id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0701142 | Wolfgang Bein | Wolfgang Bein, Lawrence L. Larmore, R\"udiger Reischuk | Knowledge State Algorithms: Randomization with Limited Information | 17 pages, 2 figures | null | null | null | cs.DS | null | We introduce the concept of knowledge states; many well-known algorithms can
be viewed as knowledge state algorithms. The knowledge state approach can be
used to to construct competitive randomized online algorithms and study the
tradeoff between competitiveness and memory. A knowledge state simply states
conditional obligations of an adversary, by fixing a work function, and gives a
distribution for the algorithm. When a knowledge state algorithm receives a
request, it then calculates one or more "subsequent" knowledge states, together
with a probability of transition to each. The algorithm then uses randomization
to select one of those subsequents to be the new knowledge state. We apply the
method to the paging problem. We present optimally competitive algorithm for
paging for the cases where the cache sizes are k=2 and k=3. These algorithms
use only a very limited number of bookmarks.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 00:54:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bein",
"Wolfgang",
""
],
[
"Larmore",
"Lawrence L.",
""
],
[
"Reischuk",
"Rüdiger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0701143 | Xing Wang | Xing M. Wang | Dirac Notation, Fock Space and Riemann Metric Tensor in Information
Retrieval Models | Removed appendix B; introduced Concept Fock Space; made some minor
corrections or modifications | null | null | null | cs.IR math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using Dirac Notation as a powerful tool, we investigate the three classical
Information Retrieval (IR) models and some their extensions. We show that
almost all such models can be described by vectors in Occupation Number
Representations (ONR) of Fock spaces with various specifications on, e.g.,
occupation number, inner product or term-term interactions. As important cases
of study, Concept Fock Space (CFS) is introduced for Boolean model; the basic
formulas for Singular Value Decomposition (SVD) of Latent Semantic Indexing
(LSI) Model are manipulated in terms of Dirac notation. And, based on SVD, a
Riemannian metric tensor is introduced, which not only can be used to calculate
the relevance of documents to a query, but also may be used to measure the
closeness of documents in data clustering.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 01:22:59 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Feb 2007 04:29:51 GMT"
},
{
"version": "v3",
"created": "Sun, 5 Aug 2007 18:26:03 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Jun 2011 17:38:19 GMT"
}
] | 2011-06-21T00:00:00 | [
[
"Wang",
"Xing M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
cs/0701144 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Trusted Ticket Systems and Applications | Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 2007 | null | null | null | cs.CR | null | Trusted Computing is a security base technology that will perhaps be
ubiquitous in a few years in personal computers and mobile devices alike.
Despite its neutrality with respect to applications, it has raised some privacy
concerns. We show that trusted computing can be applied for service access
control in a manner protecting users' privacy. We construct a ticket system --
a concept which is at the heart of Identity Management -- relying solely on the
capabilities of the trusted platform module and the standards specified by the
Trusted Computing Group. Two examples show how it can be used for pseudonymous
and protected service access.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 14:26:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0701145 | Andreas U. Schmidt | Nicolai Kuntze, Andreas U. Schmidt, and Christian Hett | Non-Repudiation in Internet Telephony | Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 2007 | null | null | null | cs.CR | null | We present a concept to achieve non-repudiation for natural language
conversations over the Internet. The method rests on chained electronic
signatures applied to pieces of packet-based, digital, voice communication. It
establishes the integrity and authenticity of the bidirectional data stream and
its temporal sequence and thus the security context of a conversation. The
concept is close to the protocols for Voice over the Internet (VoIP), provides
a high level of inherent security, and extends naturally to multilateral
non-repudiation, e.g., for conferences. Signatures over conversations can
become true declarations of will in analogy to electronically signed, digital
documents. This enables binding verbal contracts, in principle between
unacquainted speakers, and in particular without witnesses. A reference
implementation of a secure VoIP archive is exhibited.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 15:23:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
],
[
"Hett",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0701146 | Anand Sarwate | Anand D. Sarwate, Michael Gastpar | State constraints and list decoding for the AVC | 22 pages, significantly changed version submitted to IEEE
Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | List decoding for arbitrarily varying channels (AVCs) under state constraints
is investigated. It is shown that rates within $\epsilon$ of the randomized
coding capacity of AVCs with input-dependent state can be achieved under
maximal error with list decoding using lists of size $O(1/\epsilon)$. Under
average error an achievable rate region and converse bound are given for lists
of size $L$. These bounds are based on two different notions of
symmetrizability and do not coincide in general. An example is given that shows
that for list size $L$ the capacity may be positive but strictly smaller than
the randomized coding capacity. This behavior is different than the situation
without state constraints.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 01:59:37 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Sep 2007 18:05:19 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Oct 2009 01:22:17 GMT"
}
] | 2009-10-06T00:00:00 | [
[
"Sarwate",
"Anand D.",
""
],
[
"Gastpar",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701147 | Wim Vanhoof | Michael Hanus | A Generic Analysis Environment for Curry Programs | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | We present CurryBrowser, a generic analysis environment for the declarative
multi-paradigm language Curry. CurryBrowser supports browsing through the
program code of an application written in Curry, i.e., the main module and all
directly or indirectly imported modules. Each module can be shown in different
formats (e.g., source code, interface, intermediate code) and, inside each
module, various properties of functions defined in this module can be analyzed.
In order to support the integration of various program analyses, CurryBrowser
has a generic interface to connect local and global analyses implemented in
Curry. CurryBrowser is completely implemented in Curry using libraries for GUI
programming and meta-programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 06:55:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanus",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701148 | Wim Vanhoof | Wim Vanhoof and Susana Munoz-Hernandez | Proceedings of the 16th Workshop in Logic-based Methods in Programming
Environments (WLPE2006) | null | null | null | null | cs.PL | null | This volume contains the papers presented at WLPE'06: the 16th Workshop on
Logic-based Methods in Programming Environments held on August 16, 2006 in the
Seattle Sheraton Hotel and Towers, Seattle, Washington (USA). It was organised
as a satellite workshop of ICLP'06, the 22th International Conference on Logic
Programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 07:03:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vanhoof",
"Wim",
""
],
[
"Munoz-Hernandez",
"Susana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701149 | Ozgur Oyman | Ozgur Oyman, Arogyaswami J. Paulraj | Power-Bandwidth Tradeoff in Dense Multi-Antenna Relay Networks | 12 pages, to appear in IEEE Transactions on Wireless Communications | null | 10.1109/TWC.2007.05815 | null | cs.IT math.IT | null | We consider a dense fading multi-user network with multiple active
multi-antenna source-destination pair terminals communicating simultaneously
through a large common set of $K$ multi-antenna relay terminals in the full
spatial multiplexing mode. We use Shannon-theoretic tools to analyze the
tradeoff between energy efficiency and spectral efficiency (known as the power-
bandwidth tradeoff) in meaningful asymptotic regimes of signal-to-noise ratio
(SNR) and network size. We design linear distributed multi-antenna relay
beamforming (LDMRB) schemes that exploit the spatial signature of multi-user
interference and characterize their power-bandwidth tradeoff under a system
wide power constraint on source and relay transmissions. The impact of multiple
users, multiple relays and multiple antennas on the key performance measures of
the high and low SNR regimes is investigated in order to shed new light on the
possible reduction in power and bandwidth requirements through the usage of
such practical relay cooperation techniques. Our results indicate that
point-to-point coded multi-user networks supported by distributed relay
beamforming techniques yield enhanced energy efficiency and spectral
efficiency, and with appropriate signaling and sufficient antenna degrees of
freedom, can achieve asymptotically optimal power-bandwidth tradeoff with the
best possible (i.e., as in the cutset bound) energy scaling of $K^{-1}$ and the
best possible spectral efficiency slope at any SNR for large number of relay
terminals.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 10:02:29 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jan 2007 21:13:54 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Feb 2007 18:42:41 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Oyman",
"Ozgur",
""
],
[
"Paulraj",
"Arogyaswami J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701150 | Luc Brun | Luc Brun (GREYC), Walter G. Kropatsch (PRIP) | Contains and Inside relationships within combinatorial Pyramids | 35 pages | Pattern Recognition 39 (01/04/2006) 515-526 | null | null | cs.CV | null | Irregular pyramids are made of a stack of successively reduced graphs
embedded in the plane. Such pyramids are used within the segmentation framework
to encode a hierarchy of partitions. The different graph models used within the
irregular pyramid framework encode different types of relationships between
regions. This paper compares different graph models used within the irregular
pyramid framework according to a set of relationships between regions. We also
define a new algorithm based on a pyramid of combinatorial maps which allows to
determine if one region contains the other using only local calculus.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 15:13:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brun",
"Luc",
"",
"GREYC"
],
[
"Kropatsch",
"Walter G.",
"",
"PRIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0701151 | Guillaume Hanrot | Howard Cheng, Guillaume Hanrot (INRIA Lorraine - LORIA), Emmanuel
Thom\'e (INRIA Lorraine - LORIA), Eugene Zima, Paul Zimmermann (INRIA
Lorraine - LORIA) | Time- and Space-Efficient Evaluation of Some Hypergeometric Constants | null | null | null | null | cs.SC | null | The currently best known algorithms for the numerical evaluation of
hypergeometric constants such as $\zeta(3)$ to $d$ decimal digits have time
complexity $O(M(d) \log^2 d)$ and space complexity of $O(d \log d)$ or $O(d)$.
Following work from Cheng, Gergel, Kim and Zima, we present a new algorithm
with the same asymptotic complexity, but more efficient in practice. Our
implementation of this algorithm improves slightly over existing programs for
the computation of $\pi$, and we announce a new record of 2 billion digits for
$\zeta(3)$.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 08:07:38 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Cheng",
"Howard",
"",
"INRIA Lorraine - LORIA"
],
[
"Hanrot",
"Guillaume",
"",
"INRIA Lorraine - LORIA"
],
[
"Thomé",
"Emmanuel",
"",
"INRIA Lorraine - LORIA"
],
[
"Zima",
"Eugene",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Zimmermann",
"Paul",
"",
"INRIA\n Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0701152 | Hajar Mahdavi-Doost | Hajar Mahdavi-Doost, Masoud Ebrahimi, and Amir K. Khandani | Characterization of Rate Region in Interference Channels with
Constrained Power | 21 Pages, The Conference Version is Submitted to IEEE International
Symposium on Information Theory (ISIT2007) | null | 10.1109/ISIT.2007.4557585 | null | cs.IT math.IT | null | In this paper, an $n$-user Gaussian interference channel, where the power of
the transmitters are subject to some upper-bounds is studied. We obtain a
closed-form expression for the rate region of such a channel based on the
Perron-Frobenius theorem. While the boundary of the rate region for the case of
unconstrained power is a well-established result, this is the first result for
the case of constrained power. We extend this result to the time-varying
channels and obtain a closed-form solution for the rate region of such
channels.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 19:59:51 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Mahdavi-Doost",
"Hajar",
""
],
[
"Ebrahimi",
"Masoud",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701153 | Richard Kr\'alovi\v{c} | Michal Fori\v{s}ek, Branislav Katreniak, Jana Katreniakov\'a,
Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}, Vladim\'ir Koutn\'y, Dana
Pardubsk\'a, Tom\'a\v{s} Plachetka, Branislav Rovan | Online Bandwidth Allocation | null | null | null | null | cs.DS cs.NI | null | The paper investigates a version of the resource allocation problem arising
in the wireless networking, namely in the OVSF code reallocation process. In
this setting a complete binary tree of a given height $n$ is considered,
together with a sequence of requests which have to be served in an online
manner. The requests are of two types: an insertion request requires to
allocate a complete subtree of a given height, and a deletion request frees a
given allocated subtree. In order to serve an insertion request it might be
necessary to move some already allocated subtrees to other locations in order
to free a large enough subtree. We are interested in the worst case average
number of such reallocations needed to serve a request.
It was proved in previous work that the competitive ratio of the optimal
online algorithm solving this problem is between 1.5 and O(n). We partially
answer the question about its exact value by giving an O(1)-competitive online
algorithm.
Same model has been used in the context of memory management systems, and
analyzed for the number of reallocations needed to serve a request in the worst
case. In this setting, our result is a corresponding amortized analysis.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 11:52:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Forišek",
"Michal",
""
],
[
"Katreniak",
"Branislav",
""
],
[
"Katreniaková",
"Jana",
""
],
[
"Královič",
"Rastislav",
""
],
[
"Královič",
"Richard",
""
],
[
"Koutný",
"Vladimír",
""
],
[
"Pardubská",
"Dana",
""
],
[
"Plachetka",
"Tomáš",
""
],
[
"Rovan",
"Branislav",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701154 | Pascal Tesson | Pascal Tesson and Denis Therien | Logic Meets Algebra: the Case of Regular Languages | 37 pages | Logical Methods in Computer Science, Volume 3, Issue 1 (February
23, 2007) lmcs:2226 | 10.2168/LMCS-3(1:4)2007 | null | cs.LO | null | The study of finite automata and regular languages is a privileged meeting
point of algebra and logic. Since the work of Buchi, regular languages have
been classified according to their descriptive complexity, i.e. the type of
logical formalism required to define them. The algebraic point of view on
automata is an essential complement of this classification: by providing
alternative, algebraic characterizations for the classes, it often yields the
only opportunity for the design of algorithms that decide expressibility in
some logical fragment.
We survey the existing results relating the expressibility of regular
languages in logical fragments of MSO[S] with algebraic properties of their
minimal automata. In particular, we show that many of the best known results in
this area share the same underlying mechanics and rely on a very strong
relation between logical substitutions and block-products of pseudovarieties of
monoid. We also explain the impact of these connections on circuit complexity
theory.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 20:46:36 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Feb 2007 12:33:09 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Tesson",
"Pascal",
""
],
[
"Therien",
"Denis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0701155 | Jim Gray | Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don
Reichart, Murali Venkatrao, Frank Pellow, Hamid Pirahesh | Data Cube: A Relational Aggregation Operator Generalizing Group-By,
Cross-Tab, and Sub-Totals | null | Data Mining and Knowledge Discovery 1(1): 29-53 (1997) | null | null | cs.DB | null | Data analysis applications typically aggregate data across many dimensions
looking for anomalies or unusual patterns. The SQL aggregate functions and the
GROUP BY operator produce zero-dimensional or one-dimensional aggregates.
Applications need the N-dimensional generalization of these operators. This
paper defines that operator, called the data cube or simply cube. The cube
operator generalizes the histogram, cross-tabulation, roll-up, drill-down, and
sub-total constructs found in most report writers. The novelty is that cubes
are relations. Consequently, the cube operator can be imbedded in more complex
non-procedural data analysis programs. The cube operator treats each of the N
aggregation attributes as a dimension of N-space. The aggregate of a particular
set of attribute values is a point in this space. The set of points forms an
N-dimensional cube. Super-aggregates are computed by aggregating the N-cube to
lower dimensional spaces. This paper (1) explains the cube and roll-up
operators, (2) shows how they fit in SQL, (3) explains how users can define new
aggregate functions for cubes, and (4) discusses efficient techniques to
compute the cube. Many of these features are being added to the SQL Standard.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:39:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Chaudhuri",
"Surajit",
""
],
[
"Bosworth",
"Adam",
""
],
[
"Layman",
"Andrew",
""
],
[
"Reichart",
"Don",
""
],
[
"Venkatrao",
"Murali",
""
],
[
"Pellow",
"Frank",
""
],
[
"Pirahesh",
"Hamid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0701156 | Jim Gray | Jim Gray | Data Management: Past, Present, and Future | null | IEEE Computer 29(10): 38-46 (1996) | null | MSR-TR-96-18 | cs.DB | null | Soon most information will be available at your fingertips, anytime,
anywhere. Rapid advances in storage, communications, and processing allow us
move all information into Cyberspace. Software to define, search, and visualize
online information is also a key to creating and accessing online information.
This article traces the evolution of data management systems and outlines
current trends. Data management systems began by automating traditional tasks:
recording transactions in business, science, and commerce. This data consisted
primarily of numbers and character strings. Today these systems provide the
infrastructure for much of our society, allowing fast, reliable, secure, and
automatic access to data distributed throughout the world. Increasingly these
systems automatically design and manage access to the data. The next steps are
to automate access to richer forms of data: images, sound, video, maps, and
other media. A second major challenge is automatically summarizing and
abstracting data in anticipation of user requests. These multi-media databases
and tools to access them will be a cornerstone of our move to Cyberspace.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:42:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0701157 | Jim Gray | Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil,
Patrick O'Neil | A Critique of ANSI SQL Isolation Levels | null | Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995 | null | MSR-TR-95-51 | cs.DB | null | ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads,
Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and
the ANSI SQL definitions fail to characterize several popular isolation levels,
including the standard locking implementations of the levels. Investigating the
ambiguities of the phenomena leads to clearer definitions; in addition new
phenomena that better characterize isolation types are introduced. An important
multiversion isolation type, Snapshot Isolation, is defined.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:53:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berenson",
"Hal",
""
],
[
"Bernstein",
"Phil",
""
],
[
"Gray",
"Jim",
""
],
[
"Melton",
"Jim",
""
],
[
"O'Neil",
"Elizabeth",
""
],
[
"O'Neil",
"Patrick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0701158 | Jim Gray | Jim Gray | Queues Are Databases | null | null | null | MSR-TR-95-56 | cs.DB | null | Message-oriented-middleware (MOM) has become an small industry. MOM offers
queued transaction processing as an advance over pure client-server transaction
processing. This note makes four points: Queued transaction processing is less
general than direct transaction processing. Queued systems are built on top of
direct systems. You cannot build a direct system atop a queued system. It is
difficult to build direct, conversational, or distributed transactions atop a
queued system. Queues are interesting databases with interesting concurrency
control. It is best to build these mechanisms into a standard database system
so other applications can use these interesting features. Queue systems need
DBMS functionality. Queues need security, configuration, performance
monitoring, recovery, and reorganization utilities. Database systems already
have these features. A full-function MOM system duplicates these database
features. Queue managers are simple TP-monitors managing server pools driven by
queues. Database systems are encompassing many server pool features as they
evolve to TP-lite systems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:56:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0701159 | Jim Gray | Gerd Heber, Jim Gray | Supporting Finite Element Analysis with a Relational Database Backend,
Part I: There is Life beyond Files | null | null | null | MSR-TR-2005-49 | cs.DB cs.CE | null | In this paper, we show how to use a Relational Database Management System in
support of Finite Element Analysis. We believe it is a new way of thinking
about data management in well-understood applications to prepare them for two
major challenges, - size and integration (globalization). Neither extreme size
nor integration (with other applications over the Web) was a design concern 30
years ago when the paradigm for FEA implementation first was formed. On the
other hand, database technology has come a long way since its inception and it
is past time to highlight its usefulness to the field of scientific computing
and computer based engineering. This series aims to widen the list of
applications for database designers and for FEA users and application
developers to reap some of the benefits of database development.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:02:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heber",
"Gerd",
""
],
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701160 | Jim Gray | Gerd Heber, Jim Gray | Supporting Finite Element Analysis with a Relational Database Backend,
Part II: Database Design and Access | null | null | null | MSR-TR-2006-21 | cs.DB cs.CE | null | This is Part II of a three article series on using databases for Finite
Element Analysis (FEA). It discusses (1) db design, (2) data loading, (3)
typical use cases during grid building, (4) typical use cases during simulation
(get and put), (5) typical use cases during analysis (also done in Part III)
and some performance measures of these cases. It argues that using a database
is simpler to implement than custom data schemas, has better performance
because it can use data parallelism, and better supports FEA modularity and
tool evolution because database schema evolution, data independence, and
self-defining data.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:05:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heber",
"Gerd",
""
],
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701161 | Jim Gray | Jim Gray, Charles Levine | Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive | null | null | null | MSR-TR-2005-39 | cs.DB cs.PF | null | A $2k computer can execute about 8k transactions per second. This is 80x more
than one of the largest US bank's 1970's traffic - it approximates the total US
1970's financial transaction volume. Very modest modern computers can easily
solve yesterday's problems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:51:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Levine",
"Charles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701162 | Jim Gray | Jim Gray | A Measure of Transaction Processing 20 Years Later | This article appeared in the IEEE Data Engineering, Fall 2005 | null | null | MSR-TR-2005-57 | cs.DB cs.PF | null | This provides a retrospective of the paper "A Measure of Transaction
Processing" published in 1985. It shows that transaction processing peak
performance and price-peformance have improved about 100,000x respectively and
that sort/sequential performance has approximately doubled each year (so a
million fold improvement) even though processor performance plateaued in 1995.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:57:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701163 | Jim Gray | Jim Gray, Alex Szalay, Gyorgy Fekete | Using Table Valued Functions in SQL Server 2005 To Implement a Spatial
Data Library | null | null | null | MSR-TR-2005-122 | cs.DB cs.CE | null | This article explains how to add spatial search functions (point-near-point
and point in polygon) to Microsoft SQL Server 2005 using C# and table-valued
functions. It is possible to use this library to add spatial search to your
application without writing any special code. The library implements the
public-domain C# Hierarchical Triangular Mesh (HTM) algorithms from Johns
Hopkins University. That C# library is connected to SQL Server 2005 via a set
of scalar-valued and table-valued functions. These functions act as a spatial
index.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:00:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
],
[
"Fekete",
"Gyorgy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701164 | Jim Gray | Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter
Kukol, Ani Thakar | Indexing the Sphere with the Hierarchical Triangular Mesh | null | null | null | MSR-TR-2005-123 | cs.DB cs.DS | null | We describe a method to subdivide the surface of a sphere into spherical
triangles of similar, but not identical, shapes and sizes. The Hierarchical
Triangular Mesh (HTM) is a quad-tree that is particularly good at supporting
searches at different resolutions, from arc seconds to hemispheres. The
subdivision scheme is universal, providing the basis for addressing and for
fast lookups. The HTM provides the basis for an efficient geospatial indexing
scheme in relational databases where the data have an inherent location on
either the celestial sphere or the Earth. The HTM index is superior to
cartographical methods using coordinates with singularities at the poles. We
also describe a way to specify surface regions that efficiently represent
spherical query areas. This article presents the algorithms used to identify
the HTM triangles covering such regions.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:04:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
],
[
"Fekete",
"George",
""
],
[
"Kunszt",
"Peter Z.",
""
],
[
"Kukol",
"Peter",
""
],
[
"Thakar",
"Ani",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0701165 | Jim Gray | Gordon Bell, Jim Gray, Alex Szalay | Petascale Computational Systems | null | null | null | null | cs.DB cs.AR | null | Computational science is changing to be data intensive. Super-Computers must
be balanced systems; not just CPU farms but also petascale IO and networking
arrays. Anyone building CyberInfrastructure should allocate resources to
support a balanced Tier-1 through Tier-3 design.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:23:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bell",
"Gordon",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0701166 | Jim Gray | Jim Gray, Catharine van Ingen | Empirical Measurements of Disk Failure Rates and Error Rates | null | null | null | MSR-TR-2005-166 | cs.DB cs.AR | null | The SATA advertised bit error rate of one error in 10 terabytes is
frightening. We moved 2 PB through low-cost hardware and saw five disk read
error events, several controller failures, and many system reboots caused by
security patches. We conclude that SATA uncorrectable read errors are not yet a
dominant system-fault source - they happen, but are rare compared to other
problems. We also conclude that UER (uncorrectable error rate) is not the
relevant metric for our needs. When an uncorrectable read error happens, there
are typically several damaged storage blocks (and many uncorrectable read
errors.) Also, some uncorrectable read errors may be masked by the operating
system. The more meaningful metric for data architects is Mean Time To Data
Loss (MTTDL.)
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:29:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"van Ingen",
"Catharine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0701167 | Jim Gray | Maria A. Nieto-Santisteban, Aniruddha R. Thakar, Alexander S. Szalay,
Jim Gray | Large-Scale Query and XMatch, Entering the Parallel Zone | Astronomical Data Analysis Software and Systems XV in San Lorenzo de
El Escorial, Madrid, Spain, October 2005, to appear in the ASP Conference
Series | null | null | MSR-TR-2005- 169 | cs.DB cs.CE | null | Current and future astronomical surveys are producing catalogs with millions
and billions of objects. On-line access to such big datasets for data mining
and cross-correlation is usually as highly desired as unfeasible. Providing
these capabilities is becoming critical for the Virtual Observatory framework.
In this paper we present various performance tests that show how using
Relational Database Management Systems (RDBMS) and a Zoning algorithm to
partition and parallelize the computation, we can facilitate large-scale query
and cross-match.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:33:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Thakar",
"Aniruddha R.",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701168 | Jim Gray | Russell Sears, Catharine Van Ingen, Jim Gray | To BLOB or Not To BLOB: Large Object Storage in a Database or a
Filesystem? | null | CIDR 2007 | null | MSR-TR-2006-45 | cs.DB | null | Application designers often face the question of whether to store large
objects in a filesystem or in a database. Often this decision is made for
application design simplicity. Sometimes, performance measurements are also
used. This paper looks at the question of fragmentation - one of the
operational issues that can affect the performance and/or manageability of the
system as deployed long term. As expected from the common wisdom, objects
smaller than 256KB are best stored in a database while objects larger than 1M
are best stored in the filesystem. Between 256KB and 1MB, the read:write ratio
and rate of object overwrite or replacement are important factors. We used the
notion of "storage age" or number of object overwrites as way of normalizing
wall clock time. Storage age allows our results or similar such results to be
applied across a number of read:write ratios and object replacement rates.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:54:04 GMT"
}
] | 2011-02-19T00:00:00 | [
[
"Sears",
"Russell",
""
],
[
"Van Ingen",
"Catharine",
""
],
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0701169 | Michael Botros Shenouda | Michael Botros Shenouda and T. N. Davidson | A Framework for Designing MIMO systems with Decision Feedback
Equalization or Tomlinson-Harashima Precoding | To appear in ICASSP 2007 | null | null | null | cs.IT math.IT | null | We consider joint transceiver design for general Multiple-Input
Multiple-Output communication systems that implement interference
(pre-)subtraction, such as those based on Decision Feedback Equalization (DFE)
or Tomlinson-Harashima precoding (THP). We develop a unified framework for
joint transceiver design by considering design criteria that are expressed as
functions of the Mean Square Error (MSE) of the individual data streams. By
deriving two inequalities that involve the logarithms of the individual MSEs,
we obtain optimal designs for two classes of communication objectives, namely
those that are Schur-convex and Schur-concave functions of these logarithms.
For Schur-convex objectives, the optimal design results in data streams with
equal MSEs. This design simultaneously minimizes the total MSE and maximizes
the mutual information for the DFE-based model. For Schur-concave objectives,
the optimal DFE design results in linear equalization and the optimal THP
design results in linear precoding. The proposed framework embraces a wide
range of design objectives and can be regarded as a counterpart of the existing
framework of linear transceiver design.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 02:20:33 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Jan 2007 00:26:03 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Shenouda",
"Michael Botros",
""
],
[
"Davidson",
"T. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701170 | Jim Gray | Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E,
Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay | Life Under Your Feet: An End-to-End Soil Ecology Sensor Network,
Database, Web Server, and Analysis Service | null | null | null | MSR TR 2006 90 | cs.DB cs.CE | null | Wireless sensor networks can revolutionize soil ecology by providing
measurements at temporal and spatial granularities previously impossible. This
paper presents a soil monitoring system we developed and deployed at an urban
forest in Baltimore as a first step towards realizing this vision. Motes in
this network measure and save soil moisture and temperature in situ every
minute. Raw measurements are periodically retrieved by a sensor gateway and
stored in a central database where calibrated versions are derived and stored.
The measurement database is published through Web Services interfaces. In
addition, analysis tools let scientists analyze current and historical data and
help manage the sensor network. The article describes the system design, what
we learned from the deployment, and initial results obtained from the sensors.
The system measures soil factors with unprecedented temporal precision.
However, the deployment required device-level programming, sensor calibration
across space and time, and cross-referencing measurements with external
sources. The database, web server, and data analysis design required
considerable innovation and expertise. So, the ratio of computer-scientists to
ecologists was 3:1. Before sensor networks can fulfill their potential as
instruments that can be easily deployed by scientists, these technical problems
must be addressed so that the ratio is one nerd per ten ecologists.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:08:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szlavecz",
"Katalin",
""
],
[
"Terzis",
"Andreas",
""
],
[
"Ozer",
"Stuart",
""
],
[
"Musaloiu-E",
"Razvan",
""
],
[
"Cogan",
"Joshua",
""
],
[
"Small",
"Sam",
""
],
[
"Burns",
"Randal",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701171 | Jim Gray | Jim Gray, Maria A. Nieto-Santisteban, Alexander S. Szalay | The Zones Algorithm for Finding Points-Near-a-Point or Cross-Matching
Spatial Datasets | null | null | null | MSR TR 2006 52 | cs.DB cs.DS | null | Zones index an N-dimensional Euclidian or metric space to efficiently support
points-near-a-point queries either within a dataset or between two datasets.
The approach uses relational algebra and the B-Tree mechanism found in almost
all relational database systems. Hence, the Zones Algorithm gives a
portable-relational implementation of points-near-point, spatial cross-match,
and self-match queries. This article corrects some mistakes in an earlier
article we wrote on the Zones Algorithm and describes some algorithmic
improvements. The Appendix includes an implementation of point-near-point,
self-match, and cross-match using the USGS city and stream gauge database.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:11:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Szalay",
"Alexander S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0701172 | Jim Gray | Jim Gray, Alex Szalay, Tamas Budavari, Robert Lupton, Maria
Nieto-Santisteban, Ani Thakar | Cross-Matching Multiple Spatial Observations and Dealing with Missing
Data | null | null | null | MSR TR 2006-175 | cs.DB cs.CE | null | Cross-match spatially clusters and organizes several astronomical
point-source measurements from one or more surveys. Ideally, each object would
be found in each survey. Unfortunately, the observation conditions and the
objects themselves change continually. Even some stationary objects are missing
in some observations; sometimes objects have a variable light flux and
sometimes the seeing is worse. In most cases we are faced with a substantial
number of differences in object detections between surveys and between
observations taken at different times within the same survey or instrument.
Dealing with such missing observations is a difficult problem. The first step
is to classify misses as ephemeral - when the object moved or simply
disappeared, masked - when noise hid or corrupted the object observation, or
edge - when the object was near the edge of the observational field. This
classification and a spatial library to represent and manipulate observational
footprints help construct a Match table recording both hits and misses.
Transitive closure clusters friends-of-friends into object bundles. The bundle
summary statistics are recorded in a Bundle table. This design is an evolution
of the Sloan Digital Sky Survey cross-match design that compared overlapping
observations taken at different times. Cross-Matching Multiple Spatial
Observations and Dealing with Missing Data.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:18:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
],
[
"Budavari",
"Tamas",
""
],
[
"Lupton",
"Robert",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Thakar",
"Ani",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701173 | Jim Gray | Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick,
Bill Boroski, Svetlana Lebedeva, Brian Yanny | SkyServer Traffic Report - The First Five Years | null | null | null | MSR TR-2006-190 | cs.DB cs.CE | null | The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog
Archive Server. From 2001 to 2006, there were a million visitors in 3 million
sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62
million page views. The site currently averages 35 thousand visitors and 400
thousand sessions per month. The Web and SQL logs are public. We analyzed
traffic and sessions by duration, usage pattern, data product, and client type
(mortal or bot) over time. The analysis shows (1) the site's popularity, (2)
the educational website that delivered nearly fifty thousand hours of
interactive instruction, (3) the relative use of interactive, programmatic, and
batch-local access, (4) the success of offering ad-hoc SQL, personal database,
and batch job access to scientists as part of the data publication, (5) the
continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7)
a novel approach of using the corpus of correct SQL queries to suggest similar
but correct statements when a user presents an incorrect SQL statement.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:22:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Singh",
"Vik",
""
],
[
"Gray",
"Jim",
""
],
[
"Thakar",
"Ani",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Raddick",
"Jordan",
""
],
[
"Boroski",
"Bill",
""
],
[
"Lebedeva",
"Svetlana",
""
],
[
"Yanny",
"Brian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0701174 | Dimitris Kalles | T. Hadzilacos, D. Kalles, D. Koumanakos, V. Mitsionis | A Prototype for Educational Planning Using Course Constraints to
Simulate Student Populations | Contains 9 pages, 3 figures, 1 table. Text updated as of February 27,
2009. Submitted to a journal | null | null | null | cs.AI cs.CY cs.DS cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distance learning universities usually afford their students the flexibility
to advance their studies at their own pace. This can lead to a considerable
fluctuation of student populations within a program's courses, possibly
affecting the academic viability of a program as well as the related required
resources. Providing a method that estimates this population could be of
substantial help to university management and academic personnel. We describe
how to use course precedence constraints to calculate alternative tuition paths
and then use Markov models to estimate future populations. In doing so, we
identify key issues of a large scale potential deployment.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 08:32:10 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2008 09:33:20 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Mar 2009 21:20:54 GMT"
}
] | 2009-03-12T00:00:00 | [
[
"Hadzilacos",
"T.",
""
],
[
"Kalles",
"D.",
""
],
[
"Koumanakos",
"D.",
""
],
[
"Mitsionis",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0701175 | Dimitris Kalles | Th. Hadzilacos, D. Kalles, M. Pouliopoulou | On the Software and Knowledge Engineering Aspects of the Educational
Process | Contains 21 sparse pages, 8 figures. Accepted for publication in
International Journal of Software Engineering and Knowledge Engineering
(IJSEKE). Keywords: Tools for interactive learning and teaching, Modelling,
Distance Learning | null | null | null | cs.SE cs.DL | null | The Hellenic Open University has embarked on a large-scale effort to enhance
its textbook-based material with content that demonstrably supports the basic
tenets of distance learning. The challenge is to set up a framework that allows
for the production-level creation, distribution and consumption of content, and
at the same time, evaluate the effort in terms of technological, educational
and organizational knowledge gained. This paper presents a model of the
educational process that is used as a development backbone and argues about its
conceptual and technical practicality at large.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 14:51:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hadzilacos",
"Th.",
""
],
[
"Kalles",
"D.",
""
],
[
"Pouliopoulou",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0701176 | Alain Frisch | Alain Frisch (INRIA Rocquencourt), Haruo Hosoya (CST) | Towards Practical Typechecking for Macro Tree Transducers | null | null | null | null | cs.PL | null | Macro tree transducers (mtt) are an important model that both covers many
useful XML transformations and allows decidable exact typechecking. This paper
reports our first step toward an implementation of mtt typechecker that has a
practical efficiency. Our approach is to represent an input type obtained from
a backward inference as an alternating tree automaton, in a style similar to
Tozawa's XSLT0 typechecking. In this approach, typechecking reduces to checking
emptiness of an alternating tree automaton. We propose several optimizations
(Cartesian factorization, state partitioning) on the backward inference process
in order to produce much smaller alternating tree automata than the naive
algorithm, and we present our efficient algorithm for checking emptiness of
alternating tree automata, where we exploit the explicit representation of
alternation for local optimizations. Our preliminary experiments confirm that
our algorithm has a practical performance that can typecheck simple
transformations with respect to the full XHTML in a reasonable time.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 15:16:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Frisch",
"Alain",
"",
"INRIA Rocquencourt"
],
[
"Hosoya",
"Haruo",
"",
"CST"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0701177 | Roudra Chakraborty | Roudra Chakraborty, Debapriya Sengupta, Sagnik Sinha | Pitch Tracking of Acoustic Signals based on Average Squared Mean
Difference Function | null | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a method of pitch tracking based on variance minimization of
locally periodic subsamples of an acoustic signal is presented. Replicates
along the length of the periodically sampled data of the signal vector are
taken and locally averaged sample variances are minimized to estimate the
fundamental frequency. Using this method, pitch tracking of any text
independent voiced signal is possible for different speakers.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 20:07:43 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Jan 2007 14:38:43 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Jul 2007 17:44:02 GMT"
},
{
"version": "v4",
"created": "Sun, 17 Aug 2008 19:17:05 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Chakraborty",
"Roudra",
""
],
[
"Sengupta",
"Debapriya",
""
],
[
"Sinha",
"Sagnik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
cs/0701178 | Erhan Ermis | Erhan B. Ermis, Venkatesh Saligrama | Distributed Detection in Sensor Networks with Limited Range Sensors | Submitted to IEEE Transactions on Signal Processing | null | 10.1109/TSP.2009.2033300 | null | cs.IT math.IT | null | We consider a multi-object detection problem over a sensor network (SNET)
with limited range sensors. This problem complements the widely considered
decentralized detection problem where all sensors observe the same object.
While the necessity for global collaboration is clear in the decentralized
detection problem, the benefits of collaboration with limited range sensors is
unclear and has not been widely explored. In this paper we develop a
distributed detection approach based on recent development of the false
discovery rate (FDR). We first extend the FDR procedure and develop a
transformation that exploits complete or partial knowledge of either the
observed distributions at each sensor or the ensemble (mixture) distribution
across all sensors. We then show that this transformation applies to
multi-dimensional observations, thus extending FDR to multi-dimensional
settings. We also extend FDR theory to cases where distributions under both
null and positive hypotheses are uncertain. We then propose a robust
distributed algorithm to perform detection. We further demonstrate scalability
to large SNETs by showing that the upper bound on the communication complexity
scales linearly with the number of sensors that are in the vicinity of objects
and is independent of the total number of sensors. Finally, we deal with
situations where the sensing model may be uncertain and establish robustness of
our techniques to such uncertainties.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 20:54:32 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Feb 2007 21:10:14 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Mar 2008 13:09:49 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Ermis",
"Erhan B.",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701179 | Franck Petit | Yoann Dieudonn\'e (LaRIA), Franck Petit (LaRIA) | Scatter of Weak Robots | null | null | null | null | cs.DC | null | In this paper, we first formalize the problem to be solved, i.e., the Scatter
Problem (SP). We then show that SP cannot be deterministically solved. Next, we
propose a randomized algorithm for this problem. The proposed solution is
trivially self-stabilizing. We then show how to design a self-stabilizing
version of any deterministic solution for the Pattern Formation and the
Gathering problems.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 06:43:04 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Dieudonné",
"Yoann",
"",
"LaRIA"
],
[
"Petit",
"Franck",
"",
"LaRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0701180 | Fionn Murtagh | F. Murtagh, J. Mothe and K. Englmeier | Ontology from Local Hierarchical Structure in Text | 35 pp., 12 figures | null | null | null | cs.IR | null | We study the notion of hierarchy in the context of visualizing textual data
and navigating text collections. A formal framework for ``hierarchy'' is given
by an ultrametric topology. This provides us with a theoretical foundation for
concept hierarchy creation. A major objective is {\em scalable} annotation or
labeling of concept maps. Serendipitously we pursue other objectives such as
deriving common word pair (and triplet) phrases, i.e., word 2- and 3-grams. We
evaluate our approach using (i) a collection of texts, (ii) a single text
subdivided into successive parts (for which we provide an interactive
demonstrator), and (iii) a text subdivided at the sentence or line level. While
detailing a generic framework, a distinguishing feature of our work is that we
focus on {\em locality} of hierarchic structure in order to extract semantic
information.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 18:31:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murtagh",
"F.",
""
],
[
"Mothe",
"J.",
""
],
[
"Englmeier",
"K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0701181 | Fionn Murtagh | Fionn Murtagh | A Note on Local Ultrametricity in Text | 18 pp | null | null | null | cs.CL | null | High dimensional, sparsely populated data spaces have been characterized in
terms of ultrametric topology. This implies that there are natural, not
necessarily unique, tree or hierarchy structures defined by the ultrametric
topology. In this note we study the extent of local ultrametric topology in
texts, with the aim of finding unique ``fingerprints'' for a text or corpus,
discriminating between texts from different domains, and opening up the
possibility of exploiting hierarchical structures in the data. We use coherent
and meaningful collections of over 1000 texts, comprising over 1.3 million
words.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 19:09:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0701182 | Marat Burnashev V. | Marat Burnashev | Supplement to: Code Spectrum and Reliability Function: Binary Symmetric
Channel | to appear in Problems of Information Transmission, 2007, v. 43, no. 1 | null | null | null | cs.IT math.IT | null | A much simpler proof of Theorem 1 from M.Burnashev "Code spectrum and
reliability function: Binary symmetric channel" is presented.
| [
{
"version": "v1",
"created": "Sun, 28 Jan 2007 11:05:05 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Burnashev",
"Marat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701183 | Gilles Villard | Gilles Villard (LIP) | Certification of the QR factor R, and of lattice basis reducedness | null | null | null | Vil06-1 | cs.SC cs.NA | null | Given a lattice basis of n vectors in Z^n, we propose an algorithm using
12n^3+O(n^2) floating point operations for checking whether the basis is
LLL-reduced. If the basis is reduced then the algorithm will hopefully answer
''yes''. If the basis is not reduced, or if the precision used is not
sufficient with respect to n, and to the numerical properties of the basis, the
algorithm will answer ''failed''. Hence a positive answer is a rigorous
certificate. For implementing the certificate itself, we propose a floating
point algorithm for computing (certified) error bounds for the entries of the R
factor of the QR matrix factorization. This algorithm takes into account all
possible approximation and rounding errors. The cost 12n^3+O(n^2) of the
certificate is only six times more than the cost of numerical algorithms for
computing the QR factorization itself, and the certificate may be implemented
using matrix library routines only. We report experiments that show that for a
reduced basis of adequate dimension and quality the certificate succeeds, and
establish the effectiveness of the certificate. This effectiveness is applied
for certifying the output of fastest existing floating point heuristics of LLL
reduction, without slowing down the whole process.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 09:15:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Villard",
"Gilles",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0701184 | Joerg Hoffmann | Joerg Hoffmann and Carla Gomes and Bart Selman | Structure and Problem Hardness: Goal Asymmetry and DPLL Proofs in<br>
SAT-Based Planning | null | Logical Methods in Computer Science, Volume 3, Issue 1 (February
26, 2007) lmcs:2228 | 10.2168/LMCS-3(1:6)2007 | null | cs.AI | null | In Verification and in (optimal) AI Planning, a successful method is to
formulate the application as boolean satisfiability (SAT), and solve it with
state-of-the-art DPLL-based procedures. There is a lack of understanding of why
this works so well. Focussing on the Planning context, we identify a form of
problem structure concerned with the symmetrical or asymmetrical nature of the
cost of achieving the individual planning goals. We quantify this sort of
structure with a simple numeric parameter called AsymRatio, ranging between 0
and 1. We run experiments in 10 benchmark domains from the International
Planning Competitions since 2000; we show that AsymRatio is a good indicator of
SAT solver performance in 8 of these domains. We then examine carefully crafted
synthetic planning domains that allow control of the amount of structure, and
that are clean enough for a rigorous analysis of the combinatorial search
space. The domains are parameterized by size, and by the amount of structure.
The CNFs we examine are unsatisfiable, encoding one planning step less than the
length of the optimal plan. We prove upper and lower bounds on the size of the
best possible DPLL refutations, under different settings of the amount of
structure, as a function of size. We also identify the best possible sets of
branching variables (backdoors). With minimum AsymRatio, we prove exponential
lower bounds, and identify minimal backdoors of size linear in the number of
variables. With maximum AsymRatio, we identify logarithmic DPLL refutations
(and backdoors), showing a doubly exponential gap between the two structural
extreme cases. The reasons for this behavior -- the proof arguments --
illuminate the prototypical patterns of structure causing the empirical
behavior observed in the competition benchmarks.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 12:47:08 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Feb 2007 11:38:45 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Hoffmann",
"Joerg",
""
],
[
"Gomes",
"Carla",
""
],
[
"Selman",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0701185 | Frank Gurski | Frank Gurski | Graph Operations on Clique-Width Bounded Graphs | 30 pages, to appear in "Theory of Computing Systems" | null | 10.1007/s00224-016-9685-1 | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clique-width is a well-known graph parameter. Many NP-hard graph problems
admit polynomial-time solutions when restricted to graphs of bounded
clique-width. The same holds for NLC-width. In this paper we study the behavior
of clique-width and NLC-width under various graph operations and graph
transformations. We give upper and lower bounds for the clique-width and
NLC-width of the modified graphs in terms of the clique-width and NLC-width of
the involved graphs.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 14:36:25 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Nov 2014 14:02:50 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Jun 2016 16:45:38 GMT"
}
] | 2016-06-07T00:00:00 | [
[
"Gurski",
"Frank",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0701186 | Marc Daumas | Marc Daumas (LIRMM, LP2A), Guillaume Melquiond (LIP, INRIA
Rh\^one-Alpes) | Certification of bounds on expressions involving rounded operators | null | null | null | null | cs.MS | null | Gappa uses interval arithmetic to certify bounds on mathematical expressions
that involve rounded as well as exact operators. Gappa generates a theorem with
its proof for each bound treated. The proof can be checked with a higher order
logic automatic proof checker, either Coq or HOL Light, and we have developed a
large companion library of verified facts for Coq dealing with the addition,
multiplication, division, and square root, in fixed- and floating-point
arithmetics. Gappa uses multiple-precision dyadic fractions for the endpoints
of intervals and performs forward error analysis on rounded operators when
necessary. When asked, Gappa reports the best bounds it is able to reach for a
given expression in a given context. This feature is used to quickly obtain
coarse bounds. It can also be used to identify where the set of facts and
automatic techniques implemented in Gappa becomes insufficient. Gappa handles
seamlessly additional properties expressed as interval properties or rewriting
rules in order to establish more intricate bounds. Recent work showed that
Gappa is perfectly suited to the proof of correctness of small pieces of
software. Proof obligations can be written by designers, produced by
third-party tools or obtained by overloading arithmetic operators.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 15:36:47 GMT"
},
{
"version": "v2",
"created": "Thu, 24 May 2007 11:57:26 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Daumas",
"Marc",
"",
"LIRMM, LP2A"
],
[
"Melquiond",
"Guillaume",
"",
"LIP, INRIA\n Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0701187 | Christian Schallhart | Sagar Chaki, Christian Schallhart, Helmut Veith | Verification Across Intellectual Property Boundaries | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many industries, the importance of software components provided by
third-party suppliers is steadily increasing. As the suppliers seek to secure
their intellectual property (IP) rights, the customer usually has no direct
access to the suppliers' source code, and is able to enforce the use of
verification tools only by legal requirements. In turn, the supplier has no
means to convince the customer about successful verification without revealing
the source code. This paper presents an approach to resolve the conflict
between the IP interests of the supplier and the quality interests of the
customer. We introduce a protocol in which a dedicated server (called the
"amanat") is controlled by both parties: the customer controls the verification
task performed by the amanat, while the supplier controls the communication
channels of the amanat to ensure that the amanat does not leak information
about the source code. We argue that the protocol is both practically useful
and mathematically sound. As the protocol is based on well-known (and
relatively lightweight) cryptographic primitives, it allows a straightforward
implementation on top of existing verification tool chains. To substantiate our
security claims, we establish the correctness of the protocol by cryptographic
reduction proofs.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 17:09:17 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Nov 2011 17:41:16 GMT"
}
] | 2011-12-01T00:00:00 | [
[
"Chaki",
"Sagar",
""
],
[
"Schallhart",
"Christian",
""
],
[
"Veith",
"Helmut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0701188 | Gilles Villard | Wayne Eberly (UCALGARY), Mark Giesbrecht (UWO), Pascal Giorgi (LP2A),
Arne Storjohann (UWO), Gilles Villard (LIP) | Faster Inversion and Other Black Box Matrix Computations Using Efficient
Block Projections | null | null | null | EGGSV07-1 | cs.SC cs.NA | null | Block projections have been used, in [Eberly et al. 2006], to obtain an
efficient algorithm to find solutions for sparse systems of linear equations. A
bound of softO(n^(2.5)) machine operations is obtained assuming that the input
matrix can be multiplied by a vector with constant-sized entries in softO(n)
machine operations. Unfortunately, the correctness of this algorithm depends on
the existence of efficient block projections, and this has been conjectured. In
this paper we establish the correctness of the algorithm from [Eberly et al.
2006] by proving the existence of efficient block projections over sufficiently
large fields. We demonstrate the usefulness of these projections by deriving
improved bounds for the cost of several matrix problems, considering, in
particular, ``sparse'' matrices that can be be multiplied by a vector using
softO(n) field operations. We show how to compute the inverse of a sparse
matrix over a field F using an expected number of softO(n^(2.27)) operations in
F. A basis for the null space of a sparse matrix, and a certification of its
rank, are obtained at the same cost. An application to Kaltofen and Villard's
Baby-Steps/Giant-Steps algorithms for the determinant and Smith Form of an
integer matrix yields algorithms requiring softO(n^(2.66)) machine operations.
The derived algorithms are all probabilistic of the Las Vegas type.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 18:20:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eberly",
"Wayne",
"",
"UCALGARY"
],
[
"Giesbrecht",
"Mark",
"",
"UWO"
],
[
"Giorgi",
"Pascal",
"",
"LP2A"
],
[
"Storjohann",
"Arne",
"",
"UWO"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0701189 | Sebastien Tixeuil | Fredrik Manne, Morten Mjelde, Laurence Pilard, S\'ebastien Tixeuil
(LRI) | A New Self-Stabilizing Maximal Matching Algorithm | null | null | null | null | cs.DS cs.DC | null | The maximal matching problem has received considerable attention in the
self-stabilizing community. Previous work has given different self-stabilizing
algorithms that solves the problem for both the adversarial and fair
distributed daemon, the sequential adversarial daemon, as well as the
synchronous daemon. In the following we present a single self-stabilizing
algorithm for this problem that unites all of these algorithms in that it
stabilizes in the same number of moves as the previous best algorithms for the
sequential adversarial, the distributed fair, and the synchronous daemon. In
addition, the algorithm improves the previous best moves complexities for the
distributed adversarial daemon from O(n^2) and O(delta m) to O(m) where n is
the number of processes, m is thenumber of edges, and delta is the maximum
degree in the graph.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 14:52:37 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Manne",
"Fredrik",
"",
"LRI"
],
[
"Mjelde",
"Morten",
"",
"LRI"
],
[
"Pilard",
"Laurence",
"",
"LRI"
],
[
"Tixeuil",
"Sébastien",
"",
"LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0701190 | Aaron Harwood | Thomas Jacobs and Aaron Harwood | A Peer-to-Peer Browsable File Index using a Popularity Based Global
Namespace | null | null | null | null | cs.DC cs.NI | null | The distribution of files using decentralized, peer-to-peer (P2P) systems,
has significant advantages over centralized approaches. It is however more
difficult to settle on the best approach for file sharing. Most file sharing
systems are based on query string searches, leading to a relatively simple but
inefficient broadcast or to an efficient but relatively complicated index in a
structured environment. In this paper we use a browsable peer-to-peer file
index consisting of files which serve as directory nodes, interconnecting to
form a directory network. We implemented the system based on BitTorrent and
Kademlia. The directory network inherits all of the advantages of
decentralization and provides browsable, efficient searching. To avoid conflict
between users in the P2P system while also imposing no additional restrictions,
we allow multiple versions of each directory node to simultaneously exist --
using popularity as the basis for default browsing behavior. Users can freely
add files and directory nodes to the network. We show, using a simulation of
user behavior and file quality, that the popularity based system consistently
leads users to a high quality directory network; above the average quality of
user updates. Q
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 04:00:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jacobs",
"Thomas",
""
],
[
"Harwood",
"Aaron",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701191 | David Monniaux | David Monniaux (LIENS) | The parallel implementation of the Astr\'{e}e static analyzer | null | APLAS: Programming languages and systems (2005) 86-96 | 10.1007/11575467_7 | null | cs.PL cs.PF | null | The Astr\'{e}e static analyzer is a specialized tool that can prove the
absence of runtime errors, including arithmetic overflows, in large critical
programs. Keeping analysis times reasonable for industrial use is one of the
design objectives. In this paper, we discuss the parallel implementation of the
analysis.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 15:20:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701192 | David Monniaux | David Monniaux (LIENS, Verimag - Imag) | The pitfalls of verifying floating-point computations | null | ACM Transactions on Programming Languages and Systems 30, 3 (2008)
12 | 10.1145/1353445.1353446 | null | cs.PL cs.NA | null | Current critical systems commonly use a lot of floating-point computations,
and thus the testing or static analysis of programs containing floating-point
operators has become a priority. However, correctly defining the semantics of
common implementations of floating-point is tricky, because semantics may
change with many factors beyond source-code level, such as choices made by
compilers. We here give concrete examples of problems that can appear and
solutions to implement in analysis software.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 16:26:50 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 09:12:02 GMT"
},
{
"version": "v3",
"created": "Sat, 30 Jun 2007 05:50:12 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Oct 2007 09:47:55 GMT"
},
{
"version": "v5",
"created": "Thu, 22 May 2008 09:35:12 GMT"
}
] | 2008-05-22T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS, Verimag - Imag"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0701193 | David Monniaux | Bruno Blanchet (LIENS), Patrick Cousot (LIENS), Radhia Cousot (STIX),
Jer\^ome Feret (LIENS), Laurent Mauborgne (LIENS), Antoine Min\'e (LIENS),
David Monniaux (LIENS), Xavier Rival (LIENS) | A Static Analyzer for Large Safety-Critical Software | null | PLDI: Conference on Programming Language Design and Implementation
(2003) 196 - 207 | 10.1145/781131.781153 | null | cs.PL cs.PF | null | We show that abstract interpretation-based static program analysis can be
made efficient and precise enough to formally verify a class of properties for
a family of large programs with few or no false alarms. This is achieved by
refinement of a general purpose static analyzer and later adaptation to
particular programs of the family by the end-user through parametrization. This
is applied to the proof of soundness of data manipulation operations at the
machine level for periodic synchronous safety critical embedded software. The
main novelties are the design principle of static analyzers by refinement and
adaptation through parametrization, the symbolic manipulation of expressions to
improve the precision of abstract transfer functions, the octagon, ellipsoid,
and decision tree abstract domains, all with sound handling of rounding errors
in floating point computations, widening strategies (with thresholds, delayed)
and the automatic determination of the parameters (parametrized packing).
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 16:57:14 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Blanchet",
"Bruno",
"",
"LIENS"
],
[
"Cousot",
"Patrick",
"",
"LIENS"
],
[
"Cousot",
"Radhia",
"",
"STIX"
],
[
"Feret",
"Jerôme",
"",
"LIENS"
],
[
"Mauborgne",
"Laurent",
"",
"LIENS"
],
[
"Miné",
"Antoine",
"",
"LIENS"
],
[
"Monniaux",
"David",
"",
"LIENS"
],
[
"Rival",
"Xavier",
"",
"LIENS"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701194 | Andrij Rovenchak | Solomija Buk and Andrij Rovenchak | Menzerath-Altmann Law for Syntactic Structures in Ukrainian | 8 pages; submitted to the Proceedings of the International scientific
conference on Modern Methods in Linguistics held in honour of the anniversary
of Prof. Gabriel L. Altmann (October 23rd and 24th, 2006, Budmerice Castle,
Slovakia) | Glottotheory. Vol. 1, No. 1, pp 10-17 (2008) | 10.1515/glot-2008-0002 | null | cs.CL | null | In the paper, the definition of clause suitable for an automated processing
of a Ukrainian text is proposed. The Menzerath-Altmann law is verified on the
sentence level and the parameters for the dependences of the clause length
counted in words and syllables on the sentence length counted in clauses are
calculated for "Perekhresni Stezhky" ("The Cross-Paths"), a novel by Ivan
Franko.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 16:58:07 GMT"
}
] | 2024-01-04T00:00:00 | [
[
"Buk",
"Solomija",
""
],
[
"Rovenchak",
"Andrij",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0701195 | David Monniaux | David Monniaux (LIENS) | An Abstract Monte-Carlo Method for the Analysis of Probabilistic
Programs | null | POPL: Annual Symposium on Principles of Programming Languages
(2001) 93 - 101 | 10.1145/360204.360211 | null | cs.PL cs.PF | null | We introduce a new method, combination of random testing and abstract
interpretation, for the analysis of programs featuring both probabilistic and
non-probabilistic nondeterminism. After introducing "ordinary" testing, we show
how to combine testing and abstract interpretation and give formulas linking
the precision of the results to the number of iterations. We then discuss
complexity and optimization issues and end with some experimental results.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 17:14:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0701196 | Ye Wang | Ye Wang, Prakash Ishwar and Venkatesh Saligrama | One-bit Distributed Sensing and Coding for Field Estimation in Sensor
Networks | Fixed typos, otherwise same as V2. 27 pages (in one column review
format), 4 figures. Submitted to IEEE Transactions on Signal Processing.
Current version is updated for journal submission: revised author list,
modified formulation and framework. Previous version appeared in Proceedings
of Allerton Conference On Communication, Control, and Computing 2006 | null | 10.1109/TSP.2008.926192 | null | cs.IT math.IT | null | This paper formulates and studies a general distributed field reconstruction
problem using a dense network of noisy one-bit randomized scalar quantizers in
the presence of additive observation noise of unknown distribution. A
constructive quantization, coding, and field reconstruction scheme is developed
and an upper-bound to the associated mean squared error (MSE) at any point and
any snapshot is derived in terms of the local spatio-temporal smoothness
properties of the underlying field. It is shown that when the noise, sensor
placement pattern, and the sensor schedule satisfy certain weak technical
requirements, it is possible to drive the MSE to zero with increasing sensor
density at points of field continuity while ensuring that the per-sensor
bitrate and sensing-related network overhead rate simultaneously go to zero.
The proposed scheme achieves the order-optimal MSE versus sensor density
scaling behavior for the class of spatially constant spatio-temporal fields.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 22:05:19 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jul 2007 19:43:04 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Jul 2007 21:13:42 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Wang",
"Ye",
""
],
[
"Ishwar",
"Prakash",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701197 | Nan Ma | Nan Ma, Ye Wang, and Prakash Ishwar | On Delayed Sequential Coding of Correlated Sources | 35 pages, 7 figures. This work has been submitted to the IEEE for
possible publication. Parts of this work were presented at 2007 Information
Theory and Applications Workshop (ITA'07) and 2007 IEEE International
Symposium on Information Theory (ISIT'07) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by video coding applications, the problem of sequential coding of
correlated sources with encoding and/or decoding frame-delays is studied. The
fundamental tradeoffs between individual frame rates, individual frame
distortions, and encoding/decoding frame-delays are derived in terms of a
single-letter information-theoretic characterization of the rate-distortion
region for general inter-frame source correlations and certain types of
potentially frame specific and coupled single-letter fidelity criteria. The
sum-rate-distortion region is characterized in terms of generalized directed
information measures highlighting their role in delayed sequential source
coding problems. For video sources which are spatially stationary memoryless
and temporally Gauss-Markov, MSE frame distortions, and a sum-rate constraint,
our results expose the optimality of idealized differential predictive coding
among all causal sequential coders, when the encoder uses a positive rate to
describe each frame. Somewhat surprisingly, causal sequential encoding with
one-frame-delayed noncausal sequential decoding can exactly match the
sum-rate-MSE performance of joint coding for all nontrivial MSE-tuples
satisfying certain positive semi-definiteness conditions. Thus, even a single
frame-delay holds potential for yielding significant performance improvements.
Generalizations to higher order Markov sources are also presented and
discussed. A rate-distortion performance equivalence between, causal sequential
encoding with delayed noncausal sequential decoding, and, delayed noncausal
sequential encoding with causal sequential decoding, is also established.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 22:30:59 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Sep 2008 19:53:26 GMT"
}
] | 2008-09-30T00:00:00 | [
[
"Ma",
"Nan",
""
],
[
"Wang",
"Ye",
""
],
[
"Ishwar",
"Prakash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0701198 | Raissa M. D'Souza | R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger and R. D. Kleinberg | Fitting the WHOIS Internet data | Supplemental information for "Emergence of Tempered Preferential
Attachment From Optimization", to appear (open access) PNAS USA, 2007 | null | null | null | cs.NI | null | We consider the RIPE WHOIS Internet data as characterized by the Cooperative
Association for Internet Data Analysis (CAIDA), and show that the Tempered
Preferential Attachment model [1] provides an excellent fit to this data.
[1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 02:51:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"D'Souza",
"R. M.",
""
],
[
"Borgs",
"C.",
""
],
[
"Chayes",
"J. T.",
""
],
[
"Berger",
"N.",
""
],
[
"Kleinberg",
"R. D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0701199 | Stephane Norte | Stephane Norte and Fernando G. Lobo | A Virtual Logo Keyboard for People with Motor Disabilities | 11 pages, 6 figures | null | null | 200701 | cs.HC | null | In our society, people with motor impairments are oftentimes socially
excluded from their environment. This is unfortunate because every human being
should have the possibility to obtain the necessary conditions to live a normal
life. Although there is technology to assist people with motor impairments, few
systems are targeted for programming environments. We have created a system,
called Logo Keyboard, to assist people with motor disabilities to program with
the Logo programming language. With this special keyboard we can help more
people to get involved into computer programming and to develop projects in
different areas.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 16:36:43 GMT"
},
{
"version": "v2",
"created": "Thu, 24 May 2007 20:45:24 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Norte",
"Stephane",
""
],
[
"Lobo",
"Fernando G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0701200 | Francoise Detienne | Fran\c{c}oise Detienne (INRIA) | Reasoning from a schema and from an analog in software code reuse | null | Dans Fourth Workshop on Empirical Studies of Programmers, ESP91
(1991) 5-22 | null | null | cs.SE | null | The activity of design involves the decomposition of problems into
subproblems and the development and evaluation of solutions. In many cases,
solution development is not done from scratch. Designers often evoke and adapt
solutions developed in the past. These solutions may come from an internal
source, i.e. the memory of the designers, and/or from an external source. The
goal of this paper is to analyse the characteristics of the cognitive
mechanisms, the knowledge and the representations involved in the code reuse
activity performed by experienced programmers. More generally, the focus is the
control structure of the reuse activity. Data collected in an experiment in
which programmers had to design programs are analyzed. Two code reuse
situations are distinguished depending on whether or not the processes involved
in reuse start before the elaboration of what acts as a source-solution. Our
analysis highlights the use of reasoning from a schema and from an analog in
the code reuse activity.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 16:41:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Detienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0702001 | Francoise Detienne | Pierre Robillard, Patrick D'Astous, Fran\c{c}oise D\'etienne (INRIA),
Willemien Visser (INRIA) | Measuring Cognitive Activities in Software Engineering | null | Dans ICSE98, 20th International Conference on Software Engineering
(1998) | null | null | cs.HC | null | This paper presents an approach to the study of cognitive activities in
collaborative software development. This approach has been developed by a
multidisciplinary team made up of software engineers and cognitive
psychologists. The basis of this approach is to improve our understanding of
software development by observing professionals at work. The goal is to derive
lines of conduct or good practices based on observations and analyses of the
processes that are naturally used by software engineers. The strategy involved
is derived from a standard approach in cognitive science. It is based on the
videotaping of the activities of software engineers, transcription of the
videos, coding of the transcription, defining categories from the coded
episodes and defining cognitive behaviors or dialogs from the categories. This
project presents two original contributions that make this approach generic in
software engineering. The first contribution is the introduction of a formal
hierarchical coding scheme, which will enable comparison of various types of
observations. The second is the merging of psychological and statistical
analysis approaches to build a cognitive model. The details of this new
approach are illustrated with the initial data obtained from the analysis of
technical review meetings.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 09:01:55 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Robillard",
"Pierre",
"",
"INRIA"
],
[
"D'Astous",
"Patrick",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Visser",
"Willemien",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0702002 | Francoise Detienne | Jean-Marie Burkhardt (INRIA, LEI), Fran\c{c}oise D\'etienne (INRIA),
Susan Wiedenbeck | The Effect of Object-Oriented Programming Expertise in Several
Dimensions of Comprehension Strategies | null | Dans IWPC'98, Sixth International Workshop on Program
Comprehension (1998) | null | null | cs.HC | null | This study analyzes object-oriented (OO) program comprehension by experts and
novices. We examine the effect of expertise in three dimensions of
comprehension strategies: the scope of the comprehension, the top-down versus
bottom-up direction of the processes, and the guidance of the comprehension
activity. Overall, subjects were similar in the scope of their comprehension,
although the experts tended to consult more files. We found strong evidence of
top-down, inference-driven behaviors, as well as multiple guidance in expert
comprehension. We also found evidence of execution-based guidance and less use
of top-down processes in novice comprehension. Guidance by inheritance and
composition relationships in the OO program was not dominant, but nevertheless
played a substantial role in expert program comprehension. However, these
static relationships more closely tied to the OO nature of the program were
exploited poorly by novices. To conclude, these results are discussed with
respect to the literature on procedural program comprehension.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 09:02:17 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Burkhardt",
"Jean-Marie",
"",
"INRIA, LEI"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Wiedenbeck",
"Susan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0702003 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA) | Expert Programming Knowledge: a Schema-Based Approach | null | Psychology of ProgrammingAcademic Press (Ed.) (1990) 205-222 | null | null | cs.HC | null | The topic of this chapter is the role of expert programming knowledge in the
understanding activity. In the "schema-based approach", the role of semantic
structures is emphasized whereas, in the "control-flow approach", the role of
syntactic structures is emphasized. Data which support schema-based models of
understanding are presented. Data which are more consistent with the
"control-flow approach" allow to discuss the limits of the former kind of
models.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 09:02:38 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0702004 | Francoise Detienne | Fran\c{c}oise D\'etienne (INRIA) | What model(s) for program understanding? | null | Dans UCIS'96, Conference on Using Complex Information Systems
(1996) | null | null | cs.HC | null | The first objective of this paper is to present and discuss various types of
models of program understanding. They are discussed in relation to models of
text understanding. The second objective of this paper is to assess the effect
of purpose for reading, or more specifically programming task, on the cognitive
processes involved and representations constructed in program understanding.
This is done in the theoretical framework of van Dijk and Kintsch's model of
text understanding (1983).
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 09:03:19 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0702005 | Francoise Detienne | Jean-Marie Burkhardt (INRIA, LEI), Fran\c{c}oise D\'etienne (INRIA) | An empirical study of software reuse by experts in object-oriented
design | null | Dans INTERACT'95 (1995) | null | null | cs.HC | null | This paper presents an empirical study of the software reuse activity by
expert designers in the context of object-oriented design. Our study focuses on
the three following aspects of reuse : (1) the interaction between some design
processes, e.g. constructing a problem representation, searching for and
evaluating solutions, and reuse processes, i.e. retrieving and using previous
solutions, (2) the mental processes involved in reuse, e.g. example-based
retrieval or bottom-up versus top-down expanding of the solution, and (3) the
mental representations constructed throughout the reuse activity, e.g. dynamic
versus static representations. Some implications of these results for the
specification of software reuse support environments are discussed.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 09:03:59 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Burkhardt",
"Jean-Marie",
"",
"INRIA, LEI"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0702006 | Francoise Detienne | G\'eraldine Martin, Fran\c{c}oise D\'etienne (INRIA), Elisabeth
Lavigne | Negotiation in collaborative assessment of design solutions: an
empirical study on a Concurrent Engineering process | null | Dans CE'2000, International Conference on Concurrent Engineering
(2000) | null | null | cs.HC | null | In Concurrent engineering, design solutions are not only produced by
individuals specialized in a given field. Due to the team nature of the design
activity, solutions are negotiated. Our objective is to analyse the
argumentation processes leading to these negotiated solutions. These processes
take place in the meetings which group together specialists with a co-design
aim. We conducted cognitive ergonomics research work during the definition
phase of an aeronautical design project in which the participants work in
Concurrent Engineering. We recorded, retranscribed and analysed 7
multi-speciality meetings. These meetings were organised, as needed, to assess
the integration of the solutions of each speciality into a global solution. We
found that there are three main design proposal assessment modes which can be
combined in these meetings: (a) analytical assessment mode, (b) comparative
assessment mode (c) analogical assessment mode. Within these assessment modes,
different types of arguments are used. Furthermore we found a typical temporal
negotiation process.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 09:05:13 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Martin",
"Géraldine",
"",
"INRIA"
],
[
"Détienne",
"Françoise",
"",
"INRIA"
],
[
"Lavigne",
"Elisabeth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0702007 | Prasanna Chaporkar | Prasanna Chaporkar, Kimmo Kansanen, Ralf R. M\"uller | Power Optimal Scheduling for Guaranteed Throughput in Multi-access
Fading Channels | null | null | null | null | cs.IT math.IT | null | A power optimal scheduling algorithm that guarantees desired throughput and
bounded delay to each user is developed for fading multi-access multi-band
systems. The optimization is over the joint space of all rate allocation and
coding strategies. The proposed scheduling assigns rates on each band based
only on the current system state, and subsequently uses optimal multi-user
signaling to achieve these rates. The scheduling is computationally simple, and
hence scalable. Due to uplink-downlink duality, all the results extend in
straightforward fashion to the broadcast channels.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 12:02:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chaporkar",
"Prasanna",
""
],
[
"Kansanen",
"Kimmo",
""
],
[
"Müller",
"Ralf R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702008 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | MMSE Optimal Algebraic Space-Time Codes | 5 pages, 1 figure, journal version to appear in IEEE Transactions on
Wireless Communications. Conference version appeared in NCC 2007, IIT Kanpur,
India | null | 10.1109/TWC.2008.070172 | null | cs.IT math.IT | null | Design of Space-Time Block Codes (STBCs) for Maximum Likelihood (ML)
reception has been predominantly the main focus of researchers. However, the ML
decoding complexity of STBCs becomes prohibitive large as the number of
transmit and receive antennas increase. Hence it is natural to resort to a
suboptimal reception technique like linear Minimum Mean Squared Error (MMSE)
receiver. Barbarossa et al and Liu et al have independently derived necessary
and sufficient conditions for a full rate linear STBC to be MMSE optimal, i.e
achieve least Symbol Error Rate (SER). Motivated by this problem, certain
existing high rate STBC constructions from crossed product algebras are
identified to be MMSE optimal. Also, it is shown that a certain class of codes
from cyclic division algebras which are special cases of crossed product
algebras are MMSE optimal. Hence, these STBCs achieve least SER when MMSE
reception is employed and are fully diverse when ML reception is employed.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 13:43:24 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Jul 2007 14:16:44 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702009 | Ramji Venkataramanan | Ramji Venkataramanan, S. Sandeep Pradhan | On Evaluating the Rate-Distortion Function of Sources with Feed-Forward
and the Capacity of Channels with Feedback | 5 pages, Submitted to ISIT 2007. Corrected typos, latest version that
appeared in ISIT 2007 | null | null | null | cs.IT math.IT | null | We study the problem of computing the rate-distortion function for sources
with feed-forward and the capacity for channels with feedback. The formulas
(involving directed information) for the optimal rate-distortion function with
feed-forward and channel capacity with feedback are multi-letter expressions
and cannot be computed easily in general. In this work, we derive conditions
under which these can be computed for a large class of sources/channels with
memory and distortion/cost measures. Illustrative examples are also provided.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 14:31:51 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jul 2007 11:18:40 GMT"
}
] | 2007-07-18T00:00:00 | [
[
"Venkataramanan",
"Ramji",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702010 | Jacques Carette | Jacques Carette | A canonical form for some piecewise defined functions | submitted to ISSAC 2007 | null | null | null | cs.SC cs.MS | null | We define a canonical form for piecewise defined functions. We show that this
has a wider range of application as well as better complexity properties than
previous work.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 17:54:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carette",
"Jacques",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0702011 | Riccardo Pucella | Joseph Y. Halpern, Riccardo Pucella | Dealing With Logical Omniscience: Expressiveness and Pragmatics | 24 pages. Submitted for publication | null | null | null | cs.LO cs.AI | null | We examine four approaches for dealing with the logical omniscience problem
and their potential applicability: the syntactic approach, awareness,
algorithmic knowledge, and impossible possible worlds. Although in some
settings these approaches are equi-expressive and can capture all epistemic
states, in other settings of interest (especially with probability in the
picture), we show that they are not equi-expressive. We then consider the
pragmatics of dealing with logical omniscience-- how to choose an approach and
construct an appropriate model.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 20:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702012 | Daria Sorokina | Daria Sorokina, Johannes Gehrke, Simeon Warner, Paul Ginsparg | Plagiarism Detection in arXiv | Sixth International Conference on Data Mining (ICDM'06), Dec 2006 | null | 10.1109/ICDM.2006.126 | null | cs.DB cs.DL cs.IR | null | We describe a large-scale application of methods for finding plagiarism in
research document collections. The methods are applied to a collection of
284,834 documents collected by arXiv.org over a 14 year period, covering a few
different research disciplines. The methodology efficiently detects a variety
of problematic author behaviors, and heuristics are developed to reduce the
number of false positives. The methods are also efficient enough to implement
as a real-time submission screen for a collection many times larger.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 20:52:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sorokina",
"Daria",
""
],
[
"Gehrke",
"Johannes",
""
],
[
"Warner",
"Simeon",
""
],
[
"Ginsparg",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702013 | Leonid Gurvits | Leonid Gurvits | A polynomial time algorithm to approximate the mixed volume within a
simply exponential factor | a journal version, accepted to Discrete and Computational Geometry | null | null | null | cs.CG cs.CC math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let ${\bf K} = (K_1, ..., K_n)$ be an $n$-tuple of convex compact subsets in
the Euclidean space $\R^n$, and let $V(\cdot)$ be the Euclidean volume in
$\R^n$. The Minkowski polynomial $V_{{\bf K}}$ is defined as $V_{{\bf
K}}(\lambda_1, ... ,\lambda_n) = V(\lambda_1 K_1 +, ..., + \lambda_n K_n)$ and
the mixed volume $V(K_1, ..., K_n)$ as $$ V(K_1, ..., K_n) =
\frac{\partial^n}{\partial \lambda_1...\partial \lambda_n} V_{{\bf
K}}(\lambda_1 K_1 +, ..., + \lambda_n K_n). $$ Our main result is a poly-time
algorithm which approximates $V(K_1, ..., K_n)$ with multiplicative error $e^n$
and with better rates if the affine dimensions of most of the sets $K_i$ are
small. Our approach is based on a particular approximation of $\log(V(K_1, ...,
K_n))$ by a solution of some convex minimization problem. We prove the mixed
volume analogues of the Van der Waerden and Schrijver-Valiant conjectures on
the permanent. These results, interesting on their own, allow us to justify the
abovementioned approximation by a convex minimization, which is solved using
the ellipsoid method and a randomized poly-time time algorithm for the
approximation of the volume of a convex set.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 01:09:36 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Apr 2007 01:13:42 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Oct 2007 02:07:20 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Jan 2009 23:10:13 GMT"
}
] | 2009-01-19T00:00:00 | [
[
"Gurvits",
"Leonid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0702014 | Alexandros Dimakis | Constantinos Daskalakis, Alexandros G. Dimakis, Richard M. Karp,
Martin J. Wainwright | Probabilistic Analysis of Linear Programming Decoding | To appear, IEEE Transactions on Information Theory, (replaces shorter
version that appeared in SODA'07) | null | 10.1109/TIT.2008.926452 | null | cs.IT cs.DM math.IT | null | We initiate the probabilistic analysis of linear programming (LP) decoding of
low-density parity-check (LDPC) codes. Specifically, we show that for a random
LDPC code ensemble, the linear programming decoder of Feldman et al. succeeds
in correcting a constant fraction of errors with high probability. The fraction
of correctable errors guaranteed by our analysis surpasses previous
non-asymptotic results for LDPC codes, and in particular exceeds the best
previous finite-length result on LP decoding by a factor greater than ten. This
improvement stems in part from our analysis of probabilistic bit-flipping
channels, as opposed to adversarial channels. At the core of our analysis is a
novel combinatorial characterization of LP decoding success, based on the
notion of a generalized matching. An interesting by-product of our analysis is
to establish the existence of ``probabilistic expansion'' in random bipartite
graphs, in which one requires only that almost every (as opposed to every) set
of a certain size expands, for sets much larger than in the classical
worst-case setting.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 06:30:48 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Mar 2008 04:13:09 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Karp",
"Richard M.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702015 | Alexandros Dimakis | Alexandros G. Dimakis, P. Brighten Godfrey, Martin J. Wainwright,
Kannan Ramchandran | Network Coding for Distributed Storage Systems | To appear in INFOCOM 2007 | null | null | null | cs.IT cs.NI math.IT | null | Peer-to-peer distributed storage systems provide reliable access to data
through redundancy spread over nodes across the Internet. A key goal is to
minimize the amount of bandwidth used to maintain that redundancy. Storing a
file using an erasure code, in fragments spread across nodes, promises to
require less redundancy and hence less maintenance bandwidth than simple
replication to provide the same level of reliability. However, since fragments
must be periodically replaced as nodes fail, a key question is how to generate
a new fragment in a distributed way while transferring as little data as
possible across the network.
In this paper, we introduce a general technique to analyze storage
architectures that combine any form of coding and replication, as well as
presenting two new schemes for maintaining redundancy using erasure codes.
First, we show how to optimally generate MDS fragments directly from existing
fragments in the system. Second, we introduce a new scheme called Regenerating
Codes which use slightly larger fragments than MDS but have lower overall
bandwidth use. We also show through simulation that in realistic environments,
Regenerating Codes can reduce maintenance bandwidth use by 25 percent or more
compared with the best previous design--a hybrid of replication and erasure
codes--while simplifying system architecture.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 06:55:37 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Dimakis",
"Alexandros G.",
""
],
[
"Godfrey",
"P. Brighten",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Ramchandran",
"Kannan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702016 | Bruno Courcelle | Bruno Courcelle (LaBRI) | A multivariate interlace polynomial | Draft version ; will be expanded before submission to a journal | Electronic Journal of Combinatories 15, 1 (2008) R69 | null | null | cs.LO cs.DM | null | We define a multivariate polynomial that generalizes several interlace
polynomials defined by Arratia, Bollobas and Sorkin on the one hand, and Aigner
and van der Holst on the other. We follow the route traced by Sokal, who
defined a multivariate generalization of Tutte's polynomial. We also show that
bounded portions of our interlace polynomial can be evaluated in polynomial
time for graphs of bounded clique-width. Its full evaluation is necessarly
exponential just because of the size of the result.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 12:38:50 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 11:48:49 GMT"
}
] | 2008-05-29T00:00:00 | [
[
"Courcelle",
"Bruno",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702017 | Tor Aulin | Tor M. Aulin | Comment on Improved Analysis of List Decoding and Its Application to
Convolutional Codes and Turbo Codes | 3 pages | null | null | null | cs.IT math.IT | null | In a recent paper [1] an improved analysis concerning the analysis of List
Decoding was presented. The event that the correct codeword is excluded from
the list is central. For the additive white Gaussian noise (AWGN) channel an
important quantity is the in [1] called effective Euclidean distance. This was
earlier considered in [2] under the name Vector Euclidean Distance, where also
a simple mathematical expression for this quantity was easily derived for any
list size. In [1], a geometrical analysis gives this when the list size is 1, 2
or 3.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 16:33:54 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Aulin",
"Tor M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702018 | Ioannis Kontoyiannis | M. T. Harrison and I. Kontoyiannis | Estimation of the Rate-Distortion Function | 18 pages, no figures [v2: removed an example with an error; corrected
typos; a shortened version will appear in IEEE Trans. Inform. Theory] | IEEE Transactions on Information Theory, 54 (2008): 3757-3762 | 10.1109/TIT.2008.926387 | null | cs.IT math.IT math.ST stat.TH | null | Motivated by questions in lossy data compression and by theoretical
considerations, we examine the problem of estimating the rate-distortion
function of an unknown (not necessarily discrete-valued) source from empirical
data. Our focus is the behavior of the so-called "plug-in" estimator, which is
simply the rate-distortion function of the empirical distribution of the
observed data. Sufficient conditions are given for its consistency, and
examples are provided to demonstrate that in certain cases it fails to converge
to the true rate-distortion function. The analysis of its performance is
complicated by the fact that the rate-distortion function is not continuous in
the source distribution; the underlying mathematical problem is closely related
to the classical problem of establishing the consistency of maximum likelihood
estimators. General consistency results are given for the plug-in estimator
applied to a broad class of sources, including all stationary and ergodic ones.
A more general class of estimation problems is also considered, arising in the
context of lossy data compression when the allowed class of coding
distributions is restricted; analogous results are developed for the plug-in
estimator in that case. Finally, consistency theorems are formulated for
modified (e.g., penalized) versions of the plug-in, and for estimating the
optimal reproduction distribution.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 18:23:45 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 20:16:53 GMT"
}
] | 2013-01-18T00:00:00 | [
[
"Harrison",
"M. T.",
""
],
[
"Kontoyiannis",
"I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0702019 | Maxime Gariel | Maxime Gariel, John-Paul Clarke and Eric Feron | A Dynamic I/O Model for TRACON Traffic Management | 16 pages, 19 figures eps | null | null | null | cs.OH | null | This work investigates the TRACON flow management around a major airport.
Aircraft flows are analyzed through a study of TRACON trajectories records.
Rerouting and queuing processes are highlighted and airport characteristics are
shown as function of the number of planes in the TRACON. Then, a simple
input-output TRACON queuing and landing model is proposed. This model is
calibrated and validated using available TRACON data. It reproduces the same
phenomenon as the real system. This model is used to show the impact of
limiting the number of aircrafts in the TRACON. A limited number of aircraft
does not increase delays but reduces the controller's workload and increases
safety.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 22:55:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gariel",
"Maxime",
""
],
[
"Clarke",
"John-Paul",
""
],
[
"Feron",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0702020 | Qinqin Yang | Qinqin Yang and Zhongping Qin | Construction of Minimal Tail-Biting Trellises for Codes over Finite
Abelian Groups | 11 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | A definition of atomic codeword for a group code is presented. Some
properties of atomic codewords of group codes are investigated. Using these
properties, it is shown that every minimal tail-biting trellis for a group code
over a finite abelian group can be constructed from its characteristic
generators, which extends the work of Koetter and Vardy who treated the case of
a linear code over a field. We also present an efficient algorithm for
constructing the minimal tail-biting trellis of a group code over a finite
abelian group, given a generator matrix.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 16:41:12 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Feb 2007 03:43:53 GMT"
},
{
"version": "v3",
"created": "Thu, 17 May 2007 06:24:07 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Yang",
"Qinqin",
""
],
[
"Qin",
"Zhongping",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702021 | Sherman Wang Dr. | Xing M. Wang | Probability Bracket Notation, Probability Vectors, Markov Chains and
Stochastic Processes | 36 pages; two tables | null | null | null | cs.OH math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dirac notation has been widely used for vectors in Hilbert spaces of Quantum
Theories and now also in Information Retrieval. In this paper, we propose to
use Probability Bracket Notation (PBN) for probability modeling. The new
symbols are defined similarly (but not identically) as in Dirac notation. By
using PBN to represent fundamental definitions and theorems for discrete and
continuous random variables, we show that PBN could play a similar role in
probability sample space as Dirac notation in Hilbert space. We also find a
close relation between our system state P-kets and probability vectors in
Markov chains. In the end, we apply PBN to some important stochastic processes,
present the master equation of time-continuous Markov chains in both
Schrodinger and Heisenberg pictures. We identify our system state P-bra with
Doi's state function and Peliti's standard bra. We summarize the similarities
and differences between PBN and Dirac Notation in the two tables of Appendix A.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 03:58:50 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Feb 2007 22:26:11 GMT"
},
{
"version": "v3",
"created": "Sun, 11 Mar 2007 18:11:27 GMT"
},
{
"version": "v4",
"created": "Fri, 27 Apr 2007 03:52:13 GMT"
},
{
"version": "v5",
"created": "Tue, 17 Jul 2007 20:34:46 GMT"
},
{
"version": "v6",
"created": "Mon, 29 Oct 2007 03:51:02 GMT"
},
{
"version": "v7",
"created": "Sat, 14 Nov 2009 20:14:58 GMT"
}
] | 2009-11-14T00:00:00 | [
[
"Wang",
"Xing M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0702022 | Changjia Chen | Chunxi Li and Changjia Chen | Gnutella: Topology Dynamics On Phase Space | 11 pages, 14 figures | null | null | null | cs.NI | null | In this paper, the topology dynamic of Gnutella is studied through phase
space. The dynamic changes in peer degree are studied as a time series in two
dimensional phase space which is defined as the number of connected leaves and
the number of connected ultras. The reported degrees are concentrated in three
special Software related regions that we named as Ultra Stable Region, Leaf
Stable Region and Transition Belt. A method is proposed to classify degree
traces in phase space into different classes. Connection churn then is studied
along with the churn in degree. It shows that the topological structure of
Gnutella is rather stable in its connection degree but not the topology itself.
The connection drop rate is estimated and the live time of connections is
inferred afterwards. M/M/m/m loss queue system is introduced to model the
degree keeping process in Gnutella. This model revealed that the degree stable
is ensured by large new connection efforts. In other words the stable in
topological structure of Gnutella is a results of essential unstable in its
topology. That opens a challenge to the basic design philosophy of this
network.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 08:12:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Chunxi",
""
],
[
"Chen",
"Changjia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0702023 | B.Sundar Rajan | Sanjay Karmakar and B.Sundar Rajan | High-rate, Multi-Symbol-Decodable STBCs from Clifford Algebras | 5 pages; Proceedings of Thirteenth National Conference on
Communications (NCC 2007),, IIT Kanpur, January 27-29, 2007, pp.368-372 | null | null | null | cs.IT math.IT | null | It is well known that Space-Time Block Codes (STBCs) obtained from Orthogonal
Designs (ODs) are single-symbol-decodable (SSD) and from Quasi-Orthogonal
Designs (QODs) are double-symbol decodable. However, there are SSD codes that
are not obtainable from ODs and DSD codes that are not obtainable from QODs. In
this paper a method of constructing $g$-symbol decodable ($g$-SD) STBCs using
representations of Clifford algebras are presented which when specialized to
$g=1,2$ gives SSD and DSD codes respectively. For the number of transmit
antennas $2^a$ the rate (in complex symbols per channel use) of the $g$-SD
codes presented in this paper is $\frac{a+1-g}{2^{a-g}}$. The maximum rate of
the DSD STBCs from QODs reported in the literature is $\frac{a}{2^{a-1}}$ which
is smaller than the rate $\frac{a-1}{2^{a-2}}$ of the DSD codes of this paper,
for $2^a$ transmit antennas. In particular, the reported DSD codes for 8 and 16
transmit antennas offer rates 1 and 3/4 respectively whereas the known STBCs
from QODs offer only 3/4 and 1/2 respectively. The construction of this paper
is applicable for any number of transmit antennas.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 13:07:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Karmakar",
"Sanjay",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702024 | Michael Chertkov | M. Chertkov (Los Alamos), M. Stepanov (UA, Tucson) | Searching for low weight pseudo-codewords | 7 pages, 6 figures, proceedings of ITA'07, San Diego | null | null | LA-UR # 07-0509 | cs.IT math.IT | null | Belief Propagation (BP) and Linear Programming (LP) decodings of Low Density
Parity Check (LDPC) codes are discussed. We summarize results of
instanton/pseudo-codeword approach developed for analysis of the error-floor
domain of the codes. Instantons are special, code and decoding specific,
configurations of the channel noise contributing most to the Frame-Error-Rate
(FER). Instantons are decoded into pseudo-codewords. Instanton/pseudo-codeword
with the lowest weight describes the largest Signal-to-Noise-Ratio (SNR)
asymptotic of FER, while the whole spectra of the low weight instantons is
descriptive of the FER vs SNR profile in the extended error-floor domain.
First, we describe a general optimization method that allows to find the
instantons for any coding/decoding. Second, we introduce LP-specific
pseudo-codeword search algorithm that allows efficient calculations of the
pseudo-codeword spectra. Finally, we discuss results of combined BP/LP
error-floor exploration experiments for two model codes.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 22:31:33 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 13:07:47 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Chertkov",
"M.",
"",
"Los Alamos"
],
[
"Stepanov",
"M.",
"",
"UA, Tucson"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702025 | Markus P\"uschel | Markus Pueschel and Jose M. F. Moura | Algebraic Signal Processing Theory: Cooley-Tukey Type Algorithms for
DCTs and DSTs | 31 pages, more information at http://www.ece.cmu.edu/~smart | IEEE Transactions on Signal Processing, Vol. 56, No. 4, pp.
1502-1521, 2008 | 10.1109/TSP.2007.907919 | null | cs.IT cs.DS math.IT | null | This paper presents a systematic methodology based on the algebraic theory of
signal processing to classify and derive fast algorithms for linear transforms.
Instead of manipulating the entries of transform matrices, our approach derives
the algorithms by stepwise decomposition of the associated signal models, or
polynomial algebras. This decomposition is based on two generic methods or
algebraic principles that generalize the well-known Cooley-Tukey FFT and make
the algorithms' derivations concise and transparent. Application to the 16
discrete cosine and sine transforms yields a large class of fast algorithms,
many of which have not been found before.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 23:44:34 GMT"
}
] | 2020-01-29T00:00:00 | [
[
"Pueschel",
"Markus",
""
],
[
"Moura",
"Jose M. F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702026 | Ravi Gautam | Ravi Shankar Gautam | Shape preservation behavior of spline curves | 54 pages | null | null | null | cs.GR | null | Shape preservation behavior of a spline consists of criterial conditions for
preserving convexity, inflection, collinearity, torsion and coplanarity shapes
of data polgonal arc. We present our results which acts as an improvement in
the definitions of and provide geometrical insight into each of the above shape
preservation criteria. We also investigate the effect of various results from
the literature on various shape preservation criteria. These results have not
been earlier refered in the context of shape preservation behaviour of splines.
We point out that each curve segment need to satisfy more than one shape
preservation criteria. We investigate the conflict between different shape
preservation criteria 1)on each curve segment and 2)of adjacent curve segments.
We derive simplified formula for shape preservation criteria for cubic curve
segments. We study the shape preservation behavior of cubic Catmull-Rom splines
and see that, though being very simple spline curve, it indeed satisfy all the
shape preservation criteria.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 10:11:58 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Gautam",
"Ravi Shankar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0702027 | Andrew Gacek | Andrew Gacek | The Suspension Calculus and its Relationship to Other Explicit
Treatments of Substitution in Lambda Calculi | 84 pages | null | null | null | cs.LO cs.PL | null | The intrinsic treatment of binding in the lambda calculus makes it an ideal
data structure for representing syntactic objects with binding such as
formulas, proofs, types, and programs. Supporting such a data structure in an
implementation is made difficult by the complexity of the substitution
operation relative to lambda terms. In this paper we present the suspension
calculus, an explicit treatment of meta level binding in the lambda calculus.
We prove properties of this calculus which make it a suitable replacement for
the lambda calculus in implementation. Finally, we compare the suspension
calculus with other explicit treatments of substitution.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 14:35:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gacek",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0702028 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | Uniform and Partially Uniform Redistribution Rules | 4 pages; "Advances and Applications of DSmT for Plausible and
Paradoxical reasoning for Information Fusion", International Workshop
organized by the Bulgarian IST Centre of Competence in 21st Century, December
14, 2006, Bulg. Acad. of Sciences, Sofia, Bulgaria | International Journal of Uncertainty, Fuzziness and
Knowledge-Based Systems (IJUFKS), World Scientific, Vol. 19, No. 6, 921-937,
2011 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short paper introduces two new fusion rules for combining quantitative
basic belief assignments. These rules although very simple have not been
proposed in literature so far and could serve as useful alternatives because of
their low computation cost with respect to the recent advanced Proportional
Conflict Redistribution rules developed in the DSmT framework.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 14:56:49 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2011 14:06:14 GMT"
}
] | 2011-12-05T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702029 | Mikkel Thorup | Mario Szegedy and Mikkel Thorup | On the variance of subset sum estimation | 20 pages, 1 figure | null | null | null | cs.DS | null | For high volume data streams and large data warehouses, sampling is used for
efficient approximate answers to aggregate queries over selected subsets.
Mathematically, we are dealing with a set of weighted items and want to support
queries to arbitrary subset sums. With unit weights, we can compute subset
sizes which together with the previous sums provide the subset averages. The
question addressed here is which sampling scheme we should use to get the most
accurate subset sum estimates.
We present a simple theorem on the variance of subset sum estimation and use
it to prove variance optimality and near-optimality of subset sum estimation
with different known sampling schemes. This variance is measured as the average
over all subsets of any given size. By optimal we mean there is no set of input
weights for which any sampling scheme can have a better average variance. Such
powerful results can never be established experimentally. The results of this
paper are derived mathematically. For example, we show that appropriately
weighted systematic sampling is simultaneously optimal for all subset sizes.
More standard schemes such as uniform sampling and
probability-proportional-to-size sampling with replacement can be arbitrarily
bad.
Knowing the variance optimality of different sampling schemes can help
deciding which sampling scheme to apply in a given context.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 15:55:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szegedy",
"Mario",
""
],
[
"Thorup",
"Mikkel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702030 | Nihar Jindal | Nihar Jindal, Jeffrey Andrews, Steven Weber | Optimizing the SINR operating point of spatial networks | Presented at Information Theory and Applications Workshop, UC San
Diego, January 2007. 7 pages | null | null | null | cs.IT math.IT | null | This paper addresses the following question, which is of interest in the
design and deployment of a multiuser decentralized network. Given a total
system bandwidth of W Hz and a fixed data rate constraint of R bps for each
transmission, how many frequency slots N of size W/N should the band be
partitioned into to maximize the number of simultaneous transmissions in the
network? In an interference-limited ad-hoc network, dividing the available
spectrum results in two competing effects: on the positive side, it reduces the
number of users on each band and therefore decreases the interference level
which leads to an increased SINR, while on the negative side the SINR
requirement for each transmission is increased because the same information
rate must be achieved over a smaller bandwidth. Exploring this tradeoff between
bandwidth and SINR and determining the optimum value of N in terms of the
system parameters is the focus of the paper. Using stochastic geometry, we
analytically derive the optimal SINR threshold (which directly corresponds to
the optimal spectral efficiency) on this tradeoff curve and show that it is a
function of only the path loss exponent. Furthermore, the optimal SINR point
lies between the low-SINR (power-limited) and high-SINR (bandwidth-limited)
regimes. In order to operate at this optimal point, the number of frequency
bands (i.e., the reuse factor) should be increased until the threshold SINR,
which is an increasing function of the reuse factor, is equal to the optimal
value.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 17:08:42 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Jindal",
"Nihar",
""
],
[
"Andrews",
"Jeffrey",
""
],
[
"Weber",
"Steven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702031 | Nihar Jindal | Giuseppe Caire, Nihar Jindal, Mari Kobayashi, Niranjay Ravindran | Quantized vs. Analog Feedback for the MIMO Downlink: A Comparison
between Zero-Forcing Based Achievable Rates | Submitted to ISIT, January 2007. 5 pages | null | null | null | cs.IT math.IT | null | We consider a MIMO fading broadcast channel and compare the achievable
ergodic rates when the channel state information at the transmitter is provided
by analog noisy feedback or by quantized (digital) feedback. The superiority of
digital feedback is shown, with perfect or imperfect CSIR, whenever the number
of feedback channel uses per channel coefficient is larger than 1. Also, we
show that by proper design of the digital feedback link, errors in the feedback
have a minor effect even by using very simple uncoded modulation. Finally, we
show that analog feedback achieves a fraction 1 - 2F of the optimal
multiplexing gain even in the presence of a feedback delay, when the fading
belongs to the class of Doppler processes with normalized maximum Doppler
frequency shift 0 <= F <= 1/2.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 17:24:13 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Caire",
"Giuseppe",
""
],
[
"Jindal",
"Nihar",
""
],
[
"Kobayashi",
"Mari",
""
],
[
"Ravindran",
"Niranjay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702032 | Reid Andersen | Reid Andersen | Finding large and small dense subgraphs | 12 pages, no figures | null | null | null | cs.DS | null | We consider two optimization problems related to finding dense subgraphs. The
densest at-least-k-subgraph problem (DalkS) is to find an induced subgraph of
highest average degree among all subgraphs with at least k vertices, and the
densest at-most-k-subgraph problem (DamkS) is defined similarly. These problems
are related to the well-known densest k-subgraph problem (DkS), which is to
find the densest subgraph on exactly k vertices. We show that DalkS can be
approximated efficiently, while DamkS is nearly as hard to approximate as the
densest k-subgraph problem.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 19:29:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andersen",
"Reid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702033 | Alexander Barg | Alexander Barg and Punarbasu Purkayastha | Bounds on ordered codes and orthogonal arrays | Final version, minor corrections | Moscow Mathematical Journal, vol. 9, no. 2, 2009, pp. 211-243. | null | null | cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive new estimates of the size of codes and orthogonal arrays in the
ordered Hamming space (the Niederreiter-Rosenbloom-Tsfasman space). We also
show that the eigenvalues of the ordered Hamming scheme, the association scheme
that describes the combinatorics of the space, are given by the multivariable
Krawtchouk polynomials, and establish some of their properties.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 21:37:03 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 2008 14:08:04 GMT"
},
{
"version": "v3",
"created": "Fri, 10 Jul 2009 23:24:43 GMT"
}
] | 2009-07-20T00:00:00 | [
[
"Barg",
"Alexander",
""
],
[
"Purkayastha",
"Punarbasu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702034 | Rama Raghavan | L.Jeganathan and R.Rama | Graph Splicing System | 13 pages,5 figures | null | null | null | cs.DM | null | The string splicing was introduced by Tom Head which stands as an abstract
model for the DNA recombination under the influence of restriction enzymes. The
complex chemical process of three dimensional molecules in three dimensional
space can be modeled using graphs. The graph splicing systems which were
studied so far, can only be applied to a particular type of graphs which could
be interpreted as linear or circular graphs. In this paper, we take a different
and a novel approach to splice two graphs and introduce a splicing system for
graphs that can be applied to all types of graphs. Splicing two graphs can be
thought of as a new operation, among the graphs, that generates many new graphs
from the given two graphs. Taking a different line of thinking, some of the
graph theoretical results of the splicing are studied.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 05:46:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jeganathan",
"L.",
""
],
[
"Rama",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702035 | Samar Agnihotri | Samar Agnihotri | New Models for the Correlation in Sensor Data | 3 pages, 2 figures | null | null | null | cs.IT math.IT | null | In this paper, we propose two new models of spatial correlations in sensor
data in a data-gathering sensor network. A particular property of these models
is that if a sensor node knows in \textit{how many} bits it needs to transmit
its data, then it also knows \textit{which} bits of its data it needs to
transmit.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 09:22:25 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Agnihotri",
"Samar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702036 | Michael Fisher | Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa | Efficient First-Order Temporal Logic for Infinite-State Systems | 16 pages, 2 figures | null | null | null | cs.LO | null | In this paper we consider the specification and verification of
infinite-state systems using temporal logic. In particular, we describe
parameterised systems using a new variety of first-order temporal logic that is
both powerful enough for this form of specification and tractable enough for
practical deductive verification. Importantly, the power of the temporal
language allows us to describe (and verify) asynchronous systems, communication
delays and more complex properties such as liveness and fairness properties.
These aspects appear difficult for many other approaches to infinite-state
verification.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 15:10:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dixon",
"Clare",
""
],
[
"Fisher",
"Michael",
""
],
[
"Konev",
"Boris",
""
],
[
"Lisitsa",
"Alexei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702037 | Minkyu Kim | Minkyu Kim, Muriel Medard, Varun Aggarwal, Una-May O'Reilly, Wonsik
Kim, Chang Wook Ahn, Michelle Effros | Evolutionary Approaches to Minimizing Network Coding Resources | 9 pages, 6 figures, accepted to the 26th Annual IEEE Conference on
Computer Communications (INFOCOM 2007) | null | 10.1109/INFCOM.2007.231 | null | cs.NI cs.IT math.IT | null | We wish to minimize the resources used for network coding while achieving the
desired throughput in a multicast scenario. We employ evolutionary approaches,
based on a genetic algorithm, that avoid the computational complexity that
makes the problem NP-hard. Our experiments show great improvements over the
sub-optimal solutions of prior methods. Our new algorithms improve over our
previously proposed algorithm in three ways. First, whereas the previous
algorithm can be applied only to acyclic networks, our new method works also
with networks with cycles. Second, we enrich the set of components used in the
genetic algorithm, which improves the performance. Third, we develop a novel
distributed framework. Combining distributed random network coding with our
distributed optimization yields a network coding protocol where the resources
used for coding are optimized in the setup phase by running our evolutionary
algorithm at each node of the network. We demonstrate the effectiveness of our
approach by carrying out simulations on a number of different sets of network
topologies.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 05:29:25 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Kim",
"Minkyu",
""
],
[
"Medard",
"Muriel",
""
],
[
"Aggarwal",
"Varun",
""
],
[
"O'Reilly",
"Una-May",
""
],
[
"Kim",
"Wonsik",
""
],
[
"Ahn",
"Chang Wook",
""
],
[
"Effros",
"Michelle",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702038 | Minkyu Kim | Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard, Wonsik
Kim | Genetic Representations for Evolutionary Minimization of Network Coding
Resources | 10 pages, 3 figures, accepted to the 4th European Workshop on the
Application of Nature-Inspired Techniques to Telecommunication Networks and
Other Connected Systems (EvoCOMNET 2007) | null | null | null | cs.NE cs.NI | null | We demonstrate how a genetic algorithm solves the problem of minimizing the
resources used for network coding, subject to a throughput constraint, in a
multicast scenario. A genetic algorithm avoids the computational complexity
that makes the problem NP-hard and, for our experiments, greatly improves on
sub-optimal solutions of established methods. We compare two different genotype
encodings, which tradeoff search space size with fitness landscape, as well as
the associated genetic operators. Our finding favors a smaller encoding despite
its fewer intermediate solutions and demonstrates the impact of the modularity
enforced by genetic operators on the performance of the algorithm.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 05:54:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Minkyu",
""
],
[
"Aggarwal",
"Varun",
""
],
[
"O'Reilly",
"Una-May",
""
],
[
"Medard",
"Muriel",
""
],
[
"Kim",
"Wonsik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0702039 | Xavier Goaoc | Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas
Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA) | Hadwiger and Helly-type theorems for disjoint unit spheres | null | Discrete and Computational Geometry (2006) | null | null | cs.CG | null | We prove Helly-type theorems for line transversals to disjoint unit balls in
$\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit
balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the
balls, any subfamily of 2d balls admits a line transversal consistent with
$\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in
$\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a
transversal.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 08:29:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
"",
"INRIA Lorraine - LORIA"
],
[
"Goaoc",
"Xavier",
"",
"INRIA Lorraine - LORIA"
],
[
"Holmsen",
"Andreas",
"",
"INRIA Lorraine - LORIA"
],
[
"Petitjean",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0702040 | Yves Guiraud | Yves Guiraud | Polygraphs for termination of left-linear term rewriting systems | 15 pages | null | null | null | cs.LO math.CT | null | We present a methodology for proving termination of left-linear term
rewriting systems (TRSs) by using Albert Burroni's polygraphs, a kind of
rewriting systems on algebraic circuits. We translate the considered TRS into a
polygraph of minimal size whose termination is proven with a polygraphic
interpretation, then we get back the property on the TRS. We recall Yves
Lafont's general translation of TRSs into polygraphs and known links between
their termination properties. We give several conditions on the original TRS,
including being a first-order functional program, that ensure that we can
reduce the size of the polygraphic translation. We also prove sufficient
conditions on the polygraphic interpretations of a minimal translation to imply
termination of the original TRS. Examples are given to compare this method with
usual polynomial interpretations.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 10:18:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
cs/0702041 | Robert Brijder | Robert Brijder and Hendrik Jan Hoogeboom | The Fibers and Range of Reduction Graphs in Ciliates | 24 pages, 13 figures | Acta Informatica, Volume 45, Number 5 / July, 2008, Pages 383-402 | 10.1007/s00236-008-0074-3 | LIACS Technical Report 2007-01 | cs.LO | null | The biological process of gene assembly has been modeled based on three types
of string rewriting rules, called string pointer rules, defined on so-called
legal strings. It has been shown that reduction graphs, graphs that are based
on the notion of breakpoint graph in the theory of sorting by reversal, for
legal strings provide valuable insights into the gene assembly process. We
characterize which legal strings obtain the same reduction graph (up to
isomorphism), and moreover we characterize which graphs are (isomorphic to)
reduction graphs.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 12:59:22 GMT"
}
] | 2008-11-24T00:00:00 | [
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.