id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0707.1008 | Mich\`ele Wigger | Amos Lapidoth, Shlomo Shamai (Shitz), Michele A. Wigger | On Cognitive Interference Networks | to appear in Proceedings of 2007 IEEE Information Theory Workshop
(ITW) in Lake Tahoe | null | 10.1109/ITW.2007.4313095 | null | cs.IT math.IT | null | We study the high-power asymptotic behavior of the sum-rate capacity of
multi-user interference networks with an equal number of transmitters and
receivers. We assume that each transmitter is cognizant of the message it
wishes to convey to its corresponding receiver and also of the messages that a
subset of the other transmitters wish to send. The receivers are assumed not to
be able to cooperate in any way so that they must base their decision on the
signal they receive only. We focus on the network's pre-log, which is defined
as the limiting ratio of the sum-rate capacity to half the logarithm of the
transmitted power. We present both upper and lower bounds on the network's
pre-log. The lower bounds are based on a linear partial-cancellation scheme
which entails linearly transforming Gaussian codebooks so as to eliminate the
interference in a subset of the receivers. Inter alias, the bounds give a
complete characterization of the networks and side-information settings that
result in a full pre-log, i.e., in a pre-log that is equal to the number of
transmitters (and receivers) as well as a complete characterization of networks
whose pre-log is equal to the full pre-log minus one. They also fully
characterize networks where the full pre-log can only be achieved if each
transmitter knows the messages of all users, i.e., when the side-information is
"full".
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 16:17:52 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Lapidoth",
"Amos",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
],
[
"Wigger",
"Michele A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1025 | Sergei Fedorenko | Sergei Fedorenko | The star trellis decoding of Reed-Solomon codes | 6 pages. Proceedings of the XI international symposium on problems of
redundancy in information and control systems at St.Petersburg, Russia, July
2007, pp.58-61 | null | null | null | cs.IT math.IT | null | The new method for Reed-Solomon codes decoding is introduced. The method is
based on the star trellis decoding of the binary image of Reed-Solomon codes.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 17:32:56 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Fedorenko",
"Sergei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1051 | Mark Braverman | Mark Braverman, Elchanan Mossel | Noisy Sorting Without Resampling | null | null | null | null | cs.DS | null | In this paper we study noisy sorting without re-sampling. In this problem
there is an unknown order $a_{\pi(1)} < ... < a_{\pi(n)}$ where $\pi$ is a
permutation on $n$ elements. The input is the status of $n \choose 2$ queries
of the form $q(a_i,x_j)$, where $q(a_i,a_j) = +$ with probability at least
$1/2+\ga$ if $\pi(i) > \pi(j)$ for all pairs $i \neq j$, where $\ga > 0$ is a
constant and $q(a_i,a_j) = -q(a_j,a_i)$ for all $i$ and $j$. It is assumed that
the errors are independent. Given the status of the queries the goal is to find
the maximum likelihood order. In other words, the goal is find a permutation
$\sigma$ that minimizes the number of pairs $\sigma(i) > \sigma(j)$ where
$q(\sigma(i),\sigma(j)) = -$. The problem so defined is the feedback arc set
problem on distributions of inputs, each of which is a tournament obtained as a
noisy perturbations of a linear order. Note that when $\ga < 1/2$ and $n$ is
large, it is impossible to recover the original order $\pi$.
It is known that the weighted feedback are set problem on tournaments is
NP-hard in general. Here we present an algorithm of running time
$n^{O(\gamma^{-4})}$ and sampling complexity $O_{\gamma}(n \log n)$ that with
high probability solves the noisy sorting without re-sampling problem. We also
show that if $a_{\sigma(1)},a_{\sigma(2)},...,a_{\sigma(n)}$ is an optimal
solution of the problem then it is ``close'' to the original order. More
formally, with high probability it holds that $\sum_i |\sigma(i) - \pi(i)| =
\Theta(n)$ and $\max_i |\sigma(i) - \pi(i)| = \Theta(\log n)$.
Our results are of interest in applications to ranking, such as ranking in
sports, or ranking of search items based on comparisons by experts.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 21:30:24 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Braverman",
"Mark",
""
],
[
"Mossel",
"Elchanan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.1053 | Sudhir Kumar Singh | Sudhir Kumar Singh, Vwani P. Roychowdhury, Milan Bradonji\'c, Behnam
A. Rezaei | Exploration via design and the cost of uncertainty in keyword auctions | 19 pages, presentation improved, references added, title changed | null | null | null | cs.GT | null | We present a deterministic exploration mechanism for sponsored search
auctions, which enables the auctioneer to learn the relevance scores of
advertisers, and allows advertisers to estimate the true value of clicks
generated at the auction site. This exploratory mechanism deviates only
minimally from the mechanism being currently used by Google and Yahoo! in the
sense that it retains the same pricing rule, similar ranking scheme, as well
as, similar mathematical structure of payoffs. In particular, the estimations
of the relevance scores and true-values are achieved by providing a chance to
lower ranked advertisers to obtain better slots. This allows the search engine
to potentially test a new pool of advertisers, and correspondingly, enables new
advertisers to estimate the value of clicks/leads generated via the auction.
Both these quantities are unknown a priori, and their knowledge is necessary
for the auction to operate efficiently. We show that such an exploration policy
can be incorporated without any significant loss in revenue for the auctioneer.
We compare the revenue of the new mechanism to that of the standard mechanism
at their corresponding symmetric Nash equilibria and compute the cost of
uncertainty, which is defined as the relative loss in expected revenue per
impression. We also bound the loss in efficiency, as well as, in user
experience due to exploration, under the same solution concept (i.e. SNE). Thus
the proposed exploration mechanism learns the relevance scores while
incorporating the incentive constraints from the advertisers who are selfish
and are trying to maximize their own profits, and therefore, the exploration is
essentially achieved via mechanism design. We also discuss variations of the
new mechanism such as truthful implementations.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 22:11:17 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Nov 2007 07:02:26 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
],
[
"Bradonjić",
"Milan",
""
],
[
"Rezaei",
"Behnam A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0707.1057 | Sudhir Kumar Singh | Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A.
Rezaei | For-profit mediators in sponsored search advertising | 6 pages | null | null | null | cs.GT | null | A mediator is a well-known construct in game theory, and is an entity that
plays on behalf of some of the agents who choose to use its services, while the
rest of the agents participate in the game directly. We initiate a game
theoretic study of sponsored search auctions, such as those used by Google and
Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators
as {\em for-profit} mediators, so as to distinguish them from mediators
introduced in prior work, who have no monetary incentives, and are driven by
the altruistic goal of implementing certain desired outcomes. We show that in
our model, (i) players/advertisers can improve their payoffs by choosing to use
the services of the mediator, compared to directly participating in the
auction; (ii) the mediator can obtain monetary benefit by managing the
advertising burden of its group of advertisers; and (iii) the payoffs of the
mediator and the advertisers it plays for are compatible with the incentive
constraints from the advertisers who do dot use its services. A simple
intuition behind the above result comes from the observation that the mediator
has more information about and more control over the bid profile than any
individual advertiser, allowing her to reduce the payments made to the
auctioneer, while still maintaining incentive constraints. Further, our results
indicate that there are significant opportunities for diversification in the
internet economy and we should expect it to continue to develop richer
structure, with room for different types of agents to coexist.
| [
{
"version": "v1",
"created": "Sat, 7 Jul 2007 03:18:26 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Sep 2007 12:19:30 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
],
[
"Gunadhi",
"Himawan",
""
],
[
"Rezaei",
"Behnam A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0707.1059 | Alban Ponse | Jan A. Bergstra and Alban Ponse | Projection semantics for rigid loops | 20 pages | null | null | PRG0604 | cs.PL | null | A rigid loop is a for-loop with a counter not accessible to the loop body or
any other part of a program. Special instructions for rigid loops are
introduced on top of the syntax of the program algebra PGA. Two different
semantic projections are provided and proven equivalent. One of these is taken
to have definitional status on the basis of two criteria: `normative semantic
adequacy' and `indicative algorithmic adequacy'.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2007 23:58:45 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Ponse",
"Alban",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0707.1063 | Animesh Kumar | Animesh Kumar, Prakash Ishwar, and Kannan Ramchandran | High-resolution distributed sampling of bandlimited fields with
low-precision sensors | 17 pages, 6 figures; paper withdrawn from IEEE Transactions on Signal
Processing and re-submitted to the IEEE Transactions on Information Theory | null | 10.1109/TIT.2010.2090194 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of sampling a discrete-time sequence of spatially bandlimited
fields with a bounded dynamic range, in a distributed,
communication-constrained, processing environment is addressed. A central unit,
having access to the data gathered by a dense network of fixed-precision
sensors, operating under stringent inter-node communication constraints, is
required to reconstruct the field snapshots to maximum accuracy. Both
deterministic and stochastic field models are considered. For stochastic
fields, results are established in the almost-sure sense. The feasibility of
having a flexible tradeoff between the oversampling rate (sensor density) and
the analog-to-digital converter (ADC) precision, while achieving an exponential
accuracy in the number of bits per Nyquist-interval per snapshot is
demonstrated. This exposes an underlying ``conservation of bits'' principle:
the bit-budget per Nyquist-interval per snapshot (the rate) can be distributed
along the amplitude axis (sensor-precision) and space (sensor density) in an
almost arbitrary discrete-valued manner, while retaining the same (exponential)
distortion-rate characteristics. Achievable information scaling laws for field
reconstruction over a bounded region are also derived: With N one-bit sensors
per Nyquist-interval, $\Theta(\log N)$ Nyquist-intervals, and total network
bitrate $R_{net} = \Theta((\log N)^2)$ (per-sensor bitrate $\Theta((\log
N)/N)$), the maximum pointwise distortion goes to zero as $D = O((\log N)^2/N)$
or $D = O(R_{net} 2^{-\beta \sqrt{R_{net}}})$. This is shown to be possible
with only nearest-neighbor communication, distributed coding, and appropriate
interpolation algorithms. For a fixed, nonzero target distortion, the number of
fixed-precision sensors and the network rate needed is always finite.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 16:17:20 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 17:36:43 GMT"
},
{
"version": "v3",
"created": "Sat, 25 Aug 2007 20:40:03 GMT"
},
{
"version": "v4",
"created": "Thu, 11 Dec 2008 01:59:46 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Kumar",
"Animesh",
""
],
[
"Ishwar",
"Prakash",
""
],
[
"Ramchandran",
"Kannan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1064 | Krishna Srikanth Gomadam | Krishna S. Gomadam and Syed A. Jafar | The Effect of Noise Correlation in AF Relay Networks | 32 pages | null | null | null | cs.IT math.IT | null | In wireless relay networks, noise at the relays can be correlated possibly
due to common interference or noise propagation from preceding hops. In this
work we consider a parallel relay network with noise correlation. For the relay
strategy of amplify-and-forward (AF), we determine the optimal rate maximizing
relay gains when correlation knowledge is available at the relays. The effect
of correlation on the performance of the relay networks is analyzed for the
cases where full knowledge of correlation is available at the relays and when
there is no knowledge about the correlation structure. Interestingly we find
that, on the average, noise correlation is beneficial regardless of whether the
relays know the noise covariance matrix or not. However, the knowledge of
correlation can greatly improve the performance. Typically, the performance
improvement from correlation knowledge increases with the relay power and the
number of relays. With perfect correlation knowledge the system is capable of
canceling interference if the number of interferers is less than the number of
relays.
For a dual-hop multiple access parallel network, we obtain closed form
expressions for the maximum sum-rate and the optimal relay strategy. The relay
optimization for networks with three hops is also considered. For any relay
gains for the first stage relays, this represents a parallel relay network with
correlated noise. Based on the result of two hop networks with noise
correlation, we propose an algorithm for solving the relay optimization problem
for three-hop networks.
| [
{
"version": "v1",
"created": "Sat, 7 Jul 2007 18:43:22 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gomadam",
"Krishna S.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1083 | Viktoria Rojkova | Viktoria Rojkova, Mehmed Kantardzic | Delayed Correlations in Inter-Domain Network Traffic | submitted to CoNext 2007 | null | null | null | cs.NI cs.IR | null | To observe the evolution of network traffic correlations we analyze the
eigenvalue spectra and eigenvectors statistics of delayed correlation matrices
of network traffic counts time series. Delayed correlation matrix D is composed
of the correlations between one variable in the multivariable time series and
another at a time delay \tau . Inverse participation ratio (IPR) of
eigenvectors of D deviates substantially from the IPR of eigenvectors of the
equal time correlation matrix C. We relate this finding to the localization and
discuss its importance for network congestion control. The time-lagged
correlation pattern between network time series is preserved over a long time,
up to 100\tau, where \tau=300 sec. The largest eigenvalue \lambda_{max} of D
and the corresponding IPR oscillate with two characteristic periods of 3\tau
and 6\tau . The existence of delayed correlations between network time series
fits well into the long range dependence (LRD) property of the network traffic.
The ability to monitor and control the long memory processes is crucial since
they impact the network performance. Injecting the random traffic counts
between non-randomly correlated time series, we were able to break the picture
of periodicity of \lambda_{max}. In addition, we investigated influence of the
periodic injections on both largest eigenvalue and the IPR, and addressed
relevance of these indicators for the LRD and self-similarity of the network
traffic.
| [
{
"version": "v1",
"created": "Sat, 7 Jul 2007 19:01:51 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Rojkova",
"Viktoria",
""
],
[
"Kantardzic",
"Mehmed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0707.1095 | Gregory Gutin | Noga Alon, Fedor V. Fomin, Gregory Gutin, Michael Krivelevich, Saket
Saurabh | Better Algorithms and Bounds for Directed Maximum Leaf Problems | null | null | null | null | cs.DS cs.DM | null | The {\sc Directed Maximum Leaf Out-Branching} problem is to find an
out-branching (i.e. a rooted oriented spanning tree) in a given digraph with
the maximum number of leaves. In this paper, we improve known parameterized
algorithms and combinatorial bounds on the number of leaves in out-branchings.
