id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0706.1051 | Donald Sofge | Donald A. Sofge and David L. Elliott | Improved Neural Modeling of Real-World Systems Using Genetic Algorithm
Based Variable Selection | 4 pages | D. Sofge and D. Elliott, "Improved Neural Modeling of Real-World
Systems Using Genetic Algorithm Based Variable Selection," In Int'l Conf. on
Neural Networks and Brain (ICNN&B'98-Beijing), 1998 | null | null | cs.NE | null | Neural network models of real-world systems, such as industrial processes,
made from sensor data must often rely on incomplete data. System states may not
all be known, sensor data may be biased or noisy, and it is not often known
which sensor data may be useful for predictive modelling. Genetic algorithms
may be used to help to address this problem by determining the near optimal
subset of sensor variables most appropriate to produce good models. This paper
describes the use of genetic search to optimize variable selection to determine
inputs into the neural network model. We discuss genetic algorithm
implementation issues including data representation types and genetic operators
such as crossover and mutation. We present the use of this technique for neural
network modelling of a typical industrial application, a liquid fed ceramic
melter, and detail the results of the genetic search to optimize the neural
network model for this application.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 18:13:59 GMT"
}
] | 2007-06-08T00:00:00 | [
[
"Sofge",
"Donald A.",
""
],
[
"Elliott",
"David L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0706.1061 | Donald Sofge | Donald Sofge and Gerald Chiang | Design, Implementation, and Cooperative Coevolution of an Autonomous/
Teleoperated Control System for a Serpentine Robotic Manipulator | null | D. Sofge and G. Chiang, "Design, ... a Serpentine Automated Waste
Retrieval Manipulator," Amer. Nucl. Soc. 9th Top. Meeting on Robotics and
Remote Systems, 2001 | null | null | cs.NE cs.RO | null | Design, implementation, and machine learning issues associated with
developing a control system for a serpentine robotic manipulator are explored.
The controller developed provides autonomous control of the serpentine robotic
manipulatorduring operation of the manipulator within an enclosed environment
such as an underground storage tank. The controller algorithms make use of both
low-level joint angle control employing force/position feedback constraints,
and high-level coordinated control of end-effector positioning. This approach
has resulted in both high-level full robotic control and low-level telerobotic
control modes, and provides a high level of dexterity for the operator.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 19:27:12 GMT"
}
] | 2019-08-19T00:00:00 | [
[
"Sofge",
"Donald",
""
],
[
"Chiang",
"Gerald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0706.1063 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel | Small Worlds: Strong Clustering in Wireless Networks | To appear in: 1st International Workshop on Localized Algorithms and
Protocols for Wireless Sensor Networks (LOCALGOS 2007), 2007, IEEE Compuster
Society Press | null | null | null | cs.NI cs.DC cs.DS | null | Small-worlds represent efficient communication networks that obey two
distinguishing characteristics: a high clustering coefficient together with a
small characteristic path length. This paper focuses on an interesting paradox,
that removing links in a network can increase the overall clustering
coefficient. Reckful Roaming, as introduced in this paper, is a 2-localized
algorithm that takes advantage of this paradox in order to selectively remove
superfluous links, this way optimizing the clustering coefficient while still
retaining a sufficiently small characteristic path length.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 19:42:51 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jun 2007 05:36:04 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0706.1066 | Matthias Brust R. | Matthias R. Brust | Applying Test-Paradigms in a Generic Tutoring System Concept for
Web-based Learning | Information and Resource Management (IRMA 2003) | null | null | null | cs.CY | null | Realizing test scenarios through a tutoring system involve questions about
architecture and didactic methods in such a system. Observing the fact that
traditional tutoring systems normally are domain-static, this paper shows
investigations for a generic domain-independent tutoring system for utilizing
test scenarios in computer-based and web-based environments. Furthermore, test
paradigms are analyzed and it is presented an approach for realizing
functionality for applying test paradigms in the presented generic tutoring
system architecture by an XML-specified language.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 19:55:11 GMT"
}
] | 2007-06-08T00:00:00 | [
[
"Brust",
"Matthias R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0706.1080 | Matthias Brust R. | Matthias R. Brust, Adrian Andronache, Steffen Rothkugel | WACA: A Hierarchical Weighted Clustering Algorithm optimized for Mobile
Hybrid Networks | The Third International Conference on Wireless and Mobile
Communications 2007 | null | null | null | cs.DC cs.NI | null | Clustering techniques create hierarchal network structures, called clusters,
on an otherwise flat network. In a dynamic environment-in terms of node
mobility as well as in terms of steadily changing device parameters-the
clusterhead election process has to be re-invoked according to a suitable
update policy. Cluster re-organization causes additional message exchanges and
computational complexity and it execution has to be optimized. Our
investigations focus on the problem of minimizing clusterhead re-elections by
considering stability criteria. These criteria are based on topological
characteristics as well as on device parameters. This paper presents a weighted
clustering algorithm optimized to avoid needless clusterhead re-elections for
stable clusters in mobile ad-hoc networks. The proposed localized algorithm
deals with mobility, but does not require geographical, speed or distances
information.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 20:47:19 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Andronache",
"Adrian",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1084 | Adam D. Smith | Sofya Raskhodnikova and Dana Ron and Ronitt Rubinfeld and Adam Smith | Sublinear Algorithms for Approximating String Compressibility | To appear in the proceedings of RANDOM 2007 | null | null | null | cs.DS | null | We raise the question of approximating the compressibility of a string with
respect to a fixed compression scheme, in sublinear time. We study this
question in detail for two popular lossless compression schemes: run-length
encoding (RLE) and Lempel-Ziv (LZ), and present sublinear algorithms for
approximating compressibility with respect to both schemes. We also give
several lower bounds that show that our algorithms for both schemes cannot be
improved significantly.
Our investigation of LZ yields results whose interest goes beyond the initial
questions we set out to study. In particular, we prove combinatorial structural
lemmas that relate the compressibility of a string with respect to Lempel-Ziv
to the number of distinct short substrings contained in it. In addition, we
show that approximating the compressibility with respect to LZ is related to
approximating the support size of a distribution.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 02:58:28 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Raskhodnikova",
"Sofya",
""
],
[
"Ron",
"Dana",
""
],
[
"Rubinfeld",
"Ronitt",
""
],
[
"Smith",
"Adam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0706.1087 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel | On Anomalies in Annotation Systems | The Third International Workshop on E-learning and Mobile Learning on
Telecommunications (ELETE 2007) | null | null | null | cs.HC cs.CY | null | Today's computer-based annotation systems implement a wide range of
functionalities that often go beyond those available in traditional
paper-and-pencil annotations. Conceptually, annotation systems are based on
thoroughly investigated psycho-sociological and pedagogical learning theories.
They offer a huge diversity of annotation types that can be placed in textual
as well as in multimedia format. Additionally, annotations can be published or
shared with a group of interested parties via well-organized repositories.
Although highly sophisticated annotation systems exist both conceptually as
well as technologically, we still observe that their acceptance is somewhat
limited. In this paper, we argue that nowadays annotation systems suffer from
several fundamental problems that are inherent in the traditional
paper-and-pencil annotation paradigm. As a solution, we propose to shift the
annotation paradigm for the implementation of annotation system.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 21:23:40 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0706.1096 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel, Carlos H.C. Ribeiro | Inquiring the Potential of Evoking Small-World Properties for
Self-Organizing Communication Networks | null | Published in: Proceedings of 5th International Conference on
Networking (ICN 06), 2006, IEEE Computer Society Press | 10.1109/ICNICONSMCL.2006.124 | null | cs.NI | null | Mobile multi-hop ad hoc networks allow establishing local groups of
communicating devices in a self-organizing way. However, in a global setting
such networks fail to work properly due to network partitioning. Providing that
devices are capable of communicating both locally-e.g. using Wi-Fi or
Bluetooth-and additionally also with arbitrary remote devices-e.g. using
GSM/UMTS links-the objective is to find efficient ways of inter-linking
multiple network partitions. Tackling this problem of topology control, we
focus on the class of small-world networks that obey two distinguishing
characteristics: they have a strong local clustering while still retaining a
small average distance between two nodes. This paper reports on results gained
investigating the question if small-world properties are indicative for an
efficient link management in multiple multi-hop ad hoc network partitions.
| [
{
"version": "v1",
"created": "Thu, 7 Jun 2007 22:40:40 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jun 2007 05:34:49 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
],
[
"Ribeiro",
"Carlos H. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1118 | Samuel Mimram | Paul-Andr\'e Melli\`es (PPS), Samuel Mimram (PPS) | Asynchronous games: innocence without alternation | null | null | null | null | cs.LO | null | The notion of innocent strategy was introduced by Hyland and Ong in order to
capture the interactive behaviour of lambda-terms and PCF programs. An innocent
strategy is defined as an alternating strategy with partial memory, in which
the strategy plays according to its view. Extending the definition to
non-alternating strategies is problematic, because the traditional definition
of views is based on the hypothesis that Opponent and Proponent alternate
during the interaction. Here, we take advantage of the diagrammatic
reformulation of alternating innocence in asynchronous games, in order to
provide a tentative definition of innocence in non-alternating games. The task
is interesting, and far from easy. It requires the combination of true
concurrency and game semantics in a clean and organic way, clarifying the
relationship between asynchronous games and concurrent games in the sense of
Abramsky and Melli\`es. It also requires an interactive reformulation of the
usual acyclicity criterion of linear logic, as well as a directed variant, as a
scheduling criterion.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 06:56:31 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Melliès",
"Paul-André",
"",
"PPS"
],
[
"Mimram",
"Samuel",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.1119 | Stefan Stefanov Z | Stefan Z. Stefanov | Cointegration of the Daily Electric Power System Load and the Weather | 8 pages, extended version | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper makes a thermal predictive analysis of the electric power system
security for a day ahead. This predictive analysis is set as a thermal
computation of the expected security. This computation is obtained by
cointegrating the daily electric power systen load and the weather, by finding
the daily electric power system thermodynamics and by introducing tests for
this thermodynamics. The predictive analysis made shows the electricity
consumers' wisdom.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 07:04:24 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Jan 2011 11:53:45 GMT"
}
] | 2011-01-25T00:00:00 | [
[
"Stefanov",
"Stefan Z.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0706.1127 | Matthias Brust R. | Matthias R. Brust, Christian M. Adriano, Ivan M.L. Ricarte | Redesigning Computer-based Learning Environments: Evaluation as
Communication | International Conference on Education and Information Systems (EISTA
04), ISBN 980-6560-11-6 | null | null | null | cs.CY cs.HC | null | In the field of evaluation research, computer scientists live constantly upon
dilemmas and conflicting theories. As evaluation is differently perceived and
modeled among educational areas, it is not difficult to become trapped in
dilemmas, which reflects an epistemological weakness. Additionally, designing
and developing a computer-based learning scenario is not an easy task.
Advancing further, with end-users probing the system in realistic settings, is
even harder. Computer science research in evaluation faces an immense
challenge, having to cope with contributions from several conflicting and
controversial research fields. We believe that deep changes must be made in our
field if we are to advance beyond the CBT (computer-based training) learning
model and to build an adequate epistemology for this challenge. The first task
is to relocate our field by building upon recent results from philosophy,
psychology, social sciences, and engineering. In this article we locate
evaluation in respect to communication studies. Evaluation presupposes a
definition of goals to be reached, and we suggest that it is, by many means, a
silent communication between teacher and student, peers, and institutional
entities. If we accept that evaluation can be viewed as set of invisible rules
known by nobody, but somehow understood by everybody, we should add
anthropological inquiries to our research toolkit. The paper is organized
around some elements of the social communication and how they convey new
insights to evaluation research for computer and related scientists. We found
some technical limitations and offer discussions on how we relate to technology
at same time we establish expectancies and perceive others work.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 08:12:21 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Adriano",
"Christian M.",
""
],
[
"Ricarte",
"Ivan M. L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.1130 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel | A Communication Model for Adaptive Service Provisioning in Hybrid
Wireless Networks | WSEAS Transactions on Circuits and Systems 2004 | null | null | null | cs.NI cs.AR cs.CY cs.HC | null | Mobile entities with wireless links are able to form a mobile ad-hoc network.
Such an infrastructureless network does not have to be administrated. However,
self-organizing principles have to be applied to deal with upcoming problems,
e.g. information dissemination. These kinds of problems are not easy to tackle,
requiring complex algorithms. Moreover, the usefulness of pure ad-hoc networks
is arguably limited. Hence, enthusiasm for mobile ad-hoc networks, which could
eliminate the need for any fixed infrastructure, has been damped. The goal is
to overcome the limitations of pure ad-hoc networks by augmenting them with
instant Internet access, e.g. via integration of UMTS respectively GSM links.
However, this raises multiple questions at the technical as well as the
organizational level. Motivated by characteristics of small-world networks that
describe an efficient network even without central or organized design, this
paper proposes to combine mobile ad-hoc networks and infrastructured networks
to form hybrid wireless networks. One main objective is to investigate how this
approach can reduce the costs of a permanent backbone link and providing in the
same way the benefits of useful information from Internet connectivity or
service providers. For the purpose of bridging between the different types of
networks, an adequate middleware service is the focus of our investigation.
