id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
cs/0702042
Jo\~ao Barros
Luis Lopes, Francisco Martins, Miguel S. Silva, Joao Barros
A Formal Model for Programming Wireless Sensor Networks
14 pages, 0 figures, Submitted for Publication
null
null
null
cs.DC cs.PL
null
In this paper we present new developments in the expressiveness and in the theory of a Calculus for Sensor Networks (CSN). We combine a network layer of sensor devices with a local object model to describe sensor devices with state. The resulting calculus is quite small and yet very expressive. We also present a type system and a type invariance result for the calculus. These results provide the fundamental framework for the development of programming languages and run-time environments.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 14:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopes", "Luis", "" ], [ "Martins", "Francisco", "" ], [ "Silva", "Miguel S.", "" ], [ "Barros", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0702043
Chinh Hoang
Ch\'inh T. Ho\`ang, Marcin Kami\'nski, Vadim Lozin, J. Sawada, X. Shu
Deciding k-colourability of $P_5$-free graphs in polynomial time
null
null
null
null
cs.DS
null
The problem of computing the chromatic number of a $P_5$-free graph is known to be NP-hard. In contrast to this negative result, we show that determining whether or not a $P_5$-free graph admits a $k$-colouring, for each fixed number of colours $k$, can be done in polynomial time. If such a colouring exists, our algorithm produces it.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 15:29:32 GMT" } ]
2016-08-14T00:00:00
[ [ "Hoàng", "Chính T.", "" ], [ "Kamiński", "Marcin", "" ], [ "Lozin", "Vadim", "" ], [ "Sawada", "J.", "" ], [ "Shu", "X.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702044
Andrew Hunter
Andrew M. Hunter, Jeffrey G. Andrews, Steven Weber
Transmission Capacity of Ad Hoc Networks with Spatial Diversity
16 pages, 10 figures, to appear in IEEE Transactions on Wireless Communications
null
10.1109/T-WC.2008.071047
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper derives the outage probability and transmission capacity of ad hoc wireless networks with nodes employing multiple antenna diversity techniques, for a general class of signal distributions. This analysis allows system performance to be quantified for fading or non-fading environments. The transmission capacity is given for interference-limited uniformly random networks on the entire plane with path loss exponent $\alpha>2$ in which nodes use: (1) static beamforming through $M$ sectorized antennas, for which the increase in transmission capacity is shown to be $\Theta(M^2)$ if the antennas are without sidelobes, but less in the event of a nonzero sidelobe level; (2) dynamic eigen-beamforming (maximal ratio transmission/combining), in which the increase is shown to be $\Theta(M^{\frac{2}{\alpha}})$; (3) various transmit antenna selection and receive antenna selection combining schemes, which give appreciable but rapidly diminishing gains; and (4) orthogonal space-time block coding, for which there is only a small gain due to channel hardening, equivalent to Nakagami-$m$ fading for increasing $m$. It is concluded that in ad hoc networks, static and dynamic beamforming perform best, selection combining performs well but with rapidly diminishing returns with added antennas, and that space-time block coding offers only marginal gains.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 00:03:14 GMT" }, { "version": "v2", "created": "Mon, 11 Aug 2008 05:27:34 GMT" } ]
2016-11-15T00:00:00
[ [ "Hunter", "Andrew M.", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Weber", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702045
Raul Etkin
Raul Etkin, David Tse, Hua Wang
Gaussian Interference Channel Capacity to Within One Bit
null
null
null
null
cs.IT math.IT
null
The capacity of the two-user Gaussian interference channel has been open for thirty years. The understanding on this problem has been limited. The best known achievable region is due to Han-Kobayashi but its characterization is very complicated. It is also not known how tight the existing outer bounds are. In this work, we show that the existing outer bounds can in fact be arbitrarily loose in some parameter ranges, and by deriving new outer bounds, we show that a simplified Han-Kobayashi type scheme can achieve to within a single bit the capacity for all values of the channel parameters. We also show that the scheme is asymptotically optimal at certain high SNR regimes. Using our results, we provide a natural generalization of the point-to-point classical notion of degrees of freedom to interference-limited scenarios.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 22:15:51 GMT" }, { "version": "v2", "created": "Fri, 9 Feb 2007 19:54:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Etkin", "Raul", "" ], [ "Tse", "David", "" ], [ "Wang", "Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702046
Shenghui Su
Shenghui Su and Shuwang Lv
Design and Analysis of the REESSE1+ Public Key Cryptosystem v2.21
21 pages
Theoretical Computer Science, v426-427, Apr. 2012, pp. 91-117
null
null
cs.CR cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the authors give the definitions of a coprime sequence and a lever function, and describe the five algorithms and six characteristics of a prototypal public key cryptosystem which is used for encryption and signature, and based on three new problems and one existent problem: the multivariate permutation problem (MPP), the anomalous subset product problem (ASPP), the transcendental logarithm problem (TLP), and the polynomial root finding problem (PRFP). Prove by reduction that MPP, ASPP, and TLP are computationally at least equivalent to the discrete logarithm problem (DLP) in the same prime field, and meanwhile find some evidence which inclines people to believe that the new problems are harder than DLP each, namely unsolvable in DLP subexponential time. Demonstrate the correctness of the decryption and the verification, deduce the probability of a plaintext solution being nonunique is nearly zero, and analyze the exact securities of the cryptosystem against recovering a plaintext from a ciphertext, extracting a private key from a public key or a signature, and forging a signature through known signatures, public keys, and messages on the assumption that IFP, DLP, and LSSP can be solved. Studies manifest that the running times of effectual attack tasks are greater than or equal to O(2^n) so far when n = 80, 96, 112, or 128 with lgM = 696, 864, 1030, or 1216. As viewed from utility, it should be researched further how to decrease the length of a modulus and to increase the speed of the decryption.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 15:00:16 GMT" }, { "version": "v10", "created": "Sat, 9 May 2009 03:36:44 GMT" }, { "version": "v11", "created": "Tue, 26 May 2009 01:52:59 GMT" }, { "version": "v12", "created": "Tue, 9 Feb 2010 08:36:25 GMT" }, { "version": "v13", "created": "Sun, 10 Oct 2010 15:54:15 GMT" }, { "version": "v14", "created": "Tue, 25 Jan 2011 03:34:27 GMT" }, { "version": "v15", "created": "Sun, 11 Dec 2011 07:35:13 GMT" }, { "version": "v16", "created": "Sat, 2 Feb 2013 06:43:10 GMT" }, { "version": "v17", "created": "Tue, 23 Sep 2014 02:45:31 GMT" }, { "version": "v18", "created": "Sat, 1 Nov 2014 14:54:31 GMT" }, { "version": "v2", "created": "Tue, 27 Feb 2007 15:44:22 GMT" }, { "version": "v3", "created": "Wed, 3 Oct 2007 03:11:10 GMT" }, { "version": "v4", "created": "Wed, 13 Feb 2008 02:39:59 GMT" }, { "version": "v5", "created": "Mon, 18 Feb 2008 14:15:36 GMT" }, { "version": "v6", "created": "Tue, 11 Mar 2008 09:29:03 GMT" }, { "version": "v7", "created": "Fri, 13 Jun 2008 12:28:56 GMT" }, { "version": "v8", "created": "Thu, 15 Jan 2009 08:49:02 GMT" }, { "version": "v9", "created": "Thu, 19 Feb 2009 18:47:35 GMT" } ]
2014-11-04T00:00:00
[ [ "Su", "Shenghui", "" ], [ "Lv", "Shuwang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702047
Holger Spakowski
Holger Spakowski and Rahul Tripathi
Hierarchical Unambiguity
null
null
null
null
cs.CC
null
We develop techniques to investigate relativized hierarchical unambiguous computation. We apply our techniques to generalize known constructs involving relativized unambiguity based complexity classes (UP and \mathcal{UP}) to new constructs involving arbitrary higher levels of the relativized unambiguous polynomial hierarchy (UPH). Our techniques are developed on constraints imposed by hierarchical arrangement of unambiguous nondeterministic polynomial-time Turing machines, and so they differ substantially, in applicability and in nature, from standard methods (such as the switching lemma [Hastad, Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which play roles in carrying out similar generalizations. Aside from achieving these generalizations, we resolve a question posed by Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U. Schoening, editors, Complexity Theory, pages 101-146. Cambridge University Press, 1993] on an issue related to nonadaptive Turing access to UP and adaptive smart Turing access to \mathcal{UP}.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 16:00:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Spakowski", "Holger", "" ], [ "Tripathi", "Rahul", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702048
Ken Wakita
Ken Wakita and Toshiyuki Tsurumi
Finding Community Structure in Mega-scale Social Networks
9 pages, 15 figures
null
null
null
cs.CY physics.soc-ph
null
Community analysis algorithm proposed by Clauset, Newman, and Moore (CNM algorithm) finds community structure in social networks. Unfortunately, CNM algorithm does not scale well and its use is practically limited to networks whose sizes are up to 500,000 nodes. The paper identifies that this inefficiency is caused from merging communities in unbalanced manner. The paper introduces three kinds of metrics (consolidation ratio) to control the process of community analysis trying to balance the sizes of the communities being merged. Three flavors of CNM algorithms are built incorporating those metrics. The proposed techniques are tested using data sets obtained from existing social networking service that hosts 5.5 million users. All the methods exhibit dramatic improvement of execution efficiency in comparison with the original CNM algorithm and shows high scalability. The fastest method processes a network with 1 million nodes in 5 minutes and a network with 4 million nodes in 35 minutes, respectively. Another one processes a network with 500,000 nodes in 50 minutes (7 times faster than the original algorithm), finds community structures that has improved modularity, and scales to a network with 5.5 million.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 16:40:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Wakita", "Ken", "" ], [ "Tsurumi", "Toshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0702049
Gregory Gutin
Noga Alon, Fedor Fomin, Gregory Gutin, Michael Krivelevich and Saket Saurabh
Parameterized Algorithms for Directed Maximum Leaf Problems
null
null
null
null
cs.DS cs.DM
null
We prove that finding a rooted subtree with at least $k$ leaves in a digraph is a fixed parameter tractable problem. A similar result holds for finding rooted spanning trees with many leaves in digraphs from a wide family $\cal L$ that includes all strong and acyclic digraphs. This settles completely an open question of Fellows and solves another one for digraphs in $\cal L$. Our algorithms are based on the following combinatorial result which can be viewed as a generalization of many results for a `spanning tree with many leaves' in the undirected case, and which is interesting on its own: If a digraph $D\in \cal L$ of order $n$ with minimum in-degree at least 3 contains a rooted spanning tree, then $D$ contains one with at least $(n/2)^{1/5}-1$ leaves.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 18:25:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Alon", "Noga", "" ], [ "Fomin", "Fedor", "" ], [ "Gutin", "Gregory", "" ], [ "Krivelevich", "Michael", "" ], [ "Saurabh", "Saket", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702050
Stefan Laendner
Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber
Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes
5 pages, submitted to ISIT 2007; v2: BER/FER curves in Fig. 1 & 2 updated
null
null
null
cs.IT math.IT
null
We investigate the stopping redundancy hierarchy of linear block codes and its connection to permutation decoding techniques. An element in the ordered list of stopping redundancy values represents the smallest number of possibly linearly dependent rows in any parity-check matrix of a code that avoids stopping sets of a given size. Redundant parity-check equations can be shown to have a similar effect on decoding performance as permuting the coordinates of the received codeword according to a selected set of automorphisms of the code. Based on this finding we develop new decoding strategies for data transmission over the binary erasure channel that combine iterative message passing and permutation decoding in order to avoid errors confined to stopping sets. We also introduce the notion of s-SAD sets, containing the smallest number of automorphisms of a code with the property that they move any set of not more than s erasures into positions that do not correspond to stopping sets within a judiciously chosen parity-check matrix.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 19:28:24 GMT" }, { "version": "v2", "created": "Tue, 13 Feb 2007 18:58:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Hehn", "Thorsten", "" ], [ "Milenkovic", "Olgica", "" ], [ "Laendner", "Stefan", "" ], [ "Huber", "Johannes B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702051
Ender Tekin
Ender Tekin, Aylin Yener
The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming
Presented at the Information Theory and Applications Workshop, ITA07, February 2007, San Diego, CA
null
null
null
cs.IT cs.CR math.IT
null
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed eavesdropper. We define two suitable secrecy measures, termed individual and collective, to reflect the confidence in the system for this multi-access environment. We determine achievable rates such that secrecy to some pre-determined degree can be maintained, using Gaussian codebooks. We also find outer bounds for the case when the eavesdropper receives a degraded version of the intended receiver's signal. In the degraded case, Gaussian codewords are shown to achieve the sum capacity for collective constraints. In addition, a TDMA scheme is shown to also achieve sum capacity for both sets of constraints. Numerical results showing the new rate region are presented and compared with the capacity region of the Gaussian Multiple-Access Channel (GMAC) with no secrecy constraints. We then find the secrecy sum-rate maximizing power allocations for the transmitters, and show that a cooperative jamming scheme can be used to increase achievable rates in this scenario.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 01:10:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Tekin", "Ender", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702052
Alex Grant
Adria Tauste-Campo and Alex Grant
On Random Network Coding for Multicast
5 pages, 4 figures. Submitted to 2007 IEEE International Symposium on Information Theory
null
null
null
cs.IT math.IT
null
Random linear network coding is a particularly decentralized approach to the multicast problem. Use of random network codes introduces a non-zero probability however that some sinks will not be able to successfully decode the required sources. One of the main theoretical motivations for random network codes stems from the lower bound on the probability of successful decoding reported by Ho et. al. (2003). This result demonstrates that all sinks in a linearly solvable network can successfully decode all sources provided that the random code field size is large enough. This paper develops a new bound on the probability of successful decoding.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 01:39:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Tauste-Campo", "Adria", "" ], [ "Grant", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702053
Andrew Badr
Andrew Badr, Ian Shipman
The DFAs of Finitely Different Languages
null
null
null
null
cs.CC
null
Two languages are "finitely different" if their symmetric difference is finite. We consider the DFAs of finitely different regular languages and find major structural similarities. We proceed to consider the smallest DFAs that recognize a language finitely different from some given DFA. Such "f-minimal" DFAs are not unique, and this non-uniqueness is characterized. Finally, we offer a solution to the minimization problem of finding such f-minimal DFAs.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 03:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Badr", "Andrew", "" ], [ "Shipman", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702054
Christoph Durr
Christoph Durr and Nguyen Kim Thang
Nash equilibria in Voronoi games on graphs
null
null
null
null
cs.GT cs.DS
null
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices (customers) are then assigned to closest facilities and a player's payoff is the number of customers assigned to it. We show that deciding the existence of a Nash equilibrium for a given graph is NP-hard which to our knowledge is the first result of this kind for a zero-sum game. We also introduce a new measure, the social cost discrepancy, defined as the ratio of the costs between the worst and the best Nash equilibria. We show that the social cost discrepancy in our game is Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the number of players.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 12:12:17 GMT" }, { "version": "v2", "created": "Fri, 13 Apr 2007 14:11:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Durr", "Christoph", "" ], [ "Thang", "Nguyen Kim", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702055
Alexander Paraskevov
A.V. Paraskevov
On the possibility of making the complete computer model of a human brain
null
null
null
null
cs.NE
null
The development of the algorithm of a neural network building by the corresponding parts of a DNA code is discussed.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 13:16:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Paraskevov", "A. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0702056
Hanene Mohamed
Hanene Mohamed (INRIA Rocquencourt)
A probabilistic analysis of a leader election algorithm
null
Fourth Colloquium on Mathematics and Computer Science Algorithms, Trees, Combinatorics and Probabilities (2006) 225-236
null
null
cs.DS
null
A {\em leader election} algorithm is an elimination process that divides recursively into tow subgroups an initial group of n items, eliminates one subgroup and continues the procedure until a subgroup is of size 1. In this paper the biased case is analyzed. We are interested in the {\em cost} of the algorithm, i.e. the number of operations needed until the algorithm stops. Using a probabilistic approach, the asymptotic behavior of the algorithm is shown to be related to the behavior of a hitting time of two random sequences on [0,1].
[ { "version": "v1", "created": "Fri, 9 Feb 2007 15:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohamed", "Hanene", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702057
Salman Beigi
Mohsen Bahramgiri, Salman Beigi
An Efficient Algorithm to Recognize Locally Equivalent Graphs in Non-Binary Case
21 pages, no figures, minor corrections
null
null
null
cs.DS
null
Let $v$ be a vertex of a graph $G$. By the local complementation of $G$ at $v$ we mean to complement the subgraph induced by the neighbors of $v$. This operator can be generalized as follows. Assume that, each edge of $G$ has a label in the finite field $\mathbf{F}_q$. Let $(g_{ij})$ be set of labels ($g_{ij}$ is the label of edge $ij$). We define two types of operators. For the first one, let $v$ be a vertex of $G$ and $a\in \mathbf{F}_q$, and obtain the graph with labels $g'_{ij}=g_{ij}+ag_{vi}g_{vj}$. For the second, if $0\neq b\in \mathbf{F}_q$ the resulted graph is a graph with labels $g''_{vi}=bg_{vi}$ and $g''_{ij}=g_{ij}$, for $i,j$ unequal to $v$. It is clear that if the field is binary, the operators are just local complementations that we described. The problem of whether two graphs are equivalent under local complementations has been studied, \cite{bouchalg}. Here we consider the general case and assuming that $q$ is odd, present the first known efficient algorithm to verify whether two graphs are locally equivalent or not.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 15:42:46 GMT" }, { "version": "v2", "created": "Sun, 1 Jul 2007 21:01:46 GMT" } ]
2007-07-02T00:00:00
[ [ "Bahramgiri", "Mohsen", "" ], [ "Beigi", "Salman", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702058
Kia Kai Li
Kia Kai Li
Exploring k-Colorability
null
null
null
null
cs.CC
null
An introductory paper to the graph k-colorability problem.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 23:07:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Kia Kai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702059
Michael Baer
Michael B. Baer
Redundancy-Related Bounds on Generalized Huffman Codes
15 pages, 4 figures, incorporates and extends arXiv:cs/0605099 and arXiv:0809.1264v1
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents new lower and upper bounds for the compression rate of binary prefix codes optimized over memoryless sources according to various nonlinear codeword length objectives. Like the most well-known redundancy bounds for minimum average redundancy coding - Huffman coding - these are in terms of a form of entropy and/or the probability of an input symbol, often the most probable one. The bounds here, some of which are tight, improve on known bounds of the form L in [H,H+1), where H is some form of entropy in bits (or, in the case of redundancy objectives, 0) and L is the length objective, also in bits. The objectives explored here include exponential-average length, maximum pointwise redundancy, and exponential-average pointwise redundancy (also called dth exponential redundancy). The first of these relates to various problems involving queueing, uncertainty, and lossless communications; the second relates to problems involving Shannon coding and universal modeling. For these two objectives we also explore the related problem of the necessary and sufficient conditions for the shortest codeword of a code being a specific length.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 03:31:42 GMT" }, { "version": "v2", "created": "Fri, 6 Mar 2009 07:21:52 GMT" }, { "version": "v3", "created": "Thu, 7 Oct 2010 05:45:10 GMT" } ]
2010-10-08T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702060
Gwenael Richomme
Gw\'ena\"el Richomme (LaRIA)
A local balance property of episturmian words
null
null
null
LaRIA-LRR-2007-02
cs.DM
null
We prove that episturmian words and Arnoux-Rauzy sequences can be characterized using a local balance property. We also give a new characterization of epistandard words and show that the set of finite words that are not factors of an episturmian word is not context-free.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 09:48:42 GMT" }, { "version": "v2", "created": "Thu, 7 Feb 2008 08:30:05 GMT" } ]
2008-02-07T00:00:00
[ [ "Richomme", "Gwénaël", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702061
Gwenael Richomme
Gw\'ena\"el Richomme (LaRIA)
Sudo-Lyndon
null
null
null
LaRIA-LRR-2007-03
cs.DM
null
Based on Lyndon words, a new Sudoku-like puzzle is presented and some relative theoretical questions are proposed.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 09:49:34 GMT" } ]
2016-08-14T00:00:00
[ [ "Richomme", "Gwénaël", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702062
Luca Gammaitoni
Luca Gammaitoni
Noise Limited Computational Speed
null
L. Gammaitoni, Applied Physics Letters, 11/2007, Volume 91, p.3, (2007)
10.1063/1.2817968
null
cs.AR cs.PF
null
In modern transistor based logic gates, the impact of noise on computation has become increasingly relevant since the voltage scaling strategy, aimed at decreasing the dissipated power, has increased the probability of error due to the reduced switching threshold voltages. In this paper we discuss the role of noise in a two state model that mimic the dynamics of standard logic gates and show that the presence of the noise sets a fundamental limit to the computing speed. An optimal idle time interval that minimizes the error probability, is derived.
[ { "version": "v1", "created": "Sun, 11 Feb 2007 09:52:12 GMT" } ]
2007-12-10T00:00:00
[ [ "Gammaitoni", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0702063
Terence H. Chan
Terence Chan and Alex Grant
Entropy vectors and network codes
null
null
null
null
cs.IT cs.NI math.IT
null
We consider a network multicast example that relates the solvability of the multicast problem with the existence of an entropy function. As a result, we provide an alternative approach to the proving of the insufficiency of linear (and abelian) network codes and demonstrate the utility of non-Shannon inequalities to tighten outer bounds on network coding capacity regions.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 12:26:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Chan", "Terence", "" ], [ "Grant", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702064
Terence H. Chan
Terence H. Chan
Group characterizable entropy functions
null
null
null
null
cs.IT math.IT
null
This paper studies properties of entropy functions that are induced by groups and subgroups. We showed that many information theoretic properties of those group induced entropy functions also have corresponding group theoretic interpretations. Then we propose an extension method to find outer bound for these group induced entropy functions.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 12:38:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Chan", "Terence H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702065
Raouf Dridi
R. Dridi and M. Petitot
Towards a New ODE Solver Based on Cartan's Equivalence Method
null
null
null
null
cs.SC
null
The aim of the present paper is to propose an algorithm for a new ODE--solver which should improve the abilities of current solvers to handle second order differential equations. The paper provides also a theoretical result revealing the relationship between the change of coordinates, that maps the generic equation to a given target equation, and the symmetry $\D$-groupoid of this target.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 16:54:12 GMT" }, { "version": "v2", "created": "Tue, 31 Jul 2007 22:15:22 GMT" } ]
2007-08-01T00:00:00
[ [ "Dridi", "R.", "" ], [ "Petitot", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0702066
Frederic Vivien
Matthieu Gallet (LIP, INRIA Rh\^one-Alpes), Yves Robert (LIP, INRIA Rh\^one-Alpes), Fr\'ed\'eric Vivien (LIP, INRIA Rh\^one-Alpes)
Comments on "Design and performance evaluation of load distribution strategies for multiple loads on heterogeneous linear daisy chain networks''
null
null
null
null
cs.DC
null
Min, Veeravalli, and Barlas proposed strategies to minimize the overall execution time of one or several divisible loads on a heterogeneous linear network, using one or more installments. We show on a very simple example that the proposed approach does not always produce a solution and that, when it does, the solution is often suboptimal. We also show how to find an optimal scheduling for any instance, once the number of installments per load is given. Finally, we formally prove that under a linear cost model, as in the original paper, an optimal schedule has an infinite number of installments. Such a cost model can therefore not be sed to design practical multi-installment strategies.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 17:43:35 GMT" } ]
2016-08-14T00:00:00
[ [ "Gallet", "Matthieu", "", "LIP, INRIA Rhône-Alpes" ], [ "Robert", "Yves", "", "LIP, INRIA\n Rhône-Alpes" ], [ "Vivien", "Frédéric", "", "LIP, INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0702067
Fionn Murtagh
Fionn Murtagh
The Haar Wavelet Transform of a Dendrogram: Additional Notes
37 pp, 1 fig. Supplementary material to "The Haar Wavelet Transform of a Dendrogram", http://arxiv.org/abs/cs.IR/0608107
null
null
null
cs.IR
null
We consider the wavelet transform of a finite, rooted, node-ranked, $p$-way tree, focusing on the case of binary ($p = 2$) trees. We study a Haar wavelet transform on this tree. Wavelet transforms allow for multiresolution analysis through translation and dilation of a wavelet function. We explore how this works in our tree context.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 21:26:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702068
Gesualdo Scutari
Gesualdo Scutari, Sergio Barbarossa and Loreto Pescosolido
Distributed Decision Through Self-Synchronizing Sensor Networks in the Presence of Propagation Delays and Nonreciprocal Channels
Conference paper. Journal version submitted to IEEE Transactions on Signal Processing, January 10, 2007. Paper accepted for the publication on the VIII IEEE Workshop on Signal Processing Advances in Wireless Communications, (SPAWC 2007), January 22, 2007
null
10.1109/SPAWC.2007.4401363
null
cs.IT cs.MA math.IT
null
In this paper we propose and analyze a distributed algorithm for achieving globally optimal decisions, either estimation or detection, through a self-synchronization mechanism among linearly coupled integrators initialized with local measurements. We model the interaction among the nodes as a directed graph with weights dependent on the radio interface and we pose special attention to the effect of the propagation delays occurring in the exchange of data among sensors, as a function of the network geometry. We derive necessary and sufficient conditions for the proposed system to reach a consensus on globally optimal decision statistics. One of the major results proved in this work is that a consensus is achieved for any bounded delay condition if and only if the directed graph is quasi-strongly connected. We also provide a closed form expression for the global consensus, showing that the effect of delays is, in general, to introduce a bias in the final decision. The closed form expression is also useful to modify the consensus mechanism in order to get rid of the bias with minimum extra complexity.
[ { "version": "v1", "created": "Sun, 11 Feb 2007 09:15:03 GMT" }, { "version": "v2", "created": "Mon, 16 Apr 2007 17:30:33 GMT" } ]
2016-11-15T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Barbarossa", "Sergio", "" ], [ "Pescosolido", "Loreto", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702069
Roberto Amadio
Roberto Amadio (PPS), Frederique Dabrowski
Feasible reactivity in a synchronous pi-calculus
null
Proceedings ACM SIGPLAN Principles and Practice of Declarative Programming (16/07/2007) 221-231
null
null
cs.LO
null
Reactivity is an essential property of a synchronous program. Informally, it guarantees that at each instant the program fed with an input will `react' producing an output. In the present work, we consider a refined property that we call ` feasible reactivity'. Beyond reactivity, this property guarantees that at each instant both the size of the program and its reaction time are bounded by a polynomial in the size of the parameters at the beginning of the computation and the size of the largest input. We propose a method to annotate programs and we develop related static analysis techniques that guarantee feasible reactivity for programs expressed in the S-pi-calculus. The latter is a synchronous version of the pi-calculus based on the SL synchronous programming model.
[ { "version": "v1", "created": "Sun, 11 Feb 2007 15:43:26 GMT" } ]
2011-11-09T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ], [ "Dabrowski", "Frederique", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702070
Maria Fresia
Maria Fresia, Giuseppe Caire
A Practical Approach to Lossy Joint Source-Channel Coding
51 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This work is devoted to practical joint source channel coding. Although the proposed approach has more general scope, for the sake of clarity we focus on a specific application example, namely, the transmission of digital images over noisy binary-input output-symmetric channels. The basic building blocks of most state-of the art source coders are: 1) a linear transformation; 2) scalar quantization of the transform coefficients; 3) probability modeling of the sequence of quantization indices; 4) an entropy coding stage. We identify the weakness of the conventional separated source-channel coding approach in the catastrophic behavior of the entropy coding stage. Hence, we replace this stage with linear coding, that maps directly the sequence of redundant quantizer output symbols into a channel codeword. We show that this approach does not entail any loss of optimality in the asymptotic regime of large block length. However, in the practical regime of finite block length and low decoding complexity our approach yields very significant improvements. Furthermore, our scheme allows to retain the transform, quantization and probability modeling of current state-of the art source coders, that are carefully matched to the features of specific classes of sources. In our working example, we make use of ``bit-planes'' and ``contexts'' model defined by the JPEG2000 standard and we re-interpret the underlying probability model as a sequence of conditionally Markov sources. The Markov structure allows to derive a simple successive coding and decoding scheme, where the latter is based on iterative Belief Propagation. We provide a construction example of the proposed scheme based on punctured Turbo Codes and we demonstrate the gain over a conventional separated scheme by running extensive numerical experiments on test images.
[ { "version": "v1", "created": "Mon, 12 Feb 2007 15:36:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Fresia", "Maria", "" ], [ "Caire", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702071
Pulkit Grover
Pulkit Grover and Anant Sahai
What is needed to exploit knowledge of primary transmissions?
Combination of two papers submitted to ISIT'07 and DySPAN '07
null
null
null
cs.IT math.IT
null
Recently, Tarokh and others have raised the possibility that a cognitive radio might know the interference signal being transmitted by a strong primary user in a non-causal way, and use this knowledge to increase its data rates. However, there is a subtle difference between knowing the signal transmitted by the primary and the actual interference at our receiver since there is a wireless channel between these two points. We show that even an unknown phase results in a substantial decrease in the data rates that can be achieved, and thus there is a need to feedback interference channel estimates to the cognitive transmitter. We then consider the case of fading channels. We derive an upper bound on the rate for given outage error probability for faded dirt. We give a scheme that uses appropriate "training" to obtain such estimates and quantify this scheme's required overhead as a function of the relevant coherence time and interference power.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 02:32:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Grover", "Pulkit", "" ], [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702072
Peter J. Stuckey
Michael Codish, Vitaly Lagoon, and Peter J. Stuckey
Logic Programming with Satisfiability
8 pages, 3 figures, 1 table
Theory and Practice of Logic Programming: 8(1):121-128, 2008
null
null
cs.PL cs.AI
null
This paper presents a Prolog interface to the MiniSat satisfiability solver. Logic program- ming with satisfiability combines the strengths of the two paradigms: logic programming for encoding search problems into satisfiability on the one hand and efficient SAT solving on the other. This synergy between these two exposes a programming paradigm which we propose here as a logic programming pearl. To illustrate logic programming with SAT solving we give an example Prolog program which solves instances of Partial MAXSAT.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 03:10:02 GMT" } ]
2010-09-03T00:00:00
[ [ "Codish", "Michael", "" ], [ "Lagoon", "Vitaly", "" ], [ "Stuckey", "Peter J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702073
Pulkit Grover
Pulkit Grover
Tradeoff between decoding complexity and rate for codes on graphs
null
null
null
null
cs.IT cs.CC math.IT
null
We consider transmission over a general memoryless channel, with bounded decoding complexity per bit under message passing decoding. We show that the achievable rate is bounded below capacity if there is a finite success in the decoding in a specified number of operations per bit at the decoder for some codes on graphs. These codes include LDPC and LDGM codes. Good performance with low decoding complexity suggests strong local structures in the graphs of these codes, which are detrimental to the code rate asymptotically. The proof method leads to an interesting necessary condition on the code structures which could achieve capacity with bounded decoding complexity. We also show that if a code sequence achieves a rate epsilon close to the channel capacity, the decoding complexity scales at least as O(log(1/epsilon).
[ { "version": "v1", "created": "Tue, 13 Feb 2007 03:39:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Grover", "Pulkit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702074
Xavier P\'erez-Gim\'enez
Josep Diaz, Dieter Mitsche, Xavier Perez
Dynamic Random Geometric Graphs
null
null
null
null
cs.DM
null
In this work we introduce Dynamic Random Geometric Graphs as a basic rough model for mobile wireless sensor networks, where communication distances are set to the known threshold for connectivity of static random geometric graphs. We provide precise asymptotic results for the expected length of the connectivity and disconnectivity periods of the network. We believe the formal tools developed in this work could be of use in future studies in more concrete settings. In addition, for static random geometric graphs at the threshold for connectivity, we provide asymptotic expressions on the probability of existence of components according to their sizes.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 09:00:34 GMT" }, { "version": "v2", "created": "Fri, 20 Apr 2007 09:15:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "Josep", "" ], [ "Mitsche", "Dieter", "" ], [ "Perez", "Xavier", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702075
Maurice H. T. Ling
Maurice HT Ling
Firebird Database Backup by Serialized Database Table Dump
5 pages
Ling, Maurice HT. 2007. Firebird Database Backup by Serialized Database Table Dump. The Python Papers 2 (1): 10-14
null
null
cs.DB
null
This paper presents a simple data dump and load utility for Firebird databases which mimics mysqldump in MySQL. This utility, fb_dump and fb_load, for dumping and loading respectively, retrieves each database table using kinterbasdb and serializes the data using marshal module. This utility has two advantages over the standard Firebird database backup utility, gbak. Firstly, it is able to backup and restore single database tables which might help to recover corrupted databases. Secondly, the output is in text-coded format (from marshal module) making it more resilient than a compressed text backup, as in the case of using gbak.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 11:13:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ling", "Maurice HT", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0702076
Frederic Vivien
Lionel Eyraud-Dubois (INRIA Rh\^one-Alpes, LIP), Arnaud Legrand (ID-IMAG, INRIA Rh\^one-Alpes / ID-IMAG), Martin Quinson (INRIA Lorraine - LORIA), Fr\'ed\'eric Vivien (INRIA Rh\^one-Alpes, LIP)
A First Step Towards Automatically Building Network Representations
null
null
null
null
cs.DC
null
To fully harness Grids, users or middlewares must have some knowledge on the topology of the platform interconnection network. As such knowledge is usually not available, one must uses tools which automatically build a topological network model through some measurements. In this article, we define a methodology to assess the quality of these network model building tools, and we apply this methodology to representatives of the main classes of model builders and to two new algorithms. We show that none of the main existing techniques build models that enable to accurately predict the running time of simple application kernels for actual platforms. However some of the new algorithms we propose give excellent results in a wide range of situations.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 16:35:04 GMT" }, { "version": "v2", "created": "Thu, 28 Jun 2007 14:14:44 GMT" } ]
2007-06-28T00:00:00
[ [ "Eyraud-Dubois", "Lionel", "", "INRIA Rhône-Alpes, LIP" ], [ "Legrand", "Arnaud", "", "ID-IMAG, INRIA Rhône-Alpes / ID-IMAG" ], [ "Quinson", "Martin", "", "INRIA Lorraine -\n LORIA" ], [ "Vivien", "Frédéric", "", "INRIA Rhône-Alpes, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0702077
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Properties of Rank Metric Codes
44 pages, 3 figures. Submitted to IEEE Transactions on Information Theory on March 6th
null
null
null
cs.IT math.IT
null
This paper investigates general properties of codes with the rank metric. We first investigate asymptotic packing properties of rank metric codes. Then, we study sphere covering properties of rank metric codes, derive bounds on their parameters, and investigate their asymptotic covering properties. Finally, we establish several identities that relate the rank weight distribution of a linear code to that of its dual code. One of our identities is the counterpart of the MacWilliams identity for the Hamming metric, and it has a different form from the identity by Delsarte.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 20:23:38 GMT" }, { "version": "v2", "created": "Wed, 14 Feb 2007 15:32:22 GMT" }, { "version": "v3", "created": "Tue, 12 Jun 2007 18:11:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702078
Reid Andersen
Reid Andersen
A Local Algorithm for Finding Dense Subgraphs
14 pages, no figures
null
null
null
cs.DS cs.CC
null
We present a local algorithm for finding dense subgraphs of bipartite graphs, according to the definition of density proposed by Kannan and Vinay. Our algorithm takes as input a bipartite graph with a specified starting vertex, and attempts to find a dense subgraph near that vertex. We prove that for any subgraph S with k vertices and density theta, there are a significant number of starting vertices within S for which our algorithm produces a subgraph S' with density theta / O(log n) on at most O(D k^2) vertices, where D is the maximum degree. The running time of the algorithm is O(D k^2), independent of the number of vertices in the graph.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 23:41:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersen", "Reid", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702079
Otfried Cheong
Otfried Cheong, Mira Lee
The Hadwiger Number of Jordan Regions is Unbounded
null
null
null
null
cs.CG math.MG
null
We show that for every n > 0 there is a planar topological disk A_0 and n translates A_1, A_2, ..., A_n of A_0 such that the interiors of A_0, ... A_n are pairwise disjoint, but with each A_i touching A_0 for 1 <= i <= n.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 15:31:30 GMT" } ]
2010-08-26T00:00:00
[ [ "Cheong", "Otfried", "" ], [ "Lee", "Mira", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
cs/0702080
Otfried Cheong
Boris Aronov, Mark de Berg, Otfried Cheong, Joachim Gudmundsson, Herman Haverkort, Michiel Smid, Antoine Vigneron
Sparse geometric graphs with small dilation
null
null
null
null
cs.CG
null
Given a set S of n points in R^D, and an integer k such that 0 <= k < n, we show that a geometric graph with vertex set S, at most n - 1 + k edges, maximum degree five, and dilation O(n / (k+1)) can be computed in time O(n log n). For any k, we also construct planar n-point sets for which any geometric graph with n-1+k edges has dilation Omega(n/(k+1)); a slightly weaker statement holds if the points of S are required to be in convex position.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 03:46:54 GMT" }, { "version": "v2", "created": "Tue, 26 Jun 2007 04:52:43 GMT" } ]
2009-12-07T00:00:00
[ [ "Aronov", "Boris", "" ], [ "de Berg", "Mark", "" ], [ "Cheong", "Otfried", "" ], [ "Gudmundsson", "Joachim", "" ], [ "Haverkort", "Herman", "" ], [ "Smid", "Michiel", "" ], [ "Vigneron", "Antoine", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0702081
Rick Dale
Rick Dale
Random Sentences from a Generalized Phrase-Structure Grammar Interpreter
Brief paper with source code and examples
null
null
null
cs.CL
null
In numerous domains in cognitive science it is often useful to have a source for randomly generated corpora. These corpora may serve as a foundation for artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen, 2000), or as input into computational models (e.g., Christiansen & Dale, 2001). The following compact and general C program interprets a phrase-structure grammar specified in a text file. It follows parameters set at a Unix or Unix-based command-line and generates a corpus of random sentences from that grammar.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 06:05:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Dale", "Rick", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0702082
Ivan Yu. Tyukin
Ivan Tyukin, Tatiana Tyukina, Cees van Leeuwen
Invariant template matching in systems with spatiotemporal coding: a vote for instability
52 pages, 12 figures
Neural Networks, vol. 22, no. 4, (2009), 425-449
10.1016/j.neunet.2009.01.014
null
cs.CV cs.AI
null
We consider the design of a pattern recognition that matches templates to images, both of which are spatially sampled and encoded as temporal sequences. The image is subject to a combination of various perturbations. These include ones that can be modeled as parameterized uncertainties such as image blur, luminance, translation, and rotation as well as unmodeled ones. Biological and neural systems require that these perturbations be processed through a minimal number of channels by simple adaptation mechanisms. We found that the most suitable mathematical framework to meet this requirement is that of weakly attracting sets. This framework provides us with a normative and unifying solution to the pattern recognition problem. We analyze the consequences of its explicit implementation in neural systems. Several properties inherent to the systems designed in accordance with our normative mathematical argument coincide with known empirical facts. This is illustrated in mental rotation, visual search and blur/intensity adaptation. We demonstrate how our results can be applied to a range of practical problems in template matching and pattern recognition.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 07:01:56 GMT" } ]
2009-05-22T00:00:00
[ [ "Tyukin", "Ivan", "" ], [ "Tyukina", "Tatiana", "" ], [ "van Leeuwen", "Cees", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702083
Serebrenik Alexander
Alexander Serebrenik, Tom Schrijvers, Bart Demoen
Improving Prolog programs: Refactoring for Prolog
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
2006-1
cs.SE
null
Refactoring is an established technique from the object-oriented (OO) programming community to restructure code: it aims at improving software readability, maintainability and extensibility. Although refactoring is not tied to the OO-paradigm in particular, its ideas have not been applied to Logic Programming until now. This paper applies the ideas of refactoring to Prolog programs. A catalogue is presented listing refactorings classified according to scope. Some of the refactorings have been adapted from the OO-paradigm, while others have been specifically designed for Prolog. The discrepancy between intended and operational semantics in Prolog is also addressed by some of the refactorings. In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and the experience with applying ViPReSS to a large Prolog legacy system is reported. The main conclusion is that refactoring is both a viable technique in Prolog and a rather desirable one.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 09:53:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Schrijvers", "Tom", "" ], [ "Demoen", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0702084
Bozidar Radunovic
Bozidar Radunovic, Jean-Yves Le Boudec, Raymond Knopp
Performance of Ultra-Wideband Impulse Radio in Presence of Impulsive Interference
null
null
null
null
cs.IT math.IT
null
We analyze the performance of coherent impulsive-radio (IR) ultra-wideband (UWB) channel in presence of the interference generated by concurrent transmissions of the systems with the same impulsive radio. We derive a novel algorithm, using Monte-Carlo method, to calculate a lower bound on the rate that can be achieved using maximum-likelihood estimator. Using this bound we show that such a channel is very robust to interference, in contrast to the nearest-neighbor detector.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:22:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Radunovic", "Bozidar", "" ], [ "Boudec", "Jean-Yves Le", "" ], [ "Knopp", "Raymond", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702085
Vincenzo Nicosia
V. Carchiolo, M. Malgeri, G. Mangioni and V. Nicosia
Social Behaviours Applied to P2P Systems: An efficient Algorithm for Resource Organisation
5 Pages; 8 Figures; Presented at COPS 2006 -- WETICE -- Manchester (UK)
15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2006. WETICE '06. June 2006 Page(s):65 - 72
null
null
cs.DC cs.IR
null
P2P systems are a great solution to the problem of distributing resources. The main issue of P2P networks is that searching and retrieving resources shared by peers is usually expensive and does not take into account similarities among peers. In this paper we present preliminary simulations of PROSA, a novel algorithm for P2P network structuring, inspired by social behaviours. Peers in PROSA self--organise in social groups of similar peers, called ``semantic--groups'', depending on the resources they are sharing. Such a network smoothly evolves to a small--world graph, where queries for resources are efficiently and effectively routed.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:53:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ], [ "Mangioni", "G.", "" ], [ "Nicosia", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702086
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Protection of DVB Systems by Trusted Computing
Accepted contribution to the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures
null
null
null
cs.CR
null
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other payment providers.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:58:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0702087
Marc Glisse
Marc Glisse (INRIA Lorraine - LORIA), Sylvain Lazard (INRIA Lorraine - LORIA)
An Upper Bound on the Average Size of Silhouettes
null
null
null
null
cs.CG
null
It is a widely observed phenomenon in computer graphics that the size of the silhouette of a polyhedron is much smaller than the size of the whole polyhedron. This paper provides, for the first time, theoretical evidence supporting this for a large class of objects, namely for polyhedra that approximate surfaces in some reasonable way; the surfaces may be non-convex and non-differentiable and they may have boundaries. We prove that such polyhedra have silhouettes of expected size $O(\sqrt{n})$ where the average is taken over all points of view and n is the complexity of the polyhedron.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 13:52:35 GMT" } ]
2009-09-29T00:00:00
[ [ "Glisse", "Marc", "", "INRIA Lorraine - LORIA" ], [ "Lazard", "Sylvain", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0702088
Shanghua Teng
Xi Chen and Shang-Hua Teng
Paths Beyond Local Search: A Nearly Tight Bound for Randomized Fixed-Point Computation
null
null
null
null
cs.GT
null
In 1983, Aldous proved that randomization can speedup local search. For example, it reduces the query complexity of local search over [1:n]^d from Theta (n^{d-1}) to O (d^{1/2}n^{d/2}). It remains open whether randomization helps fixed-point computation. Inspired by this open problem and recent advances on equilibrium computation, we have been fascinated by the following question: Is a fixed-point or an equilibrium fundamentally harder to find than a local optimum? In this paper, we give a nearly-tight bound of Omega(n)^{d-1} on the randomized query complexity for computing a fixed point of a discrete Brouwer function over [1:n]^d. Since the randomized query complexity of global optimization over [1:n]^d is Theta (n^{d}), the randomized query model over [1:n]^d strictly separates these three important search problems: Global optimization is harder than fixed-point computation, and fixed-point computation is harder than local search. Our result indeed demonstrates that randomization does not help much in fixed-point computation in the query model; the deterministic complexity of this problem is Theta (n^{d-1}).
[ { "version": "v1", "created": "Fri, 16 Feb 2007 07:32:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0702089
C. Maria Keet
C. Maria Keet
Mapping the Object-Role Modeling language ORM2 into Description Logic language DLRifd
17 pages, 2 figures. Changes: added references and proofs of correctness of encoding, fixed typos
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, several efforts have been made to enhance conceptual data modelling with automated reasoning to improve the model's quality and derive implicit information. One approach to achieve this in implementations, is to constrain the language. Advances in Description Logics can help choosing the right language to have greatest expressiveness yet to remain within the decidable fragment of first order logic to realise a workable implementation with good performance using DL reasoners. The best fit DL language appears to be the ExpTime-complete DLRifd. To illustrate trade-offs and highlight features of the modelling languages, we present a precise transformation of the mappable features of the very expressive (undecidable) ORM/ORM2 conceptual data modelling languages to exactly DLRifd. Although not all ORM2 features can be mapped, this is an interesting fragment because it has been shown that DLRifd can also encode UML Class Diagrams and EER, and therefore can foster interoperation between conceptual data models and research into ontological aspects of the modelling languages.
[ { "version": "v1", "created": "Thu, 15 Feb 2007 23:45:46 GMT" }, { "version": "v2", "created": "Wed, 22 Apr 2009 11:07:26 GMT" } ]
2009-04-22T00:00:00
[ [ "Keet", "C. Maria", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702090
Otfried Cheong
Hee-Kap Ahn, Sang Won Bae, Otfried Cheong, Joachim Gudmundsson
Aperture-Angle and Hausdorff-Approximation of Convex Figures
Fixed incorrect affiliation
null
null
null
cs.CG math.MG
null
The aperture angle alpha(x, Q) of a point x not in Q in the plane with respect to a convex polygon Q is the angle of the smallest cone with apex x that contains Q. The aperture angle approximation error of a compact convex set C in the plane with respect to an inscribed convex polygon Q of C is the minimum aperture angle of any x in C Q with respect to Q. We show that for any compact convex set C in the plane and any k > 2, there is an inscribed convex k-gon Q of C with aperture angle approximation error (1 - 2/(k+1)) pi. This bound is optimal, and settles a conjecture by Fekete from the early 1990s. The same proof technique can be used to prove a conjecture by Brass: If a polygon P admits no approximation by a sub-k-gon (the convex hull of k vertices of P) with Hausdorff distance sigma, but all subpolygons of P (the convex hull of some vertices of P) admit such an approximation, then P is a (k+1)-gon. This implies the following result: For any k > 2 and any convex polygon P of perimeter at most 1 there is a sub-k-gon Q of P such that the Hausdorff-distance of P and Q is at most 1/(k+1) * sin(pi/(k+1)).
[ { "version": "v1", "created": "Fri, 16 Feb 2007 06:00:08 GMT" }, { "version": "v2", "created": "Tue, 20 Feb 2007 00:39:36 GMT" } ]
2010-08-26T00:00:00
[ [ "Ahn", "Hee-Kap", "" ], [ "Bae", "Sang Won", "" ], [ "Cheong", "Otfried", "" ], [ "Gudmundsson", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
cs/0702091
raphael M. Jungers
Raphael M. Jungers and Vincent D. Blondel
Observable Graphs
15 pages, 8 figures
null
null
null
cs.MA
null
An edge-colored directed graph is \emph{observable} if an agent that moves along its edges is able to determine his position in the graph after a sufficiently long observation of the edge colors. When the agent is able to determine his position only from time to time, the graph is said to be \emph{partly observable}. Observability in graphs is desirable in situations where autonomous agents are moving on a network and one wants to localize them (or the agent wants to localize himself) with limited information. In this paper, we completely characterize observable and partly observable graphs and show how these concepts relate to observable discrete event systems and to local automata. Based on these characterizations, we provide polynomial time algorithms to decide observability, to decide partial observability, and to compute the minimal number of observations necessary for finding the position of an agent. In particular we prove that in the worst case this minimal number of observations increases quadratically with the number of nodes in the graph. From this it follows that it may be necessary for an agent to pass through the same node several times before he is finally able to determine his position in the graph. We then consider the more difficult question of assigning colors to a graph so as to make it observable and we prove that two different versions of this problem are NP-complete.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:16:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Jungers", "Raphael M.", "" ], [ "Blondel", "Vincent D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0702092
M. Kivanc Mihcak
Yucel Altug, N. Polat Ayerden, M. Kivanc Mihcak, Emin Anarim
A Note on the Periodicity and the Output Rate of Bit Search Type Generators
20 pages, 2 figures and submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2007.913503
null
cs.CR
null
We investigate the bit-search type irregular decimation algorithms that are used within LFSR-based stream ciphers. In particular, we concentrate on BSG and ABSG, and consider two different setups for the analysis. In the first case, the input is assumed to be a m-sequence; we show that all possible output sequences can be classified into two sets, each of which is characterized by the equivalence of their elements up to shifts. Furthermore, we prove that the cardinality of each of these sets is equal to the period of one of its elements and subsequently derive the first known bounds on the expected output period (assuming that no subperiods exist). In the second setup, we work in a probabilistic framework and assume that the input sequence is evenly distributed (i.e., independent identically distributed Bernoulli process with probability 1/2). Under these assumptions, we derive closed-form expressions for the distribution of the output length and the output rate, which is shown to be asymptotically Gaussian-distributed and concentrated around the mean with exponential tightness.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:20:59 GMT" } ]
2016-11-15T00:00:00
[ [ "Altug", "Yucel", "" ], [ "Ayerden", "N. Polat", "" ], [ "Mihcak", "M. Kivanc", "" ], [ "Anarim", "Emin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0702093
Ashish Khisti
Ashish Khisti, Aslan Tchamkerten, Gregory Wornell
Secure Broadcasting
Submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security
null
null
null
cs.IT math.IT
null
Wyner's wiretap channel is extended to parallel broadcast channels and fading channels with multiple receivers. In the first part of the paper, we consider the setup of parallel broadcast channels with one sender, multiple intended receivers, and one eavesdropper. We study the situations where the sender broadcasts either a common message or independent messages to the intended receivers. We derive upper and lower bounds on the common-message-secrecy capacity, which coincide when the users are reversely degraded. For the case of independent messages we establish the secrecy sum-capacity when the users are reversely degraded. In the second part of the paper we apply our results to fading channels: perfect channel state information of all intended receivers is known globally, whereas the eavesdropper channel is known only to her. For the common message case, a somewhat surprising result is proven: a positive rate can be achieved independently of the number of intended receivers. For independent messages, an opportunistic transmission scheme is presented that achieves the secrecy sum-capacity in the limit of large number of receivers. Our results are stated for a fast fading channel model. Extensions to the block fading model are also discussed.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:41:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Tchamkerten", "Aslan", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702094
Marko Horvat B.Sc.CS-Dipl.Ing.
Darko Fuduric, Marko Horvat and Mario Zagar
Authentication via wireless networks
5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia, 2006
MIPRO, 2006
null
null
cs.OH
null
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But by using novel technologies like mobile computing and wireless networking, it is possible to avoid carrying multitude of ID cards or remembering a number of PIN codes. Article shows how to efficiently authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA using commonplace AES (Rijndel) or MD5 encryption. This method can be implemented on many types of mobile devices like Pocket PC PDA with Windows CE (Windows Mobile 2003) real-time operating system, or any other customized OS, so we will explain all components and key features of such basic system.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Fuduric", "Darko", "" ], [ "Horvat", "Marko", "" ], [ "Zagar", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0702095
Ayan Mahalanobis
Ayan Mahalanobis
A note on using finite non-abelian $p$-groups in the MOR cryptosystem
null
null
null
null
cs.CR math.GR
null
The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a $p$-group, a cryptosystem was built by this author in 'A simple generalization of El-Gamal cryptosystem to non-abelian groups'. It seems reasonable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields. A natural question arises can one make a better cryptosystem using $p$-groups? In this paper we show that the answer is no.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 19:04:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
cs/0702096
David Iclanzan Mr
David Iclanzan, Dan Dumitrescu
Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block Structure
submited to GECCO 2007 (jan 31)
null
null
null
cs.NE cs.AI
null
The Building Block Hypothesis suggests that Genetic Algorithms (GAs) are well-suited for hierarchical problems, where efficient solving requires proper problem decomposition and assembly of solution from sub-solution with strong non-linear interdependencies. The paper proposes a hill-climber operating over the building block (BB) space that can efficiently address hierarchical problems. The new Building Block Hill-Climber (BBHC) uses past hill-climb experience to extract BB information and adapts its neighborhood structure accordingly. The perpetual adaptation of the neighborhood structure allows the method to climb the hierarchical structure solving successively the hierarchical levels. It is expected that for fully non deceptive hierarchical BB structures the BBHC can solve hierarchical problems in linearithmic time. Empirical results confirm that the proposed method scales almost linearly with the problem size thus clearly outperforms population based recombinative methods.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 21:47:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Iclanzan", "David", "" ], [ "Dumitrescu", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702097
Hans van Ditmarsch
M.D. Atkinson and H.P. van Ditmarsch and S. Roehling
Avoiding bias in cards cryptography
11 pages
Australasian Journal of Combinatorics 44:3-17, 2009
null
null
cs.CR cs.MA
null
We outline the need for stricter requirements for unconditionally secure cryptographic protocols inspired by the Russian Cards problem. A new requirement CA4 is proposed that checks for bias in single card occurrence in announcements consisting of alternatives for players' holdings of cards. This requirement CA4 is shown to be equivalent to an alternative requirement CA5. All announcements found to satisfy CA4 are 2-designs. We also show that all binary designs are 3-designs. Instead of avoiding bias in announcements produced by such protocols, one may as well apply unbiased protocols such that patterns in announcements become meaningless. We gave two examples of such protocols for card deal parameters (3,3,1), i.e. two of the players hold three cards, and the remaining player, playing the role of eavesdropper, holds a single card.
[ { "version": "v1", "created": "Sat, 17 Feb 2007 01:42:39 GMT" } ]
2011-11-02T00:00:00
[ [ "Atkinson", "M. D.", "" ], [ "van Ditmarsch", "H. P.", "" ], [ "Roehling", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0702098
Jari Salo
Jari Salo
A Sum-Product Model as a Physical Basis for Shadow Fading
23 pages, 9 figs. To be revised and maybe submitted
null
null
null
cs.OH
null
Shadow fading (slow fading) effects play a central role in mobile communication system design and analysis. Experimental evidence indicates that shadow fading exhibits log-normal power distribution almost universally, and yet it is still not well understood what causes this. In this paper, we propose a versatile sum-product signal model as a physical basis for shadow fading. Simulation results imply that the proposed model results in log-normally distributed local mean power regardless of the distributions of the interactions in the radio channel, and hence it is capable of explaining the log-normality in a wide variety of propagation scenarios. The sum-product model also includes as its special cases the conventional product model as well as the recently proposed sum model, and improves upon these by: a) being applicable in both global and local distance scales; b) being more plausible from physical point of view; c) providing better goodness-of-fit to log-normal distribution than either of these models.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 21:54:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Salo", "Jari", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0702099
Ruoheng Liu
Ruoheng Liu, Ivana Maric, Predrag Spasojevic, and Roy D. Yates
Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions
to appear Special Issue of IEEE Transactions on Information Theory on Information Theoretic Security
null
10.1109/TIT.2008.921879
null
cs.IT math.IT
null
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, the two bound bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.
[ { "version": "v1", "created": "Sat, 17 Feb 2007 21:02:37 GMT" }, { "version": "v2", "created": "Tue, 11 Dec 2007 23:12:34 GMT" } ]
2016-11-15T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Maric", "Ivana", "" ], [ "Spasojevic", "Predrag", "" ], [ "Yates", "Roy D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702100
Sundaram Vanka
Sundaram Vanka, M. J. Dehghani, K. M. M. Prabhu, R. Aravind
A Class of Multi-Channel Cosine Modulated IIR Filter Banks
18 pages, 8 figures
null
null
null
cs.IT math.IT
null
This paper presents a class of multi-channel cosine-modulated filter banks satisfying the perfect reconstruction (PR) property using an IIR prototype filter. By imposing a suitable structure on the polyphase filter coefficients, we show that it is possible to greatly simplify the PR condition, while preserving the causality and stability of the system. We derive closed-form expressions for the synthesis filters and also study the numerical stability of the filter bank using frame theoretic bounds. Further, we show that it is possible to implement this filter bank with much lower number of arithmetic operations when compared to FIR filter banks with comparable performance. The filter bank's modular structure also lends itself to efficient VLSI implementation.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 16:32:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Vanka", "Sundaram", "" ], [ "Dehghani", "M. J.", "" ], [ "Prabhu", "K. M. M.", "" ], [ "Aravind", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702101
Neri Merhav
Neri Merhav
An identity of Chernoff bounds with an interpretation in statistical physics and applications in information theory
29 pages, 1 figure. Submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
null
An identity between two versions of the Chernoff bound on the probability a certain large deviations event, is established. This identity has an interpretation in statistical physics, namely, an isothermal equilibrium of a composite system that consists of multiple subsystems of particles. Several information--theoretic application examples, where the analysis of this large deviations probability naturally arises, are then described from the viewpoint of this statistical mechanical interpretation. This results in several relationships between information theory and statistical physics, which we hope, the reader will find insightful.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 06:30:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702102
Bruce Hajek
Bruce Hajek, Kevin Mitzel, and Sichao Yang
Paging and Registration in Cellular Networks: Jointly Optimal Policies and an Iterative Algorithm
13 pages, submitted to IEEE Trans. Information Theory
null
null
null
cs.IT cs.NI math.IT
null
This paper explores optimization of paging and registration policies in cellular networks. Motion is modeled as a discrete-time Markov process, and minimization of the discounted, infinite-horizon average cost is addressed. The structure of jointly optimal paging and registration policies is investigated through the use of dynamic programming for partially observed Markov processes. It is shown that there exist policies with a certain simple form that are jointly optimal, though the dynamic programming approach does not directly provide an efficient method to find the policies. An iterative algorithm for policies with the simple form is proposed and investigated. The algorithm alternates between paging policy optimization and registration policy optimization. It finds a pair of individually optimal policies, but an example is given showing that the policies need not be jointly optimal. Majorization theory and Riesz's rearrangement inequality are used to show that jointly optimal paging and registration policies are given for symmetric or Gaussian random walk models by the nearest-location-first paging policy and distance threshold registration policies.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 20:51:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Hajek", "Bruce", "" ], [ "Mitzel", "Kevin", "" ], [ "Yang", "Sichao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702103
Philipp Mayr
Dirk Lewandowski, Philipp Mayr
Exploring the academic invisible web
13 pages, 3 figures
Library Hi Tech, 24 (2006) 4. pp. 529-539
10.1108/07378830610715392
null
cs.DL
null
Purpose: To provide a critical review of Bergman's 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We define the Academic Invisible Web as consisting of all databases and collections relevant to academia but not searchable by the general-purpose internet search engines. Indexing this part of the Invisible Web is central to scientific search engines. We provide an overview of approaches followed thus far. Design/methodology/approach: Discussion of measures and calculations, estimation based on informetric laws. Literature review on approaches for uncovering information from the Invisible Web. Findings: Bergman's size estimate of the Invisible Web is highly questionable. We demonstrate some major errors in the conceptual design of the Bergman paper. A new (raw) size estimate is given. Research limitations/implications: The precision of our estimate is limited due to a small sample size and lack of reliable data. Practical implications: We can show that no single library alone will be able to index the Academic Invisible Web. We suggest collaboration to accomplish this task. Originality/value: Provides library managers and those interested in developing academic search engines with data on the size and attributes of the Academic Invisible Web.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 20:56:34 GMT" } ]
2019-01-15T00:00:00
[ [ "Lewandowski", "Dirk", "" ], [ "Mayr", "Philipp", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0702104
Ioannis Chatzigeorgiou
Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell, Rolando Carrasco
A Union Bound Approximation for Rapid Performance Evaluation of Punctured Turbo Codes
6 pages, 5 figures, 1 table, Proceedings of the 41st Conference on Information Sciences and Systems, Baltimore, USA, March 14-16, 2007
null
10.1109/CISS.2007.4298352
null
cs.IT math.IT
null
In this paper, we present a simple technique to approximate the performance union bound of a punctured turbo code. The bound approximation exploits only those terms of the transfer function that have a major impact on the overall performance. We revisit the structure of the constituent convolutional encoder and we develop a rapid method to calculate the most significant terms of the transfer function of a turbo encoder. We demonstrate that, for a large interleaver size, this approximation is very accurate. Furthermore, we apply our proposed method to a family of punctured turbo codes, which we call pseudo-randomly punctured codes. We conclude by emphasizing the benefits of our approach compared to those employed previously. We also highlight the advantages of pseudo-random puncturing over other puncturing schemes.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 09:18:22 GMT" } ]
2022-03-08T00:00:00
[ [ "Chatzigeorgiou", "Ioannis", "" ], [ "Rodrigues", "Miguel R. D.", "" ], [ "Wassell", "Ian J.", "" ], [ "Carrasco", "Rolando", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702105
Hossein Kakavand
David Donoho, Hossein Kakavand, James Mammen
The Simplest Solution to an Underdetermined System of Linear Equations
Proceedings of the IEEE International Symposium on Information Theory Seattle, Washington, July 9-14, 2006
null
10.1109/ISIT.2006.261816
null
cs.IT math.IT
null
Consider a d*n matrix A, with d<n. The problem of solving for x in y=Ax is underdetermined, and has infinitely many solutions (if there are any). Given y, the minimum Kolmogorov complexity solution (MKCS) of the input x is defined to be an input z (out of many) with minimum Kolmogorov-complexity that satisfies y=Az. One expects that if the actual input is simple enough, then MKCS will recover the input exactly. This paper presents a preliminary study of the existence and value of the complexity level up to which such a complexity-based recovery is possible. It is shown that for the set of all d*n binary matrices (with entries 0 or 1 and d<n), MKCS exactly recovers the input for an overwhelming fraction of the matrices provided the Kolmogorov complexity of the input is O(d). A weak converse that is loose by a log n factor is also established for this case. Finally, we investigate the difficulty of finding a matrix that has the property of recovering inputs with complexity of O(d) using MKCS.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 12:34:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Donoho", "David", "" ], [ "Kakavand", "Hossein", "" ], [ "Mammen", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702106
Charles Robert
Charles Robert (LORIA), Ranmi Adigun (YABATECH)
Wild, Wild Wikis: A way forward
null
Dans The Fifth International Conference on Creating, Connecting and Collaborating through Computing, C5 2007 (2007)
null
null
cs.IR
null
Wikis can be considered as public domain knowledge sharing system. They provide opportunity for those who may not have the privilege to publish their thoughts through the traditional methods. They are one of the fastest growing systems of online encyclopaedia. In this study, we consider the importance of wikis as a way of creating, sharing and improving public knowledge. We identify some of the problems associated with wikis to include, (a) identification of the identities of information and its creator (b) accuracy of information (c) justification of the credibility of authors (d) vandalism of quality of information (e) weak control over the contents. A solution to some of these problems is sought through the use of an annotation model. The model assumes that contributions in wikis can be seen as annotation to the initial document. It proposed a systematic control of contributors and contributions to the initiative and the keeping of records of what existed and what was done to initial documents. We believe that with this model, analysis can be done on the progress of wiki initiatives. We assumed that using this model, wikis can be better used for creation and sharing of knowledge for public use.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:12:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles", "", "LORIA" ], [ "Adigun", "Ranmi", "", "YABATECH" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702107
Charles Robert
Charles A. Robert (LORIA)
AMIEDoT: An annotation model for document tracking and recommendation service
null
Dans International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, (CIS2E 06) (2007)
null
null
cs.IR
null
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on information source. Beyond providing personal assessment to original information sources, we are looking at a situation where annotation made can be used as additional source of information for document tracking and recommendation service. Most of the annotation tools existing today were conceived for their independent use with no reference to the creator of the annotation. We propose AMIEDoT (Annotation Model for Information Exchange and Document Tracking) an annotation model that can assist in document tracking and recommendation service. The model is based on three parameters in the acts of annotation. We believe that introducing document parameters, time and the parameters of the creator of annotation into an annotation process can be a dependable source to know, who used a document, when a document was used and for what a document was used for. Beyond document tracking, our model can be used in not only for selective dissemination of information but for recommendation services. AMIEDoT can also be used for information sharing and information reuse.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:18:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles A.", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702108
Wenyi Zhang
Wenyi Zhang, Urbashi Mitra
Orthogonal Codes for Robust Low-Cost Communication
2nd revision, accepted for publication
null
null
USC CSI Technical Report CSI-07-02-01
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orthogonal coding schemes, known to asymptotically achieve the capacity per unit cost (CPUC) for single-user ergodic memoryless channels with a zero-cost input symbol, are investigated for single-user compound memoryless channels, which exhibit uncertainties in their input-output statistical relationships. A minimax formulation is adopted to attain robustness. First, a class of achievable rates per unit cost (ARPUC) is derived, and its utility is demonstrated through several representative case studies. Second, when the uncertainty set of channel transition statistics satisfies a convexity property, optimization is performed over the class of ARPUC through utilizing results of minimax robustness. The resulting CPUC lower bound indicates the ultimate performance of the orthogonal coding scheme, and coincides with the CPUC under certain restrictive conditions. Finally, still under the convexity property, it is shown that the CPUC can generally be achieved, through utilizing a so-called mixed strategy in which an orthogonal code contains an appropriate composition of different nonzero-cost input symbols.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 19:06:56 GMT" }, { "version": "v2", "created": "Fri, 25 Jan 2008 19:31:43 GMT" }, { "version": "v3", "created": "Wed, 17 Sep 2008 02:55:52 GMT" } ]
2009-09-29T00:00:00
[ [ "Zhang", "Wenyi", "" ], [ "Mitra", "Urbashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702109
Charles Robert
Charles A. Robert (LORIA), David Amos (LORIA)
AMIE: An annotation model for information research
null
Dans International Conference on Computers in Education, (2006)
null
null
cs.IR
null
The objective of most users for consulting any information database, information warehouse or the internet is to resolve one problem or the other. Available online or offline annotation tools were not conceived with the objective of assisting users in their bid to resolve a decisional problem. Apart from the objective and usage of annotation tools, how these tools are conceived and classified has implication on their usage. Several criteria have been used to categorize annotation concepts. Typically annotation are conceived based on how it affect the organization of document been considered for annotation or the organization of the resulting annotation. Our approach is annotation that will assist in information research for decision making. Annotation model for information exchange (AMIE) was conceived with the objective of information sharing and reuse.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:26:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles A.", "", "LORIA" ], [ "Amos", "David", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702110
Saltuk Aksahin
Saltuk Aksahin
Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency
64 pages
null
null
null
cs.NI
null
This dissertation has extensively looked into all aspects of VoIP commu-nications technology, and information presented in preceding chapters, which build up a solid framework to discuss the conceptual design model, and investigate features that could be incorporated for actual Pro-jects, with parameters that are tested on field values. The dissertation follows a five-course model, for answering different questions, both tech-nical and businesslike, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP tech-nology, analyzing current VoIP encryption methods, identifying security threats, designing a robust VoIP system based on particulars discussed in preceding chapters, and finally, a VoIP simulation.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 20:51:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Aksahin", "Saltuk", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0702111
Andres Vila Casado
Andres I. Vila Casado, Miguel Griot and Richard D. Wesel
Informed Dynamic Scheduling for Belief-Propagation Decoding of LDPC Codes
6 pages, 4 figures
null
null
null
cs.IT math.IT
null
Low-Density Parity-Check (LDPC) codes are usually decoded by running an iterative belief-propagation, or message-passing, algorithm over the factor graph of the code. The traditional message-passing schedule consists of updating all the variable nodes in the graph, using the same pre-update information, followed by updating all the check nodes of the graph, again, using the same pre-update information. Recently several studies show that sequential scheduling, in which messages are generated using the latest available information, significantly improves the convergence speed in terms of number of iterations. Sequential scheduling raises the problem of finding the best sequence of message updates. This paper presents practical scheduling strategies that use the value of the messages in the graph to find the next message to be updated. Simulation results show that these informed update sequences require significantly fewer iterations than standard sequential schedules. Furthermore, the paper shows that informed scheduling solves some standard trapping set errors. Therefore, it also outperforms traditional scheduling for a large numbers of iterations. Complexity and implementability issues are also addressed.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 23:26:43 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2007 09:56:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Casado", "Andres I. Vila", "" ], [ "Griot", "Miguel", "" ], [ "Wesel", "Richard D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702112
Ender Tekin
Ender Tekin, Aylin Yener
The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security
null
null
null
cs.IT cs.CR math.IT
null
The General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT) and the Gaussian Two-Way Wire-Tap Channel (GTW-WT) are considered. In the GGMAC-WT, multiple users communicate with an intended receiver in the presence of an eavesdropper who receives their signals through another GMAC. In the GTW-WT, two users communicate with each other over a common Gaussian channel, with an eavesdropper listening through a GMAC. A secrecy measure that is suitable for this multi-terminal environment is defined, and achievable secrecy rate regions are found for both channels. For both cases, the power allocations maximizing the achievable secrecy sum-rate are determined. It is seen that the optimum policy may prevent some terminals from transmission in order to preserve the secrecy of the system. Inspired by this construct, a new scheme, \ital{cooperative jamming}, is proposed, where users who are prevented from transmitting according to the secrecy sum-rate maximizing power allocation policy "jam" the eavesdropper, thereby helping the remaining users. This scheme is shown to increase the achievable secrecy sum-rate. Overall, our results show that in multiple-access scenarios, users can help each other to collectively achieve positive secrecy rates. In other words, cooperation among users can be invaluable for achieving secrecy for the system.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 02:25:51 GMT" }, { "version": "v2", "created": "Fri, 25 Jan 2008 23:32:18 GMT" } ]
2008-01-28T00:00:00
[ [ "Tekin", "Ender", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702113
David Pritchard
David Pritchard and Ramakrishna Thurimella
Fast Computation of Small Cuts via Cycle Space Sampling
Previous version appeared in Proc. 35th ICALP, pages 145--160, 2008
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new sampling-based method to determine cuts in an undirected graph. For a graph (V, E), its cycle space is the family of all subsets of E that have even degree at each vertex. We prove that with high probability, sampling the cycle space identifies the cuts of a graph. This leads to simple new linear-time sequential algorithms for finding all cut edges and cut pairs (a set of 2 edges that form a cut) of a graph. In the model of distributed computing in a graph G=(V, E) with O(log V)-bit messages, our approach yields faster algorithms for several problems. The diameter of G is denoted by Diam, and the maximum degree by Delta. We obtain simple O(Diam)-time distributed algorithms to find all cut edges, 2-edge-connected components, and cut pairs, matching or improving upon previous time bounds. Under natural conditions these new algorithms are universally optimal --- i.e. a Omega(Diam)-time lower bound holds on every graph. We obtain a O(Diam+Delta/log V)-time distributed algorithm for finding cut vertices; this is faster than the best previous algorithm when Delta, Diam = O(sqrt(V)). A simple extension of our work yields the first distributed algorithm with sub-linear time for 3-edge-connected components. The basic distributed algorithms are Monte Carlo, but they can be made Las Vegas without increasing the asymptotic complexity. In the model of parallel computing on the EREW PRAM our approach yields a simple algorithm with optimal time complexity O(log V) for finding cut pairs and 3-edge-connected components.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 03:00:33 GMT" }, { "version": "v2", "created": "Wed, 25 Apr 2007 04:26:00 GMT" }, { "version": "v3", "created": "Thu, 5 Jul 2007 04:43:05 GMT" }, { "version": "v4", "created": "Tue, 8 Apr 2008 19:17:34 GMT" }, { "version": "v5", "created": "Wed, 21 Jul 2010 09:49:35 GMT" } ]
2010-07-22T00:00:00
[ [ "Pritchard", "David", "" ], [ "Thurimella", "Ramakrishna", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702114
David Pritchard
David Pritchard
Nearest Neighbor Network Traversal
null
null
null
null
cs.DC
null
A mobile agent in a network wants to visit every node of an n-node network, using a small number of steps. We investigate the performance of the following ``nearest neighbor'' heuristic: always go to the nearest unvisited node. If the network graph never changes, then from (Rosenkrantz, Stearns and Lewis, 1977) and (Hurkens and Woeginger, 2004) it follows that Theta(n log n) steps are necessary and sufficient in the worst case. We give a simpler proof of the upper bound and an example that improves the best known lower bound. We investigate how the performance of this heuristic changes when it is distributively implemented in a network. Even if network edges are allow to fail over time, we show that the nearest neighbor strategy never runs for more than O(n^2) iterations. We also show that any strategy can be forced to take at least n(n-1)/2 steps before all nodes are visited, if the edges of the network are deleted in an adversarial way.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 03:54:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritchard", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0702115
Rajesh Sundaresan
Rajesh Sundaresan
Guessing based on length functions
16 pages, Submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security, Simplified proof of Proposition 2
null
10.1109/ISIT.2007.4557309
null
cs.IT cs.CR math.IT
null
A guessing wiretapper's performance on a Shannon cipher system is analyzed for a source with memory. Close relationships between guessing functions and length functions are first established. Subsequently, asymptotically optimal encryption and attack strategies are identified and their performances analyzed for sources with memory. The performance metrics are exponents of guessing moments and probability of large deviations. The metrics are then characterized for unifilar sources. Universal asymptotically optimal encryption and attack strategies are also identified for unifilar sources. Guessing in the increasing order of Lempel-Ziv coding lengths is proposed for finite-state sources, and shown to be asymptotically optimal. Finally, competitive optimality properties of guessing in the increasing order of description lengths and Lempel-Ziv coding lengths are demonstrated.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 09:12:11 GMT" }, { "version": "v2", "created": "Sun, 15 Apr 2007 10:22:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Sundaresan", "Rajesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702116
Dale Miller
David Baelde, Andrew Gacek, Dale Miller, Gopalan Nadathur, and Alwen Tiu
The Bedwyr system for model checking over syntactic expressions
6 page system description. Appeared in CADE 2007
CADE 2007: 21th Conference on Automated Deduction, Frank Pfenning, editor, LNAI 4603, pages 391-397. Springer, 2007
null
null
cs.LO
null
Bedwyr is a generalization of logic programming that allows model checking directly on syntactic expressions possibly containing bindings. This system, written in OCaml, is a direct implementation of two recent advances in the theory of proof search. The first is centered on the fact that both finite success and finite failure can be captured in the sequent calculus by incorporating inference rules for definitions that allow fixed points to be explored. As a result, proof search in such a sequent calculus can capture simple model checking problems as well as may and must behavior in operational semantics. The second is that higher-order abstract syntax is directly supported using term-level $\lambda$-binders and the $\nabla$ quantifier. These features allow reasoning directly on expressions containing bound variables.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 10:08:24 GMT" }, { "version": "v2", "created": "Fri, 25 Apr 2008 13:36:15 GMT" } ]
2008-04-25T00:00:00
[ [ "Baelde", "David", "" ], [ "Gacek", "Andrew", "" ], [ "Miller", "Dale", "" ], [ "Nadathur", "Gopalan", "" ], [ "Tiu", "Alwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702117
Mathieu Couture
Prosenjit Bose and Paz Carmi and Mathieu Couture and Michiel Smid and Daming Xu
On a family of strong geometric spanners that admit local routing strategies
null
null
null
null
cs.CG
null
We introduce a family of directed geometric graphs, denoted $\paz$, that depend on two parameters $\lambda$ and $\theta$. For $0\leq \theta<\frac{\pi}{2}$ and ${1/2} < \lambda < 1$, the $\paz$ graph is a strong $t$-spanner, with $t=\frac{1}{(1-\lambda)\cos\theta}$. The out-degree of a node in the $\paz$ graph is at most $\lfloor2\pi/\min(\theta, \arccos\frac{1}{2\lambda})\rfloor$. Moreover, we show that routing can be achieved locally on $\paz$. Next, we show that all strong $t$-spanners are also $t$-spanners of the unit disk graph. Simulations for various values of the parameters $\lambda$ and $\theta$ indicate that for random point sets, the spanning ratio of $\paz$ is better than the proven theoretical bounds.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 20:54:16 GMT" }, { "version": "v2", "created": "Wed, 21 Feb 2007 14:57:44 GMT" }, { "version": "v3", "created": "Thu, 22 Feb 2007 21:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Carmi", "Paz", "" ], [ "Couture", "Mathieu", "" ], [ "Smid", "Michiel", "" ], [ "Xu", "Daming", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0702118
Kwankyu Lee
Kwankyu Lee
Interpolation-based Decoding of Alternant Codes
submitted to the journal of Advances in Mathematics of Communications
null
null
null
cs.IT math.IT
null
We formulate the classical decoding algorithm of alternant codes afresh based on interpolation as in Sudan's list decoding of Reed-Solomon codes, and thus get rid of the key equation and the linear recurring sequences in the theory. The result is a streamlined exposition of the decoding algorithm using a bit of the theory of Groebner bases of modules.
[ { "version": "v1", "created": "Wed, 21 Feb 2007 04:43:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Lee", "Kwankyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702119
Raju Renjit G
Raju Renjit. G
Ulam's Conjecture is True for Connected Graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This submission has been withdrawn at the request of the author.
[ { "version": "v1", "created": "Wed, 21 Feb 2007 08:39:42 GMT" }, { "version": "v2", "created": "Mon, 2 Apr 2007 11:56:55 GMT" }, { "version": "v3", "created": "Wed, 7 May 2008 15:47:08 GMT" }, { "version": "v4", "created": "Sat, 15 Nov 2008 04:56:43 GMT" }, { "version": "v5", "created": "Fri, 13 Mar 2009 05:59:58 GMT" }, { "version": "v6", "created": "Thu, 19 Mar 2009 05:32:08 GMT" }, { "version": "v7", "created": "Tue, 14 Apr 2009 06:46:18 GMT" }, { "version": "v8", "created": "Wed, 20 May 2009 11:24:31 GMT" }, { "version": "v9", "created": "Tue, 25 Aug 2009 15:31:48 GMT" } ]
2009-08-25T00:00:00
[ [ "G", "Raju Renjit.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702120
James Worrell
Joel Ouaknine and James Worrell
On the decidability and complexity of Metric Temporal Logic over finite words
null
Logical Methods in Computer Science, Volume 3, Issue 1 (February 28, 2007) lmcs:2230
10.2168/LMCS-3(1:8)2007
null
cs.LO cs.CC
null
Metric Temporal Logic (MTL) is a prominent specification formalism for real-time systems. In this paper, we show that the satisfiability problem for MTL over finite timed words is decidable, with non-primitive recursive complexity. We also consider the model-checking problem for MTL: whether all words accepted by a given Alur-Dill timed automaton satisfy a given MTL formula. We show that this problem is decidable over finite words. Over infinite words, we show that model checking the safety fragment of MTL--which includes invariance and time-bounded response properties--is also decidable. These results are quite surprising in that they contradict various claims to the contrary that have appeared in the literature.
[ { "version": "v1", "created": "Wed, 21 Feb 2007 16:14:34 GMT" }, { "version": "v2", "created": "Thu, 22 Feb 2007 12:51:39 GMT" }, { "version": "v3", "created": "Wed, 28 Feb 2007 16:27:53 GMT" } ]
2017-01-11T00:00:00
[ [ "Ouaknine", "Joel", "" ], [ "Worrell", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702121
Sherman Wang Dr.
Xing M. Wang
Induced Hilbert Space, Markov Chain, Diffusion Map and Fock Space in Thermophysics
25 pages
null
null
null
cs.OH math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we continue to explore Probability Bracket Notation (PBN), proposed in our previous article. Using both Dirac vector bracket notation (VBN) and PBN, we define induced Hilbert space and induced sample space, and propose that there exists an equivalence relation between a Hilbert space and a sample space constructed from the same base observable(s). Then we investigate Markov transition matrices and their eigenvectors to make diffusion maps with two examples: a simple graph theory example, to serve as a prototype of bidirectional transition operator; a famous text document example in IR literature, to serve as a tutorial of diffusion map in text document space. We show that the sample space of the Markov chain and the Hilbert space spanned by the eigenvectors of the transition matrix are not equivalent. At the end, we apply our PBN and equivalence proposal to Thermophysics by associating sample (phase) space with the Hilbert space of a single particle and the Fock space of many-particle systems.
[ { "version": "v1", "created": "Wed, 21 Feb 2007 22:55:22 GMT" }, { "version": "v2", "created": "Sun, 11 Mar 2007 20:07:05 GMT" }, { "version": "v3", "created": "Tue, 20 Mar 2007 04:32:50 GMT" }, { "version": "v4", "created": "Sun, 8 Apr 2007 18:51:10 GMT" }, { "version": "v5", "created": "Sun, 22 Nov 2009 21:50:49 GMT" } ]
2009-11-22T00:00:00
[ [ "Wang", "Xing M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0702122
Thomas Michel
Thomas Michel, Gerhard Wunder
Transmitter and Precoding Order Optimization for Nonlinear Downlink Beamforming
Submitted to IEEE Int. Symposium on Inf. Theory (ISIT) 2007
null
null
null
cs.IT math.IT
null
The downlink of a multiple-input multiple output (MIMO) broadcast channel (BC) is considered, where each receiver is equipped with a single antenna and the transmitter performs nonlinear Dirty-Paper Coding (DPC). We present an efficient algorithm that finds the optimum transmit filters and power allocation as well as the optimum precoding order(s) possibly affording time-sharing between individual DPC orders. Subsequently necessary and sufficient conditions for the optimality of an arbitrary precoding order are derived. Based on these we propose a suboptimal algorithm showing excellent performance and having low complexity.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 08:13:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Michel", "Thomas", "" ], [ "Wunder", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702123
Slavcho Shtrakov
Slavcho Shtrakov and Vladimir Shtrakov
Tree automata and separable sets of input variables
8 pages, 2 figures
J. FILOMAT, v. 15, 2001, University of Nis, 61-71 p., ISSN 0354-5180 (http://www.pmf.ni.ac.yu/sajt/publikacije/filomat_15.html)
null
null
cs.CC cs.DM
null
We consider the computational complexity of tree transducers, depending on their separable sets of input variables.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ], [ "Shtrakov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702124
Mohsen Bayati
Mohsen Bayati, Jeong Han Kim and Amin saberi
A Sequential Algorithm for Generating Random Graphs
39 pages
Algorithmica (2010) 58: 860-910
10.1007/s00453-009-9340-1
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a nearly-linear time algorithm for counting and randomly generating simple graphs with a given degree sequence in a certain range. For degree sequence $(d_i)_{i=1}^n$ with maximum degree $d_{\max}=O(m^{1/4-\tau})$, our algorithm generates almost uniform random graphs with that degree sequence in time $O(m\,d_{\max})$ where $m=\f{1}{2}\sum_id_i$ is the number of edges in the graph and $\tau$ is any positive constant. The fastest known algorithm for uniform generation of these graphs McKay Wormald (1990) has a running time of $O(m^2d_{\max}^2)$. Our method also gives an independent proof of McKay's estimate McKay (1985) for the number of such graphs. We also use sequential importance sampling to derive fully Polynomial-time Randomized Approximation Schemes (FPRAS) for counting and uniformly generating random graphs for the same range of $d_{\max}=O(m^{1/4-\tau})$. Moreover, we show that for $d = O(n^{1/2-\tau})$, our algorithm can generate an asymptotically uniform $d$-regular graph. Our results improve the previous bound of $d = O(n^{1/3-\tau})$ due to Kim and Vu (2004) for regular graphs.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:00:53 GMT" }, { "version": "v2", "created": "Sun, 8 Apr 2007 17:26:05 GMT" }, { "version": "v3", "created": "Mon, 11 Jun 2007 03:32:11 GMT" }, { "version": "v4", "created": "Sat, 16 Jun 2007 01:42:14 GMT" }, { "version": "v5", "created": "Sat, 3 Mar 2012 01:38:04 GMT" } ]
2012-03-06T00:00:00
[ [ "Bayati", "Mohsen", "" ], [ "Kim", "Jeong Han", "" ], [ "saberi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702125
Philipp Pluch
Philipp Pluch, Samo Wakounig
Bayesian Network Tomography and Inference
null
null
null
null
cs.NI
null
The aim of this technical report is to give a short overview of known techniques for network tomography (introduced in the paper of Vardi (1996)), extended by a Bayesian approach originating Tebaldi and West (1998). Since the studies of A.K. Erlang (1878-1929) on telephone networks in the last millennium, lots of needs are seen in todays applications of networks and network tomography, so for instance networks are a critical component of the information structure supporting finance, commerce and even civil and national defence. An attack on a network can be performed as an intrusion in the network or as sending a lot of fault information and disturbing the network flow. Such attacks can be detected by modelling the traffic flows in a network, by counting the source destination packets and even by measuring counts over time and by drawing a comparison with this 'time series' for instance.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 09:43:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Pluch", "Philipp", "" ], [ "Wakounig", "Samo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0702126
Vincenzo Nicosia
V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri
Efficient Searching and Retrieval of Documents in PROSA
12 pages, 3 figures
null
null
null
cs.DC cs.IR
null
Retrieving resources in a distributed environment is more difficult than finding data in centralised databases. In the last decade P2P system arise as new and effective distributed architectures for resource sharing, but searching in such environments could be difficult and time-consuming. In this paper we discuss efficiency of resource discovery in PROSA, a self-organising P2P system heavily inspired by social networks. All routing choices in PROSA are made locally, looking only at the relevance of the next peer to each query. We show that PROSA is able to effectively answer queries for rare documents, forwarding them through the most convenient path to nodes that much probably share matching resources. This result is heavily related to the small-world structure that naturally emerges in PROSA.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:22:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicosia", "V.", "" ], [ "Mangioni", "G.", "" ], [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702127
Vincenzo Nicosia
V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri
Exploiting social networks dynamics for P2P resource organisation
9 pages, 4 figures
Lecture Notes on Computer Science (LNCS) 4263 (2006)
null
null
cs.DC cs.IR
null
In this paper we present a formal description of PROSA, a P2P resource management system heavily inspired by social networks. Social networks have been deeply studied in the last two decades in order to understand how communities of people arise and grow. It is a widely known result that networks of social relationships usually evolves to small-worlds, i.e. networks where nodes are strongly connected to neighbours and separated from all other nodes by a small amount of hops. This work shows that algorithms implemented into PROSA allow to obtain an efficient small-world P2P network.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:35:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicosia", "V.", "" ], [ "Mangioni", "G.", "" ], [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0702128
Huang Xiangao
Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu jing Wang and Tao Wang
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
6 pages, 1 figure
null
null
null
cs.CR
null
In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our reconstruction need approximately 2^12~2^13 and the attack consumes 5825.016 sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We got the expression of the nonlinear filter function fd of Lili-128 which has 46 items from liner items to nonlinear items based on complexity, the phase space reconstruction, Clustering and nonlinear prediction. We have verified our reconstruction result correctness by simulating the overview of Lili-128 keystream generators using our getting fd and implement designers reference module of the Lili-128 stream cipher, and two methods produce the same synchronous keystream sequence on same initial state, so that our research work proves that the nonlinear filter function of LILI-128 stream cipher is successfully reconstructed.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 14:03:51 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 01:53:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Xiangao", "" ], [ "Huang", "Wei", "" ], [ "Liu", "Xiaozhou", "" ], [ "Wang", "Chao", "" ], [ "Wang", "Zhu jing", "" ], [ "Wang", "Tao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0702129
Slavcho Shtrakov
Slavcho Shtrakov
Tree Automata and Essential Input Variables
10 pages, 2 figures, 60th Workshop on General Algebra, June 22-25, 2000, TU Dresden
J. Contributions to General Algebra, v.13, Verlag Johannes Heyn, Klagenfurt, 2001, 309-319 p
null
null
cs.CC cs.DM
null
We introduce and study the essential inputs (variables) for terms (trees) and tree automata.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:12:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702130
Georg Schmidt
Georg Schmidt, Vladimir R. Sidorenko, Martin Bossert
Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance based on Shift-Register Synthesis
14 pages, 5 figures
null
null
null
cs.IT math.IT
null
In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond half the minimum distance is considered and analyzed. Unlike the Sudan algorithm published in 1997, this new approach is based on multi-sequence shift-register synthesis, which makes it easy to understand and simple to implement. The computational complexity of this shift-register based algorithm is of the same order as the complexity of the well-known Berlekamp-Massey algorithm. Moreover, the error correcting radius coincides with the error correcting radius of the original Sudan algorithm, and the practical decoding performance observed on a q-ary symmetric channel (QSC) is virtually identical to the decoding performance of the Sudan algorithm. Bounds for the failure and error probability as well as for the QSC decoding performance of the new algorithm are derived, and the performance is illustrated by means of examples.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:55:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Georg", "" ], [ "Sidorenko", "Vladimir R.", "" ], [ "Bossert", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702131
Jason Reese
Graham B. Macpherson and Jason M. Reese
AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics in Arbitrary Geometries
null
null
null
null
cs.CE cs.DC
null
A new algorithm for calculating intermolecular pair forces in Molecular Dynamics (MD) simulations on a distributed parallel computer is presented. The Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on geometrical domains defined by an unstructured, arbitrary polyhedral mesh, which has been spatially decomposed into irregular portions for parallelisation. It is intended for nano scale fluid mechanics simulation by MD in complex geometries, and to provide the MD component of a hybrid MD/continuum simulation. AICA has been implemented in the open-source computational toolbox OpenFOAM, and verified against a published MD code.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 17:27:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Macpherson", "Graham B.", "" ], [ "Reese", "Jason M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0702132
Vikram Chandrasekhar
Vikram Chandrasekhar and Jeffrey G. Andrews
Uplink Capacity and Interference Avoidance for Two-Tier Femtocell Networks
To be published in the IEEE Transactions on Wireless Communications
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-tier femtocell networks-- comprising a conventional macrocellular network plus embedded femtocell hotspots-- offer an economically viable solution to achieving high cellular user capacity and improved coverage. With universal frequency reuse and DS-CDMA transmission however, the ensuing cross-tier cochannel interference (CCI) causes unacceptable outage probability. This paper develops an uplink capacity analysis and interference avoidance strategy in such a two-tier CDMA network. We evaluate a network-wide area spectral efficiency metric called the \emph{operating contour (OC)} defined as the feasible combinations of the average number of active macrocell users and femtocell base stations (BS) per cell-site that satisfy a target outage constraint. The capacity analysis provides an accurate characterization of the uplink outage probability, accounting for power control, path-loss and shadowing effects. Considering worst case CCI at a corner femtocell, results reveal that interference avoidance through a time-hopped CDMA physical layer and sectorized antennas allows about a 7x higher femtocell density, relative to a split spectrum two-tier network with omnidirectional femtocell antennas. A femtocell exclusion region and a tier selection based handoff policy offers modest improvements in the OCs. These results provide guidelines for the design of robust shared spectrum two-tier networks.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 00:26:03 GMT" }, { "version": "v2", "created": "Mon, 26 Feb 2007 06:20:53 GMT" }, { "version": "v3", "created": "Tue, 27 Feb 2007 06:41:10 GMT" }, { "version": "v4", "created": "Tue, 27 Feb 2007 23:12:12 GMT" }, { "version": "v5", "created": "Sun, 6 May 2007 19:36:58 GMT" }, { "version": "v6", "created": "Sat, 26 May 2007 20:44:21 GMT" }, { "version": "v7", "created": "Sun, 11 Nov 2007 21:57:40 GMT" }, { "version": "v8", "created": "Mon, 11 Feb 2008 04:02:40 GMT" }, { "version": "v9", "created": "Thu, 5 Feb 2009 22:30:42 GMT" } ]
2009-02-06T00:00:00
[ [ "Chandrasekhar", "Vikram", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702133
Vadim Yatsenko
Vadim Yatsenko
Fast Exact Method for Solving the Travelling Salesman Problem
4 pages, 4 figures
null
null
null
cs.CC
null
This paper describes TSP exact solution of polynomial complexity. It is considered properties of proposed method. Effectiveness of proposed solution is illustrated by outcomes of computer modeling.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 02:39:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Yatsenko", "Vadim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702134
Pankaj Sati Mr
Pankaj Sati
Patterns of technological progress: A Predictability-Based Perspective
Paper has been withdrawn
null
null
null
cs.CY
null
The paper tries to identify new emerging patterns in the context of technological progress. Just as industrialization is associated with rationalization, mechanization, and automation, the Internet age is associated with computer models, embedded knowledge, and collaboration. Comparison among patterns is highlighted and analysis is done from predictability-based perspective.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 09:18:56 GMT" }, { "version": "v2", "created": "Sat, 24 Feb 2007 08:31:06 GMT" }, { "version": "v3", "created": "Wed, 27 Jun 2012 14:36:30 GMT" } ]
2012-06-28T00:00:00
[ [ "Sati", "Pankaj", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0702135
Simon Portegies Zwart
Simon Portegies Zwart, Robert Belleman, Peter Geldof
High Performance Direct Gravitational N-body Simulations on Graphics Processing Units
Submitted to New Astronomy
null
10.1016/j.newast.2007.05.004
null
cs.PF
null
We present the results of gravitational direct $N$-body simulations using the commercial graphics processing units (GPU) NVIDIA Quadro FX1400 and GeForce 8800GTX, and compare the results with GRAPE-6Af special purpose hardware. The force evaluation of the $N$-body problem was implemented in Cg using the GPU directly to speed-up the calculations. The integration of the equations of motions were, running on the host computer, implemented in C using the 4th order predictor-corrector Hermite integrator with block time steps. We find that for a large number of particles ($N \apgt 10^4$) modern graphics processing units offer an attractive low cost alternative to GRAPE special purpose hardware. A modern GPU continues to give a relatively flat scaling with the number of particles, comparable to that of the GRAPE. Using the same time step criterion the total energy of the $N$-body system was conserved better than to one in $10^6$ on the GPU, which is only about an order of magnitude worse than obtained with GRAPE. For $N\apgt 10^6$ the GeForce 8800GTX was about 20 times faster than the host computer. Though still about an order of magnitude slower than GRAPE, modern GPU's outperform GRAPE in their low cost, long mean time between failure and the much larger onboard memory; the GRAPE-6Af holds at most 256k particles whereas the GeForce 8800GTF can hold 9 million particles in memory.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 09:44:17 GMT" } ]
2015-06-25T00:00:00
[ [ "Zwart", "Simon Portegies", "" ], [ "Belleman", "Robert", "" ], [ "Geldof", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0702136
Slavcho Shtrakov
Ivo Damyanov and Slavcho Shtrakov
Essential Inputs and Minimal Tree Automata
7 pages, 1 figure, Sixth International Conference on Discrete Mathematics and Applications, 31.08-02.09.2001, Bansko
Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 77-85 p
null
null
cs.CC cs.DM
null
We continue studying essential inputs of trees and automata. Strongly essential inputs of trees are introduced and studied. Various examples for application in Computer Science are shown.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 12:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Damyanov", "Ivo", "" ], [ "Shtrakov", "Slavcho", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702137
Slavcho Shtrakov
Slavcho Shtrakov
Tree Automata and Essential Subtrees
9 pages, 2 figures, Sixth International Conference on Discrete Mathematics and Applications, Bansko, 2001
Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p
null
null
cs.CC cs.DM
null
We introduce essential subtrees for terms (trees) and tree automata . There are some results concerning independent sets of subtrees and separable sets for a tree and an automaton.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 13:20:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702138
Joakim Jalden
J. Jalden and B. Ottersten
On the Maximal Diversity Order of Spatial Multiplexing with Transmit Antenna Selection
10 pages. Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Zhang et. al. recently derived upper and lower bounds on the achievable diversity of an N_R x N_T i.i.d. Rayleigh fading multiple antenna system using transmit antenna selection, spatial multiplexing and a linear receiver structure. For the case of L = 2 transmitting (out of N_T available) antennas the bounds are tight and therefore specify the maximal diversity order. For the general case with L <= min(N_R,N_T) transmitting antennas it was conjectured that the maximal diversity is (N_T-L+1)(N_R-L+1) which coincides with the lower bound. Herein, we prove this conjecture for the zero forcing and zero forcing decision feedback (with optimal detection ordering) receiver structures.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 14:29:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Jalden", "J.", "" ], [ "Ottersten", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702139
Alexander Kholosha
Tor Helleseth and Alexander Kholosha and Geir Jarle Ness
Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with Three-Valued Crosscorrelation
23 pages
null
null
null
cs.CR cs.DM
null
Considered is the distribution of the crosscorrelation between $m$-sequences of length $2^m-1$, where $m=2k$, and $m$-sequences of shorter length $2^k-1$. New pairs of $m$-sequences with three-valued crosscorrelation are found and the complete correlation distribution is determined. Finally, we conjecture that there are no more cases with a three-valued crosscorrelation apart from the ones proven here.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 16:01:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Helleseth", "Tor", "" ], [ "Kholosha", "Alexander", "" ], [ "Ness", "Geir Jarle", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0702140
Bernardo Huberman
Dennis M. Wilkinson and Bernardo A. Huberman
Assessing the Value of Coooperation in Wikipedia
null
null
null
null
cs.DL cs.CY physics.soc-ph
null
Since its inception six years ago, the online encyclopedia Wikipedia has accumulated 6.40 million articles and 250 million edits, contributed in a predominantly undirected and haphazard fashion by 5.77 million unvetted volunteers. Despite the apparent lack of order, the 50 million edits by 4.8 million contributors to the 1.5 million articles in the English-language Wikipedia follow strong certain overall regularities. We show that the accretion of edits to an article is described by a simple stochastic mechanism, resulting in a heavy tail of highly visible articles with a large number of edits. We also demonstrate a crucial correlation between article quality and number of edits, which validates Wikipedia as a successful collaborative effort.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 17:59:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Wilkinson", "Dennis M.", "" ], [ "Huberman", "Bernardo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0702141
Tanya Crenshaw
Tanya L. Crenshaw and Erin Wolf Chambers and Heather Metcalf and Umesh Thakkar
Recruitment, Preparation, Retention: A case study of computing culture at the University of Illinois at Urbana-Champaign
37 pages, 13 figures. For better quality figures, please download the .pdf from http://www.cs.uiuc.edu/research/techreports.php?report=UIUCDCS-R-2007-2811
null
null
UIUCDCS-R-2007-2811
cs.GL
null
Computer science is seeing a decline in enrollment at all levels of education, including undergraduate and graduate study. This paper reports on the results of a study conducted at the University of Illinois at Urbana-Champaign which evaluated students attitudes regarding three areas which can contribute to improved enrollment in the Department of Computer Science: Recruitment, preparation and retention. The results of our study saw two themes. First, the department's tight research focus appears to draw significant attention from other activities -- such as teaching, service, and other community-building activities -- that are necessary for a department's excellence. Yet, as demonstrated by our second theme, one partial solution is to better promote such activities already employed by the department to its students and faculty. Based on our results, we make recommendations for improvements and enhancements based on the current state of practice at peer institutions.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 00:34:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Crenshaw", "Tanya L.", "" ], [ "Chambers", "Erin Wolf", "" ], [ "Metcalf", "Heather", "" ], [ "Thakkar", "Umesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]