id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0704.0002
Louis Theran
Ileana Streinu and Louis Theran
Sparsity-certifying Graph Decompositions
To appear in Graphs and Combinatorics
null
null
null
math.CO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new algorithm, the $(k,\ell)$-pebble game with colors, and use it obtain a characterization of the family of $(k,\ell)$-sparse graphs and algorithmic solutions to a family of problems concerning tree decompositions of graphs. Special instances of sparse graphs appear in rigidity theory and have received increased attention in recent years. In particular, our colored pebbles generalize and strengthen the previous results of Lee and Streinu and give a new proof of the Tutte-Nash-Williams characterization of arboricity. We also present a new decomposition that certifies sparsity based on the $(k,\ell)$-pebble game with colors. Our work also exposes connections between pebble game algorithms and previous sparse graph algorithms by Gabow, Gabow and Westermann and Hendrickson.
[ { "version": "v1", "created": "Sat, 31 Mar 2007 02:26:18 GMT" }, { "version": "v2", "created": "Sat, 13 Dec 2008 17:26:00 GMT" } ]
2008-12-13T00:00:00
[ [ "Streinu", "Ileana", "" ], [ "Theran", "Louis", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0704.0046
Denes Petz
I. Csiszar, F. Hiai and D. Petz
A limit relation for entropy and channel capacity per unit cost
LATEX file, 11 pages
J. Math. Phys. 48(2007), 092102.
10.1063/1.2779138
null
quant-ph cs.IT math.IT
null
In a quantum mechanical model, Diosi, Feldmann and Kosloff arrived at a conjecture stating that the limit of the entropy of certain mixtures is the relative entropy as system size goes to infinity. The conjecture is proven in this paper for density matrices. The first proof is analytic and uses the quantum law of large numbers. The second one clarifies the relation to channel capacity per unit cost for classical-quantum channels. Both proofs lead to generalization of the conjecture.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 16:37:36 GMT" } ]
2009-11-13T00:00:00
[ [ "Csiszar", "I.", "" ], [ "Hiai", "F.", "" ], [ "Petz", "D.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0047
Igor Grabec
T. Kosel and I. Grabec
Intelligent location of simultaneously active acoustic emission sources: Part I
5 pages, 5 eps figures, uses IEEEtran.cls
null
null
null
cs.NE cs.AI
null
The intelligent acoustic emission locator is described in Part I, while Part II discusses blind source separation, time delay estimation and location of two simultaneously active continuous acoustic emission sources. The location of acoustic emission on complicated aircraft frame structures is a difficult problem of non-destructive testing. This article describes an intelligent acoustic emission source locator. The intelligent locator comprises a sensor antenna and a general regression neural network, which solves the location problem based on learning from examples. Locator performance was tested on different test specimens. Tests have shown that the accuracy of location depends on sound velocity and attenuation in the specimen, the dimensions of the tested area, and the properties of stored data. The location accuracy achieved by the intelligent locator is comparable to that obtained by the conventional triangulation method, while the applicability of the intelligent locator is more general since analysis of sonic ray paths is avoided. This is a promising method for non-destructive testing of aircraft frame structures by the acoustic emission method.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 13:06:50 GMT" } ]
2009-09-29T00:00:00
[ [ "Kosel", "T.", "" ], [ "Grabec", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.0050
Igor Grabec
T. Kosel and I. Grabec
Intelligent location of simultaneously active acoustic emission sources: Part II
5 pages, 7 eps figures, uses IEEEtran.cls
null
null
null
cs.NE cs.AI
null
Part I describes an intelligent acoustic emission locator, while Part II discusses blind source separation, time delay estimation and location of two continuous acoustic emission sources. Acoustic emission (AE) analysis is used for characterization and location of developing defects in materials. AE sources often generate a mixture of various statistically independent signals. A difficult problem of AE analysis is separation and characterization of signal components when the signals from various sources and the mode of mixing are unknown. Recently, blind source separation (BSS) by independent component analysis (ICA) has been used to solve these problems. The purpose of this paper is to demonstrate the applicability of ICA to locate two independent simultaneously active acoustic emission sources on an aluminum band specimen. The method is promising for non-destructive testing of aircraft frame structures by acoustic emission analysis.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 18:53:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Kosel", "T.", "" ], [ "Grabec", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.0062
Tom\'a\v{s} Vina\v{r}
Rastislav \v{S}r\'amek, Bro\v{n}a Brejov\'a, Tom\'a\v{s} Vina\v{r}
On-line Viterbi Algorithm and Its Relationship to Random Walks
null
Algorithms in Bioinformatics: 7th International Workshop (WABI), 4645 volume of Lecture Notes in Computer Science, pp. 240-251, Philadelphia, PA, USA, September 2007. Springer
10.1007/978-3-540-74126-8_23
null
cs.DS
null
In this paper, we introduce the on-line Viterbi algorithm for decoding hidden Markov models (HMMs) in much smaller than linear space. Our analysis on two-state HMMs suggests that the expected maximum memory used to decode sequence of length $n$ with $m$-state HMM can be as low as $\Theta(m\log n)$, without a significant slow-down compared to the classical Viterbi algorithm. Classical Viterbi algorithm requires $O(mn)$ space, which is impractical for analysis of long DNA sequences (such as complete human genome chromosomes) and for continuous data streams. We also experimentally demonstrate the performance of the on-line Viterbi algorithm on a simple HMM for gene finding on both simulated and real DNA sequences.
[ { "version": "v1", "created": "Sat, 31 Mar 2007 23:52:33 GMT" } ]
2010-01-25T00:00:00
[ [ "Šrámek", "Rastislav", "" ], [ "Brejová", "Broňa", "" ], [ "Vinař", "Tomáš", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.0090
Lester Ingber
Lester Ingber
Real Options for Project Schedules (ROPS)
null
null
null
Report 2007:ROPS
cs.CE cond-mat.stat-mech cs.MS cs.NA physics.data-an
null
Real Options for Project Schedules (ROPS) has three recursive sampling/optimization shells. An outer Adaptive Simulated Annealing (ASA) optimization shell optimizes parameters of strategic Plans containing multiple Projects containing ordered Tasks. A middle shell samples probability distributions of durations of Tasks. An inner shell samples probability distributions of costs of Tasks. PATHTREE is used to develop options on schedules.. Algorithms used for Trading in Risk Dimensions (TRD) are applied to develop a relative risk analysis among projects.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 14:35:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ingber", "Lester", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0704.0098
Jack Raymond
Jack Raymond, David Saad
Sparsely-spread CDMA - a statistical mechanics based analysis
23 pages, 5 figures, figure 1 amended since published version
J. Phys. A: Math. Theor. 40 No 41 (12 October 2007) 12315-12333
10.1088/1751-8113/40/41/004
null
cs.IT math.IT
null
Sparse Code Division Multiple Access (CDMA), a variation on the standard CDMA method in which the spreading (signature) matrix contains only a relatively small number of non-zero elements, is presented and analysed using methods of statistical physics. The analysis provides results on the performance of maximum likelihood decoding for sparse spreading codes in the large system limit. We present results for both cases of regular and irregular spreading matrices for the binary additive white Gaussian noise channel (BIAWGN) with a comparison to the canonical (dense) random spreading code.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 18:27:26 GMT" }, { "version": "v2", "created": "Fri, 27 Apr 2007 12:39:14 GMT" }, { "version": "v3", "created": "Wed, 1 Aug 2007 19:10:18 GMT" }, { "version": "v4", "created": "Sun, 7 Oct 2007 16:50:39 GMT" }, { "version": "v5", "created": "Wed, 30 Apr 2008 15:36:55 GMT" } ]
2009-11-13T00:00:00
[ [ "Raymond", "Jack", "" ], [ "Saad", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0108
Sergey Gubin
Sergey Gubin
Reducing SAT to 2-SAT
8 pages
null
null
null
cs.CC
null
Description of a polynomial time reduction of SAT to 2-SAT of polynomial size.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 23:16:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.0213
Ketan Mulmuley D
Ketan D. Mulmuley Hariharan Narayanan
Geometric Complexity Theory V: On deciding nonvanishing of a generalized Littlewood-Richardson coefficient
This article has been withdrawn because it has been merged with the earlier article (GCT3) in the series, and a new article appears in this GCT5 slot now as shown in the abstract
null
null
null
cs.CC
null
This article has been withdrawn because it has been merged with the earlier article GCT3 (arXiv: CS/0501076 [cs.CC]) in the series. The merged article is now available as: Geometric Complexity Theory III: on deciding nonvanishing of a Littlewood-Richardson Coefficient, Journal of Algebraic Combinatorics, vol. 36, issue 1, 2012, pp. 103-110. (Authors: Ketan Mulmuley, Hari Narayanan and Milind Sohoni) The new article in this GCT5 slot in the series is: Geometric Complexity Theory V: Equivalence between blackbox derandomization of polynomial identity testing and derandomization of Noether's Normalization Lemma, in the Proceedings of FOCS 2012 (abstract), arXiv:1209.5993 [cs.CC] (full version) (Author: Ketan Mulmuley)
[ { "version": "v1", "created": "Mon, 2 Apr 2007 15:13:27 GMT" }, { "version": "v2", "created": "Thu, 27 Sep 2012 15:23:39 GMT" } ]
2012-09-28T00:00:00
[ [ "Narayanan", "Ketan D. Mulmuley Hariharan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.0217
Wiroonsak Santipach
Wiroonsak Santipach and Michael L. Honig
Capacity of a Multiple-Antenna Fading Channel with a Quantized Precoding Matrix
null
IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1218--1234, March 2009
10.1109/TIT.2008.2011437
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a multiple-input multiple-output (MIMO) channel, feedback from the receiver can be used to specify a transmit precoding matrix, which selectively activates the strongest channel modes. Here we analyze the performance of Random Vector Quantization (RVQ), in which the precoding matrix is selected from a random codebook containing independent, isotropically distributed entries. We assume that channel elements are i.i.d. and known to the receiver, which relays the optimal (rate-maximizing) precoder codebook index to the transmitter using B bits. We first derive the large system capacity of beamforming (rank-one precoding matrix) as a function of B, where large system refers to the limit as B and the number of transmit and receive antennas all go to infinity with fixed ratios. With beamforming RVQ is asymptotically optimal, i.e., no other quantization scheme can achieve a larger asymptotic rate. The performance of RVQ is also compared with that of a simpler reduced-rank scalar quantization scheme in which the beamformer is constrained to lie in a random subspace. We subsequently consider a precoding matrix with arbitrary rank, and approximate the asymptotic RVQ performance with optimal and linear receivers (matched filter and Minimum Mean Squared Error (MMSE)). Numerical examples show that these approximations accurately predict the performance of finite-size systems of interest. Given a target spectral efficiency, numerical examples show that the amount of feedback required by the linear MMSE receiver is only slightly more than that required by the optimal receiver, whereas the matched filter can require significantly more feedback.
[ { "version": "v1", "created": "Mon, 2 Apr 2007 15:35:24 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2009 03:49:20 GMT" } ]
2010-08-27T00:00:00
[ [ "Santipach", "Wiroonsak", "" ], [ "Honig", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0218
Yuri Pritykin
Yuri Pritykin
On Almost Periodicity Criteria for Morphic Sequences in Some Particular Cases
9 pages. To be presented on 11th International Conference on Developments in Language Theory (DLT'2007), Turku, Finland, July 2007.
null
null
null
cs.DM cs.LO
null
In some particular cases we give criteria for morphic sequences to be almost periodic (=uniformly recurrent). Namely, we deal with fixed points of non-erasing morphisms and with automatic sequences. In both cases a polynomial-time algorithm solving the problem is found. A result more or less supporting the conjecture of decidability of the general problem is given.
[ { "version": "v1", "created": "Mon, 2 Apr 2007 15:45:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0704.0229
Ketan Mulmuley D
Ketan D. Mulmuley
Geometric Complexity Theory VI: the flip via saturated and positive integer programming in representation theory and algebraic geometry
139 pages. Corrects error in the conjectural saturation hypothesis (SH) in the earlier version, which was pointed out in a recent paper of Briand et al (arXIv:0810.3163v1 [math.CO])
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article belongs to a series on geometric complexity theory (GCT), an approach to the P vs. NP and related problems through algebraic geometry and representation theory. The basic principle behind this approach is called the flip. In essence, it reduces the negative hypothesis in complexity theory (the lower bound problems), such as the P vs. NP problem in characteristic zero, to the positive hypothesis in complexity theory (the upper bound problems): specifically, to showing that the problems of deciding nonvanishing of the fundamental structural constants in representation theory and algebraic geometry, such as the well known plethysm constants--or rather certain relaxed forms of these decision probelms--belong to the complexity class P. In this article, we suggest a plan for implementing the flip, i.e., for showing that these relaxed decision problems belong to P. This is based on the reduction of the preceding complexity-theoretic positive hypotheses to mathematical positivity hypotheses: specifically, to showing that there exist positive formulae--i.e. formulae with nonnegative coefficients--for the structural constants under consideration and certain functions associated with them. These turn out be intimately related to the similar positivity properties of the Kazhdan-Lusztig polynomials and the multiplicative structural constants of the canonical (global crystal) bases in the theory of Drinfeld-Jimbo quantum groups. The known proofs of these positivity properties depend on the Riemann hypothesis over finite fields and the related results. Thus the reduction here, in conjunction with the flip, in essence, says that the validity of the P vs. NP conjecture in characteristic zero is intimately linked to the Riemann hypothesis over finite fields and related problems.
[ { "version": "v1", "created": "Mon, 2 Apr 2007 16:41:38 GMT" }, { "version": "v2", "created": "Fri, 18 May 2007 19:55:46 GMT" }, { "version": "v3", "created": "Mon, 28 Apr 2008 19:49:27 GMT" }, { "version": "v4", "created": "Thu, 22 Jan 2009 15:25:24 GMT" } ]
2009-01-22T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.0282
Samuele Bandi
Samuele Bandi, Luca Stabellini, Andrea Conti and Velio Tralli
On Punctured Pragmatic Space-Time Codes in Block Fading Channel
null
null
null
null
cs.IT cs.CC math.IT
null
This paper considers the use of punctured convolutional codes to obtain pragmatic space-time trellis codes over block-fading channel. We show that good performance can be achieved even when puncturation is adopted and that we can still employ the same Viterbi decoder of the convolutional mother code by using approximated metrics without increasing the complexity of the decoding operations.
[ { "version": "v1", "created": "Mon, 2 Apr 2007 22:44:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Bandi", "Samuele", "" ], [ "Stabellini", "Luca", "" ], [ "Conti", "Andrea", "" ], [ "Tralli", "Velio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0301
Akitoshi Kawamura
Akitoshi Kawamura
Differential Recursion and Differentially Algebraic Functions
14 pages, 3 figures
Revised and published in ACM Trans. Comput. Logic 10, Article 22, 2009, under the title "Differential Recursion".
10.1145/1507244.1507252
null
cs.CC
null
Moore introduced a class of real-valued "recursive" functions by analogy with Kleene's formulation of the standard recursive functions. While his concise definition inspired a new line of research on analog computation, it contains some technical inaccuracies. Focusing on his "primitive recursive" functions, we pin down what is problematic and discuss possible attempts to remove the ambiguity regarding the behavior of the differential recursion operator on partial functions. It turns out that in any case the purported relation to differentially algebraic functions, and hence to Shannon's model of analog computation, fails.
[ { "version": "v1", "created": "Tue, 3 Apr 2007 19:50:14 GMT" } ]
2009-04-19T00:00:00
[ [ "Kawamura", "Akitoshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.0304
Carlos Gershenson
Carlos Gershenson
The World as Evolving Information
16 pages. Extended version, three more laws of information, two classifications, and discussion added. To be published (soon) in International Conference on Complex Systems 2007 Proceedings
Minai, A., Braha, D., and Bar-Yam, Y., eds. Unifying Themes in Complex Systems VII, pp. 100-115. Springer, Berlin Heidelberg, 2012
10.1007/978-3-642-18003-3_10
null
cs.IT cs.AI math.IT q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the benefits of describing the world as information, especially in the study of the evolution of life and cognition. Traditional studies encounter problems because it is difficult to describe life and cognition in terms of matter and energy, since their laws are valid only at the physical scale. However, if matter and energy, as well as life and cognition, are described in terms of information, evolution can be described consistently as information becoming more complex. The paper presents eight tentative laws of information, valid at multiple scales, which are generalizations of Darwinian, cybernetic, thermodynamic, psychological, philosophical, and complexity principles. These are further used to discuss the notions of life, cognition and their evolution.
[ { "version": "v1", "created": "Tue, 3 Apr 2007 02:08:48 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2007 20:03:59 GMT" }, { "version": "v3", "created": "Wed, 13 Oct 2010 19:49:16 GMT" } ]
2013-04-05T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0704.0309
Guohun Zhu
Guohun Zhu
The Complexity of HCP in Digraps with Degree Bound Two
10 pages, 4 figures, had been submitted to a Journal
null
null
null
cs.CC cs.DM
null
The Hamiltonian cycle problem (HCP) in digraphs D with degree bound two is solved by two mappings in this paper. The first bijection is between an incidence matrix C_{nm} of simple digraph and an incidence matrix F of balanced bipartite undirected graph G; The second mapping is from a perfect matching of G to a cycle of D. It proves that the complexity of HCP in D is polynomial, and finding a second non-isomorphism Hamiltonian cycle from a given Hamiltonian digraph with degree bound two is also polynomial. Lastly it deduces P=NP base on the results.
[ { "version": "v1", "created": "Tue, 3 Apr 2007 03:50:43 GMT" }, { "version": "v2", "created": "Wed, 13 Jun 2007 15:42:14 GMT" }, { "version": "v3", "created": "Fri, 13 Jul 2007 01:38:24 GMT" } ]
2011-11-09T00:00:00
[ [ "Zhu", "Guohun", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0704.0361
Ioannis Chatzigeorgiou
Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell and Rolando Carrasco
Pseudo-random Puncturing: A Technique to Lower the Error Floor of Turbo Codes
5 pages, 1 figure, Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24-29, 2007
null
10.1109/ISIT.2007.4557299
null
cs.IT math.IT
null
It has been observed that particular rate-1/2 partially systematic parallel concatenated convolutional codes (PCCCs) can achieve a lower error floor than that of their rate-1/3 parent codes. Nevertheless, good puncturing patterns can only be identified by means of an exhaustive search, whilst convergence towards low bit error probabilities can be problematic when the systematic output of a rate-1/2 partially systematic PCCC is heavily punctured. In this paper, we present and study a family of rate-1/2 partially systematic PCCCs, which we call pseudo-randomly punctured codes. We evaluate their bit error rate performance and we show that they always yield a lower error floor than that of their rate-1/3 parent codes. Furthermore, we compare analytic results to simulations and we demonstrate that their performance converges towards the error floor region, owning to the moderate puncturing of their systematic output. Consequently, we propose pseudo-random puncturing as a means of improving the bandwidth efficiency of a PCCC and simultaneously lowering its error floor.
[ { "version": "v1", "created": "Tue, 3 Apr 2007 10:24:38 GMT" } ]
2016-11-18T00:00:00
[ [ "Chatzigeorgiou", "Ioannis", "" ], [ "Rodrigues", "Miguel R. D.", "" ], [ "Wassell", "Ian J.", "" ], [ "Carrasco", "Rolando", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0468
Jinsong Tan
Jinsong Tan
Inapproximability of Maximum Weighted Edge Biclique and Its Applications
null
LNCS 4978, TAMC 2008, pp 282-293
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a bipartite graph $G = (V_1,V_2,E)$ where edges take on {\it both} positive and negative weights from set $\mathcal{S}$, the {\it maximum weighted edge biclique} problem, or $\mathcal{S}$-MWEB for short, asks to find a bipartite subgraph whose sum of edge weights is maximized. This problem has various applications in bioinformatics, machine learning and databases and its (in)approximability remains open. In this paper, we show that for a wide range of choices of $\mathcal{S}$, specifically when $| \frac{\min\mathcal{S}} {\max \mathcal{S}} | \in \Omega(\eta^{\delta-1/2}) \cap O(\eta^{1/2-\delta})$ (where $\eta = \max\{|V_1|, |V_2|\}$, and $\delta \in (0,1/2]$), no polynomial time algorithm can approximate $\mathcal{S}$-MWEB within a factor of $n^{\epsilon}$ for some $\epsilon > 0$ unless $\mathsf{RP = NP}$. This hardness result gives justification of the heuristic approaches adopted for various applied problems in the aforementioned areas, and indicates that good approximation algorithms are unlikely to exist. Specifically, we give two applications by showing that: 1) finding statistically significant biclusters in the SAMBA model, proposed in \cite{Tan02} for the analysis of microarray data, is $n^{\epsilon}$-inapproximable; and 2) no polynomial time algorithm exists for the Minimum Description Length with Holes problem \cite{Bu05} unless $\mathsf{RP=NP}$.
[ { "version": "v1", "created": "Tue, 3 Apr 2007 21:39:11 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2009 02:50:29 GMT" } ]
2009-03-23T00:00:00
[ [ "Tan", "Jinsong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.0492
Shenghui Su
Shenghui Su, and Shuwang Lu
Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
14 pages, and 2 table
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We illustrate through example 1 and 2 that the condition at theorem 1 in [8] dissatisfies necessity, and the converse proposition of fact 1.1 in [8] does not hold, namely the condition Z/M - L/Ak < 1/(2 Ak^2) is not sufficient for f(i) + f(j) = f(k). Illuminate through an analysis and ex.3 that there is a logic error during deduction of fact 1.2, which causes each of fact 1.2, 1.3, 4 to be invalid. Demonstrate through ex.4 and 5 that each or the combination of qu+1 > qu * D at fact 4 and table 1 at fact 2.2 is not sufficient for f(i) + f(j) = f(k), property 1, 2, 3, 4, 5 each are invalid, and alg.1 based on fact 4 and alg.2 based on table 1 are disordered and wrong logically. Further, manifest through a repeated experiment and ex.5 that the data at table 2 is falsified, and the example in [8] is woven elaborately. We explain why Cx = Ax * W^f(x) (% M) is changed to Cx = (Ax * W^f(x))^d (% M) in REESSE1+ v2.1. To the signature fraud, we point out that [8] misunderstands the existence of T^-1 and Q^-1 % (M-1), and forging of Q can be easily avoided through moving H. Therefore, the conclusion of [8] that REESSE1+ is not secure at all (which connotes that [8] can extract a related private key from any public key in REESSE1+) is fully incorrect, and as long as the parameter Omega is fitly selected, REESSE1+ with Cx = Ax * W^f(x) (% M) is secure.
[ { "version": "v1", "created": "Wed, 4 Apr 2007 04:31:00 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2010 14:06:43 GMT" } ]
2010-02-04T00:00:00
[ [ "Su", "Shenghui", "" ], [ "Lu", "Shuwang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0704.0499
Lawrence Ong
Lawrence Ong and Mehul Motani
Optimal Routing for Decode-and-Forward based Cooperation in Wireless Networks
Accepted and to be presented at Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2007), San Diego, California, June 18-21 2007
Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2007), San Diego, CA, pp. 334-343, Jun. 18-21 2007.
10.1109/SAHCN.2007.4292845
null
cs.IT math.IT
null
We investigate cooperative wireless relay networks in which the nodes can help each other in data transmission. We study different coding strategies in the single-source single-destination network with many relay nodes. Given the myriad of ways in which nodes can cooperate, there is a natural routing problem, i.e., determining an ordered set of nodes to relay the data from the source to the destination. We find that for a given route, the decode-and-forward strategy, which is an information theoretic cooperative coding strategy, achieves rates significantly higher than that achievable by the usual multi-hop coding strategy, which is a point-to-point non-cooperative coding strategy. We construct an algorithm to find an optimal route (in terms of rate maximizing) for the decode-and-forward strategy. Since the algorithm runs in factorial time in the worst case, we propose a heuristic algorithm that runs in polynomial time. The heuristic algorithm outputs an optimal route when the nodes transmit independent codewords. We implement these coding strategies using practical low density parity check codes to compare the performance of the strategies on different routes.
[ { "version": "v1", "created": "Wed, 4 Apr 2007 07:22:56 GMT" } ]
2010-04-15T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0528
Soung Liew
Chi Pan Chan, Soung Chang Liew, An Chan
Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks
null
null
null
null
cs.NI cs.IT math.IT
null
This paper investigates the many-to-one throughput capacity (and by symmetry, one-to-many throughput capacity) of IEEE 802.11 multi-hop networks. It has generally been assumed in prior studies that the many-to-one throughput capacity is upper-bounded by the link capacity L. Throughput capacity L is not achievable under 802.11. This paper introduces the notion of "canonical networks", which is a class of regularly-structured networks whose capacities can be analyzed more easily than unstructured networks. We show that the throughput capacity of canonical networks under 802.11 has an analytical upper bound of 3L/4 when the source nodes are two or more hops away from the sink; and simulated throughputs of 0.690L (0.740L) when the source nodes are many hops away. We conjecture that 3L/4 is also the upper bound for general networks. When all links have equal length, 2L/3 can be shown to be the upper bound for general networks. Our simulations show that 802.11 networks with random topologies operated with AODV routing can only achieve throughputs far below the upper bounds. Fortunately, by properly selecting routes near the gateway (or by properly positioning the relay nodes leading to the gateway) to fashion after the structure of canonical networks, the throughput can be improved significantly by more than 150%. Indeed, in a dense network, it is worthwhile to deactivate some of the relay nodes near the sink judiciously.
[ { "version": "v1", "created": "Wed, 4 Apr 2007 09:17:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Chan", "Chi Pan", "" ], [ "Liew", "Soung Chang", "" ], [ "Chan", "An", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0540
Jinhua Jiang
Jinhua Jiang and Xin Yan
On the Achievable Rate Regions for Interference Channels with Degraded Message Sets
22 pages, 8 figures, submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT math.IT
null
The interference channel with degraded message sets (IC-DMS) refers to a communication model in which two senders attempt to communicate with their respective receivers simultaneously through a common medium, and one of the senders has complete and a priori (non-causal) knowledge about the message being transmitted by the other. A coding scheme that collectively has advantages of cooperative coding, collaborative coding, and dirty paper coding, is developed for such a channel. With resorting to this coding scheme, achievable rate regions of the IC-DMS in both discrete memoryless and Gaussian cases are derived, which, in general, include several previously known rate regions. Numerical examples for the Gaussian case demonstrate that in the high-interference-gain regime, the derived achievable rate regions offer considerable improvements over these existing results.
[ { "version": "v1", "created": "Wed, 4 Apr 2007 10:28:16 GMT" }, { "version": "v2", "created": "Thu, 5 Apr 2007 01:41:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Jiang", "Jinhua", "" ], [ "Yan", "Xin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0590
Rachit Agarwal
Rachit Agarwal, Ralf Koetter and Emanuel Popovici
A Low Complexity Algorithm and Architecture for Systematic Encoding of Hermitian Codes
5 Pages, Accepted in IEEE International Symposium on Information Theory ISIT 2007
null
10.1109/ISIT.2007.4557408
null
cs.IT math.IT
null
We present an algorithm for systematic encoding of Hermitian codes. For a Hermitian code defined over GF(q^2), the proposed algorithm achieves a run time complexity of O(q^2) and is suitable for VLSI implementation. The encoder architecture uses as main blocks q varying-rate Reed-Solomon encoders and achieves a space complexity of O(q^2) in terms of finite field multipliers and memory elements.
[ { "version": "v1", "created": "Wed, 4 Apr 2007 15:06:14 GMT" }, { "version": "v2", "created": "Thu, 5 Apr 2007 11:47:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Agarwal", "Rachit", "" ], [ "Koetter", "Ralf", "" ], [ "Popovici", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0671
Maxim Raginsky
Maxim Raginsky
Learning from compressed observations
6 pages; submitted to the 2007 IEEE Information Theory Workshop (ITW 2007)
null
10.1109/ITW.2007.4313111
null
cs.IT cs.LG math.IT
null
The problem of statistical learning is to construct a predictor of a random variable $Y$ as a function of a related random variable $X$ on the basis of an i.i.d. training sample from the joint distribution of $(X,Y)$. Allowable predictors are drawn from some specified class, and the goal is to approach asymptotically the performance (expected loss) of the best predictor in the class. We consider the setting in which one has perfect observation of the $X$-part of the sample, while the $Y$-part has to be communicated at some finite bit rate. The encoding of the $Y$-values is allowed to depend on the $X$-values. Under suitable regularity conditions on the admissible predictors, the underlying family of probability distributions and the loss function, we give an information-theoretic characterization of achievable predictor performance in terms of conditional distortion-rate functions. The ideas are illustrated on the example of nonparametric regression in Gaussian noise.
[ { "version": "v1", "created": "Thu, 5 Apr 2007 02:57:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0730
Hamed Haddadi MSc MIEE
Hamed Haddadi, Raul Landa, Miguel Rio, Saleem Bhatti
Revisiting the Issues On Netflow Sample and Export Performance
null
null
null
null
cs.PF cs.NI
null
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics about the traffic which is traversing the router. Sampling is commonly applied on routers in order to limit the load incurred by the collection of information that the router has to undertake when evaluating flow information for monitoring purposes. The sampling process in nearly all cases is a deterministic process of choosing 1 in every N packets on a per-interface basis, and then forming the flow statistics based on the collected sampled statistics. Even though this sampling may not be significant for some statistics, such as packet rate, others can be severely distorted. However, it is important to consider the sampling techniques and their relative accuracy when applied to different traffic patterns. The main disadvantage of sampling is the loss of accuracy in the collected trace when compared to the original traffic stream. To date there has not been a detailed analysis of the impact of sampling at a router in various traffic profiles and flow criteria. In this paper, we assess the performance of the sampling process as used in NetFlow in detail, and we discuss some techniques for the compensation of loss of monitoring detail.
[ { "version": "v1", "created": "Thu, 5 Apr 2007 14:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Haddadi", "Hamed", "" ], [ "Landa", "Raul", "" ], [ "Rio", "Miguel", "" ], [ "Bhatti", "Saleem", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0704.0788
Kerry Soileau
Kerry M. Soileau
Optimal Synthesis of Multiple Algorithms
null
null
null
null
cs.DS cs.PF
null
In this paper we give a definition of "algorithm," "finite algorithm," "equivalent algorithms," and what it means for a single algorithm to dominate a set of algorithms. We define a derived algorithm which may have a smaller mean execution time than any of its component algorithms. We give an explicit expression for the mean execution time (when it exists) of the derived algorithm. We give several illustrative examples of derived algorithms with two component algorithms. We include mean execution time solutions for two-algorithm processors whose joint density of execution times are of several general forms. For the case in which the joint density for a two-algorithm processor is a step function, we give a maximum-likelihood estimation scheme with which to analyze empirical processing time data.
[ { "version": "v1", "created": "Thu, 5 Apr 2007 19:47:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Soileau", "Kerry M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0704.0802
Caleb Lo
Caleb K. Lo, Robert W. Heath, Jr. and Sriram Vishwanath
Hybrid-ARQ in Multihop Networks with Opportunistic Relay Selection
4 pages, 5 figures, to appear in Proceedings of the 2007 International Conference on Acoustics, Speech, and Signal Processing in Honolulu, HI
null
null
null
cs.IT math.IT
null
This paper develops a contention-based opportunistic feedback technique towards relay selection in a dense wireless network. This technique enables the forwarding of additional parity information from the selected relay to the destination. For a given network, the effects of varying key parameters such as the feedback probability are presented and discussed. A primary advantage of the proposed technique is that relay selection can be performed in a distributed way. Simulation results find its performance to closely match that of centralized schemes that utilize GPS information, unlike the proposed method. The proposed relay selection method is also found to achieve throughput gains over a point-to-point transmission strategy.
[ { "version": "v1", "created": "Thu, 5 Apr 2007 20:37:44 GMT" } ]
2012-08-27T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Heath,", "Robert W.", "Jr." ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0805
Caleb Lo
Caleb K. Lo, Robert W. Heath, Jr. and Sriram Vishwanath
Opportunistic Relay Selection with Limited Feedback
5 pages, 6 figures, to appear in Proceedings of 2007 IEEE Vehicular Technology Conference-Spring in Dublin, Ireland
null
10.1109/VETECS.2007.40
null
cs.IT math.IT
null
It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless networks. This selection strategy supports a hybrid-ARQ transmission approach where relays forward parity information to the destination in the event of a decoding error. Such an approach, however, suffers a loss compared to centralized strategies that select relays with the best channel gain to the destination. This paper closes the performance gap by adding another level of channel feedback to the decentralized relay selection problem. It is demonstrated that only one additional bit of feedback is necessary for good throughput performance. The performance impact of varying key parameters such as the number of relays and the channel feedback threshold is discussed. An accompanying bit error rate analysis demonstrates the importance of relay selection.
[ { "version": "v1", "created": "Thu, 5 Apr 2007 20:52:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Heath,", "Robert W.", "Jr." ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0831
Brooke Shrader
Brooke Shrader and Anthony Ephremides
On packet lengths and overhead for random linear coding over the erasure channel
5 pages, 5 figures, submitted to the 2007 International Wireless Communications and Mobile Computing Conference
null
null
null
cs.IT math.IT
null
We assess the practicality of random network coding by illuminating the issue of overhead and considering it in conjunction with increasingly long packets sent over the erasure channel. We show that the transmission of increasingly long packets, consisting of either of an increasing number of symbols per packet or an increasing symbol alphabet size, results in a data rate approaching zero over the erasure channel. This result is due to an erasure probability that increases with packet length. Numerical results for a particular modulation scheme demonstrate a data rate of approximately zero for a large, but finite-length packet. Our results suggest a reduction in the performance gains offered by random network coding.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 02:25:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Shrader", "Brooke", "" ], [ "Ephremides", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0834
Anatoly Rodionov
Anatoly Rodionov, Sergey Volkov
P-adic arithmetic coding
29 pages
null
null
null
cs.DS
null
A new incremental algorithm for data compression is presented. For a sequence of input symbols algorithm incrementally constructs a p-adic integer number as an output. Decoding process starts with less significant part of a p-adic integer and incrementally reconstructs a sequence of input symbols. Algorithm is based on certain features of p-adic numbers and p-adic norm. p-adic coding algorithm may be considered as of generalization a popular compression technique - arithmetic coding algorithms. It is shown that for p = 2 the algorithm works as integer variant of arithmetic coding; for a special class of models it gives exactly the same codes as Huffman's algorithm, for another special model and a specific alphabet it gives Golomb-Rice codes.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 02:30:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodionov", "Anatoly", "" ], [ "Volkov", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.0838
Gil Shamir
Gil I. Shamir
Universal Source Coding for Monotonic and Fast Decaying Monotonic Distributions
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We study universal compression of sequences generated by monotonic distributions. We show that for a monotonic distribution over an alphabet of size $k$, each probability parameter costs essentially $0.5 \log (n/k^3)$ bits, where $n$ is the coded sequence length, as long as $k = o(n^{1/3})$. Otherwise, for $k = O(n)$, the total average sequence redundancy is $O(n^{1/3+\epsilon})$ bits overall. We then show that there exists a sub-class of monotonic distributions over infinite alphabets for which redundancy of $O(n^{1/3+\epsilon})$ bits overall is still achievable. This class contains fast decaying distributions, including many distributions over the integers and geometric distributions. For some slower decays, including other distributions over the integers, redundancy of $o(n)$ bits overall is achievable, where a method to compute specific redundancy rates for such distributions is derived. The results are specifically true for finite entropy monotonic distributions. Finally, we study individual sequence redundancy behavior assuming a sequence is governed by a monotonic distribution. We show that for sequences whose empirical distributions are monotonic, individual redundancy bounds similar to those in the average case can be obtained. However, even if the monotonicity in the empirical distribution is violated, diminishing per symbol individual sequence redundancies with respect to the monotonic maximum likelihood description length may still be achievable.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 03:12:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Shamir", "Gil I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0858
Mohamed Kaaniche
Eric Alata (LAAS), Vincent Nicomette (LAAS), Mohamed Ka\^aniche (LAAS), Marc Dacier (LAAS), Matthieu Herrb (LAAS)
Lessons Learned from the deployment of a high-interaction honeypot
null
Proc. 6th European Dependable Computing Conference (EDCC-6), Coimbra (Portugal), 18-20 octobre 2006 (18/10/2006) 39-44
null
null
cs.CR
null
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of lowinteraction honeypots.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 08:22:50 GMT" } ]
2016-08-14T00:00:00
[ [ "Alata", "Eric", "", "LAAS" ], [ "Nicomette", "Vincent", "", "LAAS" ], [ "Kaâniche", "Mohamed", "", "LAAS" ], [ "Dacier", "Marc", "", "LAAS" ], [ "Herrb", "Matthieu", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0704.0860
Mohamed Kaaniche
Cristina Simache (LAAS), Mohamed Kaaniche (LAAS)
Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study
null
Proc. 2005 IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'2005), Changsha, Hunan (Chine), 12-14 D{\'e}cembre 2005 (18/12/2005) 49-56
null
null
cs.PF
null
This paper presents a measurement-based availability assessment study using field data collected during a 4-year period from 373 SunOS/Solaris Unix workstations and servers interconnected through a local area network. We focus on the estimation of machine uptimes, downtimes and availability based on the identification of failures that caused total service loss. Data corresponds to syslogd event logs that contain a large amount of information about the normal activity of the studied systems as well as their behavior in the presence of failures. It is widely recognized that the information contained in such event logs might be incomplete or imperfect. The solution investigated in this paper to address this problem is based on the use of auxiliary sources of data obtained from wtmpx files maintained by the SunOS/Solaris Unix operating system. The results obtained suggest that the combined use of wtmpx and syslogd log files provides more complete information on the state of the target systems that is useful to provide availability estimations that better reflect reality.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 08:24:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Simache", "Cristina", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0704.0861
Mohamed Kaaniche
Mohamed Kaaniche (LAAS), Y. Deswarte (LAAS), Eric Alata (LAAS), Marc Dacier (SC), Vincent Nicomette (LAAS)
Empirical analysis and statistical modeling of attack processes based on honeypots
null
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006) (25/06/2006) 119-124
null
null
cs.PF cs.CR
null
Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected from the honeypots. This paper presents some empirical analyses based on the data collected from the Leurr{\'e}.com honeypot platforms deployed on the Internet and presents some preliminary modeling studies aimed at fulfilling such objectives.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 08:50:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaaniche", "Mohamed", "", "LAAS" ], [ "Deswarte", "Y.", "", "LAAS" ], [ "Alata", "Eric", "", "LAAS" ], [ "Dacier", "Marc", "", "SC" ], [ "Nicomette", "Vincent", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0704.0865
Mohamed Kaaniche
Ana-Elena Rugina (LAAS), Karama Kanoun (LAAS), Mohamed Kaaniche (LAAS)
An architecture-based dependability modeling framework using AADL
null
Proc. 10th IASTED International Conference on Software Engineering and Applications (SEA'2006), Dallas (USA), 13-15 November2006 (13/11/2006) 222-227
null
null
cs.PF cs.SE
null
For efficiency reasons, the software system designers' will is to use an integrated set of methods and tools to describe specifications and designs, and also to perform analyses such as dependability, schedulability and performance. AADL (Architecture Analysis and Design Language) has proved to be efficient for software architecture modeling. In addition, AADL was designed to accommodate several types of analyses. This paper presents an iterative dependency-driven approach for dependability modeling using AADL. It is illustrated on a small example. This approach is part of a complete framework that allows the generation of dependability analysis and evaluation models from AADL models to support the analysis of software and system architectures, in critical application domains.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 09:33:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Rugina", "Ana-Elena", "", "LAAS" ], [ "Kanoun", "Karama", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0704.0879
Mohamed Kaaniche
Mohamed Kaaniche (LAAS), Luigi Romano (UIUC), Zbigniew Kalbarczyk (UIUC), Ravishankar Iyer (UIUC), Rick Karcich (STORAGETEK)
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture
null
Proc. 28th IEEE International Symposium on Fault-Tolerant Computing (FTCS-28), Munich (Germany), IEEE Computer Society, June 1998, pp.6-15 (1998) 6-15
null
null
cs.PF
null
We present a hierarchical simulation approach for the dependability analysis and evaluation of a highly available commercial cache-based RAID storage system. The archi-tecture is complex and includes several layers of overlap-ping error detection and recovery mechanisms. Three ab-straction levels have been developed to model the cache architecture, cache operations, and error detection and recovery mechanism. The impact of faults and errors oc-curring in the cache and in the disks is analyzed at each level of the hierarchy. A simulation submodel is associated with each abstraction level. The models have been devel-oped using DEPEND, a simulation-based environment for system-level dependability analysis, which provides facili-ties to inject faults into a functional behavior model, to simulate error detection and recovery mechanisms, and to evaluate quantitative measures. Several fault models are defined for each submodel to simulate cache component failures, disk failures, transmission errors, and data errors in the cache memory and in the disks. Some of the parame-ters characterizing fault injection in a given submodel cor-respond to probabilities evaluated from the simulation of the lower-level submodel. Based on the proposed method-ology, we evaluate and analyze 1) the system behavior un-der a real workload and high error rate (focusing on error bursts), 2) the coverage of the error detection mechanisms implemented in the system and the error latency distribu-tions, and 3) the accumulation of errors in the cache and in the disks.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 11:46:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaaniche", "Mohamed", "", "LAAS" ], [ "Romano", "Luigi", "", "UIUC" ], [ "Kalbarczyk", "Zbigniew", "", "UIUC" ], [ "Iyer", "Ravishankar", "", "UIUC" ], [ "Karcich", "Rick", "", "STORAGETEK" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0704.0954
Jos\'e M. F. Moura
Soummya Kar and Jose M. F. Moura
Sensor Networks with Random Links: Topology Design for Distributed Consensus
Submitted to IEEE Transactions
null
10.1109/TSP.2008.920143
null
cs.IT cs.LG math.IT
null
In a sensor network, in practice, the communication among sensors is subject to:(1) errors or failures at random times; (3) costs; and(2) constraints since sensors and networks operate under scarce resources, such as power, data rate, or communication. The signal-to-noise ratio (SNR) is usually a main factor in determining the probability of error (or of communication failure) in a link. These probabilities are then a proxy for the SNR under which the links operate. The paper studies the problem of designing the topology, i.e., assigning the probabilities of reliable communication among sensors (or of link failures) to maximize the rate of convergence of average consensus, when the link communication costs are taken into account, and there is an overall communication budget constraint. To consider this problem, we address a number of preliminary issues: (1) model the network as a random topology; (2) establish necessary and sufficient conditions for mean square sense (mss) and almost sure (a.s.) convergence of average consensus when network links fail; and, in particular, (3) show that a necessary and sufficient condition for both mss and a.s. convergence is for the algebraic connectivity of the mean graph describing the network topology to be strictly positive. With these results, we formulate topology design, subject to random link failures and to a communication cost constraint, as a constrained convex optimization problem to which we apply semidefinite programming techniques. We show by an extensive numerical study that the optimal design improves significantly the convergence speed of the consensus algorithm and can achieve the asymptotic performance of a non-random network at a fraction of the communication cost.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 21:58:52 GMT" } ]
2009-11-13T00:00:00
[ [ "Kar", "Soummya", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0967
Jia Liu
Jia Liu and Y. Thomas Hou
Cross-Layer Optimization of MIMO-Based Mesh Networks with Gaussian Vector Broadcast Channels
null
null
null
null
cs.IT cs.AR math.IT
null
MIMO technology is one of the most significant advances in the past decade to increase channel capacity and has a great potential to improve network capacity for mesh networks. In a MIMO-based mesh network, the links outgoing from each node sharing the common communication spectrum can be modeled as a Gaussian vector broadcast channel. Recently, researchers showed that ``dirty paper coding'' (DPC) is the optimal transmission strategy for Gaussian vector broadcast channels. So far, there has been little study on how this fundamental result will impact the cross-layer design for MIMO-based mesh networks. To fill this gap, we consider the problem of jointly optimizing DPC power allocation in the link layer at each node and multihop/multipath routing in a MIMO-based mesh networks. It turns out that this optimization problem is a very challenging non-convex problem. To address this difficulty, we transform the original problem to an equivalent problem by exploiting the channel duality. For the transformed problem, we develop an efficient solution procedure that integrates Lagrangian dual decomposition method, conjugate gradient projection method based on matrix differential calculus, cutting-plane method, and subgradient method. In our numerical example, it is shown that we can achieve a network performance gain of 34.4% by using DPC.
[ { "version": "v1", "created": "Sat, 7 Apr 2007 03:18:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Jia", "" ], [ "Hou", "Y. Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.0985
Mohd Abubakr
Mohd Abubakr, R.M.Vinay
Architecture for Pseudo Acausal Evolvable Embedded Systems
4 pages, 2 figures. Submitted to SASO 2007
null
null
null
cs.NE cs.AI
null
Advances in semiconductor technology are contributing to the increasing complexity in the design of embedded systems. Architectures with novel techniques such as evolvable nature and autonomous behavior have engrossed lot of attention. This paper demonstrates conceptually evolvable embedded systems can be characterized basing on acausal nature. It is noted that in acausal systems, future input needs to be known, here we make a mechanism such that the system predicts the future inputs and exhibits pseudo acausal nature. An embedded system that uses theoretical framework of acausality is proposed. Our method aims at a novel architecture that features the hardware evolability and autonomous behavior alongside pseudo acausality. Various aspects of this architecture are discussed in detail along with the limitations.
[ { "version": "v1", "created": "Sat, 7 Apr 2007 13:40:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Abubakr", "Mohd", "" ], [ "Vinay", "R. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.1020
Gyorgy Ottucsak
Andras Gyorgy, Tamas Linder, Gabor Lugosi, Gyorgy Ottucsak
The on-line shortest path problem under partial monitoring
35 pages
null
null
null
cs.LG cs.SC
null
The on-line shortest path problem is considered under various models of partial monitoring. Given a weighted directed acyclic graph whose edge weights can change in an arbitrary (adversarial) way, a decision maker has to choose in each round of a game a path between two distinguished vertices such that the loss of the chosen path (defined as the sum of the weights of its composing edges) be as small as possible. In a setting generalizing the multi-armed bandit problem, after choosing a path, the decision maker learns only the weights of those edges that belong to the chosen path. For this problem, an algorithm is given whose average cumulative loss in n rounds exceeds that of the best path, matched off-line to the entire sequence of the edge weights, by a quantity that is proportional to 1/\sqrt{n} and depends only polynomially on the number of edges of the graph. The algorithm can be implemented with linear complexity in the number of rounds n and in the number of edges. An extension to the so-called label efficient setting is also given, in which the decision maker is informed about the weights of the edges corresponding to the chosen path at a total of m << n time instances. Another extension is shown where the decision maker competes against a time-varying path, a generalization of the problem of tracking the best expert. A version of the multi-armed bandit setting for shortest path is also discussed where the decision maker learns only the total weight of the chosen path but not the weights of the individual edges on the path. Applications to routing in packet switched networks along with simulation results are also presented.
[ { "version": "v1", "created": "Sun, 8 Apr 2007 10:15:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Gyorgy", "Andras", "" ], [ "Linder", "Tamas", "" ], [ "Lugosi", "Gabor", "" ], [ "Ottucsak", "Gyorgy", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0704.1028
Jianlin Cheng
Jianlin Cheng
A neural network approach to ordinal regression
8 pages
null
null
null
cs.LG cs.AI cs.NE
null
Ordinal regression is an important type of learning, which has properties of both classification and regression. Here we describe a simple and effective approach to adapt a traditional neural network to learn ordinal categories. Our approach is a generalization of the perceptron method for ordinal regression. On several benchmark datasets, our method (NNRank) outperforms a neural network classification method. Compared with the ordinal regression methods using Gaussian processes and support vector machines, NNRank achieves comparable performance. Moreover, NNRank has the advantages of traditional neural networks: learning in both online and batch modes, handling very large training datasets, and making rapid predictions. These features make NNRank a useful and complementary tool for large-scale data processing tasks such as information retrieval, web page ranking, collaborative filtering, and protein ranking in Bioinformatics.
[ { "version": "v1", "created": "Sun, 8 Apr 2007 17:36:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Jianlin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0704.1043
Hector Zenil
Jean-Paul Delahaye and Hector Zenil
On the Kolmogorov-Chaitin Complexity for short sequences
21 pages. Paper webpage: http://www.mathrix.org/experimentalAIT/
null
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A drawback of Kolmogorov-Chaitin complexity (K) as a function from s to the shortest program producing s is its noncomputability which limits its range of applicability. Moreover, when strings are short, the dependence of K on a particular universal Turing machine U can be arbitrary. In practice one can approximate it by computable compression methods. However, such compression methods do not always provide meaningful approximations--for strings shorter, for example, than typical compiler lengths. In this paper we suggest an empirical approach to overcome this difficulty and to obtain a stable definition of the Kolmogorov-Chaitin complexity for short sequences. Additionally, a correlation in terms of distribution frequencies was found across the output of two models of abstract machines, namely unidimensional cellular automata and deterministic Turing machine.
[ { "version": "v1", "created": "Sun, 8 Apr 2007 20:01:47 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 13:00:55 GMT" }, { "version": "v3", "created": "Wed, 30 May 2007 10:16:36 GMT" }, { "version": "v4", "created": "Tue, 1 Jun 2010 20:03:20 GMT" }, { "version": "v5", "created": "Fri, 17 Dec 2010 01:36:26 GMT" } ]
2010-12-20T00:00:00
[ [ "Delahaye", "Jean-Paul", "" ], [ "Zenil", "Hector", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1068
Leo Liberti
Giacomo Nannicini, Philippe Baptiste, Gilles Barbier, Daniel Krob, Leo Liberti
Fast paths in large-scale dynamic road networks
12 pages, 4 figures
null
null
null
cs.NI cs.DS
null
Efficiently computing fast paths in large scale dynamic road networks (where dynamic traffic information is known over a part of the network) is a practical problem faced by several traffic information service providers who wish to offer a realistic fast path computation to GPS terminal enabled vehicles. The heuristic solution method we propose is based on a highway hierarchy-based shortest path algorithm for static large-scale networks; we maintain a static highway hierarchy and perform each query on the dynamically evaluated network.
[ { "version": "v1", "created": "Mon, 9 Apr 2007 07:04:19 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 18:17:35 GMT" } ]
2007-06-27T00:00:00
[ [ "Nannicini", "Giacomo", "" ], [ "Baptiste", "Philippe", "" ], [ "Barbier", "Gilles", "" ], [ "Krob", "Daniel", "" ], [ "Liberti", "Leo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.1070
Hua Fu
Hua Fu and Pooi Yuen Kam
Differential Diversity Reception of MDPSK over Independent Rayleigh Channels with Nonidentical Branch Statistics and Asymmetric Fading Spectrum
5 pages, 3 figures, to present at ISIT2007
null
null
null
cs.IT cs.PF math.IT
null
This paper is concerned with optimum diversity receiver structure and its performance analysis of differential phase shift keying (DPSK) with differential detection over nonselective, independent, nonidentically distributed, Rayleigh fading channels. The fading process in each branch is assumed to have an arbitrary Doppler spectrum with arbitrary Doppler bandwidth, but to have distinct, asymmetric fading power spectral density characteristic. Using 8-DPSK as an example, the average bit error probability (BEP) of the optimum diversity receiver is obtained by calculating the BEP for each of the three individual bits. The BEP results derived are given in exact, explicit, closed-form expressions which show clearly the behavior of the performance as a function of various system parameters.
[ { "version": "v1", "created": "Mon, 9 Apr 2007 07:16:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Fu", "Hua", "" ], [ "Kam", "Pooi Yuen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1158
Bernardo Huberman
Fang Wu and Bernardo A. Huberman
Novelty and Collective Attention
null
null
10.1073/pnas.0704916104
null
cs.CY cs.IR physics.soc-ph
null
The subject of collective attention is central to an information age where millions of people are inundated with daily messages. It is thus of interest to understand how attention to novel items propagates and eventually fades among large populations. We have analyzed the dynamics of collective attention among one million users of an interactive website -- \texttt{digg.com} -- devoted to thousands of novel news stories. The observations can be described by a dynamical model characterized by a single novelty factor. Our measurements indicate that novelty within groups decays with a stretched-exponential law, suggesting the existence of a natural time scale over which attention fades.
[ { "version": "v1", "created": "Mon, 9 Apr 2007 22:02:29 GMT" } ]
2009-11-13T00:00:00
[ [ "Wu", "Fang", "" ], [ "Huberman", "Bernardo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0704.1196
Shengchao Ding
Qing Yang and Shengchao Ding
Novel algorithm to calculate hypervolume indicator of Pareto approximation set
9 pages, 2 figures. Comments are welcome
null
null
null
cs.CG cs.NE
null
Hypervolume indicator is a commonly accepted quality measure for comparing Pareto approximation set generated by multi-objective optimizers. The best known algorithm to calculate it for $n$ points in $d$-dimensional space has a run time of $O(n^{d/2})$ with special data structures. This paper presents a recursive, vertex-splitting algorithm for calculating the hypervolume indicator of a set of $n$ non-comparable points in $d>2$ dimensions. It splits out multiple child hyper-cuboids which can not be dominated by a splitting reference point. In special, the splitting reference point is carefully chosen to minimize the number of points in the child hyper-cuboids. The complexity analysis shows that the proposed algorithm achieves $O((\frac{d}{2})^n)$ time and $O(dn^2)$ space complexity in the worst case.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 07:21:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Yang", "Qing", "" ], [ "Ding", "Shengchao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0704.1198
Minkyu Kim
Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard
A Doubly Distributed Genetic Algorithm for Network Coding
8 pages, 7 figures, accepted to the Genetic and Evolutionary Computation Conference (GECCO 2007)
null
null
null
cs.NE cs.NI
null
We present a genetic algorithm which is distributed in two novel ways: along genotype and temporal axes. Our algorithm first distributes, for every member of the population, a subset of the genotype to each network node, rather than a subset of the population to each. This genotype distribution is shown to offer a significant gain in running time. Then, for efficient use of the computational resources in the network, our algorithm divides the candidate solutions into pipelined sets and thus the distribution is in the temporal domain, rather that in the spatial domain. This temporal distribution may lead to temporal inconsistency in selection and replacement, however our experiments yield better efficiency in terms of the time to convergence without incurring significant penalties.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 13:36:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Minkyu", "" ], [ "Aggarwal", "Varun", "" ], [ "O'Reilly", "Una-May", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0704.1267
Laurence Likforman
Laurence Likforman-Sulem, Abderrazak Zahour, Bruno Taconet
Text Line Segmentation of Historical Documents: a Survey
25 pages, submitted version, To appear in International Journal on Document Analysis and Recognition, On line version available at http://www.springerlink.com/content/k2813176280456k3/
Vol. 9, no 2-4, April 2007, pp. 123-138
10.1007/s10032-006-0023-z
null
cs.CV
null
There is a huge amount of historical documents in libraries and in various National Archives that have not been exploited electronically. Although automatic reading of complete pages remains, in most cases, a long-term objective, tasks such as word spotting, text/image alignment, authentication and extraction of specific fields are in use today. For all these tasks, a major step is document segmentation into text lines. Because of the low quality and the complexity of these documents (background noise, artifacts due to aging, interfering lines),automatic text line segmentation remains an open research field. The objective of this paper is to present a survey of existing methods, developed during the last decade, and dedicated to documents of historical interest.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 16:26:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Likforman-Sulem", "Laurence", "" ], [ "Zahour", "Abderrazak", "" ], [ "Taconet", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0704.1269
Lenka Zdeborova
Lenka Zdeborov\'a, Florent Krzakala
Phase Transitions in the Coloring of Random Graphs
36 pages, 15 figures
Phys. Rev. E 76, 031131 (2007)
10.1103/PhysRevE.76.031131
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC
null
We consider the problem of coloring the vertices of a large sparse random graph with a given number of colors so that no adjacent vertices have the same color. Using the cavity method, we present a detailed and systematic analytical study of the space of proper colorings (solutions). We show that for a fixed number of colors and as the average vertex degree (number of constraints) increases, the set of solutions undergoes several phase transitions similar to those observed in the mean field theory of glasses. First, at the clustering transition, the entropically dominant part of the phase space decomposes into an exponential number of pure states so that beyond this transition a uniform sampling of solutions becomes hard. Afterward, the space of solutions condenses over a finite number of the largest states and consequently the total entropy of solutions becomes smaller than the annealed one. Another transition takes place when in all the entropically dominant states a finite fraction of nodes freezes so that each of these nodes is allowed a single color in all the solutions inside the state. Eventually, above the coloring threshold, no more solutions are available. We compute all the critical connectivities for Erdos-Renyi and regular random graphs and determine their asymptotic values for large number of colors. Finally, we discuss the algorithmic consequences of our findings. We argue that the onset of computational hardness is not associated with the clustering transition and we suggest instead that the freezing transition might be the relevant phenomenon. We also discuss the performance of a simple local Walk-COL algorithm and of the belief propagation algorithm in the light of our results.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 16:42:15 GMT" }, { "version": "v2", "created": "Wed, 20 Jun 2007 15:26:20 GMT" } ]
2011-11-09T00:00:00
[ [ "Zdeborová", "Lenka", "" ], [ "Krzakala", "Florent", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.1274
Dev Rajnarayan
David H. Wolpert and Dev G. Rajnarayan
Parametric Learning and Monte Carlo Optimization
null
null
null
null
cs.LG
null
This paper uncovers and explores the close relationship between Monte Carlo Optimization of a parametrized integral (MCO), Parametric machine-Learning (PL), and `blackbox' or `oracle'-based optimization (BO). We make four contributions. First, we prove that MCO is mathematically identical to a broad class of PL problems. This identity potentially provides a new application domain for all broadly applicable PL techniques: MCO. Second, we introduce immediate sampling, a new version of the Probability Collectives (PC) algorithm for blackbox optimization. Immediate sampling transforms the original BO problem into an MCO problem. Accordingly, by combining these first two contributions, we can apply all PL techniques to BO. In our third contribution we validate this way of improving BO by demonstrating that cross-validation and bagging improve immediate sampling. Finally, conventional MC and MCO procedures ignore the relationship between the sample point locations and the associated values of the integrand; only the values of the integrand at those locations are considered. We demonstrate that one can exploit the sample location information using PL techniques, for example by forming a fit of the sample locations to the associated values of the integrand. This provides an additional way to apply PL techniques to improve MCO.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 17:01:07 GMT" } ]
2011-11-09T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Rajnarayan", "Dev G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0704.1294
Ahmed Sidky Ahmed Sidky
Ahmed Sidky, James Arthur, Shawn Bohner
A Disciplined Approach to Adopting Agile Practices: The Agile Adoption Framework
null
null
null
null
cs.SE
null
Many organizations aspire to adopt agile processes to take advantage of the numerous benefits that it offers to an organization. Those benefits include, but are not limited to, quicker return on investment, better software quality, and higher customer satisfaction. To date however, there is no structured process (at least in the public domain) that guides organizations in adopting agile practices. To address this problem we present the Agile Adoption Framework. The framework consists of two components: an agile measurement index, and a 4-Stage process, that together guide and assist the agile adoption efforts of organizations. More specifically, the agile measurement index is used to identify the agile potential of projects and organizations. The 4-Stage process, on the other hand, helps determine (a) whether or not organizations are ready for agile adoption, and (b) guided by their potential, what set of agile practices can and should be introduced.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 19:11:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidky", "Ahmed", "" ], [ "Arthur", "James", "" ], [ "Bohner", "Shawn", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0704.1308
Nihar Jindal
Nihar Jindal
Antenna Combining for the MIMO Downlink Channel
Submitted to IEEE Trans. Wireless Communications April 2007. Revised August 2007
null
10.1109/T-WC.2008.070383
null
cs.IT math.IT
null
A multiple antenna downlink channel where limited channel feedback is available to the transmitter is considered. In a vector downlink channel (single antenna at each receiver), the transmit antenna array can be used to transmit separate data streams to multiple receivers only if the transmitter has very accurate channel knowledge, i.e., if there is high-rate channel feedback from each receiver. In this work it is shown that channel feedback requirements can be significantly reduced if each receiver has a small number of antennas and appropriately combines its antenna outputs. A combining method that minimizes channel quantization error at each receiver, and thereby minimizes multi-user interference, is proposed and analyzed. This technique is shown to outperform traditional techniques such as maximum-ratio combining because minimization of interference power is more critical than maximization of signal power in the multiple antenna downlink. Analysis is provided to quantify the feedback savings, and the technique is seen to work well with user selection and is also robust to receiver estimation error.
[ { "version": "v1", "created": "Tue, 10 Apr 2007 20:56:14 GMT" }, { "version": "v2", "created": "Sun, 19 Aug 2007 17:06:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1317
Naftali Sommer
Naftali Sommer, Meir Feder and Ofir Shalvi
Low Density Lattice Codes
24 pages, 4 figures. Submitted for publication in IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
null
Low density lattice codes (LDLC) are novel lattice codes that can be decoded efficiently and approach the capacity of the additive white Gaussian noise (AWGN) channel. In LDLC a codeword x is generated directly at the n-dimensional Euclidean space as a linear transformation of a corresponding integer message vector b, i.e., x = Gb, where H, the inverse of G, is restricted to be sparse. The fact that H is sparse is utilized to develop a linear-time iterative decoding scheme which attains, as demonstrated by simulations, good error performance within ~0.5dB from capacity at block length of n = 100,000 symbols. The paper also discusses convergence results and implementation considerations.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 16:07:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Sommer", "Naftali", "" ], [ "Feder", "Meir", "" ], [ "Shalvi", "Ofir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1353
Paul Prekop
Paul Prekop
Supporting Knowledge and Expertise Finding within Australia's Defence Science and Technology Organisation
40th Hawaii International Conference on System Sciences (HICSS40) 2007
null
null
null
cs.OH cs.DB cs.DL cs.HC
null
This paper reports on work aimed at supporting knowledge and expertise finding within a large Research and Development (R&D) organisation. The paper first discusses the nature of knowledge important to R&D organisations and presents a prototype information system developed to support knowledge and expertise finding. The paper then discusses a trial of the system within an R&D organisation, the implications and limitations of the trial, and discusses future research questions.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 06:49:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Prekop", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.1358
Torleiv Kl{\o}ve
Jyh-Shyan Lin, Jen-Chun Chang, Rong-Jaye Chen, Torleiv Kl{\o}ve
Distance preserving mappings from ternary vectors to permutations
21 pages
null
null
null
cs.DM cs.IT math.IT
null
Distance-preserving mappings (DPMs) are mappings from the set of all q-ary vectors of a fixed length to the set of permutations of the same or longer length such that every two distinct vectors are mapped to permutations with the same or even larger Hamming distance than that of the vectors. In this paper, we propose a construction of DPMs from ternary vectors. The constructed DPMs improve the lower bounds on the maximal size of permutation arrays.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 07:20:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Lin", "Jyh-Shyan", "" ], [ "Chang", "Jen-Chun", "" ], [ "Chen", "Rong-Jaye", "" ], [ "Kløve", "Torleiv", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1373
Burgy Laurent
Burgy Laurent (INRIA Futurs), Laurent R\'eveill\`ere (INRIA Futurs), Julia Lawall (DIKU), Gilles Muller (INRIA Rennes)
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
null
null
null
null
cs.PL
null
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu, for describing protocol message formats and related processing constraints. From a Zebu specification, a compiler automatically generates stubs to be used by an application to parse network messages. Zebu is easy to use, as it builds on notations used in RFCs to describe protocol grammars. Zebu is also efficient, as the memory usage is tailored to application needs and message fragments can be specified to be processed on demand. Finally, Zebu-based applications are robust, as the Zebu compiler automatically checks specification consistency and generates parsing stubs that include validation of the message structure. Using a mutation analysis in the context of SIP and RTSP, we show that Zebu significantly improves application robustness.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 08:35:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Laurent", "Burgy", "", "INRIA Futurs" ], [ "Réveillère", "Laurent", "", "INRIA Futurs" ], [ "Lawall", "Julia", "", "DIKU" ], [ "Muller", "Gilles", "", "INRIA Rennes" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0704.1394
Tarik Had\v{z}i\'c
Tarik Hadzic, Rune Moller Jensen, Henrik Reif Andersen
Calculating Valid Domains for BDD-Based Interactive Configuration
null
null
null
null
cs.AI
null
In these notes we formally describe the functionality of Calculating Valid Domains from the BDD representing the solution space of valid configurations. The formalization is largely based on the CLab configuration framework.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 10:59:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hadzic", "Tarik", "" ], [ "Jensen", "Rune Moller", "" ], [ "Andersen", "Henrik Reif", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.1409
Yao Hengshuai
Yao HengShuai
Preconditioned Temporal Difference Learning
This paper has been withdrawn by the author. Look at the ICML version instead: http://icml2008.cs.helsinki.fi/papers/111.pdf
null
null
null
cs.LG cs.AI
null
This paper has been withdrawn by the author. This draft is withdrawn for its poor quality in english, unfortunately produced by the author when he was just starting his science route. Look at the ICML version instead: http://icml2008.cs.helsinki.fi/papers/111.pdf
[ { "version": "v1", "created": "Wed, 11 Apr 2007 13:17:01 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2007 03:33:26 GMT" }, { "version": "v3", "created": "Fri, 8 Jun 2012 14:08:19 GMT" } ]
2012-06-11T00:00:00
[ [ "HengShuai", "Yao", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.1411
Lorenzo Cappellari
Lorenzo Cappellari
Trellis-Coded Quantization Based on Maximum-Hamming-Distance Binary Codes
4 pages, 4 graphic files (2 figures using subfigures), LaTeX; minor revisions; submitted to IEEE Trans. Commun
null
null
null
cs.IT math.IT
null
Most design approaches for trellis-coded quantization take advantage of the duality of trellis-coded quantization with trellis-coded modulation, and use the same empirically-found convolutional codes to label the trellis branches. This letter presents an alternative approach that instead takes advantage of maximum-Hamming-distance convolutional codes. The proposed source codes are shown to be competitive with the best in the literature for the same computational complexity.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 13:21:39 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2007 12:33:03 GMT" }, { "version": "v3", "created": "Thu, 20 Dec 2007 16:31:47 GMT" } ]
2007-12-20T00:00:00
[ [ "Cappellari", "Lorenzo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1455
Aaron Wagner
Aaron B. Wagner, Pramod Viswanath, and Sanjeev R. Kulkarni
A Better Good-Turing Estimator for Sequence Probabilities
ISIT 2007, to appear
null
null
null
cs.IT math.IT
null
We consider the problem of estimating the probability of an observed string drawn i.i.d. from an unknown distribution. The key feature of our study is that the length of the observed string is assumed to be of the same order as the size of the underlying alphabet. In this setting, many letters are unseen and the empirical distribution tends to overestimate the probability of the observed letters. To overcome this problem, the traditional approach to probability estimation is to use the classical Good-Turing estimator. We introduce a natural scaling model and use it to show that the Good-Turing sequence probability estimator is not consistent. We then introduce a novel sequence probability estimator that is indeed consistent under the natural scaling model.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 17:02:33 GMT" }, { "version": "v2", "created": "Sat, 21 Apr 2007 21:23:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Wagner", "Aaron B.", "" ], [ "Viswanath", "Pramod", "" ], [ "Kulkarni", "Sanjeev R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1524
Daniel Ryan
Daniel J. Ryan, Iain B. Collings and I. Vaughan L. Clarkson
GLRT-Optimal Noncoherent Lattice Decoding
30 pages, 6 figures Accepted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2007.894237
null
cs.IT math.IT
null
This paper presents new low-complexity lattice-decoding algorithms for noncoherent block detection of QAM and PAM signals over complex-valued fading channels. The algorithms are optimal in terms of the generalized likelihood ratio test (GLRT). The computational complexity is polynomial in the block length; making GLRT-optimal noncoherent detection feasible for implementation. We also provide even lower complexity suboptimal algorithms. Simulations show that the suboptimal algorithms have performance indistinguishable from the optimal algorithms. Finally, we consider block based transmission, and propose to use noncoherent detection as an alternative to pilot assisted transmission (PAT). The new technique is shown to outperform PAT.
[ { "version": "v1", "created": "Thu, 12 Apr 2007 04:30:35 GMT" } ]
2009-11-13T00:00:00
[ [ "Ryan", "Daniel J.", "" ], [ "Collings", "Iain B.", "" ], [ "Clarkson", "I. Vaughan L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1571
Philippe Gambette
Philippe Gambette (LIAFA), St\'ephane Vialette (LRI)
On restrictions of balanced 2-interval graphs
null
Dans Lecture Notes In Computer Science - 33rd International Workshop on Graph-Theoretic Concepts in Computer Science (WG'07), Dornburg : Allemagne (2007)
10.1007/978-3-540-74839-7_6
null
cs.DM q-bio.QM
null
The class of 2-interval graphs has been introduced for modelling scheduling and allocation problems, and more recently for specific bioinformatic problems. Some of those applications imply restrictions on the 2-interval graphs, and justify the introduction of a hierarchy of subclasses of 2-interval graphs that generalize line graphs: balanced 2-interval graphs, unit 2-interval graphs, and (x,x)-interval graphs. We provide instances that show that all the inclusions are strict. We extend the NP-completeness proof of recognizing 2-interval graphs to the recognition of balanced 2-interval graphs. Finally we give hints on the complexity of unit 2-interval graphs recognition, by studying relationships with other graph classes: proper circular-arc, quasi-line graphs, K_{1,5}-free graphs, ...
[ { "version": "v1", "created": "Thu, 12 Apr 2007 12:23:13 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2007 12:41:14 GMT" } ]
2008-02-04T00:00:00
[ [ "Gambette", "Philippe", "", "LIAFA" ], [ "Vialette", "Stéphane", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0704.1675
Kristina Lerman
Anon Plangprasopchok and Kristina Lerman
Exploiting Social Annotation for Automatic Resource Discovery
6 pages, submitted to AAAI07 workshop on Information Integration on the Web
null
null
null
cs.AI cs.CY cs.DL
null
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them in the application. Manual resource discovery is a slow process, requiring the user to sift through results obtained via keyword-based search. Although search methods have advanced to include evidence from document contents, its metadata and the contents and link structure of the referring pages, they still do not adequately cover information sources -- often called ``the hidden Web''-- that dynamically generate documents in response to a query. The recently popular social bookmarking sites, which allow users to annotate and share metadata about various information sources, provide rich evidence for resource discovery. In this paper, we describe a probabilistic model of the user annotation process in a social bookmarking system del.icio.us. We then use the model to automatically find resources relevant to a particular information domain. Our experimental results on data obtained from \emph{del.icio.us} show this approach as a promising method for helping automate the resource discovery task.
[ { "version": "v1", "created": "Thu, 12 Apr 2007 23:24:19 GMT" } ]
2016-09-08T00:00:00
[ [ "Plangprasopchok", "Anon", "" ], [ "Lerman", "Kristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0704.1676
Kristina Lerman
Kristina Lerman, Anon Plangprasopchok and Chio Wong
Personalizing Image Search Results on Flickr
12 pages, submitted to AAAI07 workshop on Intelligent Information Personalization
null
null
null
cs.IR cs.AI cs.CY cs.DL cs.HC
null
The social media site Flickr allows users to upload their photos, annotate them with tags, submit them to groups, and also to form social networks by adding other users as contacts. Flickr offers multiple ways of browsing or searching it. One option is tag search, which returns all images tagged with a specific keyword. If the keyword is ambiguous, e.g., ``beetle'' could mean an insect or a car, tag search results will include many images that are not relevant to the sense the user had in mind when executing the query. We claim that users express their photography interests through the metadata they add in the form of contacts and image annotations. We show how to exploit this metadata to personalize search results for the user, thereby improving search performance. First, we show that we can significantly improve search precision by filtering tag search results by user's contacts or a larger social network that includes those contact's contacts. Secondly, we describe a probabilistic model that takes advantage of tag information to discover latent topics contained in the search results. The users' interests can similarly be described by the tags they used for annotating their images. The latent topics found by the model are then used to personalize search results by finding images on topics that are of interest to the user.
[ { "version": "v1", "created": "Thu, 12 Apr 2007 23:31:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Plangprasopchok", "Anon", "" ], [ "Wong", "Chio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.1678
Shanghua Teng
Xi Chen, Xiaotie Deng, Shang-Hua Teng
Settling the Complexity of Computing Two-Player Nash Equilibria
53 pages 2 figures
null
null
null
cs.GT cs.CC
null
We settle a long-standing open question in algorithmic game theory. We prove that Bimatrix, the problem of finding a Nash equilibrium in a two-player game, is complete for the complexity class PPAD Polynomial Parity Argument, Directed version) introduced by Papadimitriou in 1991. This is the first of a series of results concerning the complexity of Nash equilibria. In particular, we prove the following theorems: Bimatrix does not have a fully polynomial-time approximation scheme unless every problem in PPAD is solvable in polynomial time. The smoothed complexity of the classic Lemke-Howson algorithm and, in fact, of any algorithm for Bimatrix is not polynomial unless every problem in PPAD is solvable in randomized polynomial time. Our results demonstrate that, even in the simplest form of non-cooperative games, equilibrium computation and approximation are polynomial-time equivalent to fixed point computation. Our results also have two broad complexity implications in mathematical economics and operations research: Arrow-Debreu market equilibria are PPAD-hard to compute. The P-Matrix Linear Complementary Problem is computationally harder than convex programming unless every problem in PPAD is solvable in polynomial time.
[ { "version": "v1", "created": "Thu, 12 Apr 2007 23:54:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Deng", "Xiaotie", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.1694
Sergey Yekhanin
Kiran S. Kedlaya, Sergey Yekhanin
Locally Decodable Codes From Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers
18 pages
null
null
null
cs.CC math.NT
null
A k-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only k bits of the codeword C(x), even after some constant fraction of codeword bits has been corrupted. The major goal of LDC related research is to establish the optimal trade-off between length and query complexity of such codes. Recently [Y] introduced a novel technique for constructing locally decodable codes and vastly improved the upper bounds for code length. The technique is based on Mersenne primes. In this paper we extend the work of [Y] and argue that further progress via these methods is tied to progress on an old number theory question regarding the size of the largest prime factors of Mersenne numbers. Specifically, we show that every Mersenne number m=2^t-1 that has a prime factor p>m^\gamma yields a family of k(\gamma)-query locally decodable codes of length Exp(n^{1/t}). Conversely, if for some fixed k and all \epsilon > 0 one can use the technique of [Y] to obtain a family of k-query LDCs of length Exp(n^\epsilon); then infinitely many Mersenne numbers have prime factors arger than known currently.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 04:18:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kedlaya", "Kiran S.", "" ], [ "Yekhanin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0704.1707
Linda Buisman
Linda Buisman and Rajeev Gor\'e
A Cut-free Sequent Calculus for Bi-Intuitionistic Logic: Extended Version
null
null
null
null
cs.LO
null
Bi-intuitionistic logic is the extension of intuitionistic logic with a connective dual to implication. Bi-intuitionistic logic was introduced by Rauszer as a Hilbert calculus with algebraic and Kripke semantics. But her subsequent ``cut-free'' sequent calculus for BiInt has recently been shown by Uustalu to fail cut-elimination. We present a new cut-free sequent calculus for BiInt, and prove it sound and complete with respect to its Kripke semantics. Ensuring completeness is complicated by the interaction between implication and its dual, similarly to future and past modalities in tense logic. Our calculus handles this interaction using extended sequents which pass information from premises to conclusions using variables instantiated at the leaves of failed derivation trees. Our simple termination argument allows our calculus to be used for automated deduction, although this is not its main purpose.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 07:29:31 GMT" }, { "version": "v2", "created": "Tue, 17 Apr 2007 03:11:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Buisman", "Linda", "" ], [ "Goré", "Rajeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0704.1709
Marie Cottrell
Marie Cottrell (SAMOS, Matisse), Smail Ibbou (SAMOS, Matisse), Patrick Letr\'emy (SAMOS, Matisse)
Traitement Des Donnees Manquantes Au Moyen De L'Algorithme De Kohonen
null
Actes de la dixi\`eme conf\'erence ACSEG 2003 (Nantes) (2003) 201-217
null
null
stat.AP cs.NE
null
Nous montrons comment il est possible d'utiliser l'algorithme d'auto organisation de Kohonen pour traiter des donn\'ees avec valeurs manquantes et estimer ces derni\`eres. Apr\`es un rappel m\'ethodologique, nous illustrons notre propos \`a partir de trois applications \`a des donn\'ees r\'eelles. ----- We show how it is possible to use the Kohonen self-organizing algorithm to deal with data which contain missing values and to estimate them. After a methodological recall, we illustrate our purpose from three real databases applications.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 07:33:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Cottrell", "Marie", "", "SAMOS, Matisse" ], [ "Ibbou", "Smail", "", "SAMOS, Matisse" ], [ "Letrémy", "Patrick", "", "SAMOS, Matisse" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0704.1748
Frank Schweitzer
Markus M. Geipel
Self-Organization applied to Dynamic Network Layout
Text revision and figures improved in v.2. See http://www.sg.ethz.ch for more info and examples
International Journal of Modern Physics C vol. 18, no. 10 (2007), pp. 1537-1549
10.1142/S0129183107011558
null
physics.comp-ph cs.DS nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As networks and their structure have become a major field of research, a strong demand for network visualization has emerged. We address this challenge by formalizing the well established spring layout in terms of dynamic equations. We thus open up the design space for new algorithms. Drawing from the knowledge of systems design, we derive a layout algorithm that remedies several drawbacks of the original spring layout. This new algorithm relies on the balancing of two antagonistic forces. We thus call it {\em arf} for "attractive and repulsive forces". It is, as we claim, particularly suited for a dynamic layout of smaller networks ($n < 10^3$). We back this claim with several application examples from on going complex systems research.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 16:45:28 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 13:21:55 GMT" }, { "version": "v3", "created": "Sun, 7 Sep 2008 12:46:19 GMT" }, { "version": "v4", "created": "Mon, 24 Nov 2008 18:35:59 GMT" }, { "version": "v5", "created": "Tue, 20 Jan 2009 14:58:35 GMT" } ]
2009-11-13T00:00:00
[ [ "Geipel", "Markus M.", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0704.1751
Olivier Rioul
Olivier Rioul
Information Theoretic Proofs of Entropy Power Inequalities
submitted for publication in the IEEE Transactions on Information Theory, revised version
null
10.1109/TIT.2010.2090193
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While most useful information theoretic inequalities can be deduced from the basic properties of entropy or mutual information, up to now Shannon's entropy power inequality (EPI) is an exception: Existing information theoretic proofs of the EPI hinge on representations of differential entropy using either Fisher information or minimum mean-square error (MMSE), which are derived from de Bruijn's identity. In this paper, we first present an unified view of these proofs, showing that they share two essential ingredients: 1) a data processing argument applied to a covariance-preserving linear transformation; 2) an integration over a path of a continuous Gaussian perturbation. Using these ingredients, we develop a new and brief proof of the EPI through a mutual information inequality, which replaces Stam and Blachman's Fisher information inequality (FII) and an inequality for MMSE by Guo, Shamai and Verd\'u used in earlier proofs. The result has the advantage of being very simple in that it relies only on the basic properties of mutual information. These ideas are then generalized to various extended versions of the EPI: Zamir and Feder's generalized EPI for linear transformations of the random variables, Takano and Johnson's EPI for dependent variables, Liu and Viswanath's covariance-constrained EPI, and Costa's concavity inequality for the entropy power.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 12:42:07 GMT" }, { "version": "v2", "created": "Tue, 24 Aug 2010 10:41:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Rioul", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1756
Jose M. Martin-Garcia
Jose M. Martin-Garcia, Renato Portugal, Leon R. U. Manssur
The Invar Tensor Package
Accepted in Computer Physics Communications. Package can be downloaded from http://metric.iem.csic.es/Martin-Garcia/xAct/Invar/ (Mathematica version) or http://www.lncc.br/~portugal/Invar.html (Maple version)
Comp. Phys. Commun. 177 (2007) 640-648
10.1016/j.cpc.2007.05.015
null
cs.SC gr-qc hep-th
null
The Invar package is introduced, a fast manipulator of generic scalar polynomial expressions formed from the Riemann tensor of a four-dimensional metric-compatible connection. The package can maximally simplify any polynomial containing tensor products of up to seven Riemann tensors within seconds. It has been implemented both in Mathematica and Maple algebraic systems.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 13:03:59 GMT" } ]
2015-05-13T00:00:00
[ [ "Martin-Garcia", "Jose M.", "" ], [ "Portugal", "Renato", "" ], [ "Manssur", "Leon R. U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" } ]
0704.1768
Enrique ter Horst A
Henryk Gzyl, German Molina, Enrique ter Horst
Assessment and Propagation of Input Uncertainty in Tree-based Option Pricing Models
39 pages, 21 figures
null
null
null
cs.CE cs.GT
null
This paper aims to provide a practical example on the assessment and propagation of input uncertainty for option pricing when using tree-based methods. Input uncertainty is propagated into output uncertainty, reflecting that option prices are as unknown as the inputs they are based on. Option pricing formulas are tools whose validity is conditional not only on how close the model represents reality, but also on the quality of the inputs they use, and those inputs are usually not observable. We provide three alternative frameworks to calibrate option pricing tree models, propagating parameter uncertainty into the resulting option prices. We finally compare our methods with classical calibration-based results assuming that there is no options market established. These methods can be applied to pricing of instruments for which there is not an options market, as well as a methodological tool to account for parameter and model uncertainty in theoretical option pricing.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 14:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Gzyl", "Henryk", "" ], [ "Molina", "German", "" ], [ "ter Horst", "Enrique", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0704.1783
Francesco Santini
Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini
Unicast and Multicast Qos Routing with Soft Constraint Logic Programming
45 pages
null
null
null
cs.LO cs.AI cs.NI
null
We present a formal model to represent and solve the unicast/multicast routing problem in networks with Quality of Service (QoS) requirements. To attain this, first we translate the network adapting it to a weighted graph (unicast) or and-or graph (multicast), where the weight on a connector corresponds to the multidimensional cost of sending a packet on the related network link: each component of the weights vector represents a different QoS metric value (e.g. bandwidth, cost, delay, packet loss). The second step consists in writing this graph as a program in Soft Constraint Logic Programming (SCLP): the engine of this framework is then able to find the best paths/trees by optimizing their costs and solving the constraints imposed on them (e.g. delay < 40msec), thus finding a solution to QoS routing problems. Moreover, c-semiring structures are a convenient tool to model QoS metrics. At last, we provide an implementation of the framework over scale-free networks and we suggest how the performance can be improved.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 15:53:44 GMT" }, { "version": "v2", "created": "Sun, 29 Apr 2007 15:40:10 GMT" }, { "version": "v3", "created": "Mon, 21 Apr 2008 17:25:06 GMT" } ]
2009-09-29T00:00:00
[ [ "Bistarelli", "Stefano", "" ], [ "Montanari", "Ugo", "" ], [ "Rossi", "Francesca", "" ], [ "Santini", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0704.1818
Martin Wainwright
Martin J. Wainwright, Emin Martinian
Low-density graph codes that are optimal for source/channel coding and binning
Appeared as technical report 730, Dept. of Statistics, UC Berkeley. Portions previously published in conference form (DCC 2006; ISIT 2006)
null
null
Technical report 730
cs.IT math.IT
null
We describe and analyze the joint source/channel coding properties of a class of sparse graphical codes based on compounding a low-density generator matrix (LDGM) code with a low-density parity check (LDPC) code. Our first pair of theorems establish that there exist codes from this ensemble, with all degrees remaining bounded independently of block length, that are simultaneously optimal as both source and channel codes when encoding and decoding are performed optimally. More precisely, in the context of lossy compression, we prove that finite degree constructions can achieve any pair $(R, D)$ on the rate-distortion curve of the binary symmetric source. In the context of channel coding, we prove that finite degree codes can achieve any pair $(C, p)$ on the capacity-noise curve of the binary symmetric channel. Next, we show that our compound construction has a nested structure that can be exploited to achieve the Wyner-Ziv bound for source coding with side information (SCSI), as well as the Gelfand-Pinsker bound for channel coding with side information (CCSI). Although the current results are based on optimal encoding and decoding, the proposed graphical codes have sparse structure and high girth that renders them well-suited to message-passing and other efficient decoding procedures.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 20:33:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Wainwright", "Martin J.", "" ], [ "Martinian", "Emin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1827
Gerald Krafft
Gerald Krafft
Transaction-Oriented Simulation In Ad Hoc Grids
101 pages (plus 131 appendix), 23 figures, 11 tables, MSc thesis for degree in Advanced Computer Science at the Westminster University, London
null
null
null
cs.DC
null
This paper analyses the possibilities of performing parallel transaction-oriented simulations with a special focus on the space-parallel approach and discrete event simulation synchronisation algorithms that are suitable for transaction-oriented simulation and the target environment of Ad Hoc Grids. To demonstrate the findings a Java-based parallel transaction-oriented simulator for the simulation language GPSS/H is implemented on the basis of the promising Shock Resistant Time Warp synchronisation algorithm and using the Grid framework ProActive. The validation of this parallel simulator shows that the Shock Resistant Time Warp algorithm can successfully reduce the number of rolled back Transaction moves but it also reveals circumstances in which the Shock Resistant Time Warp algorithm can be outperformed by the normal Time Warp algorithm. The conclusion of this paper suggests possible improvements to the Shock Resistant Time Warp algorithm to avoid such problems.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 15:59:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Krafft", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0704.1829
Kamil Kloch
Stefan Felsner, Kamil Kloch, Grzegorz Matecki, and Piotr Micek
On-line Chain Partitions of Up-growing Semi-orders
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On-line chain partition is a two-player game between Spoiler and Algorithm. Spoiler presents a partially ordered set, point by point. Algorithm assigns incoming points (immediately and irrevocably) to the chains which constitute a chain partition of the order. The value of the game for orders of width $w$ is a minimum number $\fVal(w)$ such that Algorithm has a strategy using at most $\fVal(w)$ chains on orders of width at most $w$. We analyze the chain partition game for up-growing semi-orders. Surprisingly, the golden ratio comes into play and the value of the game is $\lfloor\frac{1+\sqrt{5}}{2}\; w \rfloor$.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 22:41:21 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2007 21:51:26 GMT" }, { "version": "v3", "created": "Sat, 19 Feb 2011 21:18:10 GMT" } ]
2011-02-22T00:00:00
[ [ "Felsner", "Stefan", "" ], [ "Kloch", "Kamil", "" ], [ "Matecki", "Grzegorz", "" ], [ "Micek", "Piotr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0704.1833
Inanc Inan
Inanc Inan, Feyza Keceli, Ender Ayanoglu
Analysis of the 802.11e Enhanced Distributed Channel Access Function
null
null
null
null
cs.NI
null
The IEEE 802.11e standard revises the Medium Access Control (MAC) layer of the former IEEE 802.11 standard for Quality-of-Service (QoS) provision in the Wireless Local Area Networks (WLANs). The Enhanced Distributed Channel Access (EDCA) function of 802.11e defines multiple Access Categories (AC) with AC-specific Contention Window (CW) sizes, Arbitration Interframe Space (AIFS) values, and Transmit Opportunity (TXOP) limits to support MAC-level QoS and prioritization. We propose an analytical model for the EDCA function which incorporates an accurate CW, AIFS, and TXOP differentiation at any traffic load. The proposed model is also shown to capture the effect of MAC layer buffer size on the performance. Analytical and simulation results are compared to demonstrate the accuracy of the proposed approach for varying traffic loads, EDCA parameters, and MAC layer buffer space.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 22:40:05 GMT" }, { "version": "v2", "created": "Fri, 26 Oct 2007 05:59:08 GMT" }, { "version": "v3", "created": "Fri, 28 Mar 2008 05:21:34 GMT" } ]
2008-03-28T00:00:00
[ [ "Inan", "Inanc", "" ], [ "Keceli", "Feyza", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0704.1838
Inanc Inan
Inanc Inan, Feyza Keceli, Ender Ayanoglu
Performance Analysis of the IEEE 802.11e Enhanced Distributed Coordination Function using Cycle Time Approach
null
null
null
null
cs.OH
null
The recently ratified IEEE 802.11e standard defines the Enhanced Distributed Channel Access (EDCA) function for Quality-of-Service (QoS) provisioning in the Wireless Local Area Networks (WLANs). The EDCA uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and slotted Binary Exponential Backoff (BEB) mechanism. We present a simple mathematical analysis framework for the EDCA function. Our analysis considers the fact that the distributed random access systems exhibit cyclic behavior where each station successfully transmits a packet in a cycle. Our analysis shows that an AC-specific cycle time exists for the EDCA function. Validating the theoretical results via simulations, we show that the proposed analysis accurately captures EDCA saturation performance in terms of average throughput, medium access delay, and packet loss ratio. The cycle time analysis is a simple and insightful substitute for previously proposed more complex EDCA models.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 23:01:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Inan", "Inanc", "" ], [ "Keceli", "Feyza", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0704.1842
Inanc Inan
Feyza Keceli, Inanc Inan, Ender Ayanoglu
Fairness Provision in the IEEE 802.11e Infrastructure Basic Service Set
null
null
null
null
cs.OH
null
Most of the deployed IEEE 802.11e Wireless Local Area Networks (WLANs) use infrastructure Basic Service Set (BSS) in which an Access Point (AP) serves as a gateway between wired and wireless domains. We present the unfairness problem between the uplink and the downlink flows of any Access Category (AC) in the 802.11e Enhanced Distributed Channel Access (EDCA) when the default settings of the EDCA parameters are used. We propose a simple analytical model to calculate the EDCA parameter settings that achieve weighted fair resource allocation for all uplink and downlink flows. We also propose a simple model-assisted measurement-based dynamic EDCA parameter adaptation algorithm. Moreover, our dynamic solution addresses the differences in the transport layer and the Medium Access Control (MAC) layer interactions of User Datagram Protocol (UDP) and Transmission Control Protocol (TCP). We show that proposed Contention Window (CW) and Transmit Opportunity (TXOP) limit adaptation at the AP provides fair UDP and TCP access between uplink and downlink flows of the same AC while preserving prioritization among ACs.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 23:11:27 GMT" }, { "version": "v2", "created": "Thu, 13 Sep 2007 15:08:17 GMT" } ]
2007-09-13T00:00:00
[ [ "Keceli", "Feyza", "" ], [ "Inan", "Inanc", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0704.1873
Yi Cao
Yi Cao and Biao Chen
An Achievable Rate Region for Interference Channels with Conferencing
5 pages, 2 figures, accepted by ISIT'07
null
null
null
cs.IT math.IT
null
In this paper, we propose an achievable rate region for discrete memoryless interference channels with conferencing at the transmitter side. We employ superposition block Markov encoding, combined with simultaneous superposition coding, dirty paper coding, and random binning to obtain the achievable rate region. We show that, under respective conditions, the proposed achievable region reduces to Han and Kobayashi achievable region for interference channels, the capacity region for degraded relay channels, and the capacity region for the Gaussian vector broadcast channel. Numerical examples for the Gaussian case are given.
[ { "version": "v1", "created": "Sat, 14 Apr 2007 15:42:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Cao", "Yi", "" ], [ "Chen", "Biao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.1886
Pedro Resende
S\'ergio Marcelino and Pedro Resende
An algebraic generalization of Kripke structures
39 pages
Math. Proc. Cambridge Philos. Soc. 145 (2008) 549-577
10.1017/S0305004108001667
null
math.LO cs.LO math.RA
null
The Kripke semantics of classical propositional normal modal logic is made algebraic via an embedding of Kripke structures into the larger class of pointed stably supported quantales. This algebraic semantics subsumes the traditional algebraic semantics based on lattices with unary operators, and it suggests natural interpretations of modal logic, of possible interest in the applications, in structures that arise in geometry and analysis, such as foliated manifolds and operator algebras, via topological groupoids and inverse semigroups. We study completeness properties of the quantale based semantics for the systems K, T, K4, S4, and S5, in particular obtaining an axiomatization for S5 which does not use negation or the modal necessity operator. As additional examples we describe intuitionistic propositional modal logic, the logic of programs PDL, and the ramified temporal logic CTL.
[ { "version": "v1", "created": "Sat, 14 Apr 2007 19:59:18 GMT" } ]
2009-11-13T00:00:00
[ [ "Marcelino", "Sérgio", "" ], [ "Resende", "Pedro", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0704.1925
Yuanning Yu
Yuanning Yu, Athina P. Petropulu and H. Vincent Poor
Blind Identification of Distributed Antenna Systems with Multiple Carrier Frequency Offsets
To appear in the Proceedings of the 8th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki, Finland, June 17-20, 2007
null
null
null
cs.IT math.IT
null
In spatially distributed multiuser antenna systems, the received signal contains multiple carrier-frequency offsets (CFOs) arising from mismatch between the oscillators of transmitters and receivers. This results in a time-varying rotation of the data constellation, which needs to be compensated at the receiver before symbol recovery. In this paper, a new approach for blind CFO estimation and symbol recovery is proposed. The received base-band signal is over-sampled, and its polyphase components are used to formulate a virtual Multiple-Input Multiple-Output (MIMO) problem. By applying blind MIMO system estimation techniques, the system response can be estimated and decoupled versions of the user symbols can be recovered, each one of which contains a distinct CFO. By applying a decision feedback Phase Lock Loop (PLL), the CFO can be mitigated and the transmitted symbols can be recovered. The estimated MIMO system response provides information about the CFOs that can be used to initialize the PLL, speed up its convergence, and avoid ambiguities usually linked with PLL.
[ { "version": "v1", "created": "Sun, 15 Apr 2007 23:58:08 GMT" } ]
2007-07-13T00:00:00
[ [ "Yu", "Yuanning", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2010
Juliana Bernardes
Juliana S Bernardes, Alberto Davila, Vitor Santos Costa, Gerson Zaverucha
A study of structural properties on profiles HMMs
6 pages, 7 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation: Profile hidden Markov Models (pHMMs) are a popular and very useful tool in the detection of the remote homologue protein families. Unfortunately, their performance is not always satisfactory when proteins are in the 'twilight zone'. We present HMMER-STRUCT, a model construction algorithm and tool that tries to improve pHMM performance by using structural information while training pHMMs. As a first step, HMMER-STRUCT constructs a set of pHMMs. Each pHMM is constructed by weighting each residue in an aligned protein according to a specific structural property of the residue. Properties used were primary, secondary and tertiary structures, accessibility and packing. HMMER-STRUCT then prioritizes the results by voting. Results: We used the SCOP database to perform our experiments. Throughout, we apply leave-one-family-out cross-validation over protein superfamilies. First, we used the MAMMOTH-mult structural aligner to align the training set proteins. Then, we performed two sets of experiments. In a first experiment, we compared structure weighted models against standard pHMMs and against each other. In a second experiment, we compared the voting model against individual pHMMs. We compare method performance through ROC curves and through Precision/Recall curves, and assess significance through the paired two tailed t-test. Our results show significant performance improvements of all structurally weighted models over default HMMER, and a significant improvement in sensitivity of the combined models over both the original model and the structurally weighted models.
[ { "version": "v1", "created": "Mon, 16 Apr 2007 13:10:35 GMT" }, { "version": "v2", "created": "Thu, 11 Dec 2008 18:47:26 GMT" } ]
2008-12-11T00:00:00
[ [ "Bernardes", "Juliana S", "" ], [ "Davila", "Alberto", "" ], [ "Costa", "Vitor Santos", "" ], [ "Zaverucha", "Gerson", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.2014
Leandro R\^ego
Joseph Y. Halpern, Leandro C. R\^ego
Extensive Games with Possibly Unaware Players
45 pages, 3 figures, a preliminary version was presented at AAMAS06
null
null
null
cs.GT cs.MA
null
Standard game theory assumes that the structure of the game is common knowledge among players. We relax this assumption by considering extensive games where agents may be unaware of the complete structure of the game. In particular, they may not be aware of moves that they and other agents can make. We show how such games can be represented; the key idea is to describe the game from the point of view of every agent at every node of the game tree. We provide a generalization of Nash equilibrium and show that every game with awareness has a generalized Nash equilibrium. Finally, we extend these results to games with awareness of unawareness, where a player i may be aware that a player j can make moves that i is not aware of, and to subjective games, where payers may have no common knowledge regarding the actual game and their beliefs are incompatible with a common prior.
[ { "version": "v1", "created": "Mon, 16 Apr 2007 13:58:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Rêgo", "Leandro C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0704.2017
Giacomo Bacci
G. Bacci, M. Luise, H.V. Poor
Large System Analysis of Game-Theoretic Power Control in UWB Wireless Networks with Rake Receivers
To appear in the Proceedings of the 8th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki, Finland, June 17-20, 2007
null
10.1109/SPAWC.2007.4401311
null
cs.IT cs.GT math.IT
null
This paper studies the performance of partial-Rake (PRake) receivers in impulse-radio ultrawideband wireless networks when an energy-efficient power control scheme is adopted. Due to the large bandwidth of the system, the multipath channel is assumed to be frequency-selective. By using noncooperative game-theoretic models and large system analysis, explicit expressions are derived in terms of network parameters to measure the effects of self- and multiple-access interference at a receiving access point. Performance of the PRake is compared in terms of achieved utilities and loss to that of the all-Rake receiver.
[ { "version": "v1", "created": "Mon, 16 Apr 2007 13:44:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Bacci", "G.", "" ], [ "Luise", "M.", "" ], [ "Poor", "H. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2083
Hassan Satori
H. Satori, M. Harti and N. Chenfour
Introduction to Arabic Speech Recognition Using CMUSphinx System
4 pages, 3 figures and 2 tables, was in Information and Communication Technologies International Symposium proceeding ICTIS07 Fes (2007)
null
null
null
cs.CL cs.AI
null
In this paper Arabic was investigated from the speech recognition problem point of view. We propose a novel approach to build an Arabic Automated Speech Recognition System (ASR). This system is based on the open source CMU Sphinx-4, from the Carnegie Mellon University. CMU Sphinx is a large-vocabulary; speaker-independent, continuous speech recognition system based on discrete Hidden Markov Models (HMMs). We build a model using utilities from the OpenSource CMU Sphinx. We will demonstrate the possible adaptability of this system to Arabic voice recognition.
[ { "version": "v1", "created": "Tue, 17 Apr 2007 01:04:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Satori", "H.", "" ], [ "Harti", "M.", "" ], [ "Chenfour", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.2092
Jinsong Tan
Jinsong Tan
A Note on the Inapproximability of Correlation Clustering
null
Information Processing Letters, 108: 331-335, 2008
null
null
cs.LG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider inapproximability of the correlation clustering problem defined as follows: Given a graph $G = (V,E)$ where each edge is labeled either "+" (similar) or "-" (dissimilar), correlation clustering seeks to partition the vertices into clusters so that the number of pairs correctly (resp. incorrectly) classified with respect to the labels is maximized (resp. minimized). The two complementary problems are called MaxAgree and MinDisagree, respectively, and have been studied on complete graphs, where every edge is labeled, and general graphs, where some edge might not have been labeled. Natural edge-weighted versions of both problems have been studied as well. Let S-MaxAgree denote the weighted problem where all weights are taken from set S, we show that S-MaxAgree with weights bounded by $O(|V|^{1/2-\delta})$ essentially belongs to the same hardness class in the following sense: if there is a polynomial time algorithm that approximates S-MaxAgree within a factor of $\lambda = O(\log{|V|})$ with high probability, then for any choice of S', S'-MaxAgree can be approximated in polynomial time within a factor of $(\lambda + \epsilon)$, where $\epsilon > 0$ can be arbitrarily small, with high probability. A similar statement also holds for $S-MinDisagree. This result implies it is hard (assuming $NP \neq RP$) to approximate unweighted MaxAgree within a factor of $80/79-\epsilon$, improving upon a previous known factor of $116/115-\epsilon$ by Charikar et. al. \cite{Chari05}.
[ { "version": "v1", "created": "Tue, 17 Apr 2007 03:52:41 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2009 03:22:02 GMT" } ]
2009-03-23T00:00:00
[ [ "Tan", "Jinsong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.2201
Hassan Satori
H. Satori, M. Harti and N. Chenfour
Arabic Speech Recognition System using CMU-Sphinx4
5 pages, 3 figures and 2 tables, in French
null
null
null
cs.CL cs.AI
null
In this paper we present the creation of an Arabic version of Automated Speech Recognition System (ASR). This system is based on the open source Sphinx-4, from the Carnegie Mellon University. Which is a speech recognition system based on discrete hidden Markov models (HMMs). We investigate the changes that must be made to the model to adapt Arabic voice recognition. Keywords: Speech recognition, Acoustic model, Arabic language, HMMs, CMUSphinx-4, Artificial intelligence.
[ { "version": "v1", "created": "Tue, 17 Apr 2007 17:04:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Satori", "H.", "" ], [ "Harti", "M.", "" ], [ "Chenfour", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.2258
Stefan Laendner
Andrew McGregor and Olgica Milenkovic
On the Hardness of Approximating Stopping and Trapping Sets in LDPC Codes
16 pages, 6 figure, submitted journal version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that approximating the size of stopping and trapping sets in Tanner graphs of linear block codes, and more restrictively, the class of low-density parity-check (LDPC) codes, is NP-hard. The ramifications of our findings are that methods used for estimating the height of the error-floor of moderate- and long-length LDPC codes based on stopping and trapping set enumeration cannot provide accurate worst-case performance predictions.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 01:49:33 GMT" }, { "version": "v2", "created": "Sun, 3 Aug 2008 04:49:39 GMT" } ]
2008-08-03T00:00:00
[ [ "McGregor", "Andrew", "" ], [ "Milenkovic", "Olgica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2259
Lifeng Lai
Lifeng Lai, Hesham El Gamal and H. Vincent Poor
The Wiretap Channel with Feedback: Encryption over the Channel
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2008.929914
null
cs.IT cs.CR math.IT
null
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interestingly, this noisy feedback model is shown to be more advantageous in the current setting. More specifically, the discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that the judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. In the half-duplex scheme, a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source. Finally, this scheme is extended to the continuous real valued modulo-$\Lambda$ channel where it is shown that the perfect secrecy capacity with feedback is also equal to the capacity in the absence of the wiretapper.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 02:43:40 GMT" } ]
2016-11-18T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2282
Wim H. Hesselink
W.H. Hesselink and J.C. Hummelen and H.T. Jonkman and H.G. Reker and G.R. Renardel de Lavalette and M.H. van der Veen
Kekul\'e Cells for Molecular Computation
Also on chemistry (unsaturated polycyclic hydrocarbons)
null
null
null
cs.OH cs.DM
null
The configurations of single and double bonds in polycyclic hydrocarbons are abstracted as Kekul\'e states of graphs. Sending a so-called soliton over an open channel between ports (external nodes) of the graph changes the Kekul\'e state and therewith the set of open channels in the graph. This switching behaviour is proposed as a basis for molecular computation. The proposal is highly speculative but may have tremendous impact. Kekul\'e states with the same boundary behaviour (port assignment) can be regarded as equivalent. This gives rise to the abstraction of Kekul\'e cells. The basic theory of Kekul\'e states and Kekul\'e cells is developed here, up to the classification of Kekul\'e cells with $\leq 4$ ports. To put the theory in context, we generalize Kekul\'e states to semi-Kekul\'e states, which form the solutions of a linear system of equations over the field of the bits 0 and 1. We briefly study so-called omniconjugated graphs, in which every port assignment of the right signature has a Kekul\'e state. Omniconjugated graphs may be useful as connectors between computational elements. We finally investigate some examples with potentially useful switching behaviour.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 07:44:33 GMT" }, { "version": "v2", "created": "Wed, 7 Nov 2007 09:16:22 GMT" } ]
2007-11-08T00:00:00
[ [ "Hesselink", "W. H.", "" ], [ "Hummelen", "J. C.", "" ], [ "Jonkman", "H. T.", "" ], [ "Reker", "H. G.", "" ], [ "de Lavalette", "G. R. Renardel", "" ], [ "van der Veen", "M. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0704.2295
Hassan Jameel
Hassan Jameel, Heejo Lee and Sungyoung Lee
Using Image Attributes for Human Identification Protocols
24 pages, 8 figures
null
null
null
cs.CR
null
A secure human identification protocol aims at authenticating human users to a remote server when even the users' inputs are not hidden from an adversary. Recently, the authors proposed a human identification protocol in the RSA Conference 2007, which is loosely based on the ability of humans to efficiently process an image. The advantage being that an automated adversary is not effective in attacking the protocol without human assistance. This paper extends that work by trying to solve some of the open problems. First, we analyze the complexity of defeating the proposed protocols by quantifying the workload of a human adversary. Secondly, we propose a new construction based on textual CAPTCHAs (Reverse Turing Tests) in order to make the generation of automated challenges easier. We also present a brief experiment involving real human users to find out the number of possible attributes in a given image and give some guidelines for the selection of challenge questions based on the results. Finally, we analyze the previously proposed protocol in detail for the relationship between the secrets. Our results show that we can construct human identification protocols based on image evaluation with reasonably ``quantified'' security guarantees based on our model.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 09:13:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Jameel", "Hassan", "" ], [ "Lee", "Heejo", "" ], [ "Lee", "Sungyoung", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0704.2344
Publications Ampere
Christian Vollaire (CEGELY), Laurent Nicolas (CEGELY), Alain Nicolas (CEGELY)
Parallel computing for the finite element method
null
EUROPEAN PHYSICAL JOURNAL Applied Physics 1, 3 (03/1998) 305-314
10.1051/epjap:1998151
null
cs.DC
null
A finite element method is presented to compute time harmonic microwave fields in three dimensional configurations. Nodal-based finite elements have been coupled with an absorbing boundary condition to solve open boundary problems. This paper describes how the modeling of large devices has been made possible using parallel computation, New algorithms are then proposed to implement this formulation on a cluster of workstations (10 DEC ALPHA 300X) and on a CRAY C98. Analysis of the computation efficiency is performed using simple problems. The electromagnetic scattering of a plane wave by a perfect electric conducting airplane is finally given as example.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 13:20:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Vollaire", "Christian", "", "CEGELY" ], [ "Nicolas", "Laurent", "", "CEGELY" ], [ "Nicolas", "Alain", "", "CEGELY" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0704.2351
Giorgi Pascal
Jean-Guillaume Dumas (LMC - IMAG), Philippe Elbaz-Vincent (I3M), Pascal Giorgi (LP2A), Anna Urbanska (LMC - IMAG)
Parallel computation of the rank of large sparse matrices from algebraic K-theory
null
null
null
null
math.KT cs.DC cs.SC math.NT
null
This paper deals with the computation of the rank and of some integer Smith forms of a series of sparse matrices arising in algebraic K-theory. The number of non zero entries in the considered matrices ranges from 8 to 37 millions. The largest rank computation took more than 35 days on 50 processors. We report on the actual algorithms we used to build the matrices, their link to the motivic cohomology and the linear algebra and parallelizations required to perform such huge computations. In particular, these results are part of the first computation of the cohomology of the linear group GL_7(Z).
[ { "version": "v1", "created": "Wed, 18 Apr 2007 14:29:28 GMT" }, { "version": "v2", "created": "Tue, 24 Apr 2007 15:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LMC - IMAG" ], [ "Elbaz-Vincent", "Philippe", "", "I3M" ], [ "Giorgi", "Pascal", "", "LP2A" ], [ "Urbanska", "Anna", "", "LMC - IMAG" ] ]
[ { "class": "Mathematics", "code": "math.KT", "description": "Algebraic and topological K-theory, relations with topology, commutative algebra, and operator algebras", "span": "(K-Theory and Homology)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0704.2353
Natasha Devroye
Mai Vu, Natasha Devroye, Masoud Sharif and Vahid Tarokh
Scaling Laws of Cognitive Networks
significantly revised and extended, 30 pages, 13 figures, submitted to IEEE Journal of Special Topics in Signal Processing
null
10.1109/CROWNCOM.2007.4549764
null
cs.IT math.IT
null
We consider a cognitive network consisting of n random pairs of cognitive transmitters and receivers communicating simultaneously in the presence of multiple primary users. Of interest is how the maximum throughput achieved by the cognitive users scales with n. Furthermore, how far these users must be from a primary user to guarantee a given primary outage. Two scenarios are considered for the network scaling law: (i) when each cognitive transmitter uses constant power to communicate with a cognitive receiver at a bounded distance away, and (ii) when each cognitive transmitter scales its power according to the distance to a considered primary user, allowing the cognitive transmitter-receiver distances to grow. Using single-hop transmission, suitable for cognitive devices of opportunistic nature, we show that, in both scenarios, with path loss larger than 2, the cognitive network throughput scales linearly with the number of cognitive users. We then explore the radius of a primary exclusive region void of cognitive transmitters. We obtain bounds on this radius for a given primary outage constraint. These bounds can help in the design of a primary network with exclusive regions, outside of which cognitive users may transmit freely. Our results show that opportunistic secondary spectrum access using single-hop transmission is promising.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 15:57:37 GMT" }, { "version": "v2", "created": "Wed, 24 Oct 2007 20:56:38 GMT" } ]
2016-11-18T00:00:00
[ [ "Vu", "Mai", "" ], [ "Devroye", "Natasha", "" ], [ "Sharif", "Masoud", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2355
Luigi Santocanale
Luigi Santocanale (LIF)
A Nice Labelling for Tree-Like Event Structures of Degree 3
null
null
null
null
cs.DC
null
We address the problem of &#64257;nding nice labellings for event structures of degree 3. We develop a minimum theory by which we prove that the labelling number of an event structure of degree 3 is bounded by a linear function of the height. The main theorem we present in this paper states that event structures of degree 3 whose causality order is a tree have a nice labelling with 3 colors. Finally, we exemplify how to use this theorem to construct upper bounds for the labelling number of other event structures of degree 3.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 14:39:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Santocanale", "Luigi", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0704.2375
Stefano Buzzi
Stefano Buzzi and H. Vincent Poor
Power control algorithms for CDMA networks based on large system analysis
To appear in the Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24 - 29, 2007
null
null
null
cs.IT math.IT
null
Power control is a fundamental task accomplished in any wireless cellular network; its aim is to set the transmit power of any mobile terminal, so that each user is able to achieve its own target SINR. While conventional power control algorithms require knowledge of a number of parameters of the signal of interest and of the multiaccess interference, in this paper it is shown that in a large CDMA system much of this information can be dispensed with, and effective distributed power control algorithms may be implemented with very little information on the user of interest. An uplink CDMA system subject to flat fading is considered with a focus on the cases in which a linear MMSE receiver and a non-linear MMSE serial interference cancellation receiver are adopted; for the latter case new formulas are also given for the system SINR in the large system asymptote. Experimental results show an excellent agreement between the performance and the power profile of the proposed distributed algorithms and that of conventional ones that require much greater prior knowledge.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 16:12:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2383
Stefano Buzzi
Stefano Buzzi, Valeria Massaro, and H. Vincent Poor
Power control and receiver design for energy efficiency in multipath CDMA channels with bandlimited waveforms
appeared in the Proceedings of the 41st Annual Conference on Information Sciences and Systems, John Hopkins University, March 2007
null
null
null
cs.IT math.IT
null
This paper is focused on the cross-layer design problem of joint multiuser detection and power control for energy-efficiency optimization in a wireless data network through a game-theoretic approach. Building on work of Meshkati, et al., wherein the tools of game-theory are used in order to achieve energy-efficiency in a simple synchronous code division multiple access system, system asynchronism, the use of bandlimited chip-pulses, and the multipath distortion induced by the wireless channel are explicitly incorporated into the analysis. Several non-cooperative games are proposed wherein users may vary their transmit power and their uplink receiver in order to maximize their utility, which is defined here as the ratio of data throughput to transmit power. In particular, the case in which a linear multiuser detector is adopted at the receiver is considered first, and then, the more challenging case in which non-linear decision feedback multiuser detectors are employed is considered. The proposed games are shown to admit a unique Nash equilibrium point, while simulation results show the effectiveness of the proposed solutions, as well as that the use of a decision-feedback multiuser receiver brings remarkable performance improvements.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 16:35:59 GMT" } ]
2015-03-13T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "Massaro", "Valeria", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2386
Pilar Albert
Pilar Albert, Elvira Mayordomo, and Philippe Moser
Bounded Pushdown dimension vs Lempel Ziv information density
null
null
null
null
cs.CC cs.IT math.IT
null
In this paper we introduce a variant of pushdown dimension called bounded pushdown (BPD) dimension, that measures the density of information contained in a sequence, relative to a BPD automata, i.e. a finite state machine equipped with an extra infinite memory stack, with the additional requirement that every input symbol only allows a bounded number of stack movements. BPD automata are a natural real-time restriction of pushdown automata. We show that BPD dimension is a robust notion by giving an equivalent characterization of BPD dimension in terms of BPD compressors. We then study the relationships between BPD compression, and the standard Lempel-Ziv (LZ) compression algorithm, and show that in contrast to the finite-state compressor case, LZ is not universal for bounded pushdown compressors in a strong sense: we construct a sequence that LZ fails to compress signicantly, but that is compressed by at least a factor 2 by a BPD compressor. As a corollary we obtain a strong separation between finite-state and BPD dimension.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 16:49:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Albert", "Pilar", "" ], [ "Mayordomo", "Elvira", "" ], [ "Moser", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2448
Ugo Dal Lago
Patrick Baillot, Paolo Coppola and Ugo Dal Lago
Light Logics and Optimal Reduction: Completeness and Complexity
21 pages
null
null
null
cs.LO cs.PL
null
Typing of lambda-terms in Elementary and Light Affine Logic (EAL, LAL, resp.) has been studied for two different reasons: on the one hand the evaluation of typed terms using LAL (EAL, resp.) proof-nets admits a guaranteed polynomial (elementary, resp.) bound; on the other hand these terms can also be evaluated by optimal reduction using the abstract version of Lamping's algorithm. The first reduction is global while the second one is local and asynchronous. We prove that for LAL (EAL, resp.) typed terms, Lamping's abstract algorithm also admits a polynomial (elementary, resp.) bound. We also show its soundness and completeness (for EAL and LAL with type fixpoints), by using a simple geometry of interaction model (context semantics).
[ { "version": "v1", "created": "Thu, 19 Apr 2007 01:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "" ], [ "Coppola", "Paolo", "" ], [ "Lago", "Ugo Dal", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]