This paper shows our first steps forward to this middleware by introducing the
Injection Communication paradigm as principal concept.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 08:23:14 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.1137 | Thierry Poibeau | Amanda Bouffier (LIPN), Thierry Poibeau (LIPN) | Automatically Restructuring Practice Guidelines using the GEM DTD | null | Proceedings of Biomedical Natural Language Processing (BioNLP)
(2007) - | null | null | cs.AI | null | This paper describes a system capable of semi-automatically filling an XML
template from free texts in the clinical domain (practice guidelines). The XML
template includes semantic information not explicitly encoded in the text
(pairs of conditions and actions/recommendations). Therefore, there is a need
to compute the exact scope of conditions over text sequences expressing the
required actions. We present a system developed for this task. We show that it
yields good performance when applied to the analysis of French practice
guidelines.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 15:39:49 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Bouffier",
"Amanda",
"",
"LIPN"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.1141 | Matthias Brust R. | Adrian Andronache, Matthias R. Brust, Steffen Rothkugel | Multimedia Content Distribution in Hybrid Wireless Networks using
Weighted Clustering | 2nd ACM Workshop on Wireless Multimedia Networking and Performance
Modeling 2006 (ISBN 1-59593-485) | null | null | null | cs.MM cs.NI | null | Fixed infrastructured networks naturally support centralized approaches for
group management and information provisioning. Contrary to infrastructured
networks, in multi-hop ad-hoc networks each node acts as a router as well as
sender and receiver. Some applications, however, requires hierarchical
arrangements that-for practical reasons-has to be done locally and
self-organized. An additional challenge is to deal with mobility that causes
permanent network partitioning and re-organizations. Technically, these
problems can be tackled by providing additional uplinks to a backbone network,
which can be used to access resources in the Internet as well as to inter-link
multiple ad-hoc network partitions, creating a hybrid wireless network. In this
paper, we present a prototypically implemented hybrid wireless network system
optimized for multimedia content distribution. To efficiently manage the ad-hoc
communicating devices a weighted clustering algorithm is introduced. The
proposed localized algorithm deals with mobility, but does not require
geographical information or distances.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 09:31:46 GMT"
}
] | 2012-01-16T00:00:00 | [
[
"Andronache",
"Adrian",
""
],
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1142 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel | Localized Support for Injection Point Election in Hybrid Networks | The Sixth International Conference on Networking (ICN 2007) | null | null | null | cs.DC cs.NI | null | Ad-hoc networks, a promising trend in wireless technology, fail to work
properly in a global setting. In most cases, self-organization and cost-free
local communication cannot compensate the need for being connected, gathering
urgent information just-in-time. Equipping mobile devices additionally with GSM
or UMTS adapters in order to communicate with arbitrary remote devices or even
a fixed network infrastructure provides an opportunity. Devices that operate as
intermediate nodes between the ad-hoc network and a reliable backbone network
are potential injection points. They allow disseminating received information
within the local neighborhood. The effectiveness of different devices to serve
as injection point differs substantially. For practical reasons the
determination of injection points should be done locally, within the ad-hoc
network partitions. We analyze different localized algorithms using at most
2-hop neighboring information. Results show that devices selected this way
spread information more efficiently through the ad-hoc network. Our results can
also be applied in order to support the election process for clusterheads in
the field of clustering mechanisms.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 09:36:41 GMT"
}
] | 2007-06-12T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1151 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel | A taxonomic Approach to Topology Control in Ad-hoc and Wireless Networks | The Sixth International Conference on Networking, ICN 2007 | null | null | null | cs.NI cs.DC | null | Topology Control (TC) aims at tuning the topology of highly dynamic networks
to provide better control over network resources and to increase the efficiency
of communication. Recently, many TC protocols have been proposed. The protocols
are designed for preserving connectivity, minimizing energy consumption,
maximizing the overall network coverage or network capacity. Each TC protocol
makes different assumptions about the network topology, environment detection
resources, and control capacities. This circumstance makes it extremely
difficult to comprehend the role and purpose of each protocol. To tackle this
situation, a taxonomy for TC protocols is presented throughout this paper.
Additionally, some TC protocols are classified based upon this taxonomy.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 10:20:29 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.1162 | Hichem Geryville | Hichem Geryville (LIESP), Yacine Ouzrout (LIESP), Abdelaziz Bouras
(LIESP), Nikolaos Sapidis | The multiple viewpoints as approach to information retrieval within
collaborative development context | null | Dans Information and Communication Technologies International
Symposium - Information and Communication Technologies International
Symposium (Proceedings of IEEE), Fez : Maroc (2007) | null | null | cs.HC | null | Nowadays, to achieve competitive advantage, the industrial companies are
considering that success is sustained to great product development. That is to
manage the product throughout its entire lifecycle. Achieving this goal
requires a tight collaboration between actors from a wide variety of domains,
using different software tools producing various product data types and
formats. The actors' collaboration is mainly based on the exchange /share
product information. The representation of the actors' viewpoints is the
underlying requirement of the collaborative product development. The multiple
viewpoints approach was designed to provide an organizational framework
following the actors' perspectives in the collaboration, and their
relationships. The approach acknowledges the inevitability of multiple
integration of product information as different views, promotes gathering of
actors' interest, and encourages retrieved adequate information while providing
support for integration through PLM and/or SCM collaboration. In this paper, a
multiple viewpoints representation is proposed. The product, process,
organization information models are discussed. A series of issues referring to
the viewpoints representation are discussed in detail. Based on XML standard,
taking electrical connector as an example, an application case of part of
product information modeling is stated.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 11:29:24 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Geryville",
"Hichem",
"",
"LIESP"
],
[
"Ouzrout",
"Yacine",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
],
[
"Sapidis",
"Nikolaos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.1169 | Aris L. Moustakas | Ralf R. Mueller, Dongning Guo, and Aris L. Moustakas | Vector Precoding for Wireless MIMO Systems: A Replica Analysis | 21 pages, 8 figures, submitted for publication to "IEEE JSAC Special
Issue on Multiuser Detection for Advanced Communication Systems and Networks" | null | 10.1109/JSAC.2008.080411 | null | cs.IT cond-mat.stat-mech math.IT | null | We apply the replica method to analyze vector precoding, a method to reduce
transmit power in antenna array communications. The analysis applies to a very
general class of channel matrices. The statistics of the channel matrix enter
the transmitted energy per symbol via its R-transform. We find that vector
precoding performs much better for complex than for real alphabets. As a
byproduct, we find a nonlinear precoding method with polynomial complexity that
outperforms NP-hard Tomlinson-Harashima precoding for binary modulation on
complex channels if the number of transmit antennas is slightly larger than
twice the number of receive antennas.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 12:21:04 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Mueller",
"Ralf R.",
""
],
[
"Guo",
"Dongning",
""
],
[
"Moustakas",
"Aris L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.1179 | Hichem Geryville | Hichem Geryville (LIESP), Abdelaziz Bouras (LIESP), Yacine Ouzrout
(LIESP), Nikolaos Sapidis | Collaborative product and process model: Multiple Viewpoints approach | 391-398 | Innovative Products and Services through Collaborative Networks
(2006) 542 | 10.1000/ISBN0-85358-228-9 | null | cs.OH cs.IR | null | The design and development of complex products invariably involves many
actors who have different points of view on the problem they are addressing,
the product being developed, and the process by which it is being developed.
The actors' viewpoints approach was designed to provide an organisational
framework in which these different perspectives or points of views, and their
relationships, could be explicitly gathered and formatted (by actor activity's
focus). The approach acknowledges the inevitability of multiple interpretation
of product information as different views, promotes gathering of actors'
interests, and encourages retrieved adequate information while providing
support for integration through PLM and/or SCM collaboration. In this paper, we
present our multiple viewpoints approach, and we illustrate it by an industrial
example on cyclone vessel product.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 13:09:13 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Geryville",
"Hichem",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
],
[
"Ouzrout",
"Yacine",
"",
"LIESP"
],
[
"Sapidis",
"Nikolaos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0706.1201 | Matthias Brust R. | Jose Eduardo M. Lobo, Jorge Luis Risco Becerra, Matthias R. Brust,
Steffen Rothkugel, Christian M. Adriano | Developing a Collaborative and Autonomous Training and Learning
Environment for Hybrid Wireless Networks | Global Congress on Engineering and Technology Education (GCETE 2005) | null | null | null | cs.CY cs.HC cs.NI | null | With larger memory capacities and the ability to link into wireless networks,
more and more students uses palmtop and handheld computers for learning
activities. However, existing software for Web-based learning is not
well-suited for such mobile devices, both due to constrained user interfaces as
well as communication effort required. A new generation of applications for the
learning domain that is explicitly designed to work on these kinds of small
mobile devices has to be developed. For this purpose, we introduce CARLA, a
cooperative learning system that is designed to act in hybrid wireless
networks. As a cooperative environment, CARLA aims at disseminating teaching
material, notes, and even components of itself through both fixed and mobile
networks to interested nodes. Due to the mobility of nodes, CARLA deals with
upcoming problems such as network partitions and synchronization of teaching
material, resource dependencies, and time constraints.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2007 16:38:32 GMT"
}
] | 2007-06-11T00:00:00 | [
[
"Lobo",
"Jose Eduardo M.",
""
],
[
"Becerra",
"Jorge Luis Risco",
""
],
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
],
[
"Adriano",
"Christian M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1290 | Sylviane Schwer | Sylviane R. Schwer (LIPN) | Temporal Reasoning without Transitive Tables | rapport interne | null | null | null | cs.AI | null | Representing and reasoning about qualitative temporal information is an
essential part of many artificial intelligence tasks. Lots of models have been
proposed in the litterature for representing such temporal information. All
derive from a point-based or an interval-based framework. One fundamental
reasoning task that arises in applications of these frameworks is given by the
following scheme: given possibly indefinite and incomplete knowledge of the
binary relationships between some temporal objects, find the consistent
scenarii between all these objects. All these models require transitive tables
-- or similarly inference rules-- for solving such tasks. We have defined an
alternative model, S-languages - to represent qualitative temporal information,
based on the only two relations of \emph{precedence} and \emph{simultaneity}.
In this paper, we show how this model enables to avoid transitive tables or
inference rules to handle this kind of problem.
| [
{
"version": "v1",
"created": "Sat, 9 Jun 2007 06:57:05 GMT"
}
] | 2007-06-12T00:00:00 | [
[
"Schwer",
"Sylviane R.",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0706.1318 | John Tomlin | S. Sathiya Keerthi and John A. Tomlin | Constructing a maximum utility slate of on-line advertisements | null | null | null | YR-2007-001 | cs.DM cs.DS | null | We present an algorithm for constructing an optimal slate of sponsored search
advertisements which respects the ordering that is the outcome of a generalized
second price auction, but which must also accommodate complicating factors such
as overall budget constraints. The algorithm is easily fast enough to use on
the fly for typical problem sizes, or as a subroutine in an overall
optimization.
| [
{
"version": "v1",
"created": "Sat, 9 Jun 2007 16:18:45 GMT"
}
] | 2007-06-12T00:00:00 | [
[
"Keerthi",
"S. Sathiya",
""
],
[
"Tomlin",
"John A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0706.1395 | Hulya Seferoglu | Hulya Seferoglu, Athina Markopoulou | Opportunistic Network Coding for Video Streaming over Wireless | 11 pages, 8 figures (14 subfigures) | null | null | null | cs.NI | null | In this paper, we study video streaming over wireless networks with network
coding capabilities. We build upon recent work, which demonstrated that network
coding can increase throughput over a broadcast medium, by mixing packets from
different flows into a single packet, thus increasing the information content
per transmission. Our key insight is that, when the transmitted flows are video
streams, network codes should be selected so as to maximize not only the
network throughput but also the video quality. We propose video-aware
opportunistic network coding schemes that take into account both (i) the
decodability of network codes by several receivers and (ii) the importance and
deadlines of video packets. Simulation results show that our schemes
significantly improve both video quality and throughput.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 17:33:25 GMT"
}
] | 2007-06-12T00:00:00 | [
[
"Seferoglu",
"Hulya",
""
],
[
"Markopoulou",
"Athina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1399 | Viveck Cadambe | Viveck R. Cadambe and Syed A. Jafar | Duality and Stability Regions of Multi-rate Broadcast and Multiple
Access Networks | 12 pages, 11 figures, submitted to IEEE Trans. Information Theory for
review | null | null | null | cs.IT math.IT | null | We characterize stability regions of two-user fading Gaussian multiple access
(MAC) and broadcast (BC) networks with centralized scheduling. The data to be
transmitted to the users is encoded into codewords of fixed length. The rates
of the codewords used are restricted to a fixed set of finite cardinality. With
successive decoding and interference cancellation at the receivers, we find the
set of arrival rates that can be stabilized over the MAC and BC networks. In
MAC and BC networks with average power constraints, we observe that the duality
property that relates the MAC and BC information theoretic capacity regions
extend to their stability regions as well. In MAC and BC networks with peak
power constraints, the union of stability regions of dual MAC networks is found
to be strictly contained in the BC stability region.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 04:43:13 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Cadambe",
"Viveck R.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.1402 | Matthias Brust R. | Matthias R. Brust, Steffen Rothkugel | Analyzing Design Process and Experiments on the AnITA Generic Tutoring
System | Published in: Proceedings of International Conference on Education
and Information Systems (EISTA 04), 2004, ISBN 980-6560-11-6 | null | null | null | cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the field of tutoring systems, investigations have shown that there are
many tutoring systems specific to a specific domain that, because of their
static architecture, cannot be adapted to other domains. As consequence, often
neither methods nor knowledge can be reused. In addition, the knowledge
engineer must have programming skills in order to enhance and evaluate the
system. One particular challenge is to tackle these problems with the
development of a generic tutoring system. AnITA, as a stand-alone application,
has been developed and implemented particularly for this purpose. However, in
the testing phase, we discovered that this architecture did not fully match the
user's intuitive understanding of the use of a learning tool. Therefore, AnITA
has been redesigned to exclusively work as a client/server application and
renamed to AnITA2. This paper discusses the evolvements made on the AnITA
tutoring system, the goal of which is to use generic principles for system
re-use in any domain. Two experiments were conducted, and the results are
presented in this paper.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 06:09:25 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jun 2018 19:54:33 GMT"
}
] | 2018-06-14T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.1409 | Bruno Salvy | Jonathan M. Borwein, Bruno Salvy (INRIA Rocquencourt) | A Proof of a Recursion for Bessel Moments | null | null | 10.1080/10586458.2008.10129032 | null | cs.SC math.CA | null | We provide a proof of a conjecture in (Bailey, Borwein, Borwein, Crandall
2007) on the existence and form of linear recursions for moments of powers of
the Bessel function $K_0$.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 06:45:39 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Apr 2008 14:52:49 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Borwein",
"Jonathan M.",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
0706.1410 | Marc Schoenauer | Francis Sourd (CMAP), Marc Schoenauer (CMAP) | Evolutionary Mesh Numbering: Preliminary Results | null | Dans Adaptive Computing in Design and Manufacture, ACDM'98 (1998)
137-150 | null | null | cs.NA cs.NE math.NA math.OC | null | Mesh numbering is a critical issue in Finite Element Methods, as the
computational cost of one analysis is highly dependent on the order of the
nodes of the mesh. This paper presents some preliminary investigations on the
problem of mesh numbering using Evolutionary Algorithms. Three conclusions can
be drawn from these experiments. First, the results of the up-to-date method
used in all FEM softwares (Gibb's method) can be consistently improved; second,
none of the crossover operators tried so far (either general or problem
specific) proved useful; third, though the general tendency in Evolutionary
Computation seems to be the hybridization with other methods (deterministic or
heuristic), none of the presented attempt did encounter any success yet. The
good news, however, is that this algorithm allows an improvement over the
standard heuristic method between 12% and 20% for both the 1545 and 5453-nodes
meshes used as test-bed. Finally, some strange interaction between the
selection scheme and the use of problem specific mutation operator was
observed, which appeals for further investigation.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 12:17:19 GMT"
}
] | 2007-06-12T00:00:00 | [
[
"Sourd",
"Francis",
"",
"CMAP"
],
[
"Schoenauer",
"Marc",
"",
"CMAP"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0706.1456 | Benoit Caillaud | Albert Benveniste (IRISA), Benoit Caillaud (IRISA), Roberto Passerone | A Generic Model of Contracts for Embedded Systems | null | null | null | null | cs.SE | null | We present the mathematical foundations of the contract-based model developed
in the framework of the SPEEDS project. SPEEDS aims at developing methods and
tools to support "speculative design", a design methodology in which
distributed designers develop different aspects of the overall system, in a
concurrent but controlled way. Our generic mathematical model of contract
supports this style of development. This is achieved by focusing on behaviors,
by supporting the notion of "rich component" where diverse (functional and
non-functional) aspects of the system can be considered and combined, by
representing rich components via their set of associated contracts, and by
formalizing the whole process of component composition.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 12:22:15 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Jun 2007 09:16:32 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Benveniste",
"Albert",
"",
"IRISA"
],
[
"Caillaud",
"Benoit",
"",
"IRISA"
],
[
"Passerone",
"Roberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0706.1477 | Sylvain Perifel | Pascal Koiran (LIP), Sylvain Perifel (LIP) | VPSPACE and a transfer theorem over the complex field | 14 pages | null | null | null | cs.CC | null | We extend the transfer theorem of [KP2007] to the complex field. That is, we
investigate the links between the class VPSPACE of families of polynomials and
the Blum-Shub-Smale model of computation over C. Roughly speaking, a family of
polynomials is in VPSPACE if its coefficients can be computed in polynomial
space. Our main result is that if (uniform, constant-free) VPSPACE families can
be evaluated efficiently then the class PAR of decision problems that can be
solved in parallel polynomial time over the complex field collapses to P. As a
result, one must first be able to show that there are VPSPACE families which
are hard to evaluate in order to separate P from NP over C, or even from PAR.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 13:59:31 GMT"
}
] | 2007-06-12T00:00:00 | [
[
"Koiran",
"Pascal",
"",
"LIP"
],
[
"Perifel",
"Sylvain",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0706.1563 | Natalia Osipova | Konstantin Avrachenkov (INRIA Sophia Antipolis), Patrick Brown (FT
R&D), Natalia Osipova (INRIA Sophia Antipolis) | Optimal Choice of Threshold in Two Level Processor Sharing | null | null | null | null | cs.NI | null | We analyze the Two Level Processor Sharing (TLPS) scheduling discipline with
the hyper-exponential job size distribution and with the Poisson arrival
process. TLPS is a convenient model to study the benefit of the file size based
differentiation in TCP/IP networks. In the case of the hyper-exponential job
size distribution with two phases, we find a closed form analytic expression
for the expected sojourn time and an approximation for the optimal value of the
threshold that minimizes the expected sojourn time. In the case of the
hyper-exponential job size distribution with more than two phases, we derive a
tight upper bound for the expected sojourn time conditioned on the job size. We
show that when the variance of the job size distribution increases, the gain in
system performance increases and the sensitivity to the choice of the threshold
near its optimal value decreases.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 12:21:53 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Jun 2007 09:45:28 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Avrachenkov",
"Konstantin",
"",
"INRIA Sophia Antipolis"
],
[
"Brown",
"Patrick",
"",
"FT\n R&D"
],
[
"Osipova",
"Natalia",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1588 | Animashree Anandkumar | Animashree Anandkumar, Lang Tong, Ananthram Swami | Detection of Gauss-Markov Random Fields with Nearest-Neighbor Dependency | Information Theory, IEEE Transactions | vol. 55, no. 2, Feb. 2009 | 10.1109/TIT.2008.2009855 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of hypothesis testing against independence for a Gauss-Markov
random field (GMRF) is analyzed. Assuming an acyclic dependency graph, an
expression for the log-likelihood ratio of detection is derived. Assuming
random placement of nodes over a large region according to the Poisson or
uniform distribution and nearest-neighbor dependency graph, the error exponent
of the Neyman-Pearson detector is derived using large-deviations theory. The
error exponent is expressed as a dependency-graph functional and the limit is
evaluated through a special law of large numbers for stabilizing graph
functionals. The exponent is analyzed for different values of the variance
ratio and correlation. It is found that a more correlated GMRF has a higher
exponent at low values of the variance ratio whereas the situation is reversed
at high values of the variance ratio.
| [
{
"version": "v1",
"created": "Mon, 11 Jun 2007 22:28:21 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jun 2010 23:05:36 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Anandkumar",
"Animashree",
""
],
[
"Tong",
"Lang",
""
],
[
"Swami",
"Ananthram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.1614 | Corinne Touati | Arnaud Legrand (INRIA Rh\^one-Alpes / Id-Imag, Lig), Corinne Touati
(INRIA Rh\^one-Alpes / Id-Imag, Lig) | Non-Cooperative Scheduling of Multiple Bag-of-Task Applications | null | Dans INFOCOM (2007) | null | null | cs.DC cs.GT | null | Multiple applications that execute concurrently on heterogeneous platforms
compete for CPU and network resources. In this paper we analyze the behavior of
$K$ non-cooperative schedulers using the optimal strategy that maximize their
efficiency while fairness is ensured at a system level ignoring applications
characteristics. We limit our study to simple single-level master-worker
platforms and to the case where each scheduler is in charge of a single
application consisting of a large number of independent tasks. The tasks of a
given application all have the same computation and communication requirements,
but these requirements can vary from one application to another. In this
context, we assume that each scheduler aims at maximizing its throughput. We
give closed-form formula of the equilibrium reached by such a system and study
its performance. We characterize the situations where this Nash equilibrium is
optimal (in the Pareto sense) and show that even though no catastrophic
situation (Braess-like paradox) can occur, such an equilibrium can be
arbitrarily bad for any classical performance measure.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 06:39:33 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Legrand",
"Arnaud",
"",
"INRIA Rhône-Alpes / Id-Imag, Lig"
],
[
"Touati",
"Corinne",
"",
"INRIA Rhône-Alpes / Id-Imag, Lig"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0706.1617 | Krzysztof R. Apt | Krzysztof R. Apt | Relative Strength of Strategy Elimination Procedures | 8 pages | Economics Bulletin, Vol. 3, no. 21, pp. 1-9 (2007) | null | null | cs.GT | null | We compare here the relative strength of four widely used procedures on
finite strategic games: iterated elimination of weakly/strictly dominated
strategies by a pure/mixed strategy. A complication is that none of these
procedures is based on a monotonic operator. To deal with this problem we use
'global' versions of these operators.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 07:02:13 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0706.1642 | Vlady Ravelomanana | Anne-Elisabeth Baert (LaRIA), Vlady Ravelomanana (LIPN), Lo\"ys
Thimonier (LaRIA) | On the growth of components with non fixed excesses | A small note on the evolution of giant components | Discrete Applied Mathematics 130, 3 (17/07/2003) 487--493 | 10.1016/S0166-218X(03)00326-3 | null | cs.DM math.CO | null | Denote by an $l$-component a connected graph with $l$ edges more than
vertices. We prove that the expected number of creations of $(l+1)$-component,
by means of adding a new edge to an $l$-component in a randomly growing graph
with $n$ vertices, tends to 1 as $l,n$ tends to $\infty$ but with $l =
o(n^{1/4})$. We also show, under the same conditions on $l$ and $n$, that the
expected number of vertices that ever belong to an $l$-component is $\sim
(12l)^{1/3} n^{2/3}$.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 09:32:34 GMT"
}
] | 2007-06-14T00:00:00 | [
[
"Baert",
"Anne-Elisabeth",
"",
"LaRIA"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Thimonier",
"Loÿs",
"",
"LaRIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0706.1665 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN) | Another Proof of Wright's Inequalities | null | null | null | null | cs.DM math.CO | null | We present a short way of proving the inequalities obtained by Wright in
[Journal of Graph Theory, 4: 393 - 407 (1980)] concerning the number of
connected graphs with $\ell$ edges more than vertices.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 11:42:56 GMT"
}
] | 2007-06-14T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0706.1692 | Cyrille Chavet | Cyrille Chavet (LESTER, STM), Philippe Coussy (LESTER), Pascal Urard
(STM), Eric Martin (LESTER) | A Methodology for Efficient Space-Time Adapter Design Space Exploration:
A Case Study of an Ultra Wide Band Interleaver | ISBN:1-4244-0921-7 | Proceedings of the IEEE International Symposium on Circuits and
Systems (ISCAS) (28/05/2007) 2946 | null | null | cs.AR | null | This paper presents a solution to efficiently explore the design space of
communication adapters. In most digital signal processing (DSP) applications,
the overall architecture of the system is significantly affected by
communication architecture, so the designers need specifically optimized
adapters. By explicitly modeling these communications within an effective
graph-theoretic model and analysis framework, we automatically generate an
optimized architecture, named Space-Time AdapteR (STAR). Our design flow inputs
a C description of Input/Output data scheduling, and user requirements
(throughput, latency, parallelism...), and formalizes communication constraints
through a Resource Constraints Graph (RCG). The RCG properties enable an
efficient architecture space exploration in order to synthesize a STAR
component. The proposed approach has been tested to design an industrial data
mixing block example: an Ultra-Wideband interleaver.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 13:45:50 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Chavet",
"Cyrille",
"",
"LESTER, STM"
],
[
"Coussy",
"Philippe",
"",
"LESTER"
],
[
"Urard",
"Pascal",
"",
"STM"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0706.1700 | Guilhem Coq | Guilhem Coq (1), Olivier Alata (2), Marc Arnaudon (1), Christian
Olivier (2) ((1) Laboratoire de Math\'ematiques et Applications Poitiers
France, (2) Laboratoire Signal Image et Communications Poitiers France) | Information Criteria and Arithmetic Codings : An Illustration on Raw
Images | 5 pages, 6 figures, First published in Proceedings og the 15th
European Signal processing Conference EUSIPCO 2007 in 2007, published by
EURASIP | null | null | null | cs.IT math.IT | null | In this paper we give a short theoretical description of the general
predictive adaptive arithmetic coding technique. The links between this
technique and the works of J. Rissanen in the 80's, in particular the BIC
information criterion used in parametrical model selection problems, are
established. We also design lossless and lossy coding techniques of images. The
lossless technique uses a mix between fixed-length coding and arithmetic coding
and provides better compression results than those separate methods. That
technique is also seen to have an interesting application in the domain of
statistics since it gives a data-driven procedure for the non-parametrical
histogram selection problem. The lossy technique uses only predictive adaptive
arithmetic codes and shows how a good choice of the order of prediction might
lead to better results in terms of compression. We illustrate those coding
techniques on a raw grayscale image.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 14:09:09 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Coq",
"Guilhem",
""
],
[
"Alata",
"Olivier",
""
],
[
"Arnaudon",
"Marc",
""
],
[
"Olivier",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.1716 | Hassane. Alla | Lat\'efa Ghomri (GIPSA-lab), Hassane Alla (GIPSA-lab) | Modeling and analysis using hybrid Petri nets | null | Nonlinear Analysis: Hybrid Systems Volume 1, Issue 2 (01/06/2007)
Pages 141-153 | null | null | cs.IT math.IT | null | This paper is devoted to the use of hybrid Petri nets (PNs) for modeling and
control of hybrid dynamic systems (HDS). Modeling, analysis and control of HDS
attract ever more of researchers' attention and several works have been devoted
to these topics. We consider in this paper the extensions of the PN formalism
(initially conceived for modeling and analysis of discrete event systems) in
the direction of hybrid modeling. We present, first, the continuous PN models.
These models are obtained from discrete PNs by the fluidification of the
markings. They constitute the first steps in the extension of PNs toward hybrid
modeling. Then, we present two hybrid PN models, which differ in the class of
HDS they can deal with. The first one is used for deterministic HDS modeling,
whereas the second one can deal with HDS with nondeterministic behavior.
Keywords: Hybrid dynamic systems; D-elementary hybrid Petri nets; Hybrid
automata; Controller synthesis
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 14:58:17 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Ghomri",
"Latéfa",
"",
"GIPSA-lab"
],
[
"Alla",
"Hassane",
"",
"GIPSA-lab"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.1751 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | MacWilliams Identity for Codes with the Rank Metric | 25 pages, submitted to EURASIP Journal on Wireless Communications | null | null | null | cs.IT math.IT | null | The MacWilliams identity, which relates the weight distribution of a code to
the weight distribution of its dual code, is useful in determining the weight
distribution of codes. In this paper, we derive the MacWilliams identity for
linear codes with the rank metric, and our identity has a different form than
that by Delsarte. Using our MacWilliams identity, we also derive related
identities for rank metric codes. These identities parallel the binomial and
power moment identities derived for codes with the Hamming metric.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 17:38:47 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jul 2007 17:56:07 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Nov 2007 03:36:59 GMT"
}
] | 2007-11-28T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.1755 | Kirill Bolshakov | Kirill Bolshakov (1), Elena Reshetova (1) ((1) Saint-Petersburg State
University of Aerospace Instrumentation) | FreeBSD Mandatory Access Control Usage for Implementing Enterprise
Security Policies | 6 pages, 3 figures, submitted to XI International Symposium "Problems
of redundancy in information and control systems" | null | null | null | cs.CR | null | FreeBSD was one of the first widely deployed free operating systems to
provide mandatory access control. It supports a number of classic MAC models.
This tutorial paper addresses exploiting this implementation to enforce typical
enterprise security policies of varying complexities.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 18:11:15 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Bolshakov",
"Kirill",
""
],
[
"Reshetova",
"Elena",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.1780 | Marie-France Ango-Obiang | Marie-France Ango-Obiang (SITE, Loria) | Le travail collaboratif dans le cadre d'un projet architectural | null | Dans Innovation et tradition de l'association internationale
Management Strat\'egique (2007) | null | null | cs.HC | null | The analysis of the practices and the tendencies of the users at the time of
the search for information on Internet makes it possible to highlight several
points. The search for information becomes powerful after knowledge of the
typology of the various systems of research. This typology supports the
adoption of a methodology of research which one can characterize by pull
systems, intelligent agents, etc. In addition, the importance of the structure
of the electronic document, correctly elaborated in advance, will support a
higher relevance ratio to find information. In our article, the problems turn
around the study of the behavior of the users in situation of search for
information, as well as the constitution of a pole of documentary resources
within a framework of an architectural project. It is noted that the evolution
of the documentary resources is related to information technologies.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 20:06:38 GMT"
}
] | 2007-06-14T00:00:00 | [
[
"Ango-Obiang",
"Marie-France",
"",
"SITE, Loria"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.1790 | Corinne Touati | Arnaud Legrand (INRIA Rh\^one-Alpes / ID-IMAG), Corinne Touati (INRIA
Rh\^one-Alpes / ID-IMAG) | How to measure efficiency? | null | null | null | null | cs.GT | null | In the context of applied game theory in networking environments, a number of
concepts have been proposed to measure both efficiency and optimality of
resource allocations, the most famous certainly being the price of anarchy and
the Jain index. Yet, very few have tried to question these measures and compare
them one to another, in a general framework, which is the aim of the present
article.
| [
{
"version": "v1",
"created": "Tue, 12 Jun 2007 12:25:54 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Jun 2007 16:38:19 GMT"
}
] | 2007-06-14T00:00:00 | [
[
"Legrand",
"Arnaud",
"",
"INRIA Rhône-Alpes / ID-IMAG"
],
[
"Touati",
"Corinne",
"",
"INRIA\n Rhône-Alpes / ID-IMAG"
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0706.1860 | Jordi Cucurull | Jordi Cucurull, Ramon Marti, Sergi Robles, Joan Borrell, Guillermo
Navarro | FIPA-based Interoperable Agent Mobility Proposal | 10 pages, agent migration architecture proposal | null | null | null | cs.MA cs.NI | null | This paper presents a proposal for a flexible agent mobility architecture
based on IEEE-FIPA standards and intended to be one of them. This proposal is a
first step towards interoperable mobility mechanisms, which are needed for
future agent migration between different kinds of platforms. Our proposal is
presented as a flexible and robust architecture that has been successfully
implemented in the JADE and AgentScape platforms. It is based on an open set of
protocols, allowing new protocols and future improvements to be accommodated in
the architecture. With this proposal we demonstrate that a standard
architecture for agent mobility capable of supporting several agent platforms
can be defined and implemented.
| [
{
"version": "v1",
"created": "Wed, 13 Jun 2007 14:37:58 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Aug 2007 10:57:01 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Cucurull",
"Jordi",
""
],
[
"Marti",
"Ramon",
""
],
[
"Robles",
"Sergi",
""
],
[
"Borrell",
"Joan",
""
],
[
"Navarro",
"Guillermo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.1926 | Michele Bezzi | Michele Bezzi, Robin Groenevelt | Towards understanding and modelling office daily life | 5 pages, ECHISE 2006 - 2nd International Workshop on Exploiting
Context Histories in Smart Environments - Infrastructures and Design, 8th
International Conference of Ubiquitous Computing (Ubicomp 2006), Orange
County, CA, 17-21 September 2006 | null | null | null | cs.CV cs.CY | null | Measuring and modeling human behavior is a very complex task. In this paper
we present our initial thoughts on modeling and automatic recognition of some
human activities in an office. We argue that to successfully model human
activities, we need to consider both individual behavior and group dynamics. To
demonstrate these theoretical approaches, we introduce an experimental system
for analyzing everyday activity in our office.
| [
{
"version": "v1",
"created": "Wed, 13 Jun 2007 15:15:00 GMT"
}
] | 2007-06-14T00:00:00 | [
[
"Bezzi",
"Michele",
""
],
[
"Groenevelt",
"Robin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0706.2010 | Anne Broadbent | Anne Broadbent and Alain Tapp | Information-theoretic security without an honest majority | 15 pages, to appear in Proceedings of ASIACRYPT 2007 | Proceedings of ASIACRYPT 2007 pp. 410-426 | 10.1007/978-3-540-76900-2_25 | null | cs.CR | null | We present six multiparty protocols with information-theoretic security that
tolerate an arbitrary number of corrupt participants. All protocols assume
pairwise authentic private channels and a broadcast channel (in a single case,
we require a simultaneous broadcast channel). We give protocols for veto, vote,
anonymous bit transmission, collision detection, notification and anonymous
message transmission. Not assuming an honest majority, in most cases, a single
corrupt participant can make the protocol abort. All protocols achieve
functionality never obtained before without the use of either computational
assumptions or of an honest majority.
| [
{
"version": "v1",
"created": "Wed, 13 Jun 2007 23:05:40 GMT"
}
] | 2016-01-06T00:00:00 | [
[
"Broadbent",
"Anne",
""
],
[
"Tapp",
"Alain",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.2025 | Sapon Tanachaiwiwat | Sapon Tanachaiwiwat, Ahmed Helmy | On the Performance Evaluation of Encounter-based Worm Interactions Based
on Node Characteristics | null | null | null | null | cs.CR cs.NI | null | An encounter-based network is a frequently disconnected wireless ad-hoc
network requiring nearby neighbors to store and forward data utilizing mobility
and encounters over time. Using traditional approaches such as gateways or
firewalls for deterring worm propagation in encounter-based networks is
inappropriate. Because this type of network is highly dynamic and has no
specific boundary, a distributed counter-worm mechanism is needed. We propose
models for the worm interaction approach that relies upon automated beneficial
worm generation to alleviate problems of worm propagation in such networks. We
study and analyze the impact of key mobile node characteristics including node
cooperation, immunization, on-off behavior on the worm propagations and
interactions. We validate our proposed model using extensive simulations. We
also find that, in addition to immunization, cooperation can reduce the level
of worm infection. Furthermore, on-off behavior linearly impacts only timing
aspect but not the overall infection. Using realistic mobile network
measurements, we find that encounters are non-uniform, the trends are
consistent with the model but the magnitudes are drastically different.
Immunization seems to be the most effective in such scenarios. These findings
provide insight that we hope would aid to develop counter-worm protocols in
future encounter-based networks.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 02:23:01 GMT"
}
] | 2007-06-15T00:00:00 | [
[
"Tanachaiwiwat",
"Sapon",
""
],
[
"Helmy",
"Ahmed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.2033 | Khoa Nguyen | Khoa D. Nguyen, Albert Guillen i Fabregas and Lars K. Rasmussen | Power Allocation for Discrete-Input Delay-Limited Fading Channels | 61 pages, 10 figures, Submitted to IEEE Trans. Inf. Theory | null | null | null | cs.IT math.IT | null | We consider power allocation algorithms for fixed-rate transmission over
Nakagami-m non-ergodic block-fading channels with perfect transmitter and
receiver channel state information and discrete input signal constellations,
under both short- and long-term power constraints. Optimal power allocation
schemes are shown to be direct applications of previous results in the
literature. We show that the SNR exponent of the optimal short-term scheme is
given by m times the Singleton bound. We also illustrate the significant gains
available by employing long-term power constraints. In particular, we analyze
the optimal long-term solution, showing that zero outage can be achieved
provided that the corresponding short-term SNR exponent with the same system
parameters is strictly greater than one. Conversely, if the short-term SNR
exponent is smaller than one, we show that zero outage cannot be achieved. In
this case, we derive the corresponding long-term SNR exponent as a function of
the Singleton bound. Due to the nature of the expressions involved, the
complexity of optimal schemes may be prohibitive for system implementation. We
therefore propose simple sub-optimal power allocation schemes whose outage
probability performance is very close to the minimum outage probability
obtained by optimal schemes. We also show the applicability of these techniques
to practical systems employing orthogonal frequency division multiplexing.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 03:48:14 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Nguyen",
"Khoa D.",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Rasmussen",
"Lars K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2035 | Michael Silverman | Kyle Sabo, Ryan Schmitt, Michael Silverman | Critique of Feinstein's Proof that P is not Equal to NP | 5 pages, 2 definitions | null | null | null | cs.CC | null | We examine a proof by Craig Alan Feinstein that P is not equal to NP. We
present counterexamples to claims made in his paper and expose a flaw in the
methodology he uses to make his assertions. The fault in his argument is the
incorrect use of reduction. Feinstein makes incorrect assumptions about the
complexity of a problem based on the fact that there is a more complex problem
that can be used to solve it. His paper introduces the terminology "imaginary
processor" to describe how it is possible to beat the brute force reduction he
offers to solve the Subset-Sum problem. The claims made in the paper would not
be validly established even were imaginary processors to exist.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 13:15:39 GMT"
}
] | 2007-06-15T00:00:00 | [
[
"Sabo",
"Kyle",
""
],
[
"Schmitt",
"Ryan",
""
],
[
"Silverman",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0706.2040 | Edoardo Airoldi | Edoardo M Airoldi | Getting started in probabilistic graphical models | 12 pages, 1 figure | Airoldi EM (2007) Getting started in probabilistic graphical
models. PLoS Comput Biol 3(12): e252 | 10.1371/journal.pcbi.0030252 | null | q-bio.QM cs.LG physics.soc-ph stat.ME stat.ML | null | Probabilistic graphical models (PGMs) have become a popular tool for
computational analysis of biological data in a variety of domains. But, what
exactly are they and how do they work? How can we use PGMs to discover patterns
that are biologically relevant? And to what extent can PGMs help us formulate
new hypotheses that are testable at the bench? This note sketches out some
answers and illustrates the main ideas behind the statistical approach to
biological pattern discovery.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 14:52:06 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Nov 2007 19:25:59 GMT"
}
] | 2010-02-22T00:00:00 | [
[
"Airoldi",
"Edoardo M",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0706.2069 | Samuel Thibault | Samuel Thibault (INRIA Futurs), Raymond Namyst (INRIA Futurs),
Pierre-Andr\'e Wacrenier (INRIA Futurs) | Building Portable Thread Schedulers for Hierarchical Multiprocessors:
the BubbleSched Framework | null | Dans EuroPar (2007) | null | null | cs.DC | null | Exploiting full computational power of current more and more hierarchical
multiprocessor machines requires a very careful distribution of threads and
data among the underlying non-uniform architecture. Unfortunately, most
operating systems only provide a poor scheduling API that does not allow
applications to transmit valuable scheduling hints to the system. In a previous
paper, we showed that using a bubble-based thread scheduler can significantly
improve applications' performance in a portable way. However, since
multithreaded applications have various scheduling requirements, there is no
universal scheduler that could meet all these needs. In this paper, we present
a framework that allows scheduling experts to implement and experiment with
customized thread schedulers. It provides a powerful API for dynamically
distributing bubbles among the machine in a high-level, portable, and efficient
way. Several examples show how experts can then develop, debug and tune their
own portable bubble schedulers.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 09:35:30 GMT"
}
] | 2007-06-15T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
],
[
"Namyst",
"Raymond",
"",
"INRIA Futurs"
],
[
"Wacrenier",
"Pierre-André",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.2073 | Samuel Thibault | Samuel Thibault (INRIA Futurs), Fran\c{c}ois Broquedis (INRIA Futurs),
Brice Goglin (INRIA Futurs), Raymond Namyst (INRIA Futurs), Pierre-Andr\'e
Wacrenier (INRIA Futurs) | An Efficient OpenMP Runtime System for Hierarchical Arch | null | Dans International Workshop on OpenMP (IWOMP) (2007) | null | null | cs.PL | null | Exploiting the full computational power of always deeper hierarchical
multiprocessor machines requires a very careful distribution of threads and
data among the underlying non-uniform architecture. The emergence of multi-core
chips and NUMA machines makes it important to minimize the number of remote
memory accesses, to favor cache affinities, and to guarantee fast completion of
synchronization steps. By using the BubbleSched platform as a threading backend
for the GOMP OpenMP compiler, we are able to easily transpose affinities of
thread teams into scheduling hints using abstractions called bubbles. We then
propose a scheduling strategy suited to nested OpenMP parallelism. The
resulting preliminary performance evaluations show an important improvement of
the speedup on a typical NAS OpenMP benchmark application.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 09:43:23 GMT"
}
] | 2007-06-15T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
],
[
"Broquedis",
"François",
"",
"INRIA Futurs"
],
[
"Goglin",
"Brice",
"",
"INRIA Futurs"
],
[
"Namyst",
"Raymond",
"",
"INRIA Futurs"
],
[
"Wacrenier",
"Pierre-André",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0706.2076 | Klaus Aehlig | Klaus Aehlig | A Finite Semantics of Simply-Typed Lambda Terms for Infinite Runs of<br>
Automata | 23 pages | Logical Methods in Computer Science, Volume 3, Issue 3 (July 4,
2007) lmcs:1232 | 10.2168/LMCS-3(3:1)2007 | null | cs.LO | null | Model checking properties are often described by means of finite automata.
Any particular such automaton divides the set of infinite trees into finitely
many classes, according to which state has an infinite run. Building the full
type hierarchy upon this interpretation of the base type gives a finite
semantics for simply-typed lambda-trees.
A calculus based on this semantics is proven sound and complete. In
particular, for regular infinite lambda-trees it is decidable whether a given
automaton has a run or not. As regular lambda-trees are precisely recursion
schemes, this decidability result holds for arbitrary recursion schemes of
arbitrary level, without any syntactical restriction.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 09:57:27 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jul 2007 15:28:50 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Nov 2007 15:33:34 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Aehlig",
"Klaus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.2146 | Rajesh Sudarsan | Rajesh Sudarsan and Calvin J. Ribbens | Efficient Multidimensional Data Redistribution for Resizable Parallel
Computations | 18 pages, 12 figures, 2 tables. A shorter version of this paper is
available in the proceedings of the The Fifth International Symposium on
Parallel and Distributed Processing and Applications (ISPA07) | null | null | null | cs.DC | null | Traditional parallel schedulers running on cluster supercomputers support
only static scheduling, where the number of processors allocated to an
application remains fixed throughout the execution of the job. This results in
under-utilization of idle system resources thereby decreasing overall system
throughput. In our research, we have developed a prototype framework called
ReSHAPE, which supports dynamic resizing of parallel MPI applications executing
on distributed memory platforms. The resizing library in ReSHAPE includes
support for releasing and acquiring processors and efficiently redistributing
application state to a new set of processors. In this paper, we derive an
algorithm for redistributing two-dimensional block-cyclic arrays from $P$ to
$Q$ processors, organized as 2-D processor grids. The algorithm ensures a
contention-free communication schedule for data redistribution if $P_r \leq
Q_r$ and $P_c \leq Q_c$. In other cases, the algorithm implements circular row
and column shifts on the communication schedule to minimize node contention.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 15:54:10 GMT"
}
] | 2007-06-15T00:00:00 | [
[
"Sudarsan",
"Rajesh",
""
],
[
"Ribbens",
"Calvin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.2153 | Quentin Merigot | Fr\'ed\'eric Chazal (INRIA Sophia Antipolis), David Cohen-Steiner
(INRIA Sophia Antipolis), Quentin M\'erigot (INRIA Sophia Antipolis) | Stability of boundary measures | null | Boundary measures for geometric inference, Found. Comput. Math.,
10 (2), pp. 221-240, 2010 | 10.1007/s10208-009-9056-2 | null | cs.CG math.CA math.MG | null | We introduce the boundary measure at scale r of a compact subset of the
n-dimensional Euclidean space. We show how it can be computed for point clouds
and suggest these measures can be used for feature detection. The main
contribution of this work is the proof a quantitative stability theorem for
boundary measures using tools of convex analysis and geometric measure theory.
As a corollary we obtain a stability result for Federer's curvature measures of
a compact, allowing to compute them from point-cloud approximations of the
compact.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 16:03:28 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jun 2007 09:06:56 GMT"
}
] | 2010-03-31T00:00:00 | [
[
"Chazal",
"Frédéric",
"",
"INRIA Sophia Antipolis"
],
[
"Cohen-Steiner",
"David",
"",
"INRIA Sophia Antipolis"
],
[
"Mérigot",
"Quentin",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
0706.2155 | Greg Sepesi | Greg Sepesi | Dualheap Selection Algorithm: Efficient, Inherently Parallel and
Somewhat Mysterious | 5 pages, 6 figures | null | null | null | cs.DS cs.CC cs.DC | null | An inherently parallel algorithm is proposed that efficiently performs
selection: finding the K-th largest member of a set of N members. Selection is
a common component of many more complex algorithms and therefore is a widely
studied problem.
Not much is new in the proposed dualheap selection algorithm: the heap data
structure is from J.W.J.Williams, the bottom-up heap construction is from R.W.
Floyd, and the concept of a two heap data structure is from J.W.J. Williams and
D.E. Knuth. The algorithm's novelty is limited to a few relatively minor
implementation twists: 1) the two heaps are oriented with their roots at the
partition values rather than at the minimum and maximum values, 2)the coding of
one of the heaps (the heap of smaller values) employs negative indexing, and 3)
the exchange phase of the algorithm is similar to a bottom-up heap
construction, but navigates the heap with a post-order tree traversal.
When run on a single processor, the dualheap selection algorithm's
performance is competitive with quickselect with median estimation, a common
variant of C.A.R. Hoare's quicksort algorithm. When run on parallel processors,
the dualheap selection algorithm is superior due to its subtasks that are
easily partitioned and innately balanced.
| [
{
"version": "v1",
"created": "Thu, 14 Jun 2007 16:11:24 GMT"
}
] | 2007-06-15T00:00:00 | [
[
"Sepesi",
"Greg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.2293 | Romain Pechoux | Jean-Yves Marion and Romain Pechoux | Resource control of object-oriented programs | null | null | null | null | cs.PL cs.LO | null | A sup-interpretation is a tool which provides an upper bound on the size of a
value computed by some symbol of a program. Sup-interpretations have shown
their interest to deal with the complexity of first order functional programs.
For instance, they allow to characterize all the functions bitwise computable
in Alogtime. This paper is an attempt to adapt the framework of
sup-interpretations to a fragment of oriented-object programs, including
distinct encodings of numbers through the use of constructor symbols, loop and
while constructs and non recursive methods with side effects. We give a
criterion, called brotherly criterion, which ensures that each brotherly
program computes objects whose size is polynomially bounded by the inputs
sizes.
| [
{
"version": "v1",
"created": "Fri, 15 Jun 2007 13:39:12 GMT"
}
] | 2007-06-18T00:00:00 | [
[
"Marion",
"Jean-Yves",
""
],
[
"Pechoux",
"Romain",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.2310 | Nicolas Gresset | Nicolas Gresset, Loic Brunel, Joseph Boutros | Space-time coding techniques with bit-interleaved coded modulations for
MIMO block-fading channels | Submitted to IEEE Trans. on Information Theory, Submission: January
2006 - First review: June 2007 | null | 10.1109/TIT.2008.920240 | null | cs.IT math.IT | null | The space-time bit-interleaved coded modulation (ST-BICM) is an efficient
technique to obtain high diversity and coding gain on a block-fading MIMO
channel. Its maximum-likelihood (ML) performance is computed under ideal
interleaving conditions, which enables a global optimization taking into
account channel coding. Thanks to a diversity upperbound derived from the
Singleton bound, an appropriate choice of the time dimension of the space-time
coding is possible, which maximizes diversity while minimizing complexity.
Based on the analysis, an optimized interleaver and a set of linear precoders,
called dispersive nucleo algebraic (DNA) precoders are proposed. The proposed
precoders have good performance with respect to the state of the art and exist
for any number of transmit antennas and any time dimension. With turbo codes,
they exhibit a frame error rate which does not increase with frame length.
| [
{
"version": "v1",
"created": "Fri, 15 Jun 2007 15:14:01 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Gresset",
"Nicolas",
""
],
[
"Brunel",
"Loic",
""
],
[
"Boutros",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2331 | Erhan Bayraktar | Erhan Bayraktar, Hao Xing | Pricing American Options for Jump Diffusions by Iterating Optimal
Stopping Problems for Diffusions | Key Words: Pricing derivatives, American options, jump diffusions,
barrier options, finite difference methods | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We approximate the price of the American put for jump diffusions by a
sequence of functions, which are computed iteratively. This sequence converges
to the price function uniformly and exponentially fast. Each element of the
approximating sequence solves an optimal stopping problem for geometric
Brownian motion, and can be numerically computed using the classical finite
difference methods. We prove the convergence of this numerical scheme and
present examples to illustrate its performance.
| [
{
"version": "v1",
"created": "Fri, 15 Jun 2007 16:43:14 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Jun 2007 15:40:41 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Jun 2008 03:46:38 GMT"
},
{
"version": "v4",
"created": "Thu, 31 Jul 2008 03:43:12 GMT"
},
{
"version": "v5",
"created": "Wed, 3 Dec 2008 16:56:17 GMT"
}
] | 2008-12-03T00:00:00 | [
[
"Bayraktar",
"Erhan",
""
],
[
"Xing",
"Hao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0706.2434 | RadhaKrishna Ganti | RadhaKrishna Ganti and Martin Haenggi | Interference and Outage in Clustered Wireless Ad Hoc Networks | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2025543 | null | cs.IT math.IT | null | In the analysis of large random wireless networks, the underlying node
distribution is almost ubiquitously assumed to be the homogeneous Poisson point
process. In this paper, the node locations are assumed to form a Poisson
clustered process on the plane. We derive the distributional properties of the
interference and provide upper and lower bounds for its CCDF. We consider the
probability of successful transmission in an interference limited channel when
fading is modeled as Rayleigh. We provide a numerically integrable expression
for the outage probability and closed-form upper and lower bounds.We show that
when the transmitter-receiver distance is large, the success probability is
greater than that of a Poisson arrangement. These results characterize the
performance of the system under geographical or MAC-induced clustering. We
obtain the maximum intensity of transmitting nodes for a given outage
constraint, i.e., the transmission capacity (of this spatial arrangement) and
show that it is equal to that of a Poisson arrangement of nodes. For the
analysis, techniques from stochastic geometry are used, in particular the
probability generating functional of Poisson cluster processes, the Palm
characterization of Poisson cluster processes and the Campbell-Mecke theorem.
| [
{
"version": "v1",
"created": "Sat, 16 Jun 2007 17:23:43 GMT"
}
] | 2010-10-11T00:00:00 | [
[
"Ganti",
"RadhaKrishna",
""
],
[
"Haenggi",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2479 | Nicolas Schabanel | Damien Regnault and Nicolas Schabanel and \'Eric Thierry | Progresses in the Analysis of Stochastic 2D Cellular Automata: a Study
of Asynchronous 2D Minority | null | null | null | null | cs.DM | null | Cellular automata are often used to model systems in physics, social
sciences, biology that are inherently asynchronous. Over the past 20 years,
studies have demonstrated that the behavior of cellular automata drastically
changed under asynchronous updates. Still, the few mathematical analyses of
asynchronism focus on one-dimensional probabilistic cellular automata, either
on single examples or on specific classes. As for other classic dynamical
systems in physics, extending known methods from one- to two-dimensional
systems is a long lasting challenging problem.
In this paper, we address the problem of analysing an apparently simple 2D
asynchronous cellular automaton: 2D Minority where each cell, when fired,
updates to the minority state of its neighborhood. Our experiments reveal that
in spite of its simplicity, the minority rule exhibits a quite complex response
to asynchronism. By focusing on the fully asynchronous regime, we are however
able to describe completely the asymptotic behavior of this dynamics as long as
the initial configuration satisfies some natural constraints. Besides these
technical results, we have strong reasons to believe that our techniques
relying on defining an energy function from the transition table of the
automaton may be extended to the wider class of threshold automata.
| [
{
"version": "v1",
"created": "Sun, 17 Jun 2007 14:12:31 GMT"
}
] | 2007-06-19T00:00:00 | [
[
"Regnault",
"Damien",
""
],
[
"Schabanel",
"Nicolas",
""
],
[
"Thierry",
"Éric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.2520 | Viktoria Rojkova | Viktoria Rojkova, Mehmed Kantardzic | Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory
Approach | submitted to Internet Measurement Conference 2007 | null | null | null | cs.NI | null | The traffic behavior of University of Louisville network with the
interconnected backbone routers and the number of Virtual Local Area Network
(VLAN) subnets is investigated using the Random Matrix Theory (RMT) approach.
We employ the system of equal interval time series of traffic counts at all
router to router and router to subnet connections as a representation of the
inter-VLAN traffic. The cross-correlation matrix C of the traffic rate changes
between different traffic time series is calculated and tested against
null-hypothesis of random interactions.
The majority of the eigenvalues \lambda_{i} of matrix C fall within the
bounds predicted by the RMT for the eigenvalues of random correlation matrices.
The distribution of eigenvalues and eigenvectors outside of the RMT bounds
displays prominent and systematic deviations from the RMT predictions.
Moreover, these deviations are stable in time.
The method we use provides a unique possibility to accomplish three
concurrent tasks of traffic analysis. The method verifies the uncongested state
of the network, by establishing the profile of random interactions. It
recognizes the system-specific large-scale interactions, by establishing the
profile of stable in time non-random interactions. Finally, by looking into the
eigenstatistics we are able to detect and allocate anomalies of network traffic
interactions.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2007 01:31:54 GMT"
}
] | 2007-06-19T00:00:00 | [
[
"Rojkova",
"Viktoria",
""
],
[
"Kantardzic",
"Mehmed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0706.2544 | Pierre-Louis Curien | Pierre-Louis Curien (PPS), Hugo Herbelin (INRIA Futurs) | Abstract machines for dialogue games | null | null | null | null | cs.LO | null | The notion of abstract Boehm tree has arisen as an operationally-oriented
distillation of works on game semantics, and has been investigated in two
papers. This paper revisits the notion, providing more syntactic support and
more examples (like call-by-value evaluation) illustrating the generality of
the underlying computing device. Precise correspondences between various
formulations of the evaluation mechanism of abstract Boehm trees are
established.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2007 08:01:12 GMT"
}
] | 2007-06-19T00:00:00 | [
[
"Curien",
"Pierre-Louis",
"",
"PPS"
],
[
"Herbelin",
"Hugo",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.2575 | Kettani Omar | O.Kettani | A new lower bound on the independence number of a graph | 4 pages | null | null | null | cs.DM | null | For a given connected graph G on n vertices and m edges, we prove that its
independence number is at least (2m+n+2-sqrt(sqr(2m+n+2)-16sqr(n)))/8.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2007 10:50:27 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jun 2007 17:59:06 GMT"
}
] | 2007-06-20T00:00:00 | [
[
"Kettani",
"O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.2585 | Richard Mayr | Parosh Aziz Abdulla, Noomene Ben Henda, Richard Mayr | Decisive Markov Chains | 32 pages, 0 figures | Logical Methods in Computer Science, Volume 3, Issue 4 (November
8, 2007) lmcs:867 | 10.2168/LMCS-3(4:7)2007 | null | cs.LO cs.DM | null | We consider qualitative and quantitative verification problems for
infinite-state Markov chains. We call a Markov chain decisive w.r.t. a given
set of target states F if it almost certainly eventually reaches either F or a
state from which F can no longer be reached. While all finite Markov chains are
trivially decisive (for every set F), this also holds for many classes of
infinite Markov chains. Infinite Markov chains which contain a finite attractor
are decisive w.r.t. every set F. In particular, this holds for probabilistic
lossy channel systems (PLCS). Furthermore, all globally coarse Markov chains
are decisive. This class includes probabilistic vector addition systems (PVASS)
and probabilistic noisy Turing machines (PNTM). We consider both safety and
liveness problems for decisive Markov chains, i.e., the probabilities that a
given set of states F is eventually reached or reached infinitely often,
respectively. 1. We express the qualitative problems in abstract terms for
decisive Markov chains, and show an almost complete picture of its decidability
for PLCS, PVASS and PNTM. 2. We also show that the path enumeration algorithm
of Iyer and Narasimha terminates for decisive Markov chains and can thus be
used to solve the approximate quantitative safety problem. A modified variant
of this algorithm solves the approximate quantitative liveness problem. 3.
Finally, we show that the exact probability of (repeatedly) reaching F cannot
be effectively expressed (in a uniform way) in Tarski-algebra for either PLCS,
PVASS or (P)NTM.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2007 11:50:16 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Nov 2007 20:21:56 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Abdulla",
"Parosh Aziz",
""
],
[
"Henda",
"Noomene Ben",
""
],
[
"Mayr",
"Richard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.2606 | Christian Schaffner | Serge Fehr, Christian Schaffner | Randomness Extraction via Delta-Biased Masking in the Presence of a
Quantum Attacker | 17 pages, v2: mainly editorial changes taking into account referee
comments | null | null | null | quant-ph cs.CR | null | Randomness extraction is of fundamental importance for information-theoretic
cryptography. It allows to transform a raw key about which an attacker has some
limited knowledge into a fully secure random key, on which the attacker has
essentially no information. Up to date, only very few randomness-extraction
techniques are known to work against an attacker holding quantum information on
the raw key. This is very much in contrast to the classical (non-quantum)
setting, which is much better understood and for which a vast amount of
different techniques are known and proven to work.
We prove a new randomness-extraction technique, which is known to work in the
classical setting, to be secure against a quantum attacker as well. Randomness
extraction is done by XOR'ing a so-called delta-biased mask to the raw key. Our
result allows to extend the classical applications of this extractor to the
quantum setting. We discuss the following two applications. We show how to
encrypt a long message with a short key, information-theoretically secure
against a quantum attacker, provided that the attacker has enough quantum
uncertainty on the message. This generalizes the concept of entropically-secure
encryption to the case of a quantum attacker. As second application, we show
how to do error-correction without leaking partial information to a quantum
attacker. Such a technique is useful in settings where the raw key may contain
errors, since standard error-correction techniques may provide the attacker
with information on, say, a secret key that was used to obtain the raw key.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2007 14:16:02 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Dec 2007 09:19:49 GMT"
}
] | 2007-12-13T00:00:00 | [
[
"Fehr",
"Serge",
""
],
[
"Schaffner",
"Christian",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.2619 | Laurent Doyen | Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger,<br>
Jean-Francois Raskin | Algorithms for Omega-Regular Games with Imperfect Information | 24 pages. A preliminary version of this paper appeared in the
Proceedings of the International Conference for Computer Science Logic (CSL),
Lecture Notes in Computer Science 4207, Springer, 2006, pp. 287-302 | Logical Methods in Computer Science, Volume 3, Issue 3 (July 27,
2007) lmcs:1094 | 10.2168/LMCS-3(3:4)2007 | null | cs.LO cs.GT | null | We study observation-based strategies for two-player turn-based games on
graphs with omega-regular objectives. An observation-based strategy relies on
imperfect information about the history of a play, namely, on the past sequence
of observations. Such games occur in the synthesis of a controller that does
not see the private state of the plant. Our main results are twofold. First, we
give a fixed-point algorithm for computing the set of states from which a
player can win with a deterministic observation-based strategy for any
omega-regular objective. The fixed point is computed in the lattice of
antichains of state sets. This algorithm has the advantages of being directed
by the objective and of avoiding an explicit subset construction on the game
graph. Second, we give an algorithm for computing the set of states from which
a player can win with probability 1 with a randomized observation-based
strategy for a Buechi objective. This set is of interest because in the absence
of perfect information, randomized strategies are more powerful than
deterministic ones. We show that our algorithms are optimal by proving matching
lower bounds.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2007 15:02:02 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Jul 2007 14:56:14 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Nov 2007 17:01:47 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Doyen",
"Laurent",
""
],
[
"Henzinger",
"Thomas A.",
""
],
[
"Raskin",
"<br> Jean-Francois",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0706.2725 | Guohun Zhu | Guohun Zhu | The Complexity of Determining Existence a Hamiltonian Cycle is $O(n^3)$ | 6 papers | null | null | null | cs.DS cs.CC cs.DM | null | The Hamiltonian cycle problem in digraph is mapped into a matching cover
bipartite graph. Based on this mapping, it is proved that determining existence
a Hamiltonian cycle in graph is $O(n^3)$.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 07:57:51 GMT"
}
] | 2007-06-20T00:00:00 | [
[
"Zhu",
"Guohun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0706.2732 | Cyrille Chavet | Cyrille Chavet (LESTER), Philippe Coussy (LESTER), Pascal Urard (STM),
Eric Martin (LESTER) | A Design Methodology for Space-Time Adapter | ISBN : 978-1-59593-606-8 | Proceedings of the 2007 ACM Great Lakes Symposium on VLSI
(12/03/2007) 347 | null | null | cs.AR | null | This paper presents a solution to efficiently explore the design space of
communication adapters. In most digital signal processing (DSP) applications,
the overall architecture of the system is significantly affected by
communication architecture, so the designers need specifically optimized
adapters. By explicitly modeling these communications within an effective
graph-theoretic model and analysis framework, we automatically generate an
optimized architecture, named Space-Time AdapteR (STAR). Our design flow inputs
a C description of Input/Output data scheduling, and user requirements
(throughput, latency, parallelism...), and formalizes communication constraints
through a Resource Constraints Graph (RCG). The RCG properties enable an
efficient architecture space exploration in order to synthesize a STAR
component. The proposed approach has been tested to design an industrial data
mixing block example: an Ultra-Wideband interleaver.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 14:18:57 GMT"
}
] | 2007-06-20T00:00:00 | [
[
"Chavet",
"Cyrille",
"",
"LESTER"
],
[
"Coussy",
"Philippe",
"",
"LESTER"
],
[
"Urard",
"Pascal",
"",
"STM"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0706.2746 | Stefano Tessaro | Robert Koenig, Ueli Maurer, Stefano Tessaro | Abstract Storage Devices | 20 pages | null | null | null | cs.DM cs.CC cs.IT math.IT | null | A quantum storage device differs radically from a conventional physical
storage device. Its state can be set to any value in a certain (infinite) state
space, but in general every possible read operation yields only partial
information about the stored state.
The purpose of this paper is to initiate the study of a combinatorial
abstraction, called abstract storage device (ASD), which models deterministic
storage devices with the property that only partial information about the state
can be read, but that there is a degree of freedom as to which partial
information should be retrieved.
This concept leads to a number of interesting problems which we address, like
the reduction of one device to another device, the equivalence of devices,
direct products of devices, as well as the factorization of a device into
primitive devices. We prove that every ASD has an equivalent ASD with minimal
number of states and of possible read operations. Also, we prove that the
reducibility problem for ASD's is NP-complete, that the equivalence problem is
at least as hard as the graph isomorphism problem, and that the factorization
into binary-output devices (if it exists) is unique.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 17:14:24 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Koenig",
"Robert",
""
],
[
"Maurer",
"Ueli",
""
],
[
"Tessaro",
"Stefano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2748 | Royon Yvan | Yvan Royon (INRIA Rh\^one-Alpes), St\'ephane Fr\'enot (INRIA
Rh\^one-Alpes) | A Survey of Unix Init Schemes | null | null | null | null | cs.OS | null | In most modern operating systems, init (as in "initialization") is the
program launched by the kernel at boot time. It runs as a daemon and typically
has PID 1. Init is responsible for spawning all other processes and scavenging
zombies. It is also responsible for reboot and shutdown operations. This
document describes existing solutions that implement the init process and/or
init scripts in Unix-like systems. These solutions range from the legacy and
still-in-use BSD and SystemV schemes, to recent and promising schemes from
Ubuntu, Apple, Sun and independent developers. Our goal is to highlight their
focus and compare their sets of features.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 09:44:36 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jun 2007 07:31:38 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Royon",
"Yvan",
"",
"INRIA Rhône-Alpes"
],
[
"Frénot",
"Stéphane",
"",
"INRIA\n Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0706.2795 | Pablo Piantanida | Pablo Piantanida and Pierre Duhamel | Dirty-paper Coding without Channel Information at the Transmitter and
Imperfect Estimation at the Receiver | null | Proc. of IEEE International Conference on Communications (ICC),
Glasgow, Scotland, 2007 | null | null | cs.IT math.IT | null | In this paper, we examine the effects of imperfect channel estimation at the
receiver and no channel knowledge at the transmitter on the capacity of the
fading Costa's channel with channel state information non-causally known at the
transmitter. We derive the optimal Dirty-paper coding (DPC) scheme and its
corresponding achievable rates with the assumption of Gaussian inputs. Our
results, for uncorrelated Rayleigh fading, provide intuitive insights on the
impact of the channel estimate and the channel characteristics (e.g. SNR,
fading process, channel training) on the achievable rates. These are useful in
practical scenarios of multiuser wireless communications (e.g. Broadcast
Channels) and information embedding applications (e.g. robust watermarking). We
also studied optimal training design adapted to each application. We provide
numerical results for a single-user fading Costa's channel with
maximum-likehood (ML) channel estimation. These illustrate an interesting
practical trade-off between the amount of training and its impact to the
interference cancellation performance using DPC scheme.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 14:19:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Piantanida",
"Pablo",
""
],
[
"Duhamel",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2797 | Anne-Marie Vercoustre | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis),
Eduardo Fraschini (INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie
Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis) | Extraction d'entit\'es dans des collections \'evolutives | The bibteX file has been replaced with the correct one | Dans 7i\`emes Journ\'ees francophones Extraction et Gestion des
Connaissances EGC 2007 76300 (23/01/2007) pp. 533-538 | null | null | cs.IR | null | The goal of our work is to use a set of reports and extract named entities,
in our case the names of Industrial or Academic partners. Starting with an
initial list of entities, we use a first set of documents to identify syntactic
patterns that are then validated in a supervised learning phase on a set of
annotated documents. The complete collection is then explored. This approach is
similar to the ones used in data extraction from semi-structured documents
(wrappers) and do not need any linguistic resources neither a large set for
training. As our collection of documents would evolve over years, we hope that
the performance of the extraction would improve with the increased size of the
training set.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 14:16:48 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jul 2007 14:20:57 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Jul 2007 15:32:12 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Fraschini",
"Eduardo",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0706.2809 | Pablo Piantanida | Pablo Piantanida, Sajad Sadough and Pierre Duhamel | On the Outage Capacity of a Practical Decoder Using Channel Estimation
Accuracy | null | Proc. of IEEE International Symposium on Information Theory
(ISIT), Nice, France, 2007 | 10.1109/ISIT.2007.4557559 | null | cs.IT math.IT | null | The optimal decoder achieving the outage capacity under imperfect channel
estimation is investigated. First, by searching into the family of nearest
neighbor decoders, which can be easily implemented on most practical coded
modulation systems, we derive a decoding metric that minimizes the average of
the transmission error probability over all channel estimation errors. This
metric, for arbitrary memoryless channels, achieves the capacity of a composite
(more noisy) channel. Next, according to the notion of estimation-induced
outage capacity (EIO capacity) introduced in our previous work, we characterize
maximal achievable information rates associated to the proposed decoder. The
performance of the proposed decoding metric over uncorrelated Rayleigh fading
MIMO channels is compared to both the classical mismatched maximum-likelihood
(ML) decoder and the theoretical limits given by the EIO capacity (i.e. the
best decoder in presence of channel estimation errors). Numerical results show
that the derived metric provides significant gains, in terms of achievable
information rates and bit error rate (BER), in a bit interleaved coded
modulation (BICM) framework, without introducing any additional decoding
complexity.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 14:55:07 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Piantanida",
"Pablo",
""
],
[
"Sadough",
"Sajad",
""
],
[
"Duhamel",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2824 | Cyrille Chavet | Cyrille Chavet (LESTER, STM), Philippe Coussy (LESTER), Pascal Urard
(STM), Eric Martin (LESTER) | M\'ethodologie de mod\'elisation et d'impl\'ementation d'adaptateurs
spatio-temporels | null | Actes de la conference MajecSTIC 2005 (16/11/2005) 151 | null | null | cs.AR | null | The re-use of pre-designed blocks is a well-known concept of the software
development. This technique has been applied to System-on-Chip (SoC) design
whose complexity and heterogeneity are growing. The re-use is made thanks to
high level components, called virtual components (IP), available in more or
less flexible forms. These components are dedicated blocks: digital signal
processing (DCT, FFT), telecommunications (Viterbi, TurboCodes),... These
blocks rest on a model of fixed architecture with very few degrees of
personalization. This rigidity is particularly true for the communication
interface whose orders of acquisition and production of data, the temporal
behavior and protocols of exchanges are fixed. The successful integration of
such an IP requires that the designer (1) synchronizes the components (2)
converts the protocols between "incompatible" blocks (3) temporizes the data to
guarantee the temporal constraints and the order of the data. This phase
remains however very manual and source of errors. Our approach proposes a
formal modeling, based on an original Ressource Compatibility Graph. The
synthesis flow is based on a set of transformations of the initial graph to
lead to an interface architecture allowing the space-time adaptation of the
data exchanges between several components.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 15:56:43 GMT"
}
] | 2007-06-20T00:00:00 | [
[
"Chavet",
"Cyrille",
"",
"LESTER, STM"
],
[
"Coussy",
"Philippe",
"",
"LESTER"
],
[
"Urard",
"Pascal",
"",
"STM"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0706.2839 | Rajeev Raman | Naila Rahman and Rajeev Raman | Cache Analysis of Non-uniform Distribution Sorting Algorithms | The full version of our ESA 2000 paper (LNCS 1879) on this subject | null | null | null | cs.DS cs.PF | null | We analyse the average-case cache performance of distribution sorting
algorithms in the case when keys are independently but not necessarily
uniformly distributed. The analysis is for both `in-place' and `out-of-place'
distribution sorting algorithms and is more accurate than the analysis
presented in \cite{RRESA00}. In particular, this new analysis yields tighter
upper and lower bounds when the keys are drawn from a uniform distribution.
We use this analysis to tune the performance of the integer sorting algorithm
MSB radix sort when it is used to sort independent uniform floating-point
numbers (floats). Our tuned MSB radix sort algorithm comfortably outperforms a
cache-tuned implementations of bucketsort \cite{RR99} and Quicksort when
sorting uniform floats from $[0, 1)$.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 17:12:47 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Aug 2007 22:57:01 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Rahman",
"Naila",
""
],
[
"Raman",
"Rajeev",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0706.2888 | James Harold Thomas | James Harold Thomas | Variations on Kak's Three Stage Quantum Cryptography Protocol | null | null | null | null | cs.CR | null | This paper introduces a variation on Kak's three-stage quanutm key
distribution protocol which allows for defence against the man in the middle
attack. In addition, we introduce a new protocol, which also offers similar
resiliance against such an attack.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2007 23:04:18 GMT"
}
] | 2007-06-21T00:00:00 | [
[
"Thomas",
"James Harold",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.2893 | Greg Sepesi | Greg Sepesi | Dualheap Sort Algorithm: An Inherently Parallel Generalization of
Heapsort | 4 pages, 4 figures | null | null | null | cs.DS cs.CC cs.DC | null | A generalization of the heapsort algorithm is proposed. At the expense of
about 50% more comparison and move operations for typical cases, the dualheap
sort algorithm offers several advantages over heapsort: improved cache
performance, better performance if the input happens to be already sorted, and
easier parallel implementations.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 14:42:45 GMT"
}
] | 2007-06-21T00:00:00 | [
[
"Sepesi",
"Greg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.2906 | Rahul Vaze | Rahul Vaze and Robert W. Heath Jr | Capacity Scaling for MIMO Two-Way Relaying | null | null | null | null | cs.IT math.IT | null | A multiple input multiple output (MIMO) two-way relay channel is considered,
where two sources want to exchange messages with each other using multiple
relay nodes, and both the sources and relay nodes are equipped with multiple
antennas. Both the sources are assumed to have equal number of antennas and
have perfect channel state information (CSI) for all the channels of the MIMO
two-way relay channel, whereas, each relay node is either assumed to have CSI
for its transmit and receive channel (the coherent case) or no CSI for any of
the channels (the non-coherent case). The main results in this paper are on the
scaling behavior of the capacity region of the MIMO two-way relay channel with
increasing number of relay nodes. In the coherent case, the capacity region of
the MIMO two-way relay channel is shown to scale linearly with the number of
antennas at source nodes and logarithmically with the number of relay nodes. In
the non-coherent case, the capacity region is shown to scale linearly with the
number of antennas at the source nodes and logarithmically with the signal to
noise ratio.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 03:33:02 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jul 2007 05:12:34 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Apr 2008 15:59:18 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Vaze",
"Rahul",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2926 | Michael Chertkov | Michael Chertkov (Los Alamos) | Reducing the Error Floor | 6 pages, 1 figure, invited talk at ITW'07 Tahoe | null | null | LA-UR-07-4047 | cs.IT math.IT | null | We discuss how the loop calculus approach of [Chertkov, Chernyak '06],
enhanced by the pseudo-codeword search algorithm of [Chertkov, Stepanov '06]
and the facet-guessing idea from [Dimakis, Wainwright '06], improves decoding
of graph based codes in the error-floor domain. The utility of the new, Linear
Programming based, decoding is demonstrated via analysis and simulations of the
model $[155,64,20]$ code.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 07:17:14 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chertkov",
"Michael",
"",
"Los Alamos"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2963 | Pablo Piantanida | Pablo Piantanida, Gerald Matz and Pierre Duhamel | Outage Behavior of Discrete Memoryless Channels Under Channel Estimation
Errors | null | Proc. of International Symposium on Information Theory and its
Applications (ISITA), Seoul, Korea, 2006, pp. 417-422 | null | null | cs.IT math.IT | null | Classically, communication systems are designed assuming perfect channel
state information at the receiver and/or transmitter. However, in many
practical situations, only an estimate of the channel is available that differs
from the true channel. We address this channel mismatch scenario by using the
notion of estimation-induced outage capacity, for which we provide an
associated coding theorem and its strong converse, assuming a discrete
memoryless channel. We illustrate our ideas via numerical simulations for
transmissions over Ricean fading channels under a quality of service (QoS)
constraint using rate-limited feedback channel and maximum likelihood (ML)
channel estimation. Our results provide intuitive insights on the impact of the
channel estimate and the channel characteristics (SNR, Ricean K-factor,
training sequence length, feedback rate, etc.) on the mean outage capacity.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 11:01:44 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Piantanida",
"Pablo",
""
],
[
"Matz",
"Gerald",
""
],
[
"Duhamel",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.2974 | Arnaud Leleve | Hcene Benmohamed (LIESP), Arnaud Leleve (LIESP), Patrick Pr\'evot
(LIESP) | Remote laboratories: new technology and standard based architecture | null | Proceedings of 2004 International Conference on Information and
Communication Technologies: From Theory to Applications (19/04/2004) 101 -
102 | 10.1109/ICTTA.2004.1307634 | null | cs.OH | null | E-Laboratories are important components of e- learning environments,
especially in scientific and technical disciplines. First widespread E-Labs
consisted in proposing simulations of real systems (virtual labs), as building
remote labs (remote control of real systems) was difficult by lack of
industrial standards and common protocols. Nowadays, robotics and automation
technologies make easier the interfacing of systems with computers. In this
frame, many researchers (such as those mentioned in [1]) focus on how to set up
such a remote control. But, only a few of them deal with the educational point
of view of the problem. This paper outlines our current research and reflection
about remote laboratory modelling.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 12:07:27 GMT"
}
] | 2007-06-21T00:00:00 | [
[
"Benmohamed",
"Hcene",
"",
"LIESP"
],
[
"Leleve",
"Arnaud",
"",
"LIESP"
],
[
"Prévot",
"Patrick",
"",
"LIESP"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0706.3008 | Areski Flissi | Areski Flissi (LIFL), Philippe Merle (INRIA Futurs) | A Generic Deployment Framework for Grid Computing and Distributed
Applications | The original publication is available at http://www.springerlink.com | OTM 2006, LNCS 4276 (2006) 1402-1411 | 10.1007/11914952_26 | null | cs.DC | null | Deployment of distributed applications on large systems, and especially on
grid infrastructures, becomes a more and more complex task. Grid users spend a
lot of time to prepare, install and configure middleware and application
binaries on nodes, and eventually start their applications. The problem is that
the deployment process is composed of many heterogeneous tasks that have to be
orchestrated in a specific correct order. As a consequence, the automatization
of the deployment process is currently very difficult to reach. To address this
problem, we propose in this paper a generic deployment framework allowing to
automatize the execution of heterogeneous tasks composing the whole deployment
process. Our approach is based on a reification as software components of all
required deployment mechanisms or existing tools. Grid users only have to
describe the configuration to deploy in a simple natural language instead of
programming or scripting how the deployment process is executed. As a toy
example, this framework is used to deploy CORBA component-based applications
and OpenCCM middleware on one thousand nodes of the French Grid5000
infrastructure.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 15:17:47 GMT"
}
] | 2007-06-21T00:00:00 | [
[
"Flissi",
"Areski",
"",
"LIFL"
],
[
"Merle",
"Philippe",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.3009 | Cyrille Chavet | Cyrille Chavet (LESTER, STM), Philippe Coussy (LESTER), Pascal Urard
(STM), Eric Martin (LESTER) | Application of a design space exploration tool to enhance interleaver
generation | null | Proceedings of the European Signal Processing Conference
(EUSIPCO-2007) (03/09/2007) | null | null | cs.AR cs.IT math.IT | null | This paper presents a methodology to efficiently explore the design space of
communication adapters. In most digital signal processing (DSP) applications,
the overall performance of the system is significantly affected by
communication architectures, as a consequence the designers need specifically
optimized adapters. By explicitly modeling these communications within an
effective graph-theoretic model and analysis framework, we automatically
generate an optimized architecture, named Space-Time AdapteR (STAR). Our design
flow inputs a C description of Input/Output data scheduling, and user
requirements (throughput, latency, parallelism...), and formalizes
communication constraints through a Resource Constraints Graph (RCG). Design
space exploration is then performed through associated tools, to synthesize a
STAR component under time-to-market constraints. The proposed approach has been
tested to design an industrial data mixing block example: an Ultra-Wideband
interleaver.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 15:19:01 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chavet",
"Cyrille",
"",
"LESTER, STM"
],
[
"Coussy",
"Philippe",
"",
"LESTER"
],
[
"Urard",
"Pascal",
"",
"STM"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3060 | Eric Darve | Erich Elsen, V. Vishal, Mike Houston, Vijay Pande, Pat Hanrahan, Eric
Darve | N-Body Simulations on GPUs | null | null | null | null | cs.CE cs.DC | null | Commercial graphics processors (GPUs) have high compute capacity at very low
cost, which makes them attractive for general purpose scientific computing. In
this paper we show how graphics processors can be used for N-body simulations
to obtain improvements in performance over current generation CPUs. We have
developed a highly optimized algorithm for performing the O(N^2) force
calculations that constitute the major part of stellar and molecular dynamics
simulations. In some of the calculations, we achieve sustained performance of
nearly 100 GFlops on an ATI X1900XTX. The performance on GPUs is comparable to
specialized processors such as GRAPE-6A and MDGRAPE-3, but at a fraction of the
cost. Furthermore, the wide availability of GPUs has significant implications
for cluster computing and distributed computing efforts like Folding@Home.
| [
{
"version": "v1",
"created": "Wed, 20 Jun 2007 21:02:14 GMT"
}
] | 2007-06-22T00:00:00 | [
[
"Elsen",
"Erich",
""
],
[
"Vishal",
"V.",
""
],
[
"Houston",
"Mike",
""
],
[
"Pande",
"Vijay",
""
],
[
"Hanrahan",
"Pat",
""
],
[
"Darve",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.3076 | Shiguo Lian | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang | On the Performance of Joint Fingerprint Embedding and Decryption Scheme | 10 pages,9 figures. To be submitted | null | null | null | cs.MM cs.CR | null | Till now, few work has been done to analyze the performances of joint
fingerprint embedding and decryption schemes. In this paper, the security of
the joint fingerprint embedding and decryption scheme proposed by Kundur et al.
is analyzed and improved. The analyses include the security against
unauthorized customer, the security against authorized customer, the
relationship between security and robustness, the relationship between
secu-rity and imperceptibility and the perceptual security. Based these
analyses, some means are proposed to strengthen the system, such as multi-key
encryp-tion and DC coefficient encryption. The method can be used to analyze
other JFD schemes. It is expected to provide valuable information to design JFD
schemes.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 02:44:44 GMT"
}
] | 2007-06-22T00:00:00 | [
[
"Lian",
"Shiguo",
""
],
[
"Liu",
"Zhongxuan",
""
],
[
"Ren",
"Zhen",
""
],
[
"Wang",
"Haila",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0706.3104 | Cristina Toninelli | Marc Mezard, Cristina Toninelli | Group Testing with Random Pools: optimal two-stage algorithms | 12 pages | null | null | null | cs.DS cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT | null | We study Probabilistic Group Testing of a set of N items each of which is
defective with probability p. We focus on the double limit of small defect
probability, p<<1, and large number of variables, N>>1, taking either p->0
after $N\to\infty$ or $p=1/N^{\beta}$ with $\beta\in(0,1/2)$. In both settings
the optimal number of tests which are required to identify with certainty the
defectives via a two-stage procedure, $\bar T(N,p)$, is known to scale as
$Np|\log p|$. Here we determine the sharp asymptotic value of $\bar
T(N,p)/(Np|\log p|)$ and construct a class of two-stage algorithms over which
this optimal value is attained. This is done by choosing a proper bipartite
regular graph (of tests and variable nodes) for the first stage of the
detection. Furthermore we prove that this optimal value is also attained on
average over a random bipartite graph where all variables have the same degree,
while the tests have Poisson-distributed degrees. Finally, we improve the
existing upper and lower bound for the optimal number of tests in the case
$p=1/N^{\beta}$ with $\beta\in[1/2,1)$.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 08:57:44 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Mezard",
"Marc",
""
],
[
"Toninelli",
"Cristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3129 | Aris L. Moustakas | Pavlos Kazakopoulos and Aris L. Moustakas | Closed-Form Density of States and Localization Length for a
Non-Hermitian Disordered System | 5 pages, 1 figure | null | 10.1103/PhysRevE.78.016603 | null | cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT nlin.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We calculate the Lyapunov exponent for the non-Hermitian Zakharov-Shabat
eigenvalue problem corresponding to the attractive non-linear Schroedinger
equation with a Gaussian random pulse as initial value function. Using an
extension of the Thouless formula to non-Hermitian random operators, we
calculate the corresponding average density of states. We analyze two cases,
one with circularly symmetric complex Gaussian pulses and the other with real
Gaussian pulses. We discuss the implications in the context of the information
transmission through non-linear optical fibers.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 11:57:40 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jun 2008 14:00:53 GMT"
}
] | 2013-05-29T00:00:00 | [
[
"Kazakopoulos",
"Pavlos",
""
],
[
"Moustakas",
"Aris L.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
}
] |
0706.3132 | Paulo Condado | Paulo A. Condado and Fernando G. Lobo | EasyVoice: Integrating voice synthesis with Skype | null | null | null | null | cs.CY cs.HC | null | This paper presents EasyVoice, a system that integrates voice synthesis with
Skype. EasyVoice allows a person with voice disabilities to talk with another
person located anywhere in the world, removing an important obstacle that
affect these people during a phone or VoIP-based conversation.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 12:04:40 GMT"
}
] | 2007-06-22T00:00:00 | [
[
"Condado",
"Paulo A.",
""
],
[
"Lobo",
"Fernando G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.3146 | Hao Hu | Hao Hu, Steven Myers, Vittoria Colizza, Alessandro Vespignani | WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick? | 22 pages, 1 table, 4 figures | Proceedings of the National Academy of Sciences, vol. 106, no. 5,
1318-1323 (2009) | 10.1073/pnas.0811973106 | null | cs.CR physics.soc-ph | null | In densely populated urban areas WiFi routers form a tightly interconnected
proximity network that can be exploited as a substrate for the spreading of
malware able to launch massive fraudulent attack and affect entire urban areas
WiFi networks. In this paper we consider several scenarios for the deployment
of malware that spreads solely over the wireless channel of major urban areas
in the US. We develop an epidemiological model that takes into consideration
prevalent security flaws on these routers. The spread of such a contagion is
simulated on real-world data for geo-referenced wireless routers. We uncover a
major weakness of WiFi networks in that most of the simulated scenarios show
tens of thousands of routers infected in as little time as two weeks, with the
majority of the infections occurring in the first 24 to 48 hours. We indicate
possible containment and prevention measure to limit the eventual harm of such
an attack.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 19:36:21 GMT"
}
] | 2009-02-11T00:00:00 | [
[
"Hu",
"Hao",
""
],
[
"Myers",
"Steven",
""
],
[
"Colizza",
"Vittoria",
""
],
[
"Vespignani",
"Alessandro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0706.3159 | Pierre Deransart | Pierre Deransart (INRIA Rocquencourt), Mireille Ducass\'e (IRISA),
G\'erard Ferrand (LIFO) | Une s\'emantique observationnelle du mod\`ele des bo\^ites pour la
r\'esolution de programmes logiques (version \'etendue) | Project of research report used to produce the paper presented at
JFPC 2007 | null | null | null | cs.PL cs.SE | null | This report specifies an observational semantics and gives an original
presentation of the Byrd's box model. The approach accounts for the semantics
of Prolog tracers independently of a particular implementation. Traces are, in
general, considered as rather obscure and difficult to use. The proposed formal
presentation of a trace constitutes a simple and pedagogical approach for
teaching Prolog or for implementing Prolog tracers. It constitutes a form of
declarative specification for the tracers. Our approach highlights qualities of
the box model which made its success, but also its drawbacks and limits. As a
matter of fact, the presented semantics is only one example to illustrate
general problems relating to tracers and observing processes. Observing
processes know, from observed processes, only their traces. The issue is then
to be able to reconstitute by the sole analysis of the trace the main part of
the observed process, and if possible, without any loss of information.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 14:20:30 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jun 2007 14:03:05 GMT"
}
] | 2007-06-25T00:00:00 | [
[
"Deransart",
"Pierre",
"",
"INRIA Rocquencourt"
],
[
"Ducassé",
"Mireille",
"",
"IRISA"
],
[
"Ferrand",
"Gérard",
"",
"LIFO"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0706.3165 | Hichem Geryville | Hichem Geryville (LIESP), Abdelaziz Bouras (LIESP), Yacine Ouzrout
(LIESP), Nikolaos Sapidis | A solution for actors' viewpoints representation with collaborative
product development | ISBN: 2-287-48363-9 | Research in Interactive Design (2007) 39-40 | 10.1007/978-2-287-48370-7 | null | cs.HC | null | As product complexity and marketing competition increase, a collaborative
product development is necessary for companies which develop high quality
products in short lead-times. To support product actors from different fields,
disciplines, and locations, wishing to exchange and share information, the
representation of the actors' viewpoints is the underlying requirement of the
collaborative product development. The actors' viewpoints approach was designed
to provide an organisational framework following the actors' perspectives in
the collaboration, and their relationships, could be explicitly gathered and
formatted. The approach acknowledges the inevitability of multiple integration
of product information as different views, promotes gathering of actors'
interests, and encourages retrieved adequate information while providing
support for integration through PLM and/or SCM collaboration. In this paper, a
solution for neutral viewpoints representation is proposed. The product,
process, and organisation information models are seriatim discussed. A series
of issues referring to the viewpoints representation are discussed in detail.
Based on XML standard, taking cyclone vessel as an example, an application case
of part of product information modelling is stated.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 14:40:25 GMT"
}
] | 2007-06-22T00:00:00 | [
[
"Geryville",
"Hichem",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
],
[
"Ouzrout",
"Yacine",
"",
"LIESP"
],
[
"Sapidis",
"Nikolaos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0706.3170 | Keigo Takeuchi | Keigo Takeuchi, Toshiyuki Tanaka, and Toru Yano | Asymptotic Analysis of General Multiuser Detectors in MIMO DS-CDMA
Channels | Submitted to IEEE Journal on Selected Areas in Communications | null | 10.1109/JSAC.2008.080407 | null | cs.IT math.IT | null | We analyze a MIMO DS-CDMA channel with a general multiuser detector including
a nonlinear multiuser detector, using the replica method. In the many-user,
limit the MIMO DS-CDMA channel with the multiuser detector is decoupled into a
bank of single-user SIMO Gaussian channels if a spatial spreading scheme is
employed. On the other hand, it is decoupled into a bank of single-user MIMO
Gaussian channels if a spatial spreading scheme is not employed. The spectral
efficiency of the MIMO DS-CDMA channel with the spatial spreading scheme is
comparable with that of the MIMO DS-CDMA channel using an optimal space-time
block code without the spatial spreading scheme. In the case of the QPSK data
modulation scheme the spectral efficiency of the MIMO DS-CDMA channel with the
MMSE detector shows {\it waterfall} behavior and is very close to the
corresponding sum capacity when the system load is just below the transition
point of the {\it waterfall} behavior. Our result implies that the performance
of a multiuser detector taking the data modulation scheme into consideration
can be far superior to that of linear multiuser detectors.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 15:05:28 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Takeuchi",
"Keigo",
""
],
[
"Tanaka",
"Toshiyuki",
""
],
[
"Yano",
"Toru",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3188 | Vladimir Vovk | Glenn Shafer and Vladimir Vovk | A tutorial on conformal prediction | 58 pages, 9 figures | Journal of Machine Learning Research 9 (2008) 371-421.
http://www.jmlr.org/papers/v9/shafer08a.html | null | null | cs.LG stat.ML | null | Conformal prediction uses past experience to determine precise levels of
confidence in new predictions. Given an error probability $\epsilon$, together
with a method that makes a prediction $\hat{y}$ of a label $y$, it produces a
set of labels, typically containing $\hat{y}$, that also contains $y$ with
probability $1-\epsilon$. Conformal prediction can be applied to any method for
producing $\hat{y}$: a nearest-neighbor method, a support-vector machine, ridge
regression, etc.
Conformal prediction is designed for an on-line setting in which labels are
predicted successively, each one being revealed before the next is predicted.
The most novel and valuable feature of conformal prediction is that if the
successive examples are sampled independently from the same distribution, then
the successive predictions will be right $1-\epsilon$ of the time, even though
they are based on an accumulating dataset rather than on independent datasets.
In addition to the model under which successive examples are sampled
independently, other on-line compression models can also use conformal
prediction. The widely used Gaussian linear model is one of these.
This tutorial presents a self-contained account of the theory of conformal
prediction and works through several numerical examples. A more comprehensive
treatment of the topic is provided in "Algorithmic Learning in a Random World",
by Vladimir Vovk, Alex Gammerman, and Glenn Shafer (Springer, 2005).
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2007 16:40:06 GMT"
}
] | 2019-04-23T00:00:00 | [
[
"Shafer",
"Glenn",
""
],
[
"Vovk",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0706.3295 | Beniamin Mounits Mr | Beniamin Mounits | Lower bounds on the minimum average distance of binary codes | 19 pages | null | null | null | cs.IT math.CO math.IT | null | New lower bounds on the minimum average Hamming distance of binary codes are
derived. The bounds are obtained using linear programming approach.
| [
{
"version": "v1",
"created": "Fri, 22 Jun 2007 09:32:50 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Mounits",
"Beniamin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3305 | Ayan Mahalanobis | Ayan Mahalanobis | A simple generalization of the ElGamal cryptosystem to non-abelian
groups II | null | null | null | null | cs.CR math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is a study of the MOR cryptosystem using the special linear group over
finite fields. The automorphism group of the special linear group is analyzed
for this purpose. At our current state of knowledge, I show that the MOR
cryptosystem has better security than the ElGamal cryptosystem over finite
fields.
| [
{
"version": "v1",
"created": "Fri, 22 Jun 2007 10:28:28 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jun 2007 16:41:57 GMT"
},
{
"version": "v3",
"created": "Sat, 29 Dec 2007 21:36:10 GMT"
},
{
"version": "v4",
"created": "Fri, 6 Mar 2009 19:09:55 GMT"
},
{
"version": "v5",
"created": "Tue, 25 Jan 2011 04:57:52 GMT"
}
] | 2011-01-26T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
0706.3341 | Christophe Fouquere | Christophe Fouquer\'e (LIPN) | A Sequent Calculus for Modelling Interferences | null | null | null | null | cs.LO | null | A logic calculus is presented that is a conservative extension of linear
logic. The motivation beneath this work concerns lazy evaluation, true
concurrency and interferences in proof search. The calculus includes two new
connectives to deal with multisequent structures and has the cut-elimination
property. Extensions are proposed that give first results concerning our
objectives.
| [
{
"version": "v1",
"created": "Fri, 22 Jun 2007 14:24:34 GMT"
}
] | 2007-06-25T00:00:00 | [
[
"Fouqueré",
"Christophe",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0706.3350 | Veronika Rehn-Sonigo | Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes, LIP) | Optimal Replica Placement in Tree Networks with QoS and Bandwidth
Constraints and the Closest Allocation Policy | null | null | null | null | cs.DC | null | This paper deals with the replica placement problem on fully homogeneous tree
networks known as the Replica Placement optimization problem. The client
requests are known beforehand, while the number and location of the servers are
to be determined. We investigate the latter problem using the Closest access
policy when adding QoS and bandwidth constraints. We propose an optimal
algorithm in two passes using dynamic programming.
| [
{
"version": "v1",
"created": "Fri, 22 Jun 2007 15:01:35 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jun 2007 14:06:26 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Jun 2007 15:24:39 GMT"
}
] | 2007-06-28T00:00:00 | [
[
"Rehn-Sonigo",
"Veronika",
"",
"INRIA Rhône-Alpes, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0706.3412 | Blai Bonet | Nerio Borges, Blai Bonet | On Canonical Forms of Complete Problems via First-order Projections | 9 pages | null | null | null | cs.CC | null | The class of problems complete for NP via first-order reductions is known to
be characterized by existential second-order sentences of a fixed form. All
such sentences are built around the so-called generalized IS-form of the
sentence that defines Independent-Set. This result can also be understood as
that every sentence that defines a NP-complete problem P can be decomposed in
two disjuncts such that the first one characterizes a fragment of P as hard as
Independent-Set and the second the rest of P. That is, a decomposition that
divides every such sentence into a quotient and residue modulo Independent-Set.
In this paper, we show that this result can be generalized over a wide
collection of complexity classes, including the so-called nice classes.
Moreover, we show that such decomposition can be done for any complete problem
with respect to the given class, and that two such decompositions are
non-equivalent in general. Interestingly, our results are based on simple and
well-known properties of first-order reductions.ow that this result can be
generalized over a wide collection of complexity classes, including the
so-called nice classes. Moreover, we show that such decomposition can be done
for any complete problem with respect to the given class, and that two such
decompositions are non-equivalent in general. Interestingly, our results are
based on simple and well-known properties of first-order reductions.
| [
{
"version": "v1",
"created": "Fri, 22 Jun 2007 21:27:06 GMT"
}
] | 2007-06-26T00:00:00 | [
[
"Borges",
"Nerio",
""
],
[
"Bonet",
"Blai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0706.3430 | Caleb Lo | Caleb K. Lo, Robert W. Heath Jr. and Sriram Vishwanath | The Impact of Channel Feedback on Opportunistic Relay Selection for
Hybrid-ARQ in Wireless Networks | 30 pages, 9 figures, submitted to the IEEE Transactions on Vehicular
Technology, revised March 2008 | null | 10.1109/TVT.2008.928896 | null | cs.IT math.IT | null | This paper presents a decentralized relay selection protocol for a dense
wireless network and describes channel feedback strategies that improve its
performance. The proposed selection protocol supports hybrid
automatic-repeat-request transmission where relays forward parity information
to the destination in the event of a decoding error. Channel feedback is
employed for refining the relay selection process and for selecting an
appropriate transmission mode in a proposed adaptive modulation transmission
framework. An approximation of the throughput of the proposed adaptive
modulation strategy is presented, and the dependence of the throughput on
system parameters such as the relay contention probability and the adaptive
modulation switching point is illustrated via maximization of this
approximation. Simulations show that the throughput of the proposed selection
strategy is comparable to that yielded by a centralized selection approach that
relies on geographic information.
| [
{
"version": "v1",
"created": "Sat, 23 Jun 2007 06:19:41 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Jan 2008 21:15:03 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Apr 2008 00:02:32 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Lo",
"Caleb K.",
""
],
[
"Heath",
"Robert W.",
"Jr."
],
[
"Vishwanath",
"Sriram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0706.3459 | Gabor Kun | Gabor Kun, Jaroslav Nesetril | NP by means of lifts and shadows | 12 pages, conference (MFCS07) version of 0706.1704 | null | null | null | cs.CC math.CO | null | We show that every NP problem is polynomially equivalent to a simple
combinatorial problem: the membership problem for a special class of digraphs.
These classes are defined by means of shadows (projections) and by finitely
many forbidden colored (lifted) subgraphs. Our characterization is motivated by
the analysis of syntactical subclasses with the full computational power of NP,
which were first studied by Feder and Vardi.
Our approach applies to many combinatorial problems and it induces the
characterization of coloring problems (CSP) defined by means of shadows. This
turns out to be related to homomorphism dualities. We prove that a class of
digraphs (relational structures) defined by finitely many forbidden colored
subgraphs (i.e. lifted substructures) is a CSP class if and only if all the the
forbidden structures are homomorphically equivalent to trees. We show a
surprising richness of coloring problems when restricted to most frequent graph
classes. Using results of Ne\v{s}et\v{r}il and Ossona de Mendez for bounded
expansion classes (which include bounded degree and proper minor closed
classes) we prove that the restriction of every class defined as the shadow of
finitely many colored subgraphs equals to the restriction of a coloring (CSP)
class.
| [
{
"version": "v1",
"created": "Sat, 23 Jun 2007 15:40:43 GMT"
}
] | 2007-06-27T00:00:00 | [
[
"Kun",
"Gabor",
""
],
[
"Nesetril",
"Jaroslav",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |