id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0706.1051
Donald Sofge
Donald A. Sofge and David L. Elliott
Improved Neural Modeling of Real-World Systems Using Genetic Algorithm Based Variable Selection
4 pages
D. Sofge and D. Elliott, "Improved Neural Modeling of Real-World Systems Using Genetic Algorithm Based Variable Selection," In Int'l Conf. on Neural Networks and Brain (ICNN&B'98-Beijing), 1998
null
null
cs.NE
null
Neural network models of real-world systems, such as industrial processes, made from sensor data must often rely on incomplete data. System states may not all be known, sensor data may be biased or noisy, and it is not often known which sensor data may be useful for predictive modelling. Genetic algorithms may be used to help to address this problem by determining the near optimal subset of sensor variables most appropriate to produce good models. This paper describes the use of genetic search to optimize variable selection to determine inputs into the neural network model. We discuss genetic algorithm implementation issues including data representation types and genetic operators such as crossover and mutation. We present the use of this technique for neural network modelling of a typical industrial application, a liquid fed ceramic melter, and detail the results of the genetic search to optimize the neural network model for this application.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 18:13:59 GMT" } ]
2007-06-08T00:00:00
[ [ "Sofge", "Donald A.", "" ], [ "Elliott", "David L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0706.1061
Donald Sofge
Donald Sofge and Gerald Chiang
Design, Implementation, and Cooperative Coevolution of an Autonomous/ Teleoperated Control System for a Serpentine Robotic Manipulator
null
D. Sofge and G. Chiang, "Design, ... a Serpentine Automated Waste Retrieval Manipulator," Amer. Nucl. Soc. 9th Top. Meeting on Robotics and Remote Systems, 2001
null
null
cs.NE cs.RO
null
Design, implementation, and machine learning issues associated with developing a control system for a serpentine robotic manipulator are explored. The controller developed provides autonomous control of the serpentine robotic manipulatorduring operation of the manipulator within an enclosed environment such as an underground storage tank. The controller algorithms make use of both low-level joint angle control employing force/position feedback constraints, and high-level coordinated control of end-effector positioning. This approach has resulted in both high-level full robotic control and low-level telerobotic control modes, and provides a high level of dexterity for the operator.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 19:27:12 GMT" } ]
2019-08-19T00:00:00
[ [ "Sofge", "Donald", "" ], [ "Chiang", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0706.1063
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel
Small Worlds: Strong Clustering in Wireless Networks
To appear in: 1st International Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks (LOCALGOS 2007), 2007, IEEE Compuster Society Press
null
null
null
cs.NI cs.DC cs.DS
null
Small-worlds represent efficient communication networks that obey two distinguishing characteristics: a high clustering coefficient together with a small characteristic path length. This paper focuses on an interesting paradox, that removing links in a network can increase the overall clustering coefficient. Reckful Roaming, as introduced in this paper, is a 2-localized algorithm that takes advantage of this paradox in order to selectively remove superfluous links, this way optimizing the clustering coefficient while still retaining a sufficiently small characteristic path length.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 19:42:51 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2007 05:36:04 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0706.1066
Matthias Brust R.
Matthias R. Brust
Applying Test-Paradigms in a Generic Tutoring System Concept for Web-based Learning
Information and Resource Management (IRMA 2003)
null
null
null
cs.CY
null
Realizing test scenarios through a tutoring system involve questions about architecture and didactic methods in such a system. Observing the fact that traditional tutoring systems normally are domain-static, this paper shows investigations for a generic domain-independent tutoring system for utilizing test scenarios in computer-based and web-based environments. Furthermore, test paradigms are analyzed and it is presented an approach for realizing functionality for applying test paradigms in the presented generic tutoring system architecture by an XML-specified language.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 19:55:11 GMT" } ]
2007-06-08T00:00:00
[ [ "Brust", "Matthias R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0706.1080
Matthias Brust R.
Matthias R. Brust, Adrian Andronache, Steffen Rothkugel
WACA: A Hierarchical Weighted Clustering Algorithm optimized for Mobile Hybrid Networks
The Third International Conference on Wireless and Mobile Communications 2007
null
null
null
cs.DC cs.NI
null
Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. In a dynamic environment-in terms of node mobility as well as in terms of steadily changing device parameters-the clusterhead election process has to be re-invoked according to a suitable update policy. Cluster re-organization causes additional message exchanges and computational complexity and it execution has to be optimized. Our investigations focus on the problem of minimizing clusterhead re-elections by considering stability criteria. These criteria are based on topological characteristics as well as on device parameters. This paper presents a weighted clustering algorithm optimized to avoid needless clusterhead re-elections for stable clusters in mobile ad-hoc networks. The proposed localized algorithm deals with mobility, but does not require geographical, speed or distances information.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 20:47:19 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Andronache", "Adrian", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1084
Adam D. Smith
Sofya Raskhodnikova and Dana Ron and Ronitt Rubinfeld and Adam Smith
Sublinear Algorithms for Approximating String Compressibility
To appear in the proceedings of RANDOM 2007
null
null
null
cs.DS
null
We raise the question of approximating the compressibility of a string with respect to a fixed compression scheme, in sublinear time. We study this question in detail for two popular lossless compression schemes: run-length encoding (RLE) and Lempel-Ziv (LZ), and present sublinear algorithms for approximating compressibility with respect to both schemes. We also give several lower bounds that show that our algorithms for both schemes cannot be improved significantly. Our investigation of LZ yields results whose interest goes beyond the initial questions we set out to study. In particular, we prove combinatorial structural lemmas that relate the compressibility of a string with respect to Lempel-Ziv to the number of distinct short substrings contained in it. In addition, we show that approximating the compressibility with respect to LZ is related to approximating the support size of a distribution.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 02:58:28 GMT" } ]
2007-06-11T00:00:00
[ [ "Raskhodnikova", "Sofya", "" ], [ "Ron", "Dana", "" ], [ "Rubinfeld", "Ronitt", "" ], [ "Smith", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0706.1087
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel
On Anomalies in Annotation Systems
The Third International Workshop on E-learning and Mobile Learning on Telecommunications (ELETE 2007)
null
null
null
cs.HC cs.CY
null
Today's computer-based annotation systems implement a wide range of functionalities that often go beyond those available in traditional paper-and-pencil annotations. Conceptually, annotation systems are based on thoroughly investigated psycho-sociological and pedagogical learning theories. They offer a huge diversity of annotation types that can be placed in textual as well as in multimedia format. Additionally, annotations can be published or shared with a group of interested parties via well-organized repositories. Although highly sophisticated annotation systems exist both conceptually as well as technologically, we still observe that their acceptance is somewhat limited. In this paper, we argue that nowadays annotation systems suffer from several fundamental problems that are inherent in the traditional paper-and-pencil annotation paradigm. As a solution, we propose to shift the annotation paradigm for the implementation of annotation system.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 21:23:40 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0706.1096
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel, Carlos H.C. Ribeiro
Inquiring the Potential of Evoking Small-World Properties for Self-Organizing Communication Networks
null
Published in: Proceedings of 5th International Conference on Networking (ICN 06), 2006, IEEE Computer Society Press
10.1109/ICNICONSMCL.2006.124
null
cs.NI
null
Mobile multi-hop ad hoc networks allow establishing local groups of communicating devices in a self-organizing way. However, in a global setting such networks fail to work properly due to network partitioning. Providing that devices are capable of communicating both locally-e.g. using Wi-Fi or Bluetooth-and additionally also with arbitrary remote devices-e.g. using GSM/UMTS links-the objective is to find efficient ways of inter-linking multiple network partitions. Tackling this problem of topology control, we focus on the class of small-world networks that obey two distinguishing characteristics: they have a strong local clustering while still retaining a small average distance between two nodes. This paper reports on results gained investigating the question if small-world properties are indicative for an efficient link management in multiple multi-hop ad hoc network partitions.
[ { "version": "v1", "created": "Thu, 7 Jun 2007 22:40:40 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2007 05:34:49 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ], [ "Ribeiro", "Carlos H. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1118
Samuel Mimram
Paul-Andr\'e Melli\`es (PPS), Samuel Mimram (PPS)
Asynchronous games: innocence without alternation
null
null
null
null
cs.LO
null
The notion of innocent strategy was introduced by Hyland and Ong in order to capture the interactive behaviour of lambda-terms and PCF programs. An innocent strategy is defined as an alternating strategy with partial memory, in which the strategy plays according to its view. Extending the definition to non-alternating strategies is problematic, because the traditional definition of views is based on the hypothesis that Opponent and Proponent alternate during the interaction. Here, we take advantage of the diagrammatic reformulation of alternating innocence in asynchronous games, in order to provide a tentative definition of innocence in non-alternating games. The task is interesting, and far from easy. It requires the combination of true concurrency and game semantics in a clean and organic way, clarifying the relationship between asynchronous games and concurrent games in the sense of Abramsky and Melli\`es. It also requires an interactive reformulation of the usual acyclicity criterion of linear logic, as well as a directed variant, as a scheduling criterion.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 06:56:31 GMT" } ]
2007-06-11T00:00:00
[ [ "Melliès", "Paul-André", "", "PPS" ], [ "Mimram", "Samuel", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0706.1119
Stefan Stefanov Z
Stefan Z. Stefanov
Cointegration of the Daily Electric Power System Load and the Weather
8 pages, extended version
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper makes a thermal predictive analysis of the electric power system security for a day ahead. This predictive analysis is set as a thermal computation of the expected security. This computation is obtained by cointegrating the daily electric power systen load and the weather, by finding the daily electric power system thermodynamics and by introducing tests for this thermodynamics. The predictive analysis made shows the electricity consumers' wisdom.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 07:04:24 GMT" }, { "version": "v2", "created": "Mon, 24 Jan 2011 11:53:45 GMT" } ]
2011-01-25T00:00:00
[ [ "Stefanov", "Stefan Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0706.1127
Matthias Brust R.
Matthias R. Brust, Christian M. Adriano, Ivan M.L. Ricarte
Redesigning Computer-based Learning Environments: Evaluation as Communication
International Conference on Education and Information Systems (EISTA 04), ISBN 980-6560-11-6
null
null
null
cs.CY cs.HC
null
In the field of evaluation research, computer scientists live constantly upon dilemmas and conflicting theories. As evaluation is differently perceived and modeled among educational areas, it is not difficult to become trapped in dilemmas, which reflects an epistemological weakness. Additionally, designing and developing a computer-based learning scenario is not an easy task. Advancing further, with end-users probing the system in realistic settings, is even harder. Computer science research in evaluation faces an immense challenge, having to cope with contributions from several conflicting and controversial research fields. We believe that deep changes must be made in our field if we are to advance beyond the CBT (computer-based training) learning model and to build an adequate epistemology for this challenge. The first task is to relocate our field by building upon recent results from philosophy, psychology, social sciences, and engineering. In this article we locate evaluation in respect to communication studies. Evaluation presupposes a definition of goals to be reached, and we suggest that it is, by many means, a silent communication between teacher and student, peers, and institutional entities. If we accept that evaluation can be viewed as set of invisible rules known by nobody, but somehow understood by everybody, we should add anthropological inquiries to our research toolkit. The paper is organized around some elements of the social communication and how they convey new insights to evaluation research for computer and related scientists. We found some technical limitations and offer discussions on how we relate to technology at same time we establish expectancies and perceive others work.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 08:12:21 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Adriano", "Christian M.", "" ], [ "Ricarte", "Ivan M. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.1130
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel
A Communication Model for Adaptive Service Provisioning in Hybrid Wireless Networks
WSEAS Transactions on Circuits and Systems 2004
null
null
null
cs.NI cs.AR cs.CY cs.HC
null
Mobile entities with wireless links are able to form a mobile ad-hoc network. Such an infrastructureless network does not have to be administrated. However, self-organizing principles have to be applied to deal with upcoming problems, e.g. information dissemination. These kinds of problems are not easy to tackle, requiring complex algorithms. Moreover, the usefulness of pure ad-hoc networks is arguably limited. Hence, enthusiasm for mobile ad-hoc networks, which could eliminate the need for any fixed infrastructure, has been damped. The goal is to overcome the limitations of pure ad-hoc networks by augmenting them with instant Internet access, e.g. via integration of UMTS respectively GSM links. However, this raises multiple questions at the technical as well as the organizational level. Motivated by characteristics of small-world networks that describe an efficient network even without central or organized design, this paper proposes to combine mobile ad-hoc networks and infrastructured networks to form hybrid wireless networks. One main objective is to investigate how this approach can reduce the costs of a permanent backbone link and providing in the same way the benefits of useful information from Internet connectivity or service providers. For the purpose of bridging between the different types of networks, an adequate middleware service is the focus of our investigation. This paper shows our first steps forward to this middleware by introducing the Injection Communication paradigm as principal concept.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 08:23:14 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.1137
Thierry Poibeau
Amanda Bouffier (LIPN), Thierry Poibeau (LIPN)
Automatically Restructuring Practice Guidelines using the GEM DTD
null
Proceedings of Biomedical Natural Language Processing (BioNLP) (2007) -
null
null
cs.AI
null
This paper describes a system capable of semi-automatically filling an XML template from free texts in the clinical domain (practice guidelines). The XML template includes semantic information not explicitly encoded in the text (pairs of conditions and actions/recommendations). Therefore, there is a need to compute the exact scope of conditions over text sequences expressing the required actions. We present a system developed for this task. We show that it yields good performance when applied to the analysis of French practice guidelines.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 15:39:49 GMT" } ]
2007-06-11T00:00:00
[ [ "Bouffier", "Amanda", "", "LIPN" ], [ "Poibeau", "Thierry", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0706.1141
Matthias Brust R.
Adrian Andronache, Matthias R. Brust, Steffen Rothkugel
Multimedia Content Distribution in Hybrid Wireless Networks using Weighted Clustering
2nd ACM Workshop on Wireless Multimedia Networking and Performance Modeling 2006 (ISBN 1-59593-485)
null
null
null
cs.MM cs.NI
null
Fixed infrastructured networks naturally support centralized approaches for group management and information provisioning. Contrary to infrastructured networks, in multi-hop ad-hoc networks each node acts as a router as well as sender and receiver. Some applications, however, requires hierarchical arrangements that-for practical reasons-has to be done locally and self-organized. An additional challenge is to deal with mobility that causes permanent network partitioning and re-organizations. Technically, these problems can be tackled by providing additional uplinks to a backbone network, which can be used to access resources in the Internet as well as to inter-link multiple ad-hoc network partitions, creating a hybrid wireless network. In this paper, we present a prototypically implemented hybrid wireless network system optimized for multimedia content distribution. To efficiently manage the ad-hoc communicating devices a weighted clustering algorithm is introduced. The proposed localized algorithm deals with mobility, but does not require geographical information or distances.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 09:31:46 GMT" } ]
2012-01-16T00:00:00
[ [ "Andronache", "Adrian", "" ], [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1142
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel
Localized Support for Injection Point Election in Hybrid Networks
The Sixth International Conference on Networking (ICN 2007)
null
null
null
cs.DC cs.NI
null
Ad-hoc networks, a promising trend in wireless technology, fail to work properly in a global setting. In most cases, self-organization and cost-free local communication cannot compensate the need for being connected, gathering urgent information just-in-time. Equipping mobile devices additionally with GSM or UMTS adapters in order to communicate with arbitrary remote devices or even a fixed network infrastructure provides an opportunity. Devices that operate as intermediate nodes between the ad-hoc network and a reliable backbone network are potential injection points. They allow disseminating received information within the local neighborhood. The effectiveness of different devices to serve as injection point differs substantially. For practical reasons the determination of injection points should be done locally, within the ad-hoc network partitions. We analyze different localized algorithms using at most 2-hop neighboring information. Results show that devices selected this way spread information more efficiently through the ad-hoc network. Our results can also be applied in order to support the election process for clusterheads in the field of clustering mechanisms.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 09:36:41 GMT" } ]
2007-06-12T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1151
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel
A taxonomic Approach to Topology Control in Ad-hoc and Wireless Networks
The Sixth International Conference on Networking, ICN 2007
null
null
null
cs.NI cs.DC
null
Topology Control (TC) aims at tuning the topology of highly dynamic networks to provide better control over network resources and to increase the efficiency of communication. Recently, many TC protocols have been proposed. The protocols are designed for preserving connectivity, minimizing energy consumption, maximizing the overall network coverage or network capacity. Each TC protocol makes different assumptions about the network topology, environment detection resources, and control capacities. This circumstance makes it extremely difficult to comprehend the role and purpose of each protocol. To tackle this situation, a taxonomy for TC protocols is presented throughout this paper. Additionally, some TC protocols are classified based upon this taxonomy.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 10:20:29 GMT" } ]
2007-06-11T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.1162
Hichem Geryville
Hichem Geryville (LIESP), Yacine Ouzrout (LIESP), Abdelaziz Bouras (LIESP), Nikolaos Sapidis
The multiple viewpoints as approach to information retrieval within collaborative development context
null
Dans Information and Communication Technologies International Symposium - Information and Communication Technologies International Symposium (Proceedings of IEEE), Fez : Maroc (2007)
null
null
cs.HC
null
Nowadays, to achieve competitive advantage, the industrial companies are considering that success is sustained to great product development. That is to manage the product throughout its entire lifecycle. Achieving this goal requires a tight collaboration between actors from a wide variety of domains, using different software tools producing various product data types and formats. The actors' collaboration is mainly based on the exchange /share product information. The representation of the actors' viewpoints is the underlying requirement of the collaborative product development. The multiple viewpoints approach was designed to provide an organizational framework following the actors' perspectives in the collaboration, and their relationships. The approach acknowledges the inevitability of multiple integration of product information as different views, promotes gathering of actors' interest, and encourages retrieved adequate information while providing support for integration through PLM and/or SCM collaboration. In this paper, a multiple viewpoints representation is proposed. The product, process, organization information models are discussed. A series of issues referring to the viewpoints representation are discussed in detail. Based on XML standard, taking electrical connector as an example, an application case of part of product information modeling is stated.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 11:29:24 GMT" } ]
2008-02-19T00:00:00
[ [ "Geryville", "Hichem", "", "LIESP" ], [ "Ouzrout", "Yacine", "", "LIESP" ], [ "Bouras", "Abdelaziz", "", "LIESP" ], [ "Sapidis", "Nikolaos", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.1169
Aris L. Moustakas
Ralf R. Mueller, Dongning Guo, and Aris L. Moustakas
Vector Precoding for Wireless MIMO Systems: A Replica Analysis
21 pages, 8 figures, submitted for publication to "IEEE JSAC Special Issue on Multiuser Detection for Advanced Communication Systems and Networks"
null
10.1109/JSAC.2008.080411
null
cs.IT cond-mat.stat-mech math.IT
null
We apply the replica method to analyze vector precoding, a method to reduce transmit power in antenna array communications. The analysis applies to a very general class of channel matrices. The statistics of the channel matrix enter the transmitted energy per symbol via its R-transform. We find that vector precoding performs much better for complex than for real alphabets. As a byproduct, we find a nonlinear precoding method with polynomial complexity that outperforms NP-hard Tomlinson-Harashima precoding for binary modulation on complex channels if the number of transmit antennas is slightly larger than twice the number of receive antennas.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 12:21:04 GMT" } ]
2016-11-15T00:00:00
[ [ "Mueller", "Ralf R.", "" ], [ "Guo", "Dongning", "" ], [ "Moustakas", "Aris L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.1179
Hichem Geryville
Hichem Geryville (LIESP), Abdelaziz Bouras (LIESP), Yacine Ouzrout (LIESP), Nikolaos Sapidis
Collaborative product and process model: Multiple Viewpoints approach
391-398
Innovative Products and Services through Collaborative Networks (2006) 542
10.1000/ISBN0-85358-228-9
null
cs.OH cs.IR
null
The design and development of complex products invariably involves many actors who have different points of view on the problem they are addressing, the product being developed, and the process by which it is being developed. The actors' viewpoints approach was designed to provide an organisational framework in which these different perspectives or points of views, and their relationships, could be explicitly gathered and formatted (by actor activity's focus). The approach acknowledges the inevitability of multiple interpretation of product information as different views, promotes gathering of actors' interests, and encourages retrieved adequate information while providing support for integration through PLM and/or SCM collaboration. In this paper, we present our multiple viewpoints approach, and we illustrate it by an industrial example on cyclone vessel product.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 13:09:13 GMT" } ]
2007-06-11T00:00:00
[ [ "Geryville", "Hichem", "", "LIESP" ], [ "Bouras", "Abdelaziz", "", "LIESP" ], [ "Ouzrout", "Yacine", "", "LIESP" ], [ "Sapidis", "Nikolaos", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0706.1201
Matthias Brust R.
Jose Eduardo M. Lobo, Jorge Luis Risco Becerra, Matthias R. Brust, Steffen Rothkugel, Christian M. Adriano
Developing a Collaborative and Autonomous Training and Learning Environment for Hybrid Wireless Networks
Global Congress on Engineering and Technology Education (GCETE 2005)
null
null
null
cs.CY cs.HC cs.NI
null
With larger memory capacities and the ability to link into wireless networks, more and more students uses palmtop and handheld computers for learning activities. However, existing software for Web-based learning is not well-suited for such mobile devices, both due to constrained user interfaces as well as communication effort required. A new generation of applications for the learning domain that is explicitly designed to work on these kinds of small mobile devices has to be developed. For this purpose, we introduce CARLA, a cooperative learning system that is designed to act in hybrid wireless networks. As a cooperative environment, CARLA aims at disseminating teaching material, notes, and even components of itself through both fixed and mobile networks to interested nodes. Due to the mobility of nodes, CARLA deals with upcoming problems such as network partitions and synchronization of teaching material, resource dependencies, and time constraints.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 16:38:32 GMT" } ]
2007-06-11T00:00:00
[ [ "Lobo", "Jose Eduardo M.", "" ], [ "Becerra", "Jorge Luis Risco", "" ], [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ], [ "Adriano", "Christian M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1290
Sylviane Schwer
Sylviane R. Schwer (LIPN)
Temporal Reasoning without Transitive Tables
rapport interne
null
null
null
cs.AI
null
Representing and reasoning about qualitative temporal information is an essential part of many artificial intelligence tasks. Lots of models have been proposed in the litterature for representing such temporal information. All derive from a point-based or an interval-based framework. One fundamental reasoning task that arises in applications of these frameworks is given by the following scheme: given possibly indefinite and incomplete knowledge of the binary relationships between some temporal objects, find the consistent scenarii between all these objects. All these models require transitive tables -- or similarly inference rules-- for solving such tasks. We have defined an alternative model, S-languages - to represent qualitative temporal information, based on the only two relations of \emph{precedence} and \emph{simultaneity}. In this paper, we show how this model enables to avoid transitive tables or inference rules to handle this kind of problem.
[ { "version": "v1", "created": "Sat, 9 Jun 2007 06:57:05 GMT" } ]
2007-06-12T00:00:00
[ [ "Schwer", "Sylviane R.", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0706.1318
John Tomlin
S. Sathiya Keerthi and John A. Tomlin
Constructing a maximum utility slate of on-line advertisements
null
null
null
YR-2007-001
cs.DM cs.DS
null
We present an algorithm for constructing an optimal slate of sponsored search advertisements which respects the ordering that is the outcome of a generalized second price auction, but which must also accommodate complicating factors such as overall budget constraints. The algorithm is easily fast enough to use on the fly for typical problem sizes, or as a subroutine in an overall optimization.
[ { "version": "v1", "created": "Sat, 9 Jun 2007 16:18:45 GMT" } ]
2007-06-12T00:00:00
[ [ "Keerthi", "S. Sathiya", "" ], [ "Tomlin", "John A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0706.1395
Hulya Seferoglu
Hulya Seferoglu, Athina Markopoulou
Opportunistic Network Coding for Video Streaming over Wireless
11 pages, 8 figures (14 subfigures)
null
null
null
cs.NI
null
In this paper, we study video streaming over wireless networks with network coding capabilities. We build upon recent work, which demonstrated that network coding can increase throughput over a broadcast medium, by mixing packets from different flows into a single packet, thus increasing the information content per transmission. Our key insight is that, when the transmitted flows are video streams, network codes should be selected so as to maximize not only the network throughput but also the video quality. We propose video-aware opportunistic network coding schemes that take into account both (i) the decodability of network codes by several receivers and (ii) the importance and deadlines of video packets. Simulation results show that our schemes significantly improve both video quality and throughput.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 17:33:25 GMT" } ]
2007-06-12T00:00:00
[ [ "Seferoglu", "Hulya", "" ], [ "Markopoulou", "Athina", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1399
Viveck Cadambe
Viveck R. Cadambe and Syed A. Jafar
Duality and Stability Regions of Multi-rate Broadcast and Multiple Access Networks
12 pages, 11 figures, submitted to IEEE Trans. Information Theory for review
null
null
null
cs.IT math.IT
null
We characterize stability regions of two-user fading Gaussian multiple access (MAC) and broadcast (BC) networks with centralized scheduling. The data to be transmitted to the users is encoded into codewords of fixed length. The rates of the codewords used are restricted to a fixed set of finite cardinality. With successive decoding and interference cancellation at the receivers, we find the set of arrival rates that can be stabilized over the MAC and BC networks. In MAC and BC networks with average power constraints, we observe that the duality property that relates the MAC and BC information theoretic capacity regions extend to their stability regions as well. In MAC and BC networks with peak power constraints, the union of stability regions of dual MAC networks is found to be strictly contained in the BC stability region.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 04:43:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Cadambe", "Viveck R.", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.1402
Matthias Brust R.
Matthias R. Brust, Steffen Rothkugel
Analyzing Design Process and Experiments on the AnITA Generic Tutoring System
Published in: Proceedings of International Conference on Education and Information Systems (EISTA 04), 2004, ISBN 980-6560-11-6
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the field of tutoring systems, investigations have shown that there are many tutoring systems specific to a specific domain that, because of their static architecture, cannot be adapted to other domains. As consequence, often neither methods nor knowledge can be reused. In addition, the knowledge engineer must have programming skills in order to enhance and evaluate the system. One particular challenge is to tackle these problems with the development of a generic tutoring system. AnITA, as a stand-alone application, has been developed and implemented particularly for this purpose. However, in the testing phase, we discovered that this architecture did not fully match the user's intuitive understanding of the use of a learning tool. Therefore, AnITA has been redesigned to exclusively work as a client/server application and renamed to AnITA2. This paper discusses the evolvements made on the AnITA tutoring system, the goal of which is to use generic principles for system re-use in any domain. Two experiments were conducted, and the results are presented in this paper.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 06:09:25 GMT" }, { "version": "v2", "created": "Tue, 12 Jun 2018 19:54:33 GMT" } ]
2018-06-14T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.1409
Bruno Salvy
Jonathan M. Borwein, Bruno Salvy (INRIA Rocquencourt)
A Proof of a Recursion for Bessel Moments
null
null
10.1080/10586458.2008.10129032
null
cs.SC math.CA
null
We provide a proof of a conjecture in (Bailey, Borwein, Borwein, Crandall 2007) on the existence and form of linear recursions for moments of powers of the Bessel function $K_0$.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 06:45:39 GMT" }, { "version": "v2", "created": "Tue, 1 Apr 2008 14:52:49 GMT" } ]
2013-06-19T00:00:00
[ [ "Borwein", "Jonathan M.", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
0706.1410
Marc Schoenauer
Francis Sourd (CMAP), Marc Schoenauer (CMAP)
Evolutionary Mesh Numbering: Preliminary Results
null
Dans Adaptive Computing in Design and Manufacture, ACDM'98 (1998) 137-150
null
null
cs.NA cs.NE math.NA math.OC
null
Mesh numbering is a critical issue in Finite Element Methods, as the computational cost of one analysis is highly dependent on the order of the nodes of the mesh. This paper presents some preliminary investigations on the problem of mesh numbering using Evolutionary Algorithms. Three conclusions can be drawn from these experiments. First, the results of the up-to-date method used in all FEM softwares (Gibb's method) can be consistently improved; second, none of the crossover operators tried so far (either general or problem specific) proved useful; third, though the general tendency in Evolutionary Computation seems to be the hybridization with other methods (deterministic or heuristic), none of the presented attempt did encounter any success yet. The good news, however, is that this algorithm allows an improvement over the standard heuristic method between 12% and 20% for both the 1545 and 5453-nodes meshes used as test-bed. Finally, some strange interaction between the selection scheme and the use of problem specific mutation operator was observed, which appeals for further investigation.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 12:17:19 GMT" } ]
2007-06-12T00:00:00
[ [ "Sourd", "Francis", "", "CMAP" ], [ "Schoenauer", "Marc", "", "CMAP" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0706.1456
Benoit Caillaud
Albert Benveniste (IRISA), Benoit Caillaud (IRISA), Roberto Passerone
A Generic Model of Contracts for Embedded Systems
null
null
null
null
cs.SE
null
We present the mathematical foundations of the contract-based model developed in the framework of the SPEEDS project. SPEEDS aims at developing methods and tools to support "speculative design", a design methodology in which distributed designers develop different aspects of the overall system, in a concurrent but controlled way. Our generic mathematical model of contract supports this style of development. This is achieved by focusing on behaviors, by supporting the notion of "rich component" where diverse (functional and non-functional) aspects of the system can be considered and combined, by representing rich components via their set of associated contracts, and by formalizing the whole process of component composition.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 12:22:15 GMT" }, { "version": "v2", "created": "Wed, 13 Jun 2007 09:16:32 GMT" } ]
2007-06-13T00:00:00
[ [ "Benveniste", "Albert", "", "IRISA" ], [ "Caillaud", "Benoit", "", "IRISA" ], [ "Passerone", "Roberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0706.1477
Sylvain Perifel
Pascal Koiran (LIP), Sylvain Perifel (LIP)
VPSPACE and a transfer theorem over the complex field
14 pages
null
null
null
cs.CC
null
We extend the transfer theorem of [KP2007] to the complex field. That is, we investigate the links between the class VPSPACE of families of polynomials and the Blum-Shub-Smale model of computation over C. Roughly speaking, a family of polynomials is in VPSPACE if its coefficients can be computed in polynomial space. Our main result is that if (uniform, constant-free) VPSPACE families can be evaluated efficiently then the class PAR of decision problems that can be solved in parallel polynomial time over the complex field collapses to P. As a result, one must first be able to show that there are VPSPACE families which are hard to evaluate in order to separate P from NP over C, or even from PAR.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 13:59:31 GMT" } ]
2007-06-12T00:00:00
[ [ "Koiran", "Pascal", "", "LIP" ], [ "Perifel", "Sylvain", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0706.1563
Natalia Osipova
Konstantin Avrachenkov (INRIA Sophia Antipolis), Patrick Brown (FT R&D), Natalia Osipova (INRIA Sophia Antipolis)
Optimal Choice of Threshold in Two Level Processor Sharing
null
null
null
null
cs.NI
null
We analyze the Two Level Processor Sharing (TLPS) scheduling discipline with the hyper-exponential job size distribution and with the Poisson arrival process. TLPS is a convenient model to study the benefit of the file size based differentiation in TCP/IP networks. In the case of the hyper-exponential job size distribution with two phases, we find a closed form analytic expression for the expected sojourn time and an approximation for the optimal value of the threshold that minimizes the expected sojourn time. In the case of the hyper-exponential job size distribution with more than two phases, we derive a tight upper bound for the expected sojourn time conditioned on the job size. We show that when the variance of the job size distribution increases, the gain in system performance increases and the sensitivity to the choice of the threshold near its optimal value decreases.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 12:21:53 GMT" }, { "version": "v2", "created": "Wed, 13 Jun 2007 09:45:28 GMT" } ]
2007-06-13T00:00:00
[ [ "Avrachenkov", "Konstantin", "", "INRIA Sophia Antipolis" ], [ "Brown", "Patrick", "", "FT\n R&D" ], [ "Osipova", "Natalia", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1588
Animashree Anandkumar
Animashree Anandkumar, Lang Tong, Ananthram Swami
Detection of Gauss-Markov Random Fields with Nearest-Neighbor Dependency
Information Theory, IEEE Transactions
vol. 55, no. 2, Feb. 2009
10.1109/TIT.2008.2009855
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of hypothesis testing against independence for a Gauss-Markov random field (GMRF) is analyzed. Assuming an acyclic dependency graph, an expression for the log-likelihood ratio of detection is derived. Assuming random placement of nodes over a large region according to the Poisson or uniform distribution and nearest-neighbor dependency graph, the error exponent of the Neyman-Pearson detector is derived using large-deviations theory. The error exponent is expressed as a dependency-graph functional and the limit is evaluated through a special law of large numbers for stabilizing graph functionals. The exponent is analyzed for different values of the variance ratio and correlation. It is found that a more correlated GMRF has a higher exponent at low values of the variance ratio whereas the situation is reversed at high values of the variance ratio.
[ { "version": "v1", "created": "Mon, 11 Jun 2007 22:28:21 GMT" }, { "version": "v2", "created": "Tue, 8 Jun 2010 23:05:36 GMT" } ]
2016-11-15T00:00:00
[ [ "Anandkumar", "Animashree", "" ], [ "Tong", "Lang", "" ], [ "Swami", "Ananthram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.1614
Corinne Touati
Arnaud Legrand (INRIA Rh\^one-Alpes / Id-Imag, Lig), Corinne Touati (INRIA Rh\^one-Alpes / Id-Imag, Lig)
Non-Cooperative Scheduling of Multiple Bag-of-Task Applications
null
Dans INFOCOM (2007)
null
null
cs.DC cs.GT
null
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper we analyze the behavior of $K$ non-cooperative schedulers using the optimal strategy that maximize their efficiency while fairness is ensured at a system level ignoring applications characteristics. We limit our study to simple single-level master-worker platforms and to the case where each scheduler is in charge of a single application consisting of a large number of independent tasks. The tasks of a given application all have the same computation and communication requirements, but these requirements can vary from one application to another. In this context, we assume that each scheduler aims at maximizing its throughput. We give closed-form formula of the equilibrium reached by such a system and study its performance. We characterize the situations where this Nash equilibrium is optimal (in the Pareto sense) and show that even though no catastrophic situation (Braess-like paradox) can occur, such an equilibrium can be arbitrarily bad for any classical performance measure.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 06:39:33 GMT" } ]
2007-06-13T00:00:00
[ [ "Legrand", "Arnaud", "", "INRIA Rhône-Alpes / Id-Imag, Lig" ], [ "Touati", "Corinne", "", "INRIA Rhône-Alpes / Id-Imag, Lig" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0706.1617
Krzysztof R. Apt
Krzysztof R. Apt
Relative Strength of Strategy Elimination Procedures
8 pages
Economics Bulletin, Vol. 3, no. 21, pp. 1-9 (2007)
null
null
cs.GT
null
We compare here the relative strength of four widely used procedures on finite strategic games: iterated elimination of weakly/strictly dominated strategies by a pure/mixed strategy. A complication is that none of these procedures is based on a monotonic operator. To deal with this problem we use 'global' versions of these operators.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 07:02:13 GMT" } ]
2007-06-13T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0706.1642
Vlady Ravelomanana
Anne-Elisabeth Baert (LaRIA), Vlady Ravelomanana (LIPN), Lo\"ys Thimonier (LaRIA)
On the growth of components with non fixed excesses
A small note on the evolution of giant components
Discrete Applied Mathematics 130, 3 (17/07/2003) 487--493
10.1016/S0166-218X(03)00326-3
null
cs.DM math.CO
null
Denote by an $l$-component a connected graph with $l$ edges more than vertices. We prove that the expected number of creations of $(l+1)$-component, by means of adding a new edge to an $l$-component in a randomly growing graph with $n$ vertices, tends to 1 as $l,n$ tends to $\infty$ but with $l = o(n^{1/4})$. We also show, under the same conditions on $l$ and $n$, that the expected number of vertices that ever belong to an $l$-component is $\sim (12l)^{1/3} n^{2/3}$.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 09:32:34 GMT" } ]
2007-06-14T00:00:00
[ [ "Baert", "Anne-Elisabeth", "", "LaRIA" ], [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Thimonier", "Loÿs", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0706.1665
Vlady Ravelomanana
Vlady Ravelomanana (LIPN)
Another Proof of Wright's Inequalities
null
null
null
null
cs.DM math.CO
null
We present a short way of proving the inequalities obtained by Wright in [Journal of Graph Theory, 4: 393 - 407 (1980)] concerning the number of connected graphs with $\ell$ edges more than vertices.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 11:42:56 GMT" } ]
2007-06-14T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0706.1692
Cyrille Chavet
Cyrille Chavet (LESTER, STM), Philippe Coussy (LESTER), Pascal Urard (STM), Eric Martin (LESTER)
A Methodology for Efficient Space-Time Adapter Design Space Exploration: A Case Study of an Ultra Wide Band Interleaver
ISBN:1-4244-0921-7
Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS) (28/05/2007) 2946
null
null
cs.AR
null
This paper presents a solution to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall architecture of the system is significantly affected by communication architecture, so the designers need specifically optimized adapters. By explicitly modeling these communications within an effective graph-theoretic model and analysis framework, we automatically generate an optimized architecture, named Space-Time AdapteR (STAR). Our design flow inputs a C description of Input/Output data scheduling, and user requirements (throughput, latency, parallelism...), and formalizes communication constraints through a Resource Constraints Graph (RCG). The RCG properties enable an efficient architecture space exploration in order to synthesize a STAR component. The proposed approach has been tested to design an industrial data mixing block example: an Ultra-Wideband interleaver.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 13:45:50 GMT" } ]
2007-06-13T00:00:00
[ [ "Chavet", "Cyrille", "", "LESTER, STM" ], [ "Coussy", "Philippe", "", "LESTER" ], [ "Urard", "Pascal", "", "STM" ], [ "Martin", "Eric", "", "LESTER" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0706.1700
Guilhem Coq
Guilhem Coq (1), Olivier Alata (2), Marc Arnaudon (1), Christian Olivier (2) ((1) Laboratoire de Math\'ematiques et Applications Poitiers France, (2) Laboratoire Signal Image et Communications Poitiers France)
Information Criteria and Arithmetic Codings : An Illustration on Raw Images
5 pages, 6 figures, First published in Proceedings og the 15th European Signal processing Conference EUSIPCO 2007 in 2007, published by EURASIP
null
null
null
cs.IT math.IT
null
In this paper we give a short theoretical description of the general predictive adaptive arithmetic coding technique. The links between this technique and the works of J. Rissanen in the 80's, in particular the BIC information criterion used in parametrical model selection problems, are established. We also design lossless and lossy coding techniques of images. The lossless technique uses a mix between fixed-length coding and arithmetic coding and provides better compression results than those separate methods. That technique is also seen to have an interesting application in the domain of statistics since it gives a data-driven procedure for the non-parametrical histogram selection problem. The lossy technique uses only predictive adaptive arithmetic codes and shows how a good choice of the order of prediction might lead to better results in terms of compression. We illustrate those coding techniques on a raw grayscale image.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 14:09:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Coq", "Guilhem", "" ], [ "Alata", "Olivier", "" ], [ "Arnaudon", "Marc", "" ], [ "Olivier", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.1716
Hassane. Alla
Lat\'efa Ghomri (GIPSA-lab), Hassane Alla (GIPSA-lab)
Modeling and analysis using hybrid Petri nets
null
Nonlinear Analysis: Hybrid Systems Volume 1, Issue 2 (01/06/2007) Pages 141-153
null
null
cs.IT math.IT
null
This paper is devoted to the use of hybrid Petri nets (PNs) for modeling and control of hybrid dynamic systems (HDS). Modeling, analysis and control of HDS attract ever more of researchers' attention and several works have been devoted to these topics. We consider in this paper the extensions of the PN formalism (initially conceived for modeling and analysis of discrete event systems) in the direction of hybrid modeling. We present, first, the continuous PN models. These models are obtained from discrete PNs by the fluidification of the markings. They constitute the first steps in the extension of PNs toward hybrid modeling. Then, we present two hybrid PN models, which differ in the class of HDS they can deal with. The first one is used for deterministic HDS modeling, whereas the second one can deal with HDS with nondeterministic behavior. Keywords: Hybrid dynamic systems; D-elementary hybrid Petri nets; Hybrid automata; Controller synthesis
[ { "version": "v1", "created": "Tue, 12 Jun 2007 14:58:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Ghomri", "Latéfa", "", "GIPSA-lab" ], [ "Alla", "Hassane", "", "GIPSA-lab" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.1751
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
MacWilliams Identity for Codes with the Rank Metric
25 pages, submitted to EURASIP Journal on Wireless Communications
null
null
null
cs.IT math.IT
null
The MacWilliams identity, which relates the weight distribution of a code to the weight distribution of its dual code, is useful in determining the weight distribution of codes. In this paper, we derive the MacWilliams identity for linear codes with the rank metric, and our identity has a different form than that by Delsarte. Using our MacWilliams identity, we also derive related identities for rank metric codes. These identities parallel the binomial and power moment identities derived for codes with the Hamming metric.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 17:38:47 GMT" }, { "version": "v2", "created": "Mon, 23 Jul 2007 17:56:07 GMT" }, { "version": "v3", "created": "Wed, 28 Nov 2007 03:36:59 GMT" } ]
2007-11-28T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.1755
Kirill Bolshakov
Kirill Bolshakov (1), Elena Reshetova (1) ((1) Saint-Petersburg State University of Aerospace Instrumentation)
FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
6 pages, 3 figures, submitted to XI International Symposium "Problems of redundancy in information and control systems"
null
null
null
cs.CR
null
FreeBSD was one of the first widely deployed free operating systems to provide mandatory access control. It supports a number of classic MAC models. This tutorial paper addresses exploiting this implementation to enforce typical enterprise security policies of varying complexities.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 18:11:15 GMT" } ]
2007-06-13T00:00:00
[ [ "Bolshakov", "Kirill", "" ], [ "Reshetova", "Elena", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0706.1780
Marie-France Ango-Obiang
Marie-France Ango-Obiang (SITE, Loria)
Le travail collaboratif dans le cadre d'un projet architectural
null
Dans Innovation et tradition de l'association internationale Management Strat\'egique (2007)
null
null
cs.HC
null
The analysis of the practices and the tendencies of the users at the time of the search for information on Internet makes it possible to highlight several points. The search for information becomes powerful after knowledge of the typology of the various systems of research. This typology supports the adoption of a methodology of research which one can characterize by pull systems, intelligent agents, etc. In addition, the importance of the structure of the electronic document, correctly elaborated in advance, will support a higher relevance ratio to find information. In our article, the problems turn around the study of the behavior of the users in situation of search for information, as well as the constitution of a pole of documentary resources within a framework of an architectural project. It is noted that the evolution of the documentary resources is related to information technologies.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 20:06:38 GMT" } ]
2007-06-14T00:00:00
[ [ "Ango-Obiang", "Marie-France", "", "SITE, Loria" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.1790
Corinne Touati
Arnaud Legrand (INRIA Rh\^one-Alpes / ID-IMAG), Corinne Touati (INRIA Rh\^one-Alpes / ID-IMAG)
How to measure efficiency?
null
null
null
null
cs.GT
null
In the context of applied game theory in networking environments, a number of concepts have been proposed to measure both efficiency and optimality of resource allocations, the most famous certainly being the price of anarchy and the Jain index. Yet, very few have tried to question these measures and compare them one to another, in a general framework, which is the aim of the present article.
[ { "version": "v1", "created": "Tue, 12 Jun 2007 12:25:54 GMT" }, { "version": "v2", "created": "Thu, 14 Jun 2007 16:38:19 GMT" } ]
2007-06-14T00:00:00
[ [ "Legrand", "Arnaud", "", "INRIA Rhône-Alpes / ID-IMAG" ], [ "Touati", "Corinne", "", "INRIA\n Rhône-Alpes / ID-IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0706.1860
Jordi Cucurull
Jordi Cucurull, Ramon Marti, Sergi Robles, Joan Borrell, Guillermo Navarro
FIPA-based Interoperable Agent Mobility Proposal
10 pages, agent migration architecture proposal
null
null
null
cs.MA cs.NI
null
This paper presents a proposal for a flexible agent mobility architecture based on IEEE-FIPA standards and intended to be one of them. This proposal is a first step towards interoperable mobility mechanisms, which are needed for future agent migration between different kinds of platforms. Our proposal is presented as a flexible and robust architecture that has been successfully implemented in the JADE and AgentScape platforms. It is based on an open set of protocols, allowing new protocols and future improvements to be accommodated in the architecture. With this proposal we demonstrate that a standard architecture for agent mobility capable of supporting several agent platforms can be defined and implemented.
[ { "version": "v1", "created": "Wed, 13 Jun 2007 14:37:58 GMT" }, { "version": "v2", "created": "Fri, 31 Aug 2007 10:57:01 GMT" } ]
2011-11-10T00:00:00
[ [ "Cucurull", "Jordi", "" ], [ "Marti", "Ramon", "" ], [ "Robles", "Sergi", "" ], [ "Borrell", "Joan", "" ], [ "Navarro", "Guillermo", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.1926
Michele Bezzi
Michele Bezzi, Robin Groenevelt
Towards understanding and modelling office daily life
5 pages, ECHISE 2006 - 2nd International Workshop on Exploiting Context Histories in Smart Environments - Infrastructures and Design, 8th International Conference of Ubiquitous Computing (Ubicomp 2006), Orange County, CA, 17-21 September 2006
null
null
null
cs.CV cs.CY
null
Measuring and modeling human behavior is a very complex task. In this paper we present our initial thoughts on modeling and automatic recognition of some human activities in an office. We argue that to successfully model human activities, we need to consider both individual behavior and group dynamics. To demonstrate these theoretical approaches, we introduce an experimental system for analyzing everyday activity in our office.
[ { "version": "v1", "created": "Wed, 13 Jun 2007 15:15:00 GMT" } ]
2007-06-14T00:00:00
[ [ "Bezzi", "Michele", "" ], [ "Groenevelt", "Robin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0706.2010
Anne Broadbent
Anne Broadbent and Alain Tapp
Information-theoretic security without an honest majority
15 pages, to appear in Proceedings of ASIACRYPT 2007
Proceedings of ASIACRYPT 2007 pp. 410-426
10.1007/978-3-540-76900-2_25
null
cs.CR
null
We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel). We give protocols for veto, vote, anonymous bit transmission, collision detection, notification and anonymous message transmission. Not assuming an honest majority, in most cases, a single corrupt participant can make the protocol abort. All protocols achieve functionality never obtained before without the use of either computational assumptions or of an honest majority.
[ { "version": "v1", "created": "Wed, 13 Jun 2007 23:05:40 GMT" } ]
2016-01-06T00:00:00
[ [ "Broadbent", "Anne", "" ], [ "Tapp", "Alain", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0706.2025
Sapon Tanachaiwiwat
Sapon Tanachaiwiwat, Ahmed Helmy
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
null
null
null
null
cs.CR cs.NI
null
An encounter-based network is a frequently disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. Because this type of network is highly dynamic and has no specific boundary, a distributed counter-worm mechanism is needed. We propose models for the worm interaction approach that relies upon automated beneficial worm generation to alleviate problems of worm propagation in such networks. We study and analyze the impact of key mobile node characteristics including node cooperation, immunization, on-off behavior on the worm propagations and interactions. We validate our proposed model using extensive simulations. We also find that, in addition to immunization, cooperation can reduce the level of worm infection. Furthermore, on-off behavior linearly impacts only timing aspect but not the overall infection. Using realistic mobile network measurements, we find that encounters are non-uniform, the trends are consistent with the model but the magnitudes are drastically different. Immunization seems to be the most effective in such scenarios. These findings provide insight that we hope would aid to develop counter-worm protocols in future encounter-based networks.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 02:23:01 GMT" } ]
2007-06-15T00:00:00
[ [ "Tanachaiwiwat", "Sapon", "" ], [ "Helmy", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.2033
Khoa Nguyen
Khoa D. Nguyen, Albert Guillen i Fabregas and Lars K. Rasmussen
Power Allocation for Discrete-Input Delay-Limited Fading Channels
61 pages, 10 figures, Submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
null
We consider power allocation algorithms for fixed-rate transmission over Nakagami-m non-ergodic block-fading channels with perfect transmitter and receiver channel state information and discrete input signal constellations, under both short- and long-term power constraints. Optimal power allocation schemes are shown to be direct applications of previous results in the literature. We show that the SNR exponent of the optimal short-term scheme is given by m times the Singleton bound. We also illustrate the significant gains available by employing long-term power constraints. In particular, we analyze the optimal long-term solution, showing that zero outage can be achieved provided that the corresponding short-term SNR exponent with the same system parameters is strictly greater than one. Conversely, if the short-term SNR exponent is smaller than one, we show that zero outage cannot be achieved. In this case, we derive the corresponding long-term SNR exponent as a function of the Singleton bound. Due to the nature of the expressions involved, the complexity of optimal schemes may be prohibitive for system implementation. We therefore propose simple sub-optimal power allocation schemes whose outage probability performance is very close to the minimum outage probability obtained by optimal schemes. We also show the applicability of these techniques to practical systems employing orthogonal frequency division multiplexing.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 03:48:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Nguyen", "Khoa D.", "" ], [ "Fabregas", "Albert Guillen i", "" ], [ "Rasmussen", "Lars K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2035
Michael Silverman
Kyle Sabo, Ryan Schmitt, Michael Silverman
Critique of Feinstein's Proof that P is not Equal to NP
5 pages, 2 definitions
null
null
null
cs.CC
null
We examine a proof by Craig Alan Feinstein that P is not equal to NP. We present counterexamples to claims made in his paper and expose a flaw in the methodology he uses to make his assertions. The fault in his argument is the incorrect use of reduction. Feinstein makes incorrect assumptions about the complexity of a problem based on the fact that there is a more complex problem that can be used to solve it. His paper introduces the terminology "imaginary processor" to describe how it is possible to beat the brute force reduction he offers to solve the Subset-Sum problem. The claims made in the paper would not be validly established even were imaginary processors to exist.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 13:15:39 GMT" } ]
2007-06-15T00:00:00
[ [ "Sabo", "Kyle", "" ], [ "Schmitt", "Ryan", "" ], [ "Silverman", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0706.2040
Edoardo Airoldi
Edoardo M Airoldi
Getting started in probabilistic graphical models
12 pages, 1 figure
Airoldi EM (2007) Getting started in probabilistic graphical models. PLoS Comput Biol 3(12): e252
10.1371/journal.pcbi.0030252
null
q-bio.QM cs.LG physics.soc-ph stat.ME stat.ML
null
Probabilistic graphical models (PGMs) have become a popular tool for computational analysis of biological data in a variety of domains. But, what exactly are they and how do they work? How can we use PGMs to discover patterns that are biologically relevant? And to what extent can PGMs help us formulate new hypotheses that are testable at the bench? This note sketches out some answers and illustrates the main ideas behind the statistical approach to biological pattern discovery.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 14:52:06 GMT" }, { "version": "v2", "created": "Sat, 10 Nov 2007 19:25:59 GMT" } ]
2010-02-22T00:00:00
[ [ "Airoldi", "Edoardo M", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0706.2069
Samuel Thibault
Samuel Thibault (INRIA Futurs), Raymond Namyst (INRIA Futurs), Pierre-Andr\'e Wacrenier (INRIA Futurs)
Building Portable Thread Schedulers for Hierarchical Multiprocessors: the BubbleSched Framework
null
Dans EuroPar (2007)
null
null
cs.DC
null
Exploiting full computational power of current more and more hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform architecture. Unfortunately, most operating systems only provide a poor scheduling API that does not allow applications to transmit valuable scheduling hints to the system. In a previous paper, we showed that using a bubble-based thread scheduler can significantly improve applications' performance in a portable way. However, since multithreaded applications have various scheduling requirements, there is no universal scheduler that could meet all these needs. In this paper, we present a framework that allows scheduling experts to implement and experiment with customized thread schedulers. It provides a powerful API for dynamically distributing bubbles among the machine in a high-level, portable, and efficient way. Several examples show how experts can then develop, debug and tune their own portable bubble schedulers.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 09:35:30 GMT" } ]
2007-06-15T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ], [ "Namyst", "Raymond", "", "INRIA Futurs" ], [ "Wacrenier", "Pierre-André", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.2073
Samuel Thibault
Samuel Thibault (INRIA Futurs), Fran\c{c}ois Broquedis (INRIA Futurs), Brice Goglin (INRIA Futurs), Raymond Namyst (INRIA Futurs), Pierre-Andr\'e Wacrenier (INRIA Futurs)
An Efficient OpenMP Runtime System for Hierarchical Arch
null
Dans International Workshop on OpenMP (IWOMP) (2007)
null
null
cs.PL
null
Exploiting the full computational power of always deeper hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform architecture. The emergence of multi-core chips and NUMA machines makes it important to minimize the number of remote memory accesses, to favor cache affinities, and to guarantee fast completion of synchronization steps. By using the BubbleSched platform as a threading backend for the GOMP OpenMP compiler, we are able to easily transpose affinities of thread teams into scheduling hints using abstractions called bubbles. We then propose a scheduling strategy suited to nested OpenMP parallelism. The resulting preliminary performance evaluations show an important improvement of the speedup on a typical NAS OpenMP benchmark application.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 09:43:23 GMT" } ]
2007-06-15T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ], [ "Broquedis", "François", "", "INRIA Futurs" ], [ "Goglin", "Brice", "", "INRIA Futurs" ], [ "Namyst", "Raymond", "", "INRIA Futurs" ], [ "Wacrenier", "Pierre-André", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0706.2076
Klaus Aehlig
Klaus Aehlig
A Finite Semantics of Simply-Typed Lambda Terms for Infinite Runs of<br> Automata
23 pages
Logical Methods in Computer Science, Volume 3, Issue 3 (July 4, 2007) lmcs:1232
10.2168/LMCS-3(3:1)2007
null
cs.LO
null
Model checking properties are often described by means of finite automata. Any particular such automaton divides the set of infinite trees into finitely many classes, according to which state has an infinite run. Building the full type hierarchy upon this interpretation of the base type gives a finite semantics for simply-typed lambda-trees. A calculus based on this semantics is proven sound and complete. In particular, for regular infinite lambda-trees it is decidable whether a given automaton has a run or not. As regular lambda-trees are precisely recursion schemes, this decidability result holds for arbitrary recursion schemes of arbitrary level, without any syntactical restriction.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 09:57:27 GMT" }, { "version": "v2", "created": "Wed, 4 Jul 2007 15:28:50 GMT" }, { "version": "v3", "created": "Thu, 1 Nov 2007 15:33:34 GMT" } ]
2015-07-01T00:00:00
[ [ "Aehlig", "Klaus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0706.2146
Rajesh Sudarsan
Rajesh Sudarsan and Calvin J. Ribbens
Efficient Multidimensional Data Redistribution for Resizable Parallel Computations
18 pages, 12 figures, 2 tables. A shorter version of this paper is available in the proceedings of the The Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA07)
null
null
null
cs.DC
null
Traditional parallel schedulers running on cluster supercomputers support only static scheduling, where the number of processors allocated to an application remains fixed throughout the execution of the job. This results in under-utilization of idle system resources thereby decreasing overall system throughput. In our research, we have developed a prototype framework called ReSHAPE, which supports dynamic resizing of parallel MPI applications executing on distributed memory platforms. The resizing library in ReSHAPE includes support for releasing and acquiring processors and efficiently redistributing application state to a new set of processors. In this paper, we derive an algorithm for redistributing two-dimensional block-cyclic arrays from $P$ to $Q$ processors, organized as 2-D processor grids. The algorithm ensures a contention-free communication schedule for data redistribution if $P_r \leq Q_r$ and $P_c \leq Q_c$. In other cases, the algorithm implements circular row and column shifts on the communication schedule to minimize node contention.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 15:54:10 GMT" } ]
2007-06-15T00:00:00
[ [ "Sudarsan", "Rajesh", "" ], [ "Ribbens", "Calvin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.2153
Quentin Merigot
Fr\'ed\'eric Chazal (INRIA Sophia Antipolis), David Cohen-Steiner (INRIA Sophia Antipolis), Quentin M\'erigot (INRIA Sophia Antipolis)
Stability of boundary measures
null
Boundary measures for geometric inference, Found. Comput. Math., 10 (2), pp. 221-240, 2010
10.1007/s10208-009-9056-2
null
cs.CG math.CA math.MG
null
We introduce the boundary measure at scale r of a compact subset of the n-dimensional Euclidean space. We show how it can be computed for point clouds and suggest these measures can be used for feature detection. The main contribution of this work is the proof a quantitative stability theorem for boundary measures using tools of convex analysis and geometric measure theory. As a corollary we obtain a stability result for Federer's curvature measures of a compact, allowing to compute them from point-cloud approximations of the compact.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 16:03:28 GMT" }, { "version": "v2", "created": "Mon, 18 Jun 2007 09:06:56 GMT" } ]
2010-03-31T00:00:00
[ [ "Chazal", "Frédéric", "", "INRIA Sophia Antipolis" ], [ "Cohen-Steiner", "David", "", "INRIA Sophia Antipolis" ], [ "Mérigot", "Quentin", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0706.2155
Greg Sepesi
Greg Sepesi
Dualheap Selection Algorithm: Efficient, Inherently Parallel and Somewhat Mysterious
5 pages, 6 figures
null
null
null
cs.DS cs.CC cs.DC
null
An inherently parallel algorithm is proposed that efficiently performs selection: finding the K-th largest member of a set of N members. Selection is a common component of many more complex algorithms and therefore is a widely studied problem. Not much is new in the proposed dualheap selection algorithm: the heap data structure is from J.W.J.Williams, the bottom-up heap construction is from R.W. Floyd, and the concept of a two heap data structure is from J.W.J. Williams and D.E. Knuth. The algorithm's novelty is limited to a few relatively minor implementation twists: 1) the two heaps are oriented with their roots at the partition values rather than at the minimum and maximum values, 2)the coding of one of the heaps (the heap of smaller values) employs negative indexing, and 3) the exchange phase of the algorithm is similar to a bottom-up heap construction, but navigates the heap with a post-order tree traversal. When run on a single processor, the dualheap selection algorithm's performance is competitive with quickselect with median estimation, a common variant of C.A.R. Hoare's quicksort algorithm. When run on parallel processors, the dualheap selection algorithm is superior due to its subtasks that are easily partitioned and innately balanced.
[ { "version": "v1", "created": "Thu, 14 Jun 2007 16:11:24 GMT" } ]
2007-06-15T00:00:00
[ [ "Sepesi", "Greg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.2293
Romain Pechoux
Jean-Yves Marion and Romain Pechoux
Resource control of object-oriented programs
null
null
null
null
cs.PL cs.LO
null
A sup-interpretation is a tool which provides an upper bound on the size of a value computed by some symbol of a program. Sup-interpretations have shown their interest to deal with the complexity of first order functional programs. For instance, they allow to characterize all the functions bitwise computable in Alogtime. This paper is an attempt to adapt the framework of sup-interpretations to a fragment of oriented-object programs, including distinct encodings of numbers through the use of constructor symbols, loop and while constructs and non recursive methods with side effects. We give a criterion, called brotherly criterion, which ensures that each brotherly program computes objects whose size is polynomially bounded by the inputs sizes.
[ { "version": "v1", "created": "Fri, 15 Jun 2007 13:39:12 GMT" } ]
2007-06-18T00:00:00
[ [ "Marion", "Jean-Yves", "" ], [ "Pechoux", "Romain", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0706.2310
Nicolas Gresset
Nicolas Gresset, Loic Brunel, Joseph Boutros
Space-time coding techniques with bit-interleaved coded modulations for MIMO block-fading channels
Submitted to IEEE Trans. on Information Theory, Submission: January 2006 - First review: June 2007
null
10.1109/TIT.2008.920240
null
cs.IT math.IT
null
The space-time bit-interleaved coded modulation (ST-BICM) is an efficient technique to obtain high diversity and coding gain on a block-fading MIMO channel. Its maximum-likelihood (ML) performance is computed under ideal interleaving conditions, which enables a global optimization taking into account channel coding. Thanks to a diversity upperbound derived from the Singleton bound, an appropriate choice of the time dimension of the space-time coding is possible, which maximizes diversity while minimizing complexity. Based on the analysis, an optimized interleaver and a set of linear precoders, called dispersive nucleo algebraic (DNA) precoders are proposed. The proposed precoders have good performance with respect to the state of the art and exist for any number of transmit antennas and any time dimension. With turbo codes, they exhibit a frame error rate which does not increase with frame length.
[ { "version": "v1", "created": "Fri, 15 Jun 2007 15:14:01 GMT" } ]
2016-11-15T00:00:00
[ [ "Gresset", "Nicolas", "" ], [ "Brunel", "Loic", "" ], [ "Boutros", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2331
Erhan Bayraktar
Erhan Bayraktar, Hao Xing
Pricing American Options for Jump Diffusions by Iterating Optimal Stopping Problems for Diffusions
Key Words: Pricing derivatives, American options, jump diffusions, barrier options, finite difference methods
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We approximate the price of the American put for jump diffusions by a sequence of functions, which are computed iteratively. This sequence converges to the price function uniformly and exponentially fast. Each element of the approximating sequence solves an optimal stopping problem for geometric Brownian motion, and can be numerically computed using the classical finite difference methods. We prove the convergence of this numerical scheme and present examples to illustrate its performance.
[ { "version": "v1", "created": "Fri, 15 Jun 2007 16:43:14 GMT" }, { "version": "v2", "created": "Sat, 16 Jun 2007 15:40:41 GMT" }, { "version": "v3", "created": "Sat, 14 Jun 2008 03:46:38 GMT" }, { "version": "v4", "created": "Thu, 31 Jul 2008 03:43:12 GMT" }, { "version": "v5", "created": "Wed, 3 Dec 2008 16:56:17 GMT" } ]
2008-12-03T00:00:00
[ [ "Bayraktar", "Erhan", "" ], [ "Xing", "Hao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0706.2434
RadhaKrishna Ganti
RadhaKrishna Ganti and Martin Haenggi
Interference and Outage in Clustered Wireless Ad Hoc Networks
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2025543
null
cs.IT math.IT
null
In the analysis of large random wireless networks, the underlying node distribution is almost ubiquitously assumed to be the homogeneous Poisson point process. In this paper, the node locations are assumed to form a Poisson clustered process on the plane. We derive the distributional properties of the interference and provide upper and lower bounds for its CCDF. We consider the probability of successful transmission in an interference limited channel when fading is modeled as Rayleigh. We provide a numerically integrable expression for the outage probability and closed-form upper and lower bounds.We show that when the transmitter-receiver distance is large, the success probability is greater than that of a Poisson arrangement. These results characterize the performance of the system under geographical or MAC-induced clustering. We obtain the maximum intensity of transmitting nodes for a given outage constraint, i.e., the transmission capacity (of this spatial arrangement) and show that it is equal to that of a Poisson arrangement of nodes. For the analysis, techniques from stochastic geometry are used, in particular the probability generating functional of Poisson cluster processes, the Palm characterization of Poisson cluster processes and the Campbell-Mecke theorem.
[ { "version": "v1", "created": "Sat, 16 Jun 2007 17:23:43 GMT" } ]
2010-10-11T00:00:00
[ [ "Ganti", "RadhaKrishna", "" ], [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2479
Nicolas Schabanel
Damien Regnault and Nicolas Schabanel and \'Eric Thierry
Progresses in the Analysis of Stochastic 2D Cellular Automata: a Study of Asynchronous 2D Minority
null
null
null
null
cs.DM
null
Cellular automata are often used to model systems in physics, social sciences, biology that are inherently asynchronous. Over the past 20 years, studies have demonstrated that the behavior of cellular automata drastically changed under asynchronous updates. Still, the few mathematical analyses of asynchronism focus on one-dimensional probabilistic cellular automata, either on single examples or on specific classes. As for other classic dynamical systems in physics, extending known methods from one- to two-dimensional systems is a long lasting challenging problem. In this paper, we address the problem of analysing an apparently simple 2D asynchronous cellular automaton: 2D Minority where each cell, when fired, updates to the minority state of its neighborhood. Our experiments reveal that in spite of its simplicity, the minority rule exhibits a quite complex response to asynchronism. By focusing on the fully asynchronous regime, we are however able to describe completely the asymptotic behavior of this dynamics as long as the initial configuration satisfies some natural constraints. Besides these technical results, we have strong reasons to believe that our techniques relying on defining an energy function from the transition table of the automaton may be extended to the wider class of threshold automata.
[ { "version": "v1", "created": "Sun, 17 Jun 2007 14:12:31 GMT" } ]
2007-06-19T00:00:00
[ [ "Regnault", "Damien", "" ], [ "Schabanel", "Nicolas", "" ], [ "Thierry", "Éric", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.2520
Viktoria Rojkova
Viktoria Rojkova, Mehmed Kantardzic
Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory Approach
submitted to Internet Measurement Conference 2007
null
null
null
cs.NI
null
The traffic behavior of University of Louisville network with the interconnected backbone routers and the number of Virtual Local Area Network (VLAN) subnets is investigated using the Random Matrix Theory (RMT) approach. We employ the system of equal interval time series of traffic counts at all router to router and router to subnet connections as a representation of the inter-VLAN traffic. The cross-correlation matrix C of the traffic rate changes between different traffic time series is calculated and tested against null-hypothesis of random interactions. The majority of the eigenvalues \lambda_{i} of matrix C fall within the bounds predicted by the RMT for the eigenvalues of random correlation matrices. The distribution of eigenvalues and eigenvectors outside of the RMT bounds displays prominent and systematic deviations from the RMT predictions. Moreover, these deviations are stable in time. The method we use provides a unique possibility to accomplish three concurrent tasks of traffic analysis. The method verifies the uncongested state of the network, by establishing the profile of random interactions. It recognizes the system-specific large-scale interactions, by establishing the profile of stable in time non-random interactions. Finally, by looking into the eigenstatistics we are able to detect and allocate anomalies of network traffic interactions.
[ { "version": "v1", "created": "Mon, 18 Jun 2007 01:31:54 GMT" } ]
2007-06-19T00:00:00
[ [ "Rojkova", "Viktoria", "" ], [ "Kantardzic", "Mehmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0706.2544
Pierre-Louis Curien
Pierre-Louis Curien (PPS), Hugo Herbelin (INRIA Futurs)
Abstract machines for dialogue games
null
null
null
null
cs.LO
null
The notion of abstract Boehm tree has arisen as an operationally-oriented distillation of works on game semantics, and has been investigated in two papers. This paper revisits the notion, providing more syntactic support and more examples (like call-by-value evaluation) illustrating the generality of the underlying computing device. Precise correspondences between various formulations of the evaluation mechanism of abstract Boehm trees are established.
[ { "version": "v1", "created": "Mon, 18 Jun 2007 08:01:12 GMT" } ]
2007-06-19T00:00:00
[ [ "Curien", "Pierre-Louis", "", "PPS" ], [ "Herbelin", "Hugo", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0706.2575
Kettani Omar
O.Kettani
A new lower bound on the independence number of a graph
4 pages
null
null
null
cs.DM
null
For a given connected graph G on n vertices and m edges, we prove that its independence number is at least (2m+n+2-sqrt(sqr(2m+n+2)-16sqr(n)))/8.
[ { "version": "v1", "created": "Mon, 18 Jun 2007 10:50:27 GMT" }, { "version": "v2", "created": "Wed, 20 Jun 2007 17:59:06 GMT" } ]
2007-06-20T00:00:00
[ [ "Kettani", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.2585
Richard Mayr
Parosh Aziz Abdulla, Noomene Ben Henda, Richard Mayr
Decisive Markov Chains
32 pages, 0 figures
Logical Methods in Computer Science, Volume 3, Issue 4 (November 8, 2007) lmcs:867
10.2168/LMCS-3(4:7)2007
null
cs.LO cs.DM
null
We consider qualitative and quantitative verification problems for infinite-state Markov chains. We call a Markov chain decisive w.r.t. a given set of target states F if it almost certainly eventually reaches either F or a state from which F can no longer be reached. While all finite Markov chains are trivially decisive (for every set F), this also holds for many classes of infinite Markov chains. Infinite Markov chains which contain a finite attractor are decisive w.r.t. every set F. In particular, this holds for probabilistic lossy channel systems (PLCS). Furthermore, all globally coarse Markov chains are decisive. This class includes probabilistic vector addition systems (PVASS) and probabilistic noisy Turing machines (PNTM). We consider both safety and liveness problems for decisive Markov chains, i.e., the probabilities that a given set of states F is eventually reached or reached infinitely often, respectively. 1. We express the qualitative problems in abstract terms for decisive Markov chains, and show an almost complete picture of its decidability for PLCS, PVASS and PNTM. 2. We also show that the path enumeration algorithm of Iyer and Narasimha terminates for decisive Markov chains and can thus be used to solve the approximate quantitative safety problem. A modified variant of this algorithm solves the approximate quantitative liveness problem. 3. Finally, we show that the exact probability of (repeatedly) reaching F cannot be effectively expressed (in a uniform way) in Tarski-algebra for either PLCS, PVASS or (P)NTM.
[ { "version": "v1", "created": "Mon, 18 Jun 2007 11:50:16 GMT" }, { "version": "v2", "created": "Thu, 8 Nov 2007 20:21:56 GMT" } ]
2015-07-01T00:00:00
[ [ "Abdulla", "Parosh Aziz", "" ], [ "Henda", "Noomene Ben", "" ], [ "Mayr", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.2606
Christian Schaffner
Serge Fehr, Christian Schaffner
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
17 pages, v2: mainly editorial changes taking into account referee comments
null
null
null
quant-ph cs.CR
null
Randomness extraction is of fundamental importance for information-theoretic cryptography. It allows to transform a raw key about which an attacker has some limited knowledge into a fully secure random key, on which the attacker has essentially no information. Up to date, only very few randomness-extraction techniques are known to work against an attacker holding quantum information on the raw key. This is very much in contrast to the classical (non-quantum) setting, which is much better understood and for which a vast amount of different techniques are known and proven to work. We prove a new randomness-extraction technique, which is known to work in the classical setting, to be secure against a quantum attacker as well. Randomness extraction is done by XOR'ing a so-called delta-biased mask to the raw key. Our result allows to extend the classical applications of this extractor to the quantum setting. We discuss the following two applications. We show how to encrypt a long message with a short key, information-theoretically secure against a quantum attacker, provided that the attacker has enough quantum uncertainty on the message. This generalizes the concept of entropically-secure encryption to the case of a quantum attacker. As second application, we show how to do error-correction without leaking partial information to a quantum attacker. Such a technique is useful in settings where the raw key may contain errors, since standard error-correction techniques may provide the attacker with information on, say, a secret key that was used to obtain the raw key.
[ { "version": "v1", "created": "Mon, 18 Jun 2007 14:16:02 GMT" }, { "version": "v2", "created": "Thu, 13 Dec 2007 09:19:49 GMT" } ]
2007-12-13T00:00:00
[ [ "Fehr", "Serge", "" ], [ "Schaffner", "Christian", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0706.2619
Laurent Doyen
Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger,<br> Jean-Francois Raskin
Algorithms for Omega-Regular Games with Imperfect Information
24 pages. A preliminary version of this paper appeared in the Proceedings of the International Conference for Computer Science Logic (CSL), Lecture Notes in Computer Science 4207, Springer, 2006, pp. 287-302
Logical Methods in Computer Science, Volume 3, Issue 3 (July 27, 2007) lmcs:1094
10.2168/LMCS-3(3:4)2007
null
cs.LO cs.GT
null
We study observation-based strategies for two-player turn-based games on graphs with omega-regular objectives. An observation-based strategy relies on imperfect information about the history of a play, namely, on the past sequence of observations. Such games occur in the synthesis of a controller that does not see the private state of the plant. Our main results are twofold. First, we give a fixed-point algorithm for computing the set of states from which a player can win with a deterministic observation-based strategy for any omega-regular objective. The fixed point is computed in the lattice of antichains of state sets. This algorithm has the advantages of being directed by the objective and of avoiding an explicit subset construction on the game graph. Second, we give an algorithm for computing the set of states from which a player can win with probability 1 with a randomized observation-based strategy for a Buechi objective. This set is of interest because in the absence of perfect information, randomized strategies are more powerful than deterministic ones. We show that our algorithms are optimal by proving matching lower bounds.
[ { "version": "v1", "created": "Mon, 18 Jun 2007 15:02:02 GMT" }, { "version": "v2", "created": "Fri, 27 Jul 2007 14:56:14 GMT" }, { "version": "v3", "created": "Fri, 2 Nov 2007 17:01:47 GMT" } ]
2015-07-01T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Doyen", "Laurent", "" ], [ "Henzinger", "Thomas A.", "" ], [ "Raskin", "<br> Jean-Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0706.2725
Guohun Zhu
Guohun Zhu
The Complexity of Determining Existence a Hamiltonian Cycle is $O(n^3)$
6 papers
null
null
null
cs.DS cs.CC cs.DM
null
The Hamiltonian cycle problem in digraph is mapped into a matching cover bipartite graph. Based on this mapping, it is proved that determining existence a Hamiltonian cycle in graph is $O(n^3)$.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 07:57:51 GMT" } ]
2007-06-20T00:00:00
[ [ "Zhu", "Guohun", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0706.2732
Cyrille Chavet
Cyrille Chavet (LESTER), Philippe Coussy (LESTER), Pascal Urard (STM), Eric Martin (LESTER)
A Design Methodology for Space-Time Adapter
ISBN : 978-1-59593-606-8
Proceedings of the 2007 ACM Great Lakes Symposium on VLSI (12/03/2007) 347
null
null
cs.AR
null
This paper presents a solution to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall architecture of the system is significantly affected by communication architecture, so the designers need specifically optimized adapters. By explicitly modeling these communications within an effective graph-theoretic model and analysis framework, we automatically generate an optimized architecture, named Space-Time AdapteR (STAR). Our design flow inputs a C description of Input/Output data scheduling, and user requirements (throughput, latency, parallelism...), and formalizes communication constraints through a Resource Constraints Graph (RCG). The RCG properties enable an efficient architecture space exploration in order to synthesize a STAR component. The proposed approach has been tested to design an industrial data mixing block example: an Ultra-Wideband interleaver.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 14:18:57 GMT" } ]
2007-06-20T00:00:00
[ [ "Chavet", "Cyrille", "", "LESTER" ], [ "Coussy", "Philippe", "", "LESTER" ], [ "Urard", "Pascal", "", "STM" ], [ "Martin", "Eric", "", "LESTER" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0706.2746
Stefano Tessaro
Robert Koenig, Ueli Maurer, Stefano Tessaro
Abstract Storage Devices
20 pages
null
null
null
cs.DM cs.CC cs.IT math.IT
null
A quantum storage device differs radically from a conventional physical storage device. Its state can be set to any value in a certain (infinite) state space, but in general every possible read operation yields only partial information about the stored state. The purpose of this paper is to initiate the study of a combinatorial abstraction, called abstract storage device (ASD), which models deterministic storage devices with the property that only partial information about the state can be read, but that there is a degree of freedom as to which partial information should be retrieved. This concept leads to a number of interesting problems which we address, like the reduction of one device to another device, the equivalence of devices, direct products of devices, as well as the factorization of a device into primitive devices. We prove that every ASD has an equivalent ASD with minimal number of states and of possible read operations. Also, we prove that the reducibility problem for ASD's is NP-complete, that the equivalence problem is at least as hard as the graph isomorphism problem, and that the factorization into binary-output devices (if it exists) is unique.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 17:14:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Koenig", "Robert", "" ], [ "Maurer", "Ueli", "" ], [ "Tessaro", "Stefano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2748
Royon Yvan
Yvan Royon (INRIA Rh\^one-Alpes), St\'ephane Fr\'enot (INRIA Rh\^one-Alpes)
A Survey of Unix Init Schemes
null
null
null
null
cs.OS
null
In most modern operating systems, init (as in "initialization") is the program launched by the kernel at boot time. It runs as a daemon and typically has PID 1. Init is responsible for spawning all other processes and scavenging zombies. It is also responsible for reboot and shutdown operations. This document describes existing solutions that implement the init process and/or init scripts in Unix-like systems. These solutions range from the legacy and still-in-use BSD and SystemV schemes, to recent and promising schemes from Ubuntu, Apple, Sun and independent developers. Our goal is to highlight their focus and compare their sets of features.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 09:44:36 GMT" }, { "version": "v2", "created": "Wed, 20 Jun 2007 07:31:38 GMT" } ]
2021-08-23T00:00:00
[ [ "Royon", "Yvan", "", "INRIA Rhône-Alpes" ], [ "Frénot", "Stéphane", "", "INRIA\n Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0706.2795
Pablo Piantanida
Pablo Piantanida and Pierre Duhamel
Dirty-paper Coding without Channel Information at the Transmitter and Imperfect Estimation at the Receiver
null
Proc. of IEEE International Conference on Communications (ICC), Glasgow, Scotland, 2007
null
null
cs.IT math.IT
null
In this paper, we examine the effects of imperfect channel estimation at the receiver and no channel knowledge at the transmitter on the capacity of the fading Costa's channel with channel state information non-causally known at the transmitter. We derive the optimal Dirty-paper coding (DPC) scheme and its corresponding achievable rates with the assumption of Gaussian inputs. Our results, for uncorrelated Rayleigh fading, provide intuitive insights on the impact of the channel estimate and the channel characteristics (e.g. SNR, fading process, channel training) on the achievable rates. These are useful in practical scenarios of multiuser wireless communications (e.g. Broadcast Channels) and information embedding applications (e.g. robust watermarking). We also studied optimal training design adapted to each application. We provide numerical results for a single-user fading Costa's channel with maximum-likehood (ML) channel estimation. These illustrate an interesting practical trade-off between the amount of training and its impact to the interference cancellation performance using DPC scheme.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 14:19:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Piantanida", "Pablo", "" ], [ "Duhamel", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2797
Anne-Marie Vercoustre
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Eduardo Fraschini (INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis)
Extraction d'entit\'es dans des collections \'evolutives
The bibteX file has been replaced with the correct one
Dans 7i\`emes Journ\'ees francophones Extraction et Gestion des Connaissances EGC 2007 76300 (23/01/2007) pp. 533-538
null
null
cs.IR
null
The goal of our work is to use a set of reports and extract named entities, in our case the names of Industrial or Academic partners. Starting with an initial list of entities, we use a first set of documents to identify syntactic patterns that are then validated in a supervised learning phase on a set of annotated documents. The complete collection is then explored. This approach is similar to the ones used in data extraction from semi-structured documents (wrappers) and do not need any linguistic resources neither a large set for training. As our collection of documents would evolve over years, we hope that the performance of the extraction would improve with the increased size of the training set.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 14:16:48 GMT" }, { "version": "v2", "created": "Fri, 13 Jul 2007 14:20:57 GMT" }, { "version": "v3", "created": "Fri, 20 Jul 2007 15:32:12 GMT" } ]
2009-09-29T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Fraschini", "Eduardo", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Vercoustre", "Anne-Marie", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0706.2809
Pablo Piantanida
Pablo Piantanida, Sajad Sadough and Pierre Duhamel
On the Outage Capacity of a Practical Decoder Using Channel Estimation Accuracy
null
Proc. of IEEE International Symposium on Information Theory (ISIT), Nice, France, 2007
10.1109/ISIT.2007.4557559
null
cs.IT math.IT
null
The optimal decoder achieving the outage capacity under imperfect channel estimation is investigated. First, by searching into the family of nearest neighbor decoders, which can be easily implemented on most practical coded modulation systems, we derive a decoding metric that minimizes the average of the transmission error probability over all channel estimation errors. This metric, for arbitrary memoryless channels, achieves the capacity of a composite (more noisy) channel. Next, according to the notion of estimation-induced outage capacity (EIO capacity) introduced in our previous work, we characterize maximal achievable information rates associated to the proposed decoder. The performance of the proposed decoding metric over uncorrelated Rayleigh fading MIMO channels is compared to both the classical mismatched maximum-likelihood (ML) decoder and the theoretical limits given by the EIO capacity (i.e. the best decoder in presence of channel estimation errors). Numerical results show that the derived metric provides significant gains, in terms of achievable information rates and bit error rate (BER), in a bit interleaved coded modulation (BICM) framework, without introducing any additional decoding complexity.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 14:55:07 GMT" } ]
2016-11-15T00:00:00
[ [ "Piantanida", "Pablo", "" ], [ "Sadough", "Sajad", "" ], [ "Duhamel", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2824
Cyrille Chavet
Cyrille Chavet (LESTER, STM), Philippe Coussy (LESTER), Pascal Urard (STM), Eric Martin (LESTER)
M\'ethodologie de mod\'elisation et d'impl\'ementation d'adaptateurs spatio-temporels
null
Actes de la conference MajecSTIC 2005 (16/11/2005) 151
null
null
cs.AR
null
The re-use of pre-designed blocks is a well-known concept of the software development. This technique has been applied to System-on-Chip (SoC) design whose complexity and heterogeneity are growing. The re-use is made thanks to high level components, called virtual components (IP), available in more or less flexible forms. These components are dedicated blocks: digital signal processing (DCT, FFT), telecommunications (Viterbi, TurboCodes),... These blocks rest on a model of fixed architecture with very few degrees of personalization. This rigidity is particularly true for the communication interface whose orders of acquisition and production of data, the temporal behavior and protocols of exchanges are fixed. The successful integration of such an IP requires that the designer (1) synchronizes the components (2) converts the protocols between "incompatible" blocks (3) temporizes the data to guarantee the temporal constraints and the order of the data. This phase remains however very manual and source of errors. Our approach proposes a formal modeling, based on an original Ressource Compatibility Graph. The synthesis flow is based on a set of transformations of the initial graph to lead to an interface architecture allowing the space-time adaptation of the data exchanges between several components.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 15:56:43 GMT" } ]
2007-06-20T00:00:00
[ [ "Chavet", "Cyrille", "", "LESTER, STM" ], [ "Coussy", "Philippe", "", "LESTER" ], [ "Urard", "Pascal", "", "STM" ], [ "Martin", "Eric", "", "LESTER" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0706.2839
Rajeev Raman
Naila Rahman and Rajeev Raman
Cache Analysis of Non-uniform Distribution Sorting Algorithms
The full version of our ESA 2000 paper (LNCS 1879) on this subject
null
null
null
cs.DS cs.PF
null
We analyse the average-case cache performance of distribution sorting algorithms in the case when keys are independently but not necessarily uniformly distributed. The analysis is for both `in-place' and `out-of-place' distribution sorting algorithms and is more accurate than the analysis presented in \cite{RRESA00}. In particular, this new analysis yields tighter upper and lower bounds when the keys are drawn from a uniform distribution. We use this analysis to tune the performance of the integer sorting algorithm MSB radix sort when it is used to sort independent uniform floating-point numbers (floats). Our tuned MSB radix sort algorithm comfortably outperforms a cache-tuned implementations of bucketsort \cite{RR99} and Quicksort when sorting uniform floats from $[0, 1)$.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 17:12:47 GMT" }, { "version": "v2", "created": "Mon, 13 Aug 2007 22:57:01 GMT" } ]
2007-08-14T00:00:00
[ [ "Rahman", "Naila", "" ], [ "Raman", "Rajeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0706.2888
James Harold Thomas
James Harold Thomas
Variations on Kak's Three Stage Quantum Cryptography Protocol
null
null
null
null
cs.CR
null
This paper introduces a variation on Kak's three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 23:04:18 GMT" } ]
2007-06-21T00:00:00
[ [ "Thomas", "James Harold", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0706.2893
Greg Sepesi
Greg Sepesi
Dualheap Sort Algorithm: An Inherently Parallel Generalization of Heapsort
4 pages, 4 figures
null
null
null
cs.DS cs.CC cs.DC
null
A generalization of the heapsort algorithm is proposed. At the expense of about 50% more comparison and move operations for typical cases, the dualheap sort algorithm offers several advantages over heapsort: improved cache performance, better performance if the input happens to be already sorted, and easier parallel implementations.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 14:42:45 GMT" } ]
2007-06-21T00:00:00
[ [ "Sepesi", "Greg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.2906
Rahul Vaze
Rahul Vaze and Robert W. Heath Jr
Capacity Scaling for MIMO Two-Way Relaying
null
null
null
null
cs.IT math.IT
null
A multiple input multiple output (MIMO) two-way relay channel is considered, where two sources want to exchange messages with each other using multiple relay nodes, and both the sources and relay nodes are equipped with multiple antennas. Both the sources are assumed to have equal number of antennas and have perfect channel state information (CSI) for all the channels of the MIMO two-way relay channel, whereas, each relay node is either assumed to have CSI for its transmit and receive channel (the coherent case) or no CSI for any of the channels (the non-coherent case). The main results in this paper are on the scaling behavior of the capacity region of the MIMO two-way relay channel with increasing number of relay nodes. In the coherent case, the capacity region of the MIMO two-way relay channel is shown to scale linearly with the number of antennas at source nodes and logarithmically with the number of relay nodes. In the non-coherent case, the capacity region is shown to scale linearly with the number of antennas at the source nodes and logarithmically with the signal to noise ratio.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 03:33:02 GMT" }, { "version": "v2", "created": "Thu, 19 Jul 2007 05:12:34 GMT" }, { "version": "v3", "created": "Mon, 7 Apr 2008 15:59:18 GMT" } ]
2008-04-07T00:00:00
[ [ "Vaze", "Rahul", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2926
Michael Chertkov
Michael Chertkov (Los Alamos)
Reducing the Error Floor
6 pages, 1 figure, invited talk at ITW'07 Tahoe
null
null
LA-UR-07-4047
cs.IT math.IT
null
We discuss how the loop calculus approach of [Chertkov, Chernyak '06], enhanced by the pseudo-codeword search algorithm of [Chertkov, Stepanov '06] and the facet-guessing idea from [Dimakis, Wainwright '06], improves decoding of graph based codes in the error-floor domain. The utility of the new, Linear Programming based, decoding is demonstrated via analysis and simulations of the model $[155,64,20]$ code.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 07:17:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Chertkov", "Michael", "", "Los Alamos" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2963
Pablo Piantanida
Pablo Piantanida, Gerald Matz and Pierre Duhamel
Outage Behavior of Discrete Memoryless Channels Under Channel Estimation Errors
null
Proc. of International Symposium on Information Theory and its Applications (ISITA), Seoul, Korea, 2006, pp. 417-422
null
null
cs.IT math.IT
null
Classically, communication systems are designed assuming perfect channel state information at the receiver and/or transmitter. However, in many practical situations, only an estimate of the channel is available that differs from the true channel. We address this channel mismatch scenario by using the notion of estimation-induced outage capacity, for which we provide an associated coding theorem and its strong converse, assuming a discrete memoryless channel. We illustrate our ideas via numerical simulations for transmissions over Ricean fading channels under a quality of service (QoS) constraint using rate-limited feedback channel and maximum likelihood (ML) channel estimation. Our results provide intuitive insights on the impact of the channel estimate and the channel characteristics (SNR, Ricean K-factor, training sequence length, feedback rate, etc.) on the mean outage capacity.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 11:01:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Piantanida", "Pablo", "" ], [ "Matz", "Gerald", "" ], [ "Duhamel", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.2974
Arnaud Leleve
Hcene Benmohamed (LIESP), Arnaud Leleve (LIESP), Patrick Pr\'evot (LIESP)
Remote laboratories: new technology and standard based architecture
null
Proceedings of 2004 International Conference on Information and Communication Technologies: From Theory to Applications (19/04/2004) 101 - 102
10.1109/ICTTA.2004.1307634
null
cs.OH
null
E-Laboratories are important components of e- learning environments, especially in scientific and technical disciplines. First widespread E-Labs consisted in proposing simulations of real systems (virtual labs), as building remote labs (remote control of real systems) was difficult by lack of industrial standards and common protocols. Nowadays, robotics and automation technologies make easier the interfacing of systems with computers. In this frame, many researchers (such as those mentioned in [1]) focus on how to set up such a remote control. But, only a few of them deal with the educational point of view of the problem. This paper outlines our current research and reflection about remote laboratory modelling.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 12:07:27 GMT" } ]
2007-06-21T00:00:00
[ [ "Benmohamed", "Hcene", "", "LIESP" ], [ "Leleve", "Arnaud", "", "LIESP" ], [ "Prévot", "Patrick", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0706.3008
Areski Flissi
Areski Flissi (LIFL), Philippe Merle (INRIA Futurs)
A Generic Deployment Framework for Grid Computing and Distributed Applications
The original publication is available at http://www.springerlink.com
OTM 2006, LNCS 4276 (2006) 1402-1411
10.1007/11914952_26
null
cs.DC
null
Deployment of distributed applications on large systems, and especially on grid infrastructures, becomes a more and more complex task. Grid users spend a lot of time to prepare, install and configure middleware and application binaries on nodes, and eventually start their applications. The problem is that the deployment process is composed of many heterogeneous tasks that have to be orchestrated in a specific correct order. As a consequence, the automatization of the deployment process is currently very difficult to reach. To address this problem, we propose in this paper a generic deployment framework allowing to automatize the execution of heterogeneous tasks composing the whole deployment process. Our approach is based on a reification as software components of all required deployment mechanisms or existing tools. Grid users only have to describe the configuration to deploy in a simple natural language instead of programming or scripting how the deployment process is executed. As a toy example, this framework is used to deploy CORBA component-based applications and OpenCCM middleware on one thousand nodes of the French Grid5000 infrastructure.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 15:17:47 GMT" } ]
2007-06-21T00:00:00
[ [ "Flissi", "Areski", "", "LIFL" ], [ "Merle", "Philippe", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.3009
Cyrille Chavet
Cyrille Chavet (LESTER, STM), Philippe Coussy (LESTER), Pascal Urard (STM), Eric Martin (LESTER)
Application of a design space exploration tool to enhance interleaver generation
null
Proceedings of the European Signal Processing Conference (EUSIPCO-2007) (03/09/2007)
null
null
cs.AR cs.IT math.IT
null
This paper presents a methodology to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall performance of the system is significantly affected by communication architectures, as a consequence the designers need specifically optimized adapters. By explicitly modeling these communications within an effective graph-theoretic model and analysis framework, we automatically generate an optimized architecture, named Space-Time AdapteR (STAR). Our design flow inputs a C description of Input/Output data scheduling, and user requirements (throughput, latency, parallelism...), and formalizes communication constraints through a Resource Constraints Graph (RCG). Design space exploration is then performed through associated tools, to synthesize a STAR component under time-to-market constraints. The proposed approach has been tested to design an industrial data mixing block example: an Ultra-Wideband interleaver.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 15:19:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Chavet", "Cyrille", "", "LESTER, STM" ], [ "Coussy", "Philippe", "", "LESTER" ], [ "Urard", "Pascal", "", "STM" ], [ "Martin", "Eric", "", "LESTER" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3060
Eric Darve
Erich Elsen, V. Vishal, Mike Houston, Vijay Pande, Pat Hanrahan, Eric Darve
N-Body Simulations on GPUs
null
null
null
null
cs.CE cs.DC
null
Commercial graphics processors (GPUs) have high compute capacity at very low cost, which makes them attractive for general purpose scientific computing. In this paper we show how graphics processors can be used for N-body simulations to obtain improvements in performance over current generation CPUs. We have developed a highly optimized algorithm for performing the O(N^2) force calculations that constitute the major part of stellar and molecular dynamics simulations. In some of the calculations, we achieve sustained performance of nearly 100 GFlops on an ATI X1900XTX. The performance on GPUs is comparable to specialized processors such as GRAPE-6A and MDGRAPE-3, but at a fraction of the cost. Furthermore, the wide availability of GPUs has significant implications for cluster computing and distributed computing efforts like Folding@Home.
[ { "version": "v1", "created": "Wed, 20 Jun 2007 21:02:14 GMT" } ]
2007-06-22T00:00:00
[ [ "Elsen", "Erich", "" ], [ "Vishal", "V.", "" ], [ "Houston", "Mike", "" ], [ "Pande", "Vijay", "" ], [ "Hanrahan", "Pat", "" ], [ "Darve", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.3076
Shiguo Lian
Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
On the Performance of Joint Fingerprint Embedding and Decryption Scheme
10 pages,9 figures. To be submitted
null
null
null
cs.MM cs.CR
null
Till now, few work has been done to analyze the performances of joint fingerprint embedding and decryption schemes. In this paper, the security of the joint fingerprint embedding and decryption scheme proposed by Kundur et al. is analyzed and improved. The analyses include the security against unauthorized customer, the security against authorized customer, the relationship between security and robustness, the relationship between secu-rity and imperceptibility and the perceptual security. Based these analyses, some means are proposed to strengthen the system, such as multi-key encryp-tion and DC coefficient encryption. The method can be used to analyze other JFD schemes. It is expected to provide valuable information to design JFD schemes.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 02:44:44 GMT" } ]
2007-06-22T00:00:00
[ [ "Lian", "Shiguo", "" ], [ "Liu", "Zhongxuan", "" ], [ "Ren", "Zhen", "" ], [ "Wang", "Haila", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0706.3104
Cristina Toninelli
Marc Mezard, Cristina Toninelli
Group Testing with Random Pools: optimal two-stage algorithms
12 pages
null
null
null
cs.DS cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT
null
We study Probabilistic Group Testing of a set of N items each of which is defective with probability p. We focus on the double limit of small defect probability, p<<1, and large number of variables, N>>1, taking either p->0 after $N\to\infty$ or $p=1/N^{\beta}$ with $\beta\in(0,1/2)$. In both settings the optimal number of tests which are required to identify with certainty the defectives via a two-stage procedure, $\bar T(N,p)$, is known to scale as $Np|\log p|$. Here we determine the sharp asymptotic value of $\bar T(N,p)/(Np|\log p|)$ and construct a class of two-stage algorithms over which this optimal value is attained. This is done by choosing a proper bipartite regular graph (of tests and variable nodes) for the first stage of the detection. Furthermore we prove that this optimal value is also attained on average over a random bipartite graph where all variables have the same degree, while the tests have Poisson-distributed degrees. Finally, we improve the existing upper and lower bound for the optimal number of tests in the case $p=1/N^{\beta}$ with $\beta\in[1/2,1)$.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 08:57:44 GMT" } ]
2007-11-14T00:00:00
[ [ "Mezard", "Marc", "" ], [ "Toninelli", "Cristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3129
Aris L. Moustakas
Pavlos Kazakopoulos and Aris L. Moustakas
Closed-Form Density of States and Localization Length for a Non-Hermitian Disordered System
5 pages, 1 figure
null
10.1103/PhysRevE.78.016603
null
cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT nlin.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We calculate the Lyapunov exponent for the non-Hermitian Zakharov-Shabat eigenvalue problem corresponding to the attractive non-linear Schroedinger equation with a Gaussian random pulse as initial value function. Using an extension of the Thouless formula to non-Hermitian random operators, we calculate the corresponding average density of states. We analyze two cases, one with circularly symmetric complex Gaussian pulses and the other with real Gaussian pulses. We discuss the implications in the context of the information transmission through non-linear optical fibers.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 11:57:40 GMT" }, { "version": "v2", "created": "Thu, 19 Jun 2008 14:00:53 GMT" } ]
2013-05-29T00:00:00
[ [ "Kazakopoulos", "Pavlos", "" ], [ "Moustakas", "Aris L.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" } ]
0706.3132
Paulo Condado
Paulo A. Condado and Fernando G. Lobo
EasyVoice: Integrating voice synthesis with Skype
null
null
null
null
cs.CY cs.HC
null
This paper presents EasyVoice, a system that integrates voice synthesis with Skype. EasyVoice allows a person with voice disabilities to talk with another person located anywhere in the world, removing an important obstacle that affect these people during a phone or VoIP-based conversation.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 12:04:40 GMT" } ]
2007-06-22T00:00:00
[ [ "Condado", "Paulo A.", "" ], [ "Lobo", "Fernando G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.3146
Hao Hu
Hao Hu, Steven Myers, Vittoria Colizza, Alessandro Vespignani
WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?
22 pages, 1 table, 4 figures
Proceedings of the National Academy of Sciences, vol. 106, no. 5, 1318-1323 (2009)
10.1073/pnas.0811973106
null
cs.CR physics.soc-ph
null
In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attack and affect entire urban areas WiFi networks. In this paper we consider several scenarios for the deployment of malware that spreads solely over the wireless channel of major urban areas in the US. We develop an epidemiological model that takes into consideration prevalent security flaws on these routers. The spread of such a contagion is simulated on real-world data for geo-referenced wireless routers. We uncover a major weakness of WiFi networks in that most of the simulated scenarios show tens of thousands of routers infected in as little time as two weeks, with the majority of the infections occurring in the first 24 to 48 hours. We indicate possible containment and prevention measure to limit the eventual harm of such an attack.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 19:36:21 GMT" } ]
2009-02-11T00:00:00
[ [ "Hu", "Hao", "" ], [ "Myers", "Steven", "" ], [ "Colizza", "Vittoria", "" ], [ "Vespignani", "Alessandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0706.3159
Pierre Deransart
Pierre Deransart (INRIA Rocquencourt), Mireille Ducass\'e (IRISA), G\'erard Ferrand (LIFO)
Une s\'emantique observationnelle du mod\`ele des bo\^ites pour la r\'esolution de programmes logiques (version \'etendue)
Project of research report used to produce the paper presented at JFPC 2007
null
null
null
cs.PL cs.SE
null
This report specifies an observational semantics and gives an original presentation of the Byrd's box model. The approach accounts for the semantics of Prolog tracers independently of a particular implementation. Traces are, in general, considered as rather obscure and difficult to use. The proposed formal presentation of a trace constitutes a simple and pedagogical approach for teaching Prolog or for implementing Prolog tracers. It constitutes a form of declarative specification for the tracers. Our approach highlights qualities of the box model which made its success, but also its drawbacks and limits. As a matter of fact, the presented semantics is only one example to illustrate general problems relating to tracers and observing processes. Observing processes know, from observed processes, only their traces. The issue is then to be able to reconstitute by the sole analysis of the trace the main part of the observed process, and if possible, without any loss of information.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 14:20:30 GMT" }, { "version": "v2", "created": "Mon, 25 Jun 2007 14:03:05 GMT" } ]
2007-06-25T00:00:00
[ [ "Deransart", "Pierre", "", "INRIA Rocquencourt" ], [ "Ducassé", "Mireille", "", "IRISA" ], [ "Ferrand", "Gérard", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0706.3165
Hichem Geryville
Hichem Geryville (LIESP), Abdelaziz Bouras (LIESP), Yacine Ouzrout (LIESP), Nikolaos Sapidis
A solution for actors' viewpoints representation with collaborative product development
ISBN: 2-287-48363-9
Research in Interactive Design (2007) 39-40
10.1007/978-2-287-48370-7
null
cs.HC
null
As product complexity and marketing competition increase, a collaborative product development is necessary for companies which develop high quality products in short lead-times. To support product actors from different fields, disciplines, and locations, wishing to exchange and share information, the representation of the actors' viewpoints is the underlying requirement of the collaborative product development. The actors' viewpoints approach was designed to provide an organisational framework following the actors' perspectives in the collaboration, and their relationships, could be explicitly gathered and formatted. The approach acknowledges the inevitability of multiple integration of product information as different views, promotes gathering of actors' interests, and encourages retrieved adequate information while providing support for integration through PLM and/or SCM collaboration. In this paper, a solution for neutral viewpoints representation is proposed. The product, process, and organisation information models are seriatim discussed. A series of issues referring to the viewpoints representation are discussed in detail. Based on XML standard, taking cyclone vessel as an example, an application case of part of product information modelling is stated.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 14:40:25 GMT" } ]
2007-06-22T00:00:00
[ [ "Geryville", "Hichem", "", "LIESP" ], [ "Bouras", "Abdelaziz", "", "LIESP" ], [ "Ouzrout", "Yacine", "", "LIESP" ], [ "Sapidis", "Nikolaos", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0706.3170
Keigo Takeuchi
Keigo Takeuchi, Toshiyuki Tanaka, and Toru Yano
Asymptotic Analysis of General Multiuser Detectors in MIMO DS-CDMA Channels
Submitted to IEEE Journal on Selected Areas in Communications
null
10.1109/JSAC.2008.080407
null
cs.IT math.IT
null
We analyze a MIMO DS-CDMA channel with a general multiuser detector including a nonlinear multiuser detector, using the replica method. In the many-user, limit the MIMO DS-CDMA channel with the multiuser detector is decoupled into a bank of single-user SIMO Gaussian channels if a spatial spreading scheme is employed. On the other hand, it is decoupled into a bank of single-user MIMO Gaussian channels if a spatial spreading scheme is not employed. The spectral efficiency of the MIMO DS-CDMA channel with the spatial spreading scheme is comparable with that of the MIMO DS-CDMA channel using an optimal space-time block code without the spatial spreading scheme. In the case of the QPSK data modulation scheme the spectral efficiency of the MIMO DS-CDMA channel with the MMSE detector shows {\it waterfall} behavior and is very close to the corresponding sum capacity when the system load is just below the transition point of the {\it waterfall} behavior. Our result implies that the performance of a multiuser detector taking the data modulation scheme into consideration can be far superior to that of linear multiuser detectors.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 15:05:28 GMT" } ]
2016-11-17T00:00:00
[ [ "Takeuchi", "Keigo", "" ], [ "Tanaka", "Toshiyuki", "" ], [ "Yano", "Toru", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3188
Vladimir Vovk
Glenn Shafer and Vladimir Vovk
A tutorial on conformal prediction
58 pages, 9 figures
Journal of Machine Learning Research 9 (2008) 371-421. http://www.jmlr.org/papers/v9/shafer08a.html
null
null
cs.LG stat.ML
null
Conformal prediction uses past experience to determine precise levels of confidence in new predictions. Given an error probability $\epsilon$, together with a method that makes a prediction $\hat{y}$ of a label $y$, it produces a set of labels, typically containing $\hat{y}$, that also contains $y$ with probability $1-\epsilon$. Conformal prediction can be applied to any method for producing $\hat{y}$: a nearest-neighbor method, a support-vector machine, ridge regression, etc. Conformal prediction is designed for an on-line setting in which labels are predicted successively, each one being revealed before the next is predicted. The most novel and valuable feature of conformal prediction is that if the successive examples are sampled independently from the same distribution, then the successive predictions will be right $1-\epsilon$ of the time, even though they are based on an accumulating dataset rather than on independent datasets. In addition to the model under which successive examples are sampled independently, other on-line compression models can also use conformal prediction. The widely used Gaussian linear model is one of these. This tutorial presents a self-contained account of the theory of conformal prediction and works through several numerical examples. A more comprehensive treatment of the topic is provided in "Algorithmic Learning in a Random World", by Vladimir Vovk, Alex Gammerman, and Glenn Shafer (Springer, 2005).
[ { "version": "v1", "created": "Thu, 21 Jun 2007 16:40:06 GMT" } ]
2019-04-23T00:00:00
[ [ "Shafer", "Glenn", "" ], [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0706.3295
Beniamin Mounits Mr
Beniamin Mounits
Lower bounds on the minimum average distance of binary codes
19 pages
null
null
null
cs.IT math.CO math.IT
null
New lower bounds on the minimum average Hamming distance of binary codes are derived. The bounds are obtained using linear programming approach.
[ { "version": "v1", "created": "Fri, 22 Jun 2007 09:32:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Mounits", "Beniamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3305
Ayan Mahalanobis
Ayan Mahalanobis
A simple generalization of the ElGamal cryptosystem to non-abelian groups II
null
null
null
null
cs.CR math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a study of the MOR cryptosystem using the special linear group over finite fields. The automorphism group of the special linear group is analyzed for this purpose. At our current state of knowledge, I show that the MOR cryptosystem has better security than the ElGamal cryptosystem over finite fields.
[ { "version": "v1", "created": "Fri, 22 Jun 2007 10:28:28 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 16:41:57 GMT" }, { "version": "v3", "created": "Sat, 29 Dec 2007 21:36:10 GMT" }, { "version": "v4", "created": "Fri, 6 Mar 2009 19:09:55 GMT" }, { "version": "v5", "created": "Tue, 25 Jan 2011 04:57:52 GMT" } ]
2011-01-26T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
0706.3341
Christophe Fouquere
Christophe Fouquer\'e (LIPN)
A Sequent Calculus for Modelling Interferences
null
null
null
null
cs.LO
null
A logic calculus is presented that is a conservative extension of linear logic. The motivation beneath this work concerns lazy evaluation, true concurrency and interferences in proof search. The calculus includes two new connectives to deal with multisequent structures and has the cut-elimination property. Extensions are proposed that give first results concerning our objectives.
[ { "version": "v1", "created": "Fri, 22 Jun 2007 14:24:34 GMT" } ]
2007-06-25T00:00:00
[ [ "Fouqueré", "Christophe", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0706.3350
Veronika Rehn-Sonigo
Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes, LIP)
Optimal Replica Placement in Tree Networks with QoS and Bandwidth Constraints and the Closest Allocation Policy
null
null
null
null
cs.DC
null
This paper deals with the replica placement problem on fully homogeneous tree networks known as the Replica Placement optimization problem. The client requests are known beforehand, while the number and location of the servers are to be determined. We investigate the latter problem using the Closest access policy when adding QoS and bandwidth constraints. We propose an optimal algorithm in two passes using dynamic programming.
[ { "version": "v1", "created": "Fri, 22 Jun 2007 15:01:35 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 14:06:26 GMT" }, { "version": "v3", "created": "Thu, 28 Jun 2007 15:24:39 GMT" } ]
2007-06-28T00:00:00
[ [ "Rehn-Sonigo", "Veronika", "", "INRIA Rhône-Alpes, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0706.3412
Blai Bonet
Nerio Borges, Blai Bonet
On Canonical Forms of Complete Problems via First-order Projections
9 pages
null
null
null
cs.CC
null
The class of problems complete for NP via first-order reductions is known to be characterized by existential second-order sentences of a fixed form. All such sentences are built around the so-called generalized IS-form of the sentence that defines Independent-Set. This result can also be understood as that every sentence that defines a NP-complete problem P can be decomposed in two disjuncts such that the first one characterizes a fragment of P as hard as Independent-Set and the second the rest of P. That is, a decomposition that divides every such sentence into a quotient and residue modulo Independent-Set. In this paper, we show that this result can be generalized over a wide collection of complexity classes, including the so-called nice classes. Moreover, we show that such decomposition can be done for any complete problem with respect to the given class, and that two such decompositions are non-equivalent in general. Interestingly, our results are based on simple and well-known properties of first-order reductions.ow that this result can be generalized over a wide collection of complexity classes, including the so-called nice classes. Moreover, we show that such decomposition can be done for any complete problem with respect to the given class, and that two such decompositions are non-equivalent in general. Interestingly, our results are based on simple and well-known properties of first-order reductions.
[ { "version": "v1", "created": "Fri, 22 Jun 2007 21:27:06 GMT" } ]
2007-06-26T00:00:00
[ [ "Borges", "Nerio", "" ], [ "Bonet", "Blai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0706.3430
Caleb Lo
Caleb K. Lo, Robert W. Heath Jr. and Sriram Vishwanath
The Impact of Channel Feedback on Opportunistic Relay Selection for Hybrid-ARQ in Wireless Networks
30 pages, 9 figures, submitted to the IEEE Transactions on Vehicular Technology, revised March 2008
null
10.1109/TVT.2008.928896
null
cs.IT math.IT
null
This paper presents a decentralized relay selection protocol for a dense wireless network and describes channel feedback strategies that improve its performance. The proposed selection protocol supports hybrid automatic-repeat-request transmission where relays forward parity information to the destination in the event of a decoding error. Channel feedback is employed for refining the relay selection process and for selecting an appropriate transmission mode in a proposed adaptive modulation transmission framework. An approximation of the throughput of the proposed adaptive modulation strategy is presented, and the dependence of the throughput on system parameters such as the relay contention probability and the adaptive modulation switching point is illustrated via maximization of this approximation. Simulations show that the throughput of the proposed selection strategy is comparable to that yielded by a centralized selection approach that relies on geographic information.
[ { "version": "v1", "created": "Sat, 23 Jun 2007 06:19:41 GMT" }, { "version": "v2", "created": "Tue, 15 Jan 2008 21:15:03 GMT" }, { "version": "v3", "created": "Tue, 1 Apr 2008 00:02:32 GMT" } ]
2016-11-15T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Heath", "Robert W.", "Jr." ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0706.3459
Gabor Kun
Gabor Kun, Jaroslav Nesetril
NP by means of lifts and shadows
12 pages, conference (MFCS07) version of 0706.1704
null
null
null
cs.CC math.CO
null
We show that every NP problem is polynomially equivalent to a simple combinatorial problem: the membership problem for a special class of digraphs. These classes are defined by means of shadows (projections) and by finitely many forbidden colored (lifted) subgraphs. Our characterization is motivated by the analysis of syntactical subclasses with the full computational power of NP, which were first studied by Feder and Vardi. Our approach applies to many combinatorial problems and it induces the characterization of coloring problems (CSP) defined by means of shadows. This turns out to be related to homomorphism dualities. We prove that a class of digraphs (relational structures) defined by finitely many forbidden colored subgraphs (i.e. lifted substructures) is a CSP class if and only if all the the forbidden structures are homomorphically equivalent to trees. We show a surprising richness of coloring problems when restricted to most frequent graph classes. Using results of Ne\v{s}et\v{r}il and Ossona de Mendez for bounded expansion classes (which include bounded degree and proper minor closed classes) we prove that the restriction of every class defined as the shadow of finitely many colored subgraphs equals to the restriction of a coloring (CSP) class.
[ { "version": "v1", "created": "Sat, 23 Jun 2007 15:40:43 GMT" } ]
2007-06-27T00:00:00
[ [ "Kun", "Gabor", "" ], [ "Nesetril", "Jaroslav", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]