We show that
\begin{itemize} \item every strongly connected digraph $D$ of order $n$ with
minimum in-degree at least 3 has an out-branching with at least $(n/4)^{1/3}-1$
leaves; \item if a strongly connected digraph $D$ does not contain an
out-branching with $k$ leaves, then the pathwidth of its underlying graph is
$O(k\log k)$; \item it can be decided in time $2^{O(k\log^2 k)}\cdot n^{O(1)}$
whether a strongly connected digraph on $n$ vertices has an out-branching with
at least $k$ leaves. \end{itemize}
All improvements use properties of extremal structures obtained after
applying local search and of some out-branching decompositions.
| [
{
"version": "v1",
"created": "Sat, 7 Jul 2007 15:52:29 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Fomin",
"Fedor V.",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Krivelevich",
"Michael",
""
],
[
"Saurabh",
"Saket",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.1099 | Samar Agnihotri | Samar Agnihotri and Pavan Nuggehalli | Worst-Case Interactive Communication and Enhancing Sensor Network
Lifetime | Minor revision: fixed some typos and reorganized some portions. 12
pages, 3 figures | null | null | null | cs.IT math.IT | null | We are concerned with the problem of maximizing the worst-case lifetime of a
data-gathering wireless sensor network consisting of a set of sensor nodes
directly communicating with a base-station.We propose to solve this problem by
modeling sensor node and base-station communication as the interactive
communication between multiple correlated informants (sensor nodes) and a
recipient (base-station). We provide practical and scalable interactive
communication protocols for data gathering in sensor networks and demonstrate
their efficiency compared to traditional approaches.
In this paper, we first develop a formalism to address the problem of
worst-case interactive communication between a set of multiple correlated
informants and a recipient. We realize that there can be different objectives
to achieve in such a communication scenario and compute the optimal number of
messages and bits exchanged to realize these objectives. Then, we propose to
adapt these results in the context of single-hop data-gathering sensor
networks. Finally, based on this proposed formalism, we propose a clustering
based communication protocol for large sensor networks and demonstrate its
superiority over a traditional clustering protocol.
| [
{
"version": "v1",
"created": "Sat, 7 Jul 2007 18:06:36 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jul 2007 10:41:29 GMT"
},
{
"version": "v3",
"created": "Sat, 3 Nov 2007 13:30:47 GMT"
}
] | 2007-11-03T00:00:00 | [
[
"Agnihotri",
"Samar",
""
],
[
"Nuggehalli",
"Pavan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1151 | Philip Baback Alipour | P. B. Alipour | Logic, Design & Organization of PTVD-SHAM; A Parallel Time Varying &
Data Super-helical Access Memory | 34 pages, 5 figures (2 multi-figures), 1 table. v.1 & v.2: corrupt
file layout due to *.doc file's bad conversion; v.3: fig.2.1 corruption; v.4:
correction to v.1-3; v.5: major content revision, spacing levelled; v.6+:
theorems, hypotheses content, restructured and conformed with its new topic
[arXiv:0710.0244v1] published in cs.CE category. (Avoid corrupted versions.) | null | null | null | cs.AR | null | This paper encompasses a super helical memory system's design, 'Boolean logic
& image-logic' as a theoretical concept of an invention-model to 'store
time-data' in terms of anticipating the best memory location ever for
data/time. A waterfall effect is deemed to assist the process of
potential-difference output-switch into diverse logic states in quantum dot
computational methods via utilizing coiled carbon nanotubes (CCNTs) and carbon
nanotube field effect transistors (CNFETs). A 'quantum confinement' is thus
derived for a flow of particles in a categorized quantum well substrate with a
normalized capacitance rectifying high B-field flux into electromagnetic
induction. Multi-access of coherent sequences of 'qubit addressing' is gained
in any magnitude as pre-defined for the orientation of array displacement.
Briefly, Gaussian curvature of k<0 is debated in aim of specifying the 2D
electron gas characteristics in scenarios where data is stored in short
intervals versus long ones e.g. when k'>(k<0) for greater CCNT diameters,
space-time continuum is folded by chance for the particle. This benefits from
Maxwell-Lorentz theory in Minkowski's space-time viewpoint alike to crystal
oscillators for precise data timing purposes and radar systems e.g., time
varying self-clocking devices in diverse geographic locations. This application
could also be optional for data depository versus extraction, in the best
supercomputer system's locations, autonomously. For best performance in
minimizing current limiting mechanisms including electromigration, a multilevel
metallization and implant process forming elevated sources/drains for the
circuit's staircase pyramidal construction, is discussed accordingly.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 19:26:06 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Jul 2007 20:48:51 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jul 2007 18:36:06 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Jul 2007 20:06:57 GMT"
},
{
"version": "v5",
"created": "Wed, 18 Jul 2007 11:22:22 GMT"
},
{
"version": "v6",
"created": "Tue, 2 Oct 2007 16:31:53 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Alipour",
"P. B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0707.1176 | Deepak Chermakani Mr | Deepak Chermakani | Expressing an NP-Complete Problem as the Solvability of a Polynomial
Equation | 7 pages | null | null | null | cs.CC cs.DM | null | We demonstrate a polynomial approach to express the decision version of the
directed Hamiltonian Cycle Problem (HCP), which is NP-Complete, as the
Solvability of a Polynomial Equation with a constant number of variables,
within a bounded real space. We first introduce four new Theorems for a set of
periodic Functions with irrational periods, based on which we then use a
trigonometric substitution, to show how the HCP can be expressed as the
Solvability of a single polynomial Equation with a constant number of
variables. The feasible solution of each of these variables is bounded within
two real numbers. We point out what future work is necessary to prove that
P=NP.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 04:49:47 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jul 2007 14:08:41 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Chermakani",
"Deepak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.1193 | Damien Chablat | Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Singular curves and cusp points in the joint space of 3-RPR parallel
manipulators | null | International Conference On Robotics And Automation (2006) 1-6 | null | null | cs.RO | null | This paper investigates the singular curves in two-dimensional slices of the
joint space of a family of planar parallel manipulators. It focuses on special
points, referred to as cusp points, which may appear on these curves. Cusp
points play an important role in the kinematic behavior of parallel
manipulators since they make possible a nonsingular change of assembly mode.
The purpose of this study is twofold. First, it reviews an important previous
work, which, to the authors' knowledge, has never been exploited yet. Second,
it determines the cusp points in any two-dimensional slice of the joint space.
First results show that the number of cusp points may vary from zero to eight.
This work finds applications in both design and trajectory planning.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 07:38:47 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Zein",
"Mazen",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.1241 | Mohammad H. Taghavi | Mohammad H. Taghavi, Paul H. Siegel | Graph-Based Decoding in the Presence of ISI | 25 pages, 8 figures, Submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2011.2110070 | null | cs.IT math.IT | null | We propose an approximation of maximum-likelihood detection in ISI channels
based on linear programming or message passing. We convert the detection
problem into a binary decoding problem, which can be easily combined with LDPC
decoding. We show that, for a certain class of channels and in the absence of
coding, the proposed technique provides the exact ML solution without an
exponential complexity in the size of channel memory, while for some other
channels, this method has a non-diminishing probability of failure as SNR
increases. Some analysis is provided for the error events of the proposed
technique under linear programming.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 12:35:41 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Taghavi",
"Mohammad H.",
""
],
[
"Siegel",
"Paul H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1266 | Pierre-Yves Strub | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud
(INRIA Futurs), Pierre-Yves Strub (INRIA Futurs) | Building Decision Procedures in the Calculus of Inductive Constructions | null | Dans 16th EACSL Annual Conference on Computer Science and Logic -
CSL 2007 (2007) | null | null | cs.LO | null | It is commonly agreed that the success of future proof assistants will rely
on their ability to incorporate computations within deduction in order to mimic
the mathematician when replacing the proof of a proposition P by the proof of
an equivalent proposition P' obtained from P thanks to possibly complex
calculations. In this paper, we investigate a new version of the calculus of
inductive constructions which incorporates arbitrary decision procedures into
deduction via the conversion rule of the calculus. The novelty of the problem
in the context of the calculus of inductive constructions lies in the fact that
the computation mechanism varies along proof-checking: goals are sent to the
decision procedure together with the set of user hypotheses available from the
current context. Our main result shows that this extension of the calculus of
constructions does not compromise its main properties: confluence, subject
reduction, strong normalization and consistency are all preserved.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 14:35:14 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Jouannaud",
"Jean-Pierre",
"",
"INRIA Futurs"
],
[
"Strub",
"Pierre-Yves",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.1288 | Kamel Aouiche | Riadh Ben Messaoud and Kamel Aouiche and C\'ecile Favre | Espaces de repr\'esentation multidimensionnels d\'edi\'es \`a la
visualisation | null | null | null | null | cs.DB | null | In decision-support systems, the visual component is important for On Line
Analysis Processing (OLAP). In this paper, we propose a new approach that faces
the visualization problem due to data sparsity. We use the results of a
Multiple Correspondence Analysis (MCA) to reduce the negative effect of
sparsity by organizing differently data cube cells. Our approach does not
reduce sparsity, however it tries to build relevant representation spaces where
facts are efficiently gathered. In order to evaluate our approach, we propose
an homogeneity criterion based on geometric neighborhood of cells. The obtained
experimental results have shown the efficiency of our method.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 15:52:02 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Messaoud",
"Riadh Ben",
""
],
[
"Aouiche",
"Kamel",
""
],
[
"Favre",
"Cécile",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.1295 | Riccardo Zecchina | Carlo Baldassi, Alfredo Braunstein, Nicolas Brunel, Riccardo Zecchina | Efficient supervised learning in networks with binary synapses | 10 pages, 4 figures | PNAS 104, 11079-11084 (2007) | 10.1073/pnas.0700324104 | null | q-bio.NC cond-mat.stat-mech cs.NE q-bio.QM | null | Recent experimental studies indicate that synaptic changes induced by
neuronal activity are discrete jumps between a small number of stable states.
Learning in systems with discrete synapses is known to be a computationally
hard problem. Here, we study a neurobiologically plausible on-line learning
algorithm that derives from Belief Propagation algorithms. We show that it
performs remarkably well in a model neuron with binary synapses, and a finite
number of `hidden' states per synapse, that has to learn a random
classification task. Such system is able to learn a number of associations
close to the theoretical limit, in time which is sublinear in system size. This
is to our knowledge the first on-line algorithm that is able to achieve
efficiently a finite number of patterns learned per binary synapse.
Furthermore, we show that performance is optimal for a finite number of hidden
states which becomes very small for sparse coding. The algorithm is similar to
the standard `perceptron' learning algorithm, with an additional rule for
synaptic transitions which occur only if a currently presented pattern is
`barely correct'. In this case, the synaptic changes are meta-plastic only
(change in hidden states and not in actual synaptic state), stabilizing the
synapse in its current state. Finally, we show that a system with two visible
states and K hidden states is much more robust to noise than a system with K
visible states. We suggest this rule is sufficiently simple to be easily
implemented by neurobiological systems or in hardware.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 16:23:55 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Baldassi",
"Carlo",
""
],
[
"Braunstein",
"Alfredo",
""
],
[
"Brunel",
"Nicolas",
""
],
[
"Zecchina",
"Riccardo",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0707.1304 | Kamel Aouiche | Hadj Mahboubi and Kamel Aouiche and J\'er\^ome Darmont | Un index de jointure pour les entrep\^ots de donn\'ees XML | null | null | null | null | cs.DB | null | XML data warehouses form an interesting basis for decision-support
applications that exploit heterogeneous data from multiple sources. However,
XML-native database systems currently bear limited performances and it is
necessary to research ways to optimize them. In this paper, we propose a new
index that is specifically adapted to the multidimensional architecture of XML
warehouses and eliminates join operations, while preserving the information
contained in the original warehouse. A theoretical study and experimental
results demonstrate the efficiency of our index, even when queries are complex.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 16:58:14 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Mahboubi",
"Hadj",
""
],
[
"Aouiche",
"Kamel",
""
],
[
"Darmont",
"Jérôme",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.1306 | Kamel Aouiche | Nora Maiz and Kamel Aouiche and J\'er\^ome Darmont | S\'election simultan\'ee d'index et de vues mat\'erialis\'ees | null | null | null | null | cs.DB | null | Indices and materialized views are physical structures that accelerate data
access in data warehouses. However, these data structures generate some
maintenance overhead. They also share the same storage space. The existing
studies about index and materialized view selection consider these structures
separately. In this paper, we adopt the opposite stance and couple index and
materialized view selection to take into account the interactions between them
and achieve an efficient storage space sharing. We develop cost models that
evaluate the respective benefit of indexing and view materialization. These
cost models are then exploited by a greedy algorithm to select a relevant
configuration of indices and materialized views. Experimental results show that
our strategy performs better than the independent selection of indices and
materialized views.
| [
{
"version": "v1",
"created": "Mon, 9 Jul 2007 17:23:31 GMT"
}
] | 2007-07-10T00:00:00 | [
[
"Maiz",
"Nora",
""
],
[
"Aouiche",
"Kamel",
""
],
[
"Darmont",
"Jérôme",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.1364 | Robert Gilman | Robert Gilman, Alexei G. Miasnikov, Alexey D. Myasnikov, Alexander
Ushakov | Report on Generic Case Complexity | 17 pages | null | null | null | cs.CC | null | This article is a short introduction to generic case complexity, which is a
recently developed way of measuring the difficulty of a computational problem
while ignoring atypical behavior on a small set of inputs. Generic case
complexity applies to both recursively solvable and recursively unsolvable
problems.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 18:57:08 GMT"
}
] | 2007-07-11T00:00:00 | [
[
"Gilman",
"Robert",
""
],
[
"Miasnikov",
"Alexei G.",
""
],
[
"Myasnikov",
"Alexey D.",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.1372 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA) | Computability Closure: Ten Years Later | null | Dans Colloquium in honor of Jean-Pierre Jouannaud, 4600 (2007) | null | null | cs.LO | null | The notion of computability closure has been introduced for proving the
termination of higher-order rewriting with first-order matching by Jean-Pierre
Jouannaud and Mitsuhiro Okada in a 1997 draft which later served as a basis for
the author's PhD. In this paper, we show how this notion can also be used for
dealing with beta-normalized rewriting with matching modulo beta-eta (on
patterns \`a la Miller), rewriting with matching modulo some equational theory,
and higher-order data types (types with constructors having functional
recursive arguments). Finally, we show how the computability closure can easily
be turned into a reduction ordering which, in the higher-order case, contains
Jean-Pierre Jouannaud and Albert Rubio's higher-order recursive path ordering
and, in the first-order case, is equal to the usual first-order recursive path
ordering.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 06:33:52 GMT"
}
] | 2007-07-11T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.1432 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK), Dominique Duval (LJK), Jean-Claude Reynaud
(RC) | Sequential products in effect categories | null | null | null | null | math.CT cs.PL | null | A new categorical framework is provided for dealing with multiple arguments
in a programming language with effects, for example in a language with
imperative features. Like related frameworks (Monads, Arrows, Freyd
categories), we distinguish two kinds of functions. In addition, we also
distinguish two kinds of equations. Then, we are able to define a kind of
product, that generalizes the usual categorical product. This yields a powerful
tool for deriving many results about languages with effects.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 12:50:35 GMT"
}
] | 2007-07-11T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Duval",
"Dominique",
"",
"LJK"
],
[
"Reynaud",
"Jean-Claude",
"",
"RC"
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0707.1452 | Xavier Polanco | Xavier Polanco (INIST) | Clusters, Graphs, and Networks for Analysing Internet-Web-Supported
Communication within a Virtual Community | null | Advances in Knowledge Organization (2002) 364-371 | null | null | cs.AI cs.LG | null | The proposal is to use clusters, graphs and networks as models in order to
analyse the Web structure. Clusters, graphs and networks provide knowledge
representation and organization. Clusters were generated by co-site analysis.
The sample is a set of academic Web sites from the countries belonging to the
European Union. These clusters are here revisited from the point of view of
graph theory and social network analysis. This is a quantitative and structural
analysis. In fact, the Internet is a computer network that connects people and
organizations. Thus we may consider it to be a social network. The set of Web
academic sites represents an empirical social network, and is viewed as a
virtual community. The network structural properties are here analysed applying
together cluster analysis, graph theory and social network analysis.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 13:47:32 GMT"
}
] | 2007-07-11T00:00:00 | [
[
"Polanco",
"Xavier",
"",
"INIST"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0707.1470 | Yingbin Liang | Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz) | Secrecy Capacity Region of Fading Broadcast Channels | Proc. of IEEE International Symposium on Information Theory (ISIT),
June 2007 | null | 10.1109/ISIT.2007.4557401 | null | cs.IT math.IT | null | The fading broadcast channel with confidential messages (BCC) is
investigated, where a source node has common information for two receivers
(receivers 1 and 2), and has confidential information intended only for
receiver 1. The confidential information needs to be kept as secret as possible
from receiver 2. The channel state information (CSI) is assumed to be known at
both the transmitter and the receivers. The secrecy capacity region is first
established for the parallel Gaussian BCC, and the optimal source power
allocations that achieve the boundary of the secrecy capacity region are
derived. In particular, the secrecy capacity region is established for the
Gaussian case of the Csiszar-Korner BCC model. The secrecy capacity results are
then applied to give the ergodic secrecy capacity region for the fading BCC.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 15:16:13 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Liang",
"Yingbin",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1480 | Rene Chalon | Ren\'e Chalon (ICTT), Bertrand T. David (ICTT) | IRVO: an Interaction Model for designing Collaborative Mixed Reality
systems | 10 pages | Human Computer International 2005, U.S. CD (11/08/2005) 1-10 | null | null | cs.HC | null | This paper presents an interaction model adapted to mixed reality
environments known as IRVO (Interacting with Real and Virtual Objects). IRVO
aims at modeling the interaction between one or more users and the Mixed
Reality system by representing explicitly the objects and tools involved and
their relationship. IRVO covers the design phase of the life cycle and models
the intended use of the system. In a first part, we present a brief review of
related HCI models. The second part is devoted to the IRVO model, its notation
and some examples. In the third part, we present how IRVO is used for designing
applications and in particular we show how this model can be integrated in a
Model-Based Approach (CoCSys) which is currently designed at our lab.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 16:01:30 GMT"
}
] | 2007-07-11T00:00:00 | [
[
"Chalon",
"René",
"",
"ICTT"
],
[
"David",
"Bertrand T.",
"",
"ICTT"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0707.1490 | Gianluca Argentini | Gianluca Argentini | Fast computing of velocity field for flows in industrial burners and
pumps | 14 pages, 5 figures; paper accepted for Special Issue "Application of
distributed and grid computing", Future Generation Computer Systems journal,
2007 | null | null | null | math.NA cs.MS | null | In this work we present a technique of fast numerical computation for
solutions of Navier-Stokes equations in the case of flows of industrial
interest. At first the partial differential equations are translated into a set
of nonlinear ordinary differential equations using the geometrical shape of the
domain where the flow is developing, then these ODEs are numerically resolved
using a set of computations distributed among the available processors. We
present some results from simulations on a parallel hardware architecture using
native multithreads software and simulating a shared-memory or a
distributed-memory environment.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 16:23:43 GMT"
}
] | 2007-07-11T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0707.1501 | Alexander Ushakov | Alexei G. Myasnikov, Alexander Ushakov | Random subgroups and analysis of the length-based and quotient attacks | null | null | null | null | math.GR cs.CR | null | In this paper we discuss generic properties of "random subgroups" of a given
group G. It turns out that in many groups G (even in most exotic of them) the
random subgroups have a simple algebraic structure and they "sit" inside G in a
very particular way. This gives a strong mathematical foundation for
cryptanalysis of several group-based cryptosystems and indicates on how to
chose "strong keys". To illustrate our technique we analyze the
Anshel-Anshel-Goldfeld (AAG) cryptosystem and give a mathematical explanation
of recent success of some heuristic length-based attacks on it. Furthermore, we
design and analyze a new type of attacks, which we term the quotient attacks.
Mathematical methods we develop here also indicate how one can try to choose
"parameters" in AAG to foil the attacks.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 17:38:26 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Myasnikov",
"Alexei G.",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0707.1515 | Gun Srijuntongsiri | Gun Srijuntongsiri, Stephen A. Vavasis | Properties of polynomial bases used in a line-surface intersection
algorithm | null | null | null | null | cs.NA cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In [5], Srijuntongsiri and Vavasis propose the "Kantorovich-Test Subdivision
algorithm", or KTS, which is an algorithm for finding all zeros of a polynomial
system in a bounded region of the plane. This algorithm can be used to find the
intersections between a line and a surface. The main features of KTS are that
it can operate on polynomials represented in any basis that satisfies certain
conditions and that its efficiency has an upper bound that depends only on the
conditioning of the problem and the choice of the basis representing the
polynomial system.
This article explores in detail the dependence of the efficiency of the KTS
algorithm on the choice of basis. Three bases are considered: the power, the
Bernstein, and the Chebyshev bases. These three bases satisfy the basis
properties required by KTS. Theoretically, Chebyshev case has the smallest
upper bound on its running time. The computational results, however, do not
show that Chebyshev case performs better than the other two.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 18:56:05 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jul 2007 00:37:41 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Oct 2007 03:20:49 GMT"
},
{
"version": "v4",
"created": "Mon, 8 Sep 2008 09:18:56 GMT"
},
{
"version": "v5",
"created": "Fri, 27 Feb 2009 10:43:30 GMT"
}
] | 2009-02-27T00:00:00 | [
[
"Srijuntongsiri",
"Gun",
""
],
[
"Vavasis",
"Stephen A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0707.1527 | Anya Tafliovich | Anya Tafliovich, Eric C.R. Hehner | Programming Telepathy: Implementing Quantum Non-Locality Games | null | null | null | null | quant-ph cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum pseudo-telepathy is an intriguing phenomenon which results from the
application of quantum information theory to communication complexity. To
demonstrate this phenomenon researchers in the field of quantum communication
complexity devised a number of quantum non-locality games. The setting of these
games is as follows: the players are separated so that no communication between
them is possible and are given a certain computational task. When the players
have access to a quantum resource called entanglement, they can accomplish the
task: something that is impossible in a classical setting. To an observer who
is unfamiliar with the laws of quantum mechanics it seems that the players
employ some sort of telepathy; that is, they somehow exchange information
without sharing a communication channel. This paper provides a formal framework
for specifying, implementing, and analysing quantum non-locality games.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 19:50:25 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jul 2009 15:25:07 GMT"
}
] | 2009-07-29T00:00:00 | [
[
"Tafliovich",
"Anya",
""
],
[
"Hehner",
"Eric C. R.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0707.1532 | Samantha Riesenfeld | Constantinos Daskalakis (1), Richard M. Karp (1), Elchanan Mossel (1),
Samantha Riesenfeld (1), Elad Verbin (2) ((1) U.C. Berkeley, (2) Tel Aviv
University) | Sorting and Selection in Posets | 24 pages | null | null | null | cs.DS cs.DM | null | Classical problems of sorting and searching assume an underlying linear
ordering of the objects being compared. In this paper, we study a more general
setting, in which some pairs of objects are incomparable. This generalization
is relevant in applications related to rankings in sports, college admissions,
or conference submissions. It also has potential applications in biology, such
as comparing the evolutionary fitness of different strains of bacteria, or
understanding input-output relations among a set of metabolic reactions or the
causal influences among a set of interacting genes or proteins. Our results
improve and extend results from two decades ago of Faigle and Tur\'{a}n.
A measure of complexity of a partially ordered set (poset) is its width. Our
algorithms obtain information about a poset by queries that compare two
elements. We present an algorithm that sorts, i.e. completely identifies, a
width w poset of size n and has query complexity O(wn + nlog(n)), which is
within a constant factor of the information-theoretic lower bound. We also show
that a variant of Mergesort has query complexity O(wn(log(n/w))) and total
complexity O((w^2)nlog(n/w)). Faigle and Tur\'{a}n have shown that the sorting
problem has query complexity O(wn(log(n/w))) but did not address its total
complexity.
For the related problem of determining the minimal elements of a poset, we
give efficient deterministic and randomized algorithms with O(wn) query and
total complexity, along with matching lower bounds for the query complexity up
to a factor of 2. We generalize these results to the k-selection problem of
determining the elements of height at most k. We also derive upper bounds on
the total complexity of some other problems of a similar flavor.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 21:52:17 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Karp",
"Richard M.",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Riesenfeld",
"Samantha",
""
],
[
"Verbin",
"Elad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.1534 | Kamel Aouiche | J\'er\^ome Darmont, Omar Boussaid, Jean-Christian Ralaivao and Kamel
Aouiche | An Architecture Framework for Complex Data Warehouses | null | null | null | null | cs.DB | null | Nowadays, many decision support applications need to exploit data that are
not only numerical or symbolic, but also multimedia, multistructure,
multisource, multimodal, and/or multiversion. We term such data complex data.
Managing and analyzing complex data involves a lot of different issues
regarding their structure, storage and processing, and metadata are a key
element in all these processes. Such problems have been addressed by classical
data warehousing (i.e., applied to "simple" data). However, data warehousing
approaches need to be adapted for complex data. In this paper, we first propose
a precise, though open, definition of complex data. Then we present a general
architecture framework for warehousing complex data. This architecture heavily
relies on metadata and domain-related knowledge, and rests on the XML language,
which helps storing data, metadata and domain-specific knowledge altogether,
and facilitates communication between the various warehousing processes.
| [
{
"version": "v1",
"created": "Tue, 10 Jul 2007 22:01:40 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Darmont",
"Jérôme",
""
],
[
"Boussaid",
"Omar",
""
],
[
"Ralaivao",
"Jean-Christian",
""
],
[
"Aouiche",
"Kamel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.1548 | Kamel Aouiche | Kamel Aouiche and J\'er\^ome Darmont | Data Mining-based Materialized View and Index Selection in Data
Warehouses | null | null | null | null | cs.DB | null | Materialized views and indexes are physical structures for accelerating data
access that are casually used in data warehouses. However, these data
structures generate some maintenance overhead. They also share the same storage
space. Most existing studies about materialized view and index selection
consider these structures separately. In this paper, we adopt the opposite
stance and couple materialized view and index selection to take view-index
interactions into account and achieve efficient storage space sharing.
Candidate materialized views and indexes are selected through a data mining
process. We also exploit cost models that evaluate the respective benefit of
indexing and view materialization, and help select a relevant configuration of
indexes and materialized views among the candidates. Experimental results show
that our strategy performs better than an independent selection of materialized
views and indexes.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 02:45:10 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Aouiche",
"Kamel",
""
],
[
"Darmont",
"Jérôme",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.1558 | Eric Sanchis | Eric Sanchis (LGC) | Autonomy with regard to an Attribute | null | null | null | null | cs.MA | null | This paper presents a model of autonomy called autonomy with regard to an
attribute applicable to cognitive and not cognitive artificial agents. Three
criteria (global / partial, social / nonsocial, absolute / relative) are
defined and used to describe the main characteristics of this type of autonomy.
A software agent autonomous with regard to the mobility illustrates a possible
implementation of this model.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 05:05:57 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Sanchis",
"Eric",
"",
"LGC"
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0707.1588 | Khoa Nguyen | Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen | A Tight Lower Bound to the Outage Probability of Discrete-Input
Block-Fading Channels | 22 pages, 4 figures. This work has been accepted for IEEE
Transactions on Information Theory and has been presented in part at the 2007
IEEE International Symposium on Information Theory, Nice, France, June 2007 | null | 10.1109/TIT.2007.907520 | null | cs.IT math.IT | null | In this correspondence, we propose a tight lower bound to the outage
probability of discrete-input Nakagami-m block-fading channels. The approach
permits an efficient method for numerical evaluation of the bound, providing an
additional tool for system design. The optimal rate-diversity trade-off for the
Nakagami-m block-fading channel is also derived and a tight upper bound is
obtained for the optimal coding gain constant.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 11:23:10 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Nguyen",
"Khoa D.",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Rasmussen",
"Lars K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1607 | Erik Schnetter | Erik Schnetter, Christian D. Ott, Gabrielle Allen, Peter Diener, Tom
Goodale, Thomas Radke, Edward Seidel, John Shalf | Cactus Framework: Black Holes to Gamma Ray Bursts | 16 pages, 4 figures. To appear in Petascale Computing: Algorithms and
Applications, Ed. D. Bader, CRC Press LLC (2007) | null | null | null | cs.DC | null | Gamma Ray Bursts (GRBs) are intense narrowly-beamed flashes of gamma-rays of
cosmological origin. They are among the most scientifically interesting
astrophysical systems, and the riddle concerning their central engines and
emission mechanisms is one of the most complex and challenging problems of
astrophysics today. In this article we outline our petascale approach to the
GRB problem and discuss the computational toolkits and numerical codes that are
currently in use and that will be scaled up to run on emerging petaflop scale
computing platforms in the near future.
Petascale computing will require additional ingredients over conventional
parallelism. We consider some of the challenges which will be caused by future
petascale architectures, and discuss our plans for the future development of
the Cactus framework and its applications to meet these challenges in order to
profit from these new architectures.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 13:01:50 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Schnetter",
"Erik",
""
],
[
"Ott",
"Christian D.",
""
],
[
"Allen",
"Gabrielle",
""
],
[
"Diener",
"Peter",
""
],
[
"Goodale",
"Tom",
""
],
[
"Radke",
"Thomas",
""
],
[
"Seidel",
"Edward",
""
],
[
"Shalf",
"John",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.1618 | Per Ola Kristensson | Per Ola Kristensson, Nils Dahlback, Daniel Anundi, Marius Bjornstad,
Hanna Gillberg, Jonas Haraldsson, Ingrid Martensson, Matttias Nordvall,
Josefin Stahl | The Trade-offs with Space Time Cube Representation of Spatiotemporal
Patterns | null | null | null | null | cs.HC cs.GR | null | Space time cube representation is an information visualization technique
where spatiotemporal data points are mapped into a cube. Fast and correct
analysis of such information is important in for instance geospatial and social
visualization applications. Information visualization researchers have
previously argued that space time cube representation is beneficial in
revealing complex spatiotemporal patterns in a dataset to users. The argument
is based on the fact that both time and spatial information are displayed
simultaneously to users, an effect difficult to achieve in other
representations. However, to our knowledge the actual usefulness of space time
cube representation in conveying complex spatiotemporal patterns to users has
not been empirically validated. To fill this gap we report on a
between-subjects experiment comparing novice users error rates and response
times when answering a set of questions using either space time cube or a
baseline 2D representation. For some simple questions the error rates were
lower when using the baseline representation. For complex questions where the
participants needed an overall understanding of the spatiotemporal structure of
the dataset, the space time cube representation resulted in on average twice as
fast response times with no difference in error rates compared to the baseline.
These results provide an empirical foundation for the hypothesis that space
time cube representation benefits users when analyzing complex spatiotemporal
patterns.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 13:39:34 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Kristensson",
"Per Ola",
""
],
[
"Dahlback",
"Nils",
""
],
[
"Anundi",
"Daniel",
""
],
[
"Bjornstad",
"Marius",
""
],
[
"Gillberg",
"Hanna",
""
],
[
"Haraldsson",
"Jonas",
""
],
[
"Martensson",
"Ingrid",
""
],
[
"Nordvall",
"Matttias",
""
],
[
"Stahl",
"Josefin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0707.1639 | Alban Ponse | Jan A. Bergstra and Alban Ponse | Interface groups and financial transfer architectures | 22 pages | null | null | PRG0702 | cs.SE | null | Analytic execution architectures have been proposed by the same authors as a
means to conceptualize the cooperation between heterogeneous collectives of
components such as programs, threads, states and services. Interface groups
have been proposed as a means to formalize interface information concerning
analytic execution architectures. These concepts are adapted to organization
architectures with a focus on financial transfers. Interface groups (and
monoids) now provide a technique to combine interface elements into interfaces
with the flexibility to distinguish between directions of flow dependent on
entity naming.
The main principle exploiting interface groups is that when composing a
closed system of a collection of interacting components, the sum of their
interfaces must vanish in the interface group modulo reflection. This certainly
matters for financial transfer interfaces.
As an example of this, we specify an interface group and within it some
specific interfaces concerning the financial transfer architecture for a part
of our local academic organization.
Financial transfer interface groups arise as a special case of more general
service architecture interfaces.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 14:55:26 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Ponse",
"Alban",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0707.1644 | Dan Olteanu | Lyublena Antova, Thomas Jansen, Christoph Koch, Dan Olteanu | Fast and Simple Relational Processing of Uncertain Data | 12 pages, 14 figures | null | null | null | cs.DB cs.PF | null | This paper introduces U-relations, a succinct and purely relational
representation system for uncertain databases. U-relations support
attribute-level uncertainty using vertical partitioning. If we consider
positive relational algebra extended by an operation for computing possible
answers, a query on the logical level can be translated into, and evaluated as,
a single relational algebra query on the U-relation representation. The
translation scheme essentially preserves the size of the query in terms of
number of operations and, in particular, number of joins. Standard techniques
employed in off-the-shelf relational database management systems are effective
for optimizing and processing queries on U-relations. In our experiments we
show that query evaluation on U-relations scales to large amounts of data with
high degrees of uncertainty.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 15:13:39 GMT"
}
] | 2007-07-12T00:00:00 | [
[
"Antova",
"Lyublena",
""
],
[
"Jansen",
"Thomas",
""
],
[
"Koch",
"Christoph",
""
],
[
"Olteanu",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0707.1714 | Michael Mahoney | Anirban Dasgupta, Petros Drineas, Boulos Harb, Ravi Kumar, and Michael
W. Mahoney | Sampling Algorithms and Coresets for Lp Regression | 19 pages, 1 figure | null | null | null | cs.DS | null | The Lp regression problem takes as input a matrix $A \in \Real^{n \times d}$,
a vector $b \in \Real^n$, and a number $p \in [1,\infty)$, and it returns as
output a number ${\cal Z}$ and a vector $x_{opt} \in \Real^d$ such that ${\cal
Z} = \min_{x \in \Real^d} ||Ax -b||_p = ||Ax_{opt}-b||_p$. In this paper, we
construct coresets and obtain an efficient two-stage sampling-based
approximation algorithm for the very overconstrained ($n \gg d$) version of
this classical problem, for all $p \in [1, \infty)$. The first stage of our
algorithm non-uniformly samples $\hat{r}_1 = O(36^p d^{\max\{p/2+1, p\}+1})$
rows of $A$ and the corresponding elements of $b$, and then it solves the Lp
regression problem on the sample; we prove this is an 8-approximation. The
second stage of our algorithm uses the output of the first stage to resample
$\hat{r}_1/\epsilon^2$ constraints, and then it solves the Lp regression
problem on the new sample; we prove this is a $(1+\epsilon)$-approximation. Our
algorithm unifies, improves upon, and extends the existing algorithms for
special cases of Lp regression, namely $p = 1,2$. In course of proving our
result, we develop two concepts--well-conditioned bases and subspace-preserving
sampling--that are of independent interest.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 22:04:18 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Dasgupta",
"Anirban",
""
],
[
"Drineas",
"Petros",
""
],
[
"Harb",
"Boulos",
""
],
[
"Kumar",
"Ravi",
""
],
[
"Mahoney",
"Michael W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.1715 | Seth Pettie | Seth Pettie | Sources of Superlinearity in Davenport-Schinzel Sequences | null | null | null | null | cs.DM | null | A generalized Davenport-Schinzel sequence is one over a finite alphabet that
contains no subsequences isomorphic to a fixed forbidden subsequence. One of
the fundamental problems in this area is bounding (asymptotically) the maximum
length of such sequences. Following Klazar, let Ex(\sigma,n) be the maximum
length of a sequence over an alphabet of size n avoiding subsequences
isomorphic to \sigma. It has been proved that for every \sigma, Ex(\sigma,n) is
either linear or very close to linear; in particular it is O(n
2^{\alpha(n)^{O(1)}}), where \alpha is the inverse-Ackermann function and O(1)
depends on \sigma. However, very little is known about the properties of \sigma
that induce superlinearity of \Ex(\sigma,n).
In this paper we exhibit an infinite family of independent superlinear
forbidden subsequences. To be specific, we show that there are 17 prototypical
superlinear forbidden subsequences, some of which can be made arbitrarily long
through a simple padding operation. Perhaps the most novel part of our
constructions is a new succinct code for representing superlinear forbidden
subsequences.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 22:16:58 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Pettie",
"Seth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.1716 | Luis Antonio da Mota | B.O.Rodrigues, L.A.C.P.da Mota and L.G.S.Duarte | Numerical Calculation With Arbitrary Precision | contribution to X hadron Physics - 2007 to appear on International
Journal of Modern Physics E | null | 10.1142/S0218301307009014 | null | cs.NA cs.MS | null | The vast use of computers on scientific numerical computation makes the
awareness of the limited precision that these machines are able to provide us
an essential matter. A limited and insufficient precision allied to the
truncation and rounding errors may induce the user to incorrect interpretation
of his/hers answer. In this work, we have developed a computational package to
minimize this kind of error by offering arbitrary precision numbers and
calculation. This is very important in Physics where we can work with numbers
too small and too big simultaneously.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2007 22:24:48 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Rodrigues",
"B. O.",
""
],
[
"da Mota",
"L. A. C. P.",
""
],
[
"Duarte",
"L. G. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0707.1739 | Reza Rashidi Far | Reza Rashidi Far, Tamer Oraby, Wlodzimierz Bryc and Roland Speicher | On slow-fading non-separable correlation MIMO systems | 24 pages and 3 figures | IEEE Trans. Information Theory, Vol. 54, No. 2, pp.544-553, Feb.
2008 | null | null | cs.IT math.IT | null | In a frequency selective slow-fading channel in a MIMO system, the channel
matrix is of the form of a block matrix. We propose a method to calculate the
limit of the eigenvalue distribution of block matrices if the size of the
blocks tends to infinity. We will also calculate the asymptotic eigenvalue
distribution of $HH^*$, where the entries of $H$ are jointly Gaussian, with a
correlation of the form $E[h_{pj}\bar h_{qk}]= \sum_{s=1}^t
\Psi^{(s)}_{jk}\hat\Psi^{(s)}_{pq}$ (where $t$ is fixed and does not increase
with the size of the matrix). We will use an operator-valued free probability
approach to achieve this goal. Using this method, we derive a system of
equations, which can be solved numerically to compute the desired eigenvalue
distribution.
| [
{
"version": "v1",
"created": "Thu, 12 Jul 2007 06:29:58 GMT"
}
] | 2008-09-02T00:00:00 | [
[
"Far",
"Reza Rashidi",
""
],
[
"Oraby",
"Tamer",
""
],
[
"Bryc",
"Wlodzimierz",
""
],
[
"Speicher",
"Roland",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1812 | Thierry Dubois | Thierry Dubois, Rachid Touzani | A numerical study of heat island flows in an open domain: Stationary
solutions | null | null | null | null | math.NA cs.NA physics.class-ph | null | We present two dimensional numerical simulations of a natural convection
problem in an unbounded domain. A thermal stratification is applied in the
vertical direction and the flow circulation is induced by a heat island located
on the ground. For this problem, thermal perturbations are convected in the
horizontal direction far from the heated element so that very elongated
computational domains have to be used in order to compute accurate numerical
solutions. To avoid this difficulty thermal sponge layers are added at the
vertical boundaries. With this approach, stationary solutions at $Ra\le 10^5$
are investigated. Boussinesq equations are discretized with a second-order
finite volume scheme on a staggered grid combined with a second-order
projection method for the time integration.
| [
{
"version": "v1",
"created": "Thu, 12 Jul 2007 15:22:12 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Dubois",
"Thierry",
""
],
[
"Touzani",
"Rachid",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0707.1820 | Arnaud Legout | Anwar Al Hamra (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Arnaud
Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Chadi Barakat (INRIA
Sophia Antipolis / INRIA Rh\^one-Alpes) | Understanding the Properties of the BitTorrent Overlay | null | null | null | null | cs.NI | null | In this paper, we conduct extensive simulations to understand the properties
of the overlay generated by BitTorrent. We start by analyzing how the overlay
properties impact the efficiency of BitTorrent. We focus on the average peer
set size (i.e., average number of neighbors), the time for a peer to reach its
maximum peer set size, and the diameter of the overlay. In particular, we show
that the later a peer arrives in a torrent, the longer it takes to reach its
maximum peer set size. Then, we evaluate the impact of the maximum peer set
size, the maximum number of outgoing connections per peer, and the number of
NATed peers on the overlay properties. We show that BitTorrent generates a
robust overlay, but that this overlay is not a random graph. In particular, the
connectivity of a peer to its neighbors depends on its arriving order in the
torrent. We also show that a large number of NATed peers significantly
compromise the robustness of the overlay to attacks. Finally, we evaluate the
impact of peer exchange on the overlay properties, and we show that it
generates a chain-like overlay with a large diameter, which will adversely
impact the efficiency of large torrents.
| [
{
"version": "v1",
"created": "Thu, 12 Jul 2007 15:38:14 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hamra",
"Anwar Al",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Legout",
"Arnaud",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Barakat",
"Chadi",
"",
"INRIA\n Sophia Antipolis / INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0707.1824 | Damien Chablat | Leonid Slutski (CIM), Damien Chablat (IRCCyN), Jorge Angeles (CIM) | The Kinematics of Manipulators Built From Closed Planar Mechanisms | null | Proceedings of the IEEE/ASME International Conference on Advanced
Intelligent Mechatronics (19/08/1999) 531-536 | null | null | cs.RO | null | The paper discusses the kinematics of manipulators builts of planar closed
kinematic chains. A special kinematic scheme is extracted from the array of
these mechanisms that looks the most promising for the creation of different
types of robotic manipulators. The structural features of this manipulator
determine a number of its original properties that essentially simplify its
control. These features allow the main control problems to be effectively
overcome by application of the simple kinematic problems. The workspace and
singular configurations of a basic planar manipulator are studied. By using a
graphic simulation method, motions of the designed mechanism are examined. A
prototype of this mechanism was implemented to verify the proposed approach.
| [
{
"version": "v1",
"created": "Thu, 12 Jul 2007 15:42:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Slutski",
"Leonid",
"",
"CIM"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.1859 | Natasha Devroye | Natasha Devroye, Vahid Tarokh | On the Degrees of Freedom in Cognitive Radio Channels | After receiving useful peer comments, we would like to withdraw this
paper | null | null | null | cs.IT math.IT | null | After receiving useful peer comments, we would like to withdraw this paper.
| [
{
"version": "v1",
"created": "Thu, 12 Jul 2007 18:47:38 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jul 2007 19:24:25 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Devroye",
"Natasha",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1904 | Joseph Y. Halpern | Leandro C. Rego and Joseph Y. Halpern | Generalized Solution Concepts in Games with Possibly Unaware Players | null | null | null | null | cs.GT | null | Most work in game theory assumes that players are perfect reasoners and have
common knowledge of all significant aspects of the game. In earlier work, we
proposed a framework for representing and analyzing games with possibly unaware
players, and suggested a generalization of Nash equilibrium appropriate for
games with unaware players that we called generalized Nash equilibrium. Here,
we use this framework to analyze other solution concepts that have been
considered in the game-theory literature, with a focus on sequential
equilibrium. We also provide some insight into the notion of generalized Nash
equilibrium by proving that it is closely related to the notion of
rationalizability when we restrict the analysis to games in normal form and no
unawareness is involved.
| [
{
"version": "v1",
"created": "Thu, 12 Jul 2007 23:21:16 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Rego",
"Leandro C.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0707.1912 | Masoud Ebrahimi | Masoud Ebrahimi, Mohammad A. Maddah-Ali, and Amir K. Khandani | Throughput Scaling Laws for Wireless Networks with Fading Channels | Submitted to IEEE Transactions on Information Theory (Revised) | null | 10.1109/TIT.2007.907518 | University of Waterloo Technical Report UW-ECE #2007-12 | cs.IT math.IT | null | A network of n communication links, operating over a shared wireless channel,
is considered. Fading is assumed to be the dominant factor affecting the
strength of the channels between transmitter and receiver terminals. It is
assumed that each link can be active and transmit with a constant power P or
remain silent. The objective is to maximize the throughput over the selection
of active links. By deriving an upper bound and a lower bound, it is shown that
in the case of Rayleigh fading (i) the maximum throughput scales like $\log n$
(ii) the maximum throughput is achievable in a distributed fashion. The upper
bound is obtained using probabilistic methods, where the key point is to upper
bound the throughput of any random set of active links by a chi-squared random
variable. To obtain the lower bound, a decentralized link activation strategy
is proposed and analyzed.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 02:28:06 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Ebrahimi",
"Masoud",
""
],
[
"Maddah-Ali",
"Mohammad A.",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.1913 | Daniel Lemire | Owen Kaser, Daniel Lemire | Removing Manually-Generated Boilerplate from Electronic Texts:
Experiments with Project Gutenberg e-Books | short version appeared in CASCON 2007 proceedings, available from
http://portal.acm.org/citation.cfm?id=1321246 Source code at
https://github.com/lemire/gutenberg-headers | null | null | Department of CSAS, UNBSJ Technical Report TR-07-001 | cs.DL cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative work on unstructured or semi-structured documents, such as in
literature corpora or source code, often involves agreed upon templates
containing metadata. These templates are not consistent across users and over
time. Rule-based parsing of these templates is expensive to maintain and tends
to fail as new documents are added. Statistical techniques based on frequent
occurrences have the potential to identify automatically a large fraction of
the templates, thus reducing the burden on the programmers. We investigate the
case of the Project Gutenberg corpus, where most documents are in ASCII format
with preambles and epilogues that are often copied and pasted or manually
typed. We show that a statistical approach can solve most cases though some
documents require knowledge of English. We also survey various technical
solutions that make our approach applicable to large data sets.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 02:30:10 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Aug 2009 19:57:15 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Aug 2016 21:02:58 GMT"
}
] | 2016-08-24T00:00:00 | [
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0707.1925 | Vahan Mkrtchyan | V. V. Mkrtchyan | A note on minimal matching covered graphs | 4 pages | Discrete Mathematics 306, (2006), pp. 452-455 | 10.1016/j.disc.2005.12.006 | null | cs.DM | null | A graph is called matching covered if for its every edge there is a maximum
matching containing it. It is shown that minimal matching covered graphs
contain a perfect matching.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 13:01:10 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Mkrtchyan",
"V. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.1926 | Vahan Mkrtchyan | V. V. Mkrtchyan | On trees with a maximum proper partial 0-1 coloring containing a maximum
matching | 4 pages | Discrete Mathematics 306, (2006), pp. 456-459 | 10.1016/j.disc.2005.12.019 | null | cs.DM | null | I prove that in a tree in which the distance between any two endpoints is
even, there is a maximum proper partial 0-1 coloring such that the edges
colored by 0 form a maximum matching.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 13:05:12 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Mkrtchyan",
"V. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.1954 | Alessandro Nordio | A. Nordio, C.-F. Chiasserini, E. Viterbo | Bandlimited Field Reconstruction for Wireless Sensor Networks | null | null | null | null | cs.OH | null | Wireless sensor networks are often used for environmental monitoring
applications. In this context sampling and reconstruction of a physical field
is one of the most important problems to solve. We focus on a bandlimited field
and find under which conditions on the network topology the reconstruction of
the field is successful, with a given probability. We review irregular sampling
theory, and analyze the problem using random matrix theory. We show that even a
very irregular spatial distribution of sensors may lead to a successful signal
reconstruction, provided that the number of collected samples is large enough
with respect to the field bandwidth. Furthermore, we give the basis to
analytically determine the probability of successful field reconstruction.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 09:54:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Nordio",
"A.",
""
],
[
"Chiasserini",
"C. -F.",
""
],
[
"Viterbo",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.1957 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | Moveability and Collision Analysis for Fully-Parallel Manipulators | null | 12th CISM-IFTOMM Symposium (07/1998) 1-8 | null | null | cs.RO | null | The aim of this paper is to characterize the moveability of fully-parallel
manipulators in the presence of obstacles. Fully parallel manipulators are used
in applications where accuracy, stiffness or high speeds and accelerations are
required \cite{Merlet:97}. However, one of its main drawbacks is a relatively
small workspace compared to the one of serial manipulators. This is due mainly
to the existence of potential internal collisions, and the existence of
singularities. In this paper, the notion of free aspect is defined which
permits to exhibit domains of the workspace and the joint space free of
singularity and collision. The main application of this study is the
moveability analysis in the workspace of the manipulator as well as
path-planning, control and design.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 09:59:25 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.1981 | Wojciech Moczydlowski | Wojciech Moczydlowski | A Normalizing Intuitionistic Set Theory with Inaccessible Sets | To be published in Logical Methods in Computer Science | Logical Methods in Computer Science, Volume 3, Issue 3 (August 16,
2007) lmcs:837 | 10.2168/LMCS-3(3:6)2007 | null | cs.LO | null | We propose a set theory strong enough to interpret powerful type theories
underlying proof assistants such as LEGO and also possibly Coq, which at the
same time enables program extraction from its constructive proofs. For this
purpose, we axiomatize an impredicative constructive version of
Zermelo-Fraenkel set theory IZF with Replacement and $\omega$-many
inaccessibles, which we call \izfio. Our axiomatization utilizes set terms, an
inductive definition of inaccessible sets and the mutually recursive nature of
equality and membership relations. It allows us to define a weakly-normalizing
typed lambda calculus corresponding to proofs in \izfio according to the
Curry-Howard isomorphism principle. We use realizability to prove the
normalization theorem, which provides a basis for program extraction
capability.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 12:02:10 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Aug 2007 15:37:16 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Apr 2008 08:03:51 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Moczydlowski",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.2006 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | Working Modes and Aspects in Fully-Parallel Manipulator | null | Proceeding IEEE International Conference on Robotics and
Automation (05/1998) 1964-1969 | null | null | cs.RO | null | The aim of this paper is to characterize the notion of aspect in the
workspace and in the joint space for parallel manipulators. In opposite to the
serial manipulators, the parallel manipulators can admit not only multiple
inverse kinematic solutions, but also multiple direct kinematic solutions. The
notion of aspect introduced for serial manipulators in [Borrel 86], and
redefined for parallel manipulators with only one inverse kinematic solution in
[Wenger 1997], is redefined for general fully parallel manipulators. Two
Jacobian matrices appear in the kinematic relations between the joint-rate and
the Cartesian-velocity vectors, which are called the "inverse kinematics" and
the "direct kinematics" matrices. The study of these matrices allow to
respectively define the parallel and the serial singularities. The notion of
working modes is introduced to separate inverse kinematic solutions. Thus, we
can find out domains of the workspace and the joint space exempt of
singularity. Application of this study is the moveability analysis in the
workspace of the manipulator as well as path-planing and control. This study is
illustrated in this paper with a RR-RRR planar parallel manipulator.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 13:40:56 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2014 | Giacomo Como | Giacomo Como, Serdar Yuksel, Sekhar Tatikonda | On the error exponent of variable-length block-coding schemes over
finite-state Markov channels with feedback | null | null | null | null | cs.IT math.IT | null | The error exponent of Markov channels with feedback is studied in the
variable-length block-coding setting. Burnashev's classic result is extended
and a single letter characterization for the reliability function of
finite-state Markov channels is presented, under the assumption that the
channel state is causally observed both at the transmitter and at the receiver
side. Tools from stochastic control theory are used in order to treat channels
with intersymbol interference. In particular the convex analytical approach to
Markov decision processes is adopted to handle problems with stopping time
horizons arising from variable-length coding schemes.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 14:27:26 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Como",
"Giacomo",
""
],
[
"Yuksel",
"Serdar",
""
],
[
"Tatikonda",
"Sekhar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2017 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM) | The Isoconditioning Loci of A Class of Closed-Chain Manipulators | null | Proceeding IEEE International Conference on Robotics and
Automation (05/1998) 1970-1976 | null | null | cs.RO | null | The subject of this paper is a special class of closed-chain manipulators.
First, we analyze a family of two-degree-of-freedom (dof) five-bar planar
linkages. Two Jacobian matrices appear in the kinematic relations between the
joint-rate and the Cartesian-velocity vectors, which are called the ``inverse
kinematics" and the "direct kinematics" matrices. It is shown that the loci of
points of the workspace where the condition number of the direct-kinematics
matrix remains constant, i.e., the isoconditioning loci, are the coupler points
of the four-bar linkage obtained upon locking the middle joint of the linkage.
Furthermore, if the line of centers of the two actuated revolutes is used as
the axis of a third actuated revolute, then a three-dof hybrid manipulator is
obtained. The isoconditioning loci of this manipulator are surfaces of
revolution generated by the isoconditioning curves of the two-dof manipulator,
whose axis of symmetry is that of the third actuated revolute.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 14:18:45 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2027 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Workspace and Assembly modes in Fully-Parallel Manipulators : A
Descriptive Study | null | Advances in Robot Kinematics and Computational Geometry (1998)
117-126 | null | null | cs.RO | null | The goal of this paper is to explain, using a typical example, the
distribution of the different assembly modes in the workspace and their
effective role in the execution of trajectories. The singular and non-singular
changes of assembly mode are described and compared to each other. The
non-singular change of assembly mode is more deeply analysed and discussed in
the context of trajectory planning. In particular, it is shown that, according
to the location of the initial and final configurations with respect to the
uniqueness domains in the workspace, there are three different cases to
consider before planning a linking trajectory.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 15:04:13 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2034 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM) | Conception Isotropique D'Une Morphologie Parall\`Ele : Application \`a
L'Usinage | null | 3rd International Conference On Integrated Design and
Manufacturing in Mechanical Engineering (05/2000) 1-10 | null | null | cs.RO | null | The aim of this paper is the isotropic design of a hybrid morphology
dedicated to 3-axis machining applications. It is necessary to ensure the
feasibility of continuous, singularity-free trajectories, as well as a good
manipulability in position and velocity. We want to propose an alternative
design to conventional serial machine-tools. We compare a serial PPP
machine-tool (three prismatic orthogonal axes) with a hybrid architecture which
we optimize only the first two axes. The critrerion used for the optimization
is the conditioning of the Jacobian matrices. The optimum, namely isotropy, can
be obtained which provides our architecture with excellent manipulability
properties.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 15:24:29 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2042 | Damien Chablat | Florence Bidault (IRCCyN), Damien Chablat (IRCCyN), Patrick Chedmail
(IRCCyN), Laurent Pino (IRCCyN) | A distributed Approach for Access and Visibility Task under Ergonomic
Constraints with a Manikin in a Virtual Reality Environment | null | Proceeding of the 10th IEEE International Workshop on Robot and
Human Communication (09/2001) 1-6 | null | null | cs.RO | null | This paper presents a new method, based on a multi-agent system and on
digital mock-up technology, to assess an efficient path planner for a manikin
for access and visibility task under ergonomic constraints. In order to solve
this problem, the human operator is integrated in the process optimization to
contribute to a global perception of the environment. This operator cooperates,
in real-time, with several automatic local elementary agents. The result of
this work validates solutions brought by digital mock-up and that can be
applied to simulate maintenance task.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 15:34:22 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Bidault",
"Florence",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Chedmail",
"Patrick",
"",
"IRCCyN"
],
[
"Pino",
"Laurent",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2090 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | A Training based Distributed Non-Coherent Space-Time Coding Strategy | 10 pages, 3 figures, submitted to IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | null | Unitary space-time modulation is known to be an efficient means to
communicate over non-coherent Multiple Input Multiple Output (MIMO) channels.
In this letter, differential unitary space-time coding and non-coherent
space-time coding for the training based approach of Kim and Tarokh are
addressed. For this approach, necessary and sufficient conditions for
multi-group decodability are derived in a simple way assuming a Generalized
Likelihood Ratio Test receiver and a unitary codebook. Extending Kim and
Tarokh's approach for colocated MIMO systems, a novel training based approach
to distributed non-coherent space-time coding for wireless relay networks is
proposed. An explicit construction of two-group decodable distributed
non-coherent space-time codes achieving full cooperative diversity for all even
number of relays is provided.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2007 20:42:20 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2126 | Vahan Mkrtchyan | R.R. Kamalian, V. V. Mkrtchyan | On complexity of special maximum matchings constructing | 12 pages, 8 figures. Discrete Mathematics, to appear | Discrete Mathematics, 2008, Vol 308/10 pp 1792-1800 | 10.1016/j.disc.2007.04.029 | null | cs.DM | null | For bipartite graphs the NP-completeness is proved for the problem of
existence of maximum matching which removal leads to a graph with given
lower(upper)bound for the cardinality of its maximum matching.
| [
{
"version": "v1",
"created": "Sat, 14 Jul 2007 05:05:34 GMT"
}
] | 2008-03-08T00:00:00 | [
[
"Kamalian",
"R. R.",
""
],
[
"Mkrtchyan",
"V. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.2160 | Seth Pettie | Seth Pettie | Splay Trees, Davenport-Schinzel Sequences, and the Deque Conjecture | null | null | null | null | cs.DS | null | We introduce a new technique to bound the asymptotic performance of splay
trees. The basic idea is to transcribe, in an indirect fashion, the rotations
performed by the splay tree as a Davenport-Schinzel sequence S, none of whose
subsequences are isomorphic to fixed forbidden subsequence. We direct this
technique towards Tarjan's deque conjecture and prove that n deque operations
require O(n alpha^*(n)) time, where alpha^*(n) is the minimum number of
applications of the inverse-Ackermann function mapping n to a constant. We are
optimistic that this approach could be directed towards other open conjectures
on splay trees such as the traversal and split conjectures.
| [
{
"version": "v1",
"created": "Sat, 14 Jul 2007 16:38:08 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Pettie",
"Seth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.2176 | Prakash Ishwar | Masoud Sharif and Prakash Ishwar | Benefit of Delay on the Diversity-Multiplexing Tradeoffs of MIMO
Channels with Partial CSI | 5 pages, 2 figures, to appear in the Proceedings of the IEEE
International Symposium on Information Theory, Nice, France, 24-29 June, 2007 | null | null | null | cs.IT math.IT | null | This paper re-examines the well-known fundamental tradeoffs between rate and
reliability for the multi-antenna, block Rayleigh fading channel in the high
signal to noise ratio (SNR) regime when (i) the transmitter has access to
(noiseless) one bit per coherence-interval of causal channel state information
(CSI) and (ii) soft decoding delays together with worst-case delay guarantees
are acceptable. A key finding of this work is that substantial improvements in
reliability can be realized with a very short expected delay and a slightly
longer (but bounded) worst-case decoding delay guarantee in communication
systems where the transmitter has access to even one bit per coherence interval
of causal CSI. While similar in spirit to the recent work on communication
systems based on automatic repeat requests (ARQ) where decoding failure is
known at the transmitter and leads to re-transmission, here transmit
side-information is purely based on CSI. The findings reported here also lend
further support to an emerging understanding that decoding delay (related to
throughput) and codeword blocklength (related to coding complexity and delays)
are distinctly different design parameters which can be tuned to control
reliability.
| [
{
"version": "v1",
"created": "Sat, 14 Jul 2007 22:42:02 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Sharif",
"Masoud",
""
],
[
"Ishwar",
"Prakash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2182 | Massimiliano Laddomada Ph.D. | Massimiliano Laddomada | Design of Multistage Decimation Filters Using Cyclotomic Polynomials:
Optimization and Design Issues | Submitted to CAS-I, July 07; 11 pages, 5 figures, 3 tables | null | null | null | cs.OH | null | This paper focuses on the design of multiplier-less decimation filters
suitable for oversampled digital signals. The aim is twofold. On one hand, it
proposes an optimization framework for the design of constituent decimation
filters in a general multistage decimation architecture. The basic building
blocks embedded in the proposed filters belong, for a simple reason, to the
class of cyclotomic polynomials (CPs): the first 104 CPs have a z-transfer
function whose coefficients are simply {-1,0,+1}. On the other hand, the paper
provides a bunch of useful techniques, most of which stemming from some key
properties of CPs, for designing the proposed filters in a variety of
architectures. Both recursive and non-recursive architectures are discussed by
focusing on a specific decimation filter obtained as a result of the
optimization algorithm.
Design guidelines are provided with the aim to simplify the design of the
constituent decimation filters in the multistage chain.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 05:35:32 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Laddomada",
"Massimiliano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.2185 | Damien Chablat | Sylvain Guegan (IRCCyN), Wisama Khalil (IRCCyN), Damien Chablat
(IRCCyN), Philippe Wenger (IRCCyN) | Mod\'elisation Dynamique d'un Robot Parall\`ele \`a 3-DDL : l'Orthoglide | null | Conf\'erence Internationale Francophone d'Automatique (07/2002)
1-6 | null | null | cs.RO | null | In this article, we propose a method for calculation of the inverse and
direct dynamic models of the Orthoglide, a parallel robot with threedegrees of
freedom in translation. These models are calculated starting from the elements
of the dynamic model of the kinematic chain structure and equations of
Newton-Euler applied to the platform. These models are obtained in explicit
form having an interesting physical interpretation.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 07:14:51 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Guegan",
"Sylvain",
"",
"IRCCyN"
],
[
"Khalil",
"Wisama",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2191 | Renaud Lambiotte | R. Lambiotte, M. Ausloos and M. Thelwall | Word statistics in Blogs and RSS feeds: Towards empirical universal
evidence | 16 pages, 6 figures | J. Informetrics 1 (2007) 277-286 | null | null | cs.IT math.IT | null | We focus on the statistics of word occurrences and of the waiting times
between such occurrences in Blogs. Due to the heterogeneity of words'
frequencies, the empirical analysis is performed by studying classes of
"frequently-equivalent" words, i.e. by grouping words depending on their
frequencies. Two limiting cases are considered: the dilute limit, i.e. for
those words that are used less than once a day, and the dense limit for
frequent words. In both cases, extreme events occur more frequently than
expected from the Poisson hypothesis. These deviations from Poisson statistics
reveal non-trivial time correlations between events that are associated with
bursts of activities. The distribution of waiting times is shown to behave like
a stretched exponential and to have the same shape for different sets of words
sharing a common frequency, thereby revealing universal features.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 08:51:43 GMT"
}
] | 2012-09-25T00:00:00 | [
[
"Lambiotte",
"R.",
""
],
[
"Ausloos",
"M.",
""
],
[
"Thelwall",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2227 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), Mazen Zein (IRCCyN) | Degeneracy study of the forward kinematics of planar 3-RPR parallel
manipulators | null | Journal of Mechanical Design 129, 12 (12/2007) 1-6 | null | null | cs.RO | null | This paper investigates two situations in which the forward kinematics of
planar 3-RPR parallel manipulators degenerates. These situations have not been
addressed before. The first degeneracy arises when the three input joint
variables r1, r2 and r3 satisfy a certain relationship. This degeneracy yields
a double root of the characteristic polynomial in t, which could be erroneously
interpreted as two coalesce assembly modes. But, unlike what arises in
non-degenerate cases, this double root yields two sets of solutions for the
position coordinates (x, y) of the platform. In the second situation, we show
that the forward kinematics degenerates over the whole joint space if the base
and platform triangles are congruent and the platform triangle is rotated by
180 deg about one of its sides. For these "degenerate" manipulators, which are
defined here for the first time, the forward kinematics is reduced to the
solution of a 3rd-degree polynomial and a quadratics in sequence. Such
manipulators constitute, in turn, a new family of analytic planar manipulators
that would be more suitable for industrial applications.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 17:57:21 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Zein",
"Mazen",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2228 | Damien Chablat | Maher Baili (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | Kinematic Analysis of a Family of 3R Manipulators | null | Problems of Mechanics 15, 2 (07/2004) 27-32 | null | null | cs.RO | null | The workspace topologies of a family of 3-revolute (3R) positioning
manipulators are enumerated. The workspace is characterized in a half-cross
section by the singular curves. The workspace topology is defined by the number
of cusps that appear on these singular curves. The design parameters space is
shown to be divided into five domains where all manipulators have the same
number of cusps. Each separating surface is given as an explicit expression in
the DH-parameters. As an application of this work, we provide a necessary and
sufficient condition for a 3R orthogonal manipulator to be cuspidal, i.e. to
change posture without meeting a singularity. This condition is set as an
explicit expression in the DH parameters.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 18:00:53 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Baili",
"Maher",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2229 | Damien Chablat | Damien Chablat (IRCCyN), Jorge Angeles (CIM) | The Computation of All 4R Serial Spherical Wrists With an Isotropic
Architecture | null | Journal of Mechanical Design 125, 2 (06/2003) 275-280 | null | null | cs.RO | null | A spherical wrist of the serial type with n revolute (R) joints is said to be
isotropic if it can attain a posture whereby the singular values of its
Jacobian matrix are all equal to sqrt(n/3). What isotropy brings about is
robustness to manufacturing, assembly, and measurement errors, thereby
guaranteeing a maximum orientation accuracy. In this paper we investigate the
existence of redundant isotropic architectures, which should add to the
dexterity of the wrist under design by virtue of its extra degree of freedom.
The problem formulation, for, leads to a system of eight quadratic equations
with eight unknowns. The Bezout number of this system is thus 2^8=256, its BKK
bound being 192. However, the actual number of solutions is shown to be 32. We
list all solutions of the foregoing algebraic problem. All these solutions are
real, but distinct solutions do not necessarily lead to distinct manipulators.
Upon discarding those algebraic solutions that yield no new wrists, we end up
with exactly eight distinct architectures, the eight corresponding manipulators
being displayed at their isotropic postures.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 18:04:09 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2238 | Damien Chablat | Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | A design oriented study for 3R Orthogonal Manipulators With Geometric
Simplifications | null | Congr\`es international Conception et Mod\'elisation des
Syst\`emes M\'ecaniques (03/2007) 1-8 | null | null | cs.RO | null | This paper proposes a method to calculate the largest Regular Dextrous
Workspace (RDW) of some types of three-revolute orthogonal manipulators that
have at least one of their DH parameters equal to zero. Then a new performance
index based on the RDW is introduced, the isocontours of this index are plotted
in the parameter space of the interesting types of manipulators and finally an
inspection of the domains of the parameter spaces is conducted in order to
identify the better manipulator architectures. The RDW is a part of the
workspace whose shape is regular (cube, cylinder) and the performances
(conditioning index) are bounded inside. The groups of 3R orthogonal
manipulators studied have interesting kinematic properties such as, a
well-connected workspace that is fully reachable with four inverse kinematic
solutions and that does not contain any void. This study is of high interest
for the design of alternative manipulator geometries.
| [
{
"version": "v1",
"created": "Sun, 15 Jul 2007 20:25:24 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Zein",
"Mazen",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2265 | Rajesh Sundaresan | Arun Padakandla and Rajesh Sundaresan | Separable convex optimization problems with linear ascending constraints | 15 pages, Submitted to SIAM J. on Opt | SIAM J. on Optim., vol. 20, no. 3, pp. 1185-1204, online version
19 August 2009 | 10.1137/07069729X | null | cs.IT math.IT math.OC | null | Separable convex optimization problems with linear ascending inequality and
equality constraints are addressed in this paper. Under an ordering condition
on the slopes of the functions at the origin, an algorithm that determines the
optimum point in a finite number of steps is described. The optimum value is
shown to be monotone with respect to a partial order on the constraint
parameters. Moreover, the optimum value is convex with respect to these
parameters. Examples motivated by optimizations for communication systems are
used to illustrate the algorithm.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 06:23:38 GMT"
}
] | 2011-07-22T00:00:00 | [
[
"Padakandla",
"Arun",
""
],
[
"Sundaresan",
"Rajesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0707.2270 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | Design of a Spherical Wrist with Parallel Architecture: Application to
Vertebrae of an Eel Robot | null | Proc. IEEE Int. Conf. Rob. and Automation (04/2005) 1-6 | null | null | cs.RO | null | The design of a spherical wrist with parallel architecture is the object of
this article. This study is part of a larger project, which aims to design and
to build an eel robot for inspection of immersed piping. The kinematic analysis
of the mechanism is presented first to characterize the singular configurations
as well as the isotropic configurations. We add the design constraints related
to the application, such as (i) the compactness of the mechanism, (ii) the
symmetry of the elements in order to ensure static and dynamic balance and
(iii) the possibility of the mechanism to fill the elliptic form of the ell
sections.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 07:41:16 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2275 | Damien Chablat | Antoine Rennuit (IRCCyN), Alain Micaelli (CEA/LIST), Xavier Merlhiot
(CEA/LIST), Claude Andriot (CEA/LIST), Fran\c{c}ois Guillaume, Nicolas
Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN) | Passive Control Architecture for Virtual Humans | null | Proceeding International Conference on Intelligent Robots ans
Systems (08/2005) 1-6 | null | null | cs.RO | null | In the present paper, we introduce a new control architecture aimed at
driving virtual humans in interaction with virtual environments, by motion
capture. It brings decoupling of functionalities, and also of stability thanks
to passivity. We show projections can break passivity, and thus must be used
carefully. Our control scheme enables task space and internal control, contact,
and joint limits management. Thanks to passivity, it can be easily extended.
Besides, we introduce a new tool as for manikin's control, which makes it able
to build passive projections, so as to guide the virtual manikin when sharp
movements are needed.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 08:33:43 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Rennuit",
"Antoine",
"",
"IRCCyN"
],
[
"Micaelli",
"Alain",
"",
"CEA/LIST"
],
[
"Merlhiot",
"Xavier",
"",
"CEA/LIST"
],
[
"Andriot",
"Claude",
"",
"CEA/LIST"
],
[
"Guillaume",
"François",
"",
"IRCCyN"
],
[
"Chevassus",
"Nicolas",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Chedmail",
"Patrick",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2291 | Marius Marin | Marius Marin, Leon Moonen, Arie van Deursen | An Integrated Crosscutting Concern Migration Strategy and its
Application to JHotDraw | 10+ 4 pages | null | null | TUD-SERG-2007-019 | cs.SE | null | In this paper we propose a systematic strategy for migrating crosscutting
concerns in existing object-oriented systems to aspect-based solutions. The
proposed strategy consists of four steps: mining, exploration, documentation
and refactoring of crosscutting concerns. We discuss in detail a new approach
to aspect refactoring that is fully integrated with our strategy, and apply the
whole strategy to an object-oriented system, namely the JHotDraw framework. The
result of this migration is made available as an open-source project, which is
the largest aspect refactoring available to date. We report on our experiences
with conducting this case study and reflect on the success and challenges of
the migration process, as well as on the feasibility of automatic aspect
refactoring.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 09:38:23 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Jul 2007 22:13:50 GMT"
}
] | 2007-07-23T00:00:00 | [
[
"Marin",
"Marius",
""
],
[
"Moonen",
"Leon",
""
],
[
"van Deursen",
"Arie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0707.2293 | Maziar Nekovee | Maziar Nekovee | Worm Epidemics in Wireless Adhoc Networks | null | Published in New J. Phys. 9 189, 2007 | 10.1088/1367-2630/9/6/189 | null | cs.NI cond-mat.stat-mech cs.CR physics.soc-ph | null | A dramatic increase in the number of computing devices with wireless
communication capability has resulted in the emergence of a new class of
computer worms which specifically target such devices. The most striking
feature of these worms is that they do not require Internet connectivity for
their propagation but can spread directly from device to device using a
short-range radio communication technology, such as WiFi or Bluetooth. In this
paper, we develop a new model for epidemic spreading of these worms and
investigate their spreading in wireless ad hoc networks via extensive Monte
Carlo simulations. Our studies show that the threshold behaviour and dynamics
of worm epidemics in these networks are greatly affected by a combination of
spatial and temporal correlations which characterize these networks, and are
significantly different from the previously studied epidemics in the Internet.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 09:58:18 GMT"
}
] | 2008-07-10T00:00:00 | [
[
"Nekovee",
"Maziar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0707.2295 | Vahan Mkrtchyan | R.R. Kamalian, V. V. Mkrtchyan | Two polynomial algorithms for special maximum matching constructing in
trees | 55 pages, 38 figures, Submitted to Discrete Applied Mathematics | null | null | null | cs.DM | null | For an arbitrary tree we investigate the problems of constructing a maximum
matching which minimizes or maximizes the cardinality of a maximum matching of
the graph obtained from original one by its removal and present corresponding
polynomial algorithms.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 10:17:13 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Kamalian",
"R. R.",
""
],
[
"Mkrtchyan",
"V. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.2341 | Amac Herdagdelen | Amac Herdagdelen, Haluk Bingol | A Cultural Market Model | null | International Journal of Modern Physics C Vol. 19, No. 2, 271-282
(2008) | 10.1142/S012918310801208X | null | q-fin.GN cs.CY nlin.AO physics.soc-ph | null | Social interactions and personal tastes shape our consumption behavior of
cultural products. In this study, we present a computational model of a
cultural market and we aim to analyze the behavior of the consumer population
as an emergent phenomena. Our results suggest that the final market shares of
cultural products dramatically depend on consumer heterogeneity and social
interaction pressure. Furthermore, the relation between the resulting market
shares and social interaction is robust with respect to a wide range of
variation in the parameter values and the type of topology.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 15:30:32 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2008 00:09:06 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Herdagdelen",
"Amac",
""
],
[
"Bingol",
"Haluk",
""
]
] | [
{
"class": "Quantitative Finance",
"code": "q-fin.GN",
"description": "Development of general quantitative methodologies with applications in finance",
"span": "(General Finance)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0707.2347 | Jean-Guillaume Dumas | Brice Boyer (LJK), Jean-Guillaume Dumas (LJK), Cl\'ement Pernet (INRIA
Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), Wei Zhou
(Symbolic Computation Group) | Memory efficient scheduling of Strassen-Winograd's matrix multiplication
algorithm | null | (International Symposium on Symbolic and Algebraic Computation
2009), S\'eoul : Cor\'ee, R\'epublique de (2009) | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose several new schedules for Strassen-Winograd's matrix
multiplication algorithm, they reduce the extra memory allocation requirements
by three different means: by introducing a few pre-additions, by overwriting
the input matrices, or by using a first recursive level of classical
multiplication. In particular, we show two fully in-place schedules: one having
the same number of operations, if the input matrices can be overwritten; the
other one, slightly increasing the constant of the leading term of the
complexity, if the input matrices are read-only. Many of these schedules have
been found by an implementation of an exhaustive search algorithm based on a
pebble game.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 16:02:50 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Aug 2007 07:31:58 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Nov 2007 16:05:16 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Jan 2009 09:20:56 GMT"
},
{
"version": "v5",
"created": "Mon, 18 May 2009 13:49:23 GMT"
}
] | 2009-05-18T00:00:00 | [
[
"Boyer",
"Brice",
"",
"LJK"
],
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Pernet",
"Clément",
"",
"INRIA\n Rhône-Alpes / LIG Laboratoire d'Informatique de Grenoble"
],
[
"Zhou",
"Wei",
"",
"Symbolic Computation Group"
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0707.2376 | Francesc Rossell\'o | Gabriel Cardona, Francesc Rossello, Gabriel Valiente | Tripartitions do not always discriminate phylogenetic networks | 26 pages, 9 figures | null | null | null | q-bio.PE cs.CE cs.DM | null | Phylogenetic networks are a generalization of phylogenetic trees that allow
for the representation of non-treelike evolutionary events, like recombination,
hybridization, or lateral gene transfer. In a recent series of papers devoted
to the study of reconstructibility of phylogenetic networks, Moret, Nakhleh,
Warnow and collaborators introduced the so-called {tripartition metric for
phylogenetic networks. In this paper we show that, in fact, this tripartition
metric does not satisfy the separation axiom of distances (zero distance means
isomorphism, or, in a more relaxed version, zero distance means
indistinguishability in some specific sense) in any of the subclasses of
phylogenetic networks where it is claimed to do so. We also present a subclass
of phylogenetic networks whose members can be singled out by means of their
sets of tripartitions (or even clusters), and hence where the latter can be
used to define a meaningful metric.
| [
{
"version": "v1",
"created": "Mon, 16 Jul 2007 19:59:42 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Cardona",
"Gabriel",
""
],
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.2432 | Erhan Bayraktar | Erhan Bayraktar, Hao Xing | Pricing Asian Options for Jump Diffusions | Key Words: Pricing Asian Options, Jump diffusions, an Iterative
Numerical Scheme, Classical Solutions of Integro-PDEs | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct a sequence of functions that uniformly converge (on compact
sets) to the price of Asian option, which is written on a stock whose dynamics
follows a jump diffusion, exponentially fast. Each of the element in this
sequence solves a parabolic partial differen- tial equation (not an
integro-differential equation). As a result we obtain a fast numerical
approximation scheme whose accuracy versus speed characteristics can be
controlled. We analyze the performance of our numerical algorithm on several
examples.
| [
{
"version": "v1",
"created": "Tue, 17 Jul 2007 04:55:18 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2007 17:35:45 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Dec 2007 03:04:13 GMT"
},
{
"version": "v4",
"created": "Sat, 12 Jan 2008 18:28:58 GMT"
},
{
"version": "v5",
"created": "Thu, 22 May 2008 02:58:57 GMT"
},
{
"version": "v6",
"created": "Sun, 15 Jun 2008 21:36:58 GMT"
},
{
"version": "v7",
"created": "Wed, 29 Oct 2008 13:49:51 GMT"
}
] | 2008-10-29T00:00:00 | [
[
"Bayraktar",
"Erhan",
""
],
[
"Xing",
"Hao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0707.2436 | Massimiliano Laddomada Ph.D. | Massimiliano Laddomada | On the Polyphase Decomposition for Design of Generalized Comb Decimation
Filters | Submitted to IEEE TCAS-I, February 2007; 11 double-column pages, 9
figures, 1 table | null | 10.1109/TCSI.2008.920136 | null | cs.OH | null | Generalized comb filters (GCFs) are efficient anti-aliasing decimation
filters with improved selectivity and quantization noise (QN) rejection
performance around the so called folding bands with respect to classical comb
filters.
In this paper, we address the design of GCF filters by proposing an efficient
partial polyphase architecture with the aim to reduce the data rate as much as
possible after the Sigma-Delta A/D conversion. We propose a mathematical
framework in order to completely characterize the dependence of the frequency
response of GCFs on the quantization of the multipliers embedded in the
proposed filter architecture. This analysis paves the way to the design of
multiplier-less decimation architectures.
We also derive the impulse response of a sample 3rd order GCF filter used as
a reference scheme throughout the paper.
| [
{
"version": "v1",
"created": "Tue, 17 Jul 2007 05:38:30 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Laddomada",
"Massimiliano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.2482 | Jan Ostergaard | Jan Ostergaard | Multiple-Description Lattice Vector Quantization | Ph.D. Thesis, 250 pages. (Thesis advisors: R. Heusdens and J. Jensen.
Promotor: R. Lagendijk) | Ph.D. Thesis, Delft University of Technology, ISBN
978-90-9021979-0, pp. 250, Gildeprint, June 2007 | null | null | cs.IT math.IT | null | In this thesis, we construct and analyze multiple-description codes based on
lattice vector quantization.
| [
{
"version": "v1",
"created": "Tue, 17 Jul 2007 11:10:52 GMT"
}
] | 2007-07-18T00:00:00 | [
[
"Ostergaard",
"Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2506 | Alain Dutech | Raghav Aras (INRIA Lorraine - LORIA), Alain Dutech (INRIA Lorraine -
LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA) | Mixed Integer Linear Programming For Exact Finite-Horizon Planning In
Decentralized Pomdps | null | Dans The International Conference on Automated Planning and
Scheduling (2007) | null | null | cs.AI | null | We consider the problem of finding an n-agent joint-policy for the optimal
finite-horizon control of a decentralized Pomdp (Dec-Pomdp). This is a problem
of very high complexity (NEXP-hard in n >= 2). In this paper, we propose a new
mathematical programming approach for the problem. Our approach is based on two
ideas: First, we represent each agent's policy in the sequence-form and not in
the tree-form, thereby obtaining a very compact representation of the set of
joint-policies. Second, using this compact representation, we solve this
problem as an instance of combinatorial optimization for which we formulate a
mixed integer linear program (MILP). The optimal solution of the MILP directly
yields an optimal joint-policy for the Dec-Pomdp. Computational experience
shows that formulating and solving the MILP requires significantly less time to
solve benchmark Dec-Pomdp problems than existing algorithms. For example, the
multi-agent tiger problem for horizon 4 is solved in 72 secs with the MILP
whereas existing algorithms require several hours to solve it.
| [
{
"version": "v1",
"created": "Tue, 17 Jul 2007 12:49:30 GMT"
}
] | 2016-03-28T00:00:00 | [
[
"Aras",
"Raghav",
"",
"INRIA Lorraine - LORIA"
],
[
"Dutech",
"Alain",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0707.2527 | Anders Gjendemsj{\o} | Anders Gjendemsj{\o}, Geir E. {\O}ien, Henrik Holm, Mohamed-Slim
Alouini, David Gesbert, Kjell J. Hole and P{\aa}l Orten | Rate and Power Allocation for Discrete-Rate Link Adaptation | 9 pages, 8 figures, submitted to the EURASIP Journal on Wireless
Communications and Networking, July 2007 | null | null | null | cs.IT math.IT | null | Link adaptation, in particular adaptive coded modulation (ACM), is a
promising tool for bandwidth-efficient transmission in a fading environment.
The main motivation behind employing ACM schemes is to improve the spectral
efficiency of wireless communication systems. In this paper, using a finite
number of capacity achieving component codes, we propose new transmission
schemes employing constant power transmission, as well as discrete and
continuous power adaptation, for slowly varying flat-fading channels.
We show that the proposed transmission schemes can achieve throughputs close
to the Shannon limits of flat-fading channels using only a small number of
codes. Specifically, using a fully discrete scheme with just four codes, each
associated with four power levels, we achieve a spectral efficiency within 1 dB
of the continuous-rate continuous-power Shannon capacity. Furthermore, when
restricted to a fixed number of codes, the introduction of power adaptation has
significant gains with respect to ASE and probability of no transmission
compared to a constant power scheme.
| [
{
"version": "v1",
"created": "Tue, 17 Jul 2007 14:16:18 GMT"
}
] | 2016-03-28T00:00:00 | [
[
"Gjendemsjø",
"Anders",
""
],
[
"Øien",
"Geir E.",
""
],
[
"Holm",
"Henrik",
""
],
[
"Alouini",
"Mohamed-Slim",
""
],
[
"Gesbert",
"David",
""
],
[
"Hole",
"Kjell J.",
""
],
[
"Orten",
"Pål",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2562 | Claude Tardif | Benoit Larose, Cynthia Loten, Claude Tardif | A Characterisation of First-Order Constraint Satisfaction Problems | null | Logical Methods in Computer Science, Volume 3, Issue 4 (November
6, 2007) lmcs:1097 | 10.2168/LMCS-3(4:6)2007 | null | cs.LO cs.CC | null | We describe simple algebraic and combinatorial characterisations of finite
relational core structures admitting finitely many obstructions. As a
consequence, we show that it is decidable to determine whether a constraint
satisfaction problem is first-order definable: we show the general problem to
be NP-complete, and give a polynomial-time algorithm in the case of cores. A
slight modification of this algorithm provides, for first-order definable
CSP's, a simple poly-time algorithm to produce a solution when one exists. As
an application of our algebraic characterisation of first order CSP's, we
describe a large family of L-complete CSP's.
| [
{
"version": "v1",
"created": "Tue, 17 Jul 2007 16:23:45 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Nov 2007 10:18:41 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Larose",
"Benoit",
""
],
[
"Loten",
"Cynthia",
""
],
[
"Tardif",
"Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.2630 | Toshiya Takami | Toshiya Takami, Jun Maki, Jun'ichi Ooba, Yuuichi Inadomi, Hiroaki
Honda, Ryutaro Susukita, Koji Inoue, Taizo Kobayashi, Rie Nogita, and Mutsumi
Aoyagi | Multi-physics Extension of OpenFMO Framework | 4 pages with 11 figure files, to appear in the Proceedings of ICCMSE
2007 | AIP Conf. Proc. 963, 122-125 (2007) | 10.1063/1.2835969 | null | cs.DC physics.comp-ph | null | OpenFMO framework, an open-source software (OSS) platform for Fragment
Molecular Orbital (FMO) method, is extended to multi-physics simulations (MPS).
After reviewing the several FMO implementations on distributed computer
environments, the subsequent development planning corresponding to MPS is
presented. It is discussed which should be selected as a scientific software,
lightweight and reconfigurable form or large and self-contained form.
| [
{
"version": "v1",
"created": "Wed, 18 Jul 2007 05:34:08 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Takami",
"Toshiya",
""
],
[
"Maki",
"Jun",
""
],
[
"Ooba",
"Jun'ichi",
""
],
[
"Inadomi",
"Yuuichi",
""
],
[
"Honda",
"Hiroaki",
""
],
[
"Susukita",
"Ryutaro",
""
],
[
"Inoue",
"Koji",
""
],
[
"Kobayashi",
"Taizo",
""
],
[
"Nogita",
"Rie",
""
],
[
"Aoyagi",
"Mutsumi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0707.2701 | Gernot Schaller | Gernot Schaller | A fixed point iteration for computing the matrix logarithm | 4 pages, 3 figures, comments welcome | null | null | null | cs.NA cs.DS | null | In various areas of applied numerics, the problem of calculating the
logarithm of a matrix A emerges. Since series expansions of the logarithm
usually do not converge well for matrices far away from the identity, the
standard numerical method calculates successive square roots. In this article,
a new algorithm is presented that relies on the computation of successive
matrix exponentials. Convergence of the method is demonstrated for a large
class of initial matrices and favorable choices of the initial matrix are
discussed.
| [
{
"version": "v1",
"created": "Wed, 18 Jul 2007 11:04:27 GMT"
}
] | 2007-07-19T00:00:00 | [
[
"Schaller",
"Gernot",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0707.2718 | Damien Chablat | Damien Chablat (IRCCyN) | Animation of virtual mannequins, robot-like simulation or motion
captures | null | 3D Modelling Conferences - 3D Human (06/2006) 1-12 | null | null | cs.RO | null | In order to optimize the costs and time of design of the new products while
improving their quality, concurrent engineering is based on the digital model
of these products, the numerical model. However, in order to be able to avoid
definitively physical model, old support of the design, without loss of
information, new tools must be available. Especially, a tool making it possible
to check simply and quickly the maintainability of complex mechanical sets
using the numerical model is necessary. Since one decade, our team works on the
creation of tool for the generation and the analysis of trajectories of virtual
mannequins. The simulation of human tasks can be carried out either by
robot-like simulation or by simulation by motion capture. This paper presents
some results on the both two methods. The first method is based on a
multi-agent system and on a digital mock-up technology, to assess an efficient
path planner for a manikin or a robot for access and visibility task taking
into account ergonomic constraints or joint and mechanical limits. In order to
solve this problem, the human operator is integrated in the process
optimization to contribute to a global perception of the environment. This
operator cooperates, in real-time, with several automatic local elementary
agents. In the case of the second approach, we worked with the CEA and EADS/CCR
to solve the constraints related to the evolution of human virtual in its
environment on the basis of data resulting from motion capture system. An
approach using of the virtual guides was developed to allow to the user the
realization of precise trajectory in absence of force feedback. The result of
this work validates solutions through the digital mock-up; it can be applied to
simulate maintenability and mountability tasks.
| [
{
"version": "v1",
"created": "Wed, 18 Jul 2007 12:59:15 GMT"
}
] | 2007-07-19T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2721 | Damien Chablat | Qinqin Zhang (IRCCyN, DIE), Damien Chablat (IRCCyN), Fouad Bennis
(IRCCyN), Wei Zhang (DIE) | A Framework to Illustrate Kinematic Behavior of Mechanisms by Haptic
Feedback | null | Proceedings of Virtual Concept (25/11/2006) 1-6 | null | null | cs.RO | null | The kinematic properties of mechanisms are well known by the researchers and
teachers. The theory based on the study of Jacobian matrices allows us to
explain, for example, the singular configuration. However, in many cases, the
physical sense of such properties is difficult to explain to students. The aim
of this article is to use haptic feedback to render to the user the
signification of different kinematic indices. The framework uses a Phantom Omni
and a serial and parallel mechanism with two degrees of freedom. The
end-effector of both mechanisms can be moved either by classical mouse, or
Phantom Omni with or without feedback.
| [
{
"version": "v1",
"created": "Wed, 18 Jul 2007 13:02:29 GMT"
}
] | 2007-07-19T00:00:00 | [
[
"Zhang",
"Qinqin",
"",
"IRCCyN, DIE"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Zhang",
"Wei",
"",
"DIE"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2780 | Aydin Sezgin | Aydin Sezgin, Mohamad Charafeddine, Arogyaswami Paulraj | On the ergodic sum-rate performance of CDD in multi-user systems | to appear in Proceedings of 2007 IEEE Information Theory Workshop
(ITW) in Lake Tahoe | null | 10.1109/ITW.2007.4313052 | null | cs.IT math.IT | null | The main focus of space-time coding design and analysis for MIMO systems has
been so far focused on single-user systems. For single-user systems, transmit
diversity schemes suffer a loss in spectral efficiency if the receiver is
equipped with more than one antenna, making them unsuitable for high rate
transmission. One such transmit diversity scheme is the cyclic delay diversity
code (CDD). The advantage of CDD over other diversity schemes such as
orthogonal space-time block codes (OSTBC) is that a code rate of one and delay
optimality are achieved independent of the number of transmit antennas. In this
work we analyze the ergodic rate of a multi-user multiple access channel (MAC)
with each user applying such a cyclic delay diversity (CDD) code. We derive
closed form expressions for the ergodic sum-rate of multi-user CDD and compare
it with the sum-capacity. We study the ergodic rate region and show that in
contrast to what is conventionally known regarding the single-user case,
transmit diversity schemes are viable candidates for high rate transmission in
multi-user systems. Finally, our theoretical findings are illustrated by
numerical simulation results.
| [
{
"version": "v1",
"created": "Wed, 18 Jul 2007 18:39:23 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sezgin",
"Aydin",
""
],
[
"Charafeddine",
"Mohamad",
""
],
[
"Paulraj",
"Arogyaswami",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2792 | Ivan Savov | David Avis, Patrick Hayden, Ivan Savov | Distributed Compression and Multiparty Squashed Entanglement | 26 pages, 6 figures thanks to jPicEdt. In v2 we fixed some typos and
made minor clarifications and updates | J. Phys. A 41 (2008) 115301 | 10.1088/1751-8113/41/11/115301 | null | quant-ph cs.IT math.IT | null | We study a protocol in which many parties use quantum communication to
transfer a shared state to a receiver without communicating with each other.
This protocol is a multiparty version of the fully quantum Slepian-Wolf
protocol for two senders and arises through the repeated application of the
two-sender protocol. We describe bounds on the achievable rate region for the
distributed compression problem. The inner bound arises by expressing the
achievable rate region for our protocol in terms of its vertices and extreme
rays and, equivalently, in terms of facet inequalities. We also prove an outer
bound on all possible rates for distributed compression based on the multiparty
squashed entanglement, a measure of multiparty entanglement.
| [
{
"version": "v1",
"created": "Wed, 18 Jul 2007 20:07:30 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Feb 2008 19:39:29 GMT"
}
] | 2012-07-06T00:00:00 | [
[
"Avis",
"David",
""
],
[
"Hayden",
"Patrick",
""
],
[
"Savov",
"Ivan",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2833 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jean-Pierre Merlet
(INRIA Sophia Antipolis) | A Comparative Study between Two Three-DOF Parallel Kinematic Machines
using Kinetostatic Criteria and Interval Analysis | null | 11th World Congress in Mechanism and Machine Science (04/2004) 1-6 | null | null | cs.RO | null | This paper addresses the workspace analysis of two 3-DOF translational
parallel mechanisms designed for machining applications. The two machines
features three fixed linear joints. The joint axes of the first machine are
orthogonal whereas these of the second are parallel. In both cases, the mobile
platform moves in the Cartesian $x-y-z$ space with fixed orientation. The
workspace analysis is conducted on the basis of prescribed kinetostatic
performances. Interval analysis based methods are used to compute the dextrous
workspace and the largest cube enclosed in this workspace.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 04:44:06 GMT"
}
] | 2007-07-20T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Merlet",
"Jean-Pierre",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2836 | Inanc Inan | Inanc Inan, Feyza Keceli, Ender Ayanoglu | Multimedia Capacity Analysis of the IEEE 802.11e Contention-based
Infrastructure Basic Service Set | null | null | null | null | cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We first propose a simple mathematical analysis framework for the Enhanced
Distributed Channel Access (EDCA) function of the recently ratified IEEE
802.11e standard. Our analysis considers the fact that the distributed random
access systems exhibit cyclic behavior. The proposed model is valid for
arbitrary assignments of AC-specific Arbitration Interframe Space (AIFS) values
and Contention Window (CW) sizes and is the first that considers an arbitrary
distribution of active Access Categories (ACs) at the stations. Validating the
theoretical results via extensive simulations, we show that the proposed
analysis accurately captures the EDCA saturation performance. Next, we propose
a framework for multimedia capacity analysis of the EDCA function. We calculate
an accurate station- and AC-specific queue utilization ratio by appropriately
weighing the service time predictions of the cycle time model for different
number of active stations. Based on the calculated queue utilization ratio, we
design a simple model-based admission control scheme. We show that the proposed
call admission control algorithm maintains satisfactory user-perceived quality
for coexisting voice and video connections in an infrastructure BSS and does
not present over- or under-admission problems of previously proposed models in
the literature.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 05:16:53 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 18:08:46 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Aug 2008 05:55:21 GMT"
}
] | 2008-08-12T00:00:00 | [
[
"Inan",
"Inanc",
""
],
[
"Keceli",
"Feyza",
""
],
[
"Ayanoglu",
"Ender",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.2841 | Damien Chablat | Damien Chablat (IRCCyN), Philippe D\'epinc\'e, Eric No\"el,
Peer-Oliver Woelk (IFW) | The Virtual Manufacturing concept: Scope, Socio-Economic Aspects and
Future Trends | null | Design Engineering Technical Conferences (09/2004) 1-6 | null | null | cs.RO | null | The research area "Virtual Manufacturing (VM)'' is the use of information
technology and computer simulation to model real world manufacturing processes
for the purpose of analysing and understanding them. As automation technologies
such as CAD/CAM have substantially shortened the time required to design
products, Virtual Manufacturing will have a similar effect on the manufacturing
phase thanks to the modelling, simulation and optimisation of the product and
the processes involved in its fabrication. After a description of Virtual
Manufacturing (definitions and scope), we present some socio-economic factors
of VM and finaly some "hot topics'' for the future are proposed.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 07:15:53 GMT"
}
] | 2007-07-20T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Dépincé",
"Philippe",
"",
"IFW"
],
[
"Noël",
"Eric",
"",
"IFW"
],
[
"Woelk",
"Peer-Oliver",
"",
"IFW"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2842 | Damien Chablat | Maher Baili (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | A Classification of 3R Orthogonal Manipulators by the Topology of their
Workspace | null | Proc. IEEE Int. Conf. Rob. and Automation (04/2004) 1-6 | null | null | cs.RO | null | A classification of a family of 3-revolute (3R) positining manipulators is
established. This classification is based on the topology of their workspace.
The workspace is characterized in a half-cross section by the singular curves.
The workspace topology is defined by the number of cusps and nodes that appear
on these singular curves. The design parameters space is shown to be divided
into nine domains of distinct workspace topologies, in which all manipulators
have similar global kinematic properties. Each separating surface is given as
an explicit expression in the DH-parameters.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 07:20:26 GMT"
}
] | 2007-07-20T00:00:00 | [
[
"Baili",
"Maher",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.2886 | Laurent Romary | Laurent Romary (MPDL) | OA@MPS - a colourful view | null | Zeitschrift f\"ur Bibliothekswesen und Bibliographie (15/08/2007)
7 pages | null | null | cs.DL | null | The open access agenda of the Max Planck Society, initiator of the Berlin
Declaration, envisions the support of both the green way and the golden way to
open access. For the implementation of the green way the Max Planck Society
through its newly established unit (Max Planck Digital Library) follows the
idea of providing a centralized technical platform for publications and a local
support for editorial issues. With regard to the golden way, the Max Planck
Society fosters the development of open access publication models and
experiments new publishing concepts like the Living Reviews journals.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 12:30:42 GMT"
}
] | 2007-07-20T00:00:00 | [
[
"Romary",
"Laurent",
"",
"MPDL"
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0707.2921 | Andrea Pacifici | Alessandro Agnetis, Enrico Grande, Pitu B. Mirchandani, Andrea
Pacifici | Covering a line segment with variable radius discs | 21 pages, 2 figures | null | null | null | cs.DM cs.NA | null | The paper addresses the problem of locating sensors with a circular field of
view so that a given line segment is under full surveillance, which is termed
as the Disc Covering Problem on a Line. The cost of each sensor includes a
fixed component, and a variable component that is proportional to the
field-of-view area. When only one type of sensor or, in general, one type of
disc, is available, then a simple polynomial algorithm solves the problem. When
there are different types of sensors in terms of fixed and variable costs, the
problem becomes NP-hard. A branch-and-bound algorithm as well as an efficient
heuristic are developed. The heuristic very often obtains the optimal solution
as shown in extensive computational testing.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 14:59:47 GMT"
}
] | 2007-07-20T00:00:00 | [
[
"Agnetis",
"Alessandro",
""
],
[
"Grande",
"Enrico",
""
],
[
"Mirchandani",
"Pitu B.",
""
],
[
"Pacifici",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0707.2926 | Bernard Levy | Bernard C. Levy | Robust Hypothesis Testing with a Relative Entropy Tolerance | 14 pages, 5 figures, submitted to the IEEE Transactions on
Information Theory, July 2007, revised April 2008 | null | 10.1109/TIT.2008.2008128 | null | cs.IT math.IT | null | This paper considers the design of a minimax test for two hypotheses where
the actual probability densities of the observations are located in
neighborhoods obtained by placing a bound on the relative entropy between
actual and nominal densities. The minimax problem admits a saddle point which
is characterized. The robust test applies a nonlinear transformation which
flattens the nominal likelihood ratio in the vicinity of one. Results are
illustrated by considering the transmission of binary data in the presence of
additive noise.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 15:33:36 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Apr 2008 00:18:43 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Levy",
"Bernard C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |