id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0702142 | Daniel Lemire | Daniel Lemire, Martin Brooks, Yuhong Yan | An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation | Appeared in ICDM 2005 | null | null | null | cs.DS cs.DB | null | Monotonicity is a simple yet significant qualitative characteristic. We
consider the problem of segmenting an array in up to K segments. We want
segments to be as monotonic as possible and to alternate signs. We propose a
quality metric for this problem, present an optimal linear time algorithm based
on novel formalism, and compare experimentally its performance to a linear time
top-down regression algorithm. We show that our algorithm is faster and more
accurate. Applications include pattern recognition and qualitative modeling.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 02:29:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Brooks",
"Martin",
""
],
[
"Yan",
"Yuhong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0702143 | Daniel Lemire | Owen Kaser, Daniel Lemire | Attribute Value Reordering For Efficient Hybrid OLAP | null | Owen Kaser, Daniel Lemire, Attribute Value Reordering For
Efficient Hybrid OLAP, Information Sciences, Volume 176, Issue 16, 2006,
Pages 2304-2336 | 10.1016/j.ins.2005.09.005 | null | cs.DB | null | The normalization of a data cube is the ordering of the attribute values. For
large multidimensional arrays where dense and sparse chunks are stored
differently, proper normalization can lead to improved storage efficiency. We
show that it is NP-hard to compute an optimal normalization even for 1x3
chunks, although we find an exact algorithm for 1x2 chunks. When dimensions are
nearly statistically independent, we show that dimension-wise attribute
frequency sorting is an optimal normalization and takes time O(d n log(n)) for
data cubes of size n^d. When dimensions are not independent, we propose and
evaluate several heuristics. The hybrid OLAP (HOLAP) storage mechanism is
already 19%-30% more efficient than ROLAP, but normalization can improve it
further by 9%-13% for a total gain of 29%-44% over ROLAP.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 03:11:09 GMT"
}
] | 2012-01-16T00:00:00 | [
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0702144 | Daniel Lemire | Daniel Lemire, Anna Maclachlan | Slope One Predictors for Online Rating-Based Collaborative Filtering | In SIAM Data Mining (SDM'05), Newport Beach, California, April 21-23,
2005 | null | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rating-based collaborative filtering is the process of predicting how a user
would rate a given item from other user ratings. We propose three related slope
one schemes with predictors of the form f(x) = x + b, which precompute the
average difference between the ratings of one item and another for users who
rated both. Slope one algorithms are easy to implement, efficient to query,
reasonably accurate, and they support both online queries and dynamic updates,
which makes them good candidates for real-world systems. The basic slope one
scheme is suggested as a new reference scheme for collaborative filtering. By
factoring in items that a user liked separately from items that a user
disliked, we achieve results competitive with slower memory-based schemes over
the standard benchmark EachMovie and Movielens data sets while better
fulfilling the desiderata of CF applications.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 03:16:27 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Sep 2008 19:57:44 GMT"
}
] | 2018-10-16T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Maclachlan",
"Anna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702145 | Srikumar Venugopal | Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar
Buyya | Designing a Resource Broker for Heterogeneous Grids | 26 pages, 15 figures | null | null | GRIDS-TR-2007-2 | cs.DC cs.SE | null | Grids provide uniform access to aggregations of heterogeneous resources and
services such as computers, networks and storage owned by multiple
organizations. However, such a dynamic environment poses many challenges for
application composition and deployment. In this paper, we present the design of
the Gridbus Grid resource broker that allows users to create applications and
specify different objectives through different interfaces without having to
deal with the complexity of Grid infrastructure. We present the unique
requirements that motivated our design and discuss how these provide
flexibility in extending the functionality of the broker to support different
low-level middlewares and user interfaces. We evaluate the broker with
different job profiles and Grid middleware and conclude with the lessons learnt
from our development experience.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 08:35:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venugopal",
"Srikumar",
""
],
[
"Nadiminti",
"Krishna",
""
],
[
"Gibbins",
"Hussein",
""
],
[
"Buyya",
"Rajkumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0702146 | Weiyu Xu | Weiyu Xu | A Local Tree Structure is NOT Sufficient for the Local Optimality of
Message-Passing Decoding in Low Density Parity Check Codes | Comments, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | We address the problem,`Is a local tree structure sufficient for the local
optimality of message passing algorithm in low density parity check codes?'.It
is shown that the answer is negative. Using this observation, we pinpoint a
flaw in the proof of Theorem 1 in the paper `The Capacity of Low-Density
Parity-Check Codes Under Message-Passing Decoding' by Thomas J. Richardson and
R\"udiger L.Urbanke\cite{RUCapacity}. We further provide a new proof of that
theorem based on a different argument.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 03:22:35 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Xu",
"Weiyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702147 | Weiyu Xu | Weiyu Xu, Babak Hassibi | On the Complexity of Exact Maximum-Likelihood Decoding for
Asymptotically Good Low Density Parity Check Codes | an attempt at exploring the communication complexity limit,5
pages,submitted to 2007 IEEE International Symposium on Information Theory
(ISIT 2007) | null | 10.1109/ITW.2007.4313065 | null | cs.IT math.IT | null | Since the classical work of Berlekamp, McEliece and van Tilborg, it is well
known that the problem of exact maximum-likelihood (ML) decoding of general
linear codes is NP-hard. In this paper, we show that exact ML decoding of a
classs of asymptotically good error correcting codes--expander codes, a special
case of low density parity check (LDPC) codes--over binary symmetric channels
(BSCs) is possible with an expected polynomial complexity. More precisely, for
any bit-flipping probability, $p$, in a nontrivial range, there exists a rate
region of non-zero support and a family of asymptotically good codes, whose
error probability decays exponentially in coding length $n$, for which ML
decoding is feasible in expected polynomial time. Furthermore, as $p$
approaches zero, this rate region approaches the channel capacity region. The
result is based on the existence of polynomial-time suboptimal decoding
algorithms that provide an ML certificate and the ability to compute the
probability that the suboptimal decoder yields the ML solution. One such ML
certificate decoder is the LP decoder of Feldman; we also propose a more
efficient $O(n^2)$ algorithm based on the work of Sipser and Spielman and the
Ford-Fulkerson algorithm. The results can be extended to AWGN channels and
suggest that it may be feasible to eliminate the error floor phenomenon
associated with message-passage decoding of LDPC codes in the high SNR regime.
Finally, we observe that the argument of Berlekamp, McEliece and van Tilborg
can be used to show that ML decoding of the considered class of codes
constructed from LDPC codes with regular left degree, of which the considered
expander codes are a special case, remains NP-hard; thus giving an interesting
contrast between the worst-case and expected complexities.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 03:37:48 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Xu",
"Weiyu",
""
],
[
"Hassibi",
"Babak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702148 | Roderick Melnik | Roderick V.N. Melnik | Linking Microscopic and Macroscopic Models for Evolution: Markov Chain
Network Training and Conservation Law Approximations | 21 pages, 5 figures | Markov Chain network training and conservation law approximations:
Linking microscopic and macroscopic models for evolution, Melnik, R.V.N.,
Applied Mathematics and Computation, 199 (1), 315--333, 2008 | null | null | cs.CE cs.IT cs.NA cs.NE math.IT | null | In this paper, a general framework for the analysis of a connection between
the training of artificial neural networks via the dynamics of Markov chains
and the approximation of conservation law equations is proposed. This framework
allows us to demonstrate an intrinsic link between microscopic and macroscopic
models for evolution via the concept of perturbed generalized dynamic systems.
The main result is exemplified with a number of illustrative examples where
efficient numerical approximations follow directly from network-based
computational models, viewed here as Markov chain approximations. Finally,
stability and consistency conditions of such computational models are
discussed.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 11:19:25 GMT"
}
] | 2010-04-14T00:00:00 | [
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702149 | Roderick Melnik | Roderick V.N. Melnik | Coupling Control and Human-Centered Automation in Mathematical Models of
Complex Systems | 19 pages | null | null | null | cs.CE cs.AI cs.HC cs.IT math.IT | null | In this paper we analyze mathematically how human factors can be effectively
incorporated into the analysis and control of complex systems. As an example,
we focus our discussion around one of the key problems in the Intelligent
Transportation Systems (ITS) theory and practice, the problem of speed control,
considered here as a decision making process with limited information
available. The problem is cast mathematically in the general framework of
control problems and is treated in the context of dynamically changing
environments where control is coupled to human-centered automation. Since in
this case control might not be limited to a small number of control settings,
as it is often assumed in the control literature, serious difficulties arise in
the solution of this problem. We demonstrate that the problem can be reduced to
a set of Hamilton-Jacobi-Bellman equations where human factors are incorporated
via estimations of the system Hamiltonian. In the ITS context, these
estimations can be obtained with the use of on-board equipment like
sensors/receivers/actuators, in-vehicle communication devices, etc. The
proposed methodology provides a way to integrate human factor into the solving
process of the models for other complex dynamic systems.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 11:09:12 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702150 | Robert Gray | Robert M. Gray and Takeshi Hashimoto | A note on rate-distortion functions for nonstationary Gaussian
autoregressive processes | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | Source coding theorems and Shannon rate-distortion functions were studied for
the discrete-time Wiener process by Berger and generalized to nonstationary
Gaussian autoregressive processes by Gray and by Hashimoto and Arimoto.
Hashimoto and Arimoto provided an example apparently contradicting the methods
used in Gray, implied that Gray's rate-distortion evaluation was not correct in
the nonstationary case, and derived a new formula that agreed with previous
results for the stationary case and held in the nonstationary case. In this
correspondence it is shown that the rate-distortion formulas of Gray and
Hashimoto and Arimoto are in fact consistent and that the example of of
Hashimoto and Arimoto does not form a counter example to the methods or results
of the earlier paper. Their results do provide an alternative, but equivalent,
formula for the rate-distortion function in the nonstationary case and they
provide a concrete example that the classic Kolmogorov formula differs from the
autoregressive formula when the autoregressive source is not stationary. Some
observations are offered on the different versions of the Toeplitz asymptotic
eigenvalue distribution theorem used in the two papers to emphasize how a
slight modification of the classic theorem avoids the problems with certain
singularities.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 16:47:29 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gray",
"Robert M.",
""
],
[
"Hashimoto",
"Takeshi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702151 | Vladimir Braverman | Vladimir Braverman, Rafail Ostrovsky, Carlo Zaniolo | Succinct Sampling on Streams | null | null | null | null | cs.DS | null | A streaming model is one where data items arrive over long period of time,
either one item at a time or in bursts. Typical tasks include computing various
statistics over a sliding window of some fixed time-horizon. What makes the
streaming model interesting is that as the time progresses, old items expire
and new ones arrive. One of the simplest and central tasks in this model is
sampling. That is, the task of maintaining up to $k$ uniformly distributed
items from a current time-window as old items expire and new ones arrive. We
call sampling algorithms {\bf succinct} if they use provably optimal (up to
constant factors) {\bf worst-case} memory to maintain $k$ items (either with or
without replacement). We stress that in many applications structures that have
{\em expected} succinct representation as the time progresses are not
sufficient, as small probability events eventually happen with probability 1.
Thus, in this paper we ask the following question: are Succinct Sampling on
Streams (or $S^3$-algorithms)possible, and if so for what models? Perhaps
somewhat surprisingly, we show that $S^3$-algorithms are possible for {\em all}
variants of the problem mentioned above, i.e. both with and without replacement
and both for one-at-a-time and bursty arrival models. Finally, we use $S^3$
algorithms to solve various problems in sliding windows model, including
frequency moments, counting triangles, entropy and density estimations. For
these problems we present \emph{first} solutions with provable worst-case
memory guarantees.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 17:20:48 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Feb 2007 22:12:14 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Apr 2008 16:30:01 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Braverman",
"Vladimir",
""
],
[
"Ostrovsky",
"Rafail",
""
],
[
"Zaniolo",
"Carlo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702152 | Andrew Gacek | Andrew Gacek and Gopalan Nadathur | A Simplified Suspension Calculus and its Relationship to Other Explicit
Substitution Calculi | 38 pages | null | null | null | cs.LO | null | This paper concerns the explicit treatment of substitutions in the lambda
calculus. One of its contributions is the simplification and rationalization of
the suspension calculus that embodies such a treatment. The earlier version of
this calculus provides a cumbersome encoding of substitution composition, an
operation that is important to the efficient realization of reduction. This
encoding is simplified here, resulting in a treatment that is easy to use
directly in applications. The rationalization consists of the elimination of a
practically inconsequential flexibility in the unravelling of substitutions
that has the inadvertent side effect of losing contextual information in terms;
the modified calculus now has a structure that naturally supports logical
analyses, such as ones related to the assignment of types, over lambda terms.
The overall calculus is shown to have pleasing theoretical properties such as a
strongly terminating sub-calculus for substitution and confluence even in the
presence of term meta variables that are accorded a grafting interpretation.
Another contribution of the paper is the identification of a broad set of
properties that are desirable for explicit substitution calculi to support and
a classification of a variety of proposed systems based on these. The
suspension calculus is used as a tool in this study. In particular, mappings
are described between it and the other calculi towards understanding the
characteristics of the latter.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 02:16:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gacek",
"Andrew",
""
],
[
"Nadathur",
"Gopalan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702153 | Kyle Burke | Kyle Burke and Shang-Hua Teng | Games on the Sperner Triangle | 18 pages, 19 figures. Uses paithan.sty | null | null | null | cs.GT cs.CC | null | We create a new two-player game on the Sperner Triangle based on Sperner's
lemma. Our game has simple rules and several desirable properties. First, the
game is always certain to have a winner. Second, like many other interesting
games such as Hex and Geography, we prove that deciding whether one can win our
game is a PSPACE-complete problem. Third, there is an elegant balance in the
game such that neither the first nor the second player always has a decisive
advantage. We provide a web-based version of the game, playable at:
http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other
games, also based on fixed-point theorems.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 05:00:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burke",
"Kyle",
""
],
[
"Teng",
"Shang-Hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702154 | Lawrence Ong | Lawrence Ong and Mehul Motani | On the Capacity of the Single Source Multiple Relay Single Destination
Mesh Network | to appear in Elsevier Ad Hoc Networks: Special Issue on Wireless Mesh
Networks, accepted on 9 Dec. 2006 | Elsevier Ad Hoc Networks: Special Issue on Wireless Mesh Networks,
Vol. 5, No. 6, pp. 786-800, Aug. 2007. | 10.1016/j.adhoc.2006.12.006 | null | cs.IT cs.NI math.IT | null | In this paper, we derive the information theoretic capacity of a special
class of mesh networks. A mesh network is a heterogeneous wireless network in
which the transmission among power limited nodes is assisted by powerful
relays, which use the same wireless medium. We investigate the mesh network
when there is one source, one destination, and multiple relays, which we call
the single source multiple relay single destination (SSMRSD) mesh network. We
derive the asymptotic capacity of the SSMRSD mesh network when the relay powers
grow to infinity. Our approach is as follows. We first look at an upper bound
on the information theoretic capacity of these networks in a Gaussian setting.
We then show that this bound is achievable asymptotically using the
compress-and-forward strategy for the multiple relay channel. We also perform
numerical computations for the case when the relays have finite powers. We
observe that even when the relay power is only a few times larger than the
source power, the compress-and-forward rate gets close to the capacity. The
results indicate the value of cooperation in wireless mesh networks. The
capacity characterization quantifies how the relays can cooperate, using the
compress-and-forward strategy, to either conserve node energy or to increase
transmission rate.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 06:24:12 GMT"
}
] | 2010-04-15T00:00:00 | [
[
"Ong",
"Lawrence",
""
],
[
"Motani",
"Mehul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702155 | Maurice Margenstern | Maurice Margenstern | On a characterization of cellular automata in tilings of the hyperbolic
plane | null | International Journal of Foundations of Computer Science, volume
19,(5), (2008), 1235-1257 | null | null | cs.DM cs.CG | null | In this paper, we look at the extention of Hedlund's characterization of
cellular automata to the case of cellular automata in the hyperbolic plane.
This requires an additionnal condition. The new theorem is proved with full
details in the case of the pentagrid and in the case of the ternary heptagrid
and enough indications to show that it holds also on the grids $\{p,q\}$ of the
hyperbolic plane.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 09:17:05 GMT"
}
] | 2011-03-29T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0702156 | Philippe Robert | Fabrice Guillemin, Philippe Robert (INRIA Rocquencourt) | Analysis of Steiner subtrees of Random Trees for Traceroute Algorithms | null | Random Structures and Algorithms, 35(2):194-215, September 2009 | null | null | cs.NI cs.DS | null | We consider in this paper the problem of discovering, via a traceroute
algorithm, the topology of a network, whose graph is spanned by an infinite
branching process. A subset of nodes is selected according to some criterion.
As a measure of efficiency of the algorithm, the Steiner distance of the
selected nodes, i.e. the size of the spanning sub-tree of these nodes, is
investigated. For the selection of nodes, two criteria are considered: A node
is randomly selected with a probability, which is either independent of the
depth of the node (uniform model) or else in the depth biased model, is
exponentially decaying with respect to its depth. The limiting behavior the
size of the discovered subtree is investigated for both models.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 13:42:28 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Jun 2008 10:11:43 GMT"
}
] | 2009-08-25T00:00:00 | [
[
"Guillemin",
"Fabrice",
"",
"INRIA Rocquencourt"
],
[
"Robert",
"Philippe",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0702157 | Matei Ripeanu | Matei Ripeanu, Adriana Iamnitchi, Ian Foster, Anne Rogers | In Search of Simplicity: A Self-Organizing Multi-Source Multicast
Overlay | null | null | null | DSL-TR-2007-02 | cs.DC cs.NI cs.PF | null | Multicast communication primitives have broad utility as building blocks for
distributed applications. The challenge is to create and maintain the
distributed structures that support these primitives while accounting for
volatile end nodes and variable network characteristics. Most solutions
proposed to date rely on complex algorithms or global information, thus
limiting the scale of deployments and acceptance outside the academic realm.
This article introduces a low-complexity, self organizing solution for
maintaining multicast trees, that we refer to as UMM (Unstructured Multi-source
Multicast). UMM uses traditional distributed systems techniques: layering,
soft-state, and passive data collection to adapt to the dynamics of the
physical network and maintain data dissemination trees. The result is a simple,
adaptive system with lower overheads than more complex alternatives. We have
implemented UMM and evaluated it on a 100-node PlanetLab testbed and on up to
1024-node emulated ModelNet networks Extensive experimental evaluations
demonstrate UMM's low overhead, efficient network usage compared to alternative
solutions, and ability to quickly adapt to network changes and to recover from
failures.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 19:42:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ripeanu",
"Matei",
""
],
[
"Iamnitchi",
"Adriana",
""
],
[
"Foster",
"Ian",
""
],
[
"Rogers",
"Anne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0702158 | Yunxia Chen | Yunxia Chen, Qing Zhao and Ananthram Swami | Joint Design and Separation Principle for Opportunistic Spectrum Access
in the Presence of Sensing Errors | 43 pages, 10 figures, submitted to IEEE Transactions on Information
Theory in Feb. 2007 | null | 10.1109/TIT.2008.920248 | null | cs.NI | null | We address the design of opportunistic spectrum access (OSA) strategies that
allow secondary users to independently search for and exploit instantaneous
spectrum availability. Integrated in the joint design are three basic
components: a spectrum sensor that identifies spectrum opportunities, a sensing
strategy that determines which channels in the spectrum to sense, and an access
strategy that decides whether to access based on imperfect sensing outcomes.
We formulate the joint PHY-MAC design of OSA as a constrained partially
observable Markov decision process (POMDP). Constrained POMDPs generally
require randomized policies to achieve optimality, which are often intractable.
By exploiting the rich structure of the underlying problem, we establish a
separation principle for the joint design of OSA. This separation principle
reveals the optimality of myopic policies for the design of the spectrum sensor
and the access strategy, leading to closed-form optimal solutions. Furthermore,
decoupling the design of the sensing strategy from that of the spectrum sensor
and the access strategy, the separation principle reduces the constrained POMDP
to an unconstrained one, which admits deterministic optimal policies. Numerical
examples are provided to study the design tradeoffs, the interaction between
the spectrum sensor and the sensing and access strategies, and the robustness
of the ensuing design to model mismatch.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 19:59:36 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Chen",
"Yunxia",
""
],
[
"Zhao",
"Qing",
""
],
[
"Swami",
"Ananthram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0702159 | Fabiano C. Botelho | Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani | Perfect Hashing for Data Management Applications | 12 pages | null | null | RT.DCC.002/2007 | cs.DS cs.DB | null | Perfect hash functions can potentially be used to compress data in connection
with a variety of data management tasks. Though there has been considerable
work on how to construct good perfect hash functions, there is a gap between
theory and practice among all previous methods on minimal perfect hashing. On
one side, there are good theoretical results without experimentally proven
practicality for large key sets. On the other side, there are the theoretically
analyzed time and space usage algorithms that assume that truly random hash
functions are available for free, which is an unrealistic assumption. In this
paper we attempt to bridge this gap between theory and practice, using a number
of techniques from the literature to obtain a novel scheme that is
theoretically well-understood and at the same time achieves an
order-of-magnitude increase in performance compared to previous ``practical''
methods. This improvement comes from a combination of a novel, theoretically
optimal perfect hashing scheme that greatly simplifies previous methods, and
the fact that our algorithm is designed to make good use of the memory
hierarchy. We demonstrate the scalability of our algorithm by considering a set
of over one billion URLs from the World Wide Web of average length 64, for
which we construct a minimal perfect hash function on a commodity PC in a
little more than 1 hour. Our scheme produces minimal perfect hash functions
using slightly more than 3 bits per key. For perfect hash functions in the
range $\{0,...,2n-1\}$ the space usage drops to just over 2 bits per key (i.e.,
one bit more than optimal for representing the key). This is significantly
below of what has been achieved previously for very large values of $n$.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 20:56:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Botelho",
"Fabiano C.",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Ziviani",
"Nivio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0702160 | Fran\c{c}ois Pitt | Fran\c{c}ois Pitt | A Quantifier-Free String Theory for ALOGTIME Reasoning | 147 pages, PhD thesis (completed in 2000) | null | null | null | cs.CC | null | The main contribution of this work is the definition of a quantifier-free
string theory T_1 suitable for formalizing ALOGTIME reasoning. After describing
L_1 -- a new, simple, algebraic characterization of the complexity class
ALOGTIME based on strings instead of numbers -- the theory T_1 is defined
(based on L_1), and a detailed formal development of T_1 is given.
Then, theorems of T_1 are shown to translate into families of propositional
tautologies that have uniform polysize Frege proofs, T_1 is shown to prove the
soundness of a particular Frege system F, and F is shown to provably p-simulate
any proof system whose soundness can be proved in T_1. Finally, T_1 is compared
with other theories for ALOGTIME reasoning in the literature.
To our knowledge, this is the first formal theory for ALOGTIME reasoning
whose basic objects are strings instead of numbers, and the first
quantifier-free theory formalizing ALOGTIME reasoning in which a direct proof
of the soundness of some Frege system has been given (in the case of
first-order theories, such a proof was first given by Arai for his theory AID).
Also, the polysize Frege proofs we give for the propositional translations of
theorems of T_1 are considerably simpler than those for other theories, and so
is our proof of the soundness of a particular F-system in T_1. Together with
the simplicity of T_1's recursion schemes, axioms, and rules these facts
suggest that T_1 is one of the most natural theories available for ALOGTIME
reasoning.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 02:59:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pitt",
"François",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0702161 | Ying Wang | Ying Wang, Pierre Moulin | Perfectly Secure Steganography: Capacity, Error Exponents, and Code
Constructions | To appear in IEEE Trans. on Information Theory, June 2008; ignore
Version 2 as the file was corrupted | null | 10.1109/TIT.2008.921684 | null | cs.IT cs.CR math.IT | null | An analysis of steganographic systems subject to the following perfect
undetectability condition is presented in this paper. Following embedding of
the message into the covertext, the resulting stegotext is required to have
exactly the same probability distribution as the covertext. Then no statistical
test can reliably detect the presence of the hidden message. We refer to such
steganographic schemes as perfectly secure. A few such schemes have been
proposed in recent literature, but they have vanishing rate. We prove that
communication performance can potentially be vastly improved; specifically, our
basic setup assumes independently and identically distributed (i.i.d.)
covertext, and we construct perfectly secure steganographic codes from public
watermarking codes using binning methods and randomized permutations of the
code. The permutation is a secret key shared between encoder and decoder. We
derive (positive) capacity and random-coding exponents for perfectly-secure
steganographic systems. The error exponents provide estimates of the code
length required to achieve a target low error probability. We address the
potential loss in communication performance due to the perfect-security
requirement. This loss is the same as the loss obtained under a weaker order-1
steganographic requirement that would just require matching of first-order
marginals of the covertext and stegotext distributions. Furthermore, no loss
occurs if the covertext distribution is uniform and the distortion metric is
cyclically symmetric; steganographic capacity is then achieved by randomized
linear codes. Our framework may also be useful for developing computationally
secure steganographic systems that have near-optimal communication performance.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 03:39:08 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Nov 2007 15:12:11 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Dec 2007 06:49:19 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Wang",
"Ying",
""
],
[
"Moulin",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702162 | Gesualdo Scutari | Jong-Shi Pang, Gesualdo Scutari, Francisco Facchinei, and Chaoxiong
Wang | Distributed Power Allocation with Rate Constraints in Gaussian Parallel
Interference Channels | Paper submitted to IEEE Transactions on Information Theory, February
17, 2007. Revised January 11, 2008 | null | null | null | cs.IT cs.GT math.IT | null | This paper considers the minimization of transmit power in Gaussian parallel
interference channels, subject to a rate constraint for each user. To derive
decentralized solutions that do not require any cooperation among the users, we
formulate this power control problem as a (generalized) Nash equilibrium game.
We obtain sufficient conditions that guarantee the existence and nonemptiness
of the solution set to our problem. Then, to compute the solutions of the game,
we propose two distributed algorithms based on the single user waterfilling
solution: The \emph{sequential} and the \emph{simultaneous} iterative
waterfilling algorithms, wherein the users update their own strategies
sequentially and simultaneously, respectively. We derive a unified set of
sufficient conditions that guarantee the uniqueness of the solution and global
convergence of both algorithms. Our results are applicable to all practical
distributed multipoint-to-multipoint interference systems, either wired or
wireless, where a quality of service in terms of information rate must be
guaranteed for each link.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 07:33:05 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Jan 2008 14:21:28 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Pang",
"Jong-Shi",
""
],
[
"Scutari",
"Gesualdo",
""
],
[
"Facchinei",
"Francisco",
""
],
[
"Wang",
"Chaoxiong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0702163 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | First Passage Time for Multivariate Jump-diffusion Stochastic Models
With Applications in Finance | Keywords: Monte-Carlo simulations, first passage time, multivariate
jump-diffusion process; 10 pages, 3 figures | null | null | null | cs.CE cs.NA | null | The ``first passage-time'' (FPT) problem is an important problem with a wide
range of applications in mathematics, physics, biology and finance.
Mathematically, such a problem can be reduced to estimating the probability of
a (stochastic) process first to reach a critical level or threshold. While in
other areas of applications the FPT problem can often be solved analytically,
in finance we usually have to resort to the application of numerical
procedures, in particular when we deal with jump-diffusion stochastic processes
(JDP). In this paper, we develop a Monte-Carlo-based methodology for the
solution of the FPT problem in the context of a multivariate jump-diffusion
stochastic process. The developed methodology is tested by using different
parameters, the simulation results indicate that the developed methodology is
much more efficient than the conventional Monte Carlo method. It is an
efficient tool for further practical applications, such as the analysis of
default correlation and predicting barrier options in finance.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 10:39:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0702164 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | Monte-Carlo Simulations of the First Passage Time for Multivariate
Jump-Diffusion Processes in Financial Applications | Keywords: First passage time; Monte Carlo simulation; Multivariate
jump-diffusion processes; Credit risk | null | null | null | cs.CE cs.NA | null | Many problems in finance require the information on the first passage time
(FPT) of a stochastic process. Mathematically, such problems are often reduced
to the evaluation of the probability density of the time for such a process to
cross a certain level, a boundary, or to enter a certain region. While in other
areas of applications the FPT problem can often be solved analytically, in
finance we usually have to resort to the application of numerical procedures,
in particular when we deal with jump-diffusion stochastic processes (JDP). In
this paper, we propose a Monte-Carlo-based methodology for the solution of the
first passage time problem in the context of multivariate (and correlated)
jump-diffusion processes. The developed technique provide an efficient tool for
a number of applications, including credit risk and option pricing. We
demonstrate its applicability to the analysis of the default rates and default
correlations of several different, but correlated firms via a set of empirical
data.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 10:51:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0702165 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | Efficient estimation of default correlation for multivariate
jump-diffusion processes | Keywords: Default correlation, First passage time problem, Monte
Carlo simulation | null | null | null | cs.CE cs.NA | null | Evaluation of default correlation is an important task in credit risk
analysis. In many practical situations, it concerns the joint defaults of
several correlated firms, the task that is reducible to a first passage time
(FPT) problem. This task represents a great challenge for jump-diffusion
processes (JDP), where except for very basic cases, there are no analytical
solutions for such problems. In this contribution, we generalize our previous
fast Monte-Carlo method (non-correlated jump-diffusion cases) for multivariate
(and correlated) jump-diffusion processes. This generalization allows us, among
other things, to evaluate the default events of several correlated assets based
on a set of empirical data. The developed technique is an efficient tool for a
number of other applications, including credit risk and option pricing.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 11:22:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0702166 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | Solving Stochastic Differential Equations with Jump-Diffusion
Efficiently: Applications to FPT Problems in Credit Risk | Keywords: Default Correlation, First Passage Time, Multivariate
Jump-Diffusion Processes, Monte-Carlo Simulation, Multivariate Uniform
Sampling Method | null | null | null | cs.CE cs.NA | null | The first passage time (FPT) problem is ubiquitous in many applications. In
finance, we often have to deal with stochastic processes with jump-diffusion,
so that the FTP problem is reducible to a stochastic differential equation with
jump-diffusion. While the application of the conventional Monte-Carlo procedure
is possible for the solution of the resulting model, it becomes computationally
inefficient which severely restricts its applicability in many practically
interesting cases. In this contribution, we focus on the development of
efficient Monte-Carlo-based computational procedures for solving the FPT
problem under the multivariate (and correlated) jump-diffusion processes. We
also discuss the implementation of the developed Monte-Carlo-based technique
for multivariate jump-diffusion processes driving by several compound Poisson
shocks. Finally, we demonstrate the application of the developed methodologies
for analyzing the default rates and default correlations of differently rated
firms via historical data.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 11:48:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0702167 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Finite Volume Analysis of Nonlinear Thermo-mechanical Dynamics of Shape
Memory Alloys | Keywords: shape memory alloys, phase transformations, nonlinear
thermo-elasticity, finite volume method | null | null | null | cs.CE cs.NA | null | In this paper, the finite volume method is developed to analyze coupled
dynamic problems of nonlinear thermoelasticity. The major focus is given to the
description of martensitic phase transformations essential in the modelling of
shape memory alloys. Computational experiments are carried out to study the
thermo-mechanical wave interactions in a shape memory alloy rod, and a patch.
Both mechanically and thermally induced phase transformations, as well as
hysteresis effects, in a one-dimensional structure are successfully simulated
with the developed methodology. In the two-dimensional case, the main focus is
given to square-to-rectangular transformations and examples of martensitic
combinations under different mechanical loadings are provided.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 13:00:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0702168 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Simulation of Phase Combinations in Shape Memory Alloys Patches by
Hybrid Optimization Methods | Keywords: phase combinations, shape memory alloys, variational
problem, genetic algorithm, quasi-Newton methods | null | null | null | cs.CE cs.NA | null | In this paper, phase combinations among martensitic variants in shape memory
alloys patches and bars are simulated by a hybrid optimization methodology. The
mathematical model is based on the Landau theory of phase transformations. Each
stable phase is associated with a local minimum of the free energy function,
and the phase combinations are simulated by minimizing the bulk energy. At low
temperature, the free energy function has double potential wells leading to
non-convexity of the optimization problem. The methodology proposed in the
present paper is based on an initial estimate of the global solution by a
genetic algorithm, followed by a refined quasi-Newton procedure to locally
refine the optimum. By combining the local and global search algorithms, the
phase combinations are successfully simulated. Numerical experiments are
presented for the phase combinations in a SMA patch under several typical
mechanical loadings.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 14:09:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0702169 | James Laird | James Laird | Bistable Biorders: A Sequential Domain Theory | To appear in LMCS | Logical Methods in Computer Science, Volume 3, Issue 2 (May 15,
2007) lmcs:2222 | 10.2168/LMCS-3(2:5)2007 | null | cs.PL cs.LO | null | We give a simple order-theoretic construction of a Cartesian closed category
of sequential functions. It is based on bistable biorders, which are sets with
a partial order -- the extensional order -- and a bistable coherence, which
captures equivalence of program behaviour, up to permutation of top (error) and
bottom (divergence). We show that monotone and bistable functions (which are
required to preserve bistably bounded meets and joins) are strongly sequential,
and use this fact to prove universality results for the bistable biorder
semantics of the simply-typed lambda-calculus (with atomic constants), and an
extension with arithmetic and recursion.
We also construct a bistable model of SPCF, a higher-order functional
programming language with non-local control. We use our universality result for
the lambda-calculus to show that the semantics of SPCF is fully abstract. We
then establish a direct correspondence between bistable functions and
sequential algorithms by showing that sequential data structures give rise to
bistable biorders, and that each bistable function between such biorders is
computed by a sequential algorithm.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 14:57:27 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2007 12:31:57 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Laird",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702170 | Peter Tiedemann | Peter Tiedemann, Henrik Reif Andersen, Rasmus Pagh | Generic Global Constraints based on MDDs | Preliminary 15 pages version of the tech-report cs.AI/0611141 | null | null | null | cs.AI | null | Constraint Programming (CP) has been successfully applied to both constraint
satisfaction and constraint optimization problems. A wide variety of
specialized global constraints provide critical assistance in achieving a good
model that can take advantage of the structure of the problem in the search for
a solution. However, a key outstanding issue is the representation of 'ad-hoc'
constraints that do not have an inherent combinatorial nature, and hence are
not modeled well using narrowly specialized global constraints. We attempt to
address this issue by considering a hybrid of search and compilation.
Specifically we suggest the use of Reduced Ordered Multi-Valued Decision
Diagrams (ROMDDs) as the supporting data structure for a generic global
constraint. We give an algorithm for maintaining generalized arc consistency
(GAC) on this constraint that amortizes the cost of the GAC computation over a
root-to-leaf path in the search tree without requiring asymptotically more
space than used for the MDD. Furthermore we present an approach for
incrementally maintaining the reduced property of the MDD during the search,
and show how this can be used for providing domain entailment detection.
Finally we discuss how to apply our approach to other similar data structures
such as AOMDDs and Case DAGs. The technique used can be seen as an extension of
the GAC algorithm for the regular language constraint on finite length input.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 15:32:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tiedemann",
"Peter",
""
],
[
"Andersen",
"Henrik Reif",
""
],
[
"Pagh",
"Rasmus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0702171 | Robert Brijder | Robert Brijder, Hendrik Jan Hoogeboom, Grzegorz Rozenberg | How Overlap Determines the Macronuclear Genes in Ciliates | 22 pages, 14 figures | null | null | LIACS Technical Report 2007-02 | cs.LO | null | Formal models for gene assembly in ciliates have been developed, in
particular the string pointer reduction system (SPRS) and the graph pointer
reduction system (GPRS). The reduction graph is a valuable tool within the
SPRS, revealing much information about how gene assembly is performed for a
given gene. The GPRS is more abstract than the SPRS and not all information
present in the SPRS is retained in the GPRS. As a consequence the reduction
graph cannot be defined for the GPRS in general, but we show that it can be
defined (in an equivalent manner as defined for the SPRS) if we restrict
ourselves to so-called realistic overlap graphs. Fortunately, only these graphs
correspond to genes occurring in nature. Defining the reduction graph within
the GPRS allows one to carry over several results within the SPRS that rely on
the reduction graph.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 15:51:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
],
[
"Rozenberg",
"Grzegorz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0702172 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Numerical Model For Vibration Damping Resulting From the First Order
Phase Transformations | Keywords: martensite transformation, thermo-mechanical coupling,
vibration damping, Ginzburg-Landau theory | null | null | null | cs.CE cs.NA | null | A numerical model is constructed for modelling macroscale damping effects
induced by the first order martensite phase transformations in a shape memory
alloy rod. The model is constructed on the basis of the modified
Landau-Ginzburg theory that couples nonlinear mechanical and thermal fields.
The free energy function for the model is constructed as a double well function
at low temperature, such that the external energy can be absorbed during the
phase transformation and converted into thermal form. The Chebyshev spectral
methods are employed together with backward differentiation for the numerical
analysis of the problem. Computational experiments performed for different
vibration energies demonstrate the importance of taking into account damping
effects induced by phase transformations.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 18:31:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0703001 | Michael Coury | Michael D. Coury | Embedding Graphs into the Extended Grid | 4 pages, 2 figures | null | null | null | cs.DM cs.DS | null | Let $G=(V,E)$ be an arbitrary undirected source graph to be embedded in a
target graph $EM$, the extended grid with vertices on integer grid points and
edges to nearest and next-nearest neighbours. We present an algorithm showing
how to embed $G$ into $EM$ in both time and space $O(|V|^2)$ using the new
notions of islands and bridges. An island is a connected subgraph in the target
graph which is mapped from exactly one vertex in the source graph while a
bridge is an edge between two islands which is mapped from exactly one edge in
the source graph. This work is motivated by real industrial applications in the
field of quantum computing and a need to efficiently embed source graphs in the
extended grid.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 22:37:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Coury",
"Michael D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703002 | Plamen Simeonov L. | Plamen L. Simeonov | Integral Biomathics: A Post-Newtonian View into the Logos of Bios (On
the New Meaning, Relations and Principles of Life in Science) | 85 pages, 6 figures | Progress in Biophysics and Molecular Biology, Vol. 102, Issues
2-3, 2010, pp. 85-121 | 10.1016/j.pbiomolbio.2010.01.005 | null | cs.NE cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work is an attempt for a state-of-the-art survey of natural and life
sciences with the goal to define the scope and address the central questions of
an original research program. It is focused on the phenomena of emergence,
adaptive dynamics and evolution of self-assembling, self-organizing,
self-maintaining and self-replicating biosynthetic systems viewed from a
newly-arranged perspective and understanding of computation and communication
in the living nature.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 22:52:43 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Mar 2007 08:35:36 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Apr 2007 13:54:13 GMT"
},
{
"version": "v4",
"created": "Mon, 11 Jun 2007 16:48:17 GMT"
},
{
"version": "v5",
"created": "Tue, 17 Jul 2007 15:47:18 GMT"
},
{
"version": "v6",
"created": "Fri, 21 Dec 2007 15:53:14 GMT"
},
{
"version": "v7",
"created": "Mon, 31 Dec 2007 20:30:16 GMT"
},
{
"version": "v8",
"created": "Fri, 4 Jan 2008 01:48:58 GMT"
},
{
"version": "v9",
"created": "Fri, 5 Feb 2010 12:03:19 GMT"
}
] | 2015-09-02T00:00:00 | [
[
"Simeonov",
"Plamen L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703003 | M. H. van Emden | M.H. van Emden, B. Moa, and S.C. Somosan | Functions to Support Input and Output of Intervals | 16 pages, 13 figures with listings | null | null | DCS-311-IR | cs.NA | null | Interval arithmetic is hardly feasible without directed rounding as provided,
for example, by the IEEE floating-point standard. Equally essential for
interval methods is directed rounding for conversion between the external
decimal and internal binary numerals. This is not provided by the standard I/O
libraries. Conversion algorithms exist that guarantee identity upon conversion
followed by its inverse. Although it may be possible to adapt these algorithms
for use in decimal interval I/O, we argue that outward rounding in radix
conversion is computationally a simpler problem than guaranteeing identity.
Hence it is preferable to develop decimal interval I/O ab initio, which is what
we do in this paper.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 23:13:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
],
[
"Moa",
"B.",
""
],
[
"Somosan",
"S. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0703004 | Francis Heylighen | Francis Heylighen | Accelerating Socio-Technological Evolution: from ephemeralization and
stigmergy to the global brain | To appear in: "Globalization as an Evolutionary Process: Modeling
Global Change", edited by George Modelski, Tessaleno Devezas, and William
Thompson, London: Routledge | null | null | null | cs.CY cs.NI | null | Evolution is presented as a trial-and-error process that produces a
progressive accumulation of knowledge. At the level of technology, this leads
to ephemeralization, i.e. ever increasing productivity, or decreasing of the
friction that normally dissipates resources. As a result, flows of matter,
energy and information circulate ever more easily across the planet. This
global connectivity increases the interactions between agents, and thus the
possibilities for conflict. However, evolutionary progress also reduces social
friction, via the creation of institutions. The emergence of such "mediators"
is facilitated by stigmergy: the unintended collaboration between agents
resulting from their actions on a shared environment. The Internet is a near
ideal medium for stigmergic interaction. Quantitative stigmergy allows the web
to learn from the activities of its users, thus becoming ever better at helping
them to answer their queries. Qualitative stigmergy stimulates agents to
collectively develop novel knowledge. Both mechanisms have direct analogues in
the functioning of the human brain. This leads us to envision the future,
super-intelligent web as a "global brain" for humanity. The feedback between
social and technological advances leads to an extreme acceleration of
innovation. An extrapolation of the corresponding hyperbolic growth model would
forecast a singularity around 2040. This can be interpreted as the evolutionary
transition to the Global Brain regime.
| [
{
"version": "v1",
"created": "Thu, 1 Mar 2007 15:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heylighen",
"Francis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703005 | Young-Han Kim | Young-Han Kim, Arak Sutivong, and Thomas M. Cover | State Amplification | 9 pages, 4 figures, submitted to IEEE Trans. Inform. Theory, revised | null | 10.1109/TIT.2008.920242 | null | cs.IT math.IT | null | We consider the problem of transmitting data at rate R over a state dependent
channel p(y|x,s) with the state information available at the sender and at the
same time conveying the information about the channel state itself to the
receiver. The amount of state information that can be learned at the receiver
is captured by the mutual information I(S^n; Y^n) between the state sequence
S^n and the channel output Y^n. The optimal tradeoff is characterized between
the information transmission rate R and the state uncertainty reduction rate
\Delta, when the state information is either causally or noncausally available
at the sender. This result is closely related and in a sense dual to a recent
study by Merhav and Shamai, which solves the problem of masking the state
information from the receiver rather than conveying it.
| [
{
"version": "v1",
"created": "Thu, 1 Mar 2007 17:59:25 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jan 2008 08:03:30 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Kim",
"Young-Han",
""
],
[
"Sutivong",
"Arak",
""
],
[
"Cover",
"Thomas M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703006 | Jingchao Chen | Jing-Chao Chen | XORSAT: An Efficient Algorithm for the DIMACS 32-bit Parity Problem | null | null | null | null | cs.DS | null | The DIMACS 32-bit parity problem is a satisfiability (SAT) problem hard to
solve. So far, EqSatz by Li is the only solver which can solve this problem.
However, This solver is very slow. It is reported that it spent 11855 seconds
to solve a par32-5 instance on a Maxintosh G3 300 MHz. The paper introduces a
new solver, XORSAT, which splits the original problem into two parts:
structured part and random part, and then solves separately them with WalkSAT
and an XOR equation solver. Based our empirical observation, XORSAT is
surprisingly fast, which is approximately 1000 times faster than EqSatz. For a
par32-5 instance, XORSAT took 2.9 seconds, while EqSatz took 2844 seconds on
Intel Pentium IV 2.66GHz CPU. We believe that this method significantly
different from traditional methods is also useful beyond this domain.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 01:38:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Jing-Chao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703007 | Yves Guiraud | Guillaume Bonfante, Yves Guiraud | Intensional properties of polygraphs | Proceedings of TERMGRAPH 2007, Electronic Notes in Computer Science
(to appear), 12 pages, minor changes from previous version | Electronic Notes in Theoretical Computer Science 203(1):65-77
(2008) | 10.1016/j.entcs.2008.03.034 | null | cs.LO cs.CC math.CT | null | We present polygraphic programs, a subclass of Albert Burroni's polygraphs,
as a computational model, showing how these objects can be seen as first-order
functional programs. We prove that the model is Turing complete. We use
polygraphic interpretations, a termination proof method introduced by the
second author, to characterize polygraphic programs that compute in polynomial
time. We conclude with a characterization of polynomial time functions and
non-deterministic polynomial time functions.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 09:21:20 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Nov 2007 16:20:52 GMT"
}
] | 2008-10-07T00:00:00 | [
[
"Bonfante",
"Guillaume",
""
],
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
cs/0703008 | Francoise Detienne | Sophie Chatel, Fran\c{c}oise D\'etienne | Strategies in object-oriented design | null | Acta Psychologica 91 (1996) 245-269 | null | null | cs.HC | null | This paper presents a study aiming to analyse the design strategies of
experts in object-oriented programming. We report an experiment conducted with
four experts. Each subject solved three problems. Our results show that three
strategies may be used in program design according to the solution structure.
An object-centred strategy and a function-centred strategy are used when the
solution has a hierarchical structure with vertical communication between
objects. In this case, the plan which guides the design activity is
declarative. A procedure-centred strategy is used when the solution has a flat
structure with horizontal communication between objects. In this case, the plan
which guides the design activity is procedural. These results are discussed in
relation with results on design strategies in procedural design. Furthermore,
our results provide insight into the knowledge structures of experts in
object-oriented design. To conclude, we point out limitations of this study and
discuss implications of our results for Human-Computer Interaction systems, in
particular for systems assisting experts in their design activity.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 12:50:12 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Chatel",
"Sophie",
""
],
[
"Détienne",
"Françoise",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0703009 | Francoise Detienne | Warren Sack, Fran\c{c}oise D\'etienne (INRIA Rocquencourt), Nicholas
Ducheneaut, Jean-Marie Burkhardt (LEI), Dilan Mahendran, Flore Barcellini
(INRIA Rocquencourt, EIFFEL) | A Methodological Framework for Socio-Cognitive Analyses of Collaborative
Design of Open Source Software | null | Computer Supported Cooperative Work (CSCW), the Journal of
Collaborative Computing 15, 2-3 (2006) 229-250 | null | null | cs.HC | null | Open Source Software (OSS) development challenges traditional software
engineering practices. In particular, OSS projects are managed by a large
number of volunteers, working freely on the tasks they choose to undertake. OSS
projects also rarely rely on explicit system-level design, or on project plans
or schedules. Moreover, OSS developers work in arbitrary locations and
collaborate almost exclusively over the Internet, using simple tools such as
email and software code tracking databases (e.g. CVS). All the characteristics
above make OSS development akin to weaving a tapestry of heterogeneous
components. The OSS design process relies on various types of actors: people
with prescribed roles, but also elements coming from a variety of information
spaces (such as email and software code). The objective of our research is to
understand the specific hybrid weaving accomplished by the actors of this
distributed, collective design process. This, in turn, challenges traditional
methodologies used to understand distributed software engineering: OSS
development is simply too "fibrous" to lend itself well to analysis under a
single methodological lens. In this paper, we describe the methodological
framework we articulated to analyze collaborative design in the Open Source
world. Our framework focuses on the links between the heterogeneous components
of a project's hybrid network. We combine ethnography, text mining, and
socio-technical network analysis and visualization to understand OSS
development in its totality. This way, we are able to simultaneously consider
the social, technical, and cognitive aspects of OSS development. We describe
our methodology in detail, and discuss its implications for future research on
distributed collective practices.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 13:51:29 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Sack",
"Warren",
"",
"INRIA Rocquencourt"
],
[
"Détienne",
"Françoise",
"",
"INRIA Rocquencourt"
],
[
"Ducheneaut",
"Nicholas",
"",
"LEI"
],
[
"Burkhardt",
"Jean-Marie",
"",
"LEI"
],
[
"Mahendran",
"Dilan",
"",
"INRIA Rocquencourt, EIFFEL"
],
[
"Barcellini",
"Flore",
"",
"INRIA Rocquencourt, EIFFEL"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0703010 | Jaroslaw Byrka | Jaroslaw Byrka and Karen Aardal | An optimal bifactor approximation algorithm for the metric uncapacitated
facility location problem | A journal version | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We obtain a 1.5-approximation algorithm for the metric uncapacitated facility
location problem (UFL), which improves on the previously best known
1.52-approximation algorithm by Mahdian, Ye and Zhang. Note, that the
approximability lower bound by Guha and Khuller is 1.463.
An algorithm is a {\em ($\lambda_f$,$\lambda_c$)-approximation algorithm} if
the solution it produces has total cost at most $\lambda_f \cdot F^* +
\lambda_c \cdot C^*$, where $F^*$ and $C^*$ are the facility and the connection
cost of an optimal solution. Our new algorithm, which is a modification of the
$(1+2/e)$-approximation algorithm of Chudak and Shmoys, is a
(1.6774,1.3738)-approximation algorithm for the UFL problem and is the first
one that touches the approximability limit curve $(\gamma_f, 1+2e^{-\gamma_f})$
established by Jain, Mahdian and Saberi. As a consequence, we obtain the first
optimal approximation algorithm for instances dominated by connection costs.
When combined with a (1.11,1.7764)-approximation algorithm proposed by Jain et
al., and later analyzed by Mahdian et al., we obtain the overall approximation
guarantee of 1.5 for the metric UFL problem. We also describe how to use our
algorithm to improve the approximation ratio for the 3-level version of UFL.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 14:49:57 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2009 15:15:58 GMT"
}
] | 2009-02-04T00:00:00 | [
[
"Byrka",
"Jaroslaw",
""
],
[
"Aardal",
"Karen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703011 | Helmut Alt | Helmut Alt, Maike Buchin | Can we Compute the Similarity Between Surfaces? | null | null | null | null | cs.CG cs.CC | null | A suitable measure for the similarity of shapes represented by parameterized
curves or surfaces is the Fr\'echet distance. Whereas efficient algorithms are
known for computing the Fr\'echet distance of polygonal curves, the same
problem for triangulated surfaces is NP-hard. Furthermore, it remained open
whether it is computable at all. Here, using a discrete approximation we show
that it is {\em upper semi-computable}, i.e., there is a non-halting Turing
machine which produces a monotone decreasing sequence of rationals converging
to the result. It follows that the decision problem, whether the Fr\'echet
distance of two given surfaces lies below some specified value, is recursively
enumerable.
Furthermore, we show that a relaxed version of the problem, the computation
of the {\em weak Fr\'echet distance} can be solved in polynomial time. For
this, we give a computable characterization of the weak Fr\'echet distance in a
geometric data structure called the {\em free space diagram}.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 17:00:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alt",
"Helmut",
""
],
[
"Buchin",
"Maike",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703012 | Ramya Ravichandar | Ramya Ravichandar, James D. Arthur, Manuel P\'erez-Qui\~nones | Pre-Requirement Specification Traceability: Bridging the Complexity Gap
through Capabilities | This paper appears in International Symposium on Grand Challenges in
Traceability, TEFSE/GCT 2007. 10 pages, 7 Figures | null | null | null | cs.SE | null | Pre-Requirement Specification traceability is the activity of capturing
relations between requirements and their sources, in particular user needs.
Requirements are formal technical specifications in the solution space; needs
are natural language expressions codifying user expectations in the problem
space. Current traceability techniques are challenged by the complexity gap
that results from the disparity between the spaces, and thereby, often neglect
traceability to and from requirements. We identify the existence of an
intermediary region -- the transition space -- which structures the progression
from needs to requirements. More specifically, our approach to developing
change-tolerant systems, termed Capabilities Engineering, identifies highly
cohesive, minimally coupled, optimized functional abstractions called
Capabilities in the transition space. These Capabilities link the problem and
solution spaces through directives (entities derived from user needs).
Directives connect the problem and transition spaces; Capabilities link the
transition and solution spaces. Furthermore, the process of Capabilities
Engineering addresses specific traceability challenges. It supports the
evolution of traces, provides semantic and structural information about
dependencies, incorporates human factors, generates traceability relations with
negligible overhead, and thereby, fosters pre-Requirement Specification
traceability.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 20:46:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravichandar",
"Ramya",
""
],
[
"Arthur",
"James D.",
""
],
[
"Pérez-Quiñones",
"Manuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0703013 | Vincent Limouzy | Vincent Limouzy (LIAFA), Fabien De Montgolfier (LIAFA), Micha\"el Rao
(LIAFA) | NLC-2 graph recognition and isomorphism | soumis \`{a} WG 2007; 12p | Dans Lecture Notes In Computer Science - Graph-Theoretic Concepts
in Computer Science 33rd International Workshop, WG 2007, Dornburg, Germany,
June 21-23, 2007., Dornburg : Allemagne (2007) | 10.1007/978-3-540-74839-7_9 | null | cs.DS | null | NLC-width is a variant of clique-width with many application in graph
algorithmic. This paper is devoted to graphs of NLC-width two. After giving new
structural properties of the class, we propose a $O(n^2 m)$-time algorithm,
improving Johansson's algorithm \cite{Johansson00}. Moreover, our alogrithm is
simple to understand. The above properties and algorithm allow us to propose a
robust $O(n^2 m)$-time isomorphism algorithm for NLC-2 graphs. As far as we
know, it is the first polynomial-time algorithm.
| [
{
"version": "v1",
"created": "Sat, 3 Mar 2007 06:44:57 GMT"
}
] | 2007-12-11T00:00:00 | [
[
"Limouzy",
"Vincent",
"",
"LIAFA"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
],
[
"Rao",
"Michaël",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703014 | Stavros Toumpis | Stavros Toumpis | Asymptotic Capacity Bounds for Wireless Networks with Non-Uniform
Traffic | null | Asymptotic Capacity Bounds for Wireless Networks with Non-Uniform
Traffic Patterns, S. Toumpis, IEEE Trans. Wireless Comm., vol. 7, no. 6, pp.
2231-2242, June 2008 | 10.1109/TWC.2008.061010 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop bounds on the capacity of wireless networks when the traffic is
non-uniform, i.e., not all nodes are required to receive and send similar
volumes of traffic. Our results are asymptotic, i.e., they hold with
probability going to unity as the number of nodes goes to infinity. We study
\emph{(i)} asymmetric networks, where the numbers of sources and destinations
of traffic are unequal, \emph{(ii)} multicast networks, in which each created
packet has multiple destinations, \emph{(iii)} cluster networks, that consist
of clients and a limited number of cluster heads, and each client wants to
communicate with any of the cluster heads, and \emph{(iv)} hybrid networks, in
which the nodes are supported by a limited infrastructure. Our findings
quantify the fundamental capabilities of these wireless networks to handle
traffic bottlenecks, and point to correct design principles that achieve the
capacity without resorting to overly complicated protocols.
| [
{
"version": "v1",
"created": "Sat, 3 Mar 2007 09:54:06 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Oct 2013 12:40:11 GMT"
}
] | 2013-10-24T00:00:00 | [
[
"Toumpis",
"Stavros",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703015 | Alexander Shkotin | Alex Shkotin | Graph representation of context-free grammars | 4 pages, 3 figures | null | null | null | cs.LO | null | In modern mathematics, graphs figure as one of the better-investigated class
of mathematical objects. Various properties of graphs, as well as
graph-processing algorithms, can be useful if graphs of a certain kind are used
as denotations for CF-grammars. Furthermore, graph are well adapted to various
extensions (one kind of such extensions being attributes).
| [
{
"version": "v1",
"created": "Sat, 3 Mar 2007 13:12:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shkotin",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703016 | Venkata Annapureddy | Venkata Sreekanta Annpureddy, Devdutt V. Marathe, T. R. Ramya and
Srikrishna Bhashyam | Outage Probability of Multiple-Input Single-Output (MISO) Systems with
Delayed Feedback | Submitted to IEEE Transactions on Communications Jan 2007, Revised
Jun 2007, Revised Nov 2007 | null | 10.1109/TCOMM.2009.02.0700152 | null | cs.IT math.IT | null | We investigate the effect of feedback delay on the outage probability of
multiple-input single-output (MISO) fading channels. Channel state information
at the transmitter (CSIT) is a delayed version of the channel state information
available at the receiver (CSIR). We consider two cases of CSIR: (a) perfect
CSIR and (b) CSI estimated at the receiver using training symbols. With perfect
CSIR, under a short-term power constraint, we determine: (a) the outage
probability for beamforming with imperfect CSIT (BF-IC) analytically, and (b)
the optimal spatial power allocation (OSPA) scheme that minimizes outage
numerically. Results show that, for delayed CSIT, BF-IC is close to optimal for
low SNR and uniform spatial power allocation (USPA) is close to optimal at high
SNR. Similarly, under a long-term power constraint, we show that BF-IC is close
to optimal for low SNR and USPA is close to optimal at high SNR. With imperfect
CSIR, we obtain an upper bound on the outage probability with USPA and BF-IC.
Results show that the loss in performance due to imperfection in CSIR is not
significant, if the training power is chosen appropriately.
| [
{
"version": "v1",
"created": "Sat, 3 Mar 2007 13:14:59 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jul 2007 06:54:18 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Nov 2007 09:04:08 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Annpureddy",
"Venkata Sreekanta",
""
],
[
"Marathe",
"Devdutt V.",
""
],
[
"Ramya",
"T. R.",
""
],
[
"Bhashyam",
"Srikrishna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703017 | Sang Joon Kim | Sang Joon Kim, Patrick Mitran, Vahid Tarokh | Performance Bounds for Bi-Directional Coded Cooperation Protocols | 15 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In coded bi-directional cooperation, two nodes wish to exchange messages over
a shared half-duplex channel with the help of a relay. In this paper, we derive
performance bounds for this problem for each of three protocols.
The first protocol is a two phase protocol were both users simultaneously
transmit during the first phase and the relay alone transmits during the
second. In this protocol, our bounds are tight and a multiple-access channel
transmission from the two users to the relay followed by a coded broadcast-type
transmission from the relay to the users achieves all points in the two-phase
capacity region.
The second protocol considers sequential transmissions from the two users
followed by a transmission from the relay while the third protocol is a hybrid
of the first two protocols and has four phases. In the latter two protocols the
inner and outer bounds are not identical, and differ in a manner similar to the
inner and outer bounds of Cover's relay channel. Numerical evaluation shows
that at least in some cases of interest our bounds do not differ significantly.
Finally, in the Gaussian case with path loss, we derive achievable rates and
compare the relative merits of each protocol in various regimes. This case is
of interest in cellular systems. Surprisingly, we find that in some cases, the
achievable rate region of the four phase protocol sometimes contains points
that are outside the outer bounds of the other protocols.
| [
{
"version": "v1",
"created": "Sun, 4 Mar 2007 18:27:05 GMT"
},
{
"version": "v2",
"created": "Mon, 14 May 2007 20:41:19 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Oct 2007 17:37:02 GMT"
},
{
"version": "v4",
"created": "Thu, 5 Jun 2008 19:02:09 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Kim",
"Sang Joon",
""
],
[
"Mitran",
"Patrick",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703018 | Satoshi Matsuoka | Satoshi Matsuoka | A Coding Theoretic Study on MLL proof nets | minor modifications | null | 10.1017/S0960129511000582 | null | cs.LO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coding theory is very useful for real world applications. A notable example
is digital television. Basically, coding theory is to study a way of detecting
and/or correcting data that may be true or false. Moreover coding theory is an
area of mathematics, in which there is an interplay between many branches of
mathematics, e.g., abstract algebra, combinatorics, discrete geometry,
information theory, etc. In this paper we propose a novel approach for
analyzing proof nets of Multiplicative Linear Logic (MLL) by coding theory. We
define families of proof structures and introduce a metric space for each
family. In each family, 1. an MLL proof net is a true code element; 2. a proof
structure that is not an MLL proof net is a false (or corrupted) code element.
The definition of our metrics reflects the duality of the multiplicative
connectives elegantly. In this paper we show that in the framework one
error-detecting is possible but one error-correcting not. Our proof of the
impossibility of one error-correcting is interesting in the sense that a proof
theoretical property is proved using a graph theoretical argument. In addition,
we show that affine logic and MLL + MIX are not appropriate for this framework.
That explains why MLL is better than such similar logics.
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 07:49:55 GMT"
},
{
"version": "v10",
"created": "Thu, 20 Dec 2007 11:48:29 GMT"
},
{
"version": "v11",
"created": "Fri, 23 May 2008 13:51:28 GMT"
},
{
"version": "v12",
"created": "Mon, 26 May 2008 11:58:28 GMT"
},
{
"version": "v13",
"created": "Wed, 28 May 2008 19:46:44 GMT"
},
{
"version": "v14",
"created": "Thu, 29 May 2008 16:30:06 GMT"
},
{
"version": "v15",
"created": "Fri, 30 May 2008 09:03:13 GMT"
},
{
"version": "v16",
"created": "Mon, 2 Jun 2008 08:36:44 GMT"
},
{
"version": "v17",
"created": "Tue, 3 Jun 2008 04:46:49 GMT"
},
{
"version": "v18",
"created": "Mon, 9 Jun 2008 12:00:03 GMT"
},
{
"version": "v19",
"created": "Tue, 10 Jun 2008 12:02:45 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Mar 2007 02:36:44 GMT"
},
{
"version": "v20",
"created": "Sun, 15 Jun 2008 10:13:57 GMT"
},
{
"version": "v21",
"created": "Wed, 18 Jun 2008 19:27:48 GMT"
},
{
"version": "v22",
"created": "Sun, 22 Jun 2008 10:18:35 GMT"
},
{
"version": "v23",
"created": "Fri, 19 Feb 2010 11:21:12 GMT"
},
{
"version": "v24",
"created": "Tue, 6 Jul 2010 07:37:55 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Mar 2007 05:42:45 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Apr 2007 13:41:04 GMT"
},
{
"version": "v5",
"created": "Tue, 17 Apr 2007 08:47:21 GMT"
},
{
"version": "v6",
"created": "Tue, 24 Apr 2007 10:22:17 GMT"
},
{
"version": "v7",
"created": "Mon, 13 Aug 2007 13:49:06 GMT"
},
{
"version": "v8",
"created": "Tue, 14 Aug 2007 07:45:21 GMT"
},
{
"version": "v9",
"created": "Sat, 18 Aug 2007 08:17:45 GMT"
}
] | 2012-02-06T00:00:00 | [
[
"Matsuoka",
"Satoshi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0703019 | Jean Cardinal | Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwena\"el Joret,
Stefan Langerman, Ilan Newman, Oren Weimann | The Stackelberg Minimum Spanning Tree Game | v3: Referees' comments incorporated. A preliminary version appeared
in the proceedings of the 10th Workshop on Algorithms and Data Structures
(WADS 2007) | Algorithmica, vol. 59, no. 2, pp. 129--144, 2011 | 10.1007/s00453-009-9299-y | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a one-round two-player network pricing game, the Stackelberg
Minimum Spanning Tree game or StackMST.
The game is played on a graph (representing a network), whose edges are
colored either red or blue, and where the red edges have a given fixed cost
(representing the competitor's prices). The first player chooses an assignment
of prices to the blue edges, and the second player then buys the cheapest
possible minimum spanning tree, using any combination of red and blue edges.
The goal of the first player is to maximize the total price of purchased blue
edges. This game is the minimum spanning tree analog of the well-studied
Stackelberg shortest-path game.
We analyze the complexity and approximability of the first player's best
strategy in StackMST. In particular, we prove that the problem is APX-hard even
if there are only two different red costs, and give an approximation algorithm
whose approximation ratio is at most $\min \{k,1+\ln b,1+\ln W\}$, where $k$ is
the number of distinct red costs, $b$ is the number of blue edges, and $W$ is
the maximum ratio between red costs. We also give a natural integer linear
programming formulation of the problem, and show that the integrality gap of
the fractional relaxation asymptotically matches the approximation guarantee of
our algorithm.
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 09:46:26 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2008 15:44:40 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Sep 2009 15:20:43 GMT"
}
] | 2011-03-07T00:00:00 | [
[
"Cardinal",
"Jean",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Fiorini",
"Samuel",
""
],
[
"Joret",
"Gwenaël",
""
],
[
"Langerman",
"Stefan",
""
],
[
"Newman",
"Ilan",
""
],
[
"Weimann",
"Oren",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703020 | Gabriel Istrate | Anders Hansson, Gabriel Istrate | Counting preimages of TCP reordering patterns | null | null | null | null | cs.DS cs.DM math.CO | null | Packet reordering is an important property of network traffic that should be
captured by analytical models of the Transmission Control Protocol (TCP). We
study a combinatorial problem motivated by RESTORED, a TCP modeling methodology
that incorporates information about packet dynamics. A significant component of
this model is a many-to-one mapping B that transforms sequences of packet IDs
into buffer sequences, in a manner that is compatible with TCP semantics. We
show that the following hold:
1. There exists a linear time algorithm that, given a buffer sequence W of
length n, decides whether there exists a permutation A of 1,2,..., n such that
$A\in B^{-1}(W)$ (and constructs such a permutation, when it exists).
2. The problem of counting the number of permutations in $B^{-1}(W)$ has a
polynomial time algorithm.
We also show how to extend these results to sequences of IDs that contain
repeated packets.
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 13:38:45 GMT"
}
] | 2008-11-04T00:00:00 | [
[
"Hansson",
"Anders",
""
],
[
"Istrate",
"Gabriel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0703021 | Wen-Li Wang | Wen-Li Wang and Mei-Huei Tang | Addressing Components' Evolvement and Execution Behavior to Measure
Component-Based Software Reliability | null | null | null | null | cs.SE | null | Software reliability is an important quality attrib-ute, often evaluated as
either a function of time or of system structures. The goal of this study is to
have this metric cover both for component-based software, be-cause its
reliability strongly depends on the quality of constituent components and their
interactions. To achieve this, we apply a convolution modeling ap-proach, based
on components' execution behavior, to integrate their individual reliability
evolvement and simultaneously address failure fixes in the time do-main.
Modeling at the component level can be more economical to accommodate software
evolution, be-cause the reliability metric can be evaluated by reus-ing the
quality measures of unaffected components and adapting only to the affected
ones to save cost. The adaptation capability also supports the incremental
software development processes that constantly add in new components over time.
Experiments were con-ducted to discuss the usefulness of this approach.
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 20:58:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Wen-Li",
""
],
[
"Tang",
"Mei-Huei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0703022 | Dongwoon Bai | Dongwoon Bai, Patrick Mitran, Saeed S. Ghassemzadeh, Robert R. Miller,
Vahid Tarokh | Rate of Channel Hardening of Antenna Selection Diversity Schemes and Its
Implication on Scheduling | 24 pages, 6 figures, 1table, Submitted to IEEE Transactions on
Information Theory | null | 10.1109/TIT.2009.2027529 | null | cs.IT math.IT | null | For a multiple antenna system, we compute the asymptotic distribution of
antenna selection gain when the transmitter selects the transmit antenna with
the strongest channel. We use this to asymptotically estimate the underlying
channel capacity distributions, and demonstrate that unlike
multiple-input/multiple-output (MIMO) systems, the channel for antenna
selection systems hardens at a slower rate, and thus a significant multiuser
scheduling gain can exist - O(1/ log m) for channel selection as opposed to
O(1/ sqrt{m}) for MIMO, where m is the number of transmit antennas.
Additionally, even without this scheduling gain, it is demonstrated that
transmit antenna selection systems outperform open loop MIMO systems in low
signal-to-interference-plus-noise ratio (SINR) regimes, particularly for a
small number of receive antennas. This may have some implications on wireless
system design, because most of the users in modern wireless systems have low
SINRs
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 21:02:16 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Bai",
"Dongwoon",
""
],
[
"Mitran",
"Patrick",
""
],
[
"Ghassemzadeh",
"Saeed S.",
""
],
[
"Miller",
"Robert R.",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703023 | Otfried Cheong | Otfried Cheong, Herman Haverkort, Mira Lee | Computing a Minimum-Dilation Spanning Tree is NP-hard | null | null | null | null | cs.CG | null | In a geometric network G = (S, E), the graph distance between two vertices u,
v in S is the length of the shortest path in G connecting u to v. The dilation
of G is the maximum factor by which the graph distance of a pair of vertices
differs from their Euclidean distance. We show that given a set S of n points
with integer coordinates in the plane and a rational dilation delta > 1, it is
NP-hard to determine whether a spanning tree of S with dilation at most delta
exists.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 01:53:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
""
],
[
"Haverkort",
"Herman",
""
],
[
"Lee",
"Mira",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0703024 | Marcus Hutter | Marcus Hutter | Algorithmic Information Theory: a brief non-technical guide to the field | 11 LaTeX pages.
http://www.scholarpedia.org/article/Algorithmic_information_theory | Scholarpedia, 2:3 (2007) page 2519 | null | null | cs.IT cs.CC math.IT | null | This article is a brief guide to the field of algorithmic information theory
(AIT), its underlying philosophy, and the most important concepts. AIT arises
by mixing information theory and computation theory to obtain an objective and
absolute notion of information in an individual object, and in so doing gives
rise to an objective and robust notion of randomness of individual objects.
This is in contrast to classical information theory that is based on random
variables and communication, and has no bearing on information and randomness
of individual objects. After a brief overview, the major subfields,
applications, history, and a map of the field are presented.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 09:54:47 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703025 | Jean Charles Gilbert | Jean Charles Gilbert (INRIA Rocquencourt), Xavier Jonsson | LIBOPT - An environment for testing solvers on heterogeneous collections
of problems - Version 1.0 | null | null | null | null | cs.MS cs.NA math.OC | null | The Libopt environment is both a methodology and a set of tools that can be
used for testing, comparing, and profiling solvers on problems belonging to
various collections. These collections can be heterogeneous in the sense that
their problems can have common features that differ from one collection to the
other. Libopt brings a unified view on this composite world by offering, for
example, the possibility to run any solver on any problem compatible with it,
using the same Unix/Linux command. The environment also provides tools for
comparing the results obtained by solvers on a specified set of problems. Most
of the scripts going with the Libopt environment have been written in Perl.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 14:05:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gilbert",
"Jean Charles",
"",
"INRIA Rocquencourt"
],
[
"Jonsson",
"Xavier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0703026 | Marc Daumas | Sylvie Boldo (INRIA Futurs), Marc Daumas (ELIAUS), Pascal Giorgi
(LIRMM) | Formal proof for delayed finite field arithmetic using floating point
operators | 8th Conference on Real Numbers and Computers, Saint Jacques de
Compostelle : Espagne (2008) | null | null | null | cs.SC | null | Formal proof checkers such as Coq are capable of validating proofs of
correction of algorithms for finite field arithmetics but they require
extensive training from potential users. The delayed solution of a triangular
system over a finite field mixes operations on integers and operations on
floating point numbers. We focus in this report on verifying proof obligations
that state that no round off error occurred on any of the floating point
operations. We use a tool named Gappa that can be learned in a matter of
minutes to generate proofs related to floating point arithmetic and hide
technicalities of formal proof checkers. We found that three facilities are
missing from existing tools. The first one is the ability to use in Gappa new
lemmas that cannot be easily expressed as rewriting rules. We coined the second
one ``variable interchange'' as it would be required to validate loop
interchanges. The third facility handles massive loop unrolling and argument
instantiation by generating traces of execution for a large number of cases. We
hope that these facilities may sometime in the future be integrated into
mainstream code validation.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 14:55:44 GMT"
},
{
"version": "v2",
"created": "Thu, 24 May 2007 09:55:25 GMT"
},
{
"version": "v3",
"created": "Wed, 14 May 2008 13:22:21 GMT"
}
] | 2008-07-09T00:00:00 | [
[
"Boldo",
"Sylvie",
"",
"INRIA Futurs"
],
[
"Daumas",
"Marc",
"",
"ELIAUS"
],
[
"Giorgi",
"Pascal",
"",
"LIRMM"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0703027 | Bernard Jacquemin | Bernard Jacquemin (ISC) | Interroger un corpus par le sens | 13 pp | Dans "Mots, termes et contextes", Actes des septi\`emes Journ\'ees
scientifiques du r\'eseau de chercheurs Lexicologie, Terminologie, Traduction
- Bruxelles : Belgique (2005) | null | null | cs.CL cs.IR | null | In textual knowledge management, statistical methods prevail. Nonetheless,
some difficulties cannot be overcome by these methodologies. I propose a
symbolic approach using a complete textual analysis to identify which analysis
level can improve the the answers provided by a system. The approach identifies
word senses and relation between words and generates as many rephrasings as
possible. Using synonyms and derivative, the system provides new utterances
without changing the original meaning of the sentences. Such a way, an
information can be retrieved whatever the question or answer's wording may be.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 19:50:37 GMT"
},
{
"version": "v2",
"created": "Sat, 31 May 2008 16:10:52 GMT"
}
] | 2008-05-31T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0703028 | Marc Daumas | Sylvain Collange (LP2A), Marc Daumas (LP2A, LIRMM), David Defour
(LP2A) | Graphic processors to speed-up simulations for the design of high
performance solar receptors | null | null | null | null | cs.DC physics.class-ph | null | Graphics Processing Units (GPUs) are now powerful and flexible systems
adapted and used for other purposes than graphics calculations (General Purpose
computation on GPU -- GPGPU). We present here a prototype to be integrated into
simulation codes that estimate temperature, velocity and pressure to design
next generations of solar receptors. Such codes will delegate to our
contribution on GPUs the computation of heat transfers due to radiations. We
use Monte-Carlo line-by-line ray-tracing through finite volumes. This means
data-parallel arithmetic transformations on large data structures. Our
prototype is inspired on the source code of GPUBench. Our performances on two
recent graphics cards (Nvidia 7800GTX and ATI RX1800XL) show some speed-up
higher than 400 compared to CPU implementations leaving most of CPU computing
resources available. As there were some questions pending about the accuracy of
the operators implemented in GPUs, we start this report with a survey and some
contributed tests on the various floating point units available on GPUs.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 19:58:17 GMT"
},
{
"version": "v2",
"created": "Thu, 24 May 2007 09:45:49 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Collange",
"Sylvain",
"",
"LP2A"
],
[
"Daumas",
"Marc",
"",
"LP2A, LIRMM"
],
[
"Defour",
"David",
"",
"LP2A"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
cs/0703029 | Shmuel Friedland | Shmuel Friedland | FPRAS for computing a lower bound for weighted matching polynomial of
graphs | 16 pages | null | null | null | cs.CC cs.DM | null | We give a fully polynomial randomized approximation scheme to compute a lower
bound for the matching polynomial of any weighted graph at a positive argument.
For the matching polynomial of complete bipartite graphs with bounded weights
these lower bounds are asymptotically optimal.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 22:59:30 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2007 16:09:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedland",
"Shmuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0703030 | Konstantin Rybnikov | Konstantin Rybnikov | An Efficient Local Approach to Convexity Testing of Piecewise-Linear
Hypersurfaces | 3 figures | null | null | null | cs.CG | null | We show that a closed piecewise-linear hypersurface immersed in $R^n$ ($n\ge
3$) is the boundary of a convex body if and only if every point in the interior
of each $(n-3)$-face has a neighborhood that lies on the boundary of some
convex body; no assumptions about the hypersurface's topology are needed. We
derive this criterion from our generalization of Van Heijenoort's (1952)
theorem on locally convex hypersurfaces in $R^n$ to spherical spaces. We also
give an easy-to-implement convexity testing algorithm, which is based on our
criterion. For $R^3$ the number of arithmetic operations used by the algorithm
is at most linear in the number of vertices, while in general it is at most
linear in the number of incidences between the $(n-2)$-faces and $(n-3)$-faces.
When the dimension $n$ is not fixed and only ring arithmetic is allowed, the
algorithm still remains polynomial. Our method works in more general situations
than the convexity verification algorithms developed by Mehlhorn et al. (1996)
and Devillers et al. (1998) -- for example, our method does not require the
input surface to be orientable, nor it requires the input data to include
normal vectors to the facets that are oriented "in a coherent way". For $R^3$
the complexity of our algorithm is the same as that of previous algorithms; for
higher dimensions there seems to be no clear winner, but our approach is the
only one that easily handles inputs in which the facet normals are not known to
be coherently oriented or are not given at all. Furthermore, our method can be
extended to piecewise-polynomial surfaces of small degree.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 07:33:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rybnikov",
"Konstantin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0703031 | P\'aid\'i Creed | Paidi Creed | Sampling Eulerian orientations of triangular lattice graphs | 23 pages | null | null | null | cs.DM cs.DS | null | We consider the problem of sampling from the uniform distribution on the set
of Eulerian orientations of subgraphs of the triangular lattice. Although it is
known that this can be achieved in polynomial time for any graph, the algorithm
studied here is more natural in the context of planar Eulerian graphs. We
analyse the mixing time of a Markov chain on the Eulerian orientations of a
planar graph which moves between orientations by reversing the edges of
directed faces. Using path coupling and the comparison method we obtain a
polynomial upper bound on the mixing time of this chain for any solid subgraph
of the triangular lattice. By considering the conductance of the chain we show
that there exist subgraphs with holes for which the chain will always take an
exponential amount of time to converge. Finally, as an additional justification
for studying a Markov chain on the set of Eulerian orientations of planar
graphs, we show that the problem of counting Eulerian orientations remains
#P-complete when restricted to planar graphs.
A preliminary version of this work appeared as an extended abstract in the
2nd Algorithms and Complexity in Durham workshop.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 12:34:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Creed",
"Paidi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703032 | Andreas Enge | Andreas Enge (INRIA FUTURS, INRIA Futurs), Pierrick Gaudry (INRIA
Lorraine - LORIA) | An $L (1/3 + \epsilon)$ Algorithm for the Discrete Logarithm Problem for
Low Degree Curves | null | Dans Eurocrypt 2007 (2007) | 10.1007/978-3-540-72540-4_22 | null | cs.CR math.AG | null | The discrete logarithm problem in Jacobians of curves of high genus $g$ over
finite fields $\FF_q$ is known to be computable with subexponential complexity
$L_{q^g}(1/2, O(1))$. We present an algorithm for a family of plane curves
whose degrees in $X$ and $Y$ are low with respect to the curve genus, and
suitably unbalanced. The finite base fields are arbitrary, but their sizes
should not grow too fast compared to the genus. For this family, the group
structure can be computed in subexponential time of $L_{q^g}(1/3, O(1))$, and a
discrete logarithm computation takes subexponential time of
$L_{q^g}(1/3+\epsilon, o(1))$ for any positive $\epsilon$. These runtime bounds
rely on heuristics similar to the ones used in the number field sieve or the
function field sieve algorithms.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 14:00:52 GMT"
}
] | 2015-06-25T00:00:00 | [
[
"Enge",
"Andreas",
"",
"INRIA FUTURS, INRIA Futurs"
],
[
"Gaudry",
"Pierrick",
"",
"INRIA\n Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
cs/0703033 | Pierre-Francois Marteau | Pierre-Fran\c{c}ois Marteau (VALORIA) | Time Warp Edit Distance with Stiffness Adjustment for Time Series
Matching | null | IEEE Transaction on Pattern Analysis and Machine Intelligence 31,
2 (2009) 306-318 | 10.1109/TPAMI.2008.76 | null | cs.IR | null | In a way similar to the string-to-string correction problem we address time
series similarity in the light of a time-series-to-time-series-correction
problem for which the similarity between two time series is measured as the
minimum cost sequence of "edit operations" needed to transform one time series
into another. To define the "edit operations" we use the paradigm of a
graphical editing process and end up with a dynamic programming algorithm that
we call Time Warp Edit Distance (TWED). TWED is slightly different in form from
Dynamic Time Warping, Longest Common Subsequence or Edit Distance with Real
Penalty algorithms. In particular, it highlights a parameter which drives a
kind of stiffness of the elastic measure along the time axis. We show that the
similarity provided by TWED is a metric potentially useful in time series
retrieval applications since it could benefit from the triangular inequality
property to speed up the retrieval process while tuning the parameters of the
elastic measure. In that context, a lower bound is derived to relate the
matching of time series into down sampled representation spaces to the matching
into the original space. Empiric quality of the TWED distance is evaluated on a
simple classification task. Compared to Edit Distance, Dynamic Time Warping,
Longest Common Subsequnce and Edit Distance with Real Penalty, TWED has proven
to be quite effective on the considered experimental task.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 19:54:33 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2007 18:01:02 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Aug 2007 09:58:52 GMT"
},
{
"version": "v4",
"created": "Mon, 25 Feb 2008 15:43:59 GMT"
},
{
"version": "v5",
"created": "Tue, 4 Mar 2008 07:39:36 GMT"
}
] | 2008-12-28T00:00:00 | [
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0703034 | Andrew Eckford | Andrew W. Eckford | Nanoscale Communication with Brownian Motion | 6 pages, 4 figures | null | null | null | cs.IT math.IT | null | In this paper, the problem of communicating using chemical messages
propagating using Brownian motion, rather than electromagnetic messages
propagating as waves in free space or along a wire, is considered. This problem
is motivated by nanotechnological and biotechnological applications, where the
energy cost of electromagnetic communication might be prohibitive. Models are
given for communication using particles that propagate with Brownian motion,
and achievable capacity results are given. Under conservative assumptions, it
is shown that rates exceeding one bit per particle are achievable.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 23:27:28 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Eckford",
"Andrew W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703035 | Kapil Bhattad | Kapil Bhattad, Krishna R. Narayanan, Giuseppe Caire | On the Distortion SNR Exponent of Some Layered Transmission Schemes | 26 Pages. 10 figures, Submitted to IEEE Trans. on IT | null | 10.1109/TIT.2008.924703 | null | cs.IT math.IT | null | We consider the problem of joint source-channel coding for transmitting K
samples of a complex Gaussian source over T = bK uses of a block-fading
multiple input multiple output (MIMO) channel with M transmit and N receive
antennas. We consider the case when we are allowed to code over L blocks. The
channel gain is assumed to be constant over a block and channel gains for
different blocks are assumed to be independent. The performance measure of
interest is the rate of decay of the expected mean squared error with the
signal-to-noise ratio (SNR), called the distortion SNR exponent. We first show
that using a broadcast strategy of Gunduz and Erkip, but with a different power
and rate allocation policy, the optimal distortion SNR exponent can be achieved
for bandwidth efficiencies 0 < b < (|N-M|+1)/min(M,N). This is the first time
the optimal exponent is characterized for 1/min(M,N) < b < (|N-M |+ 1)/ min(M,
N). Also, for b > MNL^2, we show that the broadcast scheme achieves the optimal
exponent of MNL. Special cases of this result have been derived for the L=1
case and for M=N=1 by Gunduz and Erkip. We then propose a digital layered
transmission scheme that uses both time layering and superposition. This
includes many previously known schemes as special cases. The proposed scheme is
at least as good as the currently best known schemes for the entire range of
bandwidth efficiencies, whereas at least for some M, N, and b, it is strictly
better than the currently best known schemes.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 20:00:52 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 15:41:11 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Bhattad",
"Kapil",
""
],
[
"Narayanan",
"Krishna R.",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703036 | Jean Creignou | Jean Creignou (IMB) | Constructions of Grassmannian Simplices | 22 pages, 3 figures | null | null | null | cs.IT math.IT | null | In this article an explicit method (relying on representation theory) to
construct packings in Grassmannian space is presented. Infinite families of
configurations having only one non-trivial set of principal angles are found
using 2-transitive groups. These packings are proved to reach the simplex bound
and are therefore optimal w.r.t. the chordal distance. The construction is
illustrated by an example on the symmetric group. Then some natural extends and
consequences of this situation are given.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 10:14:13 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2007 08:11:31 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Sep 2007 16:53:08 GMT"
},
{
"version": "v4",
"created": "Sat, 8 Mar 2008 16:53:33 GMT"
}
] | 2008-03-08T00:00:00 | [
[
"Creignou",
"Jean",
"",
"IMB"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703037 | Alexander Wolff | Hee-Kap Ahn and Helmut Alt and Tetsuo Asano and Sang Won Bae and Peter
Brass and Otfried Cheong and Christian Knauer and Hyeon-Suk Na and Chan-Su
Shin and Alexander Wolff | Constructing Optimal Highways | 13 pages, 9 figures, preliminary version appeared at CATS'07 | International Journal of Foundations of Computer Science
20(2009):3-23 | 10.1142/S0129054109006425 | null | cs.CG | null | For two points $p$ and $q$ in the plane, a straight line $h$, called a
highway, and a real $v>1$, we define the \emph{travel time} (also known as the
\emph{city distance}) from $p$ and $q$ to be the time needed to traverse a
quickest path from $p$ to $q$, where the distance is measured with speed $v$ on
$h$ and with speed 1 in the underlying metric elsewhere.
Given a set $S$ of $n$ points in the plane and a highway speed $v$, we
consider the problem of finding a \emph{highway} that minimizes the maximum
travel time over all pairs of points in $S$. If the orientation of the highway
is fixed, the optimal highway can be computed in linear time, both for the
$L_1$- and the Euclidean metric as the underlying metric. If arbitrary
orientations are allowed, then the optimal highway can be computed in $O(n^{2}
\log n)$ time. We also consider the problem of computing an optimal pair of
highways, one being horizontal, one vertical.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 17:22:21 GMT"
}
] | 2010-08-26T00:00:00 | [
[
"Ahn",
"Hee-Kap",
""
],
[
"Alt",
"Helmut",
""
],
[
"Asano",
"Tetsuo",
""
],
[
"Bae",
"Sang Won",
""
],
[
"Brass",
"Peter",
""
],
[
"Cheong",
"Otfried",
""
],
[
"Knauer",
"Christian",
""
],
[
"Na",
"Hyeon-Suk",
""
],
[
"Shin",
"Chan-Su",
""
],
[
"Wolff",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0703038 | Chan Zhou | Chan Zhou and Gerhard Wunder | Delay and Throughput Optimal Scheduling for OFDM Broadcast Channels | submitted to IEEE International Symposium on Information Theory
(ISIT2007) | publisched in Proc. IEEE Globecom 2007 | null | null | cs.IT math.IT | null | In this paper a scheduling policy is presented which minimizes the average
delay of the users. The scheduling scheme is investigated both by analysis and
simulations carried out in the context of Orthogonal Frequency Division
Multiplexing (OFDM) broadcast channels (BC). First the delay optimality is
obtained for a static scenario providing solutions for specific subproblems,
then the analysis is carried over to the dynamic scheme. Furthermore auxiliary
tools are given for proving throughput optimality. Finally simulations show the
superior performance of the presented scheme.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 11:44:32 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Zhou",
"Chan",
""
],
[
"Wunder",
"Gerhard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703039 | Christof L\"oding | Thomas Colcombet, Christof L\"oding | Transforming structures by set interpretations | 36 pages | Logical Methods in Computer Science, Volume 3, Issue 2 (May 4,
2007) lmcs:2221 | 10.2168/LMCS-3(2:4)2007 | null | cs.LO | null | We consider a new kind of interpretation over relational structures: finite
sets interpretations. Those interpretations are defined by weak monadic
second-order (WMSO) formulas with free set variables. They transform a given
structure into a structure with a domain consisting of finite sets of elements
of the orignal structure. The definition of these interpretations directly
implies that they send structures with a decidable WMSO theory to structures
with a decidable first-order theory. In this paper, we investigate the
expressive power of such interpretations applied to infinite deterministic
trees. The results can be used in the study of automatic and tree-automatic
structures.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 12:52:55 GMT"
},
{
"version": "v2",
"created": "Fri, 4 May 2007 13:59:31 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Colcombet",
"Thomas",
""
],
[
"Löding",
"Christof",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703040 | Yefim Bakman | Yefim Bakman (Tel-Aviv University) | Why the Standard Data Processing should be changed | null | null | null | null | cs.MS | null | The basic statistical methods of data representation did not change since
their emergence. Their simplicity was dictated by the intricacies of
computations in the before computers epoch. It turns out that such approach is
not uniquely possible in the presence of quick computers. The suggested here
method improves significantly the reliability of data processing and their
graphical representation. In this paper we show problems of the standard data
processing which can bring to incorrect results. A method solving these
problems is proposed. It is based on modification of data representation. The
method was implemented in a computer program Consensus5. The program
performances are illustrated through varied examples.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 19:49:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bakman",
"Yefim",
"",
"Tel-Aviv University"
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0703041 | Marko Horvat B.Sc.CS-Dipl.Ing. | Kresimir Fertalj, Marko Horvat | Comparing Architectures of Mobile Applications | 8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS
International Conference on Automation & Information in Venice, Italy | WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004,
pp. 946-952 | null | null | cs.OH | null | This article describes various advantages and disadvantages of SMS, WAP, J2ME
and Windows CE technologies in designing mobile applications. In defining the
architecture of any software application it is important to get the best
trade-off between platform's possibilities and design requirements. Achieving
optimum software design is even more important with mobile applications where
all computer resources are limited. Therefore, it is important to have a
comparative analysis of all relevant contemporary approaches in designing
mobile applications. As always, the choice between these technologies is
determined by application requirements and system capabilities.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 19:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fertalj",
"Kresimir",
""
],
[
"Horvat",
"Marko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0703042 | Vaclav Petricek | Lukas Brozovsky, Vaclav Petricek | Recommender System for Online Dating Service | Accepted for Znalosti 2007 | null | null | null | cs.IR cs.SE | null | Users of online dating sites are facing information overload that requires
them to manually construct queries and browse huge amount of matching user
profiles. This becomes even more problematic for multimedia profiles. Although
matchmaking is frequently cited as a typical application for recommender
systems, there is a surprising lack of work published in this area. In this
paper we describe a recommender system we implemented and perform a
quantitative comparison of two collaborative filtering (CF) and two global
algorithms. Results show that collaborative filtering recommenders
significantly outperform global algorithms that are currently used by dating
sites. A blind experiment with real users also confirmed that users prefer CF
based recommendations to global popularity recommendations. Recommender systems
show a great potential for online dating where they could improve the value of
the service to users and improve monetization of the service.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 15:38:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brozovsky",
"Lukas",
""
],
[
"Petricek",
"Vaclav",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0703043 | Vaclav Petricek | Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G. Councill, C. Lee
Giles | A Comparison of On-Line Computer Science Citation Databases | ECDL 2005 | null | null | null | cs.DL | null | This paper examines the difference and similarities between the two on-line
computer science citation databases DBLP and CiteSeer. The database entries in
DBLP are inserted manually while the CiteSeer entries are obtained autonomously
via a crawl of the Web and automatic processing of user submissions. CiteSeer's
autonomous citation database can be considered a form of self-selected on-line
survey. It is important to understand the limitations of such databases,
particularly when citation information is used to assess the performance of
authors, institutions and funding bodies.
We show that the CiteSeer database contains considerably fewer single author
papers. This bias can be modeled by an exponential process with intuitive
explanation. The model permits us to predict that the DBLP database covers
approximately 24% of the entire literature of Computer Science. CiteSeer is
also biased against low-cited papers.
Despite their difference, both databases exhibit similar and significantly
different citation distributions compared with previous analysis of the Physics
community. In both databases, we also observe that the number of authors per
paper has been increasing over time.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petricek",
"Vaclav",
""
],
[
"Cox",
"Ingemar J.",
""
],
[
"Han",
"Hui",
""
],
[
"Councill",
"Isaac G.",
""
],
[
"Giles",
"C. Lee",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0703044 | Samuel Thibault | Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine -
LORIA) | BrlAPI: Simple, Portable, Concurrent, Application-level Control of
Braille Terminals | null | Dans International Conference on Information and Communication
Technology Accessibility (ICTA) (2007) | null | null | cs.HC | null | Screen readers can drive braille devices for allowing visually impaired users
to access computer environments, by providing them the same information as
sighted users. But in some cases, this view is not easy to use on a braille
device. In such cases, it would be much more useful to let applications provide
their own braille feedback, specially adapted to visually impaired users. Such
applications would then need the ability to output braille ; however, allowing
both screen readers and applications access a wide panel of braille devices is
not a trivial task. We present an abstraction layer that applications may use
to communicate with braille devices. They do not need to deal with the
specificities of each device, but can do so if necessary. We show how several
applications can communicate with one braille device concurrently, with BrlAPI
making sensible choices about which application eventually gets access to the
device. The description of a widely used implementation of BrlAPI is included.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:55:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
],
[
"Hinderer",
"Sebastien",
"",
"INRIA Lorraine -\n LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0703045 | Mehmet Ak\c{c}akaya | Mehmet Ak\c{c}akaya and Vahid Tarokh | Performance Bounds on Sparse Representations Using Redundant Frames | 8 pages, 1 figure, Submitted to IEEE Transactions on Signal
Processing | null | null | null | cs.IT math.IT | null | We consider approximations of signals by the elements of a frame in a complex
vector space of dimension $N$ and formulate both the noiseless and the noisy
sparse representation problems. The noiseless representation problem is to find
sparse representations of a signal $\mathbf{r}$ given that such representations
exist. In this case, we explicitly construct a frame, referred to as the
Vandermonde frame, for which the noiseless sparse representation problem can be
solved uniquely using $O(N^2)$ operations, as long as the number of non-zero
coefficients in the sparse representation of $\mathbf{r}$ is $\epsilon N$ for
some $0 \le \epsilon \le 0.5$, thus improving on a result of Candes and Tao
\cite{Candes-Tao}. We also show that $\epsilon \le 0.5$ cannot be relaxed
without violating uniqueness.
The noisy sparse representation problem is to find sparse representations of
a signal $\mathbf{r}$ satisfying a distortion criterion. In this case, we
establish a lower bound on the trade-off between the sparsity of the
representation, the underlying distortion and the redundancy of any given
frame.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 19:28:10 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Akçakaya",
"Mehmet",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703046 | Xin Zhang | Xin Zhang, H. Vincent Poor and Mung Chiang | Optimal Power Allocation for Distributed Detection over MIMO Channels in
Wireless Sensor Networks | 14 pages, 31 figures, under review for IEEE Transactions on Signal
Processing | null | 10.1109/TSP.2008.924639 | null | cs.IT math.IT | null | In distributed detection systems with wireless sensor networks, the
communication between sensors and a fusion center is not perfect due to
interference and limited transmitter power at the sensors to combat noise at
the fusion center's receiver. The problem of optimizing detection performance
with such imperfect communication brings a new challenge to distributed
detection. In this paper, sensors are assumed to have independent but
nonidentically distributed observations, and a multi-input/multi-output (MIMO)
channel model is included to account for imperfect communication between the
sensors and the fusion center. The J-divergence between the distributions of
the detection statistic under different hypotheses is used as a performance
criterion in order to provide a tractable analysis. Optimizing the performance
(in terms of the J-divergence) with individual and total transmitter power
constraints on the sensors is studied, and the corresponding power allocation
scheme is provided. It is interesting to see that the proposed power allocation
is a tradeoff between two factors, the communication channel quality and the
local decision quality. For the case with orthogonal channels under certain
conditions, the power allocation can be solved by a weighted water-filling
algorithm. Simulations show that, to achieve the same performance, the proposed
power allocation in certain cases only consumes as little as 25 percent of the
total power used by an equal power allocation scheme.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 19:40:21 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jul 2007 15:46:23 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Zhang",
"Xin",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Chiang",
"Mung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703047 | Hamidreza Farmanbar | Hamid Farmanbar and Amir K. Khandani | Precoding for the AWGN Channel with Discrete Interference | 29 Pages, 9 figures, Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | $M$-ary signal transmission over AWGN channel with additive $Q$-ary
interference where the sequence of i.i.d. interference symbols is known
causally at the transmitter is considered. Shannon's theorem for channels with
side information at the transmitter is used to formulate the capacity of the
channel. It is shown that by using at most $MQ-Q+1$ out of $M^Q$ input symbols
of the \emph{associated} channel, the capacity is achievable. For the special
case where the Gaussian noise power is zero, a sufficient condition, which is
independent of interference, is given for the capacity to be $\log_2 M$ bits
per channel use. The problem of maximization of the transmission rate under the
constraint that the channel input given any current interference symbol is
uniformly distributed over the channel input alphabet is investigated. For this
setting, the general structure of a communication system with optimal precoding
is proposed. The extension of the proposed precoding scheme to continuous
channel input alphabet is also investigated.
| [
{
"version": "v1",
"created": "Sat, 10 Mar 2007 00:46:15 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Farmanbar",
"Hamid",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703048 | Luoquan Hu | Luoquan Hu, Han Yu, Yifan Chen | Path Loss Models Based on Stochastic Rays | 23 pages, 11 figures, 18 References, to appear in IET Microwaves,
Antenna & Propagation In subsection '3.2 The generic stochastic ray model',
Eq. (17): The original expression is false, now it is modified | null | null | null | cs.IT math.IT | null | In this paper, two-dimensional percolation lattices are applied to describe
wireless propagation environment, and stochastic rays are employed to model the
trajectories of radio waves. We first derive the probability that a stochastic
ray undergoes certain number of collisions at a specific spatial location.
Three classes of stochastic rays with different constraint conditions are
considered: stochastic rays of random walks, and generic stochastic rays with
two different anomalous levels. Subsequently, we obtain the closed-form
formulation of mean received power of radio waves under non line-of-sight
conditions for each class of stochastic ray. Specifically, the determination of
model parameters and the effects of lattice structures on the path loss are
investigated. The theoretical results are validated by comparison with
experimental data.
| [
{
"version": "v1",
"created": "Sat, 10 Mar 2007 02:26:08 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2007 01:00:06 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hu",
"Luoquan",
""
],
[
"Yu",
"Han",
""
],
[
"Chen",
"Yifan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703049 | Olga Savenkova | Oleg N. Karpov, Olga A. Savenkova | Algorithm of Segment-Syllabic Synthesis in Speech Recognition Problem | 11 pages, 4 figures | null | null | null | cs.SD cs.CL | null | Speech recognition based on the syllable segment is discussed in this paper.
The principal search methods in space of states for the speech recognition
problem by segment-syllabic parameters trajectory synthesis are investigated.
Recognition as comparison the parameters trajectories in chosen speech units on
the sections of the segmented speech is realized. Some experimental results are
given and discussed.
| [
{
"version": "v1",
"created": "Sat, 10 Mar 2007 23:59:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karpov",
"Oleg N.",
""
],
[
"Savenkova",
"Olga A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0703050 | Nabhendra Bisnik | Nabhendra Bisnik, Alhussein A. Abouzeid | On The Capacity Deficit of Mobile Wireless Ad Hoc Networks: A Rate
Distortion Formulation | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | Overheads incurred by routing protocols diminish the capacity available for
relaying useful data in a mobile wireless ad hoc network. Discovering lower
bounds on the amount of protocol overhead incurred for routing data packets is
important for the development of efficient routing protocols, and for
characterizing the actual (effective) capacity available for network users.
This paper presents an information-theoretic framework for characterizing the
minimum routing overheads of geographic routing in a network with mobile nodes.
specifically, the minimum overhead problem is formulated as a rate-distortion
problem. The formulation may be applied to networks with arbitrary traffic
arrival and location service schemes. Lower bounds are derived for the minimum
overheads incurred for maintaining the location of destination nodes and
consistent neighborhood information in terms of node mobility and packet
arrival process. This leads to a characterization of the deficit caused by the
routing overheads on the overall transport capacity.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 01:11:09 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Bisnik",
"Nabhendra",
""
],
[
"Abouzeid",
"Alhussein A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703051 | Yu Ding | Yu Ding | An ExpTime Procedure for Description Logic $\mathcal{ALCQI}$ (Draft) | This paper is submitted in 2007 | null | null | null | cs.LO | null | A worst-case ExpTime tableau-based decision procedure is outlined for the
satisfiability problem in $\mathcal{ALCQI}$ w.r.t. general axioms.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 01:55:23 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2007 00:23:59 GMT"
},
{
"version": "v3",
"created": "Sun, 18 Mar 2007 19:38:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Yu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703052 | Kalle Ranto | C. Hollanti, J. Lahtonen, K. Ranto, R. Vehkalahti | On the densest MIMO lattices from cyclic division algebras | 33 pages, 1 figure, submitted to IEEE Trans. on Inform. Theory Dec.
2006 | IEEE Trans. Inf. Theory, vol. 55(8), Aug. 2009, pp. 3751-3780 | null | null | cs.IT math.IT | null | It is shown why the discriminant of a maximal order within a cyclic division
algebra must be minimized in order to get the densest possible matrix lattices
with a prescribed nonvanishing minimum determinant. Using results from class
field theory a lower bound to the minimum discriminant of a maximal order with
a given center and index (= the number of Tx/Rx antennas) is derived. Also
numerous examples of division algebras achieving our bound are given. E.g. we
construct a matrix lattice with QAM coefficients that has 2.5 times as many
codewords as the celebrated Golden code of the same minimum determinant. We
describe a general algorithm due to Ivanyos and Ronyai for finding maximal
orders within a cyclic division algebra and discuss our enhancements to this
algorithm. We also consider general methods for finding cyclic division
algebras of a prescribed index achieving our lower bound.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 09:39:47 GMT"
}
] | 2009-08-19T00:00:00 | [
[
"Hollanti",
"C.",
""
],
[
"Lahtonen",
"J.",
""
],
[
"Ranto",
"K.",
""
],
[
"Vehkalahti",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703053 | Nicolas Lomenie | Guray Erus (CRIP5), Nicolas Lom\'enie (CRIP5) | Extraction of cartographic objects in high resolution satellite images
for object model generation | null | 4th Workshop on pattern Recognition in Remote Sensing in
conjunction with ICPR2006 (08/2006) 00-00 | null | null | cs.CV | null | The aim of this study is to detect man-made cartographic objects in
high-resolution satellite images. New generation satellites offer a sub-metric
spatial resolution, in which it is possible (and necessary) to develop methods
at object level rather than at pixel level, and to exploit structural features
of objects. With this aim, a method to generate structural object models from
manually segmented images has been developed. To generate the model from
non-segmented images, extraction of the objects from the sample images is
required. A hybrid method of extraction (both in terms of input sources and
segmentation algorithms) is proposed: A region based segmentation is applied on
a 10 meter resolution multi-spectral image. The result is used as marker in a
"marker-controlled watershed method using edges" on a 2.5 meter resolution
panchromatic image. Very promising results have been obtained even on images
where the limits of the target objects are not apparent.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 15:57:23 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Erus",
"Guray",
"",
"CRIP5"
],
[
"Loménie",
"Nicolas",
"",
"CRIP5"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0703054 | Julien Hendrickx | Vincent D. Blondel, Julien M. Hendrickx and Raphael M. Jungers | Linear time algorithms for Clobber | null | null | null | null | cs.GT | null | We prove that the single-player game clobber is solvable in linear time when
played on a line or on a cycle. For this purpose, we show that this game is
equivalent to an optimization problem on a set of words defined by seven
classes of forbidden patterns. We also prove that, playing on the cycle, it is
always possible to remove at least 2n/3 pawns, and we give a conformation for
which it is not possible to do better, answering questions recently asked by
Faria et al.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 17:04:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blondel",
"Vincent D.",
""
],
[
"Hendrickx",
"Julien M.",
""
],
[
"Jungers",
"Raphael M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0703055 | Kristiaan Pelckmans | Kristiaan Pelckmans, Jos De Brabanter, Johan A.K. Suykens, Bart De
Moor | Support and Quantile Tubes | null | null | null | null | cs.IT cs.LG math.IT | null | This correspondence studies an estimator of the conditional support of a
distribution underlying a set of i.i.d. observations. The relation with mutual
information is shown via an extension of Fano's theorem in combination with a
generalization bound based on a compression argument. Extensions to estimating
the conditional quantile interval, and statistical guarantees on the minimal
convex hull are given.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 19:14:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Pelckmans",
"Kristiaan",
""
],
[
"De Brabanter",
"Jos",
""
],
[
"Suykens",
"Johan A. K.",
""
],
[
"De Moor",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703056 | Kamel Aouiche | Kamel Aouiche and Daniel Lemire | Unasssuming View-Size Estimation Techniques in OLAP | Published in ICEIS 2007 | null | null | null | cs.DB cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Even if storage was infinite, a data warehouse could not materialize all
possible views due to the running time and update requirements. Therefore, it
is necessary to estimate quickly, accurately, and reliably the size of views.
Many available techniques make particular statistical assumptions and their
error can be quite large. Unassuming techniques exist, but typically assume we
have independent hashing for which there is no known practical implementation.
We adapt an unassuming estimator due to Gibbons and Tirthapura: its theoretical
bounds do not make unpractical assumptions. We compare this technique
experimentally with stochastic probabilistic counting, LogLog probabilistic
counting, and multifractal statistical models. Our experiments show that we can
reliably and accurately (within 10%, 19 times out 20) estimate view sizes over
large data sets (1.5 GB) within minutes, using almost no memory. However, only
Gibbons-Tirthapura provides universally tight estimates irrespective of the
size of the view. For large views, probabilistic counting has a small edge in
accuracy, whereas the competitive sampling-based method (multifractal) we
tested is an order of magnitude faster but can sometimes provide poor estimates
(relative error of 100%). In our tests, LogLog probabilistic counting is not
competitive. Experimental validation on the US Census 1990 data set and on the
Transaction Processing Performance (TPC H) data set is provided.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 21:42:59 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Jul 2007 14:29:53 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Dec 2008 19:23:44 GMT"
}
] | 2008-12-08T00:00:00 | [
[
"Aouiche",
"Kamel",
""
],
[
"Lemire",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0703057 | Ali Pezeshki | Ali Pezeshki, A. Robert Calderbank, William Moran, and Stephen D.
Howard | Doppler Resilient Waveforms with Perfect Autocorrelation | Submitted to IEEE Transactions on Information Theory, March 2007 | null | null | null | cs.IT math.IT | null | We describe a method of constructing a sequence of phase coded waveforms with
perfect autocorrelation in the presence of Doppler shift. The constituent
waveforms are Golay complementary pairs which have perfect autocorrelation at
zero Doppler but are sensitive to nonzero Doppler shifts. We extend this
construction to multiple dimensions, in particular to radar polarimetry, where
the two dimensions are realized by orthogonal polarizations. Here we determine
a sequence of two-by-two Alamouti matrices where the entries involve Golay
pairs and for which the sum of the matrix-valued ambiguity functions vanish at
small Doppler shifts. The Prouhet-Thue-Morse sequence plays a key role in the
construction of Doppler resilient sequences of Golay pairs.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 21:46:04 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Pezeshki",
"Ali",
""
],
[
"Calderbank",
"A. Robert",
""
],
[
"Moran",
"William",
""
],
[
"Howard",
"Stephen D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703058 | Kamel Aouiche | Kamel Aouiche and Daniel Lemire | A Comparison of Five Probabilistic View-Size Estimation Techniques in
OLAP | null | null | null | null | cs.DB cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A data warehouse cannot materialize all possible views, hence we must
estimate quickly, accurately, and reliably the size of views to determine the
best candidates for materialization. Many available techniques for view-size
estimation make particular statistical assumptions and their error can be
large. Comparatively, unassuming probabilistic techniques are slower, but they
estimate accurately and reliability very large view sizes using little memory.
We compare five unassuming hashing-based view-size estimation techniques
including Stochastic Probabilistic Counting and LogLog Probabilistic Counting.
Our experiments show that only Generalized Counting, Gibbons-Tirthapura, and
Adaptive Counting provide universally tight estimates irrespective of the size
of the view; of those, only Adaptive Counting remains constantly fast as we
increase the memory budget.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 17:46:11 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jul 2007 13:27:01 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Dec 2008 19:26:17 GMT"
}
] | 2008-12-08T00:00:00 | [
[
"Aouiche",
"Kamel",
""
],
[
"Lemire",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0703059 | J. M. Landsberg | J.M. Landsberg | Geometry and the complexity of matrix multiplication | 34 pages, 4 figures | null | null | null | cs.CC math.AG math.RT | null | We survey results in algebraic complexity theory, focusing on matrix
multiplication. Our goals are
(i.) to show how open questions in algebraic complexity theory are naturally
posed as questions in geometry and representation theory, (ii.) to motivate
researchers to work on these questions, and (iii.) to point out relations with
more general problems in geometry. The key geometric objects for our study are
the secant varieties of Segre varieties. We explain how these varieties are
also useful for algebraic statistics, the study of phylogenetic invariants, and
quantum computing.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 22:11:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Landsberg",
"J. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
] |
cs/0703060 | Florentin Smarandache | Jose L. Salmeron, Florentin Smarandache | Redesigning Decision Matrix Method with an indeterminacy-based inference
process | 12 pages, 4 figures, one table | A short version published in Advances in Fuzzy Sets and Systems,
Vol. 1(2), 263-271, 2006 | null | null | cs.AI | null | For academics and practitioners concerned with computers, business and
mathematics, one central issue is supporting decision makers. In this paper, we
propose a generalization of Decision Matrix Method (DMM), using Neutrosophic
logic. It emerges as an alternative to the existing logics and it represents a
mathematical model of uncertainty and indeterminacy. This paper proposes the
Neutrosophic Decision Matrix Method as a more realistic tool for decision
making. In addition, a de-neutrosophication process is included.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 02:18:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Salmeron",
"Jose L.",
""
],
[
"Smarandache",
"Florentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0703061 | Ralf Koetter | Ralf Koetter and Frank Kschischang | Coding for Errors and Erasures in Random Network Coding | This revised paper contains some minor changes and clarifications | null | null | null | cs.IT cs.NI math.IT | null | The problem of error-control in random linear network coding is considered. A
``noncoherent'' or ``channel oblivious'' model is assumed where neither
transmitter nor receiver is assumed to have knowledge of the channel transfer
characteristic. Motivated by the property that linear network coding is
vector-space preserving, information transmission is modelled as the injection
into the network of a basis for a vector space $V$ and the collection by the
receiver of a basis for a vector space $U$. A metric on the projective geometry
associated with the packet space is introduced, and it is shown that a minimum
distance decoder for this metric achieves correct decoding if the dimension of
the space $V \cap U$ is sufficiently large. If the dimension of each codeword
is restricted to a fixed integer, the code forms a subset of a finite-field
Grassmannian, or, equivalently, a subset of the vertices of the corresponding
Grassmann graph. Sphere-packing and sphere-covering bounds as well as a
generalization of the Singleton bound are provided for such codes. Finally, a
Reed-Solomon-like code construction, related to Gabidulin's construction of
maximum rank-distance codes, is described and a Sudan-style ``list-1'' minimum
distance decoding algorithm is provided.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 07:43:46 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2008 16:29:01 GMT"
}
] | 2008-03-25T00:00:00 | [
[
"Koetter",
"Ralf",
""
],
[
"Kschischang",
"Frank",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703062 | Remi Munos | Pierre-Arnaud Coquelin (CMAP), R\'emi Munos (INRIA Futurs) | Bandit Algorithms for Tree Search | null | null | null | null | cs.LG | null | Bandit based methods for tree search have recently gained popularity when
applied to huge trees, e.g. in the game of go (Gelly et al., 2006). The UCT
algorithm (Kocsis and Szepesvari, 2006), a tree search method based on Upper
Confidence Bounds (UCB) (Auer et al., 2002), is believed to adapt locally to
the effective smoothness of the tree. However, we show that UCT is too
``optimistic'' in some cases, leading to a regret O(exp(exp(D))) where D is the
depth of the tree. We propose alternative bandit algorithms for tree search.
First, a modification of UCT using a confidence sequence that scales
exponentially with the horizon depth is proven to have a regret O(2^D
\sqrt{n}), but does not adapt to possible smoothness in the tree. We then
analyze Flat-UCB performed on the leaves and provide a finite regret bound with
high probability. Then, we introduce a UCB-based Bandit Algorithm for Smooth
Trees which takes into account actual smoothness of the rewards for performing
efficient ``cuts'' of sub-optimal branches with high confidence. Finally, we
present an incremental tree search version which applies when the full tree is
too big (possibly infinite) to be entirely represented and show that with high
probability, essentially only the optimal branches is indefinitely developed.
We illustrate these methods on a global optimization problem of a Lipschitz
function, given noisy data.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 08:53:41 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Coquelin",
"Pierre-Arnaud",
"",
"CMAP"
],
[
"Munos",
"Rémi",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0703063 | Konstantin Avrachenkov | Konstantin Avrachenkov (INRIA Sophia Antipolis), Urtzi Ayesta (LAAS),
Alexei Piunovskiy | Convergence and Optimal Buffer Sizing for Window Based AIMD Congestion
Control | null | null | null | null | cs.NI | null | We study the interaction between the AIMD (Additive Increase Multiplicative
Decrease) congestion control and a bottleneck router with Drop Tail buffer. We
consider the problem in the framework of deterministic hybrid models. First, we
show that the hybrid model of the interaction between the AIMD congestion
control and bottleneck router always converges to a cyclic behavior. We
characterize the cycles. Necessary and sufficient conditions for the absence of
multiple jumps of congestion window in the same cycle are obtained. Then, we
propose an analytical framework for the optimal choice of the router buffer
size. We formulate the problem of the optimal router buffer size as a
multi-criteria optimization problem, in which the Lagrange function corresponds
to a linear combination of the average goodput and the average delay in the
queue. The solution to the optimization problem provides further evidence that
the buffer size should be reduced in the presence of traffic aggregation. Our
analytical results are confirmed by simulations performed with Simulink and the
NS simulator.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 09:00:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avrachenkov",
"Konstantin",
"",
"INRIA Sophia Antipolis"
],
[
"Ayesta",
"Urtzi",
"",
"LAAS"
],
[
"Piunovskiy",
"Alexei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703064 | Frank Stephan | Bakhadyr Khoussainov, Andre Nies, Sasha Rubin and Frank Stephan | Automatic Structures: Richness and Limitations | null | Logical Methods in Computer Science, Volume 3, Issue 2 (April 26,
2007) lmcs:2219 | 10.2168/LMCS-3(2:2)2007 | null | cs.DM cs.LO | null | We study the existence of automatic presentations for various algebraic
structures. An automatic presentation of a structure is a description of the
universe of the structure by a regular set of words, and the interpretation of
the relations by synchronised automata. Our first topic concerns characterising
classes of automatic structures. We supply a characterisation of the automatic
Boolean algebras, and it is proven that the free Abelian group of infinite
rank, as well as certain Fraisse limits, do not have automatic presentations.
In particular, the countably infinite random graph and the random partial order
do not have automatic presentations. Furthermore, no infinite integral domain
is automatic. Our second topic is the isomorphism problem. We prove that the
complexity of the isomorphism problem for the class of all automatic structures
is \Sigma_1^1-complete.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 09:38:05 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Apr 2007 11:42:01 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Khoussainov",
"Bakhadyr",
""
],
[
"Nies",
"Andre",
""
],
[
"Rubin",
"Sasha",
""
],
[
"Stephan",
"Frank",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703065 | Gabriel Istrate | Gabriel Istrate | Satisfying assignments of Random Boolean CSP: Clusters and Overlaps | null | null | null | null | cs.DM cond-mat.dis-nn cs.CC | null | The distribution of overlaps of solutions of a random CSP is an indicator of
the overall geometry of its solution space. For random $k$-SAT, nonrigorous
methods from Statistical Physics support the validity of the ``one step replica
symmetry breaking'' approach. Some of these predictions were rigorously
confirmed in \cite{cond-mat/0504070/prl} \cite{cond-mat/0506053}. There it is
proved that the overlap distribution of random $k$-SAT, $k\geq 9$, has
discontinuous support. Furthermore, Achlioptas and Ricci-Tersenghi proved that,
for random $k$-SAT, $k\geq 8$. and constraint densities close enough to the
phase transition there exists an exponential number of clusters of satisfying
assignments; moreover, the distance between satisfying assignments in different
clusters is linear.
We aim to understand the structural properties of random CSP that lead to
solution clustering. To this end, we prove two results on the cluster structure
of solutions for binary CSP under the random model from Molloy (STOC 2002)
1. For all constraint sets $S$ (described explicitly in Creignou and Daude
(2004), Istrate (2005)) s.t. $SAT(S)$ has a sharp threshold and all $q\in
(0,1]$, $q$-overlap-$SAT(S)$ has a sharp threshold (i.e. the first step of the
approach in Mora et al. works in all nontrivial cases). 2. For any constraint
density value $c<1$, the set of solutions of a random instance of 2-SAT form,
w.h.p., a single cluster. Also, for and any $q\in (0,1]$ such an instance has
w.h.p. two satisfying assignment of overlap $\sim q$. Thus, as expected from
Statistical Physics predictions, the second step of the approach in Mora et al.
fails for 2-SAT.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 15:45:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703066 | Gerard Cohen | Charon Cohen, Hudry Lobstein | Discriminating and Identifying Codes in the Binary Hamming Space | null | null | null | null | cs.DM | null | Let $F^n$ be the binary $n$-cube, or binary Hamming space of dimension $n$,
endowed with the Hamming distance, and ${\cal E}^n$ (respectively, ${\cal
O}^n$) the set of vectors with even (respectively, odd) weight. For $r\geq 1$
and $x\in F^n$, we denote by $B_r(x)$ the ball of radius $r$ and centre $x$. A
code $C\subseteq F^n$ is said to be $r$-identifying if the sets $B_r(x) \cap
C$, $x\in F^n$, are all nonempty and distinct. A code $C\subseteq {\cal E}^n$
is said to be $r$-discriminating if the sets $B_r(x) \cap C$, $x\in {\cal
O}^n$, are all nonempty and distinct. We show that the two definitions, which
were given for general graphs, are equivalent in the case of the Hamming space,
in the following sense: for any odd $r$, there is a bijection between the set
of $r$-identifying codes in $F^n$ and the set of $r$-discriminating codes in
$F^{n+1}$. We then extend previous studies on constructive upper bounds for the
minimum cardinalities of identifying codes in the Hamming space.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 15:00:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Charon",
""
],
[
"Lobstein",
"Hudry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0703067 | Stephen Smith | Stephen L. Smith, Francesco Bullo | Target assignment for robotic networks: asymptotic performance under
limited communication | 2007 ACC paper including proofs; Corrected typos | null | null | null | cs.RO | null | We are given an equal number of mobile robotic agents, and distinct target
locations. Each agent has simple integrator dynamics, a limited communication
range, and knowledge of the position of every target. We address the problem of
designing a distributed algorithm that allows the group of agents to divide the
targets among themselves and, simultaneously, leads each agent to reach its
unique target. We do not require connectivity of the communication graph at any
time. We introduce a novel assignment-based algorithm with the following
features: initial assignments and robot motions follow a greedy rule, and
distributed refinements of the assignment exploit an implicit circular ordering
of the targets. We prove correctness of the algorithm, and give worst-case
asymptotic bounds on the time to complete the assignment as the environment
grows with the number of agents. We show that among a certain class of
distributed algorithms, our algorithm is asymptotically optimal. The analysis
utilizes results on the Euclidean traveling salesperson problem.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:20:45 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 19:57:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Stephen L.",
""
],
[
"Bullo",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0703068 | Vladimir Surkov | Kenneth R. Jackson, Sebastian Jaimungal, Vladimir Surkov | Option Valuation using Fourier Space Time Stepping | null | null | null | null | cs.CE | null | It is well known that the Black-Scholes-Merton model suffers from several
deficiencies. Jump-diffusion and Levy models have been widely used to partially
alleviate some of the biases inherent in this classical model. Unfortunately,
the resulting pricing problem requires solving a more difficult partial-integro
differential equation (PIDE) and although several approaches for solving the
PIDE have been suggested in the literature, none are entirely satisfactory. All
treat the integral and diffusive terms asymmetrically and are difficult to
extend to higher dimensions. We present a new, efficient algorithm, based on
transform methods, which symmetrically treats the diffusive and integrals
terms, is applicable to a wide class of path-dependent options (such as
Bermudan, barrier, and shout options) and options on multiple assets, and
naturally extends to regime-switching Levy models. We present a concise study
of the precision and convergence properties of our algorithm for several
classes of options and Levy models and demonstrate that the algorithm is
second-order in space and first-order in time for path-dependent options.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:48:42 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Mar 2007 20:49:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jackson",
"Kenneth R.",
""
],
[
"Jaimungal",
"Sebastian",
""
],
[
"Surkov",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0703069 | Paul Fodor | Paul Fodor | Portlet Wrappers using JavaScript | null | null | null | null | cs.SE | null | In this paper we extend the classical portal (with static portlets) design
with HTML DOM Web clipping on the client browser using dynamic JavaScript
portlets: the portal server supplies the user/passwords for all services
through https and the client browser retrieves web pages and
cuts/selects/changes the desired parts using paths (XPath) in the Web page
structure. This operation brings along a set of advantages: dynamic wrapping of
existing legacy websites in the client browser, the reloading of only changed
portlets instead of whole portal, low bandwidth on the server, the elimination
of re-writing the URL links in the portal, and last but not least, a support
for Java applets in portlets by putting the login cookies on the client
browser. Our solution is compliant with JSR168 Portlet Specification allowing
portability across all vendor platforms.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 23:32:43 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:46:21 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:02:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.