current research in collaborative tagging is included.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 18:18:28 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jan 2007 14:36:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Voss",
"Jakob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0701073 | Jeremy Avigad | Jeremy Avigad and Kevin Donnelly | A decision procedure for linear "big O" equations | null | null | null | null | cs.LO | null | Let $F$ be the set of functions from an infinite set, $S$, to an ordered
ring, $R$. For $f$, $g$, and $h$ in $F$, the assertion $f = g + O(h)$ means
that for some constant $C$, $|f(x) - g(x)| \leq C |h(x)|$ for every $x$ in $S$.
Let $L$ be the first-order language with variables ranging over such functions,
symbols for $0, +, -, \min, \max$, and absolute value, and a ternary relation
$f = g + O(h)$. We show that the set of quantifier-free formulas in this
language that are valid in the intended class of interpretations is decidable,
and does not depend on the underlying set, $S$, or the ordered ring, $R$. If
$R$ is a subfield of the real numbers, we can add a constant 1 function, as
well as multiplication by constants from any computable subfield. We obtain
further decidability results for certain situations in which one adds symbols
denoting the elements of a fixed sequence of functions of strictly increasing
rates of growth.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 19:46:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Donnelly",
"Kevin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701074 | Jerome Vanclay | Jerome K Vanclay | On the robustness of the h-index | 10 pages, 4 tables, 1 figure | Journal of the American Society for Information Science and
Technology 58(10):1547-1550 (2007) | 10.1002/asi.20616 | null | cs.DL | null | The h-index (Hirsch, 2005) is robust, remaining relatively unaffected by
errors in the long tails of the citations-rank distribution, such as
typographic errors that short-change frequently-cited papers and create bogus
additional records. This robustness, and the ease with which h-indices can be
verified, support the use of a Hirsch-type index over alternatives such as the
journal impact factor. These merits of the h-index apply to both individuals
and to journals.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 00:48:45 GMT"
}
] | 2007-12-12T00:00:00 | [
[
"Vanclay",
"Jerome K",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0701075 | Toshiya Takami | Toshiya Takami, Jun Maki, Jun-ichi Ooba, Yuichi Inadomi, Hiroaki
Honda, Taizo Kobayashi, Rie Nogita, and Mutsumi Aoyagi | Open-architecture Implementation of Fragment Molecular Orbital Method
for Peta-scale Computing | 6 pages, 9 figures, proceedings of the 2nd IEEE/ACM international
workshop on high performance computing for nano-science and technology
(HPCNano06) | null | null | null | cs.DC physics.comp-ph | null | We present our perspective and goals on highperformance computing for
nanoscience in accordance with the global trend toward "peta-scale computing."
After reviewing our results obtained through the grid-enabled version of the
fragment molecular orbital method (FMO) on the grid testbed by the Japanese
Grid Project, National Research Grid Initiative (NAREGI), we show that FMO is
one of the best candidates for peta-scale applications by predicting its
effective performance in peta-scale computers. Finally, we introduce our new
project constructing a peta-scale application in an open-architecture
implementation of FMO in order to realize both goals of highperformance in
peta-scale computers and extendibility to multiphysics simulations.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 04:49:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Takami",
"Toshiya",
""
],
[
"Maki",
"Jun",
""
],
[
"Ooba",
"Jun-ichi",
""
],
[
"Inadomi",
"Yuichi",
""
],
[
"Honda",
"Hiroaki",
""
],
[
"Kobayashi",
"Taizo",
""
],
[
"Nogita",
"Rie",
""
],
[
"Aoyagi",
"Mutsumi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
cs/0701076 | Norman Danner | Norman Danner and James S. Royer | Time-complexity semantics for feasible affine recursions (extended
abstract) | Typographical fixes; some rearrangement of material. A shortened
version is to appear in S.B. Cooper, B. Lowe, A. Sorbi (eds.),_Computation in
the Real World_ (Proceedings Computation in Europe 2007, Sienna),
Springer-Verlag, Berlin, 2007 | null | null | null | cs.LO | null | The authors' ATR programming formalism is a version of call-by-value PCF
under a complexity-theoretically motivated type system. ATR programs run in
type-2 polynomial-time and all standard type-2 basic feasible functionals are
ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of
the original version of ATR is that the only directly expressible recursions
are tail-recursions. Here we extend ATR so that a broad range of affine
recursions are directly expressible. In particular, the revised ATR can fairly
naturally express the classic insertion- and selection-sort algorithms, thus
overcoming a sticking point of most prior implicit-complexity-based formalisms.
The paper's main work is in extending and simplifying the original
time-complexity semantics for ATR to develop a set of tools for extracting and
solving the higher-type recurrences arising from feasible affine recursions.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 16:22:11 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 16:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Royer",
"James S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701077 | Karl Obermeyer | Karl J. Obermeyer, Anurag Ganguli, Francesco Bullo | Asynchronous Distributed Searchlight Scheduling | Tech. report contains proofs corresponding to a paper to appear in
Conference on Decision and Control 2007. In this version, minor typos have
been fixed and some notation changed for clarity | null | null | null | cs.MA cs.RO | null | This paper develops and compares two simple asynchronous distributed
searchlight scheduling algorithms for multiple robotic agents in nonconvex
polygonal environments. A searchlight is a ray emitted by an agent which cannot
penetrate the boundary of the environment. A point is detected by a searchlight
if and only if the point is on the ray at some instant. Targets are points
which can move continuously with unbounded speed. The objective of the proposed
algorithms is for the agents to coordinate the slewing (rotation about a point)
of their searchlights in a distributed manner, i.e., using only local sensing
and limited communication, such that any target will necessarily be detected in
finite time. The first algorithm we develop, called the DOWSS (Distributed One
Way Sweep Strategy), is a distributed version of a known algorithm described
originally in 1990 by Sugihara et al \cite{KS-IS-MY:90}, but it can be very
slow in clearing the entire environment because only one searchlight may slew
at a time. In an effort to reduce the time to clear the environment, we develop
a second algorithm, called the PTSS (Parallel Tree Sweep Strategy), in which
searchlights sweep in parallel if guards are placed according to an environment
partition belonging to a class we call PTSS partitions. Finally, we discuss how
DOWSS and PTSS could be combined with with deployment, or extended to
environments with holes.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 20:55:17 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jan 2007 19:18:22 GMT"
},
{
"version": "v3",
"created": "Fri, 10 Aug 2007 03:41:45 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Obermeyer",
"Karl J.",
""
],
[
"Ganguli",
"Anurag",
""
],
[
"Bullo",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0701078 | Vignesh Sethuraman | Vignesh Sethuraman, Ligong Wang, Bruce Hajek, Amos Lapidoth | Low SNR Capacity of Fading Channels -- MIMO and Delay Spread | null | null | null | null | cs.IT math.IT | null | Discrete-time Rayleigh fading multiple-input multiple-output (MIMO) channels
are considered, with no channel state information at the transmitter and
receiver. The fading is assumed to be correlated in time and independent from
antenna to antenna. Peak and average transmit power constraints are imposed,
either on the sum over antennas, or on each individual antenna. In both cases,
an upper bound and an asymptotic lower bound, as the signal-to-noise ratio
approaches zero, on the channel capacity are presented. The limit of normalized
capacity is identified under the sum power constraints, and, for a subclass of
channels, for individual power constraints. These results carry over to a SISO
channel with delay spread (i.e. frequency selective fading).
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 18:58:40 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Apr 2007 06:27:50 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sethuraman",
"Vignesh",
""
],
[
"Wang",
"Ligong",
""
],
[
"Hajek",
"Bruce",
""
],
[
"Lapidoth",
"Amos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701079 | Yuriy Reznik | Yuriy A. Reznik | Practical Binary Adaptive Block Coder | null | null | null | null | cs.IT cs.DS math.IT | null | This paper describes design of a low-complexity algorithm for adaptive
encoding/ decoding of binary sequences produced by memoryless sources. The
algorithm implements universal block codes constructed for a set of contexts
identified by the numbers of non-zero bits in previous bits in a sequence. We
derive a precise formula for asymptotic redundancy of such codes, which refines
previous well-known estimate by Krichevsky and Trofimov, and provide
experimental verification of this result. In our experimental study we also
compare our implementation with existing binary adaptive encoders, such as
JBIG's Q-coder, and MPEG AVC (ITU-T H.264)'s CABAC algorithms.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 19:58:05 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Reznik",
"Yuriy A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701080 | Yunghsiang Han | Shin-Lin Shieh, Po-Ning Chen, and Yunghsiang S. Han | Analysis of the Sufficient Path Elimination Window for the
Maximum-Likelihood Sequential-Search Decoding Algorithm for Binary
Convolutional Codes | Submitted to the IEEE Trans. on Information Theory, 26 pages, 11
figures | null | null | null | cs.IT math.IT | null | A common problem on sequential-type decoding is that at the signal-to-noise
ratio (SNR) below the one corresponding to the cutoff rate, the average
decoding complexity per information bit and the required stack size grow
rapidly with the information length. In order to alleviate the problem in the
maximum-likelihood sequential decoding algorithm (MLSDA), we propose to
directly eliminate the top path whose end node is $\Delta$-trellis-level prior
to the farthest one among all nodes that have been expanded thus far by the
sequential search. Following random coding argument, we analyze the
early-elimination window $\Delta$ that results in negligible performance
degradation for the MLSDA. Our analytical results indicate that the required
early elimination window for negligible performance degradation is just twice
of the constraint length for rate one-half convolutional codes. For rate
one-third convolutional codes, the required early-elimination window even
reduces to the constraint length. The suggestive theoretical level thresholds
almost coincide with the simulation results. As a consequence of the small
early-elimination window required for near maximum-likelihood performance, the
MLSDA with early-elimination modification rules out considerable computational
burdens, as well as memory requirement, by directly eliminating a big number of
the top paths, which makes the MLSDA with early elimination very suitable for
applications that dictate a low-complexity software implementation with near
maximum-likelihood performance.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 05:46:27 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Shieh",
"Shin-Lin",
""
],
[
"Chen",
"Po-Ning",
""
],
[
"Han",
"Yunghsiang S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701081 | Wim Vanhoof | Alexander Serebrenik and Wim Vanhoof | Fingerprinting Logic Programs | Paper presented at the 16th Workshop on Logic-based methods in
Programming Languages (WLPE2006) | null | null | null | cs.PL cs.SE | null | In this work we present work in progress on functionality duplication
detection in logic programs. Eliminating duplicated functionality recently
became prominent in context of refactoring. We describe a quantitative approach
that allows to measure the ``similarity'' between two predicate definitions.
Moreover, we show how to compute a so-called ``fingerprint'' for every
predicate. Fingerprints capture those characteristics of the predicate that are
significant when searching for duplicated functionality. Since reasoning on
fingerprints is much easier than reasoning on predicate definitions, comparing
the fingerprints is a promising direction in automated code duplication in
logic programs.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 15:39:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Vanhoof",
"Wim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0701082 | Serebrenik Alexander | Fred Mesnard, Alexander Serebrenik | Recurrence with affine level mappings is P-time decidable for CLP(R) | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.PL cs.LO | null | In this paper we introduce a class of constraint logic programs such that
their termination can be proved by using affine level mappings. We show that
membership to this class is decidable in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 18:43:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mesnard",
"Fred",
""
],
[
"Serebrenik",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701083 | Marko Samer | Georg Gottlob, Marko Samer | A Backtracking-Based Algorithm for Computing Hypertree-Decompositions | 19 pages, 6 figures, 3 tables | ACM Journal of Experimental Algorithmics (JEA) 13(1):1.1-1.19,
2008. | 10.1145/1412228.1412229 | null | cs.DS cs.AI | null | Hypertree decompositions of hypergraphs are a generalization of tree
decompositions of graphs. The corresponding hypertree-width is a measure for
the cyclicity and therefore tractability of the encoded computation problem.
Many NP-hard decision and computation problems are known to be tractable on
instances whose structure corresponds to hypergraphs of bounded
hypertree-width. Intuitively, the smaller the hypertree-width, the faster the
computation problem can be solved. In this paper, we present the new
backtracking-based algorithm det-k-decomp for computing hypertree
decompositions of small width. Our benchmark evaluations have shown that
det-k-decomp significantly outperforms opt-k-decomp, the only exact hypertree
decomposition algorithm so far. Even compared to the best heuristic algorithm,
we obtained competitive results as long as the hypergraphs are not too large.
| [
{
"version": "v1",
"created": "Sun, 14 Jan 2007 01:14:25 GMT"
}
] | 2008-10-12T00:00:00 | [
[
"Gottlob",
"Georg",
""
],
[
"Samer",
"Marko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0701084 | Michael Chertkov | Michael Chertkov (Los Alamos) and Mikhail Stepanov (UA, Tucson) | Pseudo-codeword Landscape | 5 pages, 2 figures, proceedings of ISIT '07 | null | null | LA-UR# 07-0144 | cs.IT cond-mat.stat-mech math.IT | null | We discuss the performance of Low-Density-Parity-Check (LDPC) codes decoded
by means of Linear Programming (LP) at moderate and large
Signal-to-Noise-Ratios (SNR). Utilizing a combination of the previously
introduced pseudo-codeword-search method and a new "dendro" trick, which allows
us to reduce the complexity of the LP decoding, we analyze the dependence of
the Frame-Error-Rate (FER) on the SNR. Under Maximum-A-Posteriori (MAP)
decoding the dendro-code, having only checks with connectivity degree three,
performs identically to its original code with high-connectivity checks. For a
number of popular LDPC codes performing over the Additive-White-Gaussian-Noise
(AWGN) channel we found that either an error-floor sets at a relatively low
SNR, or otherwise a transient asymptote, characterized by a faster decay of FER
with the SNR increase, precedes the error-floor asymptote. We explain these
regimes in terms of the pseudo-codeword spectra of the codes.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 23:17:17 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Apr 2007 05:22:40 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chertkov",
"Michael",
"",
"Los Alamos"
],
[
"Stepanov",
"Mikhail",
"",
"UA, Tucson"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701085 | James Harold Thomas | James Harold Thomas | Variations on the Fibonacci Universal Code | null | null | null | null | cs.IT cs.CR math.IT | null | This note presents variations on the Fibonacci universal code, that may also
be called the Gopala-Hemachandra code, that can have applications in source
coding as well as in cryptography.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 23:43:59 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jul 2007 02:20:55 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Thomas",
"James Harold",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701086 | Michael Chertkov | Vladimir Y. Chernyak (Wayne State) and Michael Chertkov (Los Alamos) | Loop Calculus and Belief Propagation for q-ary Alphabet: Loop Tower | 5 pages, 2 figures, proceedings of ISIT '07, misprints corrected | null | null | LA-UR# 07-0149 | cs.IT cond-mat.stat-mech math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Loop Calculus introduced in [Chertkov, Chernyak '06] constitutes a new
theoretical tool that explicitly expresses the symbol Maximum-A-Posteriori
(MAP) solution of a general statistical inference problem via a solution of the
Belief Propagation (BP) equations. This finding brought a new significance to
the BP concept, which in the past was thought of as just a loop-free
approximation. In this paper we continue a discussion of the Loop Calculus. We
introduce an invariant formulation which allows to generalize the Loop Calculus
approach to a q-are alphabet.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 23:55:51 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Apr 2007 05:12:16 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Jun 2007 07:44:12 GMT"
},
{
"version": "v4",
"created": "Tue, 9 Sep 2008 12:29:15 GMT"
}
] | 2008-09-09T00:00:00 | [
[
"Chernyak",
"Vladimir Y.",
"",
"Wayne State"
],
[
"Chertkov",
"Michael",
"",
"Los Alamos"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701087 | Jean-Philippe Rennard | Jean-Philippe Rennard | Artificiality in Social Sciences | 14 pages | Rennard, J.-P., Artificiality in Social Sciences, in Rennard,
J.-P. (Ed.), Handbook of Research on Nature Inspired Computing for Economics
and Management, p.1-15, IGR, 2006 | null | null | cs.MA | null | This text provides with an introduction to the modern approach of
artificiality and simulation in social sciences. It presents the relationship
between complexity and artificiality, before introducing the field of
artificial societies which greatly benefited from the computer power fast
increase, gifting social sciences with formalization and experimentation tools
previously owned by "hard" sciences alone. It shows that as "a new way of doing
social sciences", artificial societies should undoubtedly contribute to a
renewed approach in the study of sociality and should play a significant part
in the elaboration of original theories of social phenomena.
| [
{
"version": "v1",
"created": "Sat, 13 Jan 2007 16:50:37 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Apr 2007 18:00:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rennard",
"Jean-Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0701088 | Frederick Furtek | Frederick Furtek | A Theory and Calculus for Reasoning about Sequential Behavior | 102 double-spaced pages, 17 figures. Abstract and introduction
revised 29 March 2007 to improve readability | null | null | null | cs.LO cs.DM | null | Basic results in combinatorial mathematics provide the foundation for a
theory and calculus for reasoning about sequential behavior. A key concept of
the theory is a generalization of Boolean implicant which deals with statements
of the form:
A sequence of Boolean expressions alpha is an implicant of a set of sequences
of Boolean expressions A
This notion of a generalized implicant takes on special significance when
each of the sequences in the set A describes a disallowed pattern of behavior.
That is because a disallowed sequence of Boolean expressions represents a
logical/temporal dependency, and because the implicants of a set of disallowed
Boolean sequences A are themselves disallowed and represent precisely those
dependencies that follow as a logical consequence from the dependencies
represented by A. The main result of the theory is a necessary and sufficient
condition for a sequence of Boolean expressions to be an implicant of a regular
set of sequences of Boolean expressions. This result is the foundation for two
new proof methods. Sequential resolution is a generalization of Boolean
resolution which allows new logical/temporal dependencies to be inferred from
existing dependencies. Normalization starts with a model (system) and a set of
logical/temporal dependencies and determines which of those dependencies are
satisfied by the model.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 18:57:14 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 15:46:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Furtek",
"Frederick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0701089 | David Doty | Laurent Bienvenu, David Doty, Frank Stephan | Constructive Dimension and Turing Degrees | The version of this paper appearing in Theory of Computing Systems,
45(4):740-755, 2009, had an error in the proof of Theorem 2.4, due to
insufficient care with the choice of delta. This version modifies that proof
to fix the error. | null | null | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper examines the constructive Hausdorff and packing dimensions of
Turing degrees. The main result is that every infinite sequence S with
constructive Hausdorff dimension dim_H(S) and constructive packing dimension
dim_P(S) is Turing equivalent to a sequence R with dim_H(R) <= (dim_H(S) /
dim_P(S)) - epsilon, for arbitrary epsilon > 0. Furthermore, if dim_P(S) > 0,
then dim_P(R) >= 1 - epsilon. The reduction thus serves as a *randomness
extractor* that increases the algorithmic randomness of S, as measured by
constructive dimension.
A number of applications of this result shed new light on the constructive
dimensions of Turing degrees. A lower bound of dim_H(S) / dim_P(S) is shown to
hold for the Turing degree of any sequence S. A new proof is given of a
previously-known zero-one law for the constructive packing dimension of Turing
degrees. It is also shown that, for any regular sequence S (that is, dim_H(S) =
dim_P(S)) such that dim_H(S) > 0, the Turing degree of S has constructive
Hausdorff and packing dimension equal to 1.
Finally, it is shown that no single Turing reduction can be a universal
constructive Hausdorff dimension extractor, and that bounded Turing reductions
cannot extract constructive Hausdorff dimension. We also exhibit sequences on
which weak truth-table and bounded Turing reductions differ in their ability to
extract dimension.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 04:41:00 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Feb 2007 05:58:52 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Feb 2009 17:27:36 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Apr 2010 06:55:25 GMT"
}
] | 2010-04-09T00:00:00 | [
[
"Bienvenu",
"Laurent",
""
],
[
"Doty",
"David",
""
],
[
"Stephan",
"Frank",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701090 | Martin Mittelbach | Martin Mittelbach, Christian Mueller and Konrad Schubert (Dresden
University of Technology) | Ergodic Capacity of Discrete- and Continuous-Time, Frequency-Selective
Rayleigh Fading Channels with Correlated Scattering | - presented at IEEE Globecom 2007 - version v3: substantially revised
- version v4: correction of minor typing errors | null | 10.1109/GLOCOM.2007.632 | null | cs.IT math.IT | null | We study the ergodic capacity of a frequency-selective Rayleigh fading
channel with correlated scattering, which finds application in the area of UWB.
Under an average power constraint, we consider a single-user, single-antenna
transmission. Coherent reception is assumed with full CSI at the receiver and
no CSI at the transmitter. We distinguish between a continuous- and a
discrete-time channel, modeled either as random process or random vector with
generic covariance. As a practically relevant example, we examine an
exponentially attenuated Ornstein-Uhlenbeck process in detail. Finally, we give
numerical results, discuss the relation between the continuous- and the
discrete-time channel model and show the significant impact of correlated
scattering.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 10:07:52 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jan 2007 15:31:56 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Aug 2007 13:55:28 GMT"
},
{
"version": "v4",
"created": "Thu, 3 Jan 2008 11:31:56 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Mittelbach",
"Martin",
"",
"Dresden\n University of Technology"
],
[
"Mueller",
"Christian",
"",
"Dresden\n University of Technology"
],
[
"Schubert",
"Konrad",
"",
"Dresden\n University of Technology"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701091 | Valentin Savin | Valentin Savin | Iterative LDPC decoding using neighborhood reliabilities | 5 pages, 5 figures | null | null | null | cs.IT math.IT | null | In this paper we study the impact of the processing order of nodes of a
bipartite graph, on the performance of an iterative message-passing decoding.
To this end, we introduce the concept of neighborhood reliabilities of graph's
nodes. Nodes reliabilities are calculated at each iteration and then are used
to obtain a processing order within a serial or serial/parallel scheduling. The
basic idea is that by processing first the most reliable data, the decoder is
reinforced before processing the less reliable one. Using neighborhood
reliabilities, the Min-Sum decoder of LDPC codes approaches the performance of
the Sum-Product decoder.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 10:27:17 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Savin",
"Valentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701092 | Natasha Devroye | Natasha Devroye, Masoud Sharif | The Multiplexing Gain of MIMO X-Channels with Partial Transmit
Side-Information | 5 pages, 3 figures, submitted to ISIT 2007 | null | null | null | cs.IT math.IT | null | In this paper, we obtain the scaling laws of the sum-rate capacity of a MIMO
X-channel, a 2 independent sender, 2 independent receiver channel with messages
from each transmitter to each receiver, at high signal to noise ratios (SNR).
The X-channel has sparked recent interest in the context of cooperative
networks and it encompasses the interference, multiple access, and broadcast
channels as special cases. Here, we consider the case with partially
cooperative transmitters in which only partial and asymmetric side-information
is available at one of the transmitters. It is proved that when there are M
antennas at all four nodes, the sum-rate scales like 2Mlog(SNR) which is in
sharp contrast to [\lfloor 4M/3 \rfloor,4M/3]log(SNR) for non-cooperative
X-channels \cite{maddah-ali,jafar_degrees}. This further proves that, in terms
of sum-rate scaling at high SNR, partial side-information at one of the
transmitters and full side-information at both transmitters are equivalent in
the MIMO X-channel.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 18:40:41 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Devroye",
"Natasha",
""
],
[
"Sharif",
"Masoud",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701093 | Masoud Ebrahimi | Masoud Ebrahimi, Mohammad Maddah-Ali, and Amir Khandani | Throughput Scaling Laws for Wireless Networks with Fading Channels | Submitted to IEEE ISIT 2007 | null | 10.1109/TIT.2007.907518 | null | cs.IT math.IT | null | A network of $n$ wireless communication links is considered. Fading is
assumed to be the dominant factor affecting the strength of the channels
between nodes. The objective is to analyze the achievable throughput of the
network when power allocation is allowed. By proposing a decentralized on-off
power allocation strategy, a lower bound on the achievable throughput is
obtained for a general fading model. In particular, under Rayleigh fading
conditions the achieved sum-rate is of order $\log n$, which is, by a constant
factor, larger than what is obtained with a centralized scheme in the work of
Gowaikar et al. Similar to most of previous works on large networks, the
proposed scheme assigns a vanishingly small rate for each link. However, it is
shown that by allowing the sum-rate to decrease by a factor $\alpha<1$, this
scheme is capable of providing non-zero rate-per-links of order $\Theta(1)$. To
obtain larger non-zero rate-per-links, the proposed scheme is modified to a
centralized version. It turns out that for the same number of active links the
centralized scheme achieves a much larger rate-per-link. Moreover, at large
values of rate-per-link, it achieves a sum-rate close to $\log n$, i.e., the
maximum achieved by the decentralized scheme.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 02:43:42 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Ebrahimi",
"Masoud",
""
],
[
"Maddah-Ali",
"Mohammad",
""
],
[
"Khandani",
"Amir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701094 | Francois Ingelrest | Fran\c{c}ois Ingelrest (LIFL, INRIA Futurs), David Simplot-Ryl (LIFL,
INRIA Futurs) | Maximizing the Probability of Delivery of Multipoint Relay Broadcast
Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer | null | Proceedings of the 2nd International Conference on Mobile Ad-hoc
and Sensor Networks (MSN 2006) (2006) 143 | null | null | cs.NI | null | It is now commonly accepted that the unit disk graph used to model the
physical layer in wireless networks does not reflect real radio transmissions,
and that the lognormal shadowing model better suits to experimental
simulations. Previous work on realistic scenarios focused on unicast, while
broadcast requirements are fundamentally different and cannot be derived from
unicast case. Therefore, broadcast protocols must be adapted in order to still
be efficient under realistic assumptions. In this paper, we study the
well-known multipoint relay protocol (MPR). In the latter, each node has to
choose a set of neighbors to act as relays in order to cover the whole 2-hop
neighborhood. We give experimental results showing that the original method
provided to select the set of relays does not give good results with the
realistic model. We also provide three new heuristics in replacement and their
performances which demonstrate that they better suit to the considered model.
The first one maximizes the probability of correct reception between the node
and the considered relays multiplied by their coverage in the 2-hop
neighborhood. The second one replaces the coverage by the average of the
probabilities of correct reception between the considered neighbor and the
2-hop neighbors it covers. Finally, the third heuristic keeps the same concept
as the second one, but tries to maximize the coverage level of the 2-hop
neighborhood: 2-hop neighbors are still being considered as uncovered while
their coverage level is not higher than a given coverage threshold, many
neighbors may thus be selected to cover the same 2-hop neighbors.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 10:01:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ingelrest",
"François",
"",
"LIFL, INRIA Futurs"
],
[
"Simplot-Ryl",
"David",
"",
"LIFL,\n INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701095 | Pedro Cabalar | Pedro Cabalar and Paolo Ferraris | Propositional theories are strongly equivalent to logic programs | 15 pages | null | null | null | cs.AI cs.LO | null | This paper presents a property of propositional theories under the answer
sets semantics (called Equilibrium Logic for this general syntax): any theory
can always be reexpressed as a strongly equivalent disjunctive logic program,
possibly with negation in the head. We provide two different proofs for this
result: one involving a syntactic transformation, and one that constructs a
program starting from the countermodels of the theory in the intermediate logic
of here-and-there.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 12:29:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cabalar",
"Pedro",
""
],
[
"Ferraris",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701096 | Maurice Margenstern | Margenstern Maurice | About the domino problem in the hyperbolic plane, a new solution | 60 pages, 16 figures | null | null | null | cs.CG | null | In this paper we improve the approach of a previous paper about the domino
problem in the hyperbolic plane, see arXiv.cs.CG/0603093. This time, we prove
that the general problem of the hyperbolic plane with \`a la Wang tiles is
undecidable.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 18:19:22 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jan 2007 19:11:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maurice",
"Margenstern",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0701097 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | MacWilliams Identity for the Rank Metric | 5 pages, submitted to IEEE ISIT 2007 | null | null | null | cs.IT math.IT | null | This paper investigates the relationship between the rank weight distribution
of a linear code and that of its dual code. The main result of this paper is
that, similar to the MacWilliams identity for the Hamming metric, the rank
weight distribution of any linear code can be expressed as an analytical
expression of that of its dual code. Remarkably, our new identity has a similar
form to the MacWilliams identity for the Hamming metric. Our new identity
provides a significant analytical tool to the rank weight distribution analysis
of linear codes. We use a linear space based approach in the proof for our new
identity, and adapt this approach to provide an alternative proof of the
MacWilliams identity for the Hamming metric. Finally, we determine the
relationship between moments of the rank distribution of a linear code and
those of its dual code, and provide an alternative derivation of the rank
weight distribution of maximum rank distance codes.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 19:07:42 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701098 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Packing and Covering Properties of Rank Metric Codes | 23 pages, 1 table. Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | This paper investigates packing and covering properties of codes with the
rank metric. First, we investigate packing properties of rank metric codes.
Then, we study sphere covering properties of rank metric codes, derive bounds
on their parameters, and investigate their asymptotic covering properties.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 19:11:56 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jul 2007 17:51:07 GMT"
},
{
"version": "v3",
"created": "Sat, 18 Aug 2007 23:46:49 GMT"
},
{
"version": "v4",
"created": "Wed, 7 May 2008 19:35:22 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701099 | Shaohua Yang | Shaohua Yang, Aleksandar Kavcic, Sekhar Tatikonda | On the Feedback Capacity of Power Constrained Gaussian Noise Channels
with Memory | Transaction on Information Theory, accepted version, first version
submitted on Oct 22, 2003 | null | null | null | cs.IT math.IT | null | For a stationary additive Gaussian-noise channel with a rational noise power
spectrum of a finite-order $L$, we derive two new results for the feedback
capacity under an average channel input power constraint. First, we show that a
very simple feedback-dependent Gauss-Markov source achieves the feedback
capacity, and that Kalman-Bucy filtering is optimal for processing the
feedback. Based on these results, we develop a new method for optimizing the
channel inputs for achieving the Cover-Pombra block-length-$n$ feedback
capacity by using a dynamic programming approach that decomposes the
computation into $n$ sequentially identical optimization problems where each
stage involves optimizing $O(L^2)$ variables. Second, we derive the explicit
maximal information rate for stationary feedback-dependent sources. In general,
evaluating the maximal information rate for stationary sources requires solving
only a few equations by simple non-linear programming. For first-order
autoregressive and/or moving average (ARMA) noise channels, this optimization
admits a closed form maximal information rate formula. The maximal information
rate for stationary sources is a lower bound on the feedback capacity, and it
equals the feedback capacity if the long-standing conjecture, that stationary
sources achieve the feedback capacity, holds.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 19:32:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Yang",
"Shaohua",
""
],
[
"Kavcic",
"Aleksandar",
""
],
[
"Tatikonda",
"Sekhar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701100 | Shaohua Yang | Shaohua Yang, Aleksandar Kavcic | Delayed Feedback Capacity of Stationary Sources over Linear Gaussian
Noise Channels | submitted to ISIT 2007 | null | null | null | cs.IT math.IT | null | We consider a linear Gaussian noise channel used with delayed feedback. The
channel noise is assumed to be a ARMA (autoregressive and/or moving average)
process. We reformulate the Gaussian noise channel into an intersymbol
interference channel with white noise, and show that the delayed-feedback of
the original channel is equivalent to the instantaneous-feedback of the derived
channel. By generalizing results previously developed for Gaussian channels
with instantaneous feedback and applying them to the derived intersymbol
interference channel, we show that conditioned on the delayed feedback, a
conditional Gauss-Markov source achieves the feedback capacity and its Markov
memory length is determined by the noise spectral order and the feedback delay.
A Kalman-Bucy filter is shown to be optimal for processing the feedback. The
maximal information rate for stationary sources is derived in terms of channel
input power constraint and the steady state solution of the Riccati equation of
the Kalman-Bucy filter used in the feedback loop.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 19:42:01 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Yang",
"Shaohua",
""
],
[
"Kavcic",
"Aleksandar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701101 | Philip Davis | Philip M. Davis | Citation advantage of Open Access articles likely explained by quality
differential and media effects | Letter to the editor of PLoS Biology
http://biology.plosjournals.org/perlserv/?request=read-response&doi=10.1371/journal.pbio.0040157#r1438 | null | null | null | cs.DL | null | In a study of articles published in the Proceedings of the National Academy
of Sciences, Gunther Eysenbach discovered a significant citation advantage for
those articles made freely-available upon publication (Eysenbach 2006). While
the author attempted to control for confounding factors that may have explained
the citation differential, the study was unable to control for characteristics
of the article that may have led some authors to pay the additional page
charges ($1,000) for immediate OA status. OA articles published in PNAS were
more than twice as likely to be featured on the front cover of the journal
(3.3% vs. 1.4%), nearly twice as likely to be picked up by the media (15% vs.
8%) and when cited reached, on average, nearly twice as many news outlets as
subscription-based articles (4.2 vs. 2.6). The citation advantage of Open
Access articles in PNAS may likely be explained by a quality differential and
the amplification of media effects.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 20:00:35 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Davis",
"Philip M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0701102 | Davide Schipani | Davide Schipani and Joachim Rosenthal | Coding Solutions for the Secure Biometric Storage Problem | the final version appeared in Proceedings Information Theory Workshop
(ITW) 2010, IEEE copyright | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper studies the problem of securely storing biometric passwords, such
as fingerprints and irises. With the help of coding theory Juels and Wattenberg
derived in 1999 a scheme where similar input strings will be accepted as the
same biometric. In the same time nothing could be learned from the stored data.
They called their scheme a "fuzzy commitment scheme". In this paper we will
revisit the solution of Juels and Wattenberg and we will provide answers to two
important questions: What type of error-correcting codes should be used and
what happens if biometric templates are not uniformly distributed, i.e. the
biometric data come with redundancy. Answering the first question will lead us
to the search for low-rate large-minimum distance error-correcting codes which
come with efficient decoding algorithms up to the designed distance. In order
to answer the second question we relate the rate required with a quantity
connected to the "entropy" of the string, trying to estimate a sort of
"capacity", if we want to see a flavor of the converse of Shannon's noisy
coding theorem. Finally we deal with side-problems arising in a practical
implementation and we propose a possible solution to the main one that seems to
have so far prevented real life applications of the fuzzy scheme, as far as we
know.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 23:22:41 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Feb 2010 00:21:27 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Aug 2011 12:08:45 GMT"
}
] | 2011-08-31T00:00:00 | [
[
"Schipani",
"Davide",
""
],
[
"Rosenthal",
"Joachim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701103 | Auguste Venkiah | Auguste Venkiah, Charly Poulliat, David Declercq | Analysis and design of raptor codes for joint decoding using Information
Content evolution | 5 pages, 2 figures, submitted to ISIT 2007 | null | null | null | cs.IT math.IT | null | In this paper, we present an analytical analysis of the convergence of raptor
codes under joint decoding over the binary input additive white noise channel
(BIAWGNC), and derive an optimization method. We use Information Content
evolution under Gaussian approximation, and focus on a new decoding scheme that
proves to be more efficient: the joint decoding of the two code components of
the raptor code. In our general model, the classical tandem decoding scheme
appears to be a subcase, and thus, the design of LT codes is also possible.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 09:45:20 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Venkiah",
"Auguste",
""
],
[
"Poulliat",
"Charly",
""
],
[
"Declercq",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701104 | Philipp Mayr | Philipp Mayr, Walther Umstaetter | Why is a new Journal of Informetrics needed? | 9 pages, 3 figures | null | null | null | cs.DL cs.DB | null | In our study we analysed 3.889 records which were indexed in the Library and
Information Science Abstracts (LISA) database in the research field of
informetrics. We can show the core journals of the field via a Bradford (power
law) distribution and corroborate on the basis of the restricted LISA data set
that it was the appropriate time to found a new specialized journal dedicated
to informetrics. According to Bradford's Law of scattering (pure quantitative
calculation), Egghe's Journal of Informetrics (JOI) first issue to appear in
2007, comes most probable at the right time.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 12:17:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Umstaetter",
"Walther",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0701105 | Wim Vanhoof | Remko Troncon, Gerda Janssens | A Delta Debugger for ILP Query Execution | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL cs.LG | null | Because query execution is the most crucial part of Inductive Logic
Programming (ILP) algorithms, a lot of effort is invested in developing faster
execution mechanisms. These execution mechanisms typically have a low-level
implementation, making them hard to debug. Moreover, other factors such as the
complexity of the problems handled by ILP algorithms and size of the code base
of ILP data mining systems make debugging at this level a very difficult job.
In this work, we present the trace-based debugging approach currently used in
the development of new execution mechanisms in hipP, the engine underlying the
ACE Data Mining system. This debugger uses the delta debugging algorithm to
automatically reduce the total time needed to expose bugs in ILP execution,
thus making manual debugging step much lighter.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Troncon",
"Remko",
""
],
[
"Janssens",
"Gerda",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0701106 | Wim Vanhoof | Pierre Deransart | On using Tracer Driver for External Dynamic Process Observation | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | One is interested here in the observation of dynamic processes starting from
the traces which they leave or those that one makes them produce. It is
considered here that it should be possible to make several observations
simultaneously, using a large variety of independently developed analyzers. For
this purpose, we introduce the original notion of ``full trace'' to capture the
idea that a process can be instrumented in such a way that it may broadcast all
information which could ever be requested by any kind of observer. Each
analyzer can then find in the full trace the data elements which it needs. This
approach uses what has been called a "tracer driver" which completes the tracer
and drives it to answer the requests of the analyzers. A tracer driver allows
to restrict the flow of information and makes this approach tractable. On the
other side, the potential size of a full trace seems to make the idea of full
trace unrealistic. In this work we explore the consequences of this notion in
term of potential efficiency, by analyzing the respective workloads between the
(full) tracer and many different analyzers, all being likely run in true
parallel environments. To illustrate this study, we use the example of the
observation of the resolution of constraints systems (proof-tree, search-tree
and propagation) using sophisticated visualization tools, as developed in the
project OADymPPaC (2001-2004). The processes considered here are computer
programs, but we believe the approach can be extended to many other kinds of
processes.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:43:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Deransart",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701107 | Wim Vanhoof | Hani Girgis, Bharat Jayaraman | JavaTA: A Logic-based Debugger for Java | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | This paper presents a logic based approach to debugging Java programs. In
contrast with traditional debugging we propose a debugging methodology for Java
programs using logical queries on individual execution states and also over the
history of execution. These queries were arrived at by a systematic study of
errors in object-oriented programs in our earlier research. We represent the
salient events during the execution of a Java program by a logic database, and
implement the queries as logic programs. Such an approach allows us to answer a
number of useful and interesting queries about a Java program, such as the
calling sequence that results in a certain outcome, the state of an object at a
particular execution point, etc. Our system also provides the ability to
compose new queries during a debugging session. We believe that logic
programming offers a significant contribution to the art of object-oriented
programs debugging.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:48:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Girgis",
"Hani",
""
],
[
"Jayaraman",
"Bharat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701108 | Wim Vanhoof | Edison Mera, Pedro Lopez-Garcia, German Puebla, Manuel Carro, Manuel
Hermenegildo | Towards Execution Time Estimation for Logic Programs via Static Analysis
and Profiling | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | Effective static analyses have been proposed which infer bounds on the number
of resolutions or reductions. These have the advantage of being independent
from the platform on which the programs are executed and have been shown to be
useful in a number of applications, such as granularity control in parallel
execution. On the other hand, in distributed computation scenarios where
platforms with different capabilities come into play, it is necessary to
express costs in metrics that include the characteristics of the platform. In
particular, it is specially interesting to be able to infer upper and lower
bounds on actual execution times. With this objective in mind, we propose an
approach which combines compile-time analysis for cost bounds with a one-time
profiling of the platform in order to determine the values of certain
parameters for a given platform. These parameters calibrate a cost model which,
from then on, is able to compute statically time bound functions for procedures
and to predict with a significant degree of accuracy the execution times of
such procedures in the given platform. The approach has been implemented and
integrated in the CiaoPP system.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:22:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mera",
"Edison",
""
],
[
"Lopez-Garcia",
"Pedro",
""
],
[
"Puebla",
"German",
""
],
[
"Carro",
"Manuel",
""
],
[
"Hermenegildo",
"Manuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701109 | Wim Vanhoof | Siddharth Chitnis, Madhu Yennamani, Gopal Gupta | ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet
Paradigm | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | We report on the development of a general tool called ExSched, implemented as
a plug-in for Microsoft Excel, for solving a class of constraint satisfaction
problems. The traditional spreadsheet paradigm is based on attaching arithmetic
expressions to individual cells and then evaluating them. The ExSched interface
generalizes the spreadsheet paradigm to allow finite domain constraints to be
attached to the individual cells that are then solved to get a solution. This
extension provides a user-friendly interface for solving constraint
satisfaction problems that can be modeled as 2D tables, such as scheduling
problems, timetabling problems, product configuration, etc. ExSched can be
regarded as a spreadsheet interface to CLP(FD) that hides the syntactic and
semantic complexity of CLP(FD) and enables novice users to solve many
scheduling and timetabling problems interactively.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:26:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chitnis",
"Siddharth",
""
],
[
"Yennamani",
"Madhu",
""
],
[
"Gupta",
"Gopal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701110 | Wim Vanhoof | Kim Henriksen, John Gallagher | A Web-based Tool Combining Different Type Analyses | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | There are various kinds of type analysis of logic programs. These include for
example inference of types that describe an over-approximation of the success
set of a program, inference of well-typings, and abstractions based on given
types. Analyses can be descriptive or prescriptive or a mixture of both, and
they can be goal-dependent or goal-independent. We describe a prototype tool
that can be accessed from a web browser, allowing various type analyses to be
run. The first goal of the tool is to allow the analysis results to be examined
conveniently by clicking on points in the original program clauses, and to
highlight ill-typed program constructs, empty types or other type anomalies.
Secondly the tool allows combination of the various styles of analysis. For
example, a descriptive regular type can be automatically inferred for a given
program, and then that type can be used to generate the minimal "domain model"
of the program with respect to the corresponding pre-interpretation, which can
give more precise information than the original descriptive type.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:35:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henriksen",
"Kim",
""
],
[
"Gallagher",
"John",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701111 | Wim Vanhoof | Elvira Albert, Puri Arenas, German Puebla | Some Issues on Incremental Abstraction-Carrying Code | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | Abstraction-Carrying Code (ACC) has recently been proposed as a framework for
proof-carrying code (PCC) in which the code supplier provides a program
together with an abstraction (or abstract model of the program) whose validity
entails compliance with a predefined safety policy. The abstraction thus plays
the role of safety certificate and its generation (and validation) is carried
out automatically by a fixed-point analyzer. Existing approaches for PCC are
developed under the assumption that the consumer reads and validates the entire
program w.r.t. the full certificate at once, in a non incremental way. In this
abstract, we overview the main issues on incremental ACC. In particular, in the
context of logic programming, we discuss both the generation of incremental
certificates and the design of an incremental checking algorithm for untrusted
updates of a (trusted) program, i.e., when a producer provides a modified
version of a previously validated program. By update, we refer to any arbitrary
change on a program, i.e., the extension of the program with new predicates,
the deletion of existing predicates and the replacement of existing predicates
by new versions for them. We also discuss how each kind of update affects the
incremental extension in terms of accuracy and correctness.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:44:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albert",
"Elvira",
""
],
[
"Arenas",
"Puri",
""
],
[
"Puebla",
"German",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701112 | Axel Kohnert | Axel Kohnert | (l,s)-Extension of Linear Codes | 8 pages | null | null | null | cs.IT math.CO math.IT | null | We construct new linear codes with high minimum distance d. In at least 12
cases these codes improve the minimum distance of the previously known best
linear codes for fixed parameters n,k. Among these new codes there is an
optimal ternary [88,8,54] code.
We develop an algorithm, which starts with already good codes C, i.e. codes
with high minimum distance d for given length n and dimension k over the field
GF(q). The algorithm is based on the newly defined (l,s)-extension. This is a
generalization of the well-known method of adding a parity bit in the case of a
binary linear code of odd minimum weight. (l,s)-extension tries to extend the
generator matrix of C by adding l columns with the property that at least s of
the l letters added to each of the codewords of minimum weight in C are
different from 0. If one finds such columns the minimum distance of the
extended code is d+s provided that the second smallest weight in C was at least
d+s. The question whether such columns exist can be settled using a Diophantine
system of equations.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 15:50:15 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Kohnert",
"Axel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701113 | Thomas Colcombet | Thomas Colcombet (GALION) | On factorisation forests | 27 pages | null | null | null | cs.LO | null | The theorem of factorisation forests shows the existence of nested
factorisations -- a la Ramsey -- for finite words. This theorem has important
applications in semigroup theory, and beyond. The purpose of this paper is to
illustrate the importance of this approach in the context of automata over
infinite words and trees. We extend the theorem of factorisation forest in two
directions: we show that it is still valid for any word indexed by a linear
ordering; and we show that it admits a deterministic variant for words indexed
by well-orderings. A byproduct of this work is also an improvement on the known
bounds for the original result. We apply the first variant for giving a
simplified proof of the closure under complementation of rational sets of words
indexed by countable scattered linear orderings. We apply the second variant in
the analysis of monadic second-order logic over trees, yielding new results on
monadic interpretations over trees. Consequences of it are new caracterisations
of prefix-recognizable structures and of the Caucal hierarchy.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 16:48:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Colcombet",
"Thomas",
"",
"GALION"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701114 | Ignacio Vega-Paez M en C | Ignacio Vega-Paez, Georgina G. Pulido, Jose Angel Ortega | The problem determination of Functional Dependencies between attributes
Relation Scheme in the Relational Data Model. El problema de determinar
Dependencias Funcionales entre atributos en los esquemas en el Modelo
Relacional | null | International Journal of Multidisciplinary Sciences and
Engineering, Vol. 2, No. 5, 2011, 1-4 | null | IBP-Memo 2006 07, Sep 2006 | cs.DB cs.DS | null | An alternative definition of the concept is given of functional dependence
among the attributes of the relational schema in the Relational Model, this
definition is obtained in terms of the set theory. For that which a theorem is
demonstrated that establishes equivalence and on the basis theorem an algorithm
is built for the search of the functional dependences among the attributes. The
algorithm is illustrated by a concrete example
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 20:08:53 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2007 22:43:08 GMT"
}
] | 2011-12-09T00:00:00 | [
[
"Vega-Paez",
"Ignacio",
""
],
[
"Pulido",
"Georgina G.",
""
],
[
"Ortega",
"Jose Angel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0701115 | Juan J. Merelo Pr. | J.J. Merelo, Antonio Mora-Garcia, J.L.J. Laredo, Juan Lupion, Fernando
Tricas | Browser-based distributed evolutionary computation: performance and
scaling behavior | Submitted to GECCO 2007 | null | null | null | cs.DC cs.NE | null | The challenge of ad-hoc computing is to find the way of taking advantage of
spare cycles in an efficient way that takes into account all capabilities of
the devices and interconnections available to them. In this paper we explore
distributed evolutionary computation based on the Ruby on Rails framework,
which overlays a Model-View-Controller on evolutionary computation. It allows
anybody with a web browser (that is, mostly everybody connected to the
Internet) to participate in an evolutionary computation experiment. Using a
straightforward farming model, we consider different factors, such as the size
of the population used. We are mostly interested in how they impact on
performance, but also the scaling behavior when a non-trivial number of
computers is applied to the problem. Experiments show the impact of different
packet sizes on performance, as well as a quite limited scaling behavior, due
to the characteristics of the server. Several solutions for that problem are
proposed.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2007 09:23:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Merelo",
"J. J.",
""
],
[
"Mora-Garcia",
"Antonio",
""
],
[
"Laredo",
"J. L. J.",
""
],
[
"Lupion",
"Juan",
""
],
[
"Tricas",
"Fernando",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0701116 | Chris Ng | Chris T. K. Ng and Andrea J. Goldsmith | The Impact of CSI and Power Allocation on Relay Channel Capacity and
Cooperation Strategies | Accepted for publication in IEEE Transactions on Wireless
Communications | IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5380-5389, Dec.
2008 | 10.1109/T-WC.2008.071185 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Capacity gains from transmitter and receiver cooperation are compared in a
relay network where the cooperating nodes are close together. Under
quasi-static phase fading, when all nodes have equal average transmit power
along with full channel state information (CSI), it is shown that transmitter
cooperation outperforms receiver cooperation, whereas the opposite is true when
power is optimally allocated among the cooperating nodes but only CSI at the
receiver (CSIR) is available. When the nodes have equal power with CSIR only,
cooperative schemes are shown to offer no capacity improvement over
non-cooperation under the same network power constraint. When the system is
under optimal power allocation with full CSI, the decode-and-forward
transmitter cooperation rate is close to its cut-set capacity upper bound, and
outperforms compress-and-forward receiver cooperation. Under fast Rayleigh
fading in the high SNR regime, similar conclusions follow. Cooperative systems
provide resilience to fading in channel magnitudes; however, capacity becomes
more sensitive to power allocation, and the cooperating nodes need to be closer
together for the decode-and-forward scheme to be capacity-achieving. Moreover,
to realize capacity improvement, full CSI is necessary in transmitter
cooperation, while in receiver cooperation optimal power allocation is
essential.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2007 07:22:17 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Nov 2008 05:22:33 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Ng",
"Chris T. K.",
""
],
[
"Goldsmith",
"Andrea J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701117 | Ambedkar Dukkipati | Ambedkar Dukkipati | Maximum Entropy in the framework of Algebraic Statistics: A First Step | null | null | null | null | cs.IT cs.SC math.IT | null | Algebraic statistics is a recently evolving field, where one would treat
statistical models as algebraic objects and thereby use tools from
computational commutative algebra and algebraic geometry in the analysis and
computation of statistical models. In this approach, calculation of parameters
of statistical models amounts to solving set of polynomial equations in several
variables, for which one can use celebrated Grobner bases theory. Owing to the
important role of information theory in statistics, this paper as a first step,
explores the possibility of describing maximum and minimum entropy (ME) models
in the framework of algebraic statistics. We show that ME-models are toric
models (a class of algebraic statistical models) when the constraint functions
(that provide the information about the underlying random variable) are integer
valued functions, and the set of statistical models that results from
ME-methods are indeed an affine variety.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2007 15:23:29 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jun 2007 15:14:05 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Dukkipati",
"Ambedkar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701118 | Mohammad Ali Maddah-Ali Mr. | Mohammad Ali Maddah-Ali, Hajar Mahdavi-Doost, and Amir K. Khandani | Optimal Order of Decoding for Max-Min Fairness in $K$-User Memoryless
Interference Channels | 11 Pages, Submitted to IEEE International Symposium on Information
Theory(ISIT 2007) | null | 10.1109/ISIT.2007.4557653 | null | cs.IT math.IT | null | A $K$-user memoryless interference channel is considered where each receiver
sequentially decodes the data of a subset of transmitters before it decodes the
data of the designated transmitter. Therefore, the data rate of each
transmitter depends on (i) the subset of receivers which decode the data of
that transmitter, (ii) the decoding order, employed at each of these receivers.
In this paper, a greedy algorithm is developed to find the users which are
decoded at each receiver and the corresponding decoding order such that the
minimum rate of the users is maximized. It is proven that the proposed
algorithm is optimal.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2007 20:54:03 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Maddah-Ali",
"Mohammad Ali",
""
],
[
"Mahdavi-Doost",
"Hajar",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701119 | Petr Ivankov | Petr R. Ivankov, Nikolay P. Ivankov | The framework for simulation of dynamics of mechanical aggregates | 7 pages, 4 figures | null | null | null | cs.CE | null | A framework for simulation of dynamics of mechanical aggregates has been
developed. This framework enables us to build model of aggregate from models of
its parts. Framework is a part of universal framework for science and
engineering.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 12:18:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
],
[
"Ivankov",
"Nikolay P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701120 | Marcus Hutter | A. Chernov and M. Hutter and J. Schmidhuber | Algorithmic Complexity Bounds on Future Prediction Errors | 21 pages | Information and Computation, Vol.205,Nr.2 (2007) 242-261 | 10.1016/j.ic.2006.10.004 | null | cs.LG cs.AI cs.IT math.IT | null | We bound the future loss when predicting any (computably) stochastic sequence
online. Solomonoff finitely bounded the total deviation of his universal
predictor $M$ from the true distribution $mu$ by the algorithmic complexity of
$mu$. Here we assume we are at a time $t>1$ and already observed $x=x_1...x_t$.
We bound the future prediction performance on $x_{t+1}x_{t+2}...$ by a new
variant of algorithmic complexity of $mu$ given $x$, plus the complexity of the
randomness deficiency of $x$. The new complexity is monotone in its condition
in the sense that this complexity can only decrease if the condition is
prolonged. We also briefly discuss potential generalizations to Bayesian model
classes and to classification problems.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 07:36:40 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chernov",
"A.",
""
],
[
"Hutter",
"M.",
""
],
[
"Schmidhuber",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701121 | Bernard Mourrain | Changhe Tu (Shandong University), Wenping Wang (University of Hong
Kong), Bernard Mourrain (INRIA Sophia Antipolis), Jiaye Wang (Shandong
University) | Signature Sequence of Intersection Curve of Two Quadrics for Exact
Morphological Classification | null | null | null | null | cs.CG cs.SC | null | We present an efficient method for classifying the morphology of the
intersection curve of two quadrics (QSIC) in PR3, 3D real projective space;
here, the term morphology is used in a broad sense to mean the shape,
topological, and algebraic properties of a QSIC, including singularity,
reducibility, the number of connected components, and the degree of each
irreducible component, etc. There are in total 35 different QSIC morphologies
with non-degenerate quadric pencils. For each of these 35 QSIC morphologies,
through a detailed study of the eigenvalue curve and the index function jump we
establish a characterizing algebraic condition expressed in terms of the Segre
characteristics and the signature sequence of a quadric pencil. We show how to
compute a signature sequence with rational arithmetic so as to determine the
morphology of the intersection curve of any two given quadrics. Two immediate
applications of our results are the robust topological classification of QSIC
in computing B-rep surface representation in solid modeling and the derivation
of algebraic conditions for collision detection of quadric primitives.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 08:08:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tu",
"Changhe",
"",
"Shandong University"
],
[
"Wang",
"Wenping",
"",
"University of Hong\n Kong"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
],
[
"Wang",
"Jiaye",
"",
"Shandong\n University"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0701122 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | Applications of Polyhedral Computations to the Analysis and Verification
of Hardware and Software Systems | 51 pages, 11 figures | null | null | null | cs.CG cs.MS | null | Convex polyhedra are the basis for several abstractions used in static
analysis and computer-aided verification of complex and sometimes mission
critical systems. For such applications, the identification of an appropriate
complexity-precision trade-off is a particularly acute problem, so that the
availability of a wide spectrum of alternative solutions is mandatory. We
survey the range of applications of polyhedral computations in this area; give
an overview of the different classes of polyhedra that may be adopted; outline
the main polyhedral operations required by automatic analyzers and verifiers;
and look at some possible combinations of polyhedra with other numerical
abstractions that have the potential to improve the precision of the analysis.
Areas where further theoretical investigations can result in important
contributions are highlighted.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 08:39:34 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 08:42:37 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0701123 | David Doty | David Doty and Philippe Moser | Feasible Depth | Accepted to Computation and Logic in the Real World, Proceedings of
the 3rd Conference on Computability in Europe (CiE), 2007 | null | null | null | cs.CC cs.IT math.IT | null | This paper introduces two complexity-theoretic formulations of Bennett's
logical depth: finite-state depth and polynomial-time depth. It is shown that
for both formulations, trivial and random infinite sequences are shallow, and a
slow growth law holds, implying that deep sequences cannot be created easily
from shallow sequences. Furthermore, the E analogue of the halting language is
shown to be polynomial-time deep, by proving a more general result: every
language to which a nonnegligible subset of E can be reduced in uniform
exponential time is polynomial-time deep.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 22:10:50 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Feb 2007 05:54:54 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Apr 2007 21:21:57 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Doty",
"David",
""
],
[
"Moser",
"Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701124 | Chunxuan Ye | Chunxuan Ye and Alex Reznik | Group Secret Key Generation Algorithms | submitted to 2007 IEEE International Symposium on Information Theory | null | null | null | cs.IT cs.CR math.IT | null | We consider a pair-wise independent network where every pair of terminals in
the network observes a common pair-wise source that is independent of all the
sources accessible to the other pairs. We propose a method for secret key
agreement in such a network that is based on well-established point-to-point
techniques and repeated application of the one-time pad. Three specific
problems are investigated. 1) Each terminal's observations are correlated only
with the observations of a central terminal. All these terminals wish to
generate a common secret key. 2) In a pair-wise independent network, two
designated terminals wish to generate a secret key with the help of other
terminals. 3) All the terminals in a pair-wise independent network wish to
generate a common secret key. A separate protocol for each of these problems is
proposed. Furthermore, we show that the protocols for the first two problems
are optimal and the protocol for the third problem is efficient, in terms of
the resulting secret key rates.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 23:00:02 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Ye",
"Chunxuan",
""
],
[
"Reznik",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701125 | Marcus Hutter | Marcus Hutter | Universal Algorithmic Intelligence: A mathematical top->down approach | 70 pages | In Artificial General Intelligence, Springer (2007) 227-290 | null | IDSIA-01-03 | cs.AI cs.LG | null | Sequential decision theory formally solves the problem of rational agents in
uncertain worlds if the true environmental prior probability distribution is
known. Solomonoff's theory of universal induction formally solves the problem
of sequence prediction for unknown prior distribution. We combine both ideas
and get a parameter-free theory of universal Artificial Intelligence. We give
strong arguments that the resulting AIXI model is the most intelligent unbiased
agent possible. We outline how the AIXI model can formally solve a number of
problem classes, including sequence prediction, strategic games, function
minimization, reinforcement and supervised learning. The major drawback of the
AIXI model is that it is uncomputable. To overcome this problem, we construct a
modified algorithm AIXItl that is still effectively more intelligent than any
other time t and length l bounded agent. The computation time of AIXItl is of
the order t x 2^l. The discussion includes formal definitions of intelligence
order relations, the horizon problem and relations of the AIXI theory to other
AI approaches.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 00:18:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0701126 | Lars Rasmussen | Allen Chuang, Albert Guillen i Fabregas, Lars K. Rasmussen, and Iain
B. Collings | Optimal Throughput-Diversity-Delay Tradeoff in MIMO ARQ Block-Fading
Channels | 51 pages, 15 figures. Submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2008.928264 | null | cs.IT math.IT | null | In this paper, we consider an automatic-repeat-request (ARQ) retransmission
protocol signaling over a block-fading multiple-input, multiple-output (MIMO)
channel. Unlike previous work, we allow for multiple fading blocks within each
transmission (ARQ round), and we constrain the transmitter to fixed rate codes
constructed over complex signal constellations. In particular, we examine the
general case of average input-power-constrained constellations as well as the
practically important case of finite discrete constellations. This scenario is
a suitable model for practical wireless communications systems employing
orthogonal frequency division multiplexing techniques over a MIMO ARQ channel.
Two cases of fading dynamics are considered, namely short-term static fading
where channel fading gains change randomly for each ARQ round, and long-term
static fading where channel fading gains remain constant over all ARQ rounds
pertaining to a given message. As our main result, we prove that for the
block-fading MIMO ARQ channel with discrete input signal constellation
satisfying a short-term power constraint, the optimal signal-to-noise ratio
(SNR) exponent is given by a modified Singleton bound, relating all the system
parameters. To demonstrate the practical significance of the theoretical
analysis, we present numerical results showing that practical
Singleton-bound-achieving maximum distance separable codes achieve the optimal
SNR exponent.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 04:01:17 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Chuang",
"Allen",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Rasmussen",
"Lars K.",
""
],
[
"Collings",
"Iain B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701127 | Risi Kondor | Risi Kondor | A novel set of rotationally and translationally invariant features for
images based on the non-commutative bispectrum | The claim that the invariants uniquely determine the original image
had to be dropped | null | null | null | cs.CV cs.AI | null | We propose a new set of rotationally and translationally invariant features
for image or pattern recognition and classification. The new features are cubic
polynomials in the pixel intensities and provide a richer representation of the
original image than most existing systems of invariants. Our construction is
based on the generalization of the concept of bispectrum to the
three-dimensional rotation group SO(3), and a projection of the image onto the
sphere.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 15:45:03 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Feb 2007 04:01:28 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Dec 2007 15:30:19 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kondor",
"Risi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0701128 | M. V. Panduranga Rao | M. V. Panduranga Rao | Interference Automata | 19 pages. A preliminary version appears under the title "On a Model
of Computation based on Optical Interference" in Proc. of the 16-th
Australasian Workshop on Combinatorial Algorithms (AWOCA'05), pp. 249-261 | null | null | null | cs.CC | null | We propose a computing model, the Two-Way Optical Interference Automata
(2OIA), that makes use of the phenomenon of optical interference. We introduce
this model to investigate the increase in power, in terms of language
recognition, of a classical Deterministic Finite Automaton (DFA) when endowed
with the facility of optical interference. The question is in the spirit of
Two-Way Finite Automata With Quantum and Classical States (2QCFA) [A. Ambainis
and J. Watrous, Two-way Finite Automata With Quantum and Classical States,
Theoretical Computer Science, 287 (1), 299-311, (2002)] wherein the classical
DFA is augmented with a quantum component of constant size. We test the power
of 2OIA against the languages mentioned in the above paper. We give efficient
2OIA algorithms to recognize languages for which 2QCFA machines have been shown
to exist, as well as languages whose status vis-a-vis 2QCFA has been posed as
open questions. Finally we show the existence of a language that cannot be
recognized by a 2OIA but can be recognized by an $O(n^3)$ space Turing machine.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 09:14:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rao",
"M. V. Panduranga",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0701129 | Naresh Sharma | Naresh Sharma, Pavan R. Pinnamraju and Constantinos B. Papadias | Space-time codes with controllable ML decoding complexity for any number
of transmit antennas | 5 pages, to appear in ISIT, June 2007, Nice, France | null | 10.1109/ISIT.2007.4557660 | null | cs.IT math.IT | null | We construct a class of linear space-time block codes for any number of
transmit antennas that have controllable ML decoding complexity with a maximum
rate of 1 symbol per channel use. The decoding complexity for $M$ transmit
antennas can be varied from ML decoding of $2^{\lceil \log_2M \rceil -1}$
symbols together to single symbol ML decoding. For ML decoding of $2^{\lceil
\log_2M \rceil - n}$ ($n=1,2,...$) symbols together, a diversity of
$\min(M,2^{\lceil \log_2M \rceil-n+1})$ can be achieved. Numerical results show
that the performance of the constructed code when $2^{\lceil \log_2M \rceil-1}$
symbols are decoded together is quite close to the performance of ideal rate-1
orthogonal codes (that are non-existent for more than 2 transmit antennas).
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 17:27:31 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Apr 2007 10:09:54 GMT"
}
] | 2012-05-22T00:00:00 | [
[
"Sharma",
"Naresh",
""
],
[
"Pinnamraju",
"Pavan R.",
""
],
[
"Papadias",
"Constantinos B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701130 | Thomas C. Schmidt | Thomas C. Schmidt and Matthias W\"ahlisch and Ying Zhang | On the Correlation of Geographic and Network Proximity at Internet Edges
and its Implications for Mobile Unicast and Multicast Routing | 6 pages including 6 figures | in Proceedings of the IEEE ICN'07, IEEE Computer Society Press,
Washington, DC, USA, April 2007 | null | null | cs.NI cs.AR cs.PF | null | Significant effort has been invested recently to accelerate handover
operations in a next generation mobile Internet. Corresponding works for
developing efficient mobile multicast management are emergent. Both problems
simultaneously expose routing complexity between subsequent points of
attachment as a characteristic parameter for handover performance in access
networks.
As continuous mobility handovers necessarily occur between access routers
located in geographic vicinity, this paper investigates on the hypothesis that
geographically adjacent edge networks attain a reduced network distances as
compared to arbitrary Internet nodes. We therefore evaluate and analyze edge
distance distributions in various regions for clustered IP ranges on their
geographic location such as a city. We use traceroute to collect packet
forwarding path and round-trip-time of each intermediate node to scan-wise
derive an upper bound of the node distances. Results of different scanning
origins are compared to obtain the best estimation of network distance of each
pair. Our results are compared with corresponding analysis of CAIDA Skitter
data, overall leading to fairly stable, reproducible edge distance
distributions. As a first conclusion on expected impact on handover performance
measures, our results indicate a general optimum for handover anticipation time
in 802.11 networks of 25 ms.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 23:06:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Thomas C.",
""
],
[
"Wählisch",
"Matthias",
""
],
[
"Zhang",
"Ying",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701131 | Jialiang Zhang | Jialiang Zhang, Soung Chang Liew | Effective Beam Width of Directional Antennas in Wireless Ad Hoc Networks | null | null | null | null | cs.IT math.IT | null | It is known at a qualitative level that directional antennas can be used to
boost the capacity of wireless ad hoc networks. Lacking is a measure to
quantify this advantage and to compare directional antennas of different
footprint patterns. This paper introduces the concept of the effective beam
width (and the effective null width as its dual counterpart) as a measure which
quantitatively captures the capacity-boosting capability of directional
antennas. Beam width is commonly defined to be the directional angle spread
within which the main-lobe beam power is above a certain threshold. In
contrast, our effective beam width definition lumps the effects of the (i)
antenna pattern, (ii) active-node distribution, and (iii) channel
characteristics, on network capacity into a single quantitative measure. We
investigate the mathematical properties of the effective beam width and show
how the convenience afforded by these properties can be used to analyze the
effectiveness of complex directional antenna patterns in boosting network
capacity, with fading and multi-user interference taken into account. In
particular, we derive the extent to which network capacity can be scaled with
the use of phased array antennas. We show that a phased array antenna with N
elements can boost transport capacity of an Aloha-like network by a factor of
order N^1.620.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 09:32:01 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Apr 2007 14:46:06 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Zhang",
"Jialiang",
""
],
[
"Liew",
"Soung Chang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701132 | Mardavij Roozbehani | Eric Feron (School of Aerospace Engineering, Georgia Institute of
Technology) Mardavij Roozbehani (Department of Aeronautics and Astronautics,
Massachusetts Institue of Technology) | Certifying controls and systems software | 12 pages, 2 figures, 1 Matlab Code. To be submitted to AIAA journal
of guidance and control. In this revised version, support and funding
resources were added to the acknowledgement section. LIDS Publication #: 2745 | null | null | LIDS # 2745 | cs.SE | null | Software system certification presents itself with many challenges, including
the necessity to certify the system at the level of functional requirements,
code and binary levels, the need to chase down run-time errors, and the need
for proving timing properties of the eventual, compiled system. This paper
illustrates possible approaches for certifying code that arises from control
systems requirements as far as stability properties are concerned. The relative
simplicity of the certification process should encourage the development of
systematic procedures for certifying control system codes for more complex
environments.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 19:34:45 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jan 2007 16:12:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feron",
"Eric",
"",
"School of Aerospace Engineering, Georgia Institute of\n Technology"
],
[
"Roozbehani",
"Mardavij",
"",
"Department of Aeronautics and Astronautics,\n Massachusetts Institue of Technology"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0701133 | Athina Markopoulou | Athina Markopoulou and David Cheriton | The Case for Redundant Arrays of Internet Links (RAIL) | null | null | null | null | cs.NI | null | It is well-known that wide-area networks face today several performance and
reliability problems. In this work, we propose to solve these problems by
connecting two or more local-area networks together via a Redundant Array of
Internet Links (or RAIL) and by proactively replicating each packet over these
links. In that sense, RAIL is for networks what RAID (Redundant Array of
Inexpensive Disks) was for disks. In this paper, we describe the RAIL approach,
present our prototype (called the RAILedge), and evaluate its performance.
First, we demonstrate that using multiple Internet links significantly improves
the end-to-end performance in terms of network-level as well as
application-level metrics for Voice-over-IP and TCP. Second, we show that a
delay padding mechanism is needed to complement RAIL when there is significant
delay disparity between the paths. Third, we show that two paths provide most
of the benefit, if carefully managed. Finally, we discuss a RAIL-network
architecture, where RAILedges make use of path redundancy, route control and
application-specific mechanisms, to improve WAN performance.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 19:59:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Markopoulou",
"Athina",
""
],
[
"Cheriton",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701134 | Wenbing Zhao | Wenbing Zhao | Byzantine Fault Tolerance for Nondeterministic Applications | To appear in the proceedings of the 3rd IEEE International Symposium
on Dependable, Autonomic and Secure Computing, 2007 | null | 10.1109/DASC.2007.11 | null | cs.DC | null | All practical applications contain some degree of nondeterminism. When such
applications are replicated to achieve Byzantine fault tolerance (BFT), their
nondeterministic operations must be controlled to ensure replica consistency.
To the best of our knowledge, only the most simplistic types of replica
nondeterminism have been dealt with. Furthermore, there lacks a systematic
approach to handling common types of nondeterminism. In this paper, we propose
a classification of common types of replica nondeterminism with respect to the
requirement of achieving Byzantine fault tolerance, and describe the design and
implementation of the core mechanisms necessary to handle such nondeterminism
within a Byzantine fault tolerance framework.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 20:44:52 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Aug 2007 04:51:53 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Zhao",
"Wenbing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0701135 | Jinyun Ke | Jinyun KE | Complex networks and human language | null | null | null | null | cs.CL | null | This paper introduces how human languages can be studied in light of recent
development of network theories. There are two directions of exploration. One
is to study networks existing in the language system. Various lexical networks
can be built based on different relationships between words, being semantic or
syntactic. Recent studies have shown that these lexical networks exhibit
small-world and scale-free features. The other direction of exploration is to
study networks of language users (i.e. social networks of people in the
linguistic community), and their role in language evolution. Social networks
also show small-world and scale-free features, which cannot be captured by
random or regular network models. In the past, computational models of language
change and language emergence often assume a population to have a random or
regular structure, and there has been little discussion how network structures
may affect the dynamics. In the second part of the paper, a series of
simulation models of diffusion of linguistic innovation are used to illustrate
the importance of choosing realistic conditions of population structure for
modeling language change. Four types of social networks are compared, which
exhibit two categories of diffusion dynamics. While the questions about which
type of networks are more appropriate for modeling still remains, we give some
preliminary suggestions for choosing the type of social networks for modeling.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 00:45:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"KE",
"Jinyun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0701136 | Stevan Harnad | Chawki Hajjem, Stevan Harnad | Citation Advantage For OA Self-Archiving Is Independent of Journal
Impact Factor, Article Age, and Number of Co-Authors | null | null | null | null | cs.IR cs.DL | null | Eysenbach has suggested that the OA (Green) self-archiving advantage might
just be an artifact of potential uncontrolled confounding factors such as
article age (older articles may be both more cited and more likely to be
self-archived), number of authors (articles with more authors might be more
cited and more self-archived), subject matter (the subjects that are cited
more, self-archive more), country (same thing), number of authors, citation
counts of authors, etc. Chawki Hajjem (doctoral candidate, UQaM) had already
shown that the OA advantage was present in all cases when articles were
analysed separately by age, subject matter or country. He has now done a
multiple regression analysis jointly testing (1) article age, (2) journal
impact factor, (3) number of authors, and (4) OA self-archiving as separate
factors for 442,750 articles in 576 (biomedical) journals across 11 years, and
has shown that each of the four factors contributes an independent,
statistically significant increment to the citation counts. The
OA-self-archiving advantage remains a robust, independent factor. Having
successfully responded to his challenge, we now challenge Eysenbach to
demonstrate -- by testing a sufficiently broad and representative sample of
journals at all levels of the journal quality, visibility and prestige
hierarchy -- that his finding of a citation advantage for Gold OA (articles
published OA on the high-profile website of the only journal he tested (PNAS)
over Green OA articles in the same journal (self-archived on the author's
website) was not just an artifact of having tested only one very high-profile
journal.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 02:14:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajjem",
"Chawki",
""
],
[
"Harnad",
"Stevan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0701137 | Stevan Harnad | Chawki Hajjem, Stevan Harnad | The Open Access Citation Advantage: Quality Advantage Or Quality Bias? | null | null | null | null | cs.IR cs.DL | null | Many studies have now reported the positive correlation between Open Access
(OA) self-archiving and citation counts ("OA Advantage," OAA). But does this
OAA occur because (QB) authors are more likely to self-selectively self-archive
articles that are more likely to be cited (self-selection "Quality Bias": QB)?
or because (QA) articles that are self-archived are more likely to be cited
("Quality Advantage": QA)? The probable answer is both. Three studies [by (i)
Kurtz and co-workers in astrophysics, (ii) Moed in condensed matter physics,
and (iii) Davis & Fromerth in mathematics] had reported the OAA to be due to QB
[plus Early Advantage, EA, from self-archiving the preprint before publication,
in (i) and (ii)] rather than QA. These three fields, however, (1) have less of
a postprint access problem than most other fields and (i) and (ii) also happen
to be among the minority of fields that (2) make heavy use of prepublication
preprints. Chawki Hajjem has now analyzed preliminary evidence based on over
100,000 articles from multiple fields, comparing self-selected self-archiving
with mandated self-archiving to estimate the contributions of QB and QA to the
OAA. Both factors contribute, and the contribution of QA is greater.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 02:19:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajjem",
"Chawki",
""
],
[
"Harnad",
"Stevan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0701138 | V\'eronique Bruy\`ere | Veronique Bruyere, Jean-Francois Raskin | Real-Time Model-Checking: Parameters everywhere | null | Logical Methods in Computer Science, Volume 3, Issue 1 (February
27, 2007) lmcs:2229 | 10.2168/LMCS-3(1:7)2007 | null | cs.LO | null | In this paper, we study the model-checking and parameter synthesis problems
of the logic TCTL over discrete-timed automata where parameters are allowed
both in the model (timed automaton) and in the property (temporal formula). Our
results are as follows. On the negative side, we show that the model-checking
problem of TCTL extended with parameters is undecidable over discrete-timed
automata with only one parametric clock. The undecidability result needs
equality in the logic. On the positive side, we show that the model-checking
and the parameter synthesis problems become decidable for a fragment of the
logic where equality is not allowed. Our method is based on automata theoretic
principles and an extension of our method to express durations of runs in timed
automata using Presburger arithmetic.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 15:20:20 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Feb 2007 16:29:57 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Bruyere",
"Veronique",
""
],
[
"Raskin",
"Jean-Francois",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701139 | Yishay Mor | Yishay Mor and Jeffrey S. Rosenschein | Time and the Prisoner's Dilemma | Proceedings of the First International Conference on Multiagent
Systems (ICMAS95), : 276-282, 1995 | null | null | null | cs.GT cs.AI | null | This paper examines the integration of computational complexity into game
theoretic models. The example focused on is the Prisoner's Dilemma, repeated
for a finite length of time. We show that a minimal bound on the players'
computational ability is sufficient to enable cooperative behavior.
In addition, a variant of the repeated Prisoner's Dilemma game is suggested,
in which players have the choice of opting out. This modification enriches the
game and suggests dominance of cooperative strategies.
Competitive analysis is suggested as a tool for investigating sub-optimal
(but computationally tractable) strategies and game theoretic models in
general. Using competitive analysis, it is shown that for bounded players, a
sub-optimal strategy might be the optimal choice, given resource limitations.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 15:23:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mor",
"Yishay",
""
],
[
"Rosenschein",
"Jeffrey S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0701140 | Corina P?s?reanu | Corina S. Pasareanu, Radek Pelanek, Willem Visser | Predicate Abstraction with Under-approximation Refinement | 22 pages, 3 figures, accepted for publication in Logical Methods in
Computer Science journal (special issue CAV 2005) | Logical Methods in Computer Science, Volume 3, Issue 1 (February
26, 2007) lmcs:2227 | 10.2168/LMCS-3(1:5)2007 | null | cs.GT | null | We propose an abstraction-based model checking method which relies on
refinement of an under-approximation of the feasible behaviors of the system
under analysis. The method preserves errors to safety properties, since all
analyzed behaviors are feasible by definition. The method does not require an
abstract transition relation to be generated, but instead executes the concrete
transitions while storing abstract versions of the concrete states, as
specified by a set of abstraction predicates. For each explored transition the
method checks, with the help of a theorem prover, whether there is any loss of
precision introduced by abstraction. The results of these checks are used to
decide termination or to refine the abstraction by generating new abstraction
predicates. If the (possibly infinite) concrete system under analysis has a
finite bisimulation quotient, then the method is guaranteed to eventually
explore an equivalent finite bisimilar structure. We illustrate the application
of the approach for checking concurrent programs.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 21:29:37 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Feb 2007 10:52:16 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Pasareanu",
"Corina S.",
""
],
[
"Pelanek",
"Radek",
""
],
[
"Visser",
"Willem",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0701141 | M. H. van Emden | M.H. van Emden and B. Moa | The Fundamental Theorems of Interval Analysis | 8 pages | null | null | DCS-316-IR | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Expressions are not functions. Confusing the two concepts or failing to
define the function that is computed by an expression weakens the rigour of
interval arithmetic. We give such a definition and continue with the required
re-statements and proofs of the fundamental theorems of interval arithmetic and
interval analysis.
Revision Feb. 10, 2009: added reference to and acknowledgement of P. Taylor.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 23:11:15 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Feb 2009 01:32:42 GMT"
}
] | 2009-02-11T00:00:00 | [
[
"van Emden",
"M. H.",
""
],
[
"Moa",
"B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.