id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
cs/0702142
Daniel Lemire
Daniel Lemire, Martin Brooks, Yuhong Yan
An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation
Appeared in ICDM 2005
null
null
null
cs.DS cs.DB
null
Monotonicity is a simple yet significant qualitative characteristic. We consider the problem of segmenting an array in up to K segments. We want segments to be as monotonic as possible and to alternate signs. We propose a quality metric for this problem, present an optimal linear time algorithm based on novel formalism, and compare experimentally its performance to a linear time top-down regression algorithm. We show that our algorithm is faster and more accurate. Applications include pattern recognition and qualitative modeling.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 02:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Brooks", "Martin", "" ], [ "Yan", "Yuhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0702143
Daniel Lemire
Owen Kaser, Daniel Lemire
Attribute Value Reordering For Efficient Hybrid OLAP
null
Owen Kaser, Daniel Lemire, Attribute Value Reordering For Efficient Hybrid OLAP, Information Sciences, Volume 176, Issue 16, 2006, Pages 2304-2336
10.1016/j.ins.2005.09.005
null
cs.DB
null
The normalization of a data cube is the ordering of the attribute values. For large multidimensional arrays where dense and sparse chunks are stored differently, proper normalization can lead to improved storage efficiency. We show that it is NP-hard to compute an optimal normalization even for 1x3 chunks, although we find an exact algorithm for 1x2 chunks. When dimensions are nearly statistically independent, we show that dimension-wise attribute frequency sorting is an optimal normalization and takes time O(d n log(n)) for data cubes of size n^d. When dimensions are not independent, we propose and evaluate several heuristics. The hybrid OLAP (HOLAP) storage mechanism is already 19%-30% more efficient than ROLAP, but normalization can improve it further by 9%-13% for a total gain of 29%-44% over ROLAP.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 03:11:09 GMT" } ]
2012-01-16T00:00:00
[ [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0702144
Daniel Lemire
Daniel Lemire, Anna Maclachlan
Slope One Predictors for Online Rating-Based Collaborative Filtering
In SIAM Data Mining (SDM'05), Newport Beach, California, April 21-23, 2005
null
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rating-based collaborative filtering is the process of predicting how a user would rate a given item from other user ratings. We propose three related slope one schemes with predictors of the form f(x) = x + b, which precompute the average difference between the ratings of one item and another for users who rated both. Slope one algorithms are easy to implement, efficient to query, reasonably accurate, and they support both online queries and dynamic updates, which makes them good candidates for real-world systems. The basic slope one scheme is suggested as a new reference scheme for collaborative filtering. By factoring in items that a user liked separately from items that a user disliked, we achieve results competitive with slower memory-based schemes over the standard benchmark EachMovie and Movielens data sets while better fulfilling the desiderata of CF applications.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 03:16:27 GMT" }, { "version": "v2", "created": "Mon, 15 Sep 2008 19:57:44 GMT" } ]
2018-10-16T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Maclachlan", "Anna", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702145
Srikumar Venugopal
Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar Buyya
Designing a Resource Broker for Heterogeneous Grids
26 pages, 15 figures
null
null
GRIDS-TR-2007-2
cs.DC cs.SE
null
Grids provide uniform access to aggregations of heterogeneous resources and services such as computers, networks and storage owned by multiple organizations. However, such a dynamic environment poses many challenges for application composition and deployment. In this paper, we present the design of the Gridbus Grid resource broker that allows users to create applications and specify different objectives through different interfaces without having to deal with the complexity of Grid infrastructure. We present the unique requirements that motivated our design and discuss how these provide flexibility in extending the functionality of the broker to support different low-level middlewares and user interfaces. We evaluate the broker with different job profiles and Grid middleware and conclude with the lessons learnt from our development experience.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 08:35:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Venugopal", "Srikumar", "" ], [ "Nadiminti", "Krishna", "" ], [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0702146
Weiyu Xu
Weiyu Xu
A Local Tree Structure is NOT Sufficient for the Local Optimality of Message-Passing Decoding in Low Density Parity Check Codes
Comments, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We address the problem,`Is a local tree structure sufficient for the local optimality of message passing algorithm in low density parity check codes?'.It is shown that the answer is negative. Using this observation, we pinpoint a flaw in the proof of Theorem 1 in the paper `The Capacity of Low-Density Parity-Check Codes Under Message-Passing Decoding' by Thomas J. Richardson and R\"udiger L.Urbanke\cite{RUCapacity}. We further provide a new proof of that theorem based on a different argument.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 03:22:35 GMT" } ]
2007-07-13T00:00:00
[ [ "Xu", "Weiyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702147
Weiyu Xu
Weiyu Xu, Babak Hassibi
On the Complexity of Exact Maximum-Likelihood Decoding for Asymptotically Good Low Density Parity Check Codes
an attempt at exploring the communication complexity limit,5 pages,submitted to 2007 IEEE International Symposium on Information Theory (ISIT 2007)
null
10.1109/ITW.2007.4313065
null
cs.IT math.IT
null
Since the classical work of Berlekamp, McEliece and van Tilborg, it is well known that the problem of exact maximum-likelihood (ML) decoding of general linear codes is NP-hard. In this paper, we show that exact ML decoding of a classs of asymptotically good error correcting codes--expander codes, a special case of low density parity check (LDPC) codes--over binary symmetric channels (BSCs) is possible with an expected polynomial complexity. More precisely, for any bit-flipping probability, $p$, in a nontrivial range, there exists a rate region of non-zero support and a family of asymptotically good codes, whose error probability decays exponentially in coding length $n$, for which ML decoding is feasible in expected polynomial time. Furthermore, as $p$ approaches zero, this rate region approaches the channel capacity region. The result is based on the existence of polynomial-time suboptimal decoding algorithms that provide an ML certificate and the ability to compute the probability that the suboptimal decoder yields the ML solution. One such ML certificate decoder is the LP decoder of Feldman; we also propose a more efficient $O(n^2)$ algorithm based on the work of Sipser and Spielman and the Ford-Fulkerson algorithm. The results can be extended to AWGN channels and suggest that it may be feasible to eliminate the error floor phenomenon associated with message-passage decoding of LDPC codes in the high SNR regime. Finally, we observe that the argument of Berlekamp, McEliece and van Tilborg can be used to show that ML decoding of the considered class of codes constructed from LDPC codes with regular left degree, of which the considered expander codes are a special case, remains NP-hard; thus giving an interesting contrast between the worst-case and expected complexities.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 03:37:48 GMT" } ]
2016-11-17T00:00:00
[ [ "Xu", "Weiyu", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702148
Roderick Melnik
Roderick V.N. Melnik
Linking Microscopic and Macroscopic Models for Evolution: Markov Chain Network Training and Conservation Law Approximations
21 pages, 5 figures
Markov Chain network training and conservation law approximations: Linking microscopic and macroscopic models for evolution, Melnik, R.V.N., Applied Mathematics and Computation, 199 (1), 315--333, 2008
null
null
cs.CE cs.IT cs.NA cs.NE math.IT
null
In this paper, a general framework for the analysis of a connection between the training of artificial neural networks via the dynamics of Markov chains and the approximation of conservation law equations is proposed. This framework allows us to demonstrate an intrinsic link between microscopic and macroscopic models for evolution via the concept of perturbed generalized dynamic systems. The main result is exemplified with a number of illustrative examples where efficient numerical approximations follow directly from network-based computational models, viewed here as Markov chain approximations. Finally, stability and consistency conditions of such computational models are discussed.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 11:19:25 GMT" } ]
2010-04-14T00:00:00
[ [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702149
Roderick Melnik
Roderick V.N. Melnik
Coupling Control and Human-Centered Automation in Mathematical Models of Complex Systems
19 pages
null
null
null
cs.CE cs.AI cs.HC cs.IT math.IT
null
In this paper we analyze mathematically how human factors can be effectively incorporated into the analysis and control of complex systems. As an example, we focus our discussion around one of the key problems in the Intelligent Transportation Systems (ITS) theory and practice, the problem of speed control, considered here as a decision making process with limited information available. The problem is cast mathematically in the general framework of control problems and is treated in the context of dynamically changing environments where control is coupled to human-centered automation. Since in this case control might not be limited to a small number of control settings, as it is often assumed in the control literature, serious difficulties arise in the solution of this problem. We demonstrate that the problem can be reduced to a set of Hamilton-Jacobi-Bellman equations where human factors are incorporated via estimations of the system Hamiltonian. In the ITS context, these estimations can be obtained with the use of on-board equipment like sensors/receivers/actuators, in-vehicle communication devices, etc. The proposed methodology provides a way to integrate human factor into the solving process of the models for other complex dynamic systems.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 11:09:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702150
Robert Gray
Robert M. Gray and Takeshi Hashimoto
A note on rate-distortion functions for nonstationary Gaussian autoregressive processes
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Source coding theorems and Shannon rate-distortion functions were studied for the discrete-time Wiener process by Berger and generalized to nonstationary Gaussian autoregressive processes by Gray and by Hashimoto and Arimoto. Hashimoto and Arimoto provided an example apparently contradicting the methods used in Gray, implied that Gray's rate-distortion evaluation was not correct in the nonstationary case, and derived a new formula that agreed with previous results for the stationary case and held in the nonstationary case. In this correspondence it is shown that the rate-distortion formulas of Gray and Hashimoto and Arimoto are in fact consistent and that the example of of Hashimoto and Arimoto does not form a counter example to the methods or results of the earlier paper. Their results do provide an alternative, but equivalent, formula for the rate-distortion function in the nonstationary case and they provide a concrete example that the classic Kolmogorov formula differs from the autoregressive formula when the autoregressive source is not stationary. Some observations are offered on the different versions of the Toeplitz asymptotic eigenvalue distribution theorem used in the two papers to emphasize how a slight modification of the classic theorem avoids the problems with certain singularities.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 16:47:29 GMT" } ]
2007-07-16T00:00:00
[ [ "Gray", "Robert M.", "" ], [ "Hashimoto", "Takeshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702151
Vladimir Braverman
Vladimir Braverman, Rafail Ostrovsky, Carlo Zaniolo
Succinct Sampling on Streams
null
null
null
null
cs.DS
null
A streaming model is one where data items arrive over long period of time, either one item at a time or in bursts. Typical tasks include computing various statistics over a sliding window of some fixed time-horizon. What makes the streaming model interesting is that as the time progresses, old items expire and new ones arrive. One of the simplest and central tasks in this model is sampling. That is, the task of maintaining up to $k$ uniformly distributed items from a current time-window as old items expire and new ones arrive. We call sampling algorithms {\bf succinct} if they use provably optimal (up to constant factors) {\bf worst-case} memory to maintain $k$ items (either with or without replacement). We stress that in many applications structures that have {\em expected} succinct representation as the time progresses are not sufficient, as small probability events eventually happen with probability 1. Thus, in this paper we ask the following question: are Succinct Sampling on Streams (or $S^3$-algorithms)possible, and if so for what models? Perhaps somewhat surprisingly, we show that $S^3$-algorithms are possible for {\em all} variants of the problem mentioned above, i.e. both with and without replacement and both for one-at-a-time and bursty arrival models. Finally, we use $S^3$ algorithms to solve various problems in sliding windows model, including frequency moments, counting triangles, entropy and density estimations. For these problems we present \emph{first} solutions with provable worst-case memory guarantees.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 17:20:48 GMT" }, { "version": "v2", "created": "Tue, 27 Feb 2007 22:12:14 GMT" }, { "version": "v3", "created": "Mon, 14 Apr 2008 16:30:01 GMT" } ]
2008-04-14T00:00:00
[ [ "Braverman", "Vladimir", "" ], [ "Ostrovsky", "Rafail", "" ], [ "Zaniolo", "Carlo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702152
Andrew Gacek
Andrew Gacek and Gopalan Nadathur
A Simplified Suspension Calculus and its Relationship to Other Explicit Substitution Calculi
38 pages
null
null
null
cs.LO
null
This paper concerns the explicit treatment of substitutions in the lambda calculus. One of its contributions is the simplification and rationalization of the suspension calculus that embodies such a treatment. The earlier version of this calculus provides a cumbersome encoding of substitution composition, an operation that is important to the efficient realization of reduction. This encoding is simplified here, resulting in a treatment that is easy to use directly in applications. The rationalization consists of the elimination of a practically inconsequential flexibility in the unravelling of substitutions that has the inadvertent side effect of losing contextual information in terms; the modified calculus now has a structure that naturally supports logical analyses, such as ones related to the assignment of types, over lambda terms. The overall calculus is shown to have pleasing theoretical properties such as a strongly terminating sub-calculus for substitution and confluence even in the presence of term meta variables that are accorded a grafting interpretation. Another contribution of the paper is the identification of a broad set of properties that are desirable for explicit substitution calculi to support and a classification of a variety of proposed systems based on these. The suspension calculus is used as a tool in this study. In particular, mappings are described between it and the other calculi towards understanding the characteristics of the latter.
[ { "version": "v1", "created": "Mon, 26 Feb 2007 02:16:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Gacek", "Andrew", "" ], [ "Nadathur", "Gopalan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702153
Kyle Burke
Kyle Burke and Shang-Hua Teng
Games on the Sperner Triangle
18 pages, 19 figures. Uses paithan.sty
null
null
null
cs.GT cs.CC
null
We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems.
[ { "version": "v1", "created": "Mon, 26 Feb 2007 05:00:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Burke", "Kyle", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702154
Lawrence Ong
Lawrence Ong and Mehul Motani
On the Capacity of the Single Source Multiple Relay Single Destination Mesh Network
to appear in Elsevier Ad Hoc Networks: Special Issue on Wireless Mesh Networks, accepted on 9 Dec. 2006
Elsevier Ad Hoc Networks: Special Issue on Wireless Mesh Networks, Vol. 5, No. 6, pp. 786-800, Aug. 2007.
10.1016/j.adhoc.2006.12.006
null
cs.IT cs.NI math.IT
null
In this paper, we derive the information theoretic capacity of a special class of mesh networks. A mesh network is a heterogeneous wireless network in which the transmission among power limited nodes is assisted by powerful relays, which use the same wireless medium. We investigate the mesh network when there is one source, one destination, and multiple relays, which we call the single source multiple relay single destination (SSMRSD) mesh network. We derive the asymptotic capacity of the SSMRSD mesh network when the relay powers grow to infinity. Our approach is as follows. We first look at an upper bound on the information theoretic capacity of these networks in a Gaussian setting. We then show that this bound is achievable asymptotically using the compress-and-forward strategy for the multiple relay channel. We also perform numerical computations for the case when the relays have finite powers. We observe that even when the relay power is only a few times larger than the source power, the compress-and-forward rate gets close to the capacity. The results indicate the value of cooperation in wireless mesh networks. The capacity characterization quantifies how the relays can cooperate, using the compress-and-forward strategy, to either conserve node energy or to increase transmission rate.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 06:24:12 GMT" } ]
2010-04-15T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702155
Maurice Margenstern
Maurice Margenstern
On a characterization of cellular automata in tilings of the hyperbolic plane
null
International Journal of Foundations of Computer Science, volume 19,(5), (2008), 1235-1257
null
null
cs.DM cs.CG
null
In this paper, we look at the extention of Hedlund's characterization of cellular automata to the case of cellular automata in the hyperbolic plane. This requires an additionnal condition. The new theorem is proved with full details in the case of the pentagrid and in the case of the ternary heptagrid and enough indications to show that it holds also on the grids $\{p,q\}$ of the hyperbolic plane.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 09:17:05 GMT" } ]
2011-03-29T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0702156
Philippe Robert
Fabrice Guillemin, Philippe Robert (INRIA Rocquencourt)
Analysis of Steiner subtrees of Random Trees for Traceroute Algorithms
null
Random Structures and Algorithms, 35(2):194-215, September 2009
null
null
cs.NI cs.DS
null
We consider in this paper the problem of discovering, via a traceroute algorithm, the topology of a network, whose graph is spanned by an infinite branching process. A subset of nodes is selected according to some criterion. As a measure of efficiency of the algorithm, the Steiner distance of the selected nodes, i.e. the size of the spanning sub-tree of these nodes, is investigated. For the selection of nodes, two criteria are considered: A node is randomly selected with a probability, which is either independent of the depth of the node (uniform model) or else in the depth biased model, is exponentially decaying with respect to its depth. The limiting behavior the size of the discovered subtree is investigated for both models.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 13:42:28 GMT" }, { "version": "v2", "created": "Fri, 6 Jun 2008 10:11:43 GMT" } ]
2009-08-25T00:00:00
[ [ "Guillemin", "Fabrice", "", "INRIA Rocquencourt" ], [ "Robert", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0702157
Matei Ripeanu
Matei Ripeanu, Adriana Iamnitchi, Ian Foster, Anne Rogers
In Search of Simplicity: A Self-Organizing Multi-Source Multicast Overlay
null
null
null
DSL-TR-2007-02
cs.DC cs.NI cs.PF
null
Multicast communication primitives have broad utility as building blocks for distributed applications. The challenge is to create and maintain the distributed structures that support these primitives while accounting for volatile end nodes and variable network characteristics. Most solutions proposed to date rely on complex algorithms or global information, thus limiting the scale of deployments and acceptance outside the academic realm. This article introduces a low-complexity, self organizing solution for maintaining multicast trees, that we refer to as UMM (Unstructured Multi-source Multicast). UMM uses traditional distributed systems techniques: layering, soft-state, and passive data collection to adapt to the dynamics of the physical network and maintain data dissemination trees. The result is a simple, adaptive system with lower overheads than more complex alternatives. We have implemented UMM and evaluated it on a 100-node PlanetLab testbed and on up to 1024-node emulated ModelNet networks Extensive experimental evaluations demonstrate UMM's low overhead, efficient network usage compared to alternative solutions, and ability to quickly adapt to network changes and to recover from failures.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 19:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ripeanu", "Matei", "" ], [ "Iamnitchi", "Adriana", "" ], [ "Foster", "Ian", "" ], [ "Rogers", "Anne", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0702158
Yunxia Chen
Yunxia Chen, Qing Zhao and Ananthram Swami
Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors
43 pages, 10 figures, submitted to IEEE Transactions on Information Theory in Feb. 2007
null
10.1109/TIT.2008.920248
null
cs.NI
null
We address the design of opportunistic spectrum access (OSA) strategies that allow secondary users to independently search for and exploit instantaneous spectrum availability. Integrated in the joint design are three basic components: a spectrum sensor that identifies spectrum opportunities, a sensing strategy that determines which channels in the spectrum to sense, and an access strategy that decides whether to access based on imperfect sensing outcomes. We formulate the joint PHY-MAC design of OSA as a constrained partially observable Markov decision process (POMDP). Constrained POMDPs generally require randomized policies to achieve optimality, which are often intractable. By exploiting the rich structure of the underlying problem, we establish a separation principle for the joint design of OSA. This separation principle reveals the optimality of myopic policies for the design of the spectrum sensor and the access strategy, leading to closed-form optimal solutions. Furthermore, decoupling the design of the sensing strategy from that of the spectrum sensor and the access strategy, the separation principle reduces the constrained POMDP to an unconstrained one, which admits deterministic optimal policies. Numerical examples are provided to study the design tradeoffs, the interaction between the spectrum sensor and the sensing and access strategies, and the robustness of the ensuing design to model mismatch.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 19:59:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Yunxia", "" ], [ "Zhao", "Qing", "" ], [ "Swami", "Ananthram", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0702159
Fabiano C. Botelho
Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani
Perfect Hashing for Data Management Applications
12 pages
null
null
RT.DCC.002/2007
cs.DS cs.DB
null
Perfect hash functions can potentially be used to compress data in connection with a variety of data management tasks. Though there has been considerable work on how to construct good perfect hash functions, there is a gap between theory and practice among all previous methods on minimal perfect hashing. On one side, there are good theoretical results without experimentally proven practicality for large key sets. On the other side, there are the theoretically analyzed time and space usage algorithms that assume that truly random hash functions are available for free, which is an unrealistic assumption. In this paper we attempt to bridge this gap between theory and practice, using a number of techniques from the literature to obtain a novel scheme that is theoretically well-understood and at the same time achieves an order-of-magnitude increase in performance compared to previous ``practical'' methods. This improvement comes from a combination of a novel, theoretically optimal perfect hashing scheme that greatly simplifies previous methods, and the fact that our algorithm is designed to make good use of the memory hierarchy. We demonstrate the scalability of our algorithm by considering a set of over one billion URLs from the World Wide Web of average length 64, for which we construct a minimal perfect hash function on a commodity PC in a little more than 1 hour. Our scheme produces minimal perfect hash functions using slightly more than 3 bits per key. For perfect hash functions in the range $\{0,...,2n-1\}$ the space usage drops to just over 2 bits per key (i.e., one bit more than optimal for representing the key). This is significantly below of what has been achieved previously for very large values of $n$.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 20:56:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Botelho", "Fabiano C.", "" ], [ "Pagh", "Rasmus", "" ], [ "Ziviani", "Nivio", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0702160
Fran\c{c}ois Pitt
Fran\c{c}ois Pitt
A Quantifier-Free String Theory for ALOGTIME Reasoning
147 pages, PhD thesis (completed in 2000)
null
null
null
cs.CC
null
The main contribution of this work is the definition of a quantifier-free string theory T_1 suitable for formalizing ALOGTIME reasoning. After describing L_1 -- a new, simple, algebraic characterization of the complexity class ALOGTIME based on strings instead of numbers -- the theory T_1 is defined (based on L_1), and a detailed formal development of T_1 is given. Then, theorems of T_1 are shown to translate into families of propositional tautologies that have uniform polysize Frege proofs, T_1 is shown to prove the soundness of a particular Frege system F, and F is shown to provably p-simulate any proof system whose soundness can be proved in T_1. Finally, T_1 is compared with other theories for ALOGTIME reasoning in the literature. To our knowledge, this is the first formal theory for ALOGTIME reasoning whose basic objects are strings instead of numbers, and the first quantifier-free theory formalizing ALOGTIME reasoning in which a direct proof of the soundness of some Frege system has been given (in the case of first-order theories, such a proof was first given by Arai for his theory AID). Also, the polysize Frege proofs we give for the propositional translations of theorems of T_1 are considerably simpler than those for other theories, and so is our proof of the soundness of a particular F-system in T_1. Together with the simplicity of T_1's recursion schemes, axioms, and rules these facts suggest that T_1 is one of the most natural theories available for ALOGTIME reasoning.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 02:59:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Pitt", "François", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0702161
Ying Wang
Ying Wang, Pierre Moulin
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
To appear in IEEE Trans. on Information Theory, June 2008; ignore Version 2 as the file was corrupted
null
10.1109/TIT.2008.921684
null
cs.IT cs.CR math.IT
null
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability distribution as the covertext. Then no statistical test can reliably detect the presence of the hidden message. We refer to such steganographic schemes as perfectly secure. A few such schemes have been proposed in recent literature, but they have vanishing rate. We prove that communication performance can potentially be vastly improved; specifically, our basic setup assumes independently and identically distributed (i.i.d.) covertext, and we construct perfectly secure steganographic codes from public watermarking codes using binning methods and randomized permutations of the code. The permutation is a secret key shared between encoder and decoder. We derive (positive) capacity and random-coding exponents for perfectly-secure steganographic systems. The error exponents provide estimates of the code length required to achieve a target low error probability. We address the potential loss in communication performance due to the perfect-security requirement. This loss is the same as the loss obtained under a weaker order-1 steganographic requirement that would just require matching of first-order marginals of the covertext and stegotext distributions. Furthermore, no loss occurs if the covertext distribution is uniform and the distortion metric is cyclically symmetric; steganographic capacity is then achieved by randomized linear codes. Our framework may also be useful for developing computationally secure steganographic systems that have near-optimal communication performance.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 03:39:08 GMT" }, { "version": "v2", "created": "Sat, 17 Nov 2007 15:12:11 GMT" }, { "version": "v3", "created": "Tue, 25 Dec 2007 06:49:19 GMT" } ]
2016-11-17T00:00:00
[ [ "Wang", "Ying", "" ], [ "Moulin", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702162
Gesualdo Scutari
Jong-Shi Pang, Gesualdo Scutari, Francisco Facchinei, and Chaoxiong Wang
Distributed Power Allocation with Rate Constraints in Gaussian Parallel Interference Channels
Paper submitted to IEEE Transactions on Information Theory, February 17, 2007. Revised January 11, 2008
null
null
null
cs.IT cs.GT math.IT
null
This paper considers the minimization of transmit power in Gaussian parallel interference channels, subject to a rate constraint for each user. To derive decentralized solutions that do not require any cooperation among the users, we formulate this power control problem as a (generalized) Nash equilibrium game. We obtain sufficient conditions that guarantee the existence and nonemptiness of the solution set to our problem. Then, to compute the solutions of the game, we propose two distributed algorithms based on the single user waterfilling solution: The \emph{sequential} and the \emph{simultaneous} iterative waterfilling algorithms, wherein the users update their own strategies sequentially and simultaneously, respectively. We derive a unified set of sufficient conditions that guarantee the uniqueness of the solution and global convergence of both algorithms. Our results are applicable to all practical distributed multipoint-to-multipoint interference systems, either wired or wireless, where a quality of service in terms of information rate must be guaranteed for each link.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 07:33:05 GMT" }, { "version": "v2", "created": "Fri, 18 Jan 2008 14:21:28 GMT" } ]
2011-11-09T00:00:00
[ [ "Pang", "Jong-Shi", "" ], [ "Scutari", "Gesualdo", "" ], [ "Facchinei", "Francisco", "" ], [ "Wang", "Chaoxiong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0702163
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
First Passage Time for Multivariate Jump-diffusion Stochastic Models With Applications in Finance
Keywords: Monte-Carlo simulations, first passage time, multivariate jump-diffusion process; 10 pages, 3 figures
null
null
null
cs.CE cs.NA
null
The ``first passage-time'' (FPT) problem is an important problem with a wide range of applications in mathematics, physics, biology and finance. Mathematically, such a problem can be reduced to estimating the probability of a (stochastic) process first to reach a critical level or threshold. While in other areas of applications the FPT problem can often be solved analytically, in finance we usually have to resort to the application of numerical procedures, in particular when we deal with jump-diffusion stochastic processes (JDP). In this paper, we develop a Monte-Carlo-based methodology for the solution of the FPT problem in the context of a multivariate jump-diffusion stochastic process. The developed methodology is tested by using different parameters, the simulation results indicate that the developed methodology is much more efficient than the conventional Monte Carlo method. It is an efficient tool for further practical applications, such as the analysis of default correlation and predicting barrier options in finance.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 10:39:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0702164
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
Monte-Carlo Simulations of the First Passage Time for Multivariate Jump-Diffusion Processes in Financial Applications
Keywords: First passage time; Monte Carlo simulation; Multivariate jump-diffusion processes; Credit risk
null
null
null
cs.CE cs.NA
null
Many problems in finance require the information on the first passage time (FPT) of a stochastic process. Mathematically, such problems are often reduced to the evaluation of the probability density of the time for such a process to cross a certain level, a boundary, or to enter a certain region. While in other areas of applications the FPT problem can often be solved analytically, in finance we usually have to resort to the application of numerical procedures, in particular when we deal with jump-diffusion stochastic processes (JDP). In this paper, we propose a Monte-Carlo-based methodology for the solution of the first passage time problem in the context of multivariate (and correlated) jump-diffusion processes. The developed technique provide an efficient tool for a number of applications, including credit risk and option pricing. We demonstrate its applicability to the analysis of the default rates and default correlations of several different, but correlated firms via a set of empirical data.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 10:51:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0702165
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
Efficient estimation of default correlation for multivariate jump-diffusion processes
Keywords: Default correlation, First passage time problem, Monte Carlo simulation
null
null
null
cs.CE cs.NA
null
Evaluation of default correlation is an important task in credit risk analysis. In many practical situations, it concerns the joint defaults of several correlated firms, the task that is reducible to a first passage time (FPT) problem. This task represents a great challenge for jump-diffusion processes (JDP), where except for very basic cases, there are no analytical solutions for such problems. In this contribution, we generalize our previous fast Monte-Carlo method (non-correlated jump-diffusion cases) for multivariate (and correlated) jump-diffusion processes. This generalization allows us, among other things, to evaluate the default events of several correlated assets based on a set of empirical data. The developed technique is an efficient tool for a number of other applications, including credit risk and option pricing.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 11:22:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0702166
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
Solving Stochastic Differential Equations with Jump-Diffusion Efficiently: Applications to FPT Problems in Credit Risk
Keywords: Default Correlation, First Passage Time, Multivariate Jump-Diffusion Processes, Monte-Carlo Simulation, Multivariate Uniform Sampling Method
null
null
null
cs.CE cs.NA
null
The first passage time (FPT) problem is ubiquitous in many applications. In finance, we often have to deal with stochastic processes with jump-diffusion, so that the FTP problem is reducible to a stochastic differential equation with jump-diffusion. While the application of the conventional Monte-Carlo procedure is possible for the solution of the resulting model, it becomes computationally inefficient which severely restricts its applicability in many practically interesting cases. In this contribution, we focus on the development of efficient Monte-Carlo-based computational procedures for solving the FPT problem under the multivariate (and correlated) jump-diffusion processes. We also discuss the implementation of the developed Monte-Carlo-based technique for multivariate jump-diffusion processes driving by several compound Poisson shocks. Finally, we demonstrate the application of the developed methodologies for analyzing the default rates and default correlations of differently rated firms via historical data.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 11:48:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0702167
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Finite Volume Analysis of Nonlinear Thermo-mechanical Dynamics of Shape Memory Alloys
Keywords: shape memory alloys, phase transformations, nonlinear thermo-elasticity, finite volume method
null
null
null
cs.CE cs.NA
null
In this paper, the finite volume method is developed to analyze coupled dynamic problems of nonlinear thermoelasticity. The major focus is given to the description of martensitic phase transformations essential in the modelling of shape memory alloys. Computational experiments are carried out to study the thermo-mechanical wave interactions in a shape memory alloy rod, and a patch. Both mechanically and thermally induced phase transformations, as well as hysteresis effects, in a one-dimensional structure are successfully simulated with the developed methodology. In the two-dimensional case, the main focus is given to square-to-rectangular transformations and examples of martensitic combinations under different mechanical loadings are provided.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 13:00:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0702168
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Simulation of Phase Combinations in Shape Memory Alloys Patches by Hybrid Optimization Methods
Keywords: phase combinations, shape memory alloys, variational problem, genetic algorithm, quasi-Newton methods
null
null
null
cs.CE cs.NA
null
In this paper, phase combinations among martensitic variants in shape memory alloys patches and bars are simulated by a hybrid optimization methodology. The mathematical model is based on the Landau theory of phase transformations. Each stable phase is associated with a local minimum of the free energy function, and the phase combinations are simulated by minimizing the bulk energy. At low temperature, the free energy function has double potential wells leading to non-convexity of the optimization problem. The methodology proposed in the present paper is based on an initial estimate of the global solution by a genetic algorithm, followed by a refined quasi-Newton procedure to locally refine the optimum. By combining the local and global search algorithms, the phase combinations are successfully simulated. Numerical experiments are presented for the phase combinations in a SMA patch under several typical mechanical loadings.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 14:09:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0702169
James Laird
James Laird
Bistable Biorders: A Sequential Domain Theory
To appear in LMCS
Logical Methods in Computer Science, Volume 3, Issue 2 (May 15, 2007) lmcs:2222
10.2168/LMCS-3(2:5)2007
null
cs.PL cs.LO
null
We give a simple order-theoretic construction of a Cartesian closed category of sequential functions. It is based on bistable biorders, which are sets with a partial order -- the extensional order -- and a bistable coherence, which captures equivalence of program behaviour, up to permutation of top (error) and bottom (divergence). We show that monotone and bistable functions (which are required to preserve bistably bounded meets and joins) are strongly sequential, and use this fact to prove universality results for the bistable biorder semantics of the simply-typed lambda-calculus (with atomic constants), and an extension with arithmetic and recursion. We also construct a bistable model of SPCF, a higher-order functional programming language with non-local control. We use our universality result for the lambda-calculus to show that the semantics of SPCF is fully abstract. We then establish a direct correspondence between bistable functions and sequential algorithms by showing that sequential data structures give rise to bistable biorders, and that each bistable function between such biorders is computed by a sequential algorithm.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 14:57:27 GMT" }, { "version": "v2", "created": "Tue, 15 May 2007 12:31:57 GMT" } ]
2017-01-11T00:00:00
[ [ "Laird", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702170
Peter Tiedemann
Peter Tiedemann, Henrik Reif Andersen, Rasmus Pagh
Generic Global Constraints based on MDDs
Preliminary 15 pages version of the tech-report cs.AI/0611141
null
null
null
cs.AI
null
Constraint Programming (CP) has been successfully applied to both constraint satisfaction and constraint optimization problems. A wide variety of specialized global constraints provide critical assistance in achieving a good model that can take advantage of the structure of the problem in the search for a solution. However, a key outstanding issue is the representation of 'ad-hoc' constraints that do not have an inherent combinatorial nature, and hence are not modeled well using narrowly specialized global constraints. We attempt to address this issue by considering a hybrid of search and compilation. Specifically we suggest the use of Reduced Ordered Multi-Valued Decision Diagrams (ROMDDs) as the supporting data structure for a generic global constraint. We give an algorithm for maintaining generalized arc consistency (GAC) on this constraint that amortizes the cost of the GAC computation over a root-to-leaf path in the search tree without requiring asymptotically more space than used for the MDD. Furthermore we present an approach for incrementally maintaining the reduced property of the MDD during the search, and show how this can be used for providing domain entailment detection. Finally we discuss how to apply our approach to other similar data structures such as AOMDDs and Case DAGs. The technique used can be seen as an extension of the GAC algorithm for the regular language constraint on finite length input.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 15:32:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Tiedemann", "Peter", "" ], [ "Andersen", "Henrik Reif", "" ], [ "Pagh", "Rasmus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0702171
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom, Grzegorz Rozenberg
How Overlap Determines the Macronuclear Genes in Ciliates
22 pages, 14 figures
null
null
LIACS Technical Report 2007-02
cs.LO
null
Formal models for gene assembly in ciliates have been developed, in particular the string pointer reduction system (SPRS) and the graph pointer reduction system (GPRS). The reduction graph is a valuable tool within the SPRS, revealing much information about how gene assembly is performed for a given gene. The GPRS is more abstract than the SPRS and not all information present in the SPRS is retained in the GPRS. As a consequence the reduction graph cannot be defined for the GPRS in general, but we show that it can be defined (in an equivalent manner as defined for the SPRS) if we restrict ourselves to so-called realistic overlap graphs. Fortunately, only these graphs correspond to genes occurring in nature. Defining the reduction graph within the GPRS allows one to carry over several results within the SPRS that rely on the reduction graph.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 15:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ], [ "Rozenberg", "Grzegorz", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0702172
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Numerical Model For Vibration Damping Resulting From the First Order Phase Transformations
Keywords: martensite transformation, thermo-mechanical coupling, vibration damping, Ginzburg-Landau theory
null
null
null
cs.CE cs.NA
null
A numerical model is constructed for modelling macroscale damping effects induced by the first order martensite phase transformations in a shape memory alloy rod. The model is constructed on the basis of the modified Landau-Ginzburg theory that couples nonlinear mechanical and thermal fields. The free energy function for the model is constructed as a double well function at low temperature, such that the external energy can be absorbed during the phase transformation and converted into thermal form. The Chebyshev spectral methods are employed together with backward differentiation for the numerical analysis of the problem. Computational experiments performed for different vibration energies demonstrate the importance of taking into account damping effects induced by phase transformations.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 18:31:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0703001
Michael Coury
Michael D. Coury
Embedding Graphs into the Extended Grid
4 pages, 2 figures
null
null
null
cs.DM cs.DS
null
Let $G=(V,E)$ be an arbitrary undirected source graph to be embedded in a target graph $EM$, the extended grid with vertices on integer grid points and edges to nearest and next-nearest neighbours. We present an algorithm showing how to embed $G$ into $EM$ in both time and space $O(|V|^2)$ using the new notions of islands and bridges. An island is a connected subgraph in the target graph which is mapped from exactly one vertex in the source graph while a bridge is an edge between two islands which is mapped from exactly one edge in the source graph. This work is motivated by real industrial applications in the field of quantum computing and a need to efficiently embed source graphs in the extended grid.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 22:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Coury", "Michael D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703002
Plamen Simeonov L.
Plamen L. Simeonov
Integral Biomathics: A Post-Newtonian View into the Logos of Bios (On the New Meaning, Relations and Principles of Life in Science)
85 pages, 6 figures
Progress in Biophysics and Molecular Biology, Vol. 102, Issues 2-3, 2010, pp. 85-121
10.1016/j.pbiomolbio.2010.01.005
null
cs.NE cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work is an attempt for a state-of-the-art survey of natural and life sciences with the goal to define the scope and address the central questions of an original research program. It is focused on the phenomena of emergence, adaptive dynamics and evolution of self-assembling, self-organizing, self-maintaining and self-replicating biosynthetic systems viewed from a newly-arranged perspective and understanding of computation and communication in the living nature.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 22:52:43 GMT" }, { "version": "v2", "created": "Fri, 30 Mar 2007 08:35:36 GMT" }, { "version": "v3", "created": "Tue, 3 Apr 2007 13:54:13 GMT" }, { "version": "v4", "created": "Mon, 11 Jun 2007 16:48:17 GMT" }, { "version": "v5", "created": "Tue, 17 Jul 2007 15:47:18 GMT" }, { "version": "v6", "created": "Fri, 21 Dec 2007 15:53:14 GMT" }, { "version": "v7", "created": "Mon, 31 Dec 2007 20:30:16 GMT" }, { "version": "v8", "created": "Fri, 4 Jan 2008 01:48:58 GMT" }, { "version": "v9", "created": "Fri, 5 Feb 2010 12:03:19 GMT" } ]
2015-09-02T00:00:00
[ [ "Simeonov", "Plamen L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703003
M. H. van Emden
M.H. van Emden, B. Moa, and S.C. Somosan
Functions to Support Input and Output of Intervals
16 pages, 13 figures with listings
null
null
DCS-311-IR
cs.NA
null
Interval arithmetic is hardly feasible without directed rounding as provided, for example, by the IEEE floating-point standard. Equally essential for interval methods is directed rounding for conversion between the external decimal and internal binary numerals. This is not provided by the standard I/O libraries. Conversion algorithms exist that guarantee identity upon conversion followed by its inverse. Although it may be possible to adapt these algorithms for use in decimal interval I/O, we argue that outward rounding in radix conversion is computationally a simpler problem than guaranteeing identity. Hence it is preferable to develop decimal interval I/O ab initio, which is what we do in this paper.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 23:13:23 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ], [ "Moa", "B.", "" ], [ "Somosan", "S. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0703004
Francis Heylighen
Francis Heylighen
Accelerating Socio-Technological Evolution: from ephemeralization and stigmergy to the global brain
To appear in: "Globalization as an Evolutionary Process: Modeling Global Change", edited by George Modelski, Tessaleno Devezas, and William Thompson, London: Routledge
null
null
null
cs.CY cs.NI
null
Evolution is presented as a trial-and-error process that produces a progressive accumulation of knowledge. At the level of technology, this leads to ephemeralization, i.e. ever increasing productivity, or decreasing of the friction that normally dissipates resources. As a result, flows of matter, energy and information circulate ever more easily across the planet. This global connectivity increases the interactions between agents, and thus the possibilities for conflict. However, evolutionary progress also reduces social friction, via the creation of institutions. The emergence of such "mediators" is facilitated by stigmergy: the unintended collaboration between agents resulting from their actions on a shared environment. The Internet is a near ideal medium for stigmergic interaction. Quantitative stigmergy allows the web to learn from the activities of its users, thus becoming ever better at helping them to answer their queries. Qualitative stigmergy stimulates agents to collectively develop novel knowledge. Both mechanisms have direct analogues in the functioning of the human brain. This leads us to envision the future, super-intelligent web as a "global brain" for humanity. The feedback between social and technological advances leads to an extreme acceleration of innovation. An extrapolation of the corresponding hyperbolic growth model would forecast a singularity around 2040. This can be interpreted as the evolutionary transition to the Global Brain regime.
[ { "version": "v1", "created": "Thu, 1 Mar 2007 15:46:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Heylighen", "Francis", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703005
Young-Han Kim
Young-Han Kim, Arak Sutivong, and Thomas M. Cover
State Amplification
9 pages, 4 figures, submitted to IEEE Trans. Inform. Theory, revised
null
10.1109/TIT.2008.920242
null
cs.IT math.IT
null
We consider the problem of transmitting data at rate R over a state dependent channel p(y|x,s) with the state information available at the sender and at the same time conveying the information about the channel state itself to the receiver. The amount of state information that can be learned at the receiver is captured by the mutual information I(S^n; Y^n) between the state sequence S^n and the channel output Y^n. The optimal tradeoff is characterized between the information transmission rate R and the state uncertainty reduction rate \Delta, when the state information is either causally or noncausally available at the sender. This result is closely related and in a sense dual to a recent study by Merhav and Shamai, which solves the problem of masking the state information from the receiver rather than conveying it.
[ { "version": "v1", "created": "Thu, 1 Mar 2007 17:59:25 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2008 08:03:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Kim", "Young-Han", "" ], [ "Sutivong", "Arak", "" ], [ "Cover", "Thomas M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703006
Jingchao Chen
Jing-Chao Chen
XORSAT: An Efficient Algorithm for the DIMACS 32-bit Parity Problem
null
null
null
null
cs.DS
null
The DIMACS 32-bit parity problem is a satisfiability (SAT) problem hard to solve. So far, EqSatz by Li is the only solver which can solve this problem. However, This solver is very slow. It is reported that it spent 11855 seconds to solve a par32-5 instance on a Maxintosh G3 300 MHz. The paper introduces a new solver, XORSAT, which splits the original problem into two parts: structured part and random part, and then solves separately them with WalkSAT and an XOR equation solver. Based our empirical observation, XORSAT is surprisingly fast, which is approximately 1000 times faster than EqSatz. For a par32-5 instance, XORSAT took 2.9 seconds, while EqSatz took 2844 seconds on Intel Pentium IV 2.66GHz CPU. We believe that this method significantly different from traditional methods is also useful beyond this domain.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 01:38:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Jing-Chao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703007
Yves Guiraud
Guillaume Bonfante, Yves Guiraud
Intensional properties of polygraphs
Proceedings of TERMGRAPH 2007, Electronic Notes in Computer Science (to appear), 12 pages, minor changes from previous version
Electronic Notes in Theoretical Computer Science 203(1):65-77 (2008)
10.1016/j.entcs.2008.03.034
null
cs.LO cs.CC math.CT
null
We present polygraphic programs, a subclass of Albert Burroni's polygraphs, as a computational model, showing how these objects can be seen as first-order functional programs. We prove that the model is Turing complete. We use polygraphic interpretations, a termination proof method introduced by the second author, to characterize polygraphic programs that compute in polynomial time. We conclude with a characterization of polynomial time functions and non-deterministic polynomial time functions.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 09:21:20 GMT" }, { "version": "v2", "created": "Tue, 20 Nov 2007 16:20:52 GMT" } ]
2008-10-07T00:00:00
[ [ "Bonfante", "Guillaume", "" ], [ "Guiraud", "Yves", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
cs/0703008
Francoise Detienne
Sophie Chatel, Fran\c{c}oise D\'etienne
Strategies in object-oriented design
null
Acta Psychologica 91 (1996) 245-269
null
null
cs.HC
null
This paper presents a study aiming to analyse the design strategies of experts in object-oriented programming. We report an experiment conducted with four experts. Each subject solved three problems. Our results show that three strategies may be used in program design according to the solution structure. An object-centred strategy and a function-centred strategy are used when the solution has a hierarchical structure with vertical communication between objects. In this case, the plan which guides the design activity is declarative. A procedure-centred strategy is used when the solution has a flat structure with horizontal communication between objects. In this case, the plan which guides the design activity is procedural. These results are discussed in relation with results on design strategies in procedural design. Furthermore, our results provide insight into the knowledge structures of experts in object-oriented design. To conclude, we point out limitations of this study and discuss implications of our results for Human-Computer Interaction systems, in particular for systems assisting experts in their design activity.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 12:50:12 GMT" } ]
2016-08-14T00:00:00
[ [ "Chatel", "Sophie", "" ], [ "Détienne", "Françoise", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0703009
Francoise Detienne
Warren Sack, Fran\c{c}oise D\'etienne (INRIA Rocquencourt), Nicholas Ducheneaut, Jean-Marie Burkhardt (LEI), Dilan Mahendran, Flore Barcellini (INRIA Rocquencourt, EIFFEL)
A Methodological Framework for Socio-Cognitive Analyses of Collaborative Design of Open Source Software
null
Computer Supported Cooperative Work (CSCW), the Journal of Collaborative Computing 15, 2-3 (2006) 229-250
null
null
cs.HC
null
Open Source Software (OSS) development challenges traditional software engineering practices. In particular, OSS projects are managed by a large number of volunteers, working freely on the tasks they choose to undertake. OSS projects also rarely rely on explicit system-level design, or on project plans or schedules. Moreover, OSS developers work in arbitrary locations and collaborate almost exclusively over the Internet, using simple tools such as email and software code tracking databases (e.g. CVS). All the characteristics above make OSS development akin to weaving a tapestry of heterogeneous components. The OSS design process relies on various types of actors: people with prescribed roles, but also elements coming from a variety of information spaces (such as email and software code). The objective of our research is to understand the specific hybrid weaving accomplished by the actors of this distributed, collective design process. This, in turn, challenges traditional methodologies used to understand distributed software engineering: OSS development is simply too "fibrous" to lend itself well to analysis under a single methodological lens. In this paper, we describe the methodological framework we articulated to analyze collaborative design in the Open Source world. Our framework focuses on the links between the heterogeneous components of a project's hybrid network. We combine ethnography, text mining, and socio-technical network analysis and visualization to understand OSS development in its totality. This way, we are able to simultaneously consider the social, technical, and cognitive aspects of OSS development. We describe our methodology in detail, and discuss its implications for future research on distributed collective practices.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 13:51:29 GMT" } ]
2016-08-14T00:00:00
[ [ "Sack", "Warren", "", "INRIA Rocquencourt" ], [ "Détienne", "Françoise", "", "INRIA Rocquencourt" ], [ "Ducheneaut", "Nicholas", "", "LEI" ], [ "Burkhardt", "Jean-Marie", "", "LEI" ], [ "Mahendran", "Dilan", "", "INRIA Rocquencourt, EIFFEL" ], [ "Barcellini", "Flore", "", "INRIA Rocquencourt, EIFFEL" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0703010
Jaroslaw Byrka
Jaroslaw Byrka and Karen Aardal
An optimal bifactor approximation algorithm for the metric uncapacitated facility location problem
A journal version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain a 1.5-approximation algorithm for the metric uncapacitated facility location problem (UFL), which improves on the previously best known 1.52-approximation algorithm by Mahdian, Ye and Zhang. Note, that the approximability lower bound by Guha and Khuller is 1.463. An algorithm is a {\em ($\lambda_f$,$\lambda_c$)-approximation algorithm} if the solution it produces has total cost at most $\lambda_f \cdot F^* + \lambda_c \cdot C^*$, where $F^*$ and $C^*$ are the facility and the connection cost of an optimal solution. Our new algorithm, which is a modification of the $(1+2/e)$-approximation algorithm of Chudak and Shmoys, is a (1.6774,1.3738)-approximation algorithm for the UFL problem and is the first one that touches the approximability limit curve $(\gamma_f, 1+2e^{-\gamma_f})$ established by Jain, Mahdian and Saberi. As a consequence, we obtain the first optimal approximation algorithm for instances dominated by connection costs. When combined with a (1.11,1.7764)-approximation algorithm proposed by Jain et al., and later analyzed by Mahdian et al., we obtain the overall approximation guarantee of 1.5 for the metric UFL problem. We also describe how to use our algorithm to improve the approximation ratio for the 3-level version of UFL.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 14:49:57 GMT" }, { "version": "v2", "created": "Wed, 4 Feb 2009 15:15:58 GMT" } ]
2009-02-04T00:00:00
[ [ "Byrka", "Jaroslaw", "" ], [ "Aardal", "Karen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703011
Helmut Alt
Helmut Alt, Maike Buchin
Can we Compute the Similarity Between Surfaces?
null
null
null
null
cs.CG cs.CC
null
A suitable measure for the similarity of shapes represented by parameterized curves or surfaces is the Fr\'echet distance. Whereas efficient algorithms are known for computing the Fr\'echet distance of polygonal curves, the same problem for triangulated surfaces is NP-hard. Furthermore, it remained open whether it is computable at all. Here, using a discrete approximation we show that it is {\em upper semi-computable}, i.e., there is a non-halting Turing machine which produces a monotone decreasing sequence of rationals converging to the result. It follows that the decision problem, whether the Fr\'echet distance of two given surfaces lies below some specified value, is recursively enumerable. Furthermore, we show that a relaxed version of the problem, the computation of the {\em weak Fr\'echet distance} can be solved in polynomial time. For this, we give a computable characterization of the weak Fr\'echet distance in a geometric data structure called the {\em free space diagram}.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 17:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Alt", "Helmut", "" ], [ "Buchin", "Maike", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703012
Ramya Ravichandar
Ramya Ravichandar, James D. Arthur, Manuel P\'erez-Qui\~nones
Pre-Requirement Specification Traceability: Bridging the Complexity Gap through Capabilities
This paper appears in International Symposium on Grand Challenges in Traceability, TEFSE/GCT 2007. 10 pages, 7 Figures
null
null
null
cs.SE
null
Pre-Requirement Specification traceability is the activity of capturing relations between requirements and their sources, in particular user needs. Requirements are formal technical specifications in the solution space; needs are natural language expressions codifying user expectations in the problem space. Current traceability techniques are challenged by the complexity gap that results from the disparity between the spaces, and thereby, often neglect traceability to and from requirements. We identify the existence of an intermediary region -- the transition space -- which structures the progression from needs to requirements. More specifically, our approach to developing change-tolerant systems, termed Capabilities Engineering, identifies highly cohesive, minimally coupled, optimized functional abstractions called Capabilities in the transition space. These Capabilities link the problem and solution spaces through directives (entities derived from user needs). Directives connect the problem and transition spaces; Capabilities link the transition and solution spaces. Furthermore, the process of Capabilities Engineering addresses specific traceability challenges. It supports the evolution of traces, provides semantic and structural information about dependencies, incorporates human factors, generates traceability relations with negligible overhead, and thereby, fosters pre-Requirement Specification traceability.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 20:46:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravichandar", "Ramya", "" ], [ "Arthur", "James D.", "" ], [ "Pérez-Quiñones", "Manuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0703013
Vincent Limouzy
Vincent Limouzy (LIAFA), Fabien De Montgolfier (LIAFA), Micha\"el Rao (LIAFA)
NLC-2 graph recognition and isomorphism
soumis \`{a} WG 2007; 12p
Dans Lecture Notes In Computer Science - Graph-Theoretic Concepts in Computer Science 33rd International Workshop, WG 2007, Dornburg, Germany, June 21-23, 2007., Dornburg : Allemagne (2007)
10.1007/978-3-540-74839-7_9
null
cs.DS
null
NLC-width is a variant of clique-width with many application in graph algorithmic. This paper is devoted to graphs of NLC-width two. After giving new structural properties of the class, we propose a $O(n^2 m)$-time algorithm, improving Johansson's algorithm \cite{Johansson00}. Moreover, our alogrithm is simple to understand. The above properties and algorithm allow us to propose a robust $O(n^2 m)$-time isomorphism algorithm for NLC-2 graphs. As far as we know, it is the first polynomial-time algorithm.
[ { "version": "v1", "created": "Sat, 3 Mar 2007 06:44:57 GMT" } ]
2007-12-11T00:00:00
[ [ "Limouzy", "Vincent", "", "LIAFA" ], [ "De Montgolfier", "Fabien", "", "LIAFA" ], [ "Rao", "Michaël", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703014
Stavros Toumpis
Stavros Toumpis
Asymptotic Capacity Bounds for Wireless Networks with Non-Uniform Traffic
null
Asymptotic Capacity Bounds for Wireless Networks with Non-Uniform Traffic Patterns, S. Toumpis, IEEE Trans. Wireless Comm., vol. 7, no. 6, pp. 2231-2242, June 2008
10.1109/TWC.2008.061010
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop bounds on the capacity of wireless networks when the traffic is non-uniform, i.e., not all nodes are required to receive and send similar volumes of traffic. Our results are asymptotic, i.e., they hold with probability going to unity as the number of nodes goes to infinity. We study \emph{(i)} asymmetric networks, where the numbers of sources and destinations of traffic are unequal, \emph{(ii)} multicast networks, in which each created packet has multiple destinations, \emph{(iii)} cluster networks, that consist of clients and a limited number of cluster heads, and each client wants to communicate with any of the cluster heads, and \emph{(iv)} hybrid networks, in which the nodes are supported by a limited infrastructure. Our findings quantify the fundamental capabilities of these wireless networks to handle traffic bottlenecks, and point to correct design principles that achieve the capacity without resorting to overly complicated protocols.
[ { "version": "v1", "created": "Sat, 3 Mar 2007 09:54:06 GMT" }, { "version": "v2", "created": "Wed, 23 Oct 2013 12:40:11 GMT" } ]
2013-10-24T00:00:00
[ [ "Toumpis", "Stavros", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703015
Alexander Shkotin
Alex Shkotin
Graph representation of context-free grammars
4 pages, 3 figures
null
null
null
cs.LO
null
In modern mathematics, graphs figure as one of the better-investigated class of mathematical objects. Various properties of graphs, as well as graph-processing algorithms, can be useful if graphs of a certain kind are used as denotations for CF-grammars. Furthermore, graph are well adapted to various extensions (one kind of such extensions being attributes).
[ { "version": "v1", "created": "Sat, 3 Mar 2007 13:12:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Shkotin", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703016
Venkata Annapureddy
Venkata Sreekanta Annpureddy, Devdutt V. Marathe, T. R. Ramya and Srikrishna Bhashyam
Outage Probability of Multiple-Input Single-Output (MISO) Systems with Delayed Feedback
Submitted to IEEE Transactions on Communications Jan 2007, Revised Jun 2007, Revised Nov 2007
null
10.1109/TCOMM.2009.02.0700152
null
cs.IT math.IT
null
We investigate the effect of feedback delay on the outage probability of multiple-input single-output (MISO) fading channels. Channel state information at the transmitter (CSIT) is a delayed version of the channel state information available at the receiver (CSIR). We consider two cases of CSIR: (a) perfect CSIR and (b) CSI estimated at the receiver using training symbols. With perfect CSIR, under a short-term power constraint, we determine: (a) the outage probability for beamforming with imperfect CSIT (BF-IC) analytically, and (b) the optimal spatial power allocation (OSPA) scheme that minimizes outage numerically. Results show that, for delayed CSIT, BF-IC is close to optimal for low SNR and uniform spatial power allocation (USPA) is close to optimal at high SNR. Similarly, under a long-term power constraint, we show that BF-IC is close to optimal for low SNR and USPA is close to optimal at high SNR. With imperfect CSIR, we obtain an upper bound on the outage probability with USPA and BF-IC. Results show that the loss in performance due to imperfection in CSIR is not significant, if the training power is chosen appropriately.
[ { "version": "v1", "created": "Sat, 3 Mar 2007 13:14:59 GMT" }, { "version": "v2", "created": "Wed, 11 Jul 2007 06:54:18 GMT" }, { "version": "v3", "created": "Mon, 5 Nov 2007 09:04:08 GMT" } ]
2016-11-17T00:00:00
[ [ "Annpureddy", "Venkata Sreekanta", "" ], [ "Marathe", "Devdutt V.", "" ], [ "Ramya", "T. R.", "" ], [ "Bhashyam", "Srikrishna", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703017
Sang Joon Kim
Sang Joon Kim, Patrick Mitran, Vahid Tarokh
Performance Bounds for Bi-Directional Coded Cooperation Protocols
15 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In coded bi-directional cooperation, two nodes wish to exchange messages over a shared half-duplex channel with the help of a relay. In this paper, we derive performance bounds for this problem for each of three protocols. The first protocol is a two phase protocol were both users simultaneously transmit during the first phase and the relay alone transmits during the second. In this protocol, our bounds are tight and a multiple-access channel transmission from the two users to the relay followed by a coded broadcast-type transmission from the relay to the users achieves all points in the two-phase capacity region. The second protocol considers sequential transmissions from the two users followed by a transmission from the relay while the third protocol is a hybrid of the first two protocols and has four phases. In the latter two protocols the inner and outer bounds are not identical, and differ in a manner similar to the inner and outer bounds of Cover's relay channel. Numerical evaluation shows that at least in some cases of interest our bounds do not differ significantly. Finally, in the Gaussian case with path loss, we derive achievable rates and compare the relative merits of each protocol in various regimes. This case is of interest in cellular systems. Surprisingly, we find that in some cases, the achievable rate region of the four phase protocol sometimes contains points that are outside the outer bounds of the other protocols.
[ { "version": "v1", "created": "Sun, 4 Mar 2007 18:27:05 GMT" }, { "version": "v2", "created": "Mon, 14 May 2007 20:41:19 GMT" }, { "version": "v3", "created": "Fri, 5 Oct 2007 17:37:02 GMT" }, { "version": "v4", "created": "Thu, 5 Jun 2008 19:02:09 GMT" } ]
2008-06-05T00:00:00
[ [ "Kim", "Sang Joon", "" ], [ "Mitran", "Patrick", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703018
Satoshi Matsuoka
Satoshi Matsuoka
A Coding Theoretic Study on MLL proof nets
minor modifications
null
10.1017/S0960129511000582
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coding theory is very useful for real world applications. A notable example is digital television. Basically, coding theory is to study a way of detecting and/or correcting data that may be true or false. Moreover coding theory is an area of mathematics, in which there is an interplay between many branches of mathematics, e.g., abstract algebra, combinatorics, discrete geometry, information theory, etc. In this paper we propose a novel approach for analyzing proof nets of Multiplicative Linear Logic (MLL) by coding theory. We define families of proof structures and introduce a metric space for each family. In each family, 1. an MLL proof net is a true code element; 2. a proof structure that is not an MLL proof net is a false (or corrupted) code element. The definition of our metrics reflects the duality of the multiplicative connectives elegantly. In this paper we show that in the framework one error-detecting is possible but one error-correcting not. Our proof of the impossibility of one error-correcting is interesting in the sense that a proof theoretical property is proved using a graph theoretical argument. In addition, we show that affine logic and MLL + MIX are not appropriate for this framework. That explains why MLL is better than such similar logics.
[ { "version": "v1", "created": "Mon, 5 Mar 2007 07:49:55 GMT" }, { "version": "v10", "created": "Thu, 20 Dec 2007 11:48:29 GMT" }, { "version": "v11", "created": "Fri, 23 May 2008 13:51:28 GMT" }, { "version": "v12", "created": "Mon, 26 May 2008 11:58:28 GMT" }, { "version": "v13", "created": "Wed, 28 May 2008 19:46:44 GMT" }, { "version": "v14", "created": "Thu, 29 May 2008 16:30:06 GMT" }, { "version": "v15", "created": "Fri, 30 May 2008 09:03:13 GMT" }, { "version": "v16", "created": "Mon, 2 Jun 2008 08:36:44 GMT" }, { "version": "v17", "created": "Tue, 3 Jun 2008 04:46:49 GMT" }, { "version": "v18", "created": "Mon, 9 Jun 2008 12:00:03 GMT" }, { "version": "v19", "created": "Tue, 10 Jun 2008 12:02:45 GMT" }, { "version": "v2", "created": "Tue, 6 Mar 2007 02:36:44 GMT" }, { "version": "v20", "created": "Sun, 15 Jun 2008 10:13:57 GMT" }, { "version": "v21", "created": "Wed, 18 Jun 2008 19:27:48 GMT" }, { "version": "v22", "created": "Sun, 22 Jun 2008 10:18:35 GMT" }, { "version": "v23", "created": "Fri, 19 Feb 2010 11:21:12 GMT" }, { "version": "v24", "created": "Tue, 6 Jul 2010 07:37:55 GMT" }, { "version": "v3", "created": "Mon, 12 Mar 2007 05:42:45 GMT" }, { "version": "v4", "created": "Mon, 16 Apr 2007 13:41:04 GMT" }, { "version": "v5", "created": "Tue, 17 Apr 2007 08:47:21 GMT" }, { "version": "v6", "created": "Tue, 24 Apr 2007 10:22:17 GMT" }, { "version": "v7", "created": "Mon, 13 Aug 2007 13:49:06 GMT" }, { "version": "v8", "created": "Tue, 14 Aug 2007 07:45:21 GMT" }, { "version": "v9", "created": "Sat, 18 Aug 2007 08:17:45 GMT" } ]
2012-02-06T00:00:00
[ [ "Matsuoka", "Satoshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0703019
Jean Cardinal
Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwena\"el Joret, Stefan Langerman, Ilan Newman, Oren Weimann
The Stackelberg Minimum Spanning Tree Game
v3: Referees' comments incorporated. A preliminary version appeared in the proceedings of the 10th Workshop on Algorithms and Data Structures (WADS 2007)
Algorithmica, vol. 59, no. 2, pp. 129--144, 2011
10.1007/s00453-009-9299-y
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a one-round two-player network pricing game, the Stackelberg Minimum Spanning Tree game or StackMST. The game is played on a graph (representing a network), whose edges are colored either red or blue, and where the red edges have a given fixed cost (representing the competitor's prices). The first player chooses an assignment of prices to the blue edges, and the second player then buys the cheapest possible minimum spanning tree, using any combination of red and blue edges. The goal of the first player is to maximize the total price of purchased blue edges. This game is the minimum spanning tree analog of the well-studied Stackelberg shortest-path game. We analyze the complexity and approximability of the first player's best strategy in StackMST. In particular, we prove that the problem is APX-hard even if there are only two different red costs, and give an approximation algorithm whose approximation ratio is at most $\min \{k,1+\ln b,1+\ln W\}$, where $k$ is the number of distinct red costs, $b$ is the number of blue edges, and $W$ is the maximum ratio between red costs. We also give a natural integer linear programming formulation of the problem, and show that the integrality gap of the fractional relaxation asymptotically matches the approximation guarantee of our algorithm.
[ { "version": "v1", "created": "Mon, 5 Mar 2007 09:46:26 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2008 15:44:40 GMT" }, { "version": "v3", "created": "Thu, 17 Sep 2009 15:20:43 GMT" } ]
2011-03-07T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Demaine", "Erik D.", "" ], [ "Fiorini", "Samuel", "" ], [ "Joret", "Gwenaël", "" ], [ "Langerman", "Stefan", "" ], [ "Newman", "Ilan", "" ], [ "Weimann", "Oren", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703020
Gabriel Istrate
Anders Hansson, Gabriel Istrate
Counting preimages of TCP reordering patterns
null
null
null
null
cs.DS cs.DM math.CO
null
Packet reordering is an important property of network traffic that should be captured by analytical models of the Transmission Control Protocol (TCP). We study a combinatorial problem motivated by RESTORED, a TCP modeling methodology that incorporates information about packet dynamics. A significant component of this model is a many-to-one mapping B that transforms sequences of packet IDs into buffer sequences, in a manner that is compatible with TCP semantics. We show that the following hold: 1. There exists a linear time algorithm that, given a buffer sequence W of length n, decides whether there exists a permutation A of 1,2,..., n such that $A\in B^{-1}(W)$ (and constructs such a permutation, when it exists). 2. The problem of counting the number of permutations in $B^{-1}(W)$ has a polynomial time algorithm. We also show how to extend these results to sequences of IDs that contain repeated packets.
[ { "version": "v1", "created": "Mon, 5 Mar 2007 13:38:45 GMT" } ]
2008-11-04T00:00:00
[ [ "Hansson", "Anders", "" ], [ "Istrate", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
cs/0703021
Wen-Li Wang
Wen-Li Wang and Mei-Huei Tang
Addressing Components' Evolvement and Execution Behavior to Measure Component-Based Software Reliability
null
null
null
null
cs.SE
null
Software reliability is an important quality attrib-ute, often evaluated as either a function of time or of system structures. The goal of this study is to have this metric cover both for component-based software, be-cause its reliability strongly depends on the quality of constituent components and their interactions. To achieve this, we apply a convolution modeling ap-proach, based on components' execution behavior, to integrate their individual reliability evolvement and simultaneously address failure fixes in the time do-main. Modeling at the component level can be more economical to accommodate software evolution, be-cause the reliability metric can be evaluated by reus-ing the quality measures of unaffected components and adapting only to the affected ones to save cost. The adaptation capability also supports the incremental software development processes that constantly add in new components over time. Experiments were con-ducted to discuss the usefulness of this approach.
[ { "version": "v1", "created": "Mon, 5 Mar 2007 20:58:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Wen-Li", "" ], [ "Tang", "Mei-Huei", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0703022
Dongwoon Bai
Dongwoon Bai, Patrick Mitran, Saeed S. Ghassemzadeh, Robert R. Miller, Vahid Tarokh
Rate of Channel Hardening of Antenna Selection Diversity Schemes and Its Implication on Scheduling
24 pages, 6 figures, 1table, Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2027529
null
cs.IT math.IT
null
For a multiple antenna system, we compute the asymptotic distribution of antenna selection gain when the transmitter selects the transmit antenna with the strongest channel. We use this to asymptotically estimate the underlying channel capacity distributions, and demonstrate that unlike multiple-input/multiple-output (MIMO) systems, the channel for antenna selection systems hardens at a slower rate, and thus a significant multiuser scheduling gain can exist - O(1/ log m) for channel selection as opposed to O(1/ sqrt{m}) for MIMO, where m is the number of transmit antennas. Additionally, even without this scheduling gain, it is demonstrated that transmit antenna selection systems outperform open loop MIMO systems in low signal-to-interference-plus-noise ratio (SINR) regimes, particularly for a small number of receive antennas. This may have some implications on wireless system design, because most of the users in modern wireless systems have low SINRs
[ { "version": "v1", "created": "Mon, 5 Mar 2007 21:02:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Bai", "Dongwoon", "" ], [ "Mitran", "Patrick", "" ], [ "Ghassemzadeh", "Saeed S.", "" ], [ "Miller", "Robert R.", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703023
Otfried Cheong
Otfried Cheong, Herman Haverkort, Mira Lee
Computing a Minimum-Dilation Spanning Tree is NP-hard
null
null
null
null
cs.CG
null
In a geometric network G = (S, E), the graph distance between two vertices u, v in S is the length of the shortest path in G connecting u to v. The dilation of G is the maximum factor by which the graph distance of a pair of vertices differs from their Euclidean distance. We show that given a set S of n points with integer coordinates in the plane and a rational dilation delta > 1, it is NP-hard to determine whether a spanning tree of S with dilation at most delta exists.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 01:53:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheong", "Otfried", "" ], [ "Haverkort", "Herman", "" ], [ "Lee", "Mira", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0703024
Marcus Hutter
Marcus Hutter
Algorithmic Information Theory: a brief non-technical guide to the field
11 LaTeX pages. http://www.scholarpedia.org/article/Algorithmic_information_theory
Scholarpedia, 2:3 (2007) page 2519
null
null
cs.IT cs.CC math.IT
null
This article is a brief guide to the field of algorithmic information theory (AIT), its underlying philosophy, and the most important concepts. AIT arises by mixing information theory and computation theory to obtain an objective and absolute notion of information in an individual object, and in so doing gives rise to an objective and robust notion of randomness of individual objects. This is in contrast to classical information theory that is based on random variables and communication, and has no bearing on information and randomness of individual objects. After a brief overview, the major subfields, applications, history, and a map of the field are presented.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 09:54:47 GMT" } ]
2009-09-29T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703025
Jean Charles Gilbert
Jean Charles Gilbert (INRIA Rocquencourt), Xavier Jonsson
LIBOPT - An environment for testing solvers on heterogeneous collections of problems - Version 1.0
null
null
null
null
cs.MS cs.NA math.OC
null
The Libopt environment is both a methodology and a set of tools that can be used for testing, comparing, and profiling solvers on problems belonging to various collections. These collections can be heterogeneous in the sense that their problems can have common features that differ from one collection to the other. Libopt brings a unified view on this composite world by offering, for example, the possibility to run any solver on any problem compatible with it, using the same Unix/Linux command. The environment also provides tools for comparing the results obtained by solvers on a specified set of problems. Most of the scripts going with the Libopt environment have been written in Perl.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 14:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gilbert", "Jean Charles", "", "INRIA Rocquencourt" ], [ "Jonsson", "Xavier", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
cs/0703026
Marc Daumas
Sylvie Boldo (INRIA Futurs), Marc Daumas (ELIAUS), Pascal Giorgi (LIRMM)
Formal proof for delayed finite field arithmetic using floating point operators
8th Conference on Real Numbers and Computers, Saint Jacques de Compostelle : Espagne (2008)
null
null
null
cs.SC
null
Formal proof checkers such as Coq are capable of validating proofs of correction of algorithms for finite field arithmetics but they require extensive training from potential users. The delayed solution of a triangular system over a finite field mixes operations on integers and operations on floating point numbers. We focus in this report on verifying proof obligations that state that no round off error occurred on any of the floating point operations. We use a tool named Gappa that can be learned in a matter of minutes to generate proofs related to floating point arithmetic and hide technicalities of formal proof checkers. We found that three facilities are missing from existing tools. The first one is the ability to use in Gappa new lemmas that cannot be easily expressed as rewriting rules. We coined the second one ``variable interchange'' as it would be required to validate loop interchanges. The third facility handles massive loop unrolling and argument instantiation by generating traces of execution for a large number of cases. We hope that these facilities may sometime in the future be integrated into mainstream code validation.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 14:55:44 GMT" }, { "version": "v2", "created": "Thu, 24 May 2007 09:55:25 GMT" }, { "version": "v3", "created": "Wed, 14 May 2008 13:22:21 GMT" } ]
2008-07-09T00:00:00
[ [ "Boldo", "Sylvie", "", "INRIA Futurs" ], [ "Daumas", "Marc", "", "ELIAUS" ], [ "Giorgi", "Pascal", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0703027
Bernard Jacquemin
Bernard Jacquemin (ISC)
Interroger un corpus par le sens
13 pp
Dans "Mots, termes et contextes", Actes des septi\`emes Journ\'ees scientifiques du r\'eseau de chercheurs Lexicologie, Terminologie, Traduction - Bruxelles : Belgique (2005)
null
null
cs.CL cs.IR
null
In textual knowledge management, statistical methods prevail. Nonetheless, some difficulties cannot be overcome by these methodologies. I propose a symbolic approach using a complete textual analysis to identify which analysis level can improve the the answers provided by a system. The approach identifies word senses and relation between words and generates as many rephrasings as possible. Using synonyms and derivative, the system provides new utterances without changing the original meaning of the sentences. Such a way, an information can be retrieved whatever the question or answer's wording may be.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 19:50:37 GMT" }, { "version": "v2", "created": "Sat, 31 May 2008 16:10:52 GMT" } ]
2008-05-31T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0703028
Marc Daumas
Sylvain Collange (LP2A), Marc Daumas (LP2A, LIRMM), David Defour (LP2A)
Graphic processors to speed-up simulations for the design of high performance solar receptors
null
null
null
null
cs.DC physics.class-ph
null
Graphics Processing Units (GPUs) are now powerful and flexible systems adapted and used for other purposes than graphics calculations (General Purpose computation on GPU -- GPGPU). We present here a prototype to be integrated into simulation codes that estimate temperature, velocity and pressure to design next generations of solar receptors. Such codes will delegate to our contribution on GPUs the computation of heat transfers due to radiations. We use Monte-Carlo line-by-line ray-tracing through finite volumes. This means data-parallel arithmetic transformations on large data structures. Our prototype is inspired on the source code of GPUBench. Our performances on two recent graphics cards (Nvidia 7800GTX and ATI RX1800XL) show some speed-up higher than 400 compared to CPU implementations leaving most of CPU computing resources available. As there were some questions pending about the accuracy of the operators implemented in GPUs, we start this report with a survey and some contributed tests on the various floating point units available on GPUs.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 19:58:17 GMT" }, { "version": "v2", "created": "Thu, 24 May 2007 09:45:49 GMT" } ]
2007-06-13T00:00:00
[ [ "Collange", "Sylvain", "", "LP2A" ], [ "Daumas", "Marc", "", "LP2A, LIRMM" ], [ "Defour", "David", "", "LP2A" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
cs/0703029
Shmuel Friedland
Shmuel Friedland
FPRAS for computing a lower bound for weighted matching polynomial of graphs
16 pages
null
null
null
cs.CC cs.DM
null
We give a fully polynomial randomized approximation scheme to compute a lower bound for the matching polynomial of any weighted graph at a positive argument. For the matching polynomial of complete bipartite graphs with bounded weights these lower bounds are asymptotically optimal.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 22:59:30 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2007 16:09:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedland", "Shmuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0703030
Konstantin Rybnikov
Konstantin Rybnikov
An Efficient Local Approach to Convexity Testing of Piecewise-Linear Hypersurfaces
3 figures
null
null
null
cs.CG
null
We show that a closed piecewise-linear hypersurface immersed in $R^n$ ($n\ge 3$) is the boundary of a convex body if and only if every point in the interior of each $(n-3)$-face has a neighborhood that lies on the boundary of some convex body; no assumptions about the hypersurface's topology are needed. We derive this criterion from our generalization of Van Heijenoort's (1952) theorem on locally convex hypersurfaces in $R^n$ to spherical spaces. We also give an easy-to-implement convexity testing algorithm, which is based on our criterion. For $R^3$ the number of arithmetic operations used by the algorithm is at most linear in the number of vertices, while in general it is at most linear in the number of incidences between the $(n-2)$-faces and $(n-3)$-faces. When the dimension $n$ is not fixed and only ring arithmetic is allowed, the algorithm still remains polynomial. Our method works in more general situations than the convexity verification algorithms developed by Mehlhorn et al. (1996) and Devillers et al. (1998) -- for example, our method does not require the input surface to be orientable, nor it requires the input data to include normal vectors to the facets that are oriented "in a coherent way". For $R^3$ the complexity of our algorithm is the same as that of previous algorithms; for higher dimensions there seems to be no clear winner, but our approach is the only one that easily handles inputs in which the facet normals are not known to be coherently oriented or are not given at all. Furthermore, our method can be extended to piecewise-polynomial surfaces of small degree.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 07:33:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Rybnikov", "Konstantin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0703031
P\'aid\'i Creed
Paidi Creed
Sampling Eulerian orientations of triangular lattice graphs
23 pages
null
null
null
cs.DM cs.DS
null
We consider the problem of sampling from the uniform distribution on the set of Eulerian orientations of subgraphs of the triangular lattice. Although it is known that this can be achieved in polynomial time for any graph, the algorithm studied here is more natural in the context of planar Eulerian graphs. We analyse the mixing time of a Markov chain on the Eulerian orientations of a planar graph which moves between orientations by reversing the edges of directed faces. Using path coupling and the comparison method we obtain a polynomial upper bound on the mixing time of this chain for any solid subgraph of the triangular lattice. By considering the conductance of the chain we show that there exist subgraphs with holes for which the chain will always take an exponential amount of time to converge. Finally, as an additional justification for studying a Markov chain on the set of Eulerian orientations of planar graphs, we show that the problem of counting Eulerian orientations remains #P-complete when restricted to planar graphs. A preliminary version of this work appeared as an extended abstract in the 2nd Algorithms and Complexity in Durham workshop.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 12:34:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Creed", "Paidi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703032
Andreas Enge
Andreas Enge (INRIA FUTURS, INRIA Futurs), Pierrick Gaudry (INRIA Lorraine - LORIA)
An $L (1/3 + \epsilon)$ Algorithm for the Discrete Logarithm Problem for Low Degree Curves
null
Dans Eurocrypt 2007 (2007)
10.1007/978-3-540-72540-4_22
null
cs.CR math.AG
null
The discrete logarithm problem in Jacobians of curves of high genus $g$ over finite fields $\FF_q$ is known to be computable with subexponential complexity $L_{q^g}(1/2, O(1))$. We present an algorithm for a family of plane curves whose degrees in $X$ and $Y$ are low with respect to the curve genus, and suitably unbalanced. The finite base fields are arbitrary, but their sizes should not grow too fast compared to the genus. For this family, the group structure can be computed in subexponential time of $L_{q^g}(1/3, O(1))$, and a discrete logarithm computation takes subexponential time of $L_{q^g}(1/3+\epsilon, o(1))$ for any positive $\epsilon$. These runtime bounds rely on heuristics similar to the ones used in the number field sieve or the function field sieve algorithms.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 14:00:52 GMT" } ]
2015-06-25T00:00:00
[ [ "Enge", "Andreas", "", "INRIA FUTURS, INRIA Futurs" ], [ "Gaudry", "Pierrick", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
cs/0703033
Pierre-Francois Marteau
Pierre-Fran\c{c}ois Marteau (VALORIA)
Time Warp Edit Distance with Stiffness Adjustment for Time Series Matching
null
IEEE Transaction on Pattern Analysis and Machine Intelligence 31, 2 (2009) 306-318
10.1109/TPAMI.2008.76
null
cs.IR
null
In a way similar to the string-to-string correction problem we address time series similarity in the light of a time-series-to-time-series-correction problem for which the similarity between two time series is measured as the minimum cost sequence of "edit operations" needed to transform one time series into another. To define the "edit operations" we use the paradigm of a graphical editing process and end up with a dynamic programming algorithm that we call Time Warp Edit Distance (TWED). TWED is slightly different in form from Dynamic Time Warping, Longest Common Subsequence or Edit Distance with Real Penalty algorithms. In particular, it highlights a parameter which drives a kind of stiffness of the elastic measure along the time axis. We show that the similarity provided by TWED is a metric potentially useful in time series retrieval applications since it could benefit from the triangular inequality property to speed up the retrieval process while tuning the parameters of the elastic measure. In that context, a lower bound is derived to relate the matching of time series into down sampled representation spaces to the matching into the original space. Empiric quality of the TWED distance is evaluated on a simple classification task. Compared to Edit Distance, Dynamic Time Warping, Longest Common Subsequnce and Edit Distance with Real Penalty, TWED has proven to be quite effective on the considered experimental task.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 19:54:33 GMT" }, { "version": "v2", "created": "Mon, 7 May 2007 18:01:02 GMT" }, { "version": "v3", "created": "Tue, 21 Aug 2007 09:58:52 GMT" }, { "version": "v4", "created": "Mon, 25 Feb 2008 15:43:59 GMT" }, { "version": "v5", "created": "Tue, 4 Mar 2008 07:39:36 GMT" } ]
2008-12-28T00:00:00
[ [ "Marteau", "Pierre-François", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0703034
Andrew Eckford
Andrew W. Eckford
Nanoscale Communication with Brownian Motion
6 pages, 4 figures
null
null
null
cs.IT math.IT
null
In this paper, the problem of communicating using chemical messages propagating using Brownian motion, rather than electromagnetic messages propagating as waves in free space or along a wire, is considered. This problem is motivated by nanotechnological and biotechnological applications, where the energy cost of electromagnetic communication might be prohibitive. Models are given for communication using particles that propagate with Brownian motion, and achievable capacity results are given. Under conservative assumptions, it is shown that rates exceeding one bit per particle are achievable.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 23:27:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Eckford", "Andrew W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703035
Kapil Bhattad
Kapil Bhattad, Krishna R. Narayanan, Giuseppe Caire
On the Distortion SNR Exponent of Some Layered Transmission Schemes
26 Pages. 10 figures, Submitted to IEEE Trans. on IT
null
10.1109/TIT.2008.924703
null
cs.IT math.IT
null
We consider the problem of joint source-channel coding for transmitting K samples of a complex Gaussian source over T = bK uses of a block-fading multiple input multiple output (MIMO) channel with M transmit and N receive antennas. We consider the case when we are allowed to code over L blocks. The channel gain is assumed to be constant over a block and channel gains for different blocks are assumed to be independent. The performance measure of interest is the rate of decay of the expected mean squared error with the signal-to-noise ratio (SNR), called the distortion SNR exponent. We first show that using a broadcast strategy of Gunduz and Erkip, but with a different power and rate allocation policy, the optimal distortion SNR exponent can be achieved for bandwidth efficiencies 0 < b < (|N-M|+1)/min(M,N). This is the first time the optimal exponent is characterized for 1/min(M,N) < b < (|N-M |+ 1)/ min(M, N). Also, for b > MNL^2, we show that the broadcast scheme achieves the optimal exponent of MNL. Special cases of this result have been derived for the L=1 case and for M=N=1 by Gunduz and Erkip. We then propose a digital layered transmission scheme that uses both time layering and superposition. This includes many previously known schemes as special cases. The proposed scheme is at least as good as the currently best known schemes for the entire range of bandwidth efficiencies, whereas at least for some M, N, and b, it is strictly better than the currently best known schemes.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 20:00:52 GMT" }, { "version": "v2", "created": "Fri, 20 Apr 2007 15:41:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Bhattad", "Kapil", "" ], [ "Narayanan", "Krishna R.", "" ], [ "Caire", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703036
Jean Creignou
Jean Creignou (IMB)
Constructions of Grassmannian Simplices
22 pages, 3 figures
null
null
null
cs.IT math.IT
null
In this article an explicit method (relying on representation theory) to construct packings in Grassmannian space is presented. Infinite families of configurations having only one non-trivial set of principal angles are found using 2-transitive groups. These packings are proved to reach the simplex bound and are therefore optimal w.r.t. the chordal distance. The construction is illustrated by an example on the symmetric group. Then some natural extends and consequences of this situation are given.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 10:14:13 GMT" }, { "version": "v2", "created": "Tue, 13 Mar 2007 08:11:31 GMT" }, { "version": "v3", "created": "Mon, 3 Sep 2007 16:53:08 GMT" }, { "version": "v4", "created": "Sat, 8 Mar 2008 16:53:33 GMT" } ]
2008-03-08T00:00:00
[ [ "Creignou", "Jean", "", "IMB" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703037
Alexander Wolff
Hee-Kap Ahn and Helmut Alt and Tetsuo Asano and Sang Won Bae and Peter Brass and Otfried Cheong and Christian Knauer and Hyeon-Suk Na and Chan-Su Shin and Alexander Wolff
Constructing Optimal Highways
13 pages, 9 figures, preliminary version appeared at CATS'07
International Journal of Foundations of Computer Science 20(2009):3-23
10.1142/S0129054109006425
null
cs.CG
null
For two points $p$ and $q$ in the plane, a straight line $h$, called a highway, and a real $v>1$, we define the \emph{travel time} (also known as the \emph{city distance}) from $p$ and $q$ to be the time needed to traverse a quickest path from $p$ to $q$, where the distance is measured with speed $v$ on $h$ and with speed 1 in the underlying metric elsewhere. Given a set $S$ of $n$ points in the plane and a highway speed $v$, we consider the problem of finding a \emph{highway} that minimizes the maximum travel time over all pairs of points in $S$. If the orientation of the highway is fixed, the optimal highway can be computed in linear time, both for the $L_1$- and the Euclidean metric as the underlying metric. If arbitrary orientations are allowed, then the optimal highway can be computed in $O(n^{2} \log n)$ time. We also consider the problem of computing an optimal pair of highways, one being horizontal, one vertical.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 17:22:21 GMT" } ]
2010-08-26T00:00:00
[ [ "Ahn", "Hee-Kap", "" ], [ "Alt", "Helmut", "" ], [ "Asano", "Tetsuo", "" ], [ "Bae", "Sang Won", "" ], [ "Brass", "Peter", "" ], [ "Cheong", "Otfried", "" ], [ "Knauer", "Christian", "" ], [ "Na", "Hyeon-Suk", "" ], [ "Shin", "Chan-Su", "" ], [ "Wolff", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0703038
Chan Zhou
Chan Zhou and Gerhard Wunder
Delay and Throughput Optimal Scheduling for OFDM Broadcast Channels
submitted to IEEE International Symposium on Information Theory (ISIT2007)
publisched in Proc. IEEE Globecom 2007
null
null
cs.IT math.IT
null
In this paper a scheduling policy is presented which minimizes the average delay of the users. The scheduling scheme is investigated both by analysis and simulations carried out in the context of Orthogonal Frequency Division Multiplexing (OFDM) broadcast channels (BC). First the delay optimality is obtained for a static scenario providing solutions for specific subproblems, then the analysis is carried over to the dynamic scheme. Furthermore auxiliary tools are given for proving throughput optimality. Finally simulations show the superior performance of the presented scheme.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 11:44:32 GMT" } ]
2011-11-09T00:00:00
[ [ "Zhou", "Chan", "" ], [ "Wunder", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703039
Christof L\"oding
Thomas Colcombet, Christof L\"oding
Transforming structures by set interpretations
36 pages
Logical Methods in Computer Science, Volume 3, Issue 2 (May 4, 2007) lmcs:2221
10.2168/LMCS-3(2:4)2007
null
cs.LO
null
We consider a new kind of interpretation over relational structures: finite sets interpretations. Those interpretations are defined by weak monadic second-order (WMSO) formulas with free set variables. They transform a given structure into a structure with a domain consisting of finite sets of elements of the orignal structure. The definition of these interpretations directly implies that they send structures with a decidable WMSO theory to structures with a decidable first-order theory. In this paper, we investigate the expressive power of such interpretations applied to infinite deterministic trees. The results can be used in the study of automatic and tree-automatic structures.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 12:52:55 GMT" }, { "version": "v2", "created": "Fri, 4 May 2007 13:59:31 GMT" } ]
2017-01-11T00:00:00
[ [ "Colcombet", "Thomas", "" ], [ "Löding", "Christof", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703040
Yefim Bakman
Yefim Bakman (Tel-Aviv University)
Why the Standard Data Processing should be changed
null
null
null
null
cs.MS
null
The basic statistical methods of data representation did not change since their emergence. Their simplicity was dictated by the intricacies of computations in the before computers epoch. It turns out that such approach is not uniquely possible in the presence of quick computers. The suggested here method improves significantly the reliability of data processing and their graphical representation. In this paper we show problems of the standard data processing which can bring to incorrect results. A method solving these problems is proposed. It is based on modification of data representation. The method was implemented in a computer program Consensus5. The program performances are illustrated through varied examples.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 19:49:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bakman", "Yefim", "", "Tel-Aviv University" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0703041
Marko Horvat B.Sc.CS-Dipl.Ing.
Kresimir Fertalj, Marko Horvat
Comparing Architectures of Mobile Applications
8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS International Conference on Automation & Information in Venice, Italy
WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004, pp. 946-952
null
null
cs.OH
null
This article describes various advantages and disadvantages of SMS, WAP, J2ME and Windows CE technologies in designing mobile applications. In defining the architecture of any software application it is important to get the best trade-off between platform's possibilities and design requirements. Achieving optimum software design is even more important with mobile applications where all computer resources are limited. Therefore, it is important to have a comparative analysis of all relevant contemporary approaches in designing mobile applications. As always, the choice between these technologies is determined by application requirements and system capabilities.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 19:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Fertalj", "Kresimir", "" ], [ "Horvat", "Marko", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0703042
Vaclav Petricek
Lukas Brozovsky, Vaclav Petricek
Recommender System for Online Dating Service
Accepted for Znalosti 2007
null
null
null
cs.IR cs.SE
null
Users of online dating sites are facing information overload that requires them to manually construct queries and browse huge amount of matching user profiles. This becomes even more problematic for multimedia profiles. Although matchmaking is frequently cited as a typical application for recommender systems, there is a surprising lack of work published in this area. In this paper we describe a recommender system we implemented and perform a quantitative comparison of two collaborative filtering (CF) and two global algorithms. Results show that collaborative filtering recommenders significantly outperform global algorithms that are currently used by dating sites. A blind experiment with real users also confirmed that users prefer CF based recommendations to global popularity recommendations. Recommender systems show a great potential for online dating where they could improve the value of the service to users and improve monetization of the service.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 15:38:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Brozovsky", "Lukas", "" ], [ "Petricek", "Vaclav", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0703043
Vaclav Petricek
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G. Councill, C. Lee Giles
A Comparison of On-Line Computer Science Citation Databases
ECDL 2005
null
null
null
cs.DL
null
This paper examines the difference and similarities between the two on-line computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manually while the CiteSeer entries are obtained autonomously via a crawl of the Web and automatic processing of user submissions. CiteSeer's autonomous citation database can be considered a form of self-selected on-line survey. It is important to understand the limitations of such databases, particularly when citation information is used to assess the performance of authors, institutions and funding bodies. We show that the CiteSeer database contains considerably fewer single author papers. This bias can be modeled by an exponential process with intuitive explanation. The model permits us to predict that the DBLP database covers approximately 24% of the entire literature of Computer Science. CiteSeer is also biased against low-cited papers. Despite their difference, both databases exhibit similar and significantly different citation distributions compared with previous analysis of the Physics community. In both databases, we also observe that the number of authors per paper has been increasing over time.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 16:00:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Petricek", "Vaclav", "" ], [ "Cox", "Ingemar J.", "" ], [ "Han", "Hui", "" ], [ "Councill", "Isaac G.", "" ], [ "Giles", "C. Lee", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0703044
Samuel Thibault
Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine - LORIA)
BrlAPI: Simple, Portable, Concurrent, Application-level Control of Braille Terminals
null
Dans International Conference on Information and Communication Technology Accessibility (ICTA) (2007)
null
null
cs.HC
null
Screen readers can drive braille devices for allowing visually impaired users to access computer environments, by providing them the same information as sighted users. But in some cases, this view is not easy to use on a braille device. In such cases, it would be much more useful to let applications provide their own braille feedback, specially adapted to visually impaired users. Such applications would then need the ability to output braille ; however, allowing both screen readers and applications access a wide panel of braille devices is not a trivial task. We present an abstraction layer that applications may use to communicate with braille devices. They do not need to deal with the specificities of each device, but can do so if necessary. We show how several applications can communicate with one braille device concurrently, with BrlAPI making sensible choices about which application eventually gets access to the device. The description of a widely used implementation of BrlAPI is included.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 16:55:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ], [ "Hinderer", "Sebastien", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0703045
Mehmet Ak\c{c}akaya
Mehmet Ak\c{c}akaya and Vahid Tarokh
Performance Bounds on Sparse Representations Using Redundant Frames
8 pages, 1 figure, Submitted to IEEE Transactions on Signal Processing
null
null
null
cs.IT math.IT
null
We consider approximations of signals by the elements of a frame in a complex vector space of dimension $N$ and formulate both the noiseless and the noisy sparse representation problems. The noiseless representation problem is to find sparse representations of a signal $\mathbf{r}$ given that such representations exist. In this case, we explicitly construct a frame, referred to as the Vandermonde frame, for which the noiseless sparse representation problem can be solved uniquely using $O(N^2)$ operations, as long as the number of non-zero coefficients in the sparse representation of $\mathbf{r}$ is $\epsilon N$ for some $0 \le \epsilon \le 0.5$, thus improving on a result of Candes and Tao \cite{Candes-Tao}. We also show that $\epsilon \le 0.5$ cannot be relaxed without violating uniqueness. The noisy sparse representation problem is to find sparse representations of a signal $\mathbf{r}$ satisfying a distortion criterion. In this case, we establish a lower bound on the trade-off between the sparsity of the representation, the underlying distortion and the redundancy of any given frame.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 19:28:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Akçakaya", "Mehmet", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703046
Xin Zhang
Xin Zhang, H. Vincent Poor and Mung Chiang
Optimal Power Allocation for Distributed Detection over MIMO Channels in Wireless Sensor Networks
14 pages, 31 figures, under review for IEEE Transactions on Signal Processing
null
10.1109/TSP.2008.924639
null
cs.IT math.IT
null
In distributed detection systems with wireless sensor networks, the communication between sensors and a fusion center is not perfect due to interference and limited transmitter power at the sensors to combat noise at the fusion center's receiver. The problem of optimizing detection performance with such imperfect communication brings a new challenge to distributed detection. In this paper, sensors are assumed to have independent but nonidentically distributed observations, and a multi-input/multi-output (MIMO) channel model is included to account for imperfect communication between the sensors and the fusion center. The J-divergence between the distributions of the detection statistic under different hypotheses is used as a performance criterion in order to provide a tractable analysis. Optimizing the performance (in terms of the J-divergence) with individual and total transmitter power constraints on the sensors is studied, and the corresponding power allocation scheme is provided. It is interesting to see that the proposed power allocation is a tradeoff between two factors, the communication channel quality and the local decision quality. For the case with orthogonal channels under certain conditions, the power allocation can be solved by a weighted water-filling algorithm. Simulations show that, to achieve the same performance, the proposed power allocation in certain cases only consumes as little as 25 percent of the total power used by an equal power allocation scheme.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 19:40:21 GMT" }, { "version": "v2", "created": "Tue, 17 Jul 2007 15:46:23 GMT" } ]
2009-11-13T00:00:00
[ [ "Zhang", "Xin", "" ], [ "Poor", "H. Vincent", "" ], [ "Chiang", "Mung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703047
Hamidreza Farmanbar
Hamid Farmanbar and Amir K. Khandani
Precoding for the AWGN Channel with Discrete Interference
29 Pages, 9 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
$M$-ary signal transmission over AWGN channel with additive $Q$-ary interference where the sequence of i.i.d. interference symbols is known causally at the transmitter is considered. Shannon's theorem for channels with side information at the transmitter is used to formulate the capacity of the channel. It is shown that by using at most $MQ-Q+1$ out of $M^Q$ input symbols of the \emph{associated} channel, the capacity is achievable. For the special case where the Gaussian noise power is zero, a sufficient condition, which is independent of interference, is given for the capacity to be $\log_2 M$ bits per channel use. The problem of maximization of the transmission rate under the constraint that the channel input given any current interference symbol is uniformly distributed over the channel input alphabet is investigated. For this setting, the general structure of a communication system with optimal precoding is proposed. The extension of the proposed precoding scheme to continuous channel input alphabet is also investigated.
[ { "version": "v1", "created": "Sat, 10 Mar 2007 00:46:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Farmanbar", "Hamid", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703048
Luoquan Hu
Luoquan Hu, Han Yu, Yifan Chen
Path Loss Models Based on Stochastic Rays
23 pages, 11 figures, 18 References, to appear in IET Microwaves, Antenna & Propagation In subsection '3.2 The generic stochastic ray model', Eq. (17): The original expression is false, now it is modified
null
null
null
cs.IT math.IT
null
In this paper, two-dimensional percolation lattices are applied to describe wireless propagation environment, and stochastic rays are employed to model the trajectories of radio waves. We first derive the probability that a stochastic ray undergoes certain number of collisions at a specific spatial location. Three classes of stochastic rays with different constraint conditions are considered: stochastic rays of random walks, and generic stochastic rays with two different anomalous levels. Subsequently, we obtain the closed-form formulation of mean received power of radio waves under non line-of-sight conditions for each class of stochastic ray. Specifically, the determination of model parameters and the effects of lattice structures on the path loss are investigated. The theoretical results are validated by comparison with experimental data.
[ { "version": "v1", "created": "Sat, 10 Mar 2007 02:26:08 GMT" }, { "version": "v2", "created": "Wed, 21 Mar 2007 01:00:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Hu", "Luoquan", "" ], [ "Yu", "Han", "" ], [ "Chen", "Yifan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703049
Olga Savenkova
Oleg N. Karpov, Olga A. Savenkova
Algorithm of Segment-Syllabic Synthesis in Speech Recognition Problem
11 pages, 4 figures
null
null
null
cs.SD cs.CL
null
Speech recognition based on the syllable segment is discussed in this paper. The principal search methods in space of states for the speech recognition problem by segment-syllabic parameters trajectory synthesis are investigated. Recognition as comparison the parameters trajectories in chosen speech units on the sections of the segmented speech is realized. Some experimental results are given and discussed.
[ { "version": "v1", "created": "Sat, 10 Mar 2007 23:59:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Karpov", "Oleg N.", "" ], [ "Savenkova", "Olga A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0703050
Nabhendra Bisnik
Nabhendra Bisnik, Alhussein A. Abouzeid
On The Capacity Deficit of Mobile Wireless Ad Hoc Networks: A Rate Distortion Formulation
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Overheads incurred by routing protocols diminish the capacity available for relaying useful data in a mobile wireless ad hoc network. Discovering lower bounds on the amount of protocol overhead incurred for routing data packets is important for the development of efficient routing protocols, and for characterizing the actual (effective) capacity available for network users. This paper presents an information-theoretic framework for characterizing the minimum routing overheads of geographic routing in a network with mobile nodes. specifically, the minimum overhead problem is formulated as a rate-distortion problem. The formulation may be applied to networks with arbitrary traffic arrival and location service schemes. Lower bounds are derived for the minimum overheads incurred for maintaining the location of destination nodes and consistent neighborhood information in terms of node mobility and packet arrival process. This leads to a characterization of the deficit caused by the routing overheads on the overall transport capacity.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 01:11:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Bisnik", "Nabhendra", "" ], [ "Abouzeid", "Alhussein A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703051
Yu Ding
Yu Ding
An ExpTime Procedure for Description Logic $\mathcal{ALCQI}$ (Draft)
This paper is submitted in 2007
null
null
null
cs.LO
null
A worst-case ExpTime tableau-based decision procedure is outlined for the satisfiability problem in $\mathcal{ALCQI}$ w.r.t. general axioms.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 01:55:23 GMT" }, { "version": "v2", "created": "Tue, 13 Mar 2007 00:23:59 GMT" }, { "version": "v3", "created": "Sun, 18 Mar 2007 19:38:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Yu", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703052
Kalle Ranto
C. Hollanti, J. Lahtonen, K. Ranto, R. Vehkalahti
On the densest MIMO lattices from cyclic division algebras
33 pages, 1 figure, submitted to IEEE Trans. on Inform. Theory Dec. 2006
IEEE Trans. Inf. Theory, vol. 55(8), Aug. 2009, pp. 3751-3780
null
null
cs.IT math.IT
null
It is shown why the discriminant of a maximal order within a cyclic division algebra must be minimized in order to get the densest possible matrix lattices with a prescribed nonvanishing minimum determinant. Using results from class field theory a lower bound to the minimum discriminant of a maximal order with a given center and index (= the number of Tx/Rx antennas) is derived. Also numerous examples of division algebras achieving our bound are given. E.g. we construct a matrix lattice with QAM coefficients that has 2.5 times as many codewords as the celebrated Golden code of the same minimum determinant. We describe a general algorithm due to Ivanyos and Ronyai for finding maximal orders within a cyclic division algebra and discuss our enhancements to this algorithm. We also consider general methods for finding cyclic division algebras of a prescribed index achieving our lower bound.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 09:39:47 GMT" } ]
2009-08-19T00:00:00
[ [ "Hollanti", "C.", "" ], [ "Lahtonen", "J.", "" ], [ "Ranto", "K.", "" ], [ "Vehkalahti", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703053
Nicolas Lomenie
Guray Erus (CRIP5), Nicolas Lom\'enie (CRIP5)
Extraction of cartographic objects in high resolution satellite images for object model generation
null
4th Workshop on pattern Recognition in Remote Sensing in conjunction with ICPR2006 (08/2006) 00-00
null
null
cs.CV
null
The aim of this study is to detect man-made cartographic objects in high-resolution satellite images. New generation satellites offer a sub-metric spatial resolution, in which it is possible (and necessary) to develop methods at object level rather than at pixel level, and to exploit structural features of objects. With this aim, a method to generate structural object models from manually segmented images has been developed. To generate the model from non-segmented images, extraction of the objects from the sample images is required. A hybrid method of extraction (both in terms of input sources and segmentation algorithms) is proposed: A region based segmentation is applied on a 10 meter resolution multi-spectral image. The result is used as marker in a "marker-controlled watershed method using edges" on a 2.5 meter resolution panchromatic image. Very promising results have been obtained even on images where the limits of the target objects are not apparent.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 15:57:23 GMT" } ]
2016-08-14T00:00:00
[ [ "Erus", "Guray", "", "CRIP5" ], [ "Loménie", "Nicolas", "", "CRIP5" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0703054
Julien Hendrickx
Vincent D. Blondel, Julien M. Hendrickx and Raphael M. Jungers
Linear time algorithms for Clobber
null
null
null
null
cs.GT
null
We prove that the single-player game clobber is solvable in linear time when played on a line or on a cycle. For this purpose, we show that this game is equivalent to an optimization problem on a set of words defined by seven classes of forbidden patterns. We also prove that, playing on the cycle, it is always possible to remove at least 2n/3 pawns, and we give a conformation for which it is not possible to do better, answering questions recently asked by Faria et al.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 17:04:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Blondel", "Vincent D.", "" ], [ "Hendrickx", "Julien M.", "" ], [ "Jungers", "Raphael M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0703055
Kristiaan Pelckmans
Kristiaan Pelckmans, Jos De Brabanter, Johan A.K. Suykens, Bart De Moor
Support and Quantile Tubes
null
null
null
null
cs.IT cs.LG math.IT
null
This correspondence studies an estimator of the conditional support of a distribution underlying a set of i.i.d. observations. The relation with mutual information is shown via an extension of Fano's theorem in combination with a generalization bound based on a compression argument. Extensions to estimating the conditional quantile interval, and statistical guarantees on the minimal convex hull are given.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 19:14:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Pelckmans", "Kristiaan", "" ], [ "De Brabanter", "Jos", "" ], [ "Suykens", "Johan A. K.", "" ], [ "De Moor", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703056
Kamel Aouiche
Kamel Aouiche and Daniel Lemire
Unasssuming View-Size Estimation Techniques in OLAP
Published in ICEIS 2007
null
null
null
cs.DB cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Even if storage was infinite, a data warehouse could not materialize all possible views due to the running time and update requirements. Therefore, it is necessary to estimate quickly, accurately, and reliably the size of views. Many available techniques make particular statistical assumptions and their error can be quite large. Unassuming techniques exist, but typically assume we have independent hashing for which there is no known practical implementation. We adapt an unassuming estimator due to Gibbons and Tirthapura: its theoretical bounds do not make unpractical assumptions. We compare this technique experimentally with stochastic probabilistic counting, LogLog probabilistic counting, and multifractal statistical models. Our experiments show that we can reliably and accurately (within 10%, 19 times out 20) estimate view sizes over large data sets (1.5 GB) within minutes, using almost no memory. However, only Gibbons-Tirthapura provides universally tight estimates irrespective of the size of the view. For large views, probabilistic counting has a small edge in accuracy, whereas the competitive sampling-based method (multifractal) we tested is an order of magnitude faster but can sometimes provide poor estimates (relative error of 100%). In our tests, LogLog probabilistic counting is not competitive. Experimental validation on the US Census 1990 data set and on the Transaction Processing Performance (TPC H) data set is provided.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 21:42:59 GMT" }, { "version": "v2", "created": "Mon, 9 Jul 2007 14:29:53 GMT" }, { "version": "v3", "created": "Mon, 8 Dec 2008 19:23:44 GMT" } ]
2008-12-08T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0703057
Ali Pezeshki
Ali Pezeshki, A. Robert Calderbank, William Moran, and Stephen D. Howard
Doppler Resilient Waveforms with Perfect Autocorrelation
Submitted to IEEE Transactions on Information Theory, March 2007
null
null
null
cs.IT math.IT
null
We describe a method of constructing a sequence of phase coded waveforms with perfect autocorrelation in the presence of Doppler shift. The constituent waveforms are Golay complementary pairs which have perfect autocorrelation at zero Doppler but are sensitive to nonzero Doppler shifts. We extend this construction to multiple dimensions, in particular to radar polarimetry, where the two dimensions are realized by orthogonal polarizations. Here we determine a sequence of two-by-two Alamouti matrices where the entries involve Golay pairs and for which the sum of the matrix-valued ambiguity functions vanish at small Doppler shifts. The Prouhet-Thue-Morse sequence plays a key role in the construction of Doppler resilient sequences of Golay pairs.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 21:46:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Pezeshki", "Ali", "" ], [ "Calderbank", "A. Robert", "" ], [ "Moran", "William", "" ], [ "Howard", "Stephen D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703058
Kamel Aouiche
Kamel Aouiche and Daniel Lemire
A Comparison of Five Probabilistic View-Size Estimation Techniques in OLAP
null
null
null
null
cs.DB cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data warehouse cannot materialize all possible views, hence we must estimate quickly, accurately, and reliably the size of views to determine the best candidates for materialization. Many available techniques for view-size estimation make particular statistical assumptions and their error can be large. Comparatively, unassuming probabilistic techniques are slower, but they estimate accurately and reliability very large view sizes using little memory. We compare five unassuming hashing-based view-size estimation techniques including Stochastic Probabilistic Counting and LogLog Probabilistic Counting. Our experiments show that only Generalized Counting, Gibbons-Tirthapura, and Adaptive Counting provide universally tight estimates irrespective of the size of the view; of those, only Adaptive Counting remains constantly fast as we increase the memory budget.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 17:46:11 GMT" }, { "version": "v2", "created": "Mon, 2 Jul 2007 13:27:01 GMT" }, { "version": "v3", "created": "Mon, 8 Dec 2008 19:26:17 GMT" } ]
2008-12-08T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0703059
J. M. Landsberg
J.M. Landsberg
Geometry and the complexity of matrix multiplication
34 pages, 4 figures
null
null
null
cs.CC math.AG math.RT
null
We survey results in algebraic complexity theory, focusing on matrix multiplication. Our goals are (i.) to show how open questions in algebraic complexity theory are naturally posed as questions in geometry and representation theory, (ii.) to motivate researchers to work on these questions, and (iii.) to point out relations with more general problems in geometry. The key geometric objects for our study are the secant varieties of Segre varieties. We explain how these varieties are also useful for algebraic statistics, the study of phylogenetic invariants, and quantum computing.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 22:11:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Landsberg", "J. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
cs/0703060
Florentin Smarandache
Jose L. Salmeron, Florentin Smarandache
Redesigning Decision Matrix Method with an indeterminacy-based inference process
12 pages, 4 figures, one table
A short version published in Advances in Fuzzy Sets and Systems, Vol. 1(2), 263-271, 2006
null
null
cs.AI
null
For academics and practitioners concerned with computers, business and mathematics, one central issue is supporting decision makers. In this paper, we propose a generalization of Decision Matrix Method (DMM), using Neutrosophic logic. It emerges as an alternative to the existing logics and it represents a mathematical model of uncertainty and indeterminacy. This paper proposes the Neutrosophic Decision Matrix Method as a more realistic tool for decision making. In addition, a de-neutrosophication process is included.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 02:18:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Salmeron", "Jose L.", "" ], [ "Smarandache", "Florentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0703061
Ralf Koetter
Ralf Koetter and Frank Kschischang
Coding for Errors and Erasures in Random Network Coding
This revised paper contains some minor changes and clarifications
null
null
null
cs.IT cs.NI math.IT
null
The problem of error-control in random linear network coding is considered. A ``noncoherent'' or ``channel oblivious'' model is assumed where neither transmitter nor receiver is assumed to have knowledge of the channel transfer characteristic. Motivated by the property that linear network coding is vector-space preserving, information transmission is modelled as the injection into the network of a basis for a vector space $V$ and the collection by the receiver of a basis for a vector space $U$. A metric on the projective geometry associated with the packet space is introduced, and it is shown that a minimum distance decoder for this metric achieves correct decoding if the dimension of the space $V \cap U$ is sufficiently large. If the dimension of each codeword is restricted to a fixed integer, the code forms a subset of a finite-field Grassmannian, or, equivalently, a subset of the vertices of the corresponding Grassmann graph. Sphere-packing and sphere-covering bounds as well as a generalization of the Singleton bound are provided for such codes. Finally, a Reed-Solomon-like code construction, related to Gabidulin's construction of maximum rank-distance codes, is described and a Sudan-style ``list-1'' minimum distance decoding algorithm is provided.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 07:43:46 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2008 16:29:01 GMT" } ]
2008-03-25T00:00:00
[ [ "Koetter", "Ralf", "" ], [ "Kschischang", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703062
Remi Munos
Pierre-Arnaud Coquelin (CMAP), R\'emi Munos (INRIA Futurs)
Bandit Algorithms for Tree Search
null
null
null
null
cs.LG
null
Bandit based methods for tree search have recently gained popularity when applied to huge trees, e.g. in the game of go (Gelly et al., 2006). The UCT algorithm (Kocsis and Szepesvari, 2006), a tree search method based on Upper Confidence Bounds (UCB) (Auer et al., 2002), is believed to adapt locally to the effective smoothness of the tree. However, we show that UCT is too ``optimistic'' in some cases, leading to a regret O(exp(exp(D))) where D is the depth of the tree. We propose alternative bandit algorithms for tree search. First, a modification of UCT using a confidence sequence that scales exponentially with the horizon depth is proven to have a regret O(2^D \sqrt{n}), but does not adapt to possible smoothness in the tree. We then analyze Flat-UCB performed on the leaves and provide a finite regret bound with high probability. Then, we introduce a UCB-based Bandit Algorithm for Smooth Trees which takes into account actual smoothness of the rewards for performing efficient ``cuts'' of sub-optimal branches with high confidence. Finally, we present an incremental tree search version which applies when the full tree is too big (possibly infinite) to be entirely represented and show that with high probability, essentially only the optimal branches is indefinitely developed. We illustrate these methods on a global optimization problem of a Lipschitz function, given noisy data.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 08:53:41 GMT" } ]
2016-08-14T00:00:00
[ [ "Coquelin", "Pierre-Arnaud", "", "CMAP" ], [ "Munos", "Rémi", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0703063
Konstantin Avrachenkov
Konstantin Avrachenkov (INRIA Sophia Antipolis), Urtzi Ayesta (LAAS), Alexei Piunovskiy
Convergence and Optimal Buffer Sizing for Window Based AIMD Congestion Control
null
null
null
null
cs.NI
null
We study the interaction between the AIMD (Additive Increase Multiplicative Decrease) congestion control and a bottleneck router with Drop Tail buffer. We consider the problem in the framework of deterministic hybrid models. First, we show that the hybrid model of the interaction between the AIMD congestion control and bottleneck router always converges to a cyclic behavior. We characterize the cycles. Necessary and sufficient conditions for the absence of multiple jumps of congestion window in the same cycle are obtained. Then, we propose an analytical framework for the optimal choice of the router buffer size. We formulate the problem of the optimal router buffer size as a multi-criteria optimization problem, in which the Lagrange function corresponds to a linear combination of the average goodput and the average delay in the queue. The solution to the optimization problem provides further evidence that the buffer size should be reduced in the presence of traffic aggregation. Our analytical results are confirmed by simulations performed with Simulink and the NS simulator.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 09:00:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Avrachenkov", "Konstantin", "", "INRIA Sophia Antipolis" ], [ "Ayesta", "Urtzi", "", "LAAS" ], [ "Piunovskiy", "Alexei", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703064
Frank Stephan
Bakhadyr Khoussainov, Andre Nies, Sasha Rubin and Frank Stephan
Automatic Structures: Richness and Limitations
null
Logical Methods in Computer Science, Volume 3, Issue 2 (April 26, 2007) lmcs:2219
10.2168/LMCS-3(2:2)2007
null
cs.DM cs.LO
null
We study the existence of automatic presentations for various algebraic structures. An automatic presentation of a structure is a description of the universe of the structure by a regular set of words, and the interpretation of the relations by synchronised automata. Our first topic concerns characterising classes of automatic structures. We supply a characterisation of the automatic Boolean algebras, and it is proven that the free Abelian group of infinite rank, as well as certain Fraisse limits, do not have automatic presentations. In particular, the countably infinite random graph and the random partial order do not have automatic presentations. Furthermore, no infinite integral domain is automatic. Our second topic is the isomorphism problem. We prove that the complexity of the isomorphism problem for the class of all automatic structures is \Sigma_1^1-complete.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 09:38:05 GMT" }, { "version": "v2", "created": "Thu, 26 Apr 2007 11:42:01 GMT" } ]
2017-01-11T00:00:00
[ [ "Khoussainov", "Bakhadyr", "" ], [ "Nies", "Andre", "" ], [ "Rubin", "Sasha", "" ], [ "Stephan", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703065
Gabriel Istrate
Gabriel Istrate
Satisfying assignments of Random Boolean CSP: Clusters and Overlaps
null
null
null
null
cs.DM cond-mat.dis-nn cs.CC
null
The distribution of overlaps of solutions of a random CSP is an indicator of the overall geometry of its solution space. For random $k$-SAT, nonrigorous methods from Statistical Physics support the validity of the ``one step replica symmetry breaking'' approach. Some of these predictions were rigorously confirmed in \cite{cond-mat/0504070/prl} \cite{cond-mat/0506053}. There it is proved that the overlap distribution of random $k$-SAT, $k\geq 9$, has discontinuous support. Furthermore, Achlioptas and Ricci-Tersenghi proved that, for random $k$-SAT, $k\geq 8$. and constraint densities close enough to the phase transition there exists an exponential number of clusters of satisfying assignments; moreover, the distance between satisfying assignments in different clusters is linear. We aim to understand the structural properties of random CSP that lead to solution clustering. To this end, we prove two results on the cluster structure of solutions for binary CSP under the random model from Molloy (STOC 2002) 1. For all constraint sets $S$ (described explicitly in Creignou and Daude (2004), Istrate (2005)) s.t. $SAT(S)$ has a sharp threshold and all $q\in (0,1]$, $q$-overlap-$SAT(S)$ has a sharp threshold (i.e. the first step of the approach in Mora et al. works in all nontrivial cases). 2. For any constraint density value $c<1$, the set of solutions of a random instance of 2-SAT form, w.h.p., a single cluster. Also, for and any $q\in (0,1]$ such an instance has w.h.p. two satisfying assignment of overlap $\sim q$. Thus, as expected from Statistical Physics predictions, the second step of the approach in Mora et al. fails for 2-SAT.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 15:45:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703066
Gerard Cohen
Charon Cohen, Hudry Lobstein
Discriminating and Identifying Codes in the Binary Hamming Space
null
null
null
null
cs.DM
null
Let $F^n$ be the binary $n$-cube, or binary Hamming space of dimension $n$, endowed with the Hamming distance, and ${\cal E}^n$ (respectively, ${\cal O}^n$) the set of vectors with even (respectively, odd) weight. For $r\geq 1$ and $x\in F^n$, we denote by $B_r(x)$ the ball of radius $r$ and centre $x$. A code $C\subseteq F^n$ is said to be $r$-identifying if the sets $B_r(x) \cap C$, $x\in F^n$, are all nonempty and distinct. A code $C\subseteq {\cal E}^n$ is said to be $r$-discriminating if the sets $B_r(x) \cap C$, $x\in {\cal O}^n$, are all nonempty and distinct. We show that the two definitions, which were given for general graphs, are equivalent in the case of the Hamming space, in the following sense: for any odd $r$, there is a bijection between the set of $r$-identifying codes in $F^n$ and the set of $r$-discriminating codes in $F^{n+1}$. We then extend previous studies on constructive upper bounds for the minimum cardinalities of identifying codes in the Hamming space.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 15:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "Charon", "" ], [ "Lobstein", "Hudry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0703067
Stephen Smith
Stephen L. Smith, Francesco Bullo
Target assignment for robotic networks: asymptotic performance under limited communication
2007 ACC paper including proofs; Corrected typos
null
null
null
cs.RO
null
We are given an equal number of mobile robotic agents, and distinct target locations. Each agent has simple integrator dynamics, a limited communication range, and knowledge of the position of every target. We address the problem of designing a distributed algorithm that allows the group of agents to divide the targets among themselves and, simultaneously, leads each agent to reach its unique target. We do not require connectivity of the communication graph at any time. We introduce a novel assignment-based algorithm with the following features: initial assignments and robot motions follow a greedy rule, and distributed refinements of the assignment exploit an implicit circular ordering of the targets. We prove correctness of the algorithm, and give worst-case asymptotic bounds on the time to complete the assignment as the environment grows with the number of agents. We show that among a certain class of distributed algorithms, our algorithm is asymptotically optimal. The analysis utilizes results on the Euclidean traveling salesperson problem.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 19:20:45 GMT" }, { "version": "v2", "created": "Tue, 20 Mar 2007 19:57:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0703068
Vladimir Surkov
Kenneth R. Jackson, Sebastian Jaimungal, Vladimir Surkov
Option Valuation using Fourier Space Time Stepping
null
null
null
null
cs.CE
null
It is well known that the Black-Scholes-Merton model suffers from several deficiencies. Jump-diffusion and Levy models have been widely used to partially alleviate some of the biases inherent in this classical model. Unfortunately, the resulting pricing problem requires solving a more difficult partial-integro differential equation (PIDE) and although several approaches for solving the PIDE have been suggested in the literature, none are entirely satisfactory. All treat the integral and diffusive terms asymmetrically and are difficult to extend to higher dimensions. We present a new, efficient algorithm, based on transform methods, which symmetrically treats the diffusive and integrals terms, is applicable to a wide class of path-dependent options (such as Bermudan, barrier, and shout options) and options on multiple assets, and naturally extends to regime-switching Levy models. We present a concise study of the precision and convergence properties of our algorithm for several classes of options and Levy models and demonstrate that the algorithm is second-order in space and first-order in time for path-dependent options.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 19:48:42 GMT" }, { "version": "v2", "created": "Wed, 14 Mar 2007 20:49:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Jackson", "Kenneth R.", "" ], [ "Jaimungal", "Sebastian", "" ], [ "Surkov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0703069
Paul Fodor
Paul Fodor
Portlet Wrappers using JavaScript
null
null
null
null
cs.SE
null
In this paper we extend the classical portal (with static portlets) design with HTML DOM Web clipping on the client browser using dynamic JavaScript portlets: the portal server supplies the user/passwords for all services through https and the client browser retrieves web pages and cuts/selects/changes the desired parts using paths (XPath) in the Web page structure. This operation brings along a set of advantages: dynamic wrapping of existing legacy websites in the client browser, the reloading of only changed portlets instead of whole portal, low bandwidth on the server, the elimination of re-writing the URL links in the portal, and last but not least, a support for Java applets in portlets by putting the login cookies on the client browser. Our solution is compliant with JSR168 Portlet Specification allowing portability across all vendor platforms.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 23:32:43 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:46:21 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:02:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]