id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
cs/0701142
Wolfgang Bein
Wolfgang Bein, Lawrence L. Larmore, R\"udiger Reischuk
Knowledge State Algorithms: Randomization with Limited Information
17 pages, 2 figures
null
null
null
cs.DS
null
We introduce the concept of knowledge states; many well-known algorithms can be viewed as knowledge state algorithms. The knowledge state approach can be used to to construct competitive randomized online algorithms and study the tradeoff between competitiveness and memory. A knowledge state simply states conditional obligations of an adversary, by fixing a work function, and gives a distribution for the algorithm. When a knowledge state algorithm receives a request, it then calculates one or more "subsequent" knowledge states, together with a probability of transition to each. The algorithm then uses randomization to select one of those subsequents to be the new knowledge state. We apply the method to the paging problem. We present optimally competitive algorithm for paging for the cases where the cache sizes are k=2 and k=3. These algorithms use only a very limited number of bookmarks.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 00:54:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Bein", "Wolfgang", "" ], [ "Larmore", "Lawrence L.", "" ], [ "Reischuk", "Rüdiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0701143
Xing Wang
Xing M. Wang
Dirac Notation, Fock Space and Riemann Metric Tensor in Information Retrieval Models
Removed appendix B; introduced Concept Fock Space; made some minor corrections or modifications
null
null
null
cs.IR math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using Dirac Notation as a powerful tool, we investigate the three classical Information Retrieval (IR) models and some their extensions. We show that almost all such models can be described by vectors in Occupation Number Representations (ONR) of Fock spaces with various specifications on, e.g., occupation number, inner product or term-term interactions. As important cases of study, Concept Fock Space (CFS) is introduced for Boolean model; the basic formulas for Singular Value Decomposition (SVD) of Latent Semantic Indexing (LSI) Model are manipulated in terms of Dirac notation. And, based on SVD, a Riemannian metric tensor is introduced, which not only can be used to calculate the relevance of documents to a query, but also may be used to measure the closeness of documents in data clustering.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 01:22:59 GMT" }, { "version": "v2", "created": "Thu, 8 Feb 2007 04:29:51 GMT" }, { "version": "v3", "created": "Sun, 5 Aug 2007 18:26:03 GMT" }, { "version": "v4", "created": "Mon, 20 Jun 2011 17:38:19 GMT" } ]
2011-06-21T00:00:00
[ [ "Wang", "Xing M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
cs/0701144
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Trusted Ticket Systems and Applications
Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
null
null
null
cs.CR
null
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users' privacy. We construct a ticket system -- a concept which is at the heart of Identity Management -- relying solely on the capabilities of the trusted platform module and the standards specified by the Trusted Computing Group. Two examples show how it can be used for pseudonymous and protected service access.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 14:26:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0701145
Andreas U. Schmidt
Nicolai Kuntze, Andreas U. Schmidt, and Christian Hett
Non-Repudiation in Internet Telephony
Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
null
null
null
cs.CR
null
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to the protocols for Voice over the Internet (VoIP), provides a high level of inherent security, and extends naturally to multilateral non-repudiation, e.g., for conferences. Signatures over conversations can become true declarations of will in analogy to electronically signed, digital documents. This enables binding verbal contracts, in principle between unacquainted speakers, and in particular without witnesses. A reference implementation of a secure VoIP archive is exhibited.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 15:23:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ], [ "Hett", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0701146
Anand Sarwate
Anand D. Sarwate, Michael Gastpar
State constraints and list decoding for the AVC
22 pages, significantly changed version submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
List decoding for arbitrarily varying channels (AVCs) under state constraints is investigated. It is shown that rates within $\epsilon$ of the randomized coding capacity of AVCs with input-dependent state can be achieved under maximal error with list decoding using lists of size $O(1/\epsilon)$. Under average error an achievable rate region and converse bound are given for lists of size $L$. These bounds are based on two different notions of symmetrizability and do not coincide in general. An example is given that shows that for list size $L$ the capacity may be positive but strictly smaller than the randomized coding capacity. This behavior is different than the situation without state constraints.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 01:59:37 GMT" }, { "version": "v2", "created": "Tue, 18 Sep 2007 18:05:19 GMT" }, { "version": "v3", "created": "Tue, 6 Oct 2009 01:22:17 GMT" } ]
2009-10-06T00:00:00
[ [ "Sarwate", "Anand D.", "" ], [ "Gastpar", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701147
Wim Vanhoof
Michael Hanus
A Generic Analysis Environment for Curry Programs
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
We present CurryBrowser, a generic analysis environment for the declarative multi-paradigm language Curry. CurryBrowser supports browsing through the program code of an application written in Curry, i.e., the main module and all directly or indirectly imported modules. Each module can be shown in different formats (e.g., source code, interface, intermediate code) and, inside each module, various properties of functions defined in this module can be analyzed. In order to support the integration of various program analyses, CurryBrowser has a generic interface to connect local and global analyses implemented in Curry. CurryBrowser is completely implemented in Curry using libraries for GUI programming and meta-programming.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 06:55:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanus", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0701148
Wim Vanhoof
Wim Vanhoof and Susana Munoz-Hernandez
Proceedings of the 16th Workshop in Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
null
cs.PL
null
This volume contains the papers presented at WLPE'06: the 16th Workshop on Logic-based Methods in Programming Environments held on August 16, 2006 in the Seattle Sheraton Hotel and Towers, Seattle, Washington (USA). It was organised as a satellite workshop of ICLP'06, the 22th International Conference on Logic Programming.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 07:03:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vanhoof", "Wim", "" ], [ "Munoz-Hernandez", "Susana", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0701149
Ozgur Oyman
Ozgur Oyman, Arogyaswami J. Paulraj
Power-Bandwidth Tradeoff in Dense Multi-Antenna Relay Networks
12 pages, to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2007.05815
null
cs.IT math.IT
null
We consider a dense fading multi-user network with multiple active multi-antenna source-destination pair terminals communicating simultaneously through a large common set of $K$ multi-antenna relay terminals in the full spatial multiplexing mode. We use Shannon-theoretic tools to analyze the tradeoff between energy efficiency and spectral efficiency (known as the power- bandwidth tradeoff) in meaningful asymptotic regimes of signal-to-noise ratio (SNR) and network size. We design linear distributed multi-antenna relay beamforming (LDMRB) schemes that exploit the spatial signature of multi-user interference and characterize their power-bandwidth tradeoff under a system wide power constraint on source and relay transmissions. The impact of multiple users, multiple relays and multiple antennas on the key performance measures of the high and low SNR regimes is investigated in order to shed new light on the possible reduction in power and bandwidth requirements through the usage of such practical relay cooperation techniques. Our results indicate that point-to-point coded multi-user networks supported by distributed relay beamforming techniques yield enhanced energy efficiency and spectral efficiency, and with appropriate signaling and sufficient antenna degrees of freedom, can achieve asymptotically optimal power-bandwidth tradeoff with the best possible (i.e., as in the cutset bound) energy scaling of $K^{-1}$ and the best possible spectral efficiency slope at any SNR for large number of relay terminals.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 10:02:29 GMT" }, { "version": "v2", "created": "Thu, 25 Jan 2007 21:13:54 GMT" }, { "version": "v3", "created": "Fri, 2 Feb 2007 18:42:41 GMT" } ]
2016-11-15T00:00:00
[ [ "Oyman", "Ozgur", "" ], [ "Paulraj", "Arogyaswami J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701150
Luc Brun
Luc Brun (GREYC), Walter G. Kropatsch (PRIP)
Contains and Inside relationships within combinatorial Pyramids
35 pages
Pattern Recognition 39 (01/04/2006) 515-526
null
null
cs.CV
null
Irregular pyramids are made of a stack of successively reduced graphs embedded in the plane. Such pyramids are used within the segmentation framework to encode a hierarchy of partitions. The different graph models used within the irregular pyramid framework encode different types of relationships between regions. This paper compares different graph models used within the irregular pyramid framework according to a set of relationships between regions. We also define a new algorithm based on a pyramid of combinatorial maps which allows to determine if one region contains the other using only local calculus.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 15:13:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Brun", "Luc", "", "GREYC" ], [ "Kropatsch", "Walter G.", "", "PRIP" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0701151
Guillaume Hanrot
Howard Cheng, Guillaume Hanrot (INRIA Lorraine - LORIA), Emmanuel Thom\'e (INRIA Lorraine - LORIA), Eugene Zima, Paul Zimmermann (INRIA Lorraine - LORIA)
Time- and Space-Efficient Evaluation of Some Hypergeometric Constants
null
null
null
null
cs.SC
null
The currently best known algorithms for the numerical evaluation of hypergeometric constants such as $\zeta(3)$ to $d$ decimal digits have time complexity $O(M(d) \log^2 d)$ and space complexity of $O(d \log d)$ or $O(d)$. Following work from Cheng, Gergel, Kim and Zima, we present a new algorithm with the same asymptotic complexity, but more efficient in practice. Our implementation of this algorithm improves slightly over existing programs for the computation of $\pi$, and we announce a new record of 2 billion digits for $\zeta(3)$.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 08:07:38 GMT" } ]
2016-08-14T00:00:00
[ [ "Cheng", "Howard", "", "INRIA Lorraine - LORIA" ], [ "Hanrot", "Guillaume", "", "INRIA Lorraine - LORIA" ], [ "Thomé", "Emmanuel", "", "INRIA Lorraine - LORIA" ], [ "Zima", "Eugene", "", "INRIA\n Lorraine - LORIA" ], [ "Zimmermann", "Paul", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0701152
Hajar Mahdavi-Doost
Hajar Mahdavi-Doost, Masoud Ebrahimi, and Amir K. Khandani
Characterization of Rate Region in Interference Channels with Constrained Power
21 Pages, The Conference Version is Submitted to IEEE International Symposium on Information Theory (ISIT2007)
null
10.1109/ISIT.2007.4557585
null
cs.IT math.IT
null
In this paper, an $n$-user Gaussian interference channel, where the power of the transmitters are subject to some upper-bounds is studied. We obtain a closed-form expression for the rate region of such a channel based on the Perron-Frobenius theorem. While the boundary of the rate region for the case of unconstrained power is a well-established result, this is the first result for the case of constrained power. We extend this result to the time-varying channels and obtain a closed-form solution for the rate region of such channels.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 19:59:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Mahdavi-Doost", "Hajar", "" ], [ "Ebrahimi", "Masoud", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701153
Richard Kr\'alovi\v{c}
Michal Fori\v{s}ek, Branislav Katreniak, Jana Katreniakov\'a, Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}, Vladim\'ir Koutn\'y, Dana Pardubsk\'a, Tom\'a\v{s} Plachetka, Branislav Rovan
Online Bandwidth Allocation
null
null
null
null
cs.DS cs.NI
null
The paper investigates a version of the resource allocation problem arising in the wireless networking, namely in the OVSF code reallocation process. In this setting a complete binary tree of a given height $n$ is considered, together with a sequence of requests which have to be served in an online manner. The requests are of two types: an insertion request requires to allocate a complete subtree of a given height, and a deletion request frees a given allocated subtree. In order to serve an insertion request it might be necessary to move some already allocated subtrees to other locations in order to free a large enough subtree. We are interested in the worst case average number of such reallocations needed to serve a request. It was proved in previous work that the competitive ratio of the optimal online algorithm solving this problem is between 1.5 and O(n). We partially answer the question about its exact value by giving an O(1)-competitive online algorithm. Same model has been used in the context of memory management systems, and analyzed for the number of reallocations needed to serve a request in the worst case. In this setting, our result is a corresponding amortized analysis.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 11:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Forišek", "Michal", "" ], [ "Katreniak", "Branislav", "" ], [ "Katreniaková", "Jana", "" ], [ "Královič", "Rastislav", "" ], [ "Královič", "Richard", "" ], [ "Koutný", "Vladimír", "" ], [ "Pardubská", "Dana", "" ], [ "Plachetka", "Tomáš", "" ], [ "Rovan", "Branislav", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0701154
Pascal Tesson
Pascal Tesson and Denis Therien
Logic Meets Algebra: the Case of Regular Languages
37 pages
Logical Methods in Computer Science, Volume 3, Issue 1 (February 23, 2007) lmcs:2226
10.2168/LMCS-3(1:4)2007
null
cs.LO
null
The study of finite automata and regular languages is a privileged meeting point of algebra and logic. Since the work of Buchi, regular languages have been classified according to their descriptive complexity, i.e. the type of logical formalism required to define them. The algebraic point of view on automata is an essential complement of this classification: by providing alternative, algebraic characterizations for the classes, it often yields the only opportunity for the design of algorithms that decide expressibility in some logical fragment. We survey the existing results relating the expressibility of regular languages in logical fragments of MSO[S] with algebraic properties of their minimal automata. In particular, we show that many of the best known results in this area share the same underlying mechanics and rely on a very strong relation between logical substitutions and block-products of pseudovarieties of monoid. We also explain the impact of these connections on circuit complexity theory.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 20:46:36 GMT" }, { "version": "v2", "created": "Fri, 23 Feb 2007 12:33:09 GMT" } ]
2017-01-11T00:00:00
[ [ "Tesson", "Pascal", "" ], [ "Therien", "Denis", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0701155
Jim Gray
Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don Reichart, Murali Venkatrao, Frank Pellow, Hamid Pirahesh
Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals
null
Data Mining and Knowledge Discovery 1(1): 29-53 (1997)
null
null
cs.DB
null
Data analysis applications typically aggregate data across many dimensions looking for anomalies or unusual patterns. The SQL aggregate functions and the GROUP BY operator produce zero-dimensional or one-dimensional aggregates. Applications need the N-dimensional generalization of these operators. This paper defines that operator, called the data cube or simply cube. The cube operator generalizes the histogram, cross-tabulation, roll-up, drill-down, and sub-total constructs found in most report writers. The novelty is that cubes are relations. Consequently, the cube operator can be imbedded in more complex non-procedural data analysis programs. The cube operator treats each of the N aggregation attributes as a dimension of N-space. The aggregate of a particular set of attribute values is a point in this space. The set of points forms an N-dimensional cube. Super-aggregates are computed by aggregating the N-cube to lower dimensional spaces. This paper (1) explains the cube and roll-up operators, (2) shows how they fit in SQL, (3) explains how users can define new aggregate functions for cubes, and (4) discusses efficient techniques to compute the cube. Many of these features are being added to the SQL Standard.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:39:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Chaudhuri", "Surajit", "" ], [ "Bosworth", "Adam", "" ], [ "Layman", "Andrew", "" ], [ "Reichart", "Don", "" ], [ "Venkatrao", "Murali", "" ], [ "Pellow", "Frank", "" ], [ "Pirahesh", "Hamid", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0701156
Jim Gray
Jim Gray
Data Management: Past, Present, and Future
null
IEEE Computer 29(10): 38-46 (1996)
null
MSR-TR-96-18
cs.DB
null
Soon most information will be available at your fingertips, anytime, anywhere. Rapid advances in storage, communications, and processing allow us move all information into Cyberspace. Software to define, search, and visualize online information is also a key to creating and accessing online information. This article traces the evolution of data management systems and outlines current trends. Data management systems began by automating traditional tasks: recording transactions in business, science, and commerce. This data consisted primarily of numbers and character strings. Today these systems provide the infrastructure for much of our society, allowing fast, reliable, secure, and automatic access to data distributed throughout the world. Increasingly these systems automatically design and manage access to the data. The next steps are to automate access to richer forms of data: images, sound, video, maps, and other media. A second major challenge is automatically summarizing and abstracting data in anticipation of user requests. These multi-media databases and tools to access them will be a cornerstone of our move to Cyberspace.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:42:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0701157
Jim Gray
Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil, Patrick O'Neil
A Critique of ANSI SQL Isolation Levels
null
Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995
null
MSR-TR-95-51
cs.DB
null
ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads, Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and the ANSI SQL definitions fail to characterize several popular isolation levels, including the standard locking implementations of the levels. Investigating the ambiguities of the phenomena leads to clearer definitions; in addition new phenomena that better characterize isolation types are introduced. An important multiversion isolation type, Snapshot Isolation, is defined.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:53:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenson", "Hal", "" ], [ "Bernstein", "Phil", "" ], [ "Gray", "Jim", "" ], [ "Melton", "Jim", "" ], [ "O'Neil", "Elizabeth", "" ], [ "O'Neil", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0701158
Jim Gray
Jim Gray
Queues Are Databases
null
null
null
MSR-TR-95-56
cs.DB
null
Message-oriented-middleware (MOM) has become an small industry. MOM offers queued transaction processing as an advance over pure client-server transaction processing. This note makes four points: Queued transaction processing is less general than direct transaction processing. Queued systems are built on top of direct systems. You cannot build a direct system atop a queued system. It is difficult to build direct, conversational, or distributed transactions atop a queued system. Queues are interesting databases with interesting concurrency control. It is best to build these mechanisms into a standard database system so other applications can use these interesting features. Queue systems need DBMS functionality. Queues need security, configuration, performance monitoring, recovery, and reorganization utilities. Database systems already have these features. A full-function MOM system duplicates these database features. Queue managers are simple TP-monitors managing server pools driven by queues. Database systems are encompassing many server pool features as they evolve to TP-lite systems.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:56:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0701159
Jim Gray
Gerd Heber, Jim Gray
Supporting Finite Element Analysis with a Relational Database Backend, Part I: There is Life beyond Files
null
null
null
MSR-TR-2005-49
cs.DB cs.CE
null
In this paper, we show how to use a Relational Database Management System in support of Finite Element Analysis. We believe it is a new way of thinking about data management in well-understood applications to prepare them for two major challenges, - size and integration (globalization). Neither extreme size nor integration (with other applications over the Web) was a design concern 30 years ago when the paradigm for FEA implementation first was formed. On the other hand, database technology has come a long way since its inception and it is past time to highlight its usefulness to the field of scientific computing and computer based engineering. This series aims to widen the list of applications for database designers and for FEA users and application developers to reap some of the benefits of database development.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:02:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Heber", "Gerd", "" ], [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701160
Jim Gray
Gerd Heber, Jim Gray
Supporting Finite Element Analysis with a Relational Database Backend, Part II: Database Design and Access
null
null
null
MSR-TR-2006-21
cs.DB cs.CE
null
This is Part II of a three article series on using databases for Finite Element Analysis (FEA). It discusses (1) db design, (2) data loading, (3) typical use cases during grid building, (4) typical use cases during simulation (get and put), (5) typical use cases during analysis (also done in Part III) and some performance measures of these cases. It argues that using a database is simpler to implement than custom data schemas, has better performance because it can use data parallelism, and better supports FEA modularity and tool evolution because database schema evolution, data independence, and self-defining data.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:05:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Heber", "Gerd", "" ], [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701161
Jim Gray
Jim Gray, Charles Levine
Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive
null
null
null
MSR-TR-2005-39
cs.DB cs.PF
null
A $2k computer can execute about 8k transactions per second. This is 80x more than one of the largest US bank's 1970's traffic - it approximates the total US 1970's financial transaction volume. Very modest modern computers can easily solve yesterday's problems.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:51:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Levine", "Charles", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0701162
Jim Gray
Jim Gray
A Measure of Transaction Processing 20 Years Later
This article appeared in the IEEE Data Engineering, Fall 2005
null
null
MSR-TR-2005-57
cs.DB cs.PF
null
This provides a retrospective of the paper "A Measure of Transaction Processing" published in 1985. It shows that transaction processing peak performance and price-peformance have improved about 100,000x respectively and that sort/sequential performance has approximately doubled each year (so a million fold improvement) even though processor performance plateaued in 1995.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:57:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0701163
Jim Gray
Jim Gray, Alex Szalay, Gyorgy Fekete
Using Table Valued Functions in SQL Server 2005 To Implement a Spatial Data Library
null
null
null
MSR-TR-2005-122
cs.DB cs.CE
null
This article explains how to add spatial search functions (point-near-point and point in polygon) to Microsoft SQL Server 2005 using C# and table-valued functions. It is possible to use this library to add spatial search to your application without writing any special code. The library implements the public-domain C# Hierarchical Triangular Mesh (HTM) algorithms from Johns Hopkins University. That C# library is connected to SQL Server 2005 via a set of scalar-valued and table-valued functions. These functions act as a spatial index.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:00:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ], [ "Fekete", "Gyorgy", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701164
Jim Gray
Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter Kukol, Ani Thakar
Indexing the Sphere with the Hierarchical Triangular Mesh
null
null
null
MSR-TR-2005-123
cs.DB cs.DS
null
We describe a method to subdivide the surface of a sphere into spherical triangles of similar, but not identical, shapes and sizes. The Hierarchical Triangular Mesh (HTM) is a quad-tree that is particularly good at supporting searches at different resolutions, from arc seconds to hemispheres. The subdivision scheme is universal, providing the basis for addressing and for fast lookups. The HTM provides the basis for an efficient geospatial indexing scheme in relational databases where the data have an inherent location on either the celestial sphere or the Earth. The HTM index is superior to cartographical methods using coordinates with singularities at the poles. We also describe a way to specify surface regions that efficiently represent spherical query areas. This article presents the algorithms used to identify the HTM triangles covering such regions.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:04:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ], [ "Fekete", "George", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Kukol", "Peter", "" ], [ "Thakar", "Ani", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0701165
Jim Gray
Gordon Bell, Jim Gray, Alex Szalay
Petascale Computational Systems
null
null
null
null
cs.DB cs.AR
null
Computational science is changing to be data intensive. Super-Computers must be balanced systems; not just CPU farms but also petascale IO and networking arrays. Anyone building CyberInfrastructure should allocate resources to support a balanced Tier-1 through Tier-3 design.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Bell", "Gordon", "" ], [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0701166
Jim Gray
Jim Gray, Catharine van Ingen
Empirical Measurements of Disk Failure Rates and Error Rates
null
null
null
MSR-TR-2005-166
cs.DB cs.AR
null
The SATA advertised bit error rate of one error in 10 terabytes is frightening. We moved 2 PB through low-cost hardware and saw five disk read error events, several controller failures, and many system reboots caused by security patches. We conclude that SATA uncorrectable read errors are not yet a dominant system-fault source - they happen, but are rare compared to other problems. We also conclude that UER (uncorrectable error rate) is not the relevant metric for our needs. When an uncorrectable read error happens, there are typically several damaged storage blocks (and many uncorrectable read errors.) Also, some uncorrectable read errors may be masked by the operating system. The more meaningful metric for data architects is Mean Time To Data Loss (MTTDL.)
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:29:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "van Ingen", "Catharine", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0701167
Jim Gray
Maria A. Nieto-Santisteban, Aniruddha R. Thakar, Alexander S. Szalay, Jim Gray
Large-Scale Query and XMatch, Entering the Parallel Zone
Astronomical Data Analysis Software and Systems XV in San Lorenzo de El Escorial, Madrid, Spain, October 2005, to appear in the ASP Conference Series
null
null
MSR-TR-2005- 169
cs.DB cs.CE
null
Current and future astronomical surveys are producing catalogs with millions and billions of objects. On-line access to such big datasets for data mining and cross-correlation is usually as highly desired as unfeasible. Providing these capabilities is becoming critical for the Virtual Observatory framework. In this paper we present various performance tests that show how using Relational Database Management Systems (RDBMS) and a Zoning algorithm to partition and parallelize the computation, we can facilitate large-scale query and cross-match.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:33:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Nieto-Santisteban", "Maria A.", "" ], [ "Thakar", "Aniruddha R.", "" ], [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701168
Jim Gray
Russell Sears, Catharine Van Ingen, Jim Gray
To BLOB or Not To BLOB: Large Object Storage in a Database or a Filesystem?
null
CIDR 2007
null
MSR-TR-2006-45
cs.DB
null
Application designers often face the question of whether to store large objects in a filesystem or in a database. Often this decision is made for application design simplicity. Sometimes, performance measurements are also used. This paper looks at the question of fragmentation - one of the operational issues that can affect the performance and/or manageability of the system as deployed long term. As expected from the common wisdom, objects smaller than 256KB are best stored in a database while objects larger than 1M are best stored in the filesystem. Between 256KB and 1MB, the read:write ratio and rate of object overwrite or replacement are important factors. We used the notion of "storage age" or number of object overwrites as way of normalizing wall clock time. Storage age allows our results or similar such results to be applied across a number of read:write ratios and object replacement rates.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:54:04 GMT" } ]
2011-02-19T00:00:00
[ [ "Sears", "Russell", "" ], [ "Van Ingen", "Catharine", "" ], [ "Gray", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0701169
Michael Botros Shenouda
Michael Botros Shenouda and T. N. Davidson
A Framework for Designing MIMO systems with Decision Feedback Equalization or Tomlinson-Harashima Precoding
To appear in ICASSP 2007
null
null
null
cs.IT math.IT
null
We consider joint transceiver design for general Multiple-Input Multiple-Output communication systems that implement interference (pre-)subtraction, such as those based on Decision Feedback Equalization (DFE) or Tomlinson-Harashima precoding (THP). We develop a unified framework for joint transceiver design by considering design criteria that are expressed as functions of the Mean Square Error (MSE) of the individual data streams. By deriving two inequalities that involve the logarithms of the individual MSEs, we obtain optimal designs for two classes of communication objectives, namely those that are Schur-convex and Schur-concave functions of these logarithms. For Schur-convex objectives, the optimal design results in data streams with equal MSEs. This design simultaneously minimizes the total MSE and maximizes the mutual information for the DFE-based model. For Schur-concave objectives, the optimal DFE design results in linear equalization and the optimal THP design results in linear precoding. The proposed framework embraces a wide range of design objectives and can be regarded as a counterpart of the existing framework of linear transceiver design.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 02:20:33 GMT" }, { "version": "v2", "created": "Sun, 28 Jan 2007 00:26:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Shenouda", "Michael Botros", "" ], [ "Davidson", "T. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701170
Jim Gray
Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E, Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay
Life Under Your Feet: An End-to-End Soil Ecology Sensor Network, Database, Web Server, and Analysis Service
null
null
null
MSR TR 2006 90
cs.DB cs.CE
null
Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents a soil monitoring system we developed and deployed at an urban forest in Baltimore as a first step towards realizing this vision. Motes in this network measure and save soil moisture and temperature in situ every minute. Raw measurements are periodically retrieved by a sensor gateway and stored in a central database where calibrated versions are derived and stored. The measurement database is published through Web Services interfaces. In addition, analysis tools let scientists analyze current and historical data and help manage the sensor network. The article describes the system design, what we learned from the deployment, and initial results obtained from the sensors. The system measures soil factors with unprecedented temporal precision. However, the deployment required device-level programming, sensor calibration across space and time, and cross-referencing measurements with external sources. The database, web server, and data analysis design required considerable innovation and expertise. So, the ratio of computer-scientists to ecologists was 3:1. Before sensor networks can fulfill their potential as instruments that can be easily deployed by scientists, these technical problems must be addressed so that the ratio is one nerd per ten ecologists.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:08:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Szlavecz", "Katalin", "" ], [ "Terzis", "Andreas", "" ], [ "Ozer", "Stuart", "" ], [ "Musaloiu-E", "Razvan", "" ], [ "Cogan", "Joshua", "" ], [ "Small", "Sam", "" ], [ "Burns", "Randal", "" ], [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701171
Jim Gray
Jim Gray, Maria A. Nieto-Santisteban, Alexander S. Szalay
The Zones Algorithm for Finding Points-Near-a-Point or Cross-Matching Spatial Datasets
null
null
null
MSR TR 2006 52
cs.DB cs.DS
null
Zones index an N-dimensional Euclidian or metric space to efficiently support points-near-a-point queries either within a dataset or between two datasets. The approach uses relational algebra and the B-Tree mechanism found in almost all relational database systems. Hence, the Zones Algorithm gives a portable-relational implementation of points-near-point, spatial cross-match, and self-match queries. This article corrects some mistakes in an earlier article we wrote on the Zones Algorithm and describes some algorithmic improvements. The Appendix includes an implementation of point-near-point, self-match, and cross-match using the USGS city and stream gauge database.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:11:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Nieto-Santisteban", "Maria A.", "" ], [ "Szalay", "Alexander S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0701172
Jim Gray
Jim Gray, Alex Szalay, Tamas Budavari, Robert Lupton, Maria Nieto-Santisteban, Ani Thakar
Cross-Matching Multiple Spatial Observations and Dealing with Missing Data
null
null
null
MSR TR 2006-175
cs.DB cs.CE
null
Cross-match spatially clusters and organizes several astronomical point-source measurements from one or more surveys. Ideally, each object would be found in each survey. Unfortunately, the observation conditions and the objects themselves change continually. Even some stationary objects are missing in some observations; sometimes objects have a variable light flux and sometimes the seeing is worse. In most cases we are faced with a substantial number of differences in object detections between surveys and between observations taken at different times within the same survey or instrument. Dealing with such missing observations is a difficult problem. The first step is to classify misses as ephemeral - when the object moved or simply disappeared, masked - when noise hid or corrupted the object observation, or edge - when the object was near the edge of the observational field. This classification and a spatial library to represent and manipulate observational footprints help construct a Match table recording both hits and misses. Transitive closure clusters friends-of-friends into object bundles. The bundle summary statistics are recorded in a Bundle table. This design is an evolution of the Sloan Digital Sky Survey cross-match design that compared overlapping observations taken at different times. Cross-Matching Multiple Spatial Observations and Dealing with Missing Data.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:18:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ], [ "Budavari", "Tamas", "" ], [ "Lupton", "Robert", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Thakar", "Ani", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701173
Jim Gray
Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick, Bill Boroski, Svetlana Lebedeva, Brian Yanny
SkyServer Traffic Report - The First Five Years
null
null
null
MSR TR-2006-190
cs.DB cs.CE
null
The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog Archive Server. From 2001 to 2006, there were a million visitors in 3 million sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62 million page views. The site currently averages 35 thousand visitors and 400 thousand sessions per month. The Web and SQL logs are public. We analyzed traffic and sessions by duration, usage pattern, data product, and client type (mortal or bot) over time. The analysis shows (1) the site's popularity, (2) the educational website that delivered nearly fifty thousand hours of interactive instruction, (3) the relative use of interactive, programmatic, and batch-local access, (4) the success of offering ad-hoc SQL, personal database, and batch job access to scientists as part of the data publication, (5) the continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7) a novel approach of using the corpus of correct SQL queries to suggest similar but correct statements when a user presents an incorrect SQL statement.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:22:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Singh", "Vik", "" ], [ "Gray", "Jim", "" ], [ "Thakar", "Ani", "" ], [ "Szalay", "Alexander S.", "" ], [ "Raddick", "Jordan", "" ], [ "Boroski", "Bill", "" ], [ "Lebedeva", "Svetlana", "" ], [ "Yanny", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0701174
Dimitris Kalles
T. Hadzilacos, D. Kalles, D. Koumanakos, V. Mitsionis
A Prototype for Educational Planning Using Course Constraints to Simulate Student Populations
Contains 9 pages, 3 figures, 1 table. Text updated as of February 27, 2009. Submitted to a journal
null
null
null
cs.AI cs.CY cs.DS cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distance learning universities usually afford their students the flexibility to advance their studies at their own pace. This can lead to a considerable fluctuation of student populations within a program's courses, possibly affecting the academic viability of a program as well as the related required resources. Providing a method that estimates this population could be of substantial help to university management and academic personnel. We describe how to use course precedence constraints to calculate alternative tuition paths and then use Markov models to estimate future populations. In doing so, we identify key issues of a large scale potential deployment.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 08:32:10 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2008 09:33:20 GMT" }, { "version": "v3", "created": "Wed, 11 Mar 2009 21:20:54 GMT" } ]
2009-03-12T00:00:00
[ [ "Hadzilacos", "T.", "" ], [ "Kalles", "D.", "" ], [ "Koumanakos", "D.", "" ], [ "Mitsionis", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0701175
Dimitris Kalles
Th. Hadzilacos, D. Kalles, M. Pouliopoulou
On the Software and Knowledge Engineering Aspects of the Educational Process
Contains 21 sparse pages, 8 figures. Accepted for publication in International Journal of Software Engineering and Knowledge Engineering (IJSEKE). Keywords: Tools for interactive learning and teaching, Modelling, Distance Learning
null
null
null
cs.SE cs.DL
null
The Hellenic Open University has embarked on a large-scale effort to enhance its textbook-based material with content that demonstrably supports the basic tenets of distance learning. The challenge is to set up a framework that allows for the production-level creation, distribution and consumption of content, and at the same time, evaluate the effort in terms of technological, educational and organizational knowledge gained. This paper presents a model of the educational process that is used as a development backbone and argues about its conceptual and technical practicality at large.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 14:51:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hadzilacos", "Th.", "" ], [ "Kalles", "D.", "" ], [ "Pouliopoulou", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0701176
Alain Frisch
Alain Frisch (INRIA Rocquencourt), Haruo Hosoya (CST)
Towards Practical Typechecking for Macro Tree Transducers
null
null
null
null
cs.PL
null
Macro tree transducers (mtt) are an important model that both covers many useful XML transformations and allows decidable exact typechecking. This paper reports our first step toward an implementation of mtt typechecker that has a practical efficiency. Our approach is to represent an input type obtained from a backward inference as an alternating tree automaton, in a style similar to Tozawa's XSLT0 typechecking. In this approach, typechecking reduces to checking emptiness of an alternating tree automaton. We propose several optimizations (Cartesian factorization, state partitioning) on the backward inference process in order to produce much smaller alternating tree automata than the naive algorithm, and we present our efficient algorithm for checking emptiness of alternating tree automata, where we exploit the explicit representation of alternation for local optimizations. Our preliminary experiments confirm that our algorithm has a practical performance that can typecheck simple transformations with respect to the full XHTML in a reasonable time.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 15:16:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Frisch", "Alain", "", "INRIA Rocquencourt" ], [ "Hosoya", "Haruo", "", "CST" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0701177
Roudra Chakraborty
Roudra Chakraborty, Debapriya Sengupta, Sagnik Sinha
Pitch Tracking of Acoustic Signals based on Average Squared Mean Difference Function
null
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a method of pitch tracking based on variance minimization of locally periodic subsamples of an acoustic signal is presented. Replicates along the length of the periodically sampled data of the signal vector are taken and locally averaged sample variances are minimized to estimate the fundamental frequency. Using this method, pitch tracking of any text independent voiced signal is possible for different speakers.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 20:07:43 GMT" }, { "version": "v2", "created": "Mon, 29 Jan 2007 14:38:43 GMT" }, { "version": "v3", "created": "Wed, 18 Jul 2007 17:44:02 GMT" }, { "version": "v4", "created": "Sun, 17 Aug 2008 19:17:05 GMT" } ]
2009-09-29T00:00:00
[ [ "Chakraborty", "Roudra", "" ], [ "Sengupta", "Debapriya", "" ], [ "Sinha", "Sagnik", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
cs/0701178
Erhan Ermis
Erhan B. Ermis, Venkatesh Saligrama
Distributed Detection in Sensor Networks with Limited Range Sensors
Submitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2009.2033300
null
cs.IT math.IT
null
We consider a multi-object detection problem over a sensor network (SNET) with limited range sensors. This problem complements the widely considered decentralized detection problem where all sensors observe the same object. While the necessity for global collaboration is clear in the decentralized detection problem, the benefits of collaboration with limited range sensors is unclear and has not been widely explored. In this paper we develop a distributed detection approach based on recent development of the false discovery rate (FDR). We first extend the FDR procedure and develop a transformation that exploits complete or partial knowledge of either the observed distributions at each sensor or the ensemble (mixture) distribution across all sensors. We then show that this transformation applies to multi-dimensional observations, thus extending FDR to multi-dimensional settings. We also extend FDR theory to cases where distributions under both null and positive hypotheses are uncertain. We then propose a robust distributed algorithm to perform detection. We further demonstrate scalability to large SNETs by showing that the upper bound on the communication complexity scales linearly with the number of sensors that are in the vicinity of objects and is independent of the total number of sensors. Finally, we deal with situations where the sensing model may be uncertain and establish robustness of our techniques to such uncertainties.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 20:54:32 GMT" }, { "version": "v2", "created": "Mon, 5 Feb 2007 21:10:14 GMT" }, { "version": "v3", "created": "Tue, 18 Mar 2008 13:09:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Ermis", "Erhan B.", "" ], [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701179
Franck Petit
Yoann Dieudonn\'e (LaRIA), Franck Petit (LaRIA)
Scatter of Weak Robots
null
null
null
null
cs.DC
null
In this paper, we first formalize the problem to be solved, i.e., the Scatter Problem (SP). We then show that SP cannot be deterministically solved. Next, we propose a randomized algorithm for this problem. The proposed solution is trivially self-stabilizing. We then show how to design a self-stabilizing version of any deterministic solution for the Pattern Formation and the Gathering problems.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 06:43:04 GMT" } ]
2016-08-14T00:00:00
[ [ "Dieudonné", "Yoann", "", "LaRIA" ], [ "Petit", "Franck", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0701180
Fionn Murtagh
F. Murtagh, J. Mothe and K. Englmeier
Ontology from Local Hierarchical Structure in Text
35 pp., 12 figures
null
null
null
cs.IR
null
We study the notion of hierarchy in the context of visualizing textual data and navigating text collections. A formal framework for ``hierarchy'' is given by an ultrametric topology. This provides us with a theoretical foundation for concept hierarchy creation. A major objective is {\em scalable} annotation or labeling of concept maps. Serendipitously we pursue other objectives such as deriving common word pair (and triplet) phrases, i.e., word 2- and 3-grams. We evaluate our approach using (i) a collection of texts, (ii) a single text subdivided into successive parts (for which we provide an interactive demonstrator), and (iii) a text subdivided at the sentence or line level. While detailing a generic framework, a distinguishing feature of our work is that we focus on {\em locality} of hierarchic structure in order to extract semantic information.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 18:31:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "F.", "" ], [ "Mothe", "J.", "" ], [ "Englmeier", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0701181
Fionn Murtagh
Fionn Murtagh
A Note on Local Ultrametricity in Text
18 pp
null
null
null
cs.CL
null
High dimensional, sparsely populated data spaces have been characterized in terms of ultrametric topology. This implies that there are natural, not necessarily unique, tree or hierarchy structures defined by the ultrametric topology. In this note we study the extent of local ultrametric topology in texts, with the aim of finding unique ``fingerprints'' for a text or corpus, discriminating between texts from different domains, and opening up the possibility of exploiting hierarchical structures in the data. We use coherent and meaningful collections of over 1000 texts, comprising over 1.3 million words.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 19:09:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0701182
Marat Burnashev V.
Marat Burnashev
Supplement to: Code Spectrum and Reliability Function: Binary Symmetric Channel
to appear in Problems of Information Transmission, 2007, v. 43, no. 1
null
null
null
cs.IT math.IT
null
A much simpler proof of Theorem 1 from M.Burnashev "Code spectrum and reliability function: Binary symmetric channel" is presented.
[ { "version": "v1", "created": "Sun, 28 Jan 2007 11:05:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Burnashev", "Marat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701183
Gilles Villard
Gilles Villard (LIP)
Certification of the QR factor R, and of lattice basis reducedness
null
null
null
Vil06-1
cs.SC cs.NA
null
Given a lattice basis of n vectors in Z^n, we propose an algorithm using 12n^3+O(n^2) floating point operations for checking whether the basis is LLL-reduced. If the basis is reduced then the algorithm will hopefully answer ''yes''. If the basis is not reduced, or if the precision used is not sufficient with respect to n, and to the numerical properties of the basis, the algorithm will answer ''failed''. Hence a positive answer is a rigorous certificate. For implementing the certificate itself, we propose a floating point algorithm for computing (certified) error bounds for the entries of the R factor of the QR matrix factorization. This algorithm takes into account all possible approximation and rounding errors. The cost 12n^3+O(n^2) of the certificate is only six times more than the cost of numerical algorithms for computing the QR factorization itself, and the certificate may be implemented using matrix library routines only. We report experiments that show that for a reduced basis of adequate dimension and quality the certificate succeeds, and establish the effectiveness of the certificate. This effectiveness is applied for certifying the output of fastest existing floating point heuristics of LLL reduction, without slowing down the whole process.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 09:15:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Villard", "Gilles", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0701184
Joerg Hoffmann
Joerg Hoffmann and Carla Gomes and Bart Selman
Structure and Problem Hardness: Goal Asymmetry and DPLL Proofs in<br> SAT-Based Planning
null
Logical Methods in Computer Science, Volume 3, Issue 1 (February 26, 2007) lmcs:2228
10.2168/LMCS-3(1:6)2007
null
cs.AI
null
In Verification and in (optimal) AI Planning, a successful method is to formulate the application as boolean satisfiability (SAT), and solve it with state-of-the-art DPLL-based procedures. There is a lack of understanding of why this works so well. Focussing on the Planning context, we identify a form of problem structure concerned with the symmetrical or asymmetrical nature of the cost of achieving the individual planning goals. We quantify this sort of structure with a simple numeric parameter called AsymRatio, ranging between 0 and 1. We run experiments in 10 benchmark domains from the International Planning Competitions since 2000; we show that AsymRatio is a good indicator of SAT solver performance in 8 of these domains. We then examine carefully crafted synthetic planning domains that allow control of the amount of structure, and that are clean enough for a rigorous analysis of the combinatorial search space. The domains are parameterized by size, and by the amount of structure. The CNFs we examine are unsatisfiable, encoding one planning step less than the length of the optimal plan. We prove upper and lower bounds on the size of the best possible DPLL refutations, under different settings of the amount of structure, as a function of size. We also identify the best possible sets of branching variables (backdoors). With minimum AsymRatio, we prove exponential lower bounds, and identify minimal backdoors of size linear in the number of variables. With maximum AsymRatio, we identify logarithmic DPLL refutations (and backdoors), showing a doubly exponential gap between the two structural extreme cases. The reasons for this behavior -- the proof arguments -- illuminate the prototypical patterns of structure causing the empirical behavior observed in the competition benchmarks.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 12:47:08 GMT" }, { "version": "v2", "created": "Mon, 26 Feb 2007 11:38:45 GMT" } ]
2017-01-11T00:00:00
[ [ "Hoffmann", "Joerg", "" ], [ "Gomes", "Carla", "" ], [ "Selman", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0701185
Frank Gurski
Frank Gurski
Graph Operations on Clique-Width Bounded Graphs
30 pages, to appear in "Theory of Computing Systems"
null
10.1007/s00224-016-9685-1
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clique-width is a well-known graph parameter. Many NP-hard graph problems admit polynomial-time solutions when restricted to graphs of bounded clique-width. The same holds for NLC-width. In this paper we study the behavior of clique-width and NLC-width under various graph operations and graph transformations. We give upper and lower bounds for the clique-width and NLC-width of the modified graphs in terms of the clique-width and NLC-width of the involved graphs.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 14:36:25 GMT" }, { "version": "v2", "created": "Fri, 14 Nov 2014 14:02:50 GMT" }, { "version": "v3", "created": "Sat, 4 Jun 2016 16:45:38 GMT" } ]
2016-06-07T00:00:00
[ [ "Gurski", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0701186
Marc Daumas
Marc Daumas (LIRMM, LP2A), Guillaume Melquiond (LIP, INRIA Rh\^one-Alpes)
Certification of bounds on expressions involving rounded operators
null
null
null
null
cs.MS
null
Gappa uses interval arithmetic to certify bounds on mathematical expressions that involve rounded as well as exact operators. Gappa generates a theorem with its proof for each bound treated. The proof can be checked with a higher order logic automatic proof checker, either Coq or HOL Light, and we have developed a large companion library of verified facts for Coq dealing with the addition, multiplication, division, and square root, in fixed- and floating-point arithmetics. Gappa uses multiple-precision dyadic fractions for the endpoints of intervals and performs forward error analysis on rounded operators when necessary. When asked, Gappa reports the best bounds it is able to reach for a given expression in a given context. This feature is used to quickly obtain coarse bounds. It can also be used to identify where the set of facts and automatic techniques implemented in Gappa becomes insufficient. Gappa handles seamlessly additional properties expressed as interval properties or rewriting rules in order to establish more intricate bounds. Recent work showed that Gappa is perfectly suited to the proof of correctness of small pieces of software. Proof obligations can be written by designers, produced by third-party tools or obtained by overloading arithmetic operators.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 15:36:47 GMT" }, { "version": "v2", "created": "Thu, 24 May 2007 11:57:26 GMT" } ]
2007-06-13T00:00:00
[ [ "Daumas", "Marc", "", "LIRMM, LP2A" ], [ "Melquiond", "Guillaume", "", "LIP, INRIA\n Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0701187
Christian Schallhart
Sagar Chaki, Christian Schallhart, Helmut Veith
Verification Across Intellectual Property Boundaries
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many industries, the importance of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of verification tools only by legal requirements. In turn, the supplier has no means to convince the customer about successful verification without revealing the source code. This paper presents an approach to resolve the conflict between the IP interests of the supplier and the quality interests of the customer. We introduce a protocol in which a dedicated server (called the "amanat") is controlled by both parties: the customer controls the verification task performed by the amanat, while the supplier controls the communication channels of the amanat to ensure that the amanat does not leak information about the source code. We argue that the protocol is both practically useful and mathematically sound. As the protocol is based on well-known (and relatively lightweight) cryptographic primitives, it allows a straightforward implementation on top of existing verification tool chains. To substantiate our security claims, we establish the correctness of the protocol by cryptographic reduction proofs.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 17:09:17 GMT" }, { "version": "v2", "created": "Wed, 30 Nov 2011 17:41:16 GMT" } ]
2011-12-01T00:00:00
[ [ "Chaki", "Sagar", "" ], [ "Schallhart", "Christian", "" ], [ "Veith", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0701188
Gilles Villard
Wayne Eberly (UCALGARY), Mark Giesbrecht (UWO), Pascal Giorgi (LP2A), Arne Storjohann (UWO), Gilles Villard (LIP)
Faster Inversion and Other Black Box Matrix Computations Using Efficient Block Projections
null
null
null
EGGSV07-1
cs.SC cs.NA
null
Block projections have been used, in [Eberly et al. 2006], to obtain an efficient algorithm to find solutions for sparse systems of linear equations. A bound of softO(n^(2.5)) machine operations is obtained assuming that the input matrix can be multiplied by a vector with constant-sized entries in softO(n) machine operations. Unfortunately, the correctness of this algorithm depends on the existence of efficient block projections, and this has been conjectured. In this paper we establish the correctness of the algorithm from [Eberly et al. 2006] by proving the existence of efficient block projections over sufficiently large fields. We demonstrate the usefulness of these projections by deriving improved bounds for the cost of several matrix problems, considering, in particular, ``sparse'' matrices that can be be multiplied by a vector using softO(n) field operations. We show how to compute the inverse of a sparse matrix over a field F using an expected number of softO(n^(2.27)) operations in F. A basis for the null space of a sparse matrix, and a certification of its rank, are obtained at the same cost. An application to Kaltofen and Villard's Baby-Steps/Giant-Steps algorithms for the determinant and Smith Form of an integer matrix yields algorithms requiring softO(n^(2.66)) machine operations. The derived algorithms are all probabilistic of the Las Vegas type.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 18:20:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Eberly", "Wayne", "", "UCALGARY" ], [ "Giesbrecht", "Mark", "", "UWO" ], [ "Giorgi", "Pascal", "", "LP2A" ], [ "Storjohann", "Arne", "", "UWO" ], [ "Villard", "Gilles", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0701189
Sebastien Tixeuil
Fredrik Manne, Morten Mjelde, Laurence Pilard, S\'ebastien Tixeuil (LRI)
A New Self-Stabilizing Maximal Matching Algorithm
null
null
null
null
cs.DS cs.DC
null
The maximal matching problem has received considerable attention in the self-stabilizing community. Previous work has given different self-stabilizing algorithms that solves the problem for both the adversarial and fair distributed daemon, the sequential adversarial daemon, as well as the synchronous daemon. In the following we present a single self-stabilizing algorithm for this problem that unites all of these algorithms in that it stabilizes in the same number of moves as the previous best algorithms for the sequential adversarial, the distributed fair, and the synchronous daemon. In addition, the algorithm improves the previous best moves complexities for the distributed adversarial daemon from O(n^2) and O(delta m) to O(m) where n is the number of processes, m is thenumber of edges, and delta is the maximum degree in the graph.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 14:52:37 GMT" } ]
2016-08-14T00:00:00
[ [ "Manne", "Fredrik", "", "LRI" ], [ "Mjelde", "Morten", "", "LRI" ], [ "Pilard", "Laurence", "", "LRI" ], [ "Tixeuil", "Sébastien", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0701190
Aaron Harwood
Thomas Jacobs and Aaron Harwood
A Peer-to-Peer Browsable File Index using a Popularity Based Global Namespace
null
null
null
null
cs.DC cs.NI
null
The distribution of files using decentralized, peer-to-peer (P2P) systems, has significant advantages over centralized approaches. It is however more difficult to settle on the best approach for file sharing. Most file sharing systems are based on query string searches, leading to a relatively simple but inefficient broadcast or to an efficient but relatively complicated index in a structured environment. In this paper we use a browsable peer-to-peer file index consisting of files which serve as directory nodes, interconnecting to form a directory network. We implemented the system based on BitTorrent and Kademlia. The directory network inherits all of the advantages of decentralization and provides browsable, efficient searching. To avoid conflict between users in the P2P system while also imposing no additional restrictions, we allow multiple versions of each directory node to simultaneously exist -- using popularity as the basis for default browsing behavior. Users can freely add files and directory nodes to the network. We show, using a simulation of user behavior and file quality, that the popularity based system consistently leads users to a high quality directory network; above the average quality of user updates. Q
[ { "version": "v1", "created": "Tue, 30 Jan 2007 04:00:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacobs", "Thomas", "" ], [ "Harwood", "Aaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0701191
David Monniaux
David Monniaux (LIENS)
The parallel implementation of the Astr\'{e}e static analyzer
null
APLAS: Programming languages and systems (2005) 86-96
10.1007/11575467_7
null
cs.PL cs.PF
null
The Astr\'{e}e static analyzer is a specialized tool that can prove the absence of runtime errors, including arithmetic overflows, in large critical programs. Keeping analysis times reasonable for industrial use is one of the design objectives. In this paper, we discuss the parallel implementation of the analysis.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 15:20:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Monniaux", "David", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0701192
David Monniaux
David Monniaux (LIENS, Verimag - Imag)
The pitfalls of verifying floating-point computations
null
ACM Transactions on Programming Languages and Systems 30, 3 (2008) 12
10.1145/1353445.1353446
null
cs.PL cs.NA
null
Current critical systems commonly use a lot of floating-point computations, and thus the testing or static analysis of programs containing floating-point operators has become a priority. However, correctly defining the semantics of common implementations of floating-point is tricky, because semantics may change with many factors beyond source-code level, such as choices made by compilers. We here give concrete examples of problems that can appear and solutions to implement in analysis software.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 16:26:50 GMT" }, { "version": "v2", "created": "Fri, 20 Apr 2007 09:12:02 GMT" }, { "version": "v3", "created": "Sat, 30 Jun 2007 05:50:12 GMT" }, { "version": "v4", "created": "Thu, 25 Oct 2007 09:47:55 GMT" }, { "version": "v5", "created": "Thu, 22 May 2008 09:35:12 GMT" } ]
2008-05-22T00:00:00
[ [ "Monniaux", "David", "", "LIENS, Verimag - Imag" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0701193
David Monniaux
Bruno Blanchet (LIENS), Patrick Cousot (LIENS), Radhia Cousot (STIX), Jer\^ome Feret (LIENS), Laurent Mauborgne (LIENS), Antoine Min\'e (LIENS), David Monniaux (LIENS), Xavier Rival (LIENS)
A Static Analyzer for Large Safety-Critical Software
null
PLDI: Conference on Programming Language Design and Implementation (2003) 196 - 207
10.1145/781131.781153
null
cs.PL cs.PF
null
We show that abstract interpretation-based static program analysis can be made efficient and precise enough to formally verify a class of properties for a family of large programs with few or no false alarms. This is achieved by refinement of a general purpose static analyzer and later adaptation to particular programs of the family by the end-user through parametrization. This is applied to the proof of soundness of data manipulation operations at the machine level for periodic synchronous safety critical embedded software. The main novelties are the design principle of static analyzers by refinement and adaptation through parametrization, the symbolic manipulation of expressions to improve the precision of abstract transfer functions, the octagon, ellipsoid, and decision tree abstract domains, all with sound handling of rounding errors in floating point computations, widening strategies (with thresholds, delayed) and the automatic determination of the parameters (parametrized packing).
[ { "version": "v1", "created": "Tue, 30 Jan 2007 16:57:14 GMT" } ]
2016-08-14T00:00:00
[ [ "Blanchet", "Bruno", "", "LIENS" ], [ "Cousot", "Patrick", "", "LIENS" ], [ "Cousot", "Radhia", "", "STIX" ], [ "Feret", "Jerôme", "", "LIENS" ], [ "Mauborgne", "Laurent", "", "LIENS" ], [ "Miné", "Antoine", "", "LIENS" ], [ "Monniaux", "David", "", "LIENS" ], [ "Rival", "Xavier", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0701194
Andrij Rovenchak
Solomija Buk and Andrij Rovenchak
Menzerath-Altmann Law for Syntactic Structures in Ukrainian
8 pages; submitted to the Proceedings of the International scientific conference on Modern Methods in Linguistics held in honour of the anniversary of Prof. Gabriel L. Altmann (October 23rd and 24th, 2006, Budmerice Castle, Slovakia)
Glottotheory. Vol. 1, No. 1, pp 10-17 (2008)
10.1515/glot-2008-0002
null
cs.CL
null
In the paper, the definition of clause suitable for an automated processing of a Ukrainian text is proposed. The Menzerath-Altmann law is verified on the sentence level and the parameters for the dependences of the clause length counted in words and syllables on the sentence length counted in clauses are calculated for "Perekhresni Stezhky" ("The Cross-Paths"), a novel by Ivan Franko.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 16:58:07 GMT" } ]
2024-01-04T00:00:00
[ [ "Buk", "Solomija", "" ], [ "Rovenchak", "Andrij", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0701195
David Monniaux
David Monniaux (LIENS)
An Abstract Monte-Carlo Method for the Analysis of Probabilistic Programs
null
POPL: Annual Symposium on Principles of Programming Languages (2001) 93 - 101
10.1145/360204.360211
null
cs.PL cs.PF
null
We introduce a new method, combination of random testing and abstract interpretation, for the analysis of programs featuring both probabilistic and non-probabilistic nondeterminism. After introducing "ordinary" testing, we show how to combine testing and abstract interpretation and give formulas linking the precision of the results to the number of iterations. We then discuss complexity and optimization issues and end with some experimental results.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 17:14:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Monniaux", "David", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0701196
Ye Wang
Ye Wang, Prakash Ishwar and Venkatesh Saligrama
One-bit Distributed Sensing and Coding for Field Estimation in Sensor Networks
Fixed typos, otherwise same as V2. 27 pages (in one column review format), 4 figures. Submitted to IEEE Transactions on Signal Processing. Current version is updated for journal submission: revised author list, modified formulation and framework. Previous version appeared in Proceedings of Allerton Conference On Communication, Control, and Computing 2006
null
10.1109/TSP.2008.926192
null
cs.IT math.IT
null
This paper formulates and studies a general distributed field reconstruction problem using a dense network of noisy one-bit randomized scalar quantizers in the presence of additive observation noise of unknown distribution. A constructive quantization, coding, and field reconstruction scheme is developed and an upper-bound to the associated mean squared error (MSE) at any point and any snapshot is derived in terms of the local spatio-temporal smoothness properties of the underlying field. It is shown that when the noise, sensor placement pattern, and the sensor schedule satisfy certain weak technical requirements, it is possible to drive the MSE to zero with increasing sensor density at points of field continuity while ensuring that the per-sensor bitrate and sensing-related network overhead rate simultaneously go to zero. The proposed scheme achieves the order-optimal MSE versus sensor density scaling behavior for the class of spatially constant spatio-temporal fields.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 22:05:19 GMT" }, { "version": "v2", "created": "Tue, 17 Jul 2007 19:43:04 GMT" }, { "version": "v3", "created": "Thu, 26 Jul 2007 21:13:42 GMT" } ]
2009-11-13T00:00:00
[ [ "Wang", "Ye", "" ], [ "Ishwar", "Prakash", "" ], [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701197
Nan Ma
Nan Ma, Ye Wang, and Prakash Ishwar
On Delayed Sequential Coding of Correlated Sources
35 pages, 7 figures. This work has been submitted to the IEEE for possible publication. Parts of this work were presented at 2007 Information Theory and Applications Workshop (ITA'07) and 2007 IEEE International Symposium on Information Theory (ISIT'07)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by video coding applications, the problem of sequential coding of correlated sources with encoding and/or decoding frame-delays is studied. The fundamental tradeoffs between individual frame rates, individual frame distortions, and encoding/decoding frame-delays are derived in terms of a single-letter information-theoretic characterization of the rate-distortion region for general inter-frame source correlations and certain types of potentially frame specific and coupled single-letter fidelity criteria. The sum-rate-distortion region is characterized in terms of generalized directed information measures highlighting their role in delayed sequential source coding problems. For video sources which are spatially stationary memoryless and temporally Gauss-Markov, MSE frame distortions, and a sum-rate constraint, our results expose the optimality of idealized differential predictive coding among all causal sequential coders, when the encoder uses a positive rate to describe each frame. Somewhat surprisingly, causal sequential encoding with one-frame-delayed noncausal sequential decoding can exactly match the sum-rate-MSE performance of joint coding for all nontrivial MSE-tuples satisfying certain positive semi-definiteness conditions. Thus, even a single frame-delay holds potential for yielding significant performance improvements. Generalizations to higher order Markov sources are also presented and discussed. A rate-distortion performance equivalence between, causal sequential encoding with delayed noncausal sequential decoding, and, delayed noncausal sequential encoding with causal sequential decoding, is also established.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 22:30:59 GMT" }, { "version": "v2", "created": "Tue, 30 Sep 2008 19:53:26 GMT" } ]
2008-09-30T00:00:00
[ [ "Ma", "Nan", "" ], [ "Wang", "Ye", "" ], [ "Ishwar", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0701198
Raissa M. D'Souza
R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger and R. D. Kleinberg
Fitting the WHOIS Internet data
Supplemental information for "Emergence of Tempered Preferential Attachment From Optimization", to appear (open access) PNAS USA, 2007
null
null
null
cs.NI
null
We consider the RIPE WHOIS Internet data as characterized by the Cooperative Association for Internet Data Analysis (CAIDA), and show that the Tempered Preferential Attachment model [1] provides an excellent fit to this data. [1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 02:51:45 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Souza", "R. M.", "" ], [ "Borgs", "C.", "" ], [ "Chayes", "J. T.", "" ], [ "Berger", "N.", "" ], [ "Kleinberg", "R. D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0701199
Stephane Norte
Stephane Norte and Fernando G. Lobo
A Virtual Logo Keyboard for People with Motor Disabilities
11 pages, 6 figures
null
null
200701
cs.HC
null
In our society, people with motor impairments are oftentimes socially excluded from their environment. This is unfortunate because every human being should have the possibility to obtain the necessary conditions to live a normal life. Although there is technology to assist people with motor impairments, few systems are targeted for programming environments. We have created a system, called Logo Keyboard, to assist people with motor disabilities to program with the Logo programming language. With this special keyboard we can help more people to get involved into computer programming and to develop projects in different areas.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 16:36:43 GMT" }, { "version": "v2", "created": "Thu, 24 May 2007 20:45:24 GMT" } ]
2007-06-13T00:00:00
[ [ "Norte", "Stephane", "" ], [ "Lobo", "Fernando G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0701200
Francoise Detienne
Fran\c{c}oise Detienne (INRIA)
Reasoning from a schema and from an analog in software code reuse
null
Dans Fourth Workshop on Empirical Studies of Programmers, ESP91 (1991) 5-22
null
null
cs.SE
null
The activity of design involves the decomposition of problems into subproblems and the development and evaluation of solutions. In many cases, solution development is not done from scratch. Designers often evoke and adapt solutions developed in the past. These solutions may come from an internal source, i.e. the memory of the designers, and/or from an external source. The goal of this paper is to analyse the characteristics of the cognitive mechanisms, the knowledge and the representations involved in the code reuse activity performed by experienced programmers. More generally, the focus is the control structure of the reuse activity. Data collected in an experiment in which programmers had to design programs are analyzed. Two code reuse situations are distinguished depending on whether or not the processes involved in reuse start before the elaboration of what acts as a source-solution. Our analysis highlights the use of reasoning from a schema and from an analog in the code reuse activity.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 16:41:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Detienne", "Françoise", "", "INRIA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0702001
Francoise Detienne
Pierre Robillard, Patrick D'Astous, Fran\c{c}oise D\'etienne (INRIA), Willemien Visser (INRIA)
Measuring Cognitive Activities in Software Engineering
null
Dans ICSE98, 20th International Conference on Software Engineering (1998)
null
null
cs.HC
null
This paper presents an approach to the study of cognitive activities in collaborative software development. This approach has been developed by a multidisciplinary team made up of software engineers and cognitive psychologists. The basis of this approach is to improve our understanding of software development by observing professionals at work. The goal is to derive lines of conduct or good practices based on observations and analyses of the processes that are naturally used by software engineers. The strategy involved is derived from a standard approach in cognitive science. It is based on the videotaping of the activities of software engineers, transcription of the videos, coding of the transcription, defining categories from the coded episodes and defining cognitive behaviors or dialogs from the categories. This project presents two original contributions that make this approach generic in software engineering. The first contribution is the introduction of a formal hierarchical coding scheme, which will enable comparison of various types of observations. The second is the merging of psychological and statistical analysis approaches to build a cognitive model. The details of this new approach are illustrated with the initial data obtained from the analysis of technical review meetings.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 09:01:55 GMT" } ]
2016-08-14T00:00:00
[ [ "Robillard", "Pierre", "", "INRIA" ], [ "D'Astous", "Patrick", "", "INRIA" ], [ "Détienne", "Françoise", "", "INRIA" ], [ "Visser", "Willemien", "", "INRIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0702002
Francoise Detienne
Jean-Marie Burkhardt (INRIA, LEI), Fran\c{c}oise D\'etienne (INRIA), Susan Wiedenbeck
The Effect of Object-Oriented Programming Expertise in Several Dimensions of Comprehension Strategies
null
Dans IWPC'98, Sixth International Workshop on Program Comprehension (1998)
null
null
cs.HC
null
This study analyzes object-oriented (OO) program comprehension by experts and novices. We examine the effect of expertise in three dimensions of comprehension strategies: the scope of the comprehension, the top-down versus bottom-up direction of the processes, and the guidance of the comprehension activity. Overall, subjects were similar in the scope of their comprehension, although the experts tended to consult more files. We found strong evidence of top-down, inference-driven behaviors, as well as multiple guidance in expert comprehension. We also found evidence of execution-based guidance and less use of top-down processes in novice comprehension. Guidance by inheritance and composition relationships in the OO program was not dominant, but nevertheless played a substantial role in expert program comprehension. However, these static relationships more closely tied to the OO nature of the program were exploited poorly by novices. To conclude, these results are discussed with respect to the literature on procedural program comprehension.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 09:02:17 GMT" } ]
2016-08-14T00:00:00
[ [ "Burkhardt", "Jean-Marie", "", "INRIA, LEI" ], [ "Détienne", "Françoise", "", "INRIA" ], [ "Wiedenbeck", "Susan", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0702003
Francoise Detienne
Fran\c{c}oise D\'etienne (INRIA)
Expert Programming Knowledge: a Schema-Based Approach
null
Psychology of ProgrammingAcademic Press (Ed.) (1990) 205-222
null
null
cs.HC
null
The topic of this chapter is the role of expert programming knowledge in the understanding activity. In the "schema-based approach", the role of semantic structures is emphasized whereas, in the "control-flow approach", the role of syntactic structures is emphasized. Data which support schema-based models of understanding are presented. Data which are more consistent with the "control-flow approach" allow to discuss the limits of the former kind of models.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 09:02:38 GMT" } ]
2016-08-14T00:00:00
[ [ "Détienne", "Françoise", "", "INRIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0702004
Francoise Detienne
Fran\c{c}oise D\'etienne (INRIA)
What model(s) for program understanding?
null
Dans UCIS'96, Conference on Using Complex Information Systems (1996)
null
null
cs.HC
null
The first objective of this paper is to present and discuss various types of models of program understanding. They are discussed in relation to models of text understanding. The second objective of this paper is to assess the effect of purpose for reading, or more specifically programming task, on the cognitive processes involved and representations constructed in program understanding. This is done in the theoretical framework of van Dijk and Kintsch's model of text understanding (1983).
[ { "version": "v1", "created": "Thu, 1 Feb 2007 09:03:19 GMT" } ]
2016-08-14T00:00:00
[ [ "Détienne", "Françoise", "", "INRIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0702005
Francoise Detienne
Jean-Marie Burkhardt (INRIA, LEI), Fran\c{c}oise D\'etienne (INRIA)
An empirical study of software reuse by experts in object-oriented design
null
Dans INTERACT'95 (1995)
null
null
cs.HC
null
This paper presents an empirical study of the software reuse activity by expert designers in the context of object-oriented design. Our study focuses on the three following aspects of reuse : (1) the interaction between some design processes, e.g. constructing a problem representation, searching for and evaluating solutions, and reuse processes, i.e. retrieving and using previous solutions, (2) the mental processes involved in reuse, e.g. example-based retrieval or bottom-up versus top-down expanding of the solution, and (3) the mental representations constructed throughout the reuse activity, e.g. dynamic versus static representations. Some implications of these results for the specification of software reuse support environments are discussed.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 09:03:59 GMT" } ]
2016-08-14T00:00:00
[ [ "Burkhardt", "Jean-Marie", "", "INRIA, LEI" ], [ "Détienne", "Françoise", "", "INRIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0702006
Francoise Detienne
G\'eraldine Martin, Fran\c{c}oise D\'etienne (INRIA), Elisabeth Lavigne
Negotiation in collaborative assessment of design solutions: an empirical study on a Concurrent Engineering process
null
Dans CE'2000, International Conference on Concurrent Engineering (2000)
null
null
cs.HC
null
In Concurrent engineering, design solutions are not only produced by individuals specialized in a given field. Due to the team nature of the design activity, solutions are negotiated. Our objective is to analyse the argumentation processes leading to these negotiated solutions. These processes take place in the meetings which group together specialists with a co-design aim. We conducted cognitive ergonomics research work during the definition phase of an aeronautical design project in which the participants work in Concurrent Engineering. We recorded, retranscribed and analysed 7 multi-speciality meetings. These meetings were organised, as needed, to assess the integration of the solutions of each speciality into a global solution. We found that there are three main design proposal assessment modes which can be combined in these meetings: (a) analytical assessment mode, (b) comparative assessment mode (c) analogical assessment mode. Within these assessment modes, different types of arguments are used. Furthermore we found a typical temporal negotiation process.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 09:05:13 GMT" } ]
2016-08-14T00:00:00
[ [ "Martin", "Géraldine", "", "INRIA" ], [ "Détienne", "Françoise", "", "INRIA" ], [ "Lavigne", "Elisabeth", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0702007
Prasanna Chaporkar
Prasanna Chaporkar, Kimmo Kansanen, Ralf R. M\"uller
Power Optimal Scheduling for Guaranteed Throughput in Multi-access Fading Channels
null
null
null
null
cs.IT math.IT
null
A power optimal scheduling algorithm that guarantees desired throughput and bounded delay to each user is developed for fading multi-access multi-band systems. The optimization is over the joint space of all rate allocation and coding strategies. The proposed scheduling assigns rates on each band based only on the current system state, and subsequently uses optimal multi-user signaling to achieve these rates. The scheduling is computationally simple, and hence scalable. Due to uplink-downlink duality, all the results extend in straightforward fashion to the broadcast channels.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 12:02:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Chaporkar", "Prasanna", "" ], [ "Kansanen", "Kimmo", "" ], [ "Müller", "Ralf R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702008
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
MMSE Optimal Algebraic Space-Time Codes
5 pages, 1 figure, journal version to appear in IEEE Transactions on Wireless Communications. Conference version appeared in NCC 2007, IIT Kanpur, India
null
10.1109/TWC.2008.070172
null
cs.IT math.IT
null
Design of Space-Time Block Codes (STBCs) for Maximum Likelihood (ML) reception has been predominantly the main focus of researchers. However, the ML decoding complexity of STBCs becomes prohibitive large as the number of transmit and receive antennas increase. Hence it is natural to resort to a suboptimal reception technique like linear Minimum Mean Squared Error (MMSE) receiver. Barbarossa et al and Liu et al have independently derived necessary and sufficient conditions for a full rate linear STBC to be MMSE optimal, i.e achieve least Symbol Error Rate (SER). Motivated by this problem, certain existing high rate STBC constructions from crossed product algebras are identified to be MMSE optimal. Also, it is shown that a certain class of codes from cyclic division algebras which are special cases of crossed product algebras are MMSE optimal. Hence, these STBCs achieve least SER when MMSE reception is employed and are fully diverse when ML reception is employed.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 13:43:24 GMT" }, { "version": "v2", "created": "Sat, 14 Jul 2007 14:16:44 GMT" } ]
2016-11-15T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702009
Ramji Venkataramanan
Ramji Venkataramanan, S. Sandeep Pradhan
On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback
5 pages, Submitted to ISIT 2007. Corrected typos, latest version that appeared in ISIT 2007
null
null
null
cs.IT math.IT
null
We study the problem of computing the rate-distortion function for sources with feed-forward and the capacity for channels with feedback. The formulas (involving directed information) for the optimal rate-distortion function with feed-forward and channel capacity with feedback are multi-letter expressions and cannot be computed easily in general. In this work, we derive conditions under which these can be computed for a large class of sources/channels with memory and distortion/cost measures. Illustrative examples are also provided.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 14:31:51 GMT" }, { "version": "v2", "created": "Wed, 18 Jul 2007 11:18:40 GMT" } ]
2007-07-18T00:00:00
[ [ "Venkataramanan", "Ramji", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702010
Jacques Carette
Jacques Carette
A canonical form for some piecewise defined functions
submitted to ISSAC 2007
null
null
null
cs.SC cs.MS
null
We define a canonical form for piecewise defined functions. We show that this has a wider range of application as well as better complexity properties than previous work.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 17:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Carette", "Jacques", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0702011
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
Dealing With Logical Omniscience: Expressiveness and Pragmatics
24 pages. Submitted for publication
null
null
null
cs.LO cs.AI
null
We examine four approaches for dealing with the logical omniscience problem and their potential applicability: the syntactic approach, awareness, algorithmic knowledge, and impossible possible worlds. Although in some settings these approaches are equi-expressive and can capture all epistemic states, in other settings of interest (especially with probability in the picture), we show that they are not equi-expressive. We then consider the pragmatics of dealing with logical omniscience-- how to choose an approach and construct an appropriate model.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 20:06:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702012
Daria Sorokina
Daria Sorokina, Johannes Gehrke, Simeon Warner, Paul Ginsparg
Plagiarism Detection in arXiv
Sixth International Conference on Data Mining (ICDM'06), Dec 2006
null
10.1109/ICDM.2006.126
null
cs.DB cs.DL cs.IR
null
We describe a large-scale application of methods for finding plagiarism in research document collections. The methods are applied to a collection of 284,834 documents collected by arXiv.org over a 14 year period, covering a few different research disciplines. The methodology efficiently detects a variety of problematic author behaviors, and heuristics are developed to reduce the number of false positives. The methods are also efficient enough to implement as a real-time submission screen for a collection many times larger.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 20:52:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Sorokina", "Daria", "" ], [ "Gehrke", "Johannes", "" ], [ "Warner", "Simeon", "" ], [ "Ginsparg", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702013
Leonid Gurvits
Leonid Gurvits
A polynomial time algorithm to approximate the mixed volume within a simply exponential factor
a journal version, accepted to Discrete and Computational Geometry
null
null
null
cs.CG cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let ${\bf K} = (K_1, ..., K_n)$ be an $n$-tuple of convex compact subsets in the Euclidean space $\R^n$, and let $V(\cdot)$ be the Euclidean volume in $\R^n$. The Minkowski polynomial $V_{{\bf K}}$ is defined as $V_{{\bf K}}(\lambda_1, ... ,\lambda_n) = V(\lambda_1 K_1 +, ..., + \lambda_n K_n)$ and the mixed volume $V(K_1, ..., K_n)$ as $$ V(K_1, ..., K_n) = \frac{\partial^n}{\partial \lambda_1...\partial \lambda_n} V_{{\bf K}}(\lambda_1 K_1 +, ..., + \lambda_n K_n). $$ Our main result is a poly-time algorithm which approximates $V(K_1, ..., K_n)$ with multiplicative error $e^n$ and with better rates if the affine dimensions of most of the sets $K_i$ are small. Our approach is based on a particular approximation of $\log(V(K_1, ..., K_n))$ by a solution of some convex minimization problem. We prove the mixed volume analogues of the Van der Waerden and Schrijver-Valiant conjectures on the permanent. These results, interesting on their own, allow us to justify the abovementioned approximation by a convex minimization, which is solved using the ellipsoid method and a randomized poly-time time algorithm for the approximation of the volume of a convex set.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 01:09:36 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2007 01:13:42 GMT" }, { "version": "v3", "created": "Fri, 12 Oct 2007 02:07:20 GMT" }, { "version": "v4", "created": "Fri, 16 Jan 2009 23:10:13 GMT" } ]
2009-01-19T00:00:00
[ [ "Gurvits", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
cs/0702014
Alexandros Dimakis
Constantinos Daskalakis, Alexandros G. Dimakis, Richard M. Karp, Martin J. Wainwright
Probabilistic Analysis of Linear Programming Decoding
To appear, IEEE Transactions on Information Theory, (replaces shorter version that appeared in SODA'07)
null
10.1109/TIT.2008.926452
null
cs.IT cs.DM math.IT
null
We initiate the probabilistic analysis of linear programming (LP) decoding of low-density parity-check (LDPC) codes. Specifically, we show that for a random LDPC code ensemble, the linear programming decoder of Feldman et al. succeeds in correcting a constant fraction of errors with high probability. The fraction of correctable errors guaranteed by our analysis surpasses previous non-asymptotic results for LDPC codes, and in particular exceeds the best previous finite-length result on LP decoding by a factor greater than ten. This improvement stems in part from our analysis of probabilistic bit-flipping channels, as opposed to adversarial channels. At the core of our analysis is a novel combinatorial characterization of LP decoding success, based on the notion of a generalized matching. An interesting by-product of our analysis is to establish the existence of ``probabilistic expansion'' in random bipartite graphs, in which one requires only that almost every (as opposed to every) set of a certain size expands, for sets much larger than in the classical worst-case setting.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 06:30:48 GMT" }, { "version": "v2", "created": "Mon, 10 Mar 2008 04:13:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Karp", "Richard M.", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702015
Alexandros Dimakis
Alexandros G. Dimakis, P. Brighten Godfrey, Martin J. Wainwright, Kannan Ramchandran
Network Coding for Distributed Storage Systems
To appear in INFOCOM 2007
null
null
null
cs.IT cs.NI math.IT
null
Peer-to-peer distributed storage systems provide reliable access to data through redundancy spread over nodes across the Internet. A key goal is to minimize the amount of bandwidth used to maintain that redundancy. Storing a file using an erasure code, in fragments spread across nodes, promises to require less redundancy and hence less maintenance bandwidth than simple replication to provide the same level of reliability. However, since fragments must be periodically replaced as nodes fail, a key question is how to generate a new fragment in a distributed way while transferring as little data as possible across the network. In this paper, we introduce a general technique to analyze storage architectures that combine any form of coding and replication, as well as presenting two new schemes for maintaining redundancy using erasure codes. First, we show how to optimally generate MDS fragments directly from existing fragments in the system. Second, we introduce a new scheme called Regenerating Codes which use slightly larger fragments than MDS but have lower overall bandwidth use. We also show through simulation that in realistic environments, Regenerating Codes can reduce maintenance bandwidth use by 25 percent or more compared with the best previous design--a hybrid of replication and erasure codes--while simplifying system architecture.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 06:55:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Godfrey", "P. Brighten", "" ], [ "Wainwright", "Martin J.", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702016
Bruno Courcelle
Bruno Courcelle (LaBRI)
A multivariate interlace polynomial
Draft version ; will be expanded before submission to a journal
Electronic Journal of Combinatories 15, 1 (2008) R69
null
null
cs.LO cs.DM
null
We define a multivariate polynomial that generalizes several interlace polynomials defined by Arratia, Bollobas and Sorkin on the one hand, and Aigner and van der Holst on the other. We follow the route traced by Sokal, who defined a multivariate generalization of Tutte's polynomial. We also show that bounded portions of our interlace polynomial can be evaluated in polynomial time for graphs of bounded clique-width. Its full evaluation is necessarly exponential just because of the size of the result.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 12:38:50 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 11:48:49 GMT" } ]
2008-05-29T00:00:00
[ [ "Courcelle", "Bruno", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702017
Tor Aulin
Tor M. Aulin
Comment on Improved Analysis of List Decoding and Its Application to Convolutional Codes and Turbo Codes
3 pages
null
null
null
cs.IT math.IT
null
In a recent paper [1] an improved analysis concerning the analysis of List Decoding was presented. The event that the correct codeword is excluded from the list is central. For the additive white Gaussian noise (AWGN) channel an important quantity is the in [1] called effective Euclidean distance. This was earlier considered in [2] under the name Vector Euclidean Distance, where also a simple mathematical expression for this quantity was easily derived for any list size. In [1], a geometrical analysis gives this when the list size is 1, 2 or 3.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 16:33:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Aulin", "Tor M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702018
Ioannis Kontoyiannis
M. T. Harrison and I. Kontoyiannis
Estimation of the Rate-Distortion Function
18 pages, no figures [v2: removed an example with an error; corrected typos; a shortened version will appear in IEEE Trans. Inform. Theory]
IEEE Transactions on Information Theory, 54 (2008): 3757-3762
10.1109/TIT.2008.926387
null
cs.IT math.IT math.ST stat.TH
null
Motivated by questions in lossy data compression and by theoretical considerations, we examine the problem of estimating the rate-distortion function of an unknown (not necessarily discrete-valued) source from empirical data. Our focus is the behavior of the so-called "plug-in" estimator, which is simply the rate-distortion function of the empirical distribution of the observed data. Sufficient conditions are given for its consistency, and examples are provided to demonstrate that in certain cases it fails to converge to the true rate-distortion function. The analysis of its performance is complicated by the fact that the rate-distortion function is not continuous in the source distribution; the underlying mathematical problem is closely related to the classical problem of establishing the consistency of maximum likelihood estimators. General consistency results are given for the plug-in estimator applied to a broad class of sources, including all stationary and ergodic ones. A more general class of estimation problems is also considered, arising in the context of lossy data compression when the allowed class of coding distributions is restricted; analogous results are developed for the plug-in estimator in that case. Finally, consistency theorems are formulated for modified (e.g., penalized) versions of the plug-in, and for estimating the optimal reproduction distribution.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 18:23:45 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2008 20:16:53 GMT" } ]
2013-01-18T00:00:00
[ [ "Harrison", "M. T.", "" ], [ "Kontoyiannis", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0702019
Maxime Gariel
Maxime Gariel, John-Paul Clarke and Eric Feron
A Dynamic I/O Model for TRACON Traffic Management
16 pages, 19 figures eps
null
null
null
cs.OH
null
This work investigates the TRACON flow management around a major airport. Aircraft flows are analyzed through a study of TRACON trajectories records. Rerouting and queuing processes are highlighted and airport characteristics are shown as function of the number of planes in the TRACON. Then, a simple input-output TRACON queuing and landing model is proposed. This model is calibrated and validated using available TRACON data. It reproduces the same phenomenon as the real system. This model is used to show the impact of limiting the number of aircrafts in the TRACON. A limited number of aircraft does not increase delays but reduces the controller's workload and increases safety.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 22:55:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Gariel", "Maxime", "" ], [ "Clarke", "John-Paul", "" ], [ "Feron", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0702020
Qinqin Yang
Qinqin Yang and Zhongping Qin
Construction of Minimal Tail-Biting Trellises for Codes over Finite Abelian Groups
11 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A definition of atomic codeword for a group code is presented. Some properties of atomic codewords of group codes are investigated. Using these properties, it is shown that every minimal tail-biting trellis for a group code over a finite abelian group can be constructed from its characteristic generators, which extends the work of Koetter and Vardy who treated the case of a linear code over a field. We also present an efficient algorithm for constructing the minimal tail-biting trellis of a group code over a finite abelian group, given a generator matrix.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 16:41:12 GMT" }, { "version": "v2", "created": "Tue, 6 Feb 2007 03:43:53 GMT" }, { "version": "v3", "created": "Thu, 17 May 2007 06:24:07 GMT" } ]
2007-07-13T00:00:00
[ [ "Yang", "Qinqin", "" ], [ "Qin", "Zhongping", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702021
Sherman Wang Dr.
Xing M. Wang
Probability Bracket Notation, Probability Vectors, Markov Chains and Stochastic Processes
36 pages; two tables
null
null
null
cs.OH math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dirac notation has been widely used for vectors in Hilbert spaces of Quantum Theories and now also in Information Retrieval. In this paper, we propose to use Probability Bracket Notation (PBN) for probability modeling. The new symbols are defined similarly (but not identically) as in Dirac notation. By using PBN to represent fundamental definitions and theorems for discrete and continuous random variables, we show that PBN could play a similar role in probability sample space as Dirac notation in Hilbert space. We also find a close relation between our system state P-kets and probability vectors in Markov chains. In the end, we apply PBN to some important stochastic processes, present the master equation of time-continuous Markov chains in both Schrodinger and Heisenberg pictures. We identify our system state P-bra with Doi's state function and Peliti's standard bra. We summarize the similarities and differences between PBN and Dirac Notation in the two tables of Appendix A.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 03:58:50 GMT" }, { "version": "v2", "created": "Sat, 17 Feb 2007 22:26:11 GMT" }, { "version": "v3", "created": "Sun, 11 Mar 2007 18:11:27 GMT" }, { "version": "v4", "created": "Fri, 27 Apr 2007 03:52:13 GMT" }, { "version": "v5", "created": "Tue, 17 Jul 2007 20:34:46 GMT" }, { "version": "v6", "created": "Mon, 29 Oct 2007 03:51:02 GMT" }, { "version": "v7", "created": "Sat, 14 Nov 2009 20:14:58 GMT" } ]
2009-11-14T00:00:00
[ [ "Wang", "Xing M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0702022
Changjia Chen
Chunxi Li and Changjia Chen
Gnutella: Topology Dynamics On Phase Space
11 pages, 14 figures
null
null
null
cs.NI
null
In this paper, the topology dynamic of Gnutella is studied through phase space. The dynamic changes in peer degree are studied as a time series in two dimensional phase space which is defined as the number of connected leaves and the number of connected ultras. The reported degrees are concentrated in three special Software related regions that we named as Ultra Stable Region, Leaf Stable Region and Transition Belt. A method is proposed to classify degree traces in phase space into different classes. Connection churn then is studied along with the churn in degree. It shows that the topological structure of Gnutella is rather stable in its connection degree but not the topology itself. The connection drop rate is estimated and the live time of connections is inferred afterwards. M/M/m/m loss queue system is introduced to model the degree keeping process in Gnutella. This model revealed that the degree stable is ensured by large new connection efforts. In other words the stable in topological structure of Gnutella is a results of essential unstable in its topology. That opens a challenge to the basic design philosophy of this network.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 08:12:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Chunxi", "" ], [ "Chen", "Changjia", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0702023
B.Sundar Rajan
Sanjay Karmakar and B.Sundar Rajan
High-rate, Multi-Symbol-Decodable STBCs from Clifford Algebras
5 pages; Proceedings of Thirteenth National Conference on Communications (NCC 2007),, IIT Kanpur, January 27-29, 2007, pp.368-372
null
null
null
cs.IT math.IT
null
It is well known that Space-Time Block Codes (STBCs) obtained from Orthogonal Designs (ODs) are single-symbol-decodable (SSD) and from Quasi-Orthogonal Designs (QODs) are double-symbol decodable. However, there are SSD codes that are not obtainable from ODs and DSD codes that are not obtainable from QODs. In this paper a method of constructing $g$-symbol decodable ($g$-SD) STBCs using representations of Clifford algebras are presented which when specialized to $g=1,2$ gives SSD and DSD codes respectively. For the number of transmit antennas $2^a$ the rate (in complex symbols per channel use) of the $g$-SD codes presented in this paper is $\frac{a+1-g}{2^{a-g}}$. The maximum rate of the DSD STBCs from QODs reported in the literature is $\frac{a}{2^{a-1}}$ which is smaller than the rate $\frac{a-1}{2^{a-2}}$ of the DSD codes of this paper, for $2^a$ transmit antennas. In particular, the reported DSD codes for 8 and 16 transmit antennas offer rates 1 and 3/4 respectively whereas the known STBCs from QODs offer only 3/4 and 1/2 respectively. The construction of this paper is applicable for any number of transmit antennas.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 13:07:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Karmakar", "Sanjay", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702024
Michael Chertkov
M. Chertkov (Los Alamos), M. Stepanov (UA, Tucson)
Searching for low weight pseudo-codewords
7 pages, 6 figures, proceedings of ITA'07, San Diego
null
null
LA-UR # 07-0509
cs.IT math.IT
null
Belief Propagation (BP) and Linear Programming (LP) decodings of Low Density Parity Check (LDPC) codes are discussed. We summarize results of instanton/pseudo-codeword approach developed for analysis of the error-floor domain of the codes. Instantons are special, code and decoding specific, configurations of the channel noise contributing most to the Frame-Error-Rate (FER). Instantons are decoded into pseudo-codewords. Instanton/pseudo-codeword with the lowest weight describes the largest Signal-to-Noise-Ratio (SNR) asymptotic of FER, while the whole spectra of the low weight instantons is descriptive of the FER vs SNR profile in the extended error-floor domain. First, we describe a general optimization method that allows to find the instantons for any coding/decoding. Second, we introduce LP-specific pseudo-codeword search algorithm that allows efficient calculations of the pseudo-codeword spectra. Finally, we discuss results of combined BP/LP error-floor exploration experiments for two model codes.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 22:31:33 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 13:07:47 GMT" } ]
2007-07-30T00:00:00
[ [ "Chertkov", "M.", "", "Los Alamos" ], [ "Stepanov", "M.", "", "UA, Tucson" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702025
Markus P\"uschel
Markus Pueschel and Jose M. F. Moura
Algebraic Signal Processing Theory: Cooley-Tukey Type Algorithms for DCTs and DSTs
31 pages, more information at http://www.ece.cmu.edu/~smart
IEEE Transactions on Signal Processing, Vol. 56, No. 4, pp. 1502-1521, 2008
10.1109/TSP.2007.907919
null
cs.IT cs.DS math.IT
null
This paper presents a systematic methodology based on the algebraic theory of signal processing to classify and derive fast algorithms for linear transforms. Instead of manipulating the entries of transform matrices, our approach derives the algorithms by stepwise decomposition of the associated signal models, or polynomial algebras. This decomposition is based on two generic methods or algebraic principles that generalize the well-known Cooley-Tukey FFT and make the algorithms' derivations concise and transparent. Application to the 16 discrete cosine and sine transforms yields a large class of fast algorithms, many of which have not been found before.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 23:44:34 GMT" } ]
2020-01-29T00:00:00
[ [ "Pueschel", "Markus", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702026
Ravi Gautam
Ravi Shankar Gautam
Shape preservation behavior of spline curves
54 pages
null
null
null
cs.GR
null
Shape preservation behavior of a spline consists of criterial conditions for preserving convexity, inflection, collinearity, torsion and coplanarity shapes of data polgonal arc. We present our results which acts as an improvement in the definitions of and provide geometrical insight into each of the above shape preservation criteria. We also investigate the effect of various results from the literature on various shape preservation criteria. These results have not been earlier refered in the context of shape preservation behaviour of splines. We point out that each curve segment need to satisfy more than one shape preservation criteria. We investigate the conflict between different shape preservation criteria 1)on each curve segment and 2)of adjacent curve segments. We derive simplified formula for shape preservation criteria for cubic curve segments. We study the shape preservation behavior of cubic Catmull-Rom splines and see that, though being very simple spline curve, it indeed satisfy all the shape preservation criteria.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 10:11:58 GMT" } ]
2009-09-29T00:00:00
[ [ "Gautam", "Ravi Shankar", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0702027
Andrew Gacek
Andrew Gacek
The Suspension Calculus and its Relationship to Other Explicit Treatments of Substitution in Lambda Calculi
84 pages
null
null
null
cs.LO cs.PL
null
The intrinsic treatment of binding in the lambda calculus makes it an ideal data structure for representing syntactic objects with binding such as formulas, proofs, types, and programs. Supporting such a data structure in an implementation is made difficult by the complexity of the substitution operation relative to lambda terms. In this paper we present the suspension calculus, an explicit treatment of meta level binding in the lambda calculus. We prove properties of this calculus which make it a suitable replacement for the lambda calculus in implementation. Finally, we compare the suspension calculus with other explicit treatments of substitution.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 14:35:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Gacek", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0702028
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Uniform and Partially Uniform Redistribution Rules
4 pages; "Advances and Applications of DSmT for Plausible and Paradoxical reasoning for Information Fusion", International Workshop organized by the Bulgarian IST Centre of Competence in 21st Century, December 14, 2006, Bulg. Acad. of Sciences, Sofia, Bulgaria
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), World Scientific, Vol. 19, No. 6, 921-937, 2011
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short paper introduces two new fusion rules for combining quantitative basic belief assignments. These rules although very simple have not been proposed in literature so far and could serve as useful alternatives because of their low computation cost with respect to the recent advanced Proportional Conflict Redistribution rules developed in the DSmT framework.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 14:56:49 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2011 14:06:14 GMT" } ]
2011-12-05T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702029
Mikkel Thorup
Mario Szegedy and Mikkel Thorup
On the variance of subset sum estimation
20 pages, 1 figure
null
null
null
cs.DS
null
For high volume data streams and large data warehouses, sampling is used for efficient approximate answers to aggregate queries over selected subsets. Mathematically, we are dealing with a set of weighted items and want to support queries to arbitrary subset sums. With unit weights, we can compute subset sizes which together with the previous sums provide the subset averages. The question addressed here is which sampling scheme we should use to get the most accurate subset sum estimates. We present a simple theorem on the variance of subset sum estimation and use it to prove variance optimality and near-optimality of subset sum estimation with different known sampling schemes. This variance is measured as the average over all subsets of any given size. By optimal we mean there is no set of input weights for which any sampling scheme can have a better average variance. Such powerful results can never be established experimentally. The results of this paper are derived mathematically. For example, we show that appropriately weighted systematic sampling is simultaneously optimal for all subset sizes. More standard schemes such as uniform sampling and probability-proportional-to-size sampling with replacement can be arbitrarily bad. Knowing the variance optimality of different sampling schemes can help deciding which sampling scheme to apply in a given context.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 15:55:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Szegedy", "Mario", "" ], [ "Thorup", "Mikkel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702030
Nihar Jindal
Nihar Jindal, Jeffrey Andrews, Steven Weber
Optimizing the SINR operating point of spatial networks
Presented at Information Theory and Applications Workshop, UC San Diego, January 2007. 7 pages
null
null
null
cs.IT math.IT
null
This paper addresses the following question, which is of interest in the design and deployment of a multiuser decentralized network. Given a total system bandwidth of W Hz and a fixed data rate constraint of R bps for each transmission, how many frequency slots N of size W/N should the band be partitioned into to maximize the number of simultaneous transmissions in the network? In an interference-limited ad-hoc network, dividing the available spectrum results in two competing effects: on the positive side, it reduces the number of users on each band and therefore decreases the interference level which leads to an increased SINR, while on the negative side the SINR requirement for each transmission is increased because the same information rate must be achieved over a smaller bandwidth. Exploring this tradeoff between bandwidth and SINR and determining the optimum value of N in terms of the system parameters is the focus of the paper. Using stochastic geometry, we analytically derive the optimal SINR threshold (which directly corresponds to the optimal spectral efficiency) on this tradeoff curve and show that it is a function of only the path loss exponent. Furthermore, the optimal SINR point lies between the low-SINR (power-limited) and high-SINR (bandwidth-limited) regimes. In order to operate at this optimal point, the number of frequency bands (i.e., the reuse factor) should be increased until the threshold SINR, which is an increasing function of the reuse factor, is equal to the optimal value.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 17:08:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Jindal", "Nihar", "" ], [ "Andrews", "Jeffrey", "" ], [ "Weber", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702031
Nihar Jindal
Giuseppe Caire, Nihar Jindal, Mari Kobayashi, Niranjay Ravindran
Quantized vs. Analog Feedback for the MIMO Downlink: A Comparison between Zero-Forcing Based Achievable Rates
Submitted to ISIT, January 2007. 5 pages
null
null
null
cs.IT math.IT
null
We consider a MIMO fading broadcast channel and compare the achievable ergodic rates when the channel state information at the transmitter is provided by analog noisy feedback or by quantized (digital) feedback. The superiority of digital feedback is shown, with perfect or imperfect CSIR, whenever the number of feedback channel uses per channel coefficient is larger than 1. Also, we show that by proper design of the digital feedback link, errors in the feedback have a minor effect even by using very simple uncoded modulation. Finally, we show that analog feedback achieves a fraction 1 - 2F of the optimal multiplexing gain even in the presence of a feedback delay, when the fading belongs to the class of Doppler processes with normalized maximum Doppler frequency shift 0 <= F <= 1/2.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 17:24:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Caire", "Giuseppe", "" ], [ "Jindal", "Nihar", "" ], [ "Kobayashi", "Mari", "" ], [ "Ravindran", "Niranjay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702032
Reid Andersen
Reid Andersen
Finding large and small dense subgraphs
12 pages, no figures
null
null
null
cs.DS
null
We consider two optimization problems related to finding dense subgraphs. The densest at-least-k-subgraph problem (DalkS) is to find an induced subgraph of highest average degree among all subgraphs with at least k vertices, and the densest at-most-k-subgraph problem (DamkS) is defined similarly. These problems are related to the well-known densest k-subgraph problem (DkS), which is to find the densest subgraph on exactly k vertices. We show that DalkS can be approximated efficiently, while DamkS is nearly as hard to approximate as the densest k-subgraph problem.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 19:29:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersen", "Reid", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702033
Alexander Barg
Alexander Barg and Punarbasu Purkayastha
Bounds on ordered codes and orthogonal arrays
Final version, minor corrections
Moscow Mathematical Journal, vol. 9, no. 2, 2009, pp. 211-243.
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive new estimates of the size of codes and orthogonal arrays in the ordered Hamming space (the Niederreiter-Rosenbloom-Tsfasman space). We also show that the eigenvalues of the ordered Hamming scheme, the association scheme that describes the combinatorics of the space, are given by the multivariable Krawtchouk polynomials, and establish some of their properties.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 21:37:03 GMT" }, { "version": "v2", "created": "Wed, 22 Oct 2008 14:08:04 GMT" }, { "version": "v3", "created": "Fri, 10 Jul 2009 23:24:43 GMT" } ]
2009-07-20T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Purkayastha", "Punarbasu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702034
Rama Raghavan
L.Jeganathan and R.Rama
Graph Splicing System
13 pages,5 figures
null
null
null
cs.DM
null
The string splicing was introduced by Tom Head which stands as an abstract model for the DNA recombination under the influence of restriction enzymes. The complex chemical process of three dimensional molecules in three dimensional space can be modeled using graphs. The graph splicing systems which were studied so far, can only be applied to a particular type of graphs which could be interpreted as linear or circular graphs. In this paper, we take a different and a novel approach to splice two graphs and introduce a splicing system for graphs that can be applied to all types of graphs. Splicing two graphs can be thought of as a new operation, among the graphs, that generates many new graphs from the given two graphs. Taking a different line of thinking, some of the graph theoretical results of the splicing are studied.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 05:46:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Jeganathan", "L.", "" ], [ "Rama", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702035
Samar Agnihotri
Samar Agnihotri
New Models for the Correlation in Sensor Data
3 pages, 2 figures
null
null
null
cs.IT math.IT
null
In this paper, we propose two new models of spatial correlations in sensor data in a data-gathering sensor network. A particular property of these models is that if a sensor node knows in \textit{how many} bits it needs to transmit its data, then it also knows \textit{which} bits of its data it needs to transmit.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 09:22:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Agnihotri", "Samar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702036
Michael Fisher
Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa
Efficient First-Order Temporal Logic for Infinite-State Systems
16 pages, 2 figures
null
null
null
cs.LO
null
In this paper we consider the specification and verification of infinite-state systems using temporal logic. In particular, we describe parameterised systems using a new variety of first-order temporal logic that is both powerful enough for this form of specification and tractable enough for practical deductive verification. Importantly, the power of the temporal language allows us to describe (and verify) asynchronous systems, communication delays and more complex properties such as liveness and fairness properties. These aspects appear difficult for many other approaches to infinite-state verification.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 15:10:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dixon", "Clare", "" ], [ "Fisher", "Michael", "" ], [ "Konev", "Boris", "" ], [ "Lisitsa", "Alexei", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702037
Minkyu Kim
Minkyu Kim, Muriel Medard, Varun Aggarwal, Una-May O'Reilly, Wonsik Kim, Chang Wook Ahn, Michelle Effros
Evolutionary Approaches to Minimizing Network Coding Resources
9 pages, 6 figures, accepted to the 26th Annual IEEE Conference on Computer Communications (INFOCOM 2007)
null
10.1109/INFCOM.2007.231
null
cs.NI cs.IT math.IT
null
We wish to minimize the resources used for network coding while achieving the desired throughput in a multicast scenario. We employ evolutionary approaches, based on a genetic algorithm, that avoid the computational complexity that makes the problem NP-hard. Our experiments show great improvements over the sub-optimal solutions of prior methods. Our new algorithms improve over our previously proposed algorithm in three ways. First, whereas the previous algorithm can be applied only to acyclic networks, our new method works also with networks with cycles. Second, we enrich the set of components used in the genetic algorithm, which improves the performance. Third, we develop a novel distributed framework. Combining distributed random network coding with our distributed optimization yields a network coding protocol where the resources used for coding are optimized in the setup phase by running our evolutionary algorithm at each node of the network. We demonstrate the effectiveness of our approach by carrying out simulations on a number of different sets of network topologies.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 05:29:25 GMT" } ]
2016-11-15T00:00:00
[ [ "Kim", "Minkyu", "" ], [ "Medard", "Muriel", "" ], [ "Aggarwal", "Varun", "" ], [ "O'Reilly", "Una-May", "" ], [ "Kim", "Wonsik", "" ], [ "Ahn", "Chang Wook", "" ], [ "Effros", "Michelle", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702038
Minkyu Kim
Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard, Wonsik Kim
Genetic Representations for Evolutionary Minimization of Network Coding Resources
10 pages, 3 figures, accepted to the 4th European Workshop on the Application of Nature-Inspired Techniques to Telecommunication Networks and Other Connected Systems (EvoCOMNET 2007)
null
null
null
cs.NE cs.NI
null
We demonstrate how a genetic algorithm solves the problem of minimizing the resources used for network coding, subject to a throughput constraint, in a multicast scenario. A genetic algorithm avoids the computational complexity that makes the problem NP-hard and, for our experiments, greatly improves on sub-optimal solutions of established methods. We compare two different genotype encodings, which tradeoff search space size with fitness landscape, as well as the associated genetic operators. Our finding favors a smaller encoding despite its fewer intermediate solutions and demonstrates the impact of the modularity enforced by genetic operators on the performance of the algorithm.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 05:54:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Minkyu", "" ], [ "Aggarwal", "Varun", "" ], [ "O'Reilly", "Una-May", "" ], [ "Medard", "Muriel", "" ], [ "Kim", "Wonsik", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0702039
Xavier Goaoc
Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA)
Hadwiger and Helly-type theorems for disjoint unit spheres
null
Discrete and Computational Geometry (2006)
null
null
cs.CG
null
We prove Helly-type theorems for line transversals to disjoint unit balls in $\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the balls, any subfamily of 2d balls admits a line transversal consistent with $\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in $\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a transversal.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 08:29:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheong", "Otfried", "", "INRIA Lorraine - LORIA" ], [ "Goaoc", "Xavier", "", "INRIA Lorraine - LORIA" ], [ "Holmsen", "Andreas", "", "INRIA Lorraine - LORIA" ], [ "Petitjean", "Sylvain", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0702040
Yves Guiraud
Yves Guiraud
Polygraphs for termination of left-linear term rewriting systems
15 pages
null
null
null
cs.LO math.CT
null
We present a methodology for proving termination of left-linear term rewriting systems (TRSs) by using Albert Burroni's polygraphs, a kind of rewriting systems on algebraic circuits. We translate the considered TRS into a polygraph of minimal size whose termination is proven with a polygraphic interpretation, then we get back the property on the TRS. We recall Yves Lafont's general translation of TRSs into polygraphs and known links between their termination properties. We give several conditions on the original TRS, including being a first-order functional program, that ensure that we can reduce the size of the polygraphic translation. We also prove sufficient conditions on the polygraphic interpretations of a minimal translation to imply termination of the original TRS. Examples are given to compare this method with usual polynomial interpretations.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 10:18:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
cs/0702041
Robert Brijder
Robert Brijder and Hendrik Jan Hoogeboom
The Fibers and Range of Reduction Graphs in Ciliates
24 pages, 13 figures
Acta Informatica, Volume 45, Number 5 / July, 2008, Pages 383-402
10.1007/s00236-008-0074-3
LIACS Technical Report 2007-01
cs.LO
null
The biological process of gene assembly has been modeled based on three types of string rewriting rules, called string pointer rules, defined on so-called legal strings. It has been shown that reduction graphs, graphs that are based on the notion of breakpoint graph in the theory of sorting by reversal, for legal strings provide valuable insights into the gene assembly process. We characterize which legal strings obtain the same reduction graph (up to isomorphism), and moreover we characterize which graphs are (isomorphic to) reduction graphs.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 12:59:22 GMT" } ]
2008-11-24T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]