id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0707.1008
Mich\`ele Wigger
Amos Lapidoth, Shlomo Shamai (Shitz), Michele A. Wigger
On Cognitive Interference Networks
to appear in Proceedings of 2007 IEEE Information Theory Workshop (ITW) in Lake Tahoe
null
10.1109/ITW.2007.4313095
null
cs.IT math.IT
null
We study the high-power asymptotic behavior of the sum-rate capacity of multi-user interference networks with an equal number of transmitters and receivers. We assume that each transmitter is cognizant of the message it wishes to convey to its corresponding receiver and also of the messages that a subset of the other transmitters wish to send. The receivers are assumed not to be able to cooperate in any way so that they must base their decision on the signal they receive only. We focus on the network's pre-log, which is defined as the limiting ratio of the sum-rate capacity to half the logarithm of the transmitted power. We present both upper and lower bounds on the network's pre-log. The lower bounds are based on a linear partial-cancellation scheme which entails linearly transforming Gaussian codebooks so as to eliminate the interference in a subset of the receivers. Inter alias, the bounds give a complete characterization of the networks and side-information settings that result in a full pre-log, i.e., in a pre-log that is equal to the number of transmitters (and receivers) as well as a complete characterization of networks whose pre-log is equal to the full pre-log minus one. They also fully characterize networks where the full pre-log can only be achieved if each transmitter knows the messages of all users, i.e., when the side-information is "full".
[ { "version": "v1", "created": "Fri, 6 Jul 2007 16:17:52 GMT" } ]
2016-11-15T00:00:00
[ [ "Lapidoth", "Amos", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ], [ "Wigger", "Michele A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1025
Sergei Fedorenko
Sergei Fedorenko
The star trellis decoding of Reed-Solomon codes
6 pages. Proceedings of the XI international symposium on problems of redundancy in information and control systems at St.Petersburg, Russia, July 2007, pp.58-61
null
null
null
cs.IT math.IT
null
The new method for Reed-Solomon codes decoding is introduced. The method is based on the star trellis decoding of the binary image of Reed-Solomon codes.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 17:32:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Fedorenko", "Sergei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1051
Mark Braverman
Mark Braverman, Elchanan Mossel
Noisy Sorting Without Resampling
null
null
null
null
cs.DS
null
In this paper we study noisy sorting without re-sampling. In this problem there is an unknown order $a_{\pi(1)} < ... < a_{\pi(n)}$ where $\pi$ is a permutation on $n$ elements. The input is the status of $n \choose 2$ queries of the form $q(a_i,x_j)$, where $q(a_i,a_j) = +$ with probability at least $1/2+\ga$ if $\pi(i) > \pi(j)$ for all pairs $i \neq j$, where $\ga > 0$ is a constant and $q(a_i,a_j) = -q(a_j,a_i)$ for all $i$ and $j$. It is assumed that the errors are independent. Given the status of the queries the goal is to find the maximum likelihood order. In other words, the goal is find a permutation $\sigma$ that minimizes the number of pairs $\sigma(i) > \sigma(j)$ where $q(\sigma(i),\sigma(j)) = -$. The problem so defined is the feedback arc set problem on distributions of inputs, each of which is a tournament obtained as a noisy perturbations of a linear order. Note that when $\ga < 1/2$ and $n$ is large, it is impossible to recover the original order $\pi$. It is known that the weighted feedback are set problem on tournaments is NP-hard in general. Here we present an algorithm of running time $n^{O(\gamma^{-4})}$ and sampling complexity $O_{\gamma}(n \log n)$ that with high probability solves the noisy sorting without re-sampling problem. We also show that if $a_{\sigma(1)},a_{\sigma(2)},...,a_{\sigma(n)}$ is an optimal solution of the problem then it is ``close'' to the original order. More formally, with high probability it holds that $\sum_i |\sigma(i) - \pi(i)| = \Theta(n)$ and $\max_i |\sigma(i) - \pi(i)| = \Theta(\log n)$. Our results are of interest in applications to ranking, such as ranking in sports, or ranking of search items based on comparisons by experts.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 21:30:24 GMT" } ]
2007-07-10T00:00:00
[ [ "Braverman", "Mark", "" ], [ "Mossel", "Elchanan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.1053
Sudhir Kumar Singh
Sudhir Kumar Singh, Vwani P. Roychowdhury, Milan Bradonji\'c, Behnam A. Rezaei
Exploration via design and the cost of uncertainty in keyword auctions
19 pages, presentation improved, references added, title changed
null
null
null
cs.GT
null
We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pricing rule, similar ranking scheme, as well as, similar mathematical structure of payoffs. In particular, the estimations of the relevance scores and true-values are achieved by providing a chance to lower ranked advertisers to obtain better slots. This allows the search engine to potentially test a new pool of advertisers, and correspondingly, enables new advertisers to estimate the value of clicks/leads generated via the auction. Both these quantities are unknown a priori, and their knowledge is necessary for the auction to operate efficiently. We show that such an exploration policy can be incorporated without any significant loss in revenue for the auctioneer. We compare the revenue of the new mechanism to that of the standard mechanism at their corresponding symmetric Nash equilibria and compute the cost of uncertainty, which is defined as the relative loss in expected revenue per impression. We also bound the loss in efficiency, as well as, in user experience due to exploration, under the same solution concept (i.e. SNE). Thus the proposed exploration mechanism learns the relevance scores while incorporating the incentive constraints from the advertisers who are selfish and are trying to maximize their own profits, and therefore, the exploration is essentially achieved via mechanism design. We also discuss variations of the new mechanism such as truthful implementations.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 22:11:17 GMT" }, { "version": "v2", "created": "Fri, 2 Nov 2007 07:02:26 GMT" } ]
2011-11-10T00:00:00
[ [ "Singh", "Sudhir Kumar", "" ], [ "Roychowdhury", "Vwani P.", "" ], [ "Bradonjić", "Milan", "" ], [ "Rezaei", "Behnam A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0707.1057
Sudhir Kumar Singh
Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei
For-profit mediators in sponsored search advertising
6 pages
null
null
null
cs.GT
null
A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-profit} mediators, so as to distinguish them from mediators introduced in prior work, who have no monetary incentives, and are driven by the altruistic goal of implementing certain desired outcomes. We show that in our model, (i) players/advertisers can improve their payoffs by choosing to use the services of the mediator, compared to directly participating in the auction; (ii) the mediator can obtain monetary benefit by managing the advertising burden of its group of advertisers; and (iii) the payoffs of the mediator and the advertisers it plays for are compatible with the incentive constraints from the advertisers who do dot use its services. A simple intuition behind the above result comes from the observation that the mediator has more information about and more control over the bid profile than any individual advertiser, allowing her to reduce the payments made to the auctioneer, while still maintaining incentive constraints. Further, our results indicate that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents to coexist.
[ { "version": "v1", "created": "Sat, 7 Jul 2007 03:18:26 GMT" }, { "version": "v2", "created": "Mon, 3 Sep 2007 12:19:30 GMT" } ]
2007-09-03T00:00:00
[ [ "Singh", "Sudhir Kumar", "" ], [ "Roychowdhury", "Vwani P.", "" ], [ "Gunadhi", "Himawan", "" ], [ "Rezaei", "Behnam A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0707.1059
Alban Ponse
Jan A. Bergstra and Alban Ponse
Projection semantics for rigid loops
20 pages
null
null
PRG0604
cs.PL
null
A rigid loop is a for-loop with a counter not accessible to the loop body or any other part of a program. Special instructions for rigid loops are introduced on top of the syntax of the program algebra PGA. Two different semantic projections are provided and proven equivalent. One of these is taken to have definitional status on the basis of two criteria: `normative semantic adequacy' and `indicative algorithmic adequacy'.
[ { "version": "v1", "created": "Fri, 6 Jul 2007 23:58:45 GMT" } ]
2007-07-10T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Ponse", "Alban", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0707.1063
Animesh Kumar
Animesh Kumar, Prakash Ishwar, and Kannan Ramchandran
High-resolution distributed sampling of bandlimited fields with low-precision sensors
17 pages, 6 figures; paper withdrawn from IEEE Transactions on Signal Processing and re-submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2090194
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of sampling a discrete-time sequence of spatially bandlimited fields with a bounded dynamic range, in a distributed, communication-constrained, processing environment is addressed. A central unit, having access to the data gathered by a dense network of fixed-precision sensors, operating under stringent inter-node communication constraints, is required to reconstruct the field snapshots to maximum accuracy. Both deterministic and stochastic field models are considered. For stochastic fields, results are established in the almost-sure sense. The feasibility of having a flexible tradeoff between the oversampling rate (sensor density) and the analog-to-digital converter (ADC) precision, while achieving an exponential accuracy in the number of bits per Nyquist-interval per snapshot is demonstrated. This exposes an underlying ``conservation of bits'' principle: the bit-budget per Nyquist-interval per snapshot (the rate) can be distributed along the amplitude axis (sensor-precision) and space (sensor density) in an almost arbitrary discrete-valued manner, while retaining the same (exponential) distortion-rate characteristics. Achievable information scaling laws for field reconstruction over a bounded region are also derived: With N one-bit sensors per Nyquist-interval, $\Theta(\log N)$ Nyquist-intervals, and total network bitrate $R_{net} = \Theta((\log N)^2)$ (per-sensor bitrate $\Theta((\log N)/N)$), the maximum pointwise distortion goes to zero as $D = O((\log N)^2/N)$ or $D = O(R_{net} 2^{-\beta \sqrt{R_{net}}})$. This is shown to be possible with only nearest-neighbor communication, distributed coding, and appropriate interpolation algorithms. For a fixed, nonzero target distortion, the number of fixed-precision sensors and the network rate needed is always finite.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 16:17:20 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 17:36:43 GMT" }, { "version": "v3", "created": "Sat, 25 Aug 2007 20:40:03 GMT" }, { "version": "v4", "created": "Thu, 11 Dec 2008 01:59:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Kumar", "Animesh", "" ], [ "Ishwar", "Prakash", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1064
Krishna Srikanth Gomadam
Krishna S. Gomadam and Syed A. Jafar
The Effect of Noise Correlation in AF Relay Networks
32 pages
null
null
null
cs.IT math.IT
null
In wireless relay networks, noise at the relays can be correlated possibly due to common interference or noise propagation from preceding hops. In this work we consider a parallel relay network with noise correlation. For the relay strategy of amplify-and-forward (AF), we determine the optimal rate maximizing relay gains when correlation knowledge is available at the relays. The effect of correlation on the performance of the relay networks is analyzed for the cases where full knowledge of correlation is available at the relays and when there is no knowledge about the correlation structure. Interestingly we find that, on the average, noise correlation is beneficial regardless of whether the relays know the noise covariance matrix or not. However, the knowledge of correlation can greatly improve the performance. Typically, the performance improvement from correlation knowledge increases with the relay power and the number of relays. With perfect correlation knowledge the system is capable of canceling interference if the number of interferers is less than the number of relays. For a dual-hop multiple access parallel network, we obtain closed form expressions for the maximum sum-rate and the optimal relay strategy. The relay optimization for networks with three hops is also considered. For any relay gains for the first stage relays, this represents a parallel relay network with correlated noise. Based on the result of two hop networks with noise correlation, we propose an algorithm for solving the relay optimization problem for three-hop networks.
[ { "version": "v1", "created": "Sat, 7 Jul 2007 18:43:22 GMT" } ]
2007-07-13T00:00:00
[ [ "Gomadam", "Krishna S.", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1083
Viktoria Rojkova
Viktoria Rojkova, Mehmed Kantardzic
Delayed Correlations in Inter-Domain Network Traffic
submitted to CoNext 2007
null
null
null
cs.NI cs.IR
null
To observe the evolution of network traffic correlations we analyze the eigenvalue spectra and eigenvectors statistics of delayed correlation matrices of network traffic counts time series. Delayed correlation matrix D is composed of the correlations between one variable in the multivariable time series and another at a time delay \tau . Inverse participation ratio (IPR) of eigenvectors of D deviates substantially from the IPR of eigenvectors of the equal time correlation matrix C. We relate this finding to the localization and discuss its importance for network congestion control. The time-lagged correlation pattern between network time series is preserved over a long time, up to 100\tau, where \tau=300 sec. The largest eigenvalue \lambda_{max} of D and the corresponding IPR oscillate with two characteristic periods of 3\tau and 6\tau . The existence of delayed correlations between network time series fits well into the long range dependence (LRD) property of the network traffic. The ability to monitor and control the long memory processes is crucial since they impact the network performance. Injecting the random traffic counts between non-randomly correlated time series, we were able to break the picture of periodicity of \lambda_{max}. In addition, we investigated influence of the periodic injections on both largest eigenvalue and the IPR, and addressed relevance of these indicators for the LRD and self-similarity of the network traffic.
[ { "version": "v1", "created": "Sat, 7 Jul 2007 19:01:51 GMT" } ]
2007-07-10T00:00:00
[ [ "Rojkova", "Viktoria", "" ], [ "Kantardzic", "Mehmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0707.1095
Gregory Gutin
Noga Alon, Fedor V. Fomin, Gregory Gutin, Michael Krivelevich, Saket Saurabh
Better Algorithms and Bounds for Directed Maximum Leaf Problems
null
null
null
null
cs.DS cs.DM
null
The {\sc Directed Maximum Leaf Out-Branching} problem is to find an out-branching (i.e. a rooted oriented spanning tree) in a given digraph with the maximum number of leaves. In this paper, we improve known parameterized algorithms and combinatorial bounds on the number of leaves in out-branchings. We show that \begin{itemize} \item every strongly connected digraph $D$ of order $n$ with minimum in-degree at least 3 has an out-branching with at least $(n/4)^{1/3}-1$ leaves; \item if a strongly connected digraph $D$ does not contain an out-branching with $k$ leaves, then the pathwidth of its underlying graph is $O(k\log k)$; \item it can be decided in time $2^{O(k\log^2 k)}\cdot n^{O(1)}$ whether a strongly connected digraph on $n$ vertices has an out-branching with at least $k$ leaves. \end{itemize} All improvements use properties of extremal structures obtained after applying local search and of some out-branching decompositions.
[ { "version": "v1", "created": "Sat, 7 Jul 2007 15:52:29 GMT" } ]
2007-07-10T00:00:00
[ [ "Alon", "Noga", "" ], [ "Fomin", "Fedor V.", "" ], [ "Gutin", "Gregory", "" ], [ "Krivelevich", "Michael", "" ], [ "Saurabh", "Saket", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.1099
Samar Agnihotri
Samar Agnihotri and Pavan Nuggehalli
Worst-Case Interactive Communication and Enhancing Sensor Network Lifetime
Minor revision: fixed some typos and reorganized some portions. 12 pages, 3 figures
null
null
null
cs.IT math.IT
null
We are concerned with the problem of maximizing the worst-case lifetime of a data-gathering wireless sensor network consisting of a set of sensor nodes directly communicating with a base-station.We propose to solve this problem by modeling sensor node and base-station communication as the interactive communication between multiple correlated informants (sensor nodes) and a recipient (base-station). We provide practical and scalable interactive communication protocols for data gathering in sensor networks and demonstrate their efficiency compared to traditional approaches. In this paper, we first develop a formalism to address the problem of worst-case interactive communication between a set of multiple correlated informants and a recipient. We realize that there can be different objectives to achieve in such a communication scenario and compute the optimal number of messages and bits exchanged to realize these objectives. Then, we propose to adapt these results in the context of single-hop data-gathering sensor networks. Finally, based on this proposed formalism, we propose a clustering based communication protocol for large sensor networks and demonstrate its superiority over a traditional clustering protocol.
[ { "version": "v1", "created": "Sat, 7 Jul 2007 18:06:36 GMT" }, { "version": "v2", "created": "Tue, 31 Jul 2007 10:41:29 GMT" }, { "version": "v3", "created": "Sat, 3 Nov 2007 13:30:47 GMT" } ]
2007-11-03T00:00:00
[ [ "Agnihotri", "Samar", "" ], [ "Nuggehalli", "Pavan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1151
Philip Baback Alipour
P. B. Alipour
Logic, Design & Organization of PTVD-SHAM; A Parallel Time Varying & Data Super-helical Access Memory
34 pages, 5 figures (2 multi-figures), 1 table. v.1 & v.2: corrupt file layout due to *.doc file's bad conversion; v.3: fig.2.1 corruption; v.4: correction to v.1-3; v.5: major content revision, spacing levelled; v.6+: theorems, hypotheses content, restructured and conformed with its new topic [arXiv:0710.0244v1] published in cs.CE category. (Avoid corrupted versions.)
null
null
null
cs.AR
null
This paper encompasses a super helical memory system's design, 'Boolean logic & image-logic' as a theoretical concept of an invention-model to 'store time-data' in terms of anticipating the best memory location ever for data/time. A waterfall effect is deemed to assist the process of potential-difference output-switch into diverse logic states in quantum dot computational methods via utilizing coiled carbon nanotubes (CCNTs) and carbon nanotube field effect transistors (CNFETs). A 'quantum confinement' is thus derived for a flow of particles in a categorized quantum well substrate with a normalized capacitance rectifying high B-field flux into electromagnetic induction. Multi-access of coherent sequences of 'qubit addressing' is gained in any magnitude as pre-defined for the orientation of array displacement. Briefly, Gaussian curvature of k<0 is debated in aim of specifying the 2D electron gas characteristics in scenarios where data is stored in short intervals versus long ones e.g. when k'>(k<0) for greater CCNT diameters, space-time continuum is folded by chance for the particle. This benefits from Maxwell-Lorentz theory in Minkowski's space-time viewpoint alike to crystal oscillators for precise data timing purposes and radar systems e.g., time varying self-clocking devices in diverse geographic locations. This application could also be optional for data depository versus extraction, in the best supercomputer system's locations, autonomously. For best performance in minimizing current limiting mechanisms including electromigration, a multilevel metallization and implant process forming elevated sources/drains for the circuit's staircase pyramidal construction, is discussed accordingly.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 19:26:06 GMT" }, { "version": "v2", "created": "Mon, 9 Jul 2007 20:48:51 GMT" }, { "version": "v3", "created": "Thu, 12 Jul 2007 18:36:06 GMT" }, { "version": "v4", "created": "Thu, 12 Jul 2007 20:06:57 GMT" }, { "version": "v5", "created": "Wed, 18 Jul 2007 11:22:22 GMT" }, { "version": "v6", "created": "Tue, 2 Oct 2007 16:31:53 GMT" } ]
2015-03-13T00:00:00
[ [ "Alipour", "P. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0707.1176
Deepak Chermakani Mr
Deepak Chermakani
Expressing an NP-Complete Problem as the Solvability of a Polynomial Equation
7 pages
null
null
null
cs.CC cs.DM
null
We demonstrate a polynomial approach to express the decision version of the directed Hamiltonian Cycle Problem (HCP), which is NP-Complete, as the Solvability of a Polynomial Equation with a constant number of variables, within a bounded real space. We first introduce four new Theorems for a set of periodic Functions with irrational periods, based on which we then use a trigonometric substitution, to show how the HCP can be expressed as the Solvability of a single polynomial Equation with a constant number of variables. The feasible solution of each of these variables is bounded within two real numbers. We point out what future work is necessary to prove that P=NP.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 04:49:47 GMT" }, { "version": "v2", "created": "Wed, 11 Jul 2007 14:08:41 GMT" } ]
2011-11-10T00:00:00
[ [ "Chermakani", "Deepak", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.1193
Damien Chablat
Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Singular curves and cusp points in the joint space of 3-RPR parallel manipulators
null
International Conference On Robotics And Automation (2006) 1-6
null
null
cs.RO
null
This paper investigates the singular curves in two-dimensional slices of the joint space of a family of planar parallel manipulators. It focuses on special points, referred to as cusp points, which may appear on these curves. Cusp points play an important role in the kinematic behavior of parallel manipulators since they make possible a nonsingular change of assembly mode. The purpose of this study is twofold. First, it reviews an important previous work, which, to the authors' knowledge, has never been exploited yet. Second, it determines the cusp points in any two-dimensional slice of the joint space. First results show that the number of cusp points may vary from zero to eight. This work finds applications in both design and trajectory planning.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 07:38:47 GMT" } ]
2007-07-10T00:00:00
[ [ "Zein", "Mazen", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.1241
Mohammad H. Taghavi
Mohammad H. Taghavi, Paul H. Siegel
Graph-Based Decoding in the Presence of ISI
25 pages, 8 figures, Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2110070
null
cs.IT math.IT
null
We propose an approximation of maximum-likelihood detection in ISI channels based on linear programming or message passing. We convert the detection problem into a binary decoding problem, which can be easily combined with LDPC decoding. We show that, for a certain class of channels and in the absence of coding, the proposed technique provides the exact ML solution without an exponential complexity in the size of channel memory, while for some other channels, this method has a non-diminishing probability of failure as SNR increases. Some analysis is provided for the error events of the proposed technique under linear programming.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 12:35:41 GMT" } ]
2016-11-18T00:00:00
[ [ "Taghavi", "Mohammad H.", "" ], [ "Siegel", "Paul H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1266
Pierre-Yves Strub
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud (INRIA Futurs), Pierre-Yves Strub (INRIA Futurs)
Building Decision Procedures in the Calculus of Inductive Constructions
null
Dans 16th EACSL Annual Conference on Computer Science and Logic - CSL 2007 (2007)
null
null
cs.LO
null
It is commonly agreed that the success of future proof assistants will rely on their ability to incorporate computations within deduction in order to mimic the mathematician when replacing the proof of a proposition P by the proof of an equivalent proposition P' obtained from P thanks to possibly complex calculations. In this paper, we investigate a new version of the calculus of inductive constructions which incorporates arbitrary decision procedures into deduction via the conversion rule of the calculus. The novelty of the problem in the context of the calculus of inductive constructions lies in the fact that the computation mechanism varies along proof-checking: goals are sent to the decision procedure together with the set of user hypotheses available from the current context. Our main result shows that this extension of the calculus of constructions does not compromise its main properties: confluence, subject reduction, strong normalization and consistency are all preserved.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 14:35:14 GMT" } ]
2007-07-10T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ], [ "Jouannaud", "Jean-Pierre", "", "INRIA Futurs" ], [ "Strub", "Pierre-Yves", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.1288
Kamel Aouiche
Riadh Ben Messaoud and Kamel Aouiche and C\'ecile Favre
Espaces de repr\'esentation multidimensionnels d\'edi\'es \`a la visualisation
null
null
null
null
cs.DB
null
In decision-support systems, the visual component is important for On Line Analysis Processing (OLAP). In this paper, we propose a new approach that faces the visualization problem due to data sparsity. We use the results of a Multiple Correspondence Analysis (MCA) to reduce the negative effect of sparsity by organizing differently data cube cells. Our approach does not reduce sparsity, however it tries to build relevant representation spaces where facts are efficiently gathered. In order to evaluate our approach, we propose an homogeneity criterion based on geometric neighborhood of cells. The obtained experimental results have shown the efficiency of our method.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 15:52:02 GMT" } ]
2007-07-10T00:00:00
[ [ "Messaoud", "Riadh Ben", "" ], [ "Aouiche", "Kamel", "" ], [ "Favre", "Cécile", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.1295
Riccardo Zecchina
Carlo Baldassi, Alfredo Braunstein, Nicolas Brunel, Riccardo Zecchina
Efficient supervised learning in networks with binary synapses
10 pages, 4 figures
PNAS 104, 11079-11084 (2007)
10.1073/pnas.0700324104
null
q-bio.NC cond-mat.stat-mech cs.NE q-bio.QM
null
Recent experimental studies indicate that synaptic changes induced by neuronal activity are discrete jumps between a small number of stable states. Learning in systems with discrete synapses is known to be a computationally hard problem. Here, we study a neurobiologically plausible on-line learning algorithm that derives from Belief Propagation algorithms. We show that it performs remarkably well in a model neuron with binary synapses, and a finite number of `hidden' states per synapse, that has to learn a random classification task. Such system is able to learn a number of associations close to the theoretical limit, in time which is sublinear in system size. This is to our knowledge the first on-line algorithm that is able to achieve efficiently a finite number of patterns learned per binary synapse. Furthermore, we show that performance is optimal for a finite number of hidden states which becomes very small for sparse coding. The algorithm is similar to the standard `perceptron' learning algorithm, with an additional rule for synaptic transitions which occur only if a currently presented pattern is `barely correct'. In this case, the synaptic changes are meta-plastic only (change in hidden states and not in actual synaptic state), stabilizing the synapse in its current state. Finally, we show that a system with two visible states and K hidden states is much more robust to noise than a system with K visible states. We suggest this rule is sufficiently simple to be easily implemented by neurobiological systems or in hardware.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 16:23:55 GMT" } ]
2009-11-13T00:00:00
[ [ "Baldassi", "Carlo", "" ], [ "Braunstein", "Alfredo", "" ], [ "Brunel", "Nicolas", "" ], [ "Zecchina", "Riccardo", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0707.1304
Kamel Aouiche
Hadj Mahboubi and Kamel Aouiche and J\'er\^ome Darmont
Un index de jointure pour les entrep\^ots de donn\'ees XML
null
null
null
null
cs.DB
null
XML data warehouses form an interesting basis for decision-support applications that exploit heterogeneous data from multiple sources. However, XML-native database systems currently bear limited performances and it is necessary to research ways to optimize them. In this paper, we propose a new index that is specifically adapted to the multidimensional architecture of XML warehouses and eliminates join operations, while preserving the information contained in the original warehouse. A theoretical study and experimental results demonstrate the efficiency of our index, even when queries are complex.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 16:58:14 GMT" } ]
2007-07-10T00:00:00
[ [ "Mahboubi", "Hadj", "" ], [ "Aouiche", "Kamel", "" ], [ "Darmont", "Jérôme", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.1306
Kamel Aouiche
Nora Maiz and Kamel Aouiche and J\'er\^ome Darmont
S\'election simultan\'ee d'index et de vues mat\'erialis\'ees
null
null
null
null
cs.DB
null
Indices and materialized views are physical structures that accelerate data access in data warehouses. However, these data structures generate some maintenance overhead. They also share the same storage space. The existing studies about index and materialized view selection consider these structures separately. In this paper, we adopt the opposite stance and couple index and materialized view selection to take into account the interactions between them and achieve an efficient storage space sharing. We develop cost models that evaluate the respective benefit of indexing and view materialization. These cost models are then exploited by a greedy algorithm to select a relevant configuration of indices and materialized views. Experimental results show that our strategy performs better than the independent selection of indices and materialized views.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 17:23:31 GMT" } ]
2007-07-10T00:00:00
[ [ "Maiz", "Nora", "" ], [ "Aouiche", "Kamel", "" ], [ "Darmont", "Jérôme", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.1364
Robert Gilman
Robert Gilman, Alexei G. Miasnikov, Alexey D. Myasnikov, Alexander Ushakov
Report on Generic Case Complexity
17 pages
null
null
null
cs.CC
null
This article is a short introduction to generic case complexity, which is a recently developed way of measuring the difficulty of a computational problem while ignoring atypical behavior on a small set of inputs. Generic case complexity applies to both recursively solvable and recursively unsolvable problems.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 18:57:08 GMT" } ]
2007-07-11T00:00:00
[ [ "Gilman", "Robert", "" ], [ "Miasnikov", "Alexei G.", "" ], [ "Myasnikov", "Alexey D.", "" ], [ "Ushakov", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.1372
Frederic Blanqui
Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA)
Computability Closure: Ten Years Later
null
Dans Colloquium in honor of Jean-Pierre Jouannaud, 4600 (2007)
null
null
cs.LO
null
The notion of computability closure has been introduced for proving the termination of higher-order rewriting with first-order matching by Jean-Pierre Jouannaud and Mitsuhiro Okada in a 1997 draft which later served as a basis for the author's PhD. In this paper, we show how this notion can also be used for dealing with beta-normalized rewriting with matching modulo beta-eta (on patterns \`a la Miller), rewriting with matching modulo some equational theory, and higher-order data types (types with constructors having functional recursive arguments). Finally, we show how the computability closure can easily be turned into a reduction ordering which, in the higher-order case, contains Jean-Pierre Jouannaud and Albert Rubio's higher-order recursive path ordering and, in the first-order case, is equal to the usual first-order recursive path ordering.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 06:33:52 GMT" } ]
2007-07-11T00:00:00
[ [ "Blanqui", "Frédéric", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.1432
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Dominique Duval (LJK), Jean-Claude Reynaud (RC)
Sequential products in effect categories
null
null
null
null
math.CT cs.PL
null
A new categorical framework is provided for dealing with multiple arguments in a programming language with effects, for example in a language with imperative features. Like related frameworks (Monads, Arrows, Freyd categories), we distinguish two kinds of functions. In addition, we also distinguish two kinds of equations. Then, we are able to define a kind of product, that generalizes the usual categorical product. This yields a powerful tool for deriving many results about languages with effects.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 12:50:35 GMT" } ]
2007-07-11T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Duval", "Dominique", "", "LJK" ], [ "Reynaud", "Jean-Claude", "", "RC" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0707.1452
Xavier Polanco
Xavier Polanco (INIST)
Clusters, Graphs, and Networks for Analysing Internet-Web-Supported Communication within a Virtual Community
null
Advances in Knowledge Organization (2002) 364-371
null
null
cs.AI cs.LG
null
The proposal is to use clusters, graphs and networks as models in order to analyse the Web structure. Clusters, graphs and networks provide knowledge representation and organization. Clusters were generated by co-site analysis. The sample is a set of academic Web sites from the countries belonging to the European Union. These clusters are here revisited from the point of view of graph theory and social network analysis. This is a quantitative and structural analysis. In fact, the Internet is a computer network that connects people and organizations. Thus we may consider it to be a social network. The set of Web academic sites represents an empirical social network, and is viewed as a virtual community. The network structural properties are here analysed applying together cluster analysis, graph theory and social network analysis.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 13:47:32 GMT" } ]
2007-07-11T00:00:00
[ [ "Polanco", "Xavier", "", "INIST" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0707.1470
Yingbin Liang
Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz)
Secrecy Capacity Region of Fading Broadcast Channels
Proc. of IEEE International Symposium on Information Theory (ISIT), June 2007
null
10.1109/ISIT.2007.4557401
null
cs.IT math.IT
null
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The secrecy capacity region is first established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the Gaussian case of the Csiszar-Korner BCC model. The secrecy capacity results are then applied to give the ergodic secrecy capacity region for the fading BCC.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 15:16:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Liang", "Yingbin", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1480
Rene Chalon
Ren\'e Chalon (ICTT), Bertrand T. David (ICTT)
IRVO: an Interaction Model for designing Collaborative Mixed Reality systems
10 pages
Human Computer International 2005, U.S. CD (11/08/2005) 1-10
null
null
cs.HC
null
This paper presents an interaction model adapted to mixed reality environments known as IRVO (Interacting with Real and Virtual Objects). IRVO aims at modeling the interaction between one or more users and the Mixed Reality system by representing explicitly the objects and tools involved and their relationship. IRVO covers the design phase of the life cycle and models the intended use of the system. In a first part, we present a brief review of related HCI models. The second part is devoted to the IRVO model, its notation and some examples. In the third part, we present how IRVO is used for designing applications and in particular we show how this model can be integrated in a Model-Based Approach (CoCSys) which is currently designed at our lab.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 16:01:30 GMT" } ]
2007-07-11T00:00:00
[ [ "Chalon", "René", "", "ICTT" ], [ "David", "Bertrand T.", "", "ICTT" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0707.1490
Gianluca Argentini
Gianluca Argentini
Fast computing of velocity field for flows in industrial burners and pumps
14 pages, 5 figures; paper accepted for Special Issue "Application of distributed and grid computing", Future Generation Computer Systems journal, 2007
null
null
null
math.NA cs.MS
null
In this work we present a technique of fast numerical computation for solutions of Navier-Stokes equations in the case of flows of industrial interest. At first the partial differential equations are translated into a set of nonlinear ordinary differential equations using the geometrical shape of the domain where the flow is developing, then these ODEs are numerically resolved using a set of computations distributed among the available processors. We present some results from simulations on a parallel hardware architecture using native multithreads software and simulating a shared-memory or a distributed-memory environment.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 16:23:43 GMT" } ]
2007-07-11T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0707.1501
Alexander Ushakov
Alexei G. Myasnikov, Alexander Ushakov
Random subgroups and analysis of the length-based and quotient attacks
null
null
null
null
math.GR cs.CR
null
In this paper we discuss generic properties of "random subgroups" of a given group G. It turns out that in many groups G (even in most exotic of them) the random subgroups have a simple algebraic structure and they "sit" inside G in a very particular way. This gives a strong mathematical foundation for cryptanalysis of several group-based cryptosystems and indicates on how to chose "strong keys". To illustrate our technique we analyze the Anshel-Anshel-Goldfeld (AAG) cryptosystem and give a mathematical explanation of recent success of some heuristic length-based attacks on it. Furthermore, we design and analyze a new type of attacks, which we term the quotient attacks. Mathematical methods we develop here also indicate how one can try to choose "parameters" in AAG to foil the attacks.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 17:38:26 GMT" } ]
2007-07-12T00:00:00
[ [ "Myasnikov", "Alexei G.", "" ], [ "Ushakov", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0707.1515
Gun Srijuntongsiri
Gun Srijuntongsiri, Stephen A. Vavasis
Properties of polynomial bases used in a line-surface intersection algorithm
null
null
null
null
cs.NA cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In [5], Srijuntongsiri and Vavasis propose the "Kantorovich-Test Subdivision algorithm", or KTS, which is an algorithm for finding all zeros of a polynomial system in a bounded region of the plane. This algorithm can be used to find the intersections between a line and a surface. The main features of KTS are that it can operate on polynomials represented in any basis that satisfies certain conditions and that its efficiency has an upper bound that depends only on the conditioning of the problem and the choice of the basis representing the polynomial system. This article explores in detail the dependence of the efficiency of the KTS algorithm on the choice of basis. Three bases are considered: the power, the Bernstein, and the Chebyshev bases. These three bases satisfy the basis properties required by KTS. Theoretically, Chebyshev case has the smallest upper bound on its running time. The computational results, however, do not show that Chebyshev case performs better than the other two.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 18:56:05 GMT" }, { "version": "v2", "created": "Wed, 11 Jul 2007 00:37:41 GMT" }, { "version": "v3", "created": "Mon, 22 Oct 2007 03:20:49 GMT" }, { "version": "v4", "created": "Mon, 8 Sep 2008 09:18:56 GMT" }, { "version": "v5", "created": "Fri, 27 Feb 2009 10:43:30 GMT" } ]
2009-02-27T00:00:00
[ [ "Srijuntongsiri", "Gun", "" ], [ "Vavasis", "Stephen A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0707.1527
Anya Tafliovich
Anya Tafliovich, Eric C.R. Hehner
Programming Telepathy: Implementing Quantum Non-Locality Games
null
null
null
null
quant-ph cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum pseudo-telepathy is an intriguing phenomenon which results from the application of quantum information theory to communication complexity. To demonstrate this phenomenon researchers in the field of quantum communication complexity devised a number of quantum non-locality games. The setting of these games is as follows: the players are separated so that no communication between them is possible and are given a certain computational task. When the players have access to a quantum resource called entanglement, they can accomplish the task: something that is impossible in a classical setting. To an observer who is unfamiliar with the laws of quantum mechanics it seems that the players employ some sort of telepathy; that is, they somehow exchange information without sharing a communication channel. This paper provides a formal framework for specifying, implementing, and analysing quantum non-locality games.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 19:50:25 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2009 15:25:07 GMT" } ]
2009-07-29T00:00:00
[ [ "Tafliovich", "Anya", "" ], [ "Hehner", "Eric C. R.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0707.1532
Samantha Riesenfeld
Constantinos Daskalakis (1), Richard M. Karp (1), Elchanan Mossel (1), Samantha Riesenfeld (1), Elad Verbin (2) ((1) U.C. Berkeley, (2) Tel Aviv University)
Sorting and Selection in Posets
24 pages
null
null
null
cs.DS cs.DM
null
Classical problems of sorting and searching assume an underlying linear ordering of the objects being compared. In this paper, we study a more general setting, in which some pairs of objects are incomparable. This generalization is relevant in applications related to rankings in sports, college admissions, or conference submissions. It also has potential applications in biology, such as comparing the evolutionary fitness of different strains of bacteria, or understanding input-output relations among a set of metabolic reactions or the causal influences among a set of interacting genes or proteins. Our results improve and extend results from two decades ago of Faigle and Tur\'{a}n. A measure of complexity of a partially ordered set (poset) is its width. Our algorithms obtain information about a poset by queries that compare two elements. We present an algorithm that sorts, i.e. completely identifies, a width w poset of size n and has query complexity O(wn + nlog(n)), which is within a constant factor of the information-theoretic lower bound. We also show that a variant of Mergesort has query complexity O(wn(log(n/w))) and total complexity O((w^2)nlog(n/w)). Faigle and Tur\'{a}n have shown that the sorting problem has query complexity O(wn(log(n/w))) but did not address its total complexity. For the related problem of determining the minimal elements of a poset, we give efficient deterministic and randomized algorithms with O(wn) query and total complexity, along with matching lower bounds for the query complexity up to a factor of 2. We generalize these results to the k-selection problem of determining the elements of height at most k. We also derive upper bounds on the total complexity of some other problems of a similar flavor.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 21:52:17 GMT" } ]
2007-07-12T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Karp", "Richard M.", "" ], [ "Mossel", "Elchanan", "" ], [ "Riesenfeld", "Samantha", "" ], [ "Verbin", "Elad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.1534
Kamel Aouiche
J\'er\^ome Darmont, Omar Boussaid, Jean-Christian Ralaivao and Kamel Aouiche
An Architecture Framework for Complex Data Warehouses
null
null
null
null
cs.DB
null
Nowadays, many decision support applications need to exploit data that are not only numerical or symbolic, but also multimedia, multistructure, multisource, multimodal, and/or multiversion. We term such data complex data. Managing and analyzing complex data involves a lot of different issues regarding their structure, storage and processing, and metadata are a key element in all these processes. Such problems have been addressed by classical data warehousing (i.e., applied to "simple" data). However, data warehousing approaches need to be adapted for complex data. In this paper, we first propose a precise, though open, definition of complex data. Then we present a general architecture framework for warehousing complex data. This architecture heavily relies on metadata and domain-related knowledge, and rests on the XML language, which helps storing data, metadata and domain-specific knowledge altogether, and facilitates communication between the various warehousing processes.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 22:01:40 GMT" } ]
2007-07-12T00:00:00
[ [ "Darmont", "Jérôme", "" ], [ "Boussaid", "Omar", "" ], [ "Ralaivao", "Jean-Christian", "" ], [ "Aouiche", "Kamel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.1548
Kamel Aouiche
Kamel Aouiche and J\'er\^ome Darmont
Data Mining-based Materialized View and Index Selection in Data Warehouses
null
null
null
null
cs.DB
null
Materialized views and indexes are physical structures for accelerating data access that are casually used in data warehouses. However, these data structures generate some maintenance overhead. They also share the same storage space. Most existing studies about materialized view and index selection consider these structures separately. In this paper, we adopt the opposite stance and couple materialized view and index selection to take view-index interactions into account and achieve efficient storage space sharing. Candidate materialized views and indexes are selected through a data mining process. We also exploit cost models that evaluate the respective benefit of indexing and view materialization, and help select a relevant configuration of indexes and materialized views among the candidates. Experimental results show that our strategy performs better than an independent selection of materialized views and indexes.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 02:45:10 GMT" } ]
2007-07-12T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Darmont", "Jérôme", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.1558
Eric Sanchis
Eric Sanchis (LGC)
Autonomy with regard to an Attribute
null
null
null
null
cs.MA
null
This paper presents a model of autonomy called autonomy with regard to an attribute applicable to cognitive and not cognitive artificial agents. Three criteria (global / partial, social / nonsocial, absolute / relative) are defined and used to describe the main characteristics of this type of autonomy. A software agent autonomous with regard to the mobility illustrates a possible implementation of this model.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 05:05:57 GMT" } ]
2007-07-12T00:00:00
[ [ "Sanchis", "Eric", "", "LGC" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0707.1588
Khoa Nguyen
Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen
A Tight Lower Bound to the Outage Probability of Discrete-Input Block-Fading Channels
22 pages, 4 figures. This work has been accepted for IEEE Transactions on Information Theory and has been presented in part at the 2007 IEEE International Symposium on Information Theory, Nice, France, June 2007
null
10.1109/TIT.2007.907520
null
cs.IT math.IT
null
In this correspondence, we propose a tight lower bound to the outage probability of discrete-input Nakagami-m block-fading channels. The approach permits an efficient method for numerical evaluation of the bound, providing an additional tool for system design. The optimal rate-diversity trade-off for the Nakagami-m block-fading channel is also derived and a tight upper bound is obtained for the optimal coding gain constant.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 11:23:10 GMT" } ]
2016-11-15T00:00:00
[ [ "Nguyen", "Khoa D.", "" ], [ "Fabregas", "Albert Guillen i", "" ], [ "Rasmussen", "Lars K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1607
Erik Schnetter
Erik Schnetter, Christian D. Ott, Gabrielle Allen, Peter Diener, Tom Goodale, Thomas Radke, Edward Seidel, John Shalf
Cactus Framework: Black Holes to Gamma Ray Bursts
16 pages, 4 figures. To appear in Petascale Computing: Algorithms and Applications, Ed. D. Bader, CRC Press LLC (2007)
null
null
null
cs.DC
null
Gamma Ray Bursts (GRBs) are intense narrowly-beamed flashes of gamma-rays of cosmological origin. They are among the most scientifically interesting astrophysical systems, and the riddle concerning their central engines and emission mechanisms is one of the most complex and challenging problems of astrophysics today. In this article we outline our petascale approach to the GRB problem and discuss the computational toolkits and numerical codes that are currently in use and that will be scaled up to run on emerging petaflop scale computing platforms in the near future. Petascale computing will require additional ingredients over conventional parallelism. We consider some of the challenges which will be caused by future petascale architectures, and discuss our plans for the future development of the Cactus framework and its applications to meet these challenges in order to profit from these new architectures.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 13:01:50 GMT" } ]
2007-07-12T00:00:00
[ [ "Schnetter", "Erik", "" ], [ "Ott", "Christian D.", "" ], [ "Allen", "Gabrielle", "" ], [ "Diener", "Peter", "" ], [ "Goodale", "Tom", "" ], [ "Radke", "Thomas", "" ], [ "Seidel", "Edward", "" ], [ "Shalf", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.1618
Per Ola Kristensson
Per Ola Kristensson, Nils Dahlback, Daniel Anundi, Marius Bjornstad, Hanna Gillberg, Jonas Haraldsson, Ingrid Martensson, Matttias Nordvall, Josefin Stahl
The Trade-offs with Space Time Cube Representation of Spatiotemporal Patterns
null
null
null
null
cs.HC cs.GR
null
Space time cube representation is an information visualization technique where spatiotemporal data points are mapped into a cube. Fast and correct analysis of such information is important in for instance geospatial and social visualization applications. Information visualization researchers have previously argued that space time cube representation is beneficial in revealing complex spatiotemporal patterns in a dataset to users. The argument is based on the fact that both time and spatial information are displayed simultaneously to users, an effect difficult to achieve in other representations. However, to our knowledge the actual usefulness of space time cube representation in conveying complex spatiotemporal patterns to users has not been empirically validated. To fill this gap we report on a between-subjects experiment comparing novice users error rates and response times when answering a set of questions using either space time cube or a baseline 2D representation. For some simple questions the error rates were lower when using the baseline representation. For complex questions where the participants needed an overall understanding of the spatiotemporal structure of the dataset, the space time cube representation resulted in on average twice as fast response times with no difference in error rates compared to the baseline. These results provide an empirical foundation for the hypothesis that space time cube representation benefits users when analyzing complex spatiotemporal patterns.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 13:39:34 GMT" } ]
2007-07-12T00:00:00
[ [ "Kristensson", "Per Ola", "" ], [ "Dahlback", "Nils", "" ], [ "Anundi", "Daniel", "" ], [ "Bjornstad", "Marius", "" ], [ "Gillberg", "Hanna", "" ], [ "Haraldsson", "Jonas", "" ], [ "Martensson", "Ingrid", "" ], [ "Nordvall", "Matttias", "" ], [ "Stahl", "Josefin", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0707.1639
Alban Ponse
Jan A. Bergstra and Alban Ponse
Interface groups and financial transfer architectures
22 pages
null
null
PRG0702
cs.SE
null
Analytic execution architectures have been proposed by the same authors as a means to conceptualize the cooperation between heterogeneous collectives of components such as programs, threads, states and services. Interface groups have been proposed as a means to formalize interface information concerning analytic execution architectures. These concepts are adapted to organization architectures with a focus on financial transfers. Interface groups (and monoids) now provide a technique to combine interface elements into interfaces with the flexibility to distinguish between directions of flow dependent on entity naming. The main principle exploiting interface groups is that when composing a closed system of a collection of interacting components, the sum of their interfaces must vanish in the interface group modulo reflection. This certainly matters for financial transfer interfaces. As an example of this, we specify an interface group and within it some specific interfaces concerning the financial transfer architecture for a part of our local academic organization. Financial transfer interface groups arise as a special case of more general service architecture interfaces.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 14:55:26 GMT" } ]
2007-07-12T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Ponse", "Alban", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0707.1644
Dan Olteanu
Lyublena Antova, Thomas Jansen, Christoph Koch, Dan Olteanu
Fast and Simple Relational Processing of Uncertain Data
12 pages, 14 figures
null
null
null
cs.DB cs.PF
null
This paper introduces U-relations, a succinct and purely relational representation system for uncertain databases. U-relations support attribute-level uncertainty using vertical partitioning. If we consider positive relational algebra extended by an operation for computing possible answers, a query on the logical level can be translated into, and evaluated as, a single relational algebra query on the U-relation representation. The translation scheme essentially preserves the size of the query in terms of number of operations and, in particular, number of joins. Standard techniques employed in off-the-shelf relational database management systems are effective for optimizing and processing queries on U-relations. In our experiments we show that query evaluation on U-relations scales to large amounts of data with high degrees of uncertainty.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 15:13:39 GMT" } ]
2007-07-12T00:00:00
[ [ "Antova", "Lyublena", "" ], [ "Jansen", "Thomas", "" ], [ "Koch", "Christoph", "" ], [ "Olteanu", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0707.1714
Michael Mahoney
Anirban Dasgupta, Petros Drineas, Boulos Harb, Ravi Kumar, and Michael W. Mahoney
Sampling Algorithms and Coresets for Lp Regression
19 pages, 1 figure
null
null
null
cs.DS
null
The Lp regression problem takes as input a matrix $A \in \Real^{n \times d}$, a vector $b \in \Real^n$, and a number $p \in [1,\infty)$, and it returns as output a number ${\cal Z}$ and a vector $x_{opt} \in \Real^d$ such that ${\cal Z} = \min_{x \in \Real^d} ||Ax -b||_p = ||Ax_{opt}-b||_p$. In this paper, we construct coresets and obtain an efficient two-stage sampling-based approximation algorithm for the very overconstrained ($n \gg d$) version of this classical problem, for all $p \in [1, \infty)$. The first stage of our algorithm non-uniformly samples $\hat{r}_1 = O(36^p d^{\max\{p/2+1, p\}+1})$ rows of $A$ and the corresponding elements of $b$, and then it solves the Lp regression problem on the sample; we prove this is an 8-approximation. The second stage of our algorithm uses the output of the first stage to resample $\hat{r}_1/\epsilon^2$ constraints, and then it solves the Lp regression problem on the new sample; we prove this is a $(1+\epsilon)$-approximation. Our algorithm unifies, improves upon, and extends the existing algorithms for special cases of Lp regression, namely $p = 1,2$. In course of proving our result, we develop two concepts--well-conditioned bases and subspace-preserving sampling--that are of independent interest.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 22:04:18 GMT" } ]
2007-07-13T00:00:00
[ [ "Dasgupta", "Anirban", "" ], [ "Drineas", "Petros", "" ], [ "Harb", "Boulos", "" ], [ "Kumar", "Ravi", "" ], [ "Mahoney", "Michael W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.1715
Seth Pettie
Seth Pettie
Sources of Superlinearity in Davenport-Schinzel Sequences
null
null
null
null
cs.DM
null
A generalized Davenport-Schinzel sequence is one over a finite alphabet that contains no subsequences isomorphic to a fixed forbidden subsequence. One of the fundamental problems in this area is bounding (asymptotically) the maximum length of such sequences. Following Klazar, let Ex(\sigma,n) be the maximum length of a sequence over an alphabet of size n avoiding subsequences isomorphic to \sigma. It has been proved that for every \sigma, Ex(\sigma,n) is either linear or very close to linear; in particular it is O(n 2^{\alpha(n)^{O(1)}}), where \alpha is the inverse-Ackermann function and O(1) depends on \sigma. However, very little is known about the properties of \sigma that induce superlinearity of \Ex(\sigma,n). In this paper we exhibit an infinite family of independent superlinear forbidden subsequences. To be specific, we show that there are 17 prototypical superlinear forbidden subsequences, some of which can be made arbitrarily long through a simple padding operation. Perhaps the most novel part of our constructions is a new succinct code for representing superlinear forbidden subsequences.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 22:16:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Pettie", "Seth", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.1716
Luis Antonio da Mota
B.O.Rodrigues, L.A.C.P.da Mota and L.G.S.Duarte
Numerical Calculation With Arbitrary Precision
contribution to X hadron Physics - 2007 to appear on International Journal of Modern Physics E
null
10.1142/S0218301307009014
null
cs.NA cs.MS
null
The vast use of computers on scientific numerical computation makes the awareness of the limited precision that these machines are able to provide us an essential matter. A limited and insufficient precision allied to the truncation and rounding errors may induce the user to incorrect interpretation of his/hers answer. In this work, we have developed a computational package to minimize this kind of error by offering arbitrary precision numbers and calculation. This is very important in Physics where we can work with numbers too small and too big simultaneously.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 22:24:48 GMT" } ]
2009-11-13T00:00:00
[ [ "Rodrigues", "B. O.", "" ], [ "da Mota", "L. A. C. P.", "" ], [ "Duarte", "L. G. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0707.1739
Reza Rashidi Far
Reza Rashidi Far, Tamer Oraby, Wlodzimierz Bryc and Roland Speicher
On slow-fading non-separable correlation MIMO systems
24 pages and 3 figures
IEEE Trans. Information Theory, Vol. 54, No. 2, pp.544-553, Feb. 2008
null
null
cs.IT math.IT
null
In a frequency selective slow-fading channel in a MIMO system, the channel matrix is of the form of a block matrix. We propose a method to calculate the limit of the eigenvalue distribution of block matrices if the size of the blocks tends to infinity. We will also calculate the asymptotic eigenvalue distribution of $HH^*$, where the entries of $H$ are jointly Gaussian, with a correlation of the form $E[h_{pj}\bar h_{qk}]= \sum_{s=1}^t \Psi^{(s)}_{jk}\hat\Psi^{(s)}_{pq}$ (where $t$ is fixed and does not increase with the size of the matrix). We will use an operator-valued free probability approach to achieve this goal. Using this method, we derive a system of equations, which can be solved numerically to compute the desired eigenvalue distribution.
[ { "version": "v1", "created": "Thu, 12 Jul 2007 06:29:58 GMT" } ]
2008-09-02T00:00:00
[ [ "Far", "Reza Rashidi", "" ], [ "Oraby", "Tamer", "" ], [ "Bryc", "Wlodzimierz", "" ], [ "Speicher", "Roland", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1812
Thierry Dubois
Thierry Dubois, Rachid Touzani
A numerical study of heat island flows in an open domain: Stationary solutions
null
null
null
null
math.NA cs.NA physics.class-ph
null
We present two dimensional numerical simulations of a natural convection problem in an unbounded domain. A thermal stratification is applied in the vertical direction and the flow circulation is induced by a heat island located on the ground. For this problem, thermal perturbations are convected in the horizontal direction far from the heated element so that very elongated computational domains have to be used in order to compute accurate numerical solutions. To avoid this difficulty thermal sponge layers are added at the vertical boundaries. With this approach, stationary solutions at $Ra\le 10^5$ are investigated. Boussinesq equations are discretized with a second-order finite volume scheme on a staggered grid combined with a second-order projection method for the time integration.
[ { "version": "v1", "created": "Thu, 12 Jul 2007 15:22:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Dubois", "Thierry", "" ], [ "Touzani", "Rachid", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0707.1820
Arnaud Legout
Anwar Al Hamra (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Chadi Barakat (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes)
Understanding the Properties of the BitTorrent Overlay
null
null
null
null
cs.NI
null
In this paper, we conduct extensive simulations to understand the properties of the overlay generated by BitTorrent. We start by analyzing how the overlay properties impact the efficiency of BitTorrent. We focus on the average peer set size (i.e., average number of neighbors), the time for a peer to reach its maximum peer set size, and the diameter of the overlay. In particular, we show that the later a peer arrives in a torrent, the longer it takes to reach its maximum peer set size. Then, we evaluate the impact of the maximum peer set size, the maximum number of outgoing connections per peer, and the number of NATed peers on the overlay properties. We show that BitTorrent generates a robust overlay, but that this overlay is not a random graph. In particular, the connectivity of a peer to its neighbors depends on its arriving order in the torrent. We also show that a large number of NATed peers significantly compromise the robustness of the overlay to attacks. Finally, we evaluate the impact of peer exchange on the overlay properties, and we show that it generates a chain-like overlay with a large diameter, which will adversely impact the efficiency of large torrents.
[ { "version": "v1", "created": "Thu, 12 Jul 2007 15:38:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Hamra", "Anwar Al", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Legout", "Arnaud", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Barakat", "Chadi", "", "INRIA\n Sophia Antipolis / INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0707.1824
Damien Chablat
Leonid Slutski (CIM), Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Kinematics of Manipulators Built From Closed Planar Mechanisms
null
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics (19/08/1999) 531-536
null
null
cs.RO
null
The paper discusses the kinematics of manipulators builts of planar closed kinematic chains. A special kinematic scheme is extracted from the array of these mechanisms that looks the most promising for the creation of different types of robotic manipulators. The structural features of this manipulator determine a number of its original properties that essentially simplify its control. These features allow the main control problems to be effectively overcome by application of the simple kinematic problems. The workspace and singular configurations of a basic planar manipulator are studied. By using a graphic simulation method, motions of the designed mechanism are examined. A prototype of this mechanism was implemented to verify the proposed approach.
[ { "version": "v1", "created": "Thu, 12 Jul 2007 15:42:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Slutski", "Leonid", "", "CIM" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.1859
Natasha Devroye
Natasha Devroye, Vahid Tarokh
On the Degrees of Freedom in Cognitive Radio Channels
After receiving useful peer comments, we would like to withdraw this paper
null
null
null
cs.IT math.IT
null
After receiving useful peer comments, we would like to withdraw this paper.
[ { "version": "v1", "created": "Thu, 12 Jul 2007 18:47:38 GMT" }, { "version": "v2", "created": "Fri, 13 Jul 2007 19:24:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Devroye", "Natasha", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1904
Joseph Y. Halpern
Leandro C. Rego and Joseph Y. Halpern
Generalized Solution Concepts in Games with Possibly Unaware Players
null
null
null
null
cs.GT
null
Most work in game theory assumes that players are perfect reasoners and have common knowledge of all significant aspects of the game. In earlier work, we proposed a framework for representing and analyzing games with possibly unaware players, and suggested a generalization of Nash equilibrium appropriate for games with unaware players that we called generalized Nash equilibrium. Here, we use this framework to analyze other solution concepts that have been considered in the game-theory literature, with a focus on sequential equilibrium. We also provide some insight into the notion of generalized Nash equilibrium by proving that it is closely related to the notion of rationalizability when we restrict the analysis to games in normal form and no unawareness is involved.
[ { "version": "v1", "created": "Thu, 12 Jul 2007 23:21:16 GMT" } ]
2007-07-17T00:00:00
[ [ "Rego", "Leandro C.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0707.1912
Masoud Ebrahimi
Masoud Ebrahimi, Mohammad A. Maddah-Ali, and Amir K. Khandani
Throughput Scaling Laws for Wireless Networks with Fading Channels
Submitted to IEEE Transactions on Information Theory (Revised)
null
10.1109/TIT.2007.907518
University of Waterloo Technical Report UW-ECE #2007-12
cs.IT math.IT
null
A network of n communication links, operating over a shared wireless channel, is considered. Fading is assumed to be the dominant factor affecting the strength of the channels between transmitter and receiver terminals. It is assumed that each link can be active and transmit with a constant power P or remain silent. The objective is to maximize the throughput over the selection of active links. By deriving an upper bound and a lower bound, it is shown that in the case of Rayleigh fading (i) the maximum throughput scales like $\log n$ (ii) the maximum throughput is achievable in a distributed fashion. The upper bound is obtained using probabilistic methods, where the key point is to upper bound the throughput of any random set of active links by a chi-squared random variable. To obtain the lower bound, a decentralized link activation strategy is proposed and analyzed.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 02:28:06 GMT" } ]
2016-11-17T00:00:00
[ [ "Ebrahimi", "Masoud", "" ], [ "Maddah-Ali", "Mohammad A.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.1913
Daniel Lemire
Owen Kaser, Daniel Lemire
Removing Manually-Generated Boilerplate from Electronic Texts: Experiments with Project Gutenberg e-Books
short version appeared in CASCON 2007 proceedings, available from http://portal.acm.org/citation.cfm?id=1321246 Source code at https://github.com/lemire/gutenberg-headers
null
null
Department of CSAS, UNBSJ Technical Report TR-07-001
cs.DL cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative work on unstructured or semi-structured documents, such as in literature corpora or source code, often involves agreed upon templates containing metadata. These templates are not consistent across users and over time. Rule-based parsing of these templates is expensive to maintain and tends to fail as new documents are added. Statistical techniques based on frequent occurrences have the potential to identify automatically a large fraction of the templates, thus reducing the burden on the programmers. We investigate the case of the Project Gutenberg corpus, where most documents are in ASCII format with preambles and epilogues that are often copied and pasted or manually typed. We show that a statistical approach can solve most cases though some documents require knowledge of English. We also survey various technical solutions that make our approach applicable to large data sets.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 02:30:10 GMT" }, { "version": "v2", "created": "Fri, 21 Aug 2009 19:57:15 GMT" }, { "version": "v3", "created": "Mon, 22 Aug 2016 21:02:58 GMT" } ]
2016-08-24T00:00:00
[ [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0707.1925
Vahan Mkrtchyan
V. V. Mkrtchyan
A note on minimal matching covered graphs
4 pages
Discrete Mathematics 306, (2006), pp. 452-455
10.1016/j.disc.2005.12.006
null
cs.DM
null
A graph is called matching covered if for its every edge there is a maximum matching containing it. It is shown that minimal matching covered graphs contain a perfect matching.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 13:01:10 GMT" } ]
2007-07-16T00:00:00
[ [ "Mkrtchyan", "V. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.1926
Vahan Mkrtchyan
V. V. Mkrtchyan
On trees with a maximum proper partial 0-1 coloring containing a maximum matching
4 pages
Discrete Mathematics 306, (2006), pp. 456-459
10.1016/j.disc.2005.12.019
null
cs.DM
null
I prove that in a tree in which the distance between any two endpoints is even, there is a maximum proper partial 0-1 coloring such that the edges colored by 0 form a maximum matching.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 13:05:12 GMT" } ]
2007-07-16T00:00:00
[ [ "Mkrtchyan", "V. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.1954
Alessandro Nordio
A. Nordio, C.-F. Chiasserini, E. Viterbo
Bandlimited Field Reconstruction for Wireless Sensor Networks
null
null
null
null
cs.OH
null
Wireless sensor networks are often used for environmental monitoring applications. In this context sampling and reconstruction of a physical field is one of the most important problems to solve. We focus on a bandlimited field and find under which conditions on the network topology the reconstruction of the field is successful, with a given probability. We review irregular sampling theory, and analyze the problem using random matrix theory. We show that even a very irregular spatial distribution of sensors may lead to a successful signal reconstruction, provided that the number of collected samples is large enough with respect to the field bandwidth. Furthermore, we give the basis to analytically determine the probability of successful field reconstruction.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 09:54:54 GMT" } ]
2007-07-16T00:00:00
[ [ "Nordio", "A.", "" ], [ "Chiasserini", "C. -F.", "" ], [ "Viterbo", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.1957
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Moveability and Collision Analysis for Fully-Parallel Manipulators
null
12th CISM-IFTOMM Symposium (07/1998) 1-8
null
null
cs.RO
null
The aim of this paper is to characterize the moveability of fully-parallel manipulators in the presence of obstacles. Fully parallel manipulators are used in applications where accuracy, stiffness or high speeds and accelerations are required \cite{Merlet:97}. However, one of its main drawbacks is a relatively small workspace compared to the one of serial manipulators. This is due mainly to the existence of potential internal collisions, and the existence of singularities. In this paper, the notion of free aspect is defined which permits to exhibit domains of the workspace and the joint space free of singularity and collision. The main application of this study is the moveability analysis in the workspace of the manipulator as well as path-planning, control and design.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 09:59:25 GMT" } ]
2007-07-16T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.1981
Wojciech Moczydlowski
Wojciech Moczydlowski
A Normalizing Intuitionistic Set Theory with Inaccessible Sets
To be published in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 3, Issue 3 (August 16, 2007) lmcs:837
10.2168/LMCS-3(3:6)2007
null
cs.LO
null
We propose a set theory strong enough to interpret powerful type theories underlying proof assistants such as LEGO and also possibly Coq, which at the same time enables program extraction from its constructive proofs. For this purpose, we axiomatize an impredicative constructive version of Zermelo-Fraenkel set theory IZF with Replacement and $\omega$-many inaccessibles, which we call \izfio. Our axiomatization utilizes set terms, an inductive definition of inaccessible sets and the mutually recursive nature of equality and membership relations. It allows us to define a weakly-normalizing typed lambda calculus corresponding to proofs in \izfio according to the Curry-Howard isomorphism principle. We use realizability to prove the normalization theorem, which provides a basis for program extraction capability.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 12:02:10 GMT" }, { "version": "v2", "created": "Thu, 16 Aug 2007 15:37:16 GMT" }, { "version": "v3", "created": "Tue, 8 Apr 2008 08:03:51 GMT" } ]
2015-07-01T00:00:00
[ [ "Moczydlowski", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.2006
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Working Modes and Aspects in Fully-Parallel Manipulator
null
Proceeding IEEE International Conference on Robotics and Automation (05/1998) 1964-1969
null
null
cs.RO
null
The aim of this paper is to characterize the notion of aspect in the workspace and in the joint space for parallel manipulators. In opposite to the serial manipulators, the parallel manipulators can admit not only multiple inverse kinematic solutions, but also multiple direct kinematic solutions. The notion of aspect introduced for serial manipulators in [Borrel 86], and redefined for parallel manipulators with only one inverse kinematic solution in [Wenger 1997], is redefined for general fully parallel manipulators. Two Jacobian matrices appear in the kinematic relations between the joint-rate and the Cartesian-velocity vectors, which are called the "inverse kinematics" and the "direct kinematics" matrices. The study of these matrices allow to respectively define the parallel and the serial singularities. The notion of working modes is introduced to separate inverse kinematic solutions. Thus, we can find out domains of the workspace and the joint space exempt of singularity. Application of this study is the moveability analysis in the workspace of the manipulator as well as path-planing and control. This study is illustrated in this paper with a RR-RRR planar parallel manipulator.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 13:40:56 GMT" } ]
2007-07-16T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2014
Giacomo Como
Giacomo Como, Serdar Yuksel, Sekhar Tatikonda
On the error exponent of variable-length block-coding schemes over finite-state Markov channels with feedback
null
null
null
null
cs.IT math.IT
null
The error exponent of Markov channels with feedback is studied in the variable-length block-coding setting. Burnashev's classic result is extended and a single letter characterization for the reliability function of finite-state Markov channels is presented, under the assumption that the channel state is causally observed both at the transmitter and at the receiver side. Tools from stochastic control theory are used in order to treat channels with intersymbol interference. In particular the convex analytical approach to Markov decision processes is adopted to handle problems with stopping time horizons arising from variable-length coding schemes.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 14:27:26 GMT" } ]
2016-09-08T00:00:00
[ [ "Como", "Giacomo", "" ], [ "Yuksel", "Serdar", "" ], [ "Tatikonda", "Sekhar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2017
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM)
The Isoconditioning Loci of A Class of Closed-Chain Manipulators
null
Proceeding IEEE International Conference on Robotics and Automation (05/1998) 1970-1976
null
null
cs.RO
null
The subject of this paper is a special class of closed-chain manipulators. First, we analyze a family of two-degree-of-freedom (dof) five-bar planar linkages. Two Jacobian matrices appear in the kinematic relations between the joint-rate and the Cartesian-velocity vectors, which are called the ``inverse kinematics" and the "direct kinematics" matrices. It is shown that the loci of points of the workspace where the condition number of the direct-kinematics matrix remains constant, i.e., the isoconditioning loci, are the coupler points of the four-bar linkage obtained upon locking the middle joint of the linkage. Furthermore, if the line of centers of the two actuated revolutes is used as the axis of a third actuated revolute, then a three-dof hybrid manipulator is obtained. The isoconditioning loci of this manipulator are surfaces of revolution generated by the isoconditioning curves of the two-dof manipulator, whose axis of symmetry is that of the third actuated revolute.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 14:18:45 GMT" } ]
2007-07-16T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2027
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Workspace and Assembly modes in Fully-Parallel Manipulators : A Descriptive Study
null
Advances in Robot Kinematics and Computational Geometry (1998) 117-126
null
null
cs.RO
null
The goal of this paper is to explain, using a typical example, the distribution of the different assembly modes in the workspace and their effective role in the execution of trajectories. The singular and non-singular changes of assembly mode are described and compared to each other. The non-singular change of assembly mode is more deeply analysed and discussed in the context of trajectory planning. In particular, it is shown that, according to the location of the initial and final configurations with respect to the uniqueness domains in the workspace, there are three different cases to consider before planning a linking trajectory.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 15:04:13 GMT" } ]
2007-07-16T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2034
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM)
Conception Isotropique D'Une Morphologie Parall\`Ele : Application \`a L'Usinage
null
3rd International Conference On Integrated Design and Manufacturing in Mechanical Engineering (05/2000) 1-10
null
null
cs.RO
null
The aim of this paper is the isotropic design of a hybrid morphology dedicated to 3-axis machining applications. It is necessary to ensure the feasibility of continuous, singularity-free trajectories, as well as a good manipulability in position and velocity. We want to propose an alternative design to conventional serial machine-tools. We compare a serial PPP machine-tool (three prismatic orthogonal axes) with a hybrid architecture which we optimize only the first two axes. The critrerion used for the optimization is the conditioning of the Jacobian matrices. The optimum, namely isotropy, can be obtained which provides our architecture with excellent manipulability properties.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 15:24:29 GMT" } ]
2007-07-16T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2042
Damien Chablat
Florence Bidault (IRCCyN), Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN), Laurent Pino (IRCCyN)
A distributed Approach for Access and Visibility Task under Ergonomic Constraints with a Manikin in a Virtual Reality Environment
null
Proceeding of the 10th IEEE International Workshop on Robot and Human Communication (09/2001) 1-6
null
null
cs.RO
null
This paper presents a new method, based on a multi-agent system and on digital mock-up technology, to assess an efficient path planner for a manikin for access and visibility task under ergonomic constraints. In order to solve this problem, the human operator is integrated in the process optimization to contribute to a global perception of the environment. This operator cooperates, in real-time, with several automatic local elementary agents. The result of this work validates solutions brought by digital mock-up and that can be applied to simulate maintenance task.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 15:34:22 GMT" } ]
2007-07-16T00:00:00
[ [ "Bidault", "Florence", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Chedmail", "Patrick", "", "IRCCyN" ], [ "Pino", "Laurent", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2090
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
A Training based Distributed Non-Coherent Space-Time Coding Strategy
10 pages, 3 figures, submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
null
Unitary space-time modulation is known to be an efficient means to communicate over non-coherent Multiple Input Multiple Output (MIMO) channels. In this letter, differential unitary space-time coding and non-coherent space-time coding for the training based approach of Kim and Tarokh are addressed. For this approach, necessary and sufficient conditions for multi-group decodability are derived in a simple way assuming a Generalized Likelihood Ratio Test receiver and a unitary codebook. Extending Kim and Tarokh's approach for colocated MIMO systems, a novel training based approach to distributed non-coherent space-time coding for wireless relay networks is proposed. An explicit construction of two-group decodable distributed non-coherent space-time codes achieving full cooperative diversity for all even number of relays is provided.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 20:42:20 GMT" } ]
2007-07-17T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2126
Vahan Mkrtchyan
R.R. Kamalian, V. V. Mkrtchyan
On complexity of special maximum matchings constructing
12 pages, 8 figures. Discrete Mathematics, to appear
Discrete Mathematics, 2008, Vol 308/10 pp 1792-1800
10.1016/j.disc.2007.04.029
null
cs.DM
null
For bipartite graphs the NP-completeness is proved for the problem of existence of maximum matching which removal leads to a graph with given lower(upper)bound for the cardinality of its maximum matching.
[ { "version": "v1", "created": "Sat, 14 Jul 2007 05:05:34 GMT" } ]
2008-03-08T00:00:00
[ [ "Kamalian", "R. R.", "" ], [ "Mkrtchyan", "V. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.2160
Seth Pettie
Seth Pettie
Splay Trees, Davenport-Schinzel Sequences, and the Deque Conjecture
null
null
null
null
cs.DS
null
We introduce a new technique to bound the asymptotic performance of splay trees. The basic idea is to transcribe, in an indirect fashion, the rotations performed by the splay tree as a Davenport-Schinzel sequence S, none of whose subsequences are isomorphic to fixed forbidden subsequence. We direct this technique towards Tarjan's deque conjecture and prove that n deque operations require O(n alpha^*(n)) time, where alpha^*(n) is the minimum number of applications of the inverse-Ackermann function mapping n to a constant. We are optimistic that this approach could be directed towards other open conjectures on splay trees such as the traversal and split conjectures.
[ { "version": "v1", "created": "Sat, 14 Jul 2007 16:38:08 GMT" } ]
2007-07-17T00:00:00
[ [ "Pettie", "Seth", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.2176
Prakash Ishwar
Masoud Sharif and Prakash Ishwar
Benefit of Delay on the Diversity-Multiplexing Tradeoffs of MIMO Channels with Partial CSI
5 pages, 2 figures, to appear in the Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24-29 June, 2007
null
null
null
cs.IT math.IT
null
This paper re-examines the well-known fundamental tradeoffs between rate and reliability for the multi-antenna, block Rayleigh fading channel in the high signal to noise ratio (SNR) regime when (i) the transmitter has access to (noiseless) one bit per coherence-interval of causal channel state information (CSI) and (ii) soft decoding delays together with worst-case delay guarantees are acceptable. A key finding of this work is that substantial improvements in reliability can be realized with a very short expected delay and a slightly longer (but bounded) worst-case decoding delay guarantee in communication systems where the transmitter has access to even one bit per coherence interval of causal CSI. While similar in spirit to the recent work on communication systems based on automatic repeat requests (ARQ) where decoding failure is known at the transmitter and leads to re-transmission, here transmit side-information is purely based on CSI. The findings reported here also lend further support to an emerging understanding that decoding delay (related to throughput) and codeword blocklength (related to coding complexity and delays) are distinctly different design parameters which can be tuned to control reliability.
[ { "version": "v1", "created": "Sat, 14 Jul 2007 22:42:02 GMT" } ]
2007-07-17T00:00:00
[ [ "Sharif", "Masoud", "" ], [ "Ishwar", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2182
Massimiliano Laddomada Ph.D.
Massimiliano Laddomada
Design of Multistage Decimation Filters Using Cyclotomic Polynomials: Optimization and Design Issues
Submitted to CAS-I, July 07; 11 pages, 5 figures, 3 tables
null
null
null
cs.OH
null
This paper focuses on the design of multiplier-less decimation filters suitable for oversampled digital signals. The aim is twofold. On one hand, it proposes an optimization framework for the design of constituent decimation filters in a general multistage decimation architecture. The basic building blocks embedded in the proposed filters belong, for a simple reason, to the class of cyclotomic polynomials (CPs): the first 104 CPs have a z-transfer function whose coefficients are simply {-1,0,+1}. On the other hand, the paper provides a bunch of useful techniques, most of which stemming from some key properties of CPs, for designing the proposed filters in a variety of architectures. Both recursive and non-recursive architectures are discussed by focusing on a specific decimation filter obtained as a result of the optimization algorithm. Design guidelines are provided with the aim to simplify the design of the constituent decimation filters in the multistage chain.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 05:35:32 GMT" } ]
2007-07-17T00:00:00
[ [ "Laddomada", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.2185
Damien Chablat
Sylvain Guegan (IRCCyN), Wisama Khalil (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Mod\'elisation Dynamique d'un Robot Parall\`ele \`a 3-DDL : l'Orthoglide
null
Conf\'erence Internationale Francophone d'Automatique (07/2002) 1-6
null
null
cs.RO
null
In this article, we propose a method for calculation of the inverse and direct dynamic models of the Orthoglide, a parallel robot with threedegrees of freedom in translation. These models are calculated starting from the elements of the dynamic model of the kinematic chain structure and equations of Newton-Euler applied to the platform. These models are obtained in explicit form having an interesting physical interpretation.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 07:14:51 GMT" } ]
2007-07-17T00:00:00
[ [ "Guegan", "Sylvain", "", "IRCCyN" ], [ "Khalil", "Wisama", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2191
Renaud Lambiotte
R. Lambiotte, M. Ausloos and M. Thelwall
Word statistics in Blogs and RSS feeds: Towards empirical universal evidence
16 pages, 6 figures
J. Informetrics 1 (2007) 277-286
null
null
cs.IT math.IT
null
We focus on the statistics of word occurrences and of the waiting times between such occurrences in Blogs. Due to the heterogeneity of words' frequencies, the empirical analysis is performed by studying classes of "frequently-equivalent" words, i.e. by grouping words depending on their frequencies. Two limiting cases are considered: the dilute limit, i.e. for those words that are used less than once a day, and the dense limit for frequent words. In both cases, extreme events occur more frequently than expected from the Poisson hypothesis. These deviations from Poisson statistics reveal non-trivial time correlations between events that are associated with bursts of activities. The distribution of waiting times is shown to behave like a stretched exponential and to have the same shape for different sets of words sharing a common frequency, thereby revealing universal features.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 08:51:43 GMT" } ]
2012-09-25T00:00:00
[ [ "Lambiotte", "R.", "" ], [ "Ausloos", "M.", "" ], [ "Thelwall", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2227
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), Mazen Zein (IRCCyN)
Degeneracy study of the forward kinematics of planar 3-RPR parallel manipulators
null
Journal of Mechanical Design 129, 12 (12/2007) 1-6
null
null
cs.RO
null
This paper investigates two situations in which the forward kinematics of planar 3-RPR parallel manipulators degenerates. These situations have not been addressed before. The first degeneracy arises when the three input joint variables r1, r2 and r3 satisfy a certain relationship. This degeneracy yields a double root of the characteristic polynomial in t, which could be erroneously interpreted as two coalesce assembly modes. But, unlike what arises in non-degenerate cases, this double root yields two sets of solutions for the position coordinates (x, y) of the platform. In the second situation, we show that the forward kinematics degenerates over the whole joint space if the base and platform triangles are congruent and the platform triangle is rotated by 180 deg about one of its sides. For these "degenerate" manipulators, which are defined here for the first time, the forward kinematics is reduced to the solution of a 3rd-degree polynomial and a quadratics in sequence. Such manipulators constitute, in turn, a new family of analytic planar manipulators that would be more suitable for industrial applications.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 17:57:21 GMT" } ]
2007-07-17T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Zein", "Mazen", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2228
Damien Chablat
Maher Baili (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Kinematic Analysis of a Family of 3R Manipulators
null
Problems of Mechanics 15, 2 (07/2004) 27-32
null
null
cs.RO
null
The workspace topologies of a family of 3-revolute (3R) positioning manipulators are enumerated. The workspace is characterized in a half-cross section by the singular curves. The workspace topology is defined by the number of cusps that appear on these singular curves. The design parameters space is shown to be divided into five domains where all manipulators have the same number of cusps. Each separating surface is given as an explicit expression in the DH-parameters. As an application of this work, we provide a necessary and sufficient condition for a 3R orthogonal manipulator to be cuspidal, i.e. to change posture without meeting a singularity. This condition is set as an explicit expression in the DH parameters.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 18:00:53 GMT" } ]
2007-07-17T00:00:00
[ [ "Baili", "Maher", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2229
Damien Chablat
Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Computation of All 4R Serial Spherical Wrists With an Isotropic Architecture
null
Journal of Mechanical Design 125, 2 (06/2003) 275-280
null
null
cs.RO
null
A spherical wrist of the serial type with n revolute (R) joints is said to be isotropic if it can attain a posture whereby the singular values of its Jacobian matrix are all equal to sqrt(n/3). What isotropy brings about is robustness to manufacturing, assembly, and measurement errors, thereby guaranteeing a maximum orientation accuracy. In this paper we investigate the existence of redundant isotropic architectures, which should add to the dexterity of the wrist under design by virtue of its extra degree of freedom. The problem formulation, for, leads to a system of eight quadratic equations with eight unknowns. The Bezout number of this system is thus 2^8=256, its BKK bound being 192. However, the actual number of solutions is shown to be 32. We list all solutions of the foregoing algebraic problem. All these solutions are real, but distinct solutions do not necessarily lead to distinct manipulators. Upon discarding those algebraic solutions that yield no new wrists, we end up with exactly eight distinct architectures, the eight corresponding manipulators being displayed at their isotropic postures.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 18:04:09 GMT" } ]
2007-07-17T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2238
Damien Chablat
Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
A design oriented study for 3R Orthogonal Manipulators With Geometric Simplifications
null
Congr\`es international Conception et Mod\'elisation des Syst\`emes M\'ecaniques (03/2007) 1-8
null
null
cs.RO
null
This paper proposes a method to calculate the largest Regular Dextrous Workspace (RDW) of some types of three-revolute orthogonal manipulators that have at least one of their DH parameters equal to zero. Then a new performance index based on the RDW is introduced, the isocontours of this index are plotted in the parameter space of the interesting types of manipulators and finally an inspection of the domains of the parameter spaces is conducted in order to identify the better manipulator architectures. The RDW is a part of the workspace whose shape is regular (cube, cylinder) and the performances (conditioning index) are bounded inside. The groups of 3R orthogonal manipulators studied have interesting kinematic properties such as, a well-connected workspace that is fully reachable with four inverse kinematic solutions and that does not contain any void. This study is of high interest for the design of alternative manipulator geometries.
[ { "version": "v1", "created": "Sun, 15 Jul 2007 20:25:24 GMT" } ]
2007-07-17T00:00:00
[ [ "Zein", "Mazen", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2265
Rajesh Sundaresan
Arun Padakandla and Rajesh Sundaresan
Separable convex optimization problems with linear ascending constraints
15 pages, Submitted to SIAM J. on Opt
SIAM J. on Optim., vol. 20, no. 3, pp. 1185-1204, online version 19 August 2009
10.1137/07069729X
null
cs.IT math.IT math.OC
null
Separable convex optimization problems with linear ascending inequality and equality constraints are addressed in this paper. Under an ordering condition on the slopes of the functions at the origin, an algorithm that determines the optimum point in a finite number of steps is described. The optimum value is shown to be monotone with respect to a partial order on the constraint parameters. Moreover, the optimum value is convex with respect to these parameters. Examples motivated by optimizations for communication systems are used to illustrate the algorithm.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 06:23:38 GMT" } ]
2011-07-22T00:00:00
[ [ "Padakandla", "Arun", "" ], [ "Sundaresan", "Rajesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0707.2270
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Design of a Spherical Wrist with Parallel Architecture: Application to Vertebrae of an Eel Robot
null
Proc. IEEE Int. Conf. Rob. and Automation (04/2005) 1-6
null
null
cs.RO
null
The design of a spherical wrist with parallel architecture is the object of this article. This study is part of a larger project, which aims to design and to build an eel robot for inspection of immersed piping. The kinematic analysis of the mechanism is presented first to characterize the singular configurations as well as the isotropic configurations. We add the design constraints related to the application, such as (i) the compactness of the mechanism, (ii) the symmetry of the elements in order to ensure static and dynamic balance and (iii) the possibility of the mechanism to fill the elliptic form of the ell sections.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 07:41:16 GMT" } ]
2007-07-17T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2275
Damien Chablat
Antoine Rennuit (IRCCyN), Alain Micaelli (CEA/LIST), Xavier Merlhiot (CEA/LIST), Claude Andriot (CEA/LIST), Fran\c{c}ois Guillaume, Nicolas Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN)
Passive Control Architecture for Virtual Humans
null
Proceeding International Conference on Intelligent Robots ans Systems (08/2005) 1-6
null
null
cs.RO
null
In the present paper, we introduce a new control architecture aimed at driving virtual humans in interaction with virtual environments, by motion capture. It brings decoupling of functionalities, and also of stability thanks to passivity. We show projections can break passivity, and thus must be used carefully. Our control scheme enables task space and internal control, contact, and joint limits management. Thanks to passivity, it can be easily extended. Besides, we introduce a new tool as for manikin's control, which makes it able to build passive projections, so as to guide the virtual manikin when sharp movements are needed.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 08:33:43 GMT" } ]
2007-07-17T00:00:00
[ [ "Rennuit", "Antoine", "", "IRCCyN" ], [ "Micaelli", "Alain", "", "CEA/LIST" ], [ "Merlhiot", "Xavier", "", "CEA/LIST" ], [ "Andriot", "Claude", "", "CEA/LIST" ], [ "Guillaume", "François", "", "IRCCyN" ], [ "Chevassus", "Nicolas", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Chedmail", "Patrick", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2291
Marius Marin
Marius Marin, Leon Moonen, Arie van Deursen
An Integrated Crosscutting Concern Migration Strategy and its Application to JHotDraw
10+ 4 pages
null
null
TUD-SERG-2007-019
cs.SE
null
In this paper we propose a systematic strategy for migrating crosscutting concerns in existing object-oriented systems to aspect-based solutions. The proposed strategy consists of four steps: mining, exploration, documentation and refactoring of crosscutting concerns. We discuss in detail a new approach to aspect refactoring that is fully integrated with our strategy, and apply the whole strategy to an object-oriented system, namely the JHotDraw framework. The result of this migration is made available as an open-source project, which is the largest aspect refactoring available to date. We report on our experiences with conducting this case study and reflect on the success and challenges of the migration process, as well as on the feasibility of automatic aspect refactoring.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 09:38:23 GMT" }, { "version": "v2", "created": "Sun, 22 Jul 2007 22:13:50 GMT" } ]
2007-07-23T00:00:00
[ [ "Marin", "Marius", "" ], [ "Moonen", "Leon", "" ], [ "van Deursen", "Arie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0707.2293
Maziar Nekovee
Maziar Nekovee
Worm Epidemics in Wireless Adhoc Networks
null
Published in New J. Phys. 9 189, 2007
10.1088/1367-2630/9/6/189
null
cs.NI cond-mat.stat-mech cs.CR physics.soc-ph
null
A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 09:58:18 GMT" } ]
2008-07-10T00:00:00
[ [ "Nekovee", "Maziar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0707.2295
Vahan Mkrtchyan
R.R. Kamalian, V. V. Mkrtchyan
Two polynomial algorithms for special maximum matching constructing in trees
55 pages, 38 figures, Submitted to Discrete Applied Mathematics
null
null
null
cs.DM
null
For an arbitrary tree we investigate the problems of constructing a maximum matching which minimizes or maximizes the cardinality of a maximum matching of the graph obtained from original one by its removal and present corresponding polynomial algorithms.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 10:17:13 GMT" } ]
2007-07-17T00:00:00
[ [ "Kamalian", "R. R.", "" ], [ "Mkrtchyan", "V. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.2341
Amac Herdagdelen
Amac Herdagdelen, Haluk Bingol
A Cultural Market Model
null
International Journal of Modern Physics C Vol. 19, No. 2, 271-282 (2008)
10.1142/S012918310801208X
null
q-fin.GN cs.CY nlin.AO physics.soc-ph
null
Social interactions and personal tastes shape our consumption behavior of cultural products. In this study, we present a computational model of a cultural market and we aim to analyze the behavior of the consumer population as an emergent phenomena. Our results suggest that the final market shares of cultural products dramatically depend on consumer heterogeneity and social interaction pressure. Furthermore, the relation between the resulting market shares and social interaction is robust with respect to a wide range of variation in the parameter values and the type of topology.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 15:30:32 GMT" }, { "version": "v2", "created": "Sat, 19 Apr 2008 00:09:06 GMT" } ]
2008-12-02T00:00:00
[ [ "Herdagdelen", "Amac", "" ], [ "Bingol", "Haluk", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.GN", "description": "Development of general quantitative methodologies with applications in finance", "span": "(General Finance)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0707.2347
Jean-Guillaume Dumas
Brice Boyer (LJK), Jean-Guillaume Dumas (LJK), Cl\'ement Pernet (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), Wei Zhou (Symbolic Computation Group)
Memory efficient scheduling of Strassen-Winograd's matrix multiplication algorithm
null
(International Symposium on Symbolic and Algebraic Computation 2009), S\'eoul : Cor\'ee, R\'epublique de (2009)
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose several new schedules for Strassen-Winograd's matrix multiplication algorithm, they reduce the extra memory allocation requirements by three different means: by introducing a few pre-additions, by overwriting the input matrices, or by using a first recursive level of classical multiplication. In particular, we show two fully in-place schedules: one having the same number of operations, if the input matrices can be overwritten; the other one, slightly increasing the constant of the leading term of the complexity, if the input matrices are read-only. Many of these schedules have been found by an implementation of an exhaustive search algorithm based on a pebble game.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 16:02:50 GMT" }, { "version": "v2", "created": "Fri, 31 Aug 2007 07:31:58 GMT" }, { "version": "v3", "created": "Fri, 23 Nov 2007 16:05:16 GMT" }, { "version": "v4", "created": "Tue, 27 Jan 2009 09:20:56 GMT" }, { "version": "v5", "created": "Mon, 18 May 2009 13:49:23 GMT" } ]
2009-05-18T00:00:00
[ [ "Boyer", "Brice", "", "LJK" ], [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Pernet", "Clément", "", "INRIA\n Rhône-Alpes / LIG Laboratoire d'Informatique de Grenoble" ], [ "Zhou", "Wei", "", "Symbolic Computation Group" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0707.2376
Francesc Rossell\'o
Gabriel Cardona, Francesc Rossello, Gabriel Valiente
Tripartitions do not always discriminate phylogenetic networks
26 pages, 9 figures
null
null
null
q-bio.PE cs.CE cs.DM
null
Phylogenetic networks are a generalization of phylogenetic trees that allow for the representation of non-treelike evolutionary events, like recombination, hybridization, or lateral gene transfer. In a recent series of papers devoted to the study of reconstructibility of phylogenetic networks, Moret, Nakhleh, Warnow and collaborators introduced the so-called {tripartition metric for phylogenetic networks. In this paper we show that, in fact, this tripartition metric does not satisfy the separation axiom of distances (zero distance means isomorphism, or, in a more relaxed version, zero distance means indistinguishability in some specific sense) in any of the subclasses of phylogenetic networks where it is claimed to do so. We also present a subclass of phylogenetic networks whose members can be singled out by means of their sets of tripartitions (or even clusters), and hence where the latter can be used to define a meaningful metric.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 19:59:42 GMT" } ]
2007-07-17T00:00:00
[ [ "Cardona", "Gabriel", "" ], [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.2432
Erhan Bayraktar
Erhan Bayraktar, Hao Xing
Pricing Asian Options for Jump Diffusions
Key Words: Pricing Asian Options, Jump diffusions, an Iterative Numerical Scheme, Classical Solutions of Integro-PDEs
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct a sequence of functions that uniformly converge (on compact sets) to the price of Asian option, which is written on a stock whose dynamics follows a jump diffusion, exponentially fast. Each of the element in this sequence solves a parabolic partial differen- tial equation (not an integro-differential equation). As a result we obtain a fast numerical approximation scheme whose accuracy versus speed characteristics can be controlled. We analyze the performance of our numerical algorithm on several examples.
[ { "version": "v1", "created": "Tue, 17 Jul 2007 04:55:18 GMT" }, { "version": "v2", "created": "Mon, 22 Oct 2007 17:35:45 GMT" }, { "version": "v3", "created": "Thu, 6 Dec 2007 03:04:13 GMT" }, { "version": "v4", "created": "Sat, 12 Jan 2008 18:28:58 GMT" }, { "version": "v5", "created": "Thu, 22 May 2008 02:58:57 GMT" }, { "version": "v6", "created": "Sun, 15 Jun 2008 21:36:58 GMT" }, { "version": "v7", "created": "Wed, 29 Oct 2008 13:49:51 GMT" } ]
2008-10-29T00:00:00
[ [ "Bayraktar", "Erhan", "" ], [ "Xing", "Hao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0707.2436
Massimiliano Laddomada Ph.D.
Massimiliano Laddomada
On the Polyphase Decomposition for Design of Generalized Comb Decimation Filters
Submitted to IEEE TCAS-I, February 2007; 11 double-column pages, 9 figures, 1 table
null
10.1109/TCSI.2008.920136
null
cs.OH
null
Generalized comb filters (GCFs) are efficient anti-aliasing decimation filters with improved selectivity and quantization noise (QN) rejection performance around the so called folding bands with respect to classical comb filters. In this paper, we address the design of GCF filters by proposing an efficient partial polyphase architecture with the aim to reduce the data rate as much as possible after the Sigma-Delta A/D conversion. We propose a mathematical framework in order to completely characterize the dependence of the frequency response of GCFs on the quantization of the multipliers embedded in the proposed filter architecture. This analysis paves the way to the design of multiplier-less decimation architectures. We also derive the impulse response of a sample 3rd order GCF filter used as a reference scheme throughout the paper.
[ { "version": "v1", "created": "Tue, 17 Jul 2007 05:38:30 GMT" } ]
2016-11-18T00:00:00
[ [ "Laddomada", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.2482
Jan Ostergaard
Jan Ostergaard
Multiple-Description Lattice Vector Quantization
Ph.D. Thesis, 250 pages. (Thesis advisors: R. Heusdens and J. Jensen. Promotor: R. Lagendijk)
Ph.D. Thesis, Delft University of Technology, ISBN 978-90-9021979-0, pp. 250, Gildeprint, June 2007
null
null
cs.IT math.IT
null
In this thesis, we construct and analyze multiple-description codes based on lattice vector quantization.
[ { "version": "v1", "created": "Tue, 17 Jul 2007 11:10:52 GMT" } ]
2007-07-18T00:00:00
[ [ "Ostergaard", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2506
Alain Dutech
Raghav Aras (INRIA Lorraine - LORIA), Alain Dutech (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Mixed Integer Linear Programming For Exact Finite-Horizon Planning In Decentralized Pomdps
null
Dans The International Conference on Automated Planning and Scheduling (2007)
null
null
cs.AI
null
We consider the problem of finding an n-agent joint-policy for the optimal finite-horizon control of a decentralized Pomdp (Dec-Pomdp). This is a problem of very high complexity (NEXP-hard in n >= 2). In this paper, we propose a new mathematical programming approach for the problem. Our approach is based on two ideas: First, we represent each agent's policy in the sequence-form and not in the tree-form, thereby obtaining a very compact representation of the set of joint-policies. Second, using this compact representation, we solve this problem as an instance of combinatorial optimization for which we formulate a mixed integer linear program (MILP). The optimal solution of the MILP directly yields an optimal joint-policy for the Dec-Pomdp. Computational experience shows that formulating and solving the MILP requires significantly less time to solve benchmark Dec-Pomdp problems than existing algorithms. For example, the multi-agent tiger problem for horizon 4 is solved in 72 secs with the MILP whereas existing algorithms require several hours to solve it.
[ { "version": "v1", "created": "Tue, 17 Jul 2007 12:49:30 GMT" } ]
2016-03-28T00:00:00
[ [ "Aras", "Raghav", "", "INRIA Lorraine - LORIA" ], [ "Dutech", "Alain", "", "INRIA Lorraine -\n LORIA" ], [ "Charpillet", "François", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0707.2527
Anders Gjendemsj{\o}
Anders Gjendemsj{\o}, Geir E. {\O}ien, Henrik Holm, Mohamed-Slim Alouini, David Gesbert, Kjell J. Hole and P{\aa}l Orten
Rate and Power Allocation for Discrete-Rate Link Adaptation
9 pages, 8 figures, submitted to the EURASIP Journal on Wireless Communications and Networking, July 2007
null
null
null
cs.IT math.IT
null
Link adaptation, in particular adaptive coded modulation (ACM), is a promising tool for bandwidth-efficient transmission in a fading environment. The main motivation behind employing ACM schemes is to improve the spectral efficiency of wireless communication systems. In this paper, using a finite number of capacity achieving component codes, we propose new transmission schemes employing constant power transmission, as well as discrete and continuous power adaptation, for slowly varying flat-fading channels. We show that the proposed transmission schemes can achieve throughputs close to the Shannon limits of flat-fading channels using only a small number of codes. Specifically, using a fully discrete scheme with just four codes, each associated with four power levels, we achieve a spectral efficiency within 1 dB of the continuous-rate continuous-power Shannon capacity. Furthermore, when restricted to a fixed number of codes, the introduction of power adaptation has significant gains with respect to ASE and probability of no transmission compared to a constant power scheme.
[ { "version": "v1", "created": "Tue, 17 Jul 2007 14:16:18 GMT" } ]
2016-03-28T00:00:00
[ [ "Gjendemsjø", "Anders", "" ], [ "Øien", "Geir E.", "" ], [ "Holm", "Henrik", "" ], [ "Alouini", "Mohamed-Slim", "" ], [ "Gesbert", "David", "" ], [ "Hole", "Kjell J.", "" ], [ "Orten", "Pål", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2562
Claude Tardif
Benoit Larose, Cynthia Loten, Claude Tardif
A Characterisation of First-Order Constraint Satisfaction Problems
null
Logical Methods in Computer Science, Volume 3, Issue 4 (November 6, 2007) lmcs:1097
10.2168/LMCS-3(4:6)2007
null
cs.LO cs.CC
null
We describe simple algebraic and combinatorial characterisations of finite relational core structures admitting finitely many obstructions. As a consequence, we show that it is decidable to determine whether a constraint satisfaction problem is first-order definable: we show the general problem to be NP-complete, and give a polynomial-time algorithm in the case of cores. A slight modification of this algorithm provides, for first-order definable CSP's, a simple poly-time algorithm to produce a solution when one exists. As an application of our algebraic characterisation of first order CSP's, we describe a large family of L-complete CSP's.
[ { "version": "v1", "created": "Tue, 17 Jul 2007 16:23:45 GMT" }, { "version": "v2", "created": "Tue, 6 Nov 2007 10:18:41 GMT" } ]
2015-07-01T00:00:00
[ [ "Larose", "Benoit", "" ], [ "Loten", "Cynthia", "" ], [ "Tardif", "Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.2630
Toshiya Takami
Toshiya Takami, Jun Maki, Jun'ichi Ooba, Yuuichi Inadomi, Hiroaki Honda, Ryