id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0702042 | Jo\~ao Barros | Luis Lopes, Francisco Martins, Miguel S. Silva, Joao Barros | A Formal Model for Programming Wireless Sensor Networks | 14 pages, 0 figures, Submitted for Publication | null | null | null | cs.DC cs.PL | null | In this paper we present new developments in the expressiveness and in the
theory of a Calculus for Sensor Networks (CSN). We combine a network layer of
sensor devices with a local object model to describe sensor devices with state.
The resulting calculus is quite small and yet very expressive. We also present
a type system and a type invariance result for the calculus. These results
provide the fundamental framework for the development of programming languages
and run-time environments.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 14:17:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lopes",
"Luis",
""
],
[
"Martins",
"Francisco",
""
],
[
"Silva",
"Miguel S.",
""
],
[
"Barros",
"Joao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0702043 | Chinh Hoang | Ch\'inh T. Ho\`ang, Marcin Kami\'nski, Vadim Lozin, J. Sawada, X. Shu | Deciding k-colourability of $P_5$-free graphs in polynomial time | null | null | null | null | cs.DS | null | The problem of computing the chromatic number of a $P_5$-free graph is known
to be NP-hard. In contrast to this negative result, we show that determining
whether or not a $P_5$-free graph admits a $k$-colouring, for each fixed number
of colours $k$, can be done in polynomial time. If such a colouring exists, our
algorithm produces it.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 15:29:32 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Hoàng",
"Chính T.",
""
],
[
"Kamiński",
"Marcin",
""
],
[
"Lozin",
"Vadim",
""
],
[
"Sawada",
"J.",
""
],
[
"Shu",
"X.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702044 | Andrew Hunter | Andrew M. Hunter, Jeffrey G. Andrews, Steven Weber | Transmission Capacity of Ad Hoc Networks with Spatial Diversity | 16 pages, 10 figures, to appear in IEEE Transactions on Wireless
Communications | null | 10.1109/T-WC.2008.071047 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper derives the outage probability and transmission capacity of ad hoc
wireless networks with nodes employing multiple antenna diversity techniques,
for a general class of signal distributions. This analysis allows system
performance to be quantified for fading or non-fading environments. The
transmission capacity is given for interference-limited uniformly random
networks on the entire plane with path loss exponent $\alpha>2$ in which nodes
use: (1) static beamforming through $M$ sectorized antennas, for which the
increase in transmission capacity is shown to be $\Theta(M^2)$ if the antennas
are without sidelobes, but less in the event of a nonzero sidelobe level; (2)
dynamic eigen-beamforming (maximal ratio transmission/combining), in which the
increase is shown to be $\Theta(M^{\frac{2}{\alpha}})$; (3) various transmit
antenna selection and receive antenna selection combining schemes, which give
appreciable but rapidly diminishing gains; and (4) orthogonal space-time block
coding, for which there is only a small gain due to channel hardening,
equivalent to Nakagami-$m$ fading for increasing $m$. It is concluded that in
ad hoc networks, static and dynamic beamforming perform best, selection
combining performs well but with rapidly diminishing returns with added
antennas, and that space-time block coding offers only marginal gains.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 00:03:14 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Aug 2008 05:27:34 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Hunter",
"Andrew M.",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Weber",
"Steven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702045 | Raul Etkin | Raul Etkin, David Tse, Hua Wang | Gaussian Interference Channel Capacity to Within One Bit | null | null | null | null | cs.IT math.IT | null | The capacity of the two-user Gaussian interference channel has been open for
thirty years. The understanding on this problem has been limited. The best
known achievable region is due to Han-Kobayashi but its characterization is
very complicated. It is also not known how tight the existing outer bounds are.
In this work, we show that the existing outer bounds can in fact be arbitrarily
loose in some parameter ranges, and by deriving new outer bounds, we show that
a simplified Han-Kobayashi type scheme can achieve to within a single bit the
capacity for all values of the channel parameters. We also show that the scheme
is asymptotically optimal at certain high SNR regimes. Using our results, we
provide a natural generalization of the point-to-point classical notion of
degrees of freedom to interference-limited scenarios.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 22:15:51 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Feb 2007 19:54:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Etkin",
"Raul",
""
],
[
"Tse",
"David",
""
],
[
"Wang",
"Hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702046 | Shenghui Su | Shenghui Su and Shuwang Lv | Design and Analysis of the REESSE1+ Public Key Cryptosystem v2.21 | 21 pages | Theoretical Computer Science, v426-427, Apr. 2012, pp. 91-117 | null | null | cs.CR cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the authors give the definitions of a coprime sequence and a
lever function, and describe the five algorithms and six characteristics of a
prototypal public key cryptosystem which is used for encryption and signature,
and based on three new problems and one existent problem: the multivariate
permutation problem (MPP), the anomalous subset product problem (ASPP), the
transcendental logarithm problem (TLP), and the polynomial root finding problem
(PRFP). Prove by reduction that MPP, ASPP, and TLP are computationally at least
equivalent to the discrete logarithm problem (DLP) in the same prime field, and
meanwhile find some evidence which inclines people to believe that the new
problems are harder than DLP each, namely unsolvable in DLP subexponential
time. Demonstrate the correctness of the decryption and the verification,
deduce the probability of a plaintext solution being nonunique is nearly zero,
and analyze the exact securities of the cryptosystem against recovering a
plaintext from a ciphertext, extracting a private key from a public key or a
signature, and forging a signature through known signatures, public keys, and
messages on the assumption that IFP, DLP, and LSSP can be solved. Studies
manifest that the running times of effectual attack tasks are greater than or
equal to O(2^n) so far when n = 80, 96, 112, or 128 with lgM = 696, 864, 1030,
or 1216. As viewed from utility, it should be researched further how to
decrease the length of a modulus and to increase the speed of the decryption.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 15:00:16 GMT"
},
{
"version": "v10",
"created": "Sat, 9 May 2009 03:36:44 GMT"
},
{
"version": "v11",
"created": "Tue, 26 May 2009 01:52:59 GMT"
},
{
"version": "v12",
"created": "Tue, 9 Feb 2010 08:36:25 GMT"
},
{
"version": "v13",
"created": "Sun, 10 Oct 2010 15:54:15 GMT"
},
{
"version": "v14",
"created": "Tue, 25 Jan 2011 03:34:27 GMT"
},
{
"version": "v15",
"created": "Sun, 11 Dec 2011 07:35:13 GMT"
},
{
"version": "v16",
"created": "Sat, 2 Feb 2013 06:43:10 GMT"
},
{
"version": "v17",
"created": "Tue, 23 Sep 2014 02:45:31 GMT"
},
{
"version": "v18",
"created": "Sat, 1 Nov 2014 14:54:31 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Feb 2007 15:44:22 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Oct 2007 03:11:10 GMT"
},
{
"version": "v4",
"created": "Wed, 13 Feb 2008 02:39:59 GMT"
},
{
"version": "v5",
"created": "Mon, 18 Feb 2008 14:15:36 GMT"
},
{
"version": "v6",
"created": "Tue, 11 Mar 2008 09:29:03 GMT"
},
{
"version": "v7",
"created": "Fri, 13 Jun 2008 12:28:56 GMT"
},
{
"version": "v8",
"created": "Thu, 15 Jan 2009 08:49:02 GMT"
},
{
"version": "v9",
"created": "Thu, 19 Feb 2009 18:47:35 GMT"
}
] | 2014-11-04T00:00:00 | [
[
"Su",
"Shenghui",
""
],
[
"Lv",
"Shuwang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702047 | Holger Spakowski | Holger Spakowski and Rahul Tripathi | Hierarchical Unambiguity | null | null | null | null | cs.CC | null | We develop techniques to investigate relativized hierarchical unambiguous
computation. We apply our techniques to generalize known constructs involving
relativized unambiguity based complexity classes (UP and \mathcal{UP}) to new
constructs involving arbitrary higher levels of the relativized unambiguous
polynomial hierarchy (UPH). Our techniques are developed on constraints imposed
by hierarchical arrangement of unambiguous nondeterministic polynomial-time
Turing machines, and so they differ substantially, in applicability and in
nature, from standard methods (such as the switching lemma [Hastad,
Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which
play roles in carrying out similar generalizations.
Aside from achieving these generalizations, we resolve a question posed by
Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises
and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U.
Schoening, editors, Complexity Theory, pages 101-146. Cambridge University
Press, 1993] on an issue related to nonadaptive Turing access to UP and
adaptive smart Turing access to \mathcal{UP}.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 16:00:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spakowski",
"Holger",
""
],
[
"Tripathi",
"Rahul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702048 | Ken Wakita | Ken Wakita and Toshiyuki Tsurumi | Finding Community Structure in Mega-scale Social Networks | 9 pages, 15 figures | null | null | null | cs.CY physics.soc-ph | null | Community analysis algorithm proposed by Clauset, Newman, and Moore (CNM
algorithm) finds community structure in social networks. Unfortunately, CNM
algorithm does not scale well and its use is practically limited to networks
whose sizes are up to 500,000 nodes. The paper identifies that this
inefficiency is caused from merging communities in unbalanced manner. The paper
introduces three kinds of metrics (consolidation ratio) to control the process
of community analysis trying to balance the sizes of the communities being
merged. Three flavors of CNM algorithms are built incorporating those metrics.
The proposed techniques are tested using data sets obtained from existing
social networking service that hosts 5.5 million users. All the methods exhibit
dramatic improvement of execution efficiency in comparison with the original
CNM algorithm and shows high scalability. The fastest method processes a
network with 1 million nodes in 5 minutes and a network with 4 million nodes in
35 minutes, respectively. Another one processes a network with 500,000 nodes in
50 minutes (7 times faster than the original algorithm), finds community
structures that has improved modularity, and scales to a network with 5.5
million.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 16:40:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wakita",
"Ken",
""
],
[
"Tsurumi",
"Toshiyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0702049 | Gregory Gutin | Noga Alon, Fedor Fomin, Gregory Gutin, Michael Krivelevich and Saket
Saurabh | Parameterized Algorithms for Directed Maximum Leaf Problems | null | null | null | null | cs.DS cs.DM | null | We prove that finding a rooted subtree with at least $k$ leaves in a digraph
is a fixed parameter tractable problem. A similar result holds for finding
rooted spanning trees with many leaves in digraphs from a wide family $\cal L$
that includes all strong and acyclic digraphs. This settles completely an open
question of Fellows and solves another one for digraphs in $\cal L$. Our
algorithms are based on the following combinatorial result which can be viewed
as a generalization of many results for a `spanning tree with many leaves' in
the undirected case, and which is interesting on its own: If a digraph $D\in
\cal L$ of order $n$ with minimum in-degree at least 3 contains a rooted
spanning tree, then $D$ contains one with at least $(n/2)^{1/5}-1$ leaves.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 18:25:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Fomin",
"Fedor",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Krivelevich",
"Michael",
""
],
[
"Saurabh",
"Saket",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702050 | Stefan Laendner | Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber | Permutation Decoding and the Stopping Redundancy Hierarchy of Linear
Block Codes | 5 pages, submitted to ISIT 2007; v2: BER/FER curves in Fig. 1 & 2
updated | null | null | null | cs.IT math.IT | null | We investigate the stopping redundancy hierarchy of linear block codes and
its connection to permutation decoding techniques. An element in the ordered
list of stopping redundancy values represents the smallest number of possibly
linearly dependent rows in any parity-check matrix of a code that avoids
stopping sets of a given size. Redundant parity-check equations can be shown to
have a similar effect on decoding performance as permuting the coordinates of
the received codeword according to a selected set of automorphisms of the code.
Based on this finding we develop new decoding strategies for data transmission
over the binary erasure channel that combine iterative message passing and
permutation decoding in order to avoid errors confined to stopping sets. We
also introduce the notion of s-SAD sets, containing the smallest number of
automorphisms of a code with the property that they move any set of not more
than s erasures into positions that do not correspond to stopping sets within a
judiciously chosen parity-check matrix.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 19:28:24 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Feb 2007 18:58:10 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hehn",
"Thorsten",
""
],
[
"Milenkovic",
"Olgica",
""
],
[
"Laendner",
"Stefan",
""
],
[
"Huber",
"Johannes B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702051 | Ender Tekin | Ender Tekin, Aylin Yener | The Gaussian multiple access wire-tap channel: wireless secrecy and
cooperative jamming | Presented at the Information Theory and Applications Workshop, ITA07,
February 2007, San Diego, CA | null | null | null | cs.IT cs.CR math.IT | null | We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT).
In this scenario, multiple users communicate with an intended receiver in the
presence of an intelligent and informed eavesdropper. We define two suitable
secrecy measures, termed individual and collective, to reflect the confidence
in the system for this multi-access environment. We determine achievable rates
such that secrecy to some pre-determined degree can be maintained, using
Gaussian codebooks. We also find outer bounds for the case when the
eavesdropper receives a degraded version of the intended receiver's signal. In
the degraded case, Gaussian codewords are shown to achieve the sum capacity for
collective constraints. In addition, a TDMA scheme is shown to also achieve sum
capacity for both sets of constraints. Numerical results showing the new rate
region are presented and compared with the capacity region of the Gaussian
Multiple-Access Channel (GMAC) with no secrecy constraints. We then find the
secrecy sum-rate maximizing power allocations for the transmitters, and show
that a cooperative jamming scheme can be used to increase achievable rates in
this scenario.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 01:10:10 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702052 | Alex Grant | Adria Tauste-Campo and Alex Grant | On Random Network Coding for Multicast | 5 pages, 4 figures. Submitted to 2007 IEEE International Symposium on
Information Theory | null | null | null | cs.IT math.IT | null | Random linear network coding is a particularly decentralized approach to the
multicast problem. Use of random network codes introduces a non-zero
probability however that some sinks will not be able to successfully decode the
required sources. One of the main theoretical motivations for random network
codes stems from the lower bound on the probability of successful decoding
reported by Ho et. al. (2003). This result demonstrates that all sinks in a
linearly solvable network can successfully decode all sources provided that the
random code field size is large enough. This paper develops a new bound on the
probability of successful decoding.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 01:39:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Tauste-Campo",
"Adria",
""
],
[
"Grant",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702053 | Andrew Badr | Andrew Badr, Ian Shipman | The DFAs of Finitely Different Languages | null | null | null | null | cs.CC | null | Two languages are "finitely different" if their symmetric difference is
finite. We consider the DFAs of finitely different regular languages and find
major structural similarities. We proceed to consider the smallest DFAs that
recognize a language finitely different from some given DFA. Such "f-minimal"
DFAs are not unique, and this non-uniqueness is characterized. Finally, we
offer a solution to the minimization problem of finding such f-minimal DFAs.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 03:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Badr",
"Andrew",
""
],
[
"Shipman",
"Ian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702054 | Christoph Durr | Christoph Durr and Nguyen Kim Thang | Nash equilibria in Voronoi games on graphs | null | null | null | null | cs.GT cs.DS | null | In this paper we study a game where every player is to choose a vertex
(facility) in a given undirected graph. All vertices (customers) are then
assigned to closest facilities and a player's payoff is the number of customers
assigned to it. We show that deciding the existence of a Nash equilibrium for a
given graph is NP-hard which to our knowledge is the first result of this kind
for a zero-sum game. We also introduce a new measure, the social cost
discrepancy, defined as the ratio of the costs between the worst and the best
Nash equilibria. We show that the social cost discrepancy in our game is
Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the
number of players.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 12:12:17 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Apr 2007 14:11:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Thang",
"Nguyen Kim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702055 | Alexander Paraskevov | A.V. Paraskevov | On the possibility of making the complete computer model of a human
brain | null | null | null | null | cs.NE | null | The development of the algorithm of a neural network building by the
corresponding parts of a DNA code is discussed.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 13:16:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paraskevov",
"A. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0702056 | Hanene Mohamed | Hanene Mohamed (INRIA Rocquencourt) | A probabilistic analysis of a leader election algorithm | null | Fourth Colloquium on Mathematics and Computer Science Algorithms,
Trees, Combinatorics and Probabilities (2006) 225-236 | null | null | cs.DS | null | A {\em leader election} algorithm is an elimination process that divides
recursively into tow subgroups an initial group of n items, eliminates one
subgroup and continues the procedure until a subgroup is of size 1. In this
paper the biased case is analyzed. We are interested in the {\em cost} of the
algorithm, i.e. the number of operations needed until the algorithm stops.
Using a probabilistic approach, the asymptotic behavior of the algorithm is
shown to be related to the behavior of a hitting time of two random sequences
on [0,1].
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 15:16:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohamed",
"Hanene",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702057 | Salman Beigi | Mohsen Bahramgiri, Salman Beigi | An Efficient Algorithm to Recognize Locally Equivalent Graphs in
Non-Binary Case | 21 pages, no figures, minor corrections | null | null | null | cs.DS | null | Let $v$ be a vertex of a graph $G$. By the local complementation of $G$ at
$v$ we mean to complement the subgraph induced by the neighbors of $v$. This
operator can be generalized as follows. Assume that, each edge of $G$ has a
label in the finite field $\mathbf{F}_q$. Let $(g_{ij})$ be set of labels
($g_{ij}$ is the label of edge $ij$). We define two types of operators. For the
first one, let $v$ be a vertex of $G$ and $a\in \mathbf{F}_q$, and obtain the
graph with labels $g'_{ij}=g_{ij}+ag_{vi}g_{vj}$. For the second, if $0\neq
b\in \mathbf{F}_q$ the resulted graph is a graph with labels $g''_{vi}=bg_{vi}$
and $g''_{ij}=g_{ij}$, for $i,j$ unequal to $v$. It is clear that if the field
is binary, the operators are just local complementations that we described.
The problem of whether two graphs are equivalent under local complementations
has been studied, \cite{bouchalg}. Here we consider the general case and
assuming that $q$ is odd, present the first known efficient algorithm to verify
whether two graphs are locally equivalent or not.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 15:42:46 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Jul 2007 21:01:46 GMT"
}
] | 2007-07-02T00:00:00 | [
[
"Bahramgiri",
"Mohsen",
""
],
[
"Beigi",
"Salman",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702058 | Kia Kai Li | Kia Kai Li | Exploring k-Colorability | null | null | null | null | cs.CC | null | An introductory paper to the graph k-colorability problem.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 23:07:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Kia Kai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702059 | Michael Baer | Michael B. Baer | Redundancy-Related Bounds on Generalized Huffman Codes | 15 pages, 4 figures, incorporates and extends arXiv:cs/0605099 and
arXiv:0809.1264v1 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents new lower and upper bounds for the compression rate of
binary prefix codes optimized over memoryless sources according to various
nonlinear codeword length objectives. Like the most well-known redundancy
bounds for minimum average redundancy coding - Huffman coding - these are in
terms of a form of entropy and/or the probability of an input symbol, often the
most probable one. The bounds here, some of which are tight, improve on known
bounds of the form L in [H,H+1), where H is some form of entropy in bits (or,
in the case of redundancy objectives, 0) and L is the length objective, also in
bits. The objectives explored here include exponential-average length, maximum
pointwise redundancy, and exponential-average pointwise redundancy (also called
dth exponential redundancy). The first of these relates to various problems
involving queueing, uncertainty, and lossless communications; the second
relates to problems involving Shannon coding and universal modeling. For these
two objectives we also explore the related problem of the necessary and
sufficient conditions for the shortest codeword of a code being a specific
length.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 03:31:42 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Mar 2009 07:21:52 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Oct 2010 05:45:10 GMT"
}
] | 2010-10-08T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702060 | Gwenael Richomme | Gw\'ena\"el Richomme (LaRIA) | A local balance property of episturmian words | null | null | null | LaRIA-LRR-2007-02 | cs.DM | null | We prove that episturmian words and Arnoux-Rauzy sequences can be
characterized using a local balance property. We also give a new
characterization of epistandard words and show that the set of finite words
that are not factors of an episturmian word is not context-free.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 09:48:42 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Feb 2008 08:30:05 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Richomme",
"Gwénaël",
"",
"LaRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702061 | Gwenael Richomme | Gw\'ena\"el Richomme (LaRIA) | Sudo-Lyndon | null | null | null | LaRIA-LRR-2007-03 | cs.DM | null | Based on Lyndon words, a new Sudoku-like puzzle is presented and some
relative theoretical questions are proposed.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 09:49:34 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Richomme",
"Gwénaël",
"",
"LaRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702062 | Luca Gammaitoni | Luca Gammaitoni | Noise Limited Computational Speed | null | L. Gammaitoni, Applied Physics Letters, 11/2007, Volume 91, p.3,
(2007) | 10.1063/1.2817968 | null | cs.AR cs.PF | null | In modern transistor based logic gates, the impact of noise on computation
has become increasingly relevant since the voltage scaling strategy, aimed at
decreasing the dissipated power, has increased the probability of error due to
the reduced switching threshold voltages. In this paper we discuss the role of
noise in a two state model that mimic the dynamics of standard logic gates and
show that the presence of the noise sets a fundamental limit to the computing
speed. An optimal idle time interval that minimizes the error probability, is
derived.
| [
{
"version": "v1",
"created": "Sun, 11 Feb 2007 09:52:12 GMT"
}
] | 2007-12-10T00:00:00 | [
[
"Gammaitoni",
"Luca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0702063 | Terence H. Chan | Terence Chan and Alex Grant | Entropy vectors and network codes | null | null | null | null | cs.IT cs.NI math.IT | null | We consider a network multicast example that relates the solvability of the
multicast problem with the existence of an entropy function. As a result, we
provide an alternative approach to the proving of the insufficiency of linear
(and abelian) network codes and demonstrate the utility of non-Shannon
inequalities to tighten outer bounds on network coding capacity regions.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 12:26:29 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chan",
"Terence",
""
],
[
"Grant",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702064 | Terence H. Chan | Terence H. Chan | Group characterizable entropy functions | null | null | null | null | cs.IT math.IT | null | This paper studies properties of entropy functions that are induced by groups
and subgroups. We showed that many information theoretic properties of those
group induced entropy functions also have corresponding group theoretic
interpretations. Then we propose an extension method to find outer bound for
these group induced entropy functions.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 12:38:13 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chan",
"Terence H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702065 | Raouf Dridi | R. Dridi and M. Petitot | Towards a New ODE Solver Based on Cartan's Equivalence Method | null | null | null | null | cs.SC | null | The aim of the present paper is to propose an algorithm for a new ODE--solver
which should improve the abilities of current solvers to handle second order
differential equations. The paper provides also a theoretical result revealing
the relationship between the change of coordinates, that maps the generic
equation to a given target equation, and the symmetry $\D$-groupoid of this
target.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 16:54:12 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jul 2007 22:15:22 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Dridi",
"R.",
""
],
[
"Petitot",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0702066 | Frederic Vivien | Matthieu Gallet (LIP, INRIA Rh\^one-Alpes), Yves Robert (LIP, INRIA
Rh\^one-Alpes), Fr\'ed\'eric Vivien (LIP, INRIA Rh\^one-Alpes) | Comments on "Design and performance evaluation of load distribution
strategies for multiple loads on heterogeneous linear daisy chain networks'' | null | null | null | null | cs.DC | null | Min, Veeravalli, and Barlas proposed strategies to minimize the overall
execution time of one or several divisible loads on a heterogeneous linear
network, using one or more installments. We show on a very simple example that
the proposed approach does not always produce a solution and that, when it
does, the solution is often suboptimal. We also show how to find an optimal
scheduling for any instance, once the number of installments per load is given.
Finally, we formally prove that under a linear cost model, as in the original
paper, an optimal schedule has an infinite number of installments. Such a cost
model can therefore not be sed to design practical multi-installment
strategies.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 17:43:35 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Gallet",
"Matthieu",
"",
"LIP, INRIA Rhône-Alpes"
],
[
"Robert",
"Yves",
"",
"LIP, INRIA\n Rhône-Alpes"
],
[
"Vivien",
"Frédéric",
"",
"LIP, INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0702067 | Fionn Murtagh | Fionn Murtagh | The Haar Wavelet Transform of a Dendrogram: Additional Notes | 37 pp, 1 fig. Supplementary material to "The Haar Wavelet Transform
of a Dendrogram", http://arxiv.org/abs/cs.IR/0608107 | null | null | null | cs.IR | null | We consider the wavelet transform of a finite, rooted, node-ranked, $p$-way
tree, focusing on the case of binary ($p = 2$) trees. We study a Haar wavelet
transform on this tree. Wavelet transforms allow for multiresolution analysis
through translation and dilation of a wavelet function. We explore how this
works in our tree context.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 21:26:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702068 | Gesualdo Scutari | Gesualdo Scutari, Sergio Barbarossa and Loreto Pescosolido | Distributed Decision Through Self-Synchronizing Sensor Networks in the
Presence of Propagation Delays and Nonreciprocal Channels | Conference paper. Journal version submitted to IEEE Transactions on
Signal Processing, January 10, 2007. Paper accepted for the publication on
the VIII IEEE Workshop on Signal Processing Advances in Wireless
Communications, (SPAWC 2007), January 22, 2007 | null | 10.1109/SPAWC.2007.4401363 | null | cs.IT cs.MA math.IT | null | In this paper we propose and analyze a distributed algorithm for achieving
globally optimal decisions, either estimation or detection, through a
self-synchronization mechanism among linearly coupled integrators initialized
with local measurements. We model the interaction among the nodes as a directed
graph with weights dependent on the radio interface and we pose special
attention to the effect of the propagation delays occurring in the exchange of
data among sensors, as a function of the network geometry. We derive necessary
and sufficient conditions for the proposed system to reach a consensus on
globally optimal decision statistics. One of the major results proved in this
work is that a consensus is achieved for any bounded delay condition if and
only if the directed graph is quasi-strongly connected. We also provide a
closed form expression for the global consensus, showing that the effect of
delays is, in general, to introduce a bias in the final decision. The closed
form expression is also useful to modify the consensus mechanism in order to
get rid of the bias with minimum extra complexity.
| [
{
"version": "v1",
"created": "Sun, 11 Feb 2007 09:15:03 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Apr 2007 17:30:33 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Barbarossa",
"Sergio",
""
],
[
"Pescosolido",
"Loreto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702069 | Roberto Amadio | Roberto Amadio (PPS), Frederique Dabrowski | Feasible reactivity in a synchronous pi-calculus | null | Proceedings ACM SIGPLAN Principles and Practice of Declarative
Programming (16/07/2007) 221-231 | null | null | cs.LO | null | Reactivity is an essential property of a synchronous program. Informally, it
guarantees that at each instant the program fed with an input will `react'
producing an output. In the present work, we consider a refined property that
we call ` feasible reactivity'. Beyond reactivity, this property guarantees
that at each instant both the size of the program and its reaction time are
bounded by a polynomial in the size of the parameters at the beginning of the
computation and the size of the largest input. We propose a method to annotate
programs and we develop related static analysis techniques that guarantee
feasible reactivity for programs expressed in the S-pi-calculus. The latter is
a synchronous version of the pi-calculus based on the SL synchronous
programming model.
| [
{
"version": "v1",
"created": "Sun, 11 Feb 2007 15:43:26 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Amadio",
"Roberto",
"",
"PPS"
],
[
"Dabrowski",
"Frederique",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702070 | Maria Fresia | Maria Fresia, Giuseppe Caire | A Practical Approach to Lossy Joint Source-Channel Coding | 51 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | This work is devoted to practical joint source channel coding. Although the
proposed approach has more general scope, for the sake of clarity we focus on a
specific application example, namely, the transmission of digital images over
noisy binary-input output-symmetric channels. The basic building blocks of most
state-of the art source coders are: 1) a linear transformation; 2) scalar
quantization of the transform coefficients; 3) probability modeling of the
sequence of quantization indices; 4) an entropy coding stage. We identify the
weakness of the conventional separated source-channel coding approach in the
catastrophic behavior of the entropy coding stage. Hence, we replace this stage
with linear coding, that maps directly the sequence of redundant quantizer
output symbols into a channel codeword. We show that this approach does not
entail any loss of optimality in the asymptotic regime of large block length.
However, in the practical regime of finite block length and low decoding
complexity our approach yields very significant improvements. Furthermore, our
scheme allows to retain the transform, quantization and probability modeling of
current state-of the art source coders, that are carefully matched to the
features of specific classes of sources. In our working example, we make use of
``bit-planes'' and ``contexts'' model defined by the JPEG2000 standard and we
re-interpret the underlying probability model as a sequence of conditionally
Markov sources. The Markov structure allows to derive a simple successive
coding and decoding scheme, where the latter is based on iterative Belief
Propagation. We provide a construction example of the proposed scheme based on
punctured Turbo Codes and we demonstrate the gain over a conventional separated
scheme by running extensive numerical experiments on test images.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2007 15:36:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Fresia",
"Maria",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702071 | Pulkit Grover | Pulkit Grover and Anant Sahai | What is needed to exploit knowledge of primary transmissions? | Combination of two papers submitted to ISIT'07 and DySPAN '07 | null | null | null | cs.IT math.IT | null | Recently, Tarokh and others have raised the possibility that a cognitive
radio might know the interference signal being transmitted by a strong primary
user in a non-causal way, and use this knowledge to increase its data rates.
However, there is a subtle difference between knowing the signal transmitted by
the primary and the actual interference at our receiver since there is a
wireless channel between these two points. We show that even an unknown phase
results in a substantial decrease in the data rates that can be achieved, and
thus there is a need to feedback interference channel estimates to the
cognitive transmitter. We then consider the case of fading channels. We derive
an upper bound on the rate for given outage error probability for faded dirt.
We give a scheme that uses appropriate "training" to obtain such estimates and
quantify this scheme's required overhead as a function of the relevant
coherence time and interference power.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 02:32:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Grover",
"Pulkit",
""
],
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702072 | Peter J. Stuckey | Michael Codish, Vitaly Lagoon, and Peter J. Stuckey | Logic Programming with Satisfiability | 8 pages, 3 figures, 1 table | Theory and Practice of Logic Programming: 8(1):121-128, 2008 | null | null | cs.PL cs.AI | null | This paper presents a Prolog interface to the MiniSat satisfiability solver.
Logic program- ming with satisfiability combines the strengths of the two
paradigms: logic programming for encoding search problems into satisfiability
on the one hand and efficient SAT solving on the other. This synergy between
these two exposes a programming paradigm which we propose here as a logic
programming pearl. To illustrate logic programming with SAT solving we give an
example Prolog program which solves instances of Partial MAXSAT.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 03:10:02 GMT"
}
] | 2010-09-03T00:00:00 | [
[
"Codish",
"Michael",
""
],
[
"Lagoon",
"Vitaly",
""
],
[
"Stuckey",
"Peter J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702073 | Pulkit Grover | Pulkit Grover | Tradeoff between decoding complexity and rate for codes on graphs | null | null | null | null | cs.IT cs.CC math.IT | null | We consider transmission over a general memoryless channel, with bounded
decoding complexity per bit under message passing decoding. We show that the
achievable rate is bounded below capacity if there is a finite success in the
decoding in a specified number of operations per bit at the decoder for some
codes on graphs. These codes include LDPC and LDGM codes. Good performance with
low decoding complexity suggests strong local structures in the graphs of these
codes, which are detrimental to the code rate asymptotically. The proof method
leads to an interesting necessary condition on the code structures which could
achieve capacity with bounded decoding complexity. We also show that if a code
sequence achieves a rate epsilon close to the channel capacity, the decoding
complexity scales at least as O(log(1/epsilon).
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 03:39:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Grover",
"Pulkit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702074 | Xavier P\'erez-Gim\'enez | Josep Diaz, Dieter Mitsche, Xavier Perez | Dynamic Random Geometric Graphs | null | null | null | null | cs.DM | null | In this work we introduce Dynamic Random Geometric Graphs as a basic rough
model for mobile wireless sensor networks, where communication distances are
set to the known threshold for connectivity of static random geometric graphs.
We provide precise asymptotic results for the expected length of the
connectivity and disconnectivity periods of the network. We believe the formal
tools developed in this work could be of use in future studies in more concrete
settings. In addition, for static random geometric graphs at the threshold for
connectivity, we provide asymptotic expressions on the probability of existence
of components according to their sizes.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 09:00:34 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 09:15:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaz",
"Josep",
""
],
[
"Mitsche",
"Dieter",
""
],
[
"Perez",
"Xavier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702075 | Maurice H. T. Ling | Maurice HT Ling | Firebird Database Backup by Serialized Database Table Dump | 5 pages | Ling, Maurice HT. 2007. Firebird Database Backup by Serialized
Database Table Dump. The Python Papers 2 (1): 10-14 | null | null | cs.DB | null | This paper presents a simple data dump and load utility for Firebird
databases which mimics mysqldump in MySQL. This utility, fb_dump and fb_load,
for dumping and loading respectively, retrieves each database table using
kinterbasdb and serializes the data using marshal module. This utility has two
advantages over the standard Firebird database backup utility, gbak. Firstly,
it is able to backup and restore single database tables which might help to
recover corrupted databases. Secondly, the output is in text-coded format (from
marshal module) making it more resilient than a compressed text backup, as in
the case of using gbak.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 11:13:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ling",
"Maurice HT",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0702076 | Frederic Vivien | Lionel Eyraud-Dubois (INRIA Rh\^one-Alpes, LIP), Arnaud Legrand
(ID-IMAG, INRIA Rh\^one-Alpes / ID-IMAG), Martin Quinson (INRIA Lorraine -
LORIA), Fr\'ed\'eric Vivien (INRIA Rh\^one-Alpes, LIP) | A First Step Towards Automatically Building Network Representations | null | null | null | null | cs.DC | null | To fully harness Grids, users or middlewares must have some knowledge on the
topology of the platform interconnection network. As such knowledge is usually
not available, one must uses tools which automatically build a topological
network model through some measurements. In this article, we define a
methodology to assess the quality of these network model building tools, and we
apply this methodology to representatives of the main classes of model builders
and to two new algorithms. We show that none of the main existing techniques
build models that enable to accurately predict the running time of simple
application kernels for actual platforms. However some of the new algorithms we
propose give excellent results in a wide range of situations.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 16:35:04 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jun 2007 14:14:44 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Eyraud-Dubois",
"Lionel",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Legrand",
"Arnaud",
"",
"ID-IMAG, INRIA Rhône-Alpes / ID-IMAG"
],
[
"Quinson",
"Martin",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Vivien",
"Frédéric",
"",
"INRIA Rhône-Alpes, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0702077 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Properties of Rank Metric Codes | 44 pages, 3 figures. Submitted to IEEE Transactions on Information
Theory on March 6th | null | null | null | cs.IT math.IT | null | This paper investigates general properties of codes with the rank metric. We
first investigate asymptotic packing properties of rank metric codes. Then, we
study sphere covering properties of rank metric codes, derive bounds on their
parameters, and investigate their asymptotic covering properties. Finally, we
establish several identities that relate the rank weight distribution of a
linear code to that of its dual code. One of our identities is the counterpart
of the MacWilliams identity for the Hamming metric, and it has a different form
from the identity by Delsarte.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 20:23:38 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Feb 2007 15:32:22 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Jun 2007 18:11:52 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702078 | Reid Andersen | Reid Andersen | A Local Algorithm for Finding Dense Subgraphs | 14 pages, no figures | null | null | null | cs.DS cs.CC | null | We present a local algorithm for finding dense subgraphs of bipartite graphs,
according to the definition of density proposed by Kannan and Vinay. Our
algorithm takes as input a bipartite graph with a specified starting vertex,
and attempts to find a dense subgraph near that vertex. We prove that for any
subgraph S with k vertices and density theta, there are a significant number of
starting vertices within S for which our algorithm produces a subgraph S' with
density theta / O(log n) on at most O(D k^2) vertices, where D is the maximum
degree. The running time of the algorithm is O(D k^2), independent of the
number of vertices in the graph.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 23:41:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andersen",
"Reid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702079 | Otfried Cheong | Otfried Cheong, Mira Lee | The Hadwiger Number of Jordan Regions is Unbounded | null | null | null | null | cs.CG math.MG | null | We show that for every n > 0 there is a planar topological disk A_0 and n
translates A_1, A_2, ..., A_n of A_0 such that the interiors of A_0, ... A_n
are pairwise disjoint, but with each A_i touching A_0 for 1 <= i <= n.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 15:31:30 GMT"
}
] | 2010-08-26T00:00:00 | [
[
"Cheong",
"Otfried",
""
],
[
"Lee",
"Mira",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
cs/0702080 | Otfried Cheong | Boris Aronov, Mark de Berg, Otfried Cheong, Joachim Gudmundsson,
Herman Haverkort, Michiel Smid, Antoine Vigneron | Sparse geometric graphs with small dilation | null | null | null | null | cs.CG | null | Given a set S of n points in R^D, and an integer k such that 0 <= k < n, we
show that a geometric graph with vertex set S, at most n - 1 + k edges, maximum
degree five, and dilation O(n / (k+1)) can be computed in time O(n log n). For
any k, we also construct planar n-point sets for which any geometric graph with
n-1+k edges has dilation Omega(n/(k+1)); a slightly weaker statement holds if
the points of S are required to be in convex position.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 03:46:54 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Jun 2007 04:52:43 GMT"
}
] | 2009-12-07T00:00:00 | [
[
"Aronov",
"Boris",
""
],
[
"de Berg",
"Mark",
""
],
[
"Cheong",
"Otfried",
""
],
[
"Gudmundsson",
"Joachim",
""
],
[
"Haverkort",
"Herman",
""
],
[
"Smid",
"Michiel",
""
],
[
"Vigneron",
"Antoine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0702081 | Rick Dale | Rick Dale | Random Sentences from a Generalized Phrase-Structure Grammar Interpreter | Brief paper with source code and examples | null | null | null | cs.CL | null | In numerous domains in cognitive science it is often useful to have a source
for randomly generated corpora. These corpora may serve as a foundation for
artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen,
2000), or as input into computational models (e.g., Christiansen & Dale, 2001).
The following compact and general C program interprets a phrase-structure
grammar specified in a text file. It follows parameters set at a Unix or
Unix-based command-line and generates a corpus of random sentences from that
grammar.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 06:05:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dale",
"Rick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0702082 | Ivan Yu. Tyukin | Ivan Tyukin, Tatiana Tyukina, Cees van Leeuwen | Invariant template matching in systems with spatiotemporal coding: a
vote for instability | 52 pages, 12 figures | Neural Networks, vol. 22, no. 4, (2009), 425-449 | 10.1016/j.neunet.2009.01.014 | null | cs.CV cs.AI | null | We consider the design of a pattern recognition that matches templates to
images, both of which are spatially sampled and encoded as temporal sequences.
The image is subject to a combination of various perturbations. These include
ones that can be modeled as parameterized uncertainties such as image blur,
luminance, translation, and rotation as well as unmodeled ones. Biological and
neural systems require that these perturbations be processed through a minimal
number of channels by simple adaptation mechanisms. We found that the most
suitable mathematical framework to meet this requirement is that of weakly
attracting sets. This framework provides us with a normative and unifying
solution to the pattern recognition problem. We analyze the consequences of its
explicit implementation in neural systems. Several properties inherent to the
systems designed in accordance with our normative mathematical argument
coincide with known empirical facts. This is illustrated in mental rotation,
visual search and blur/intensity adaptation. We demonstrate how our results can
be applied to a range of practical problems in template matching and pattern
recognition.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 07:01:56 GMT"
}
] | 2009-05-22T00:00:00 | [
[
"Tyukin",
"Ivan",
""
],
[
"Tyukina",
"Tatiana",
""
],
[
"van Leeuwen",
"Cees",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702083 | Serebrenik Alexander | Alexander Serebrenik, Tom Schrijvers, Bart Demoen | Improving Prolog programs: Refactoring for Prolog | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | 2006-1 | cs.SE | null | Refactoring is an established technique from the object-oriented (OO)
programming community to restructure code: it aims at improving software
readability, maintainability and extensibility. Although refactoring is not
tied to the OO-paradigm in particular, its ideas have not been applied to Logic
Programming until now.
This paper applies the ideas of refactoring to Prolog programs. A catalogue
is presented listing refactorings classified according to scope. Some of the
refactorings have been adapted from the OO-paradigm, while others have been
specifically designed for Prolog. The discrepancy between intended and
operational semantics in Prolog is also addressed by some of the refactorings.
In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and
the experience with applying ViPReSS to a large Prolog legacy system is
reported. The main conclusion is that refactoring is both a viable technique in
Prolog and a rather desirable one.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 09:53:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Schrijvers",
"Tom",
""
],
[
"Demoen",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0702084 | Bozidar Radunovic | Bozidar Radunovic, Jean-Yves Le Boudec, Raymond Knopp | Performance of Ultra-Wideband Impulse Radio in Presence of Impulsive
Interference | null | null | null | null | cs.IT math.IT | null | We analyze the performance of coherent impulsive-radio (IR) ultra-wideband
(UWB) channel in presence of the interference generated by concurrent
transmissions of the systems with the same impulsive radio. We derive a novel
algorithm, using Monte-Carlo method, to calculate a lower bound on the rate
that can be achieved using maximum-likelihood estimator. Using this bound we
show that such a channel is very robust to interference, in contrast to the
nearest-neighbor detector.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:22:41 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Radunovic",
"Bozidar",
""
],
[
"Boudec",
"Jean-Yves Le",
""
],
[
"Knopp",
"Raymond",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702085 | Vincenzo Nicosia | V. Carchiolo, M. Malgeri, G. Mangioni and V. Nicosia | Social Behaviours Applied to P2P Systems: An efficient Algorithm for
Resource Organisation | 5 Pages; 8 Figures; Presented at COPS 2006 -- WETICE -- Manchester
(UK) | 15th IEEE International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises, 2006. WETICE '06. June 2006
Page(s):65 - 72 | null | null | cs.DC cs.IR | null | P2P systems are a great solution to the problem of distributing resources.
The main issue of P2P networks is that searching and retrieving resources
shared by peers is usually expensive and does not take into account
similarities among peers. In this paper we present preliminary simulations of
PROSA, a novel algorithm for P2P network structuring, inspired by social
behaviours. Peers in PROSA self--organise in social groups of similar peers,
called ``semantic--groups'', depending on the resources they are sharing. Such
a network smoothly evolves to a small--world graph, where queries for resources
are efficiently and effectively routed.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:53:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Nicosia",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702086 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Protection of DVB Systems by Trusted Computing | Accepted contribution to the IEEE International Symposium on
Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the
Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures | null | null | null | cs.CR | null | We describe a concept to employ Trusted Computing technology to secure
Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted
platform module (TPM) into the set-top-box or residential home gateway. Various
deployment scenarios exhibit possibilities of charging co-operation with mobile
network operators (MNO), or other payment providers.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:58:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0702087 | Marc Glisse | Marc Glisse (INRIA Lorraine - LORIA), Sylvain Lazard (INRIA Lorraine -
LORIA) | An Upper Bound on the Average Size of Silhouettes | null | null | null | null | cs.CG | null | It is a widely observed phenomenon in computer graphics that the size of the
silhouette of a polyhedron is much smaller than the size of the whole
polyhedron. This paper provides, for the first time, theoretical evidence
supporting this for a large class of objects, namely for polyhedra that
approximate surfaces in some reasonable way; the surfaces may be non-convex and
non-differentiable and they may have boundaries. We prove that such polyhedra
have silhouettes of expected size $O(\sqrt{n})$ where the average is taken over
all points of view and n is the complexity of the polyhedron.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 13:52:35 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Glisse",
"Marc",
"",
"INRIA Lorraine - LORIA"
],
[
"Lazard",
"Sylvain",
"",
"INRIA Lorraine -\n LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0702088 | Shanghua Teng | Xi Chen and Shang-Hua Teng | Paths Beyond Local Search: A Nearly Tight Bound for Randomized
Fixed-Point Computation | null | null | null | null | cs.GT | null | In 1983, Aldous proved that randomization can speedup local search. For
example, it reduces the query complexity of local search over [1:n]^d from
Theta (n^{d-1}) to O (d^{1/2}n^{d/2}). It remains open whether randomization
helps fixed-point computation. Inspired by this open problem and recent
advances on equilibrium computation, we have been fascinated by the following
question:
Is a fixed-point or an equilibrium fundamentally harder to find than a local
optimum? In this paper, we give a nearly-tight bound of Omega(n)^{d-1} on the
randomized query complexity for computing a fixed point of a discrete Brouwer
function over [1:n]^d. Since the randomized query complexity of global
optimization over [1:n]^d is Theta (n^{d}), the randomized query model over
[1:n]^d strictly separates these three important search problems: Global
optimization is harder than fixed-point computation, and fixed-point
computation is harder than local search. Our result indeed demonstrates that
randomization does not help much in fixed-point computation in the query model;
the deterministic complexity of this problem is Theta (n^{d-1}).
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 07:32:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Xi",
""
],
[
"Teng",
"Shang-Hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0702089 | C. Maria Keet | C. Maria Keet | Mapping the Object-Role Modeling language ORM2 into Description Logic
language DLRifd | 17 pages, 2 figures. Changes: added references and proofs of
correctness of encoding, fixed typos | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, several efforts have been made to enhance conceptual data
modelling with automated reasoning to improve the model's quality and derive
implicit information. One approach to achieve this in implementations, is to
constrain the language. Advances in Description Logics can help choosing the
right language to have greatest expressiveness yet to remain within the
decidable fragment of first order logic to realise a workable implementation
with good performance using DL reasoners. The best fit DL language appears to
be the ExpTime-complete DLRifd. To illustrate trade-offs and highlight features
of the modelling languages, we present a precise transformation of the mappable
features of the very expressive (undecidable) ORM/ORM2 conceptual data
modelling languages to exactly DLRifd. Although not all ORM2 features can be
mapped, this is an interesting fragment because it has been shown that DLRifd
can also encode UML Class Diagrams and EER, and therefore can foster
interoperation between conceptual data models and research into ontological
aspects of the modelling languages.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2007 23:45:46 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Apr 2009 11:07:26 GMT"
}
] | 2009-04-22T00:00:00 | [
[
"Keet",
"C. Maria",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702090 | Otfried Cheong | Hee-Kap Ahn, Sang Won Bae, Otfried Cheong, Joachim Gudmundsson | Aperture-Angle and Hausdorff-Approximation of Convex Figures | Fixed incorrect affiliation | null | null | null | cs.CG math.MG | null | The aperture angle alpha(x, Q) of a point x not in Q in the plane with
respect to a convex polygon Q is the angle of the smallest cone with apex x
that contains Q. The aperture angle approximation error of a compact convex set
C in the plane with respect to an inscribed convex polygon Q of C is the
minimum aperture angle of any x in C Q with respect to Q. We show that for any
compact convex set C in the plane and any k > 2, there is an inscribed convex
k-gon Q of C with aperture angle approximation error (1 - 2/(k+1)) pi. This
bound is optimal, and settles a conjecture by Fekete from the early 1990s. The
same proof technique can be used to prove a conjecture by Brass: If a polygon P
admits no approximation by a sub-k-gon (the convex hull of k vertices of P)
with Hausdorff distance sigma, but all subpolygons of P (the convex hull of
some vertices of P) admit such an approximation, then P is a (k+1)-gon. This
implies the following result: For any k > 2 and any convex polygon P of
perimeter at most 1 there is a sub-k-gon Q of P such that the
Hausdorff-distance of P and Q is at most 1/(k+1) * sin(pi/(k+1)).
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 06:00:08 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Feb 2007 00:39:36 GMT"
}
] | 2010-08-26T00:00:00 | [
[
"Ahn",
"Hee-Kap",
""
],
[
"Bae",
"Sang Won",
""
],
[
"Cheong",
"Otfried",
""
],
[
"Gudmundsson",
"Joachim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
cs/0702091 | raphael M. Jungers | Raphael M. Jungers and Vincent D. Blondel | Observable Graphs | 15 pages, 8 figures | null | null | null | cs.MA | null | An edge-colored directed graph is \emph{observable} if an agent that moves
along its edges is able to determine his position in the graph after a
sufficiently long observation of the edge colors. When the agent is able to
determine his position only from time to time, the graph is said to be
\emph{partly observable}. Observability in graphs is desirable in situations
where autonomous agents are moving on a network and one wants to localize them
(or the agent wants to localize himself) with limited information. In this
paper, we completely characterize observable and partly observable graphs and
show how these concepts relate to observable discrete event systems and to
local automata. Based on these characterizations, we provide polynomial time
algorithms to decide observability, to decide partial observability, and to
compute the minimal number of observations necessary for finding the position
of an agent. In particular we prove that in the worst case this minimal number
of observations increases quadratically with the number of nodes in the graph.
From this it follows that it may be necessary for an agent to pass through
the same node several times before he is finally able to determine his position
in the graph. We then consider the more difficult question of assigning colors
to a graph so as to make it observable and we prove that two different versions
of this problem are NP-complete.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:16:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jungers",
"Raphael M.",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0702092 | M. Kivanc Mihcak | Yucel Altug, N. Polat Ayerden, M. Kivanc Mihcak, Emin Anarim | A Note on the Periodicity and the Output Rate of Bit Search Type
Generators | 20 pages, 2 figures and submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2007.913503 | null | cs.CR | null | We investigate the bit-search type irregular decimation algorithms that are
used within LFSR-based stream ciphers. In particular, we concentrate on BSG and
ABSG, and consider two different setups for the analysis. In the first case,
the input is assumed to be a m-sequence; we show that all possible output
sequences can be classified into two sets, each of which is characterized by
the equivalence of their elements up to shifts. Furthermore, we prove that the
cardinality of each of these sets is equal to the period of one of its elements
and subsequently derive the first known bounds on the expected output period
(assuming that no subperiods exist). In the second setup, we work in a
probabilistic framework and assume that the input sequence is evenly
distributed (i.e., independent identically distributed Bernoulli process with
probability 1/2). Under these assumptions, we derive closed-form expressions
for the distribution of the output length and the output rate, which is shown
to be asymptotically Gaussian-distributed and concentrated around the mean with
exponential tightness.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:20:59 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Altug",
"Yucel",
""
],
[
"Ayerden",
"N. Polat",
""
],
[
"Mihcak",
"M. Kivanc",
""
],
[
"Anarim",
"Emin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0702093 | Ashish Khisti | Ashish Khisti, Aslan Tchamkerten, Gregory Wornell | Secure Broadcasting | Submitted to IEEE Transactions on Information Theory, Special issue
on Information Theoretic Security | null | null | null | cs.IT math.IT | null | Wyner's wiretap channel is extended to parallel broadcast channels and fading
channels with multiple receivers. In the first part of the paper, we consider
the setup of parallel broadcast channels with one sender, multiple intended
receivers, and one eavesdropper. We study the situations where the sender
broadcasts either a common message or independent messages to the intended
receivers. We derive upper and lower bounds on the common-message-secrecy
capacity, which coincide when the users are reversely degraded. For the case of
independent messages we establish the secrecy sum-capacity when the users are
reversely degraded.
In the second part of the paper we apply our results to fading channels:
perfect channel state information of all intended receivers is known globally,
whereas the eavesdropper channel is known only to her. For the common message
case, a somewhat surprising result is proven: a positive rate can be achieved
independently of the number of intended receivers. For independent messages, an
opportunistic transmission scheme is presented that achieves the secrecy
sum-capacity in the limit of large number of receivers. Our results are stated
for a fast fading channel model. Extensions to the block fading model are also
discussed.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:41:17 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Khisti",
"Ashish",
""
],
[
"Tchamkerten",
"Aslan",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702094 | Marko Horvat B.Sc.CS-Dipl.Ing. | Darko Fuduric, Marko Horvat and Mario Zagar | Authentication via wireless networks | 5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia,
2006 | MIPRO, 2006 | null | null | cs.OH | null | Personal authentication is an important process we encounter almost every
day; when we are logging on a computer, entering a company where we work, or a
restricted area, when we are using our plastic credit cards to pay for a
service or to complete some other financial transaction, etc. In each of these
processes of personal authentication some kind of magnetic or optical token is
required. But by using novel technologies like mobile computing and wireless
networking, it is possible to avoid carrying multitude of ID cards or
remembering a number of PIN codes. Article shows how to efficiently
authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA
using commonplace AES (Rijndel) or MD5 encryption. This method can be
implemented on many types of mobile devices like Pocket PC PDA with Windows CE
(Windows Mobile 2003) real-time operating system, or any other customized OS,
so we will explain all components and key features of such basic system.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:46:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fuduric",
"Darko",
""
],
[
"Horvat",
"Marko",
""
],
[
"Zagar",
"Mario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0702095 | Ayan Mahalanobis | Ayan Mahalanobis | A note on using finite non-abelian $p$-groups in the MOR cryptosystem | null | null | null | null | cs.CR math.GR | null | The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem
to non-abelian groups. Using a $p$-group, a cryptosystem was built by this
author in 'A simple generalization of El-Gamal cryptosystem to non-abelian
groups'. It seems reasonable to assume the cryptosystem is as secure as the
El-Gamal cryptosystem over finite fields. A natural question arises can one
make a better cryptosystem using $p$-groups? In this paper we show that the
answer is no.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 19:04:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
cs/0702096 | David Iclanzan Mr | David Iclanzan, Dan Dumitrescu | Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block
Structure | submited to GECCO 2007 (jan 31) | null | null | null | cs.NE cs.AI | null | The Building Block Hypothesis suggests that Genetic Algorithms (GAs) are
well-suited for hierarchical problems, where efficient solving requires proper
problem decomposition and assembly of solution from sub-solution with strong
non-linear interdependencies. The paper proposes a hill-climber operating over
the building block (BB) space that can efficiently address hierarchical
problems. The new Building Block Hill-Climber (BBHC) uses past hill-climb
experience to extract BB information and adapts its neighborhood structure
accordingly. The perpetual adaptation of the neighborhood structure allows the
method to climb the hierarchical structure solving successively the
hierarchical levels. It is expected that for fully non deceptive hierarchical
BB structures the BBHC can solve hierarchical problems in linearithmic time.
Empirical results confirm that the proposed method scales almost linearly with
the problem size thus clearly outperforms population based recombinative
methods.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 21:47:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iclanzan",
"David",
""
],
[
"Dumitrescu",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702097 | Hans van Ditmarsch | M.D. Atkinson and H.P. van Ditmarsch and S. Roehling | Avoiding bias in cards cryptography | 11 pages | Australasian Journal of Combinatorics 44:3-17, 2009 | null | null | cs.CR cs.MA | null | We outline the need for stricter requirements for unconditionally secure
cryptographic protocols inspired by the Russian Cards problem. A new
requirement CA4 is proposed that checks for bias in single card occurrence in
announcements consisting of alternatives for players' holdings of cards. This
requirement CA4 is shown to be equivalent to an alternative requirement CA5.
All announcements found to satisfy CA4 are 2-designs. We also show that all
binary designs are 3-designs. Instead of avoiding bias in announcements
produced by such protocols, one may as well apply unbiased protocols such that
patterns in announcements become meaningless. We gave two examples of such
protocols for card deal parameters (3,3,1), i.e. two of the players hold three
cards, and the remaining player, playing the role of eavesdropper, holds a
single card.
| [
{
"version": "v1",
"created": "Sat, 17 Feb 2007 01:42:39 GMT"
}
] | 2011-11-02T00:00:00 | [
[
"Atkinson",
"M. D.",
""
],
[
"van Ditmarsch",
"H. P.",
""
],
[
"Roehling",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0702098 | Jari Salo | Jari Salo | A Sum-Product Model as a Physical Basis for Shadow Fading | 23 pages, 9 figs. To be revised and maybe submitted | null | null | null | cs.OH | null | Shadow fading (slow fading) effects play a central role in mobile
communication system design and analysis. Experimental evidence indicates that
shadow fading exhibits log-normal power distribution almost universally, and
yet it is still not well understood what causes this. In this paper, we propose
a versatile sum-product signal model as a physical basis for shadow fading.
Simulation results imply that the proposed model results in log-normally
distributed local mean power regardless of the distributions of the
interactions in the radio channel, and hence it is capable of explaining the
log-normality in a wide variety of propagation scenarios. The sum-product model
also includes as its special cases the conventional product model as well as
the recently proposed sum model, and improves upon these by: a) being
applicable in both global and local distance scales; b) being more plausible
from physical point of view; c) providing better goodness-of-fit to log-normal
distribution than either of these models.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 21:54:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Salo",
"Jari",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0702099 | Ruoheng Liu | Ruoheng Liu, Ivana Maric, Predrag Spasojevic, and Roy D. Yates | Discrete Memoryless Interference and Broadcast Channels with
Confidential Messages: Secrecy Rate Regions | to appear Special Issue of IEEE Transactions on Information Theory on
Information Theoretic Security | null | 10.1109/TIT.2008.921879 | null | cs.IT math.IT | null | We study information-theoretic security for discrete memoryless interference
and broadcast channels with independent confidential messages sent to two
receivers. Confidential messages are transmitted to their respective receivers
with information-theoretic secrecy. That is, each receiver is kept in total
ignorance with respect to the message intended for the other receiver. The
secrecy level is measured by the equivocation rate at the eavesdropping
receiver. In this paper, we present inner and outer bounds on secrecy capacity
regions for these two communication systems. The derived outer bounds have an
identical mutual information expression that applies to both channel models.
The difference is in the input distributions over which the expression is
optimized. The inner bound rate regions are achieved by random binning
techniques. For the broadcast channel, a double-binning coding scheme allows
for both joint encoding and preserving of confidentiality. Furthermore, we show
that, for a special case of the interference channel, referred to as the switch
channel, the two bound bounds meet. Finally, we describe several transmission
schemes for Gaussian interference channels and derive their achievable rate
regions while ensuring mutual information-theoretic secrecy. An encoding scheme
in which transmitters dedicate some of their power to create artificial noise
is proposed and shown to outperform both time-sharing and simple multiplexed
transmission of the confidential messages.
| [
{
"version": "v1",
"created": "Sat, 17 Feb 2007 21:02:37 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Dec 2007 23:12:34 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Liu",
"Ruoheng",
""
],
[
"Maric",
"Ivana",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Yates",
"Roy D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702100 | Sundaram Vanka | Sundaram Vanka, M. J. Dehghani, K. M. M. Prabhu, R. Aravind | A Class of Multi-Channel Cosine Modulated IIR Filter Banks | 18 pages, 8 figures | null | null | null | cs.IT math.IT | null | This paper presents a class of multi-channel cosine-modulated filter banks
satisfying the perfect reconstruction (PR) property using an IIR prototype
filter. By imposing a suitable structure on the polyphase filter coefficients,
we show that it is possible to greatly simplify the PR condition, while
preserving the causality and stability of the system. We derive closed-form
expressions for the synthesis filters and also study the numerical stability of
the filter bank using frame theoretic bounds. Further, we show that it is
possible to implement this filter bank with much lower number of arithmetic
operations when compared to FIR filter banks with comparable performance. The
filter bank's modular structure also lends itself to efficient VLSI
implementation.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 16:32:04 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Vanka",
"Sundaram",
""
],
[
"Dehghani",
"M. J.",
""
],
[
"Prabhu",
"K. M. M.",
""
],
[
"Aravind",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702101 | Neri Merhav | Neri Merhav | An identity of Chernoff bounds with an interpretation in statistical
physics and applications in information theory | 29 pages, 1 figure. Submitted to IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | null | An identity between two versions of the Chernoff bound on the probability a
certain large deviations event, is established. This identity has an
interpretation in statistical physics, namely, an isothermal equilibrium of a
composite system that consists of multiple subsystems of particles. Several
information--theoretic application examples, where the analysis of this large
deviations probability naturally arises, are then described from the viewpoint
of this statistical mechanical interpretation. This results in several
relationships between information theory and statistical physics, which we
hope, the reader will find insightful.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 06:30:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Merhav",
"Neri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702102 | Bruce Hajek | Bruce Hajek, Kevin Mitzel, and Sichao Yang | Paging and Registration in Cellular Networks: Jointly Optimal Policies
and an Iterative Algorithm | 13 pages, submitted to IEEE Trans. Information Theory | null | null | null | cs.IT cs.NI math.IT | null | This paper explores optimization of paging and registration policies in
cellular networks. Motion is modeled as a discrete-time Markov process, and
minimization of the discounted, infinite-horizon average cost is addressed. The
structure of jointly optimal paging and registration policies is investigated
through the use of dynamic programming for partially observed Markov processes.
It is shown that there exist policies with a certain simple form that are
jointly optimal, though the dynamic programming approach does not directly
provide an efficient method to find the policies.
An iterative algorithm for policies with the simple form is proposed and
investigated. The algorithm alternates between paging policy optimization and
registration policy optimization. It finds a pair of individually optimal
policies, but an example is given showing that the policies need not be jointly
optimal. Majorization theory and Riesz's rearrangement inequality are used to
show that jointly optimal paging and registration policies are given for
symmetric or Gaussian random walk models by the nearest-location-first paging
policy and distance threshold registration policies.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 20:51:55 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hajek",
"Bruce",
""
],
[
"Mitzel",
"Kevin",
""
],
[
"Yang",
"Sichao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702103 | Philipp Mayr | Dirk Lewandowski, Philipp Mayr | Exploring the academic invisible web | 13 pages, 3 figures | Library Hi Tech, 24 (2006) 4. pp. 529-539 | 10.1108/07378830610715392 | null | cs.DL | null | Purpose: To provide a critical review of Bergman's 2001 study on the Deep
Web. In addition, we bring a new concept into the discussion, the Academic
Invisible Web (AIW). We define the Academic Invisible Web as consisting of all
databases and collections relevant to academia but not searchable by the
general-purpose internet search engines. Indexing this part of the Invisible
Web is central to scientific search engines. We provide an overview of
approaches followed thus far. Design/methodology/approach: Discussion of
measures and calculations, estimation based on informetric laws. Literature
review on approaches for uncovering information from the Invisible Web.
Findings: Bergman's size estimate of the Invisible Web is highly questionable.
We demonstrate some major errors in the conceptual design of the Bergman paper.
A new (raw) size estimate is given. Research limitations/implications: The
precision of our estimate is limited due to a small sample size and lack of
reliable data. Practical implications: We can show that no single library alone
will be able to index the Academic Invisible Web. We suggest collaboration to
accomplish this task. Originality/value: Provides library managers and those
interested in developing academic search engines with data on the size and
attributes of the Academic Invisible Web.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 20:56:34 GMT"
}
] | 2019-01-15T00:00:00 | [
[
"Lewandowski",
"Dirk",
""
],
[
"Mayr",
"Philipp",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0702104 | Ioannis Chatzigeorgiou | Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell,
Rolando Carrasco | A Union Bound Approximation for Rapid Performance Evaluation of
Punctured Turbo Codes | 6 pages, 5 figures, 1 table, Proceedings of the 41st Conference on
Information Sciences and Systems, Baltimore, USA, March 14-16, 2007 | null | 10.1109/CISS.2007.4298352 | null | cs.IT math.IT | null | In this paper, we present a simple technique to approximate the performance
union bound of a punctured turbo code. The bound approximation exploits only
those terms of the transfer function that have a major impact on the overall
performance. We revisit the structure of the constituent convolutional encoder
and we develop a rapid method to calculate the most significant terms of the
transfer function of a turbo encoder. We demonstrate that, for a large
interleaver size, this approximation is very accurate. Furthermore, we apply
our proposed method to a family of punctured turbo codes, which we call
pseudo-randomly punctured codes. We conclude by emphasizing the benefits of our
approach compared to those employed previously. We also highlight the
advantages of pseudo-random puncturing over other puncturing schemes.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 09:18:22 GMT"
}
] | 2022-03-08T00:00:00 | [
[
"Chatzigeorgiou",
"Ioannis",
""
],
[
"Rodrigues",
"Miguel R. D.",
""
],
[
"Wassell",
"Ian J.",
""
],
[
"Carrasco",
"Rolando",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702105 | Hossein Kakavand | David Donoho, Hossein Kakavand, James Mammen | The Simplest Solution to an Underdetermined System of Linear Equations | Proceedings of the IEEE International Symposium on Information Theory
Seattle, Washington, July 9-14, 2006 | null | 10.1109/ISIT.2006.261816 | null | cs.IT math.IT | null | Consider a d*n matrix A, with d<n. The problem of solving for x in y=Ax is
underdetermined, and has infinitely many solutions (if there are any). Given y,
the minimum Kolmogorov complexity solution (MKCS) of the input x is defined to
be an input z (out of many) with minimum Kolmogorov-complexity that satisfies
y=Az. One expects that if the actual input is simple enough, then MKCS will
recover the input exactly. This paper presents a preliminary study of the
existence and value of the complexity level up to which such a complexity-based
recovery is possible. It is shown that for the set of all d*n binary matrices
(with entries 0 or 1 and d<n), MKCS exactly recovers the input for an
overwhelming fraction of the matrices provided the Kolmogorov complexity of the
input is O(d). A weak converse that is loose by a log n factor is also
established for this case. Finally, we investigate the difficulty of finding a
matrix that has the property of recovering inputs with complexity of O(d) using
MKCS.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 12:34:09 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Donoho",
"David",
""
],
[
"Kakavand",
"Hossein",
""
],
[
"Mammen",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702106 | Charles Robert | Charles Robert (LORIA), Ranmi Adigun (YABATECH) | Wild, Wild Wikis: A way forward | null | Dans The Fifth International Conference on Creating, Connecting
and Collaborating through Computing, C5 2007 (2007) | null | null | cs.IR | null | Wikis can be considered as public domain knowledge sharing system. They
provide opportunity for those who may not have the privilege to publish their
thoughts through the traditional methods. They are one of the fastest growing
systems of online encyclopaedia. In this study, we consider the importance of
wikis as a way of creating, sharing and improving public knowledge. We identify
some of the problems associated with wikis to include, (a) identification of
the identities of information and its creator (b) accuracy of information (c)
justification of the credibility of authors (d) vandalism of quality of
information (e) weak control over the contents. A solution to some of these
problems is sought through the use of an annotation model. The model assumes
that contributions in wikis can be seen as annotation to the initial document.
It proposed a systematic control of contributors and contributions to the
initiative and the keeping of records of what existed and what was done to
initial documents. We believe that with this model, analysis can be done on the
progress of wiki initiatives. We assumed that using this model, wikis can be
better used for creation and sharing of knowledge for public use.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:12:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Charles",
"",
"LORIA"
],
[
"Adigun",
"Ranmi",
"",
"YABATECH"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702107 | Charles Robert | Charles A. Robert (LORIA) | AMIEDoT: An annotation model for document tracking and recommendation
service | null | Dans International Joint Conferences on Computer, Information, and
Systems Sciences, and Engineering, (CIS2E 06) (2007) | null | null | cs.IR | null | The primary objective of document annotation in whatever form, manual or
electronic is to allow those who may not have control to original document to
provide personal view on information source. Beyond providing personal
assessment to original information sources, we are looking at a situation where
annotation made can be used as additional source of information for document
tracking and recommendation service. Most of the annotation tools existing
today were conceived for their independent use with no reference to the creator
of the annotation. We propose AMIEDoT (Annotation Model for Information
Exchange and Document Tracking) an annotation model that can assist in document
tracking and recommendation service. The model is based on three parameters in
the acts of annotation. We believe that introducing document parameters, time
and the parameters of the creator of annotation into an annotation process can
be a dependable source to know, who used a document, when a document was used
and for what a document was used for. Beyond document tracking, our model can
be used in not only for selective dissemination of information but for
recommendation services. AMIEDoT can also be used for information sharing and
information reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:18:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702108 | Wenyi Zhang | Wenyi Zhang, Urbashi Mitra | Orthogonal Codes for Robust Low-Cost Communication | 2nd revision, accepted for publication | null | null | USC CSI Technical Report CSI-07-02-01 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orthogonal coding schemes, known to asymptotically achieve the capacity per
unit cost (CPUC) for single-user ergodic memoryless channels with a zero-cost
input symbol, are investigated for single-user compound memoryless channels,
which exhibit uncertainties in their input-output statistical relationships. A
minimax formulation is adopted to attain robustness. First, a class of
achievable rates per unit cost (ARPUC) is derived, and its utility is
demonstrated through several representative case studies. Second, when the
uncertainty set of channel transition statistics satisfies a convexity
property, optimization is performed over the class of ARPUC through utilizing
results of minimax robustness. The resulting CPUC lower bound indicates the
ultimate performance of the orthogonal coding scheme, and coincides with the
CPUC under certain restrictive conditions. Finally, still under the convexity
property, it is shown that the CPUC can generally be achieved, through
utilizing a so-called mixed strategy in which an orthogonal code contains an
appropriate composition of different nonzero-cost input symbols.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 19:06:56 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jan 2008 19:31:43 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Sep 2008 02:55:52 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Zhang",
"Wenyi",
""
],
[
"Mitra",
"Urbashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702109 | Charles Robert | Charles A. Robert (LORIA), David Amos (LORIA) | AMIE: An annotation model for information research | null | Dans International Conference on Computers in Education, (2006) | null | null | cs.IR | null | The objective of most users for consulting any information database,
information warehouse or the internet is to resolve one problem or the other.
Available online or offline annotation tools were not conceived with the
objective of assisting users in their bid to resolve a decisional problem.
Apart from the objective and usage of annotation tools, how these tools are
conceived and classified has implication on their usage. Several criteria have
been used to categorize annotation concepts. Typically annotation are conceived
based on how it affect the organization of document been considered for
annotation or the organization of the resulting annotation. Our approach is
annotation that will assist in information research for decision making.
Annotation model for information exchange (AMIE) was conceived with the
objective of information sharing and reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:26:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
],
[
"Amos",
"David",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702110 | Saltuk Aksahin | Saltuk Aksahin | Security Implications of Converged Networks and Protecting Them, without
Compromising Efficiency | 64 pages | null | null | null | cs.NI | null | This dissertation has extensively looked into all aspects of VoIP
commu-nications technology, and information presented in preceding chapters,
which build up a solid framework to discuss the conceptual design model, and
investigate features that could be incorporated for actual Pro-jects, with
parameters that are tested on field values. The dissertation follows a
five-course model, for answering different questions, both tech-nical and
businesslike, around central issues, that have been crucial to explanation of
the topic; starting with a general overview of VoIP tech-nology, analyzing
current VoIP encryption methods, identifying security threats, designing a
robust VoIP system based on particulars discussed in preceding chapters, and
finally, a VoIP simulation.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 20:51:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aksahin",
"Saltuk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0702111 | Andres Vila Casado | Andres I. Vila Casado, Miguel Griot and Richard D. Wesel | Informed Dynamic Scheduling for Belief-Propagation Decoding of LDPC
Codes | 6 pages, 4 figures | null | null | null | cs.IT math.IT | null | Low-Density Parity-Check (LDPC) codes are usually decoded by running an
iterative belief-propagation, or message-passing, algorithm over the factor
graph of the code. The traditional message-passing schedule consists of
updating all the variable nodes in the graph, using the same pre-update
information, followed by updating all the check nodes of the graph, again,
using the same pre-update information. Recently several studies show that
sequential scheduling, in which messages are generated using the latest
available information, significantly improves the convergence speed in terms of
number of iterations. Sequential scheduling raises the problem of finding the
best sequence of message updates. This paper presents practical scheduling
strategies that use the value of the messages in the graph to find the next
message to be updated. Simulation results show that these informed update
sequences require significantly fewer iterations than standard sequential
schedules. Furthermore, the paper shows that informed scheduling solves some
standard trapping set errors. Therefore, it also outperforms traditional
scheduling for a large numbers of iterations. Complexity and implementability
issues are also addressed.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 23:26:43 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Feb 2007 09:56:44 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Casado",
"Andres I. Vila",
""
],
[
"Griot",
"Miguel",
""
],
[
"Wesel",
"Richard D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702112 | Ender Tekin | Ender Tekin, Aylin Yener | The General Gaussian Multiple Access and Two-Way Wire-Tap Channels:
Achievable Rates and Cooperative Jamming | IEEE Transactions on Information Theory, Special Issue on Information
Theoretic Security | null | null | null | cs.IT cs.CR math.IT | null | The General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT) and the
Gaussian Two-Way Wire-Tap Channel (GTW-WT) are considered. In the GGMAC-WT,
multiple users communicate with an intended receiver in the presence of an
eavesdropper who receives their signals through another GMAC. In the GTW-WT,
two users communicate with each other over a common Gaussian channel, with an
eavesdropper listening through a GMAC. A secrecy measure that is suitable for
this multi-terminal environment is defined, and achievable secrecy rate regions
are found for both channels. For both cases, the power allocations maximizing
the achievable secrecy sum-rate are determined. It is seen that the optimum
policy may prevent some terminals from transmission in order to preserve the
secrecy of the system. Inspired by this construct, a new scheme,
\ital{cooperative jamming}, is proposed, where users who are prevented from
transmitting according to the secrecy sum-rate maximizing power allocation
policy "jam" the eavesdropper, thereby helping the remaining users. This scheme
is shown to increase the achievable secrecy sum-rate. Overall, our results show
that in multiple-access scenarios, users can help each other to collectively
achieve positive secrecy rates. In other words, cooperation among users can be
invaluable for achieving secrecy for the system.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 02:25:51 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jan 2008 23:32:18 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702113 | David Pritchard | David Pritchard and Ramakrishna Thurimella | Fast Computation of Small Cuts via Cycle Space Sampling | Previous version appeared in Proc. 35th ICALP, pages 145--160, 2008 | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new sampling-based method to determine cuts in an undirected
graph. For a graph (V, E), its cycle space is the family of all subsets of E
that have even degree at each vertex. We prove that with high probability,
sampling the cycle space identifies the cuts of a graph. This leads to simple
new linear-time sequential algorithms for finding all cut edges and cut pairs
(a set of 2 edges that form a cut) of a graph.
In the model of distributed computing in a graph G=(V, E) with O(log V)-bit
messages, our approach yields faster algorithms for several problems. The
diameter of G is denoted by Diam, and the maximum degree by Delta. We obtain
simple O(Diam)-time distributed algorithms to find all cut edges,
2-edge-connected components, and cut pairs, matching or improving upon previous
time bounds. Under natural conditions these new algorithms are universally
optimal --- i.e. a Omega(Diam)-time lower bound holds on every graph. We obtain
a O(Diam+Delta/log V)-time distributed algorithm for finding cut vertices; this
is faster than the best previous algorithm when Delta, Diam = O(sqrt(V)). A
simple extension of our work yields the first distributed algorithm with
sub-linear time for 3-edge-connected components. The basic distributed
algorithms are Monte Carlo, but they can be made Las Vegas without increasing
the asymptotic complexity.
In the model of parallel computing on the EREW PRAM our approach yields a
simple algorithm with optimal time complexity O(log V) for finding cut pairs
and 3-edge-connected components.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 03:00:33 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Apr 2007 04:26:00 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Jul 2007 04:43:05 GMT"
},
{
"version": "v4",
"created": "Tue, 8 Apr 2008 19:17:34 GMT"
},
{
"version": "v5",
"created": "Wed, 21 Jul 2010 09:49:35 GMT"
}
] | 2010-07-22T00:00:00 | [
[
"Pritchard",
"David",
""
],
[
"Thurimella",
"Ramakrishna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702114 | David Pritchard | David Pritchard | Nearest Neighbor Network Traversal | null | null | null | null | cs.DC | null | A mobile agent in a network wants to visit every node of an n-node network,
using a small number of steps. We investigate the performance of the following
``nearest neighbor'' heuristic: always go to the nearest unvisited node. If the
network graph never changes, then from (Rosenkrantz, Stearns and Lewis, 1977)
and (Hurkens and Woeginger, 2004) it follows that Theta(n log n) steps are
necessary and sufficient in the worst case. We give a simpler proof of the
upper bound and an example that improves the best known lower bound.
We investigate how the performance of this heuristic changes when it is
distributively implemented in a network. Even if network edges are allow to
fail over time, we show that the nearest neighbor strategy never runs for more
than O(n^2) iterations. We also show that any strategy can be forced to take at
least n(n-1)/2 steps before all nodes are visited, if the edges of the network
are deleted in an adversarial way.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 03:54:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritchard",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0702115 | Rajesh Sundaresan | Rajesh Sundaresan | Guessing based on length functions | 16 pages, Submitted to IEEE Transactions on Information Theory,
Special issue on Information Theoretic Security, Simplified proof of
Proposition 2 | null | 10.1109/ISIT.2007.4557309 | null | cs.IT cs.CR math.IT | null | A guessing wiretapper's performance on a Shannon cipher system is analyzed
for a source with memory. Close relationships between guessing functions and
length functions are first established. Subsequently, asymptotically optimal
encryption and attack strategies are identified and their performances analyzed
for sources with memory. The performance metrics are exponents of guessing
moments and probability of large deviations. The metrics are then characterized
for unifilar sources. Universal asymptotically optimal encryption and attack
strategies are also identified for unifilar sources. Guessing in the increasing
order of Lempel-Ziv coding lengths is proposed for finite-state sources, and
shown to be asymptotically optimal. Finally, competitive optimality properties
of guessing in the increasing order of description lengths and Lempel-Ziv
coding lengths are demonstrated.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 09:12:11 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Apr 2007 10:22:53 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sundaresan",
"Rajesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702116 | Dale Miller | David Baelde, Andrew Gacek, Dale Miller, Gopalan Nadathur, and Alwen
Tiu | The Bedwyr system for model checking over syntactic expressions | 6 page system description. Appeared in CADE 2007 | CADE 2007: 21th Conference on Automated Deduction, Frank Pfenning,
editor, LNAI 4603, pages 391-397. Springer, 2007 | null | null | cs.LO | null | Bedwyr is a generalization of logic programming that allows model checking
directly on syntactic expressions possibly containing bindings. This system,
written in OCaml, is a direct implementation of two recent advances in the
theory of proof search. The first is centered on the fact that both finite
success and finite failure can be captured in the sequent calculus by
incorporating inference rules for definitions that allow fixed points to be
explored. As a result, proof search in such a sequent calculus can capture
simple model checking problems as well as may and must behavior in operational
semantics. The second is that higher-order abstract syntax is directly
supported using term-level $\lambda$-binders and the $\nabla$ quantifier. These
features allow reasoning directly on expressions containing bound variables.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 10:08:24 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Apr 2008 13:36:15 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Baelde",
"David",
""
],
[
"Gacek",
"Andrew",
""
],
[
"Miller",
"Dale",
""
],
[
"Nadathur",
"Gopalan",
""
],
[
"Tiu",
"Alwen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702117 | Mathieu Couture | Prosenjit Bose and Paz Carmi and Mathieu Couture and Michiel Smid and
Daming Xu | On a family of strong geometric spanners that admit local routing
strategies | null | null | null | null | cs.CG | null | We introduce a family of directed geometric graphs, denoted $\paz$, that
depend on two parameters $\lambda$ and $\theta$. For $0\leq
\theta<\frac{\pi}{2}$ and ${1/2} < \lambda < 1$, the $\paz$ graph is a strong
$t$-spanner, with $t=\frac{1}{(1-\lambda)\cos\theta}$. The out-degree of a node
in the $\paz$ graph is at most $\lfloor2\pi/\min(\theta,
\arccos\frac{1}{2\lambda})\rfloor$. Moreover, we show that routing can be
achieved locally on $\paz$. Next, we show that all strong $t$-spanners are also
$t$-spanners of the unit disk graph. Simulations for various values of the
parameters $\lambda$ and $\theta$ indicate that for random point sets, the
spanning ratio of $\paz$ is better than the proven theoretical bounds.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 20:54:16 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 14:57:44 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Feb 2007 21:17:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Couture",
"Mathieu",
""
],
[
"Smid",
"Michiel",
""
],
[
"Xu",
"Daming",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0702118 | Kwankyu Lee | Kwankyu Lee | Interpolation-based Decoding of Alternant Codes | submitted to the journal of Advances in Mathematics of Communications | null | null | null | cs.IT math.IT | null | We formulate the classical decoding algorithm of alternant codes afresh based
on interpolation as in Sudan's list decoding of Reed-Solomon codes, and thus
get rid of the key equation and the linear recurring sequences in the theory.
The result is a streamlined exposition of the decoding algorithm using a bit of
the theory of Groebner bases of modules.
| [
{
"version": "v1",
"created": "Wed, 21 Feb 2007 04:43:17 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Lee",
"Kwankyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702119 | Raju Renjit G | Raju Renjit. G | Ulam's Conjecture is True for Connected Graphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This submission has been withdrawn at the request of the author.
| [
{
"version": "v1",
"created": "Wed, 21 Feb 2007 08:39:42 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Apr 2007 11:56:55 GMT"
},
{
"version": "v3",
"created": "Wed, 7 May 2008 15:47:08 GMT"
},
{
"version": "v4",
"created": "Sat, 15 Nov 2008 04:56:43 GMT"
},
{
"version": "v5",
"created": "Fri, 13 Mar 2009 05:59:58 GMT"
},
{
"version": "v6",
"created": "Thu, 19 Mar 2009 05:32:08 GMT"
},
{
"version": "v7",
"created": "Tue, 14 Apr 2009 06:46:18 GMT"
},
{
"version": "v8",
"created": "Wed, 20 May 2009 11:24:31 GMT"
},
{
"version": "v9",
"created": "Tue, 25 Aug 2009 15:31:48 GMT"
}
] | 2009-08-25T00:00:00 | [
[
"G",
"Raju Renjit.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702120 | James Worrell | Joel Ouaknine and James Worrell | On the decidability and complexity of Metric Temporal Logic over finite
words | null | Logical Methods in Computer Science, Volume 3, Issue 1 (February
28, 2007) lmcs:2230 | 10.2168/LMCS-3(1:8)2007 | null | cs.LO cs.CC | null | Metric Temporal Logic (MTL) is a prominent specification formalism for
real-time systems. In this paper, we show that the satisfiability problem for
MTL over finite timed words is decidable, with non-primitive recursive
complexity. We also consider the model-checking problem for MTL: whether all
words accepted by a given Alur-Dill timed automaton satisfy a given MTL
formula. We show that this problem is decidable over finite words. Over
infinite words, we show that model checking the safety fragment of MTL--which
includes invariance and time-bounded response properties--is also decidable.
These results are quite surprising in that they contradict various claims to
the contrary that have appeared in the literature.
| [
{
"version": "v1",
"created": "Wed, 21 Feb 2007 16:14:34 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2007 12:51:39 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Feb 2007 16:27:53 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Ouaknine",
"Joel",
""
],
[
"Worrell",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702121 | Sherman Wang Dr. | Xing M. Wang | Induced Hilbert Space, Markov Chain, Diffusion Map and Fock Space in
Thermophysics | 25 pages | null | null | null | cs.OH math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we continue to explore Probability Bracket Notation (PBN),
proposed in our previous article. Using both Dirac vector bracket notation
(VBN) and PBN, we define induced Hilbert space and induced sample space, and
propose that there exists an equivalence relation between a Hilbert space and a
sample space constructed from the same base observable(s). Then we investigate
Markov transition matrices and their eigenvectors to make diffusion maps with
two examples: a simple graph theory example, to serve as a prototype of
bidirectional transition operator; a famous text document example in IR
literature, to serve as a tutorial of diffusion map in text document space. We
show that the sample space of the Markov chain and the Hilbert space spanned by
the eigenvectors of the transition matrix are not equivalent. At the end, we
apply our PBN and equivalence proposal to Thermophysics by associating sample
(phase) space with the Hilbert space of a single particle and the Fock space of
many-particle systems.
| [
{
"version": "v1",
"created": "Wed, 21 Feb 2007 22:55:22 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Mar 2007 20:07:05 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Mar 2007 04:32:50 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Apr 2007 18:51:10 GMT"
},
{
"version": "v5",
"created": "Sun, 22 Nov 2009 21:50:49 GMT"
}
] | 2009-11-22T00:00:00 | [
[
"Wang",
"Xing M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0702122 | Thomas Michel | Thomas Michel, Gerhard Wunder | Transmitter and Precoding Order Optimization for Nonlinear Downlink
Beamforming | Submitted to IEEE Int. Symposium on Inf. Theory (ISIT) 2007 | null | null | null | cs.IT math.IT | null | The downlink of a multiple-input multiple output (MIMO) broadcast channel
(BC) is considered, where each receiver is equipped with a single antenna and
the transmitter performs nonlinear Dirty-Paper Coding (DPC). We present an
efficient algorithm that finds the optimum transmit filters and power
allocation as well as the optimum precoding order(s) possibly affording
time-sharing between individual DPC orders. Subsequently necessary and
sufficient conditions for the optimality of an arbitrary precoding order are
derived. Based on these we propose a suboptimal algorithm showing excellent
performance and having low complexity.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 08:13:39 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Michel",
"Thomas",
""
],
[
"Wunder",
"Gerhard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702123 | Slavcho Shtrakov | Slavcho Shtrakov and Vladimir Shtrakov | Tree automata and separable sets of input variables | 8 pages, 2 figures | J. FILOMAT, v. 15, 2001, University of Nis, 61-71 p., ISSN
0354-5180 (http://www.pmf.ni.ac.yu/sajt/publikacije/filomat_15.html) | null | null | cs.CC cs.DM | null | We consider the computational complexity of tree transducers, depending on
their separable sets of input variables.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
],
[
"Shtrakov",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702124 | Mohsen Bayati | Mohsen Bayati, Jeong Han Kim and Amin saberi | A Sequential Algorithm for Generating Random Graphs | 39 pages | Algorithmica (2010) 58: 860-910 | 10.1007/s00453-009-9340-1 | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a nearly-linear time algorithm for counting and randomly
generating simple graphs with a given degree sequence in a certain range. For
degree sequence $(d_i)_{i=1}^n$ with maximum degree $d_{\max}=O(m^{1/4-\tau})$,
our algorithm generates almost uniform random graphs with that degree sequence
in time $O(m\,d_{\max})$ where $m=\f{1}{2}\sum_id_i$ is the number of edges in
the graph and $\tau$ is any positive constant. The fastest known algorithm for
uniform generation of these graphs McKay Wormald (1990) has a running time of
$O(m^2d_{\max}^2)$. Our method also gives an independent proof of McKay's
estimate McKay (1985) for the number of such graphs.
We also use sequential importance sampling to derive fully Polynomial-time
Randomized Approximation Schemes (FPRAS) for counting and uniformly generating
random graphs for the same range of $d_{\max}=O(m^{1/4-\tau})$.
Moreover, we show that for $d = O(n^{1/2-\tau})$, our algorithm can generate
an asymptotically uniform $d$-regular graph. Our results improve the previous
bound of $d = O(n^{1/3-\tau})$ due to Kim and Vu (2004) for regular graphs.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:00:53 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Apr 2007 17:26:05 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jun 2007 03:32:11 GMT"
},
{
"version": "v4",
"created": "Sat, 16 Jun 2007 01:42:14 GMT"
},
{
"version": "v5",
"created": "Sat, 3 Mar 2012 01:38:04 GMT"
}
] | 2012-03-06T00:00:00 | [
[
"Bayati",
"Mohsen",
""
],
[
"Kim",
"Jeong Han",
""
],
[
"saberi",
"Amin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702125 | Philipp Pluch | Philipp Pluch, Samo Wakounig | Bayesian Network Tomography and Inference | null | null | null | null | cs.NI | null | The aim of this technical report is to give a short overview of known
techniques for network tomography (introduced in the paper of Vardi (1996)),
extended by a Bayesian approach originating Tebaldi and West (1998). Since the
studies of A.K. Erlang (1878-1929) on telephone networks in the last
millennium, lots of needs are seen in todays applications of networks and
network tomography, so for instance networks are a critical component of the
information structure supporting finance, commerce and even civil and national
defence. An attack on a network can be performed as an intrusion in the network
or as sending a lot of fault information and disturbing the network flow. Such
attacks can be detected by modelling the traffic flows in a network, by
counting the source destination packets and even by measuring counts over time
and by drawing a comparison with this 'time series' for instance.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 09:43:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pluch",
"Philipp",
""
],
[
"Wakounig",
"Samo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0702126 | Vincenzo Nicosia | V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri | Efficient Searching and Retrieval of Documents in PROSA | 12 pages, 3 figures | null | null | null | cs.DC cs.IR | null | Retrieving resources in a distributed environment is more difficult than
finding data in centralised databases. In the last decade P2P system arise as
new and effective distributed architectures for resource sharing, but searching
in such environments could be difficult and time-consuming. In this paper we
discuss efficiency of resource discovery in PROSA, a self-organising P2P system
heavily inspired by social networks. All routing choices in PROSA are made
locally, looking only at the relevance of the next peer to each query. We show
that PROSA is able to effectively answer queries for rare documents, forwarding
them through the most convenient path to nodes that much probably share
matching resources. This result is heavily related to the small-world structure
that naturally emerges in PROSA.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:22:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nicosia",
"V.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702127 | Vincenzo Nicosia | V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri | Exploiting social networks dynamics for P2P resource organisation | 9 pages, 4 figures | Lecture Notes on Computer Science (LNCS) 4263 (2006) | null | null | cs.DC cs.IR | null | In this paper we present a formal description of PROSA, a P2P resource
management system heavily inspired by social networks. Social networks have
been deeply studied in the last two decades in order to understand how
communities of people arise and grow. It is a widely known result that networks
of social relationships usually evolves to small-worlds, i.e. networks where
nodes are strongly connected to neighbours and separated from all other nodes
by a small amount of hops. This work shows that algorithms implemented into
PROSA allow to obtain an efficient small-world P2P network.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:35:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nicosia",
"V.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0702128 | Huang Xiangao | Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu
jing Wang and Tao Wang | Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher
Based on Complexity | 6 pages, 1 figure | null | null | null | cs.CR | null | In this letter we assert that we have reconstructed the nonlinear filter
function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our
reconstruction need approximately 2^12~2^13 and the attack consumes 5825.016
sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We
got the expression of the nonlinear filter function fd of Lili-128 which has 46
items from liner items to nonlinear items based on complexity, the phase space
reconstruction, Clustering and nonlinear prediction. We have verified our
reconstruction result correctness by simulating the overview of Lili-128
keystream generators using our getting fd and implement designers reference
module of the Lili-128 stream cipher, and two methods produce the same
synchronous keystream sequence on same initial state, so that our research work
proves that the nonlinear filter function of LILI-128 stream cipher is
successfully reconstructed.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 14:03:51 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Apr 2007 01:53:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Xiangao",
""
],
[
"Huang",
"Wei",
""
],
[
"Liu",
"Xiaozhou",
""
],
[
"Wang",
"Chao",
""
],
[
"Wang",
"Zhu jing",
""
],
[
"Wang",
"Tao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0702129 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Input Variables | 10 pages, 2 figures, 60th Workshop on General Algebra, June 22-25,
2000, TU Dresden | J. Contributions to General Algebra, v.13, Verlag Johannes Heyn,
Klagenfurt, 2001, 309-319 p | null | null | cs.CC cs.DM | null | We introduce and study the essential inputs (variables) for terms (trees) and
tree automata.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:12:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702130 | Georg Schmidt | Georg Schmidt, Vladimir R. Sidorenko, Martin Bossert | Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance
based on Shift-Register Synthesis | 14 pages, 5 figures | null | null | null | cs.IT math.IT | null | In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond
half the minimum distance is considered and analyzed. Unlike the Sudan
algorithm published in 1997, this new approach is based on multi-sequence
shift-register synthesis, which makes it easy to understand and simple to
implement. The computational complexity of this shift-register based algorithm
is of the same order as the complexity of the well-known Berlekamp-Massey
algorithm. Moreover, the error correcting radius coincides with the error
correcting radius of the original Sudan algorithm, and the practical decoding
performance observed on a q-ary symmetric channel (QSC) is virtually identical
to the decoding performance of the Sudan algorithm. Bounds for the failure and
error probability as well as for the QSC decoding performance of the new
algorithm are derived, and the performance is illustrated by means of examples.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:55:31 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Schmidt",
"Georg",
""
],
[
"Sidorenko",
"Vladimir R.",
""
],
[
"Bossert",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702131 | Jason Reese | Graham B. Macpherson and Jason M. Reese | AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics
in Arbitrary Geometries | null | null | null | null | cs.CE cs.DC | null | A new algorithm for calculating intermolecular pair forces in Molecular
Dynamics (MD) simulations on a distributed parallel computer is presented. The
Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on
geometrical domains defined by an unstructured, arbitrary polyhedral mesh,
which has been spatially decomposed into irregular portions for
parallelisation. It is intended for nano scale fluid mechanics simulation by MD
in complex geometries, and to provide the MD component of a hybrid MD/continuum
simulation. AICA has been implemented in the open-source computational toolbox
OpenFOAM, and verified against a published MD code.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 17:27:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Macpherson",
"Graham B.",
""
],
[
"Reese",
"Jason M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0702132 | Vikram Chandrasekhar | Vikram Chandrasekhar and Jeffrey G. Andrews | Uplink Capacity and Interference Avoidance for Two-Tier Femtocell
Networks | To be published in the IEEE Transactions on Wireless Communications | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two-tier femtocell networks-- comprising a conventional macrocellular network
plus embedded femtocell hotspots-- offer an economically viable solution to
achieving high cellular user capacity and improved coverage. With universal
frequency reuse and DS-CDMA transmission however, the ensuing cross-tier
cochannel interference (CCI) causes unacceptable outage probability. This paper
develops an uplink capacity analysis and interference avoidance strategy in
such a two-tier CDMA network. We evaluate a network-wide area spectral
efficiency metric called the \emph{operating contour (OC)} defined as the
feasible combinations of the average number of active macrocell users and
femtocell base stations (BS) per cell-site that satisfy a target outage
constraint. The capacity analysis provides an accurate characterization of the
uplink outage probability, accounting for power control, path-loss and
shadowing effects. Considering worst case CCI at a corner femtocell, results
reveal that interference avoidance through a time-hopped CDMA physical layer
and sectorized antennas allows about a 7x higher femtocell density, relative to
a split spectrum two-tier network with omnidirectional femtocell antennas. A
femtocell exclusion region and a tier selection based handoff policy offers
modest improvements in the OCs. These results provide guidelines for the design
of robust shared spectrum two-tier networks.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 00:26:03 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Feb 2007 06:20:53 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Feb 2007 06:41:10 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Feb 2007 23:12:12 GMT"
},
{
"version": "v5",
"created": "Sun, 6 May 2007 19:36:58 GMT"
},
{
"version": "v6",
"created": "Sat, 26 May 2007 20:44:21 GMT"
},
{
"version": "v7",
"created": "Sun, 11 Nov 2007 21:57:40 GMT"
},
{
"version": "v8",
"created": "Mon, 11 Feb 2008 04:02:40 GMT"
},
{
"version": "v9",
"created": "Thu, 5 Feb 2009 22:30:42 GMT"
}
] | 2009-02-06T00:00:00 | [
[
"Chandrasekhar",
"Vikram",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702133 | Vadim Yatsenko | Vadim Yatsenko | Fast Exact Method for Solving the Travelling Salesman Problem | 4 pages, 4 figures | null | null | null | cs.CC | null | This paper describes TSP exact solution of polynomial complexity. It is
considered properties of proposed method. Effectiveness of proposed solution is
illustrated by outcomes of computer modeling.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 02:39:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yatsenko",
"Vadim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702134 | Pankaj Sati Mr | Pankaj Sati | Patterns of technological progress: A Predictability-Based Perspective | Paper has been withdrawn | null | null | null | cs.CY | null | The paper tries to identify new emerging patterns in the context of
technological progress. Just as industrialization is associated with
rationalization, mechanization, and automation, the Internet age is associated
with computer models, embedded knowledge, and collaboration. Comparison among
patterns is highlighted and analysis is done from predictability-based
perspective.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 09:18:56 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Feb 2007 08:31:06 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Jun 2012 14:36:30 GMT"
}
] | 2012-06-28T00:00:00 | [
[
"Sati",
"Pankaj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0702135 | Simon Portegies Zwart | Simon Portegies Zwart, Robert Belleman, Peter Geldof | High Performance Direct Gravitational N-body Simulations on Graphics
Processing Units | Submitted to New Astronomy | null | 10.1016/j.newast.2007.05.004 | null | cs.PF | null | We present the results of gravitational direct $N$-body simulations using the
commercial graphics processing units (GPU) NVIDIA Quadro FX1400 and GeForce
8800GTX, and compare the results with GRAPE-6Af special purpose hardware. The
force evaluation of the $N$-body problem was implemented in Cg using the GPU
directly to speed-up the calculations. The integration of the equations of
motions were, running on the host computer, implemented in C using the 4th
order predictor-corrector Hermite integrator with block time steps. We find
that for a large number of particles ($N \apgt 10^4$) modern graphics
processing units offer an attractive low cost alternative to GRAPE special
purpose hardware. A modern GPU continues to give a relatively flat scaling with
the number of particles, comparable to that of the GRAPE. Using the same time
step criterion the total energy of the $N$-body system was conserved better
than to one in $10^6$ on the GPU, which is only about an order of magnitude
worse than obtained with GRAPE. For $N\apgt 10^6$ the GeForce 8800GTX was about
20 times faster than the host computer. Though still about an order of
magnitude slower than GRAPE, modern GPU's outperform GRAPE in their low cost,
long mean time between failure and the much larger onboard memory; the
GRAPE-6Af holds at most 256k particles whereas the GeForce 8800GTF can hold 9
million particles in memory.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 09:44:17 GMT"
}
] | 2015-06-25T00:00:00 | [
[
"Zwart",
"Simon Portegies",
""
],
[
"Belleman",
"Robert",
""
],
[
"Geldof",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0702136 | Slavcho Shtrakov | Ivo Damyanov and Slavcho Shtrakov | Essential Inputs and Minimal Tree Automata | 7 pages, 1 figure, Sixth International Conference on Discrete
Mathematics and Applications, 31.08-02.09.2001, Bansko | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 77-85 p | null | null | cs.CC cs.DM | null | We continue studying essential inputs of trees and automata. Strongly
essential inputs of trees are introduced and studied. Various examples for
application in Computer Science are shown.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 12:48:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damyanov",
"Ivo",
""
],
[
"Shtrakov",
"Slavcho",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702137 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Subtrees | 9 pages, 2 figures, Sixth International Conference on Discrete
Mathematics and Applications, Bansko, 2001 | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p | null | null | cs.CC cs.DM | null | We introduce essential subtrees for terms (trees) and tree automata . There
are some results concerning independent sets of subtrees and separable sets for
a tree and an automaton.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 13:20:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702138 | Joakim Jalden | J. Jalden and B. Ottersten | On the Maximal Diversity Order of Spatial Multiplexing with Transmit
Antenna Selection | 10 pages. Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | Zhang et. al. recently derived upper and lower bounds on the achievable
diversity of an N_R x N_T i.i.d. Rayleigh fading multiple antenna system using
transmit antenna selection, spatial multiplexing and a linear receiver
structure. For the case of L = 2 transmitting (out of N_T available) antennas
the bounds are tight and therefore specify the maximal diversity order. For the
general case with L <= min(N_R,N_T) transmitting antennas it was conjectured
that the maximal diversity is (N_T-L+1)(N_R-L+1) which coincides with the lower
bound. Herein, we prove this conjecture for the zero forcing and zero forcing
decision feedback (with optimal detection ordering) receiver structures.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 14:29:03 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Jalden",
"J.",
""
],
[
"Ottersten",
"B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702139 | Alexander Kholosha | Tor Helleseth and Alexander Kholosha and Geir Jarle Ness | Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with
Three-Valued Crosscorrelation | 23 pages | null | null | null | cs.CR cs.DM | null | Considered is the distribution of the crosscorrelation between $m$-sequences
of length $2^m-1$, where $m=2k$, and $m$-sequences of shorter length $2^k-1$.
New pairs of $m$-sequences with three-valued crosscorrelation are found and the
complete correlation distribution is determined. Finally, we conjecture that
there are no more cases with a three-valued crosscorrelation apart from the
ones proven here.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 16:01:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Helleseth",
"Tor",
""
],
[
"Kholosha",
"Alexander",
""
],
[
"Ness",
"Geir Jarle",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0702140 | Bernardo Huberman | Dennis M. Wilkinson and Bernardo A. Huberman | Assessing the Value of Coooperation in Wikipedia | null | null | null | null | cs.DL cs.CY physics.soc-ph | null | Since its inception six years ago, the online encyclopedia Wikipedia has
accumulated 6.40 million articles and 250 million edits, contributed in a
predominantly undirected and haphazard fashion by 5.77 million unvetted
volunteers. Despite the apparent lack of order, the 50 million edits by 4.8
million contributors to the 1.5 million articles in the English-language
Wikipedia follow strong certain overall regularities. We show that the
accretion of edits to an article is described by a simple stochastic mechanism,
resulting in a heavy tail of highly visible articles with a large number of
edits. We also demonstrate a crucial correlation between article quality and
number of edits, which validates Wikipedia as a successful collaborative
effort.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 17:59:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilkinson",
"Dennis M.",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0702141 | Tanya Crenshaw | Tanya L. Crenshaw and Erin Wolf Chambers and Heather Metcalf and Umesh
Thakkar | Recruitment, Preparation, Retention: A case study of computing culture
at the University of Illinois at Urbana-Champaign | 37 pages, 13 figures. For better quality figures, please download the
.pdf from
http://www.cs.uiuc.edu/research/techreports.php?report=UIUCDCS-R-2007-2811 | null | null | UIUCDCS-R-2007-2811 | cs.GL | null | Computer science is seeing a decline in enrollment at all levels of
education, including undergraduate and graduate study. This paper reports on
the results of a study conducted at the University of Illinois at
Urbana-Champaign which evaluated students attitudes regarding three areas which
can contribute to improved enrollment in the Department of Computer Science:
Recruitment, preparation and retention. The results of our study saw two
themes. First, the department's tight research focus appears to draw
significant attention from other activities -- such as teaching, service, and
other community-building activities -- that are necessary for a department's
excellence. Yet, as demonstrated by our second theme, one partial solution is
to better promote such activities already employed by the department to its
students and faculty. Based on our results, we make recommendations for
improvements and enhancements based on the current state of practice at peer
institutions.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 00:34:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Crenshaw",
"Tanya L.",
""
],
[
"Chambers",
"Erin Wolf",
""
],
[
"Metcalf",
"Heather",
""
],
[
"Thakkar",
"Umesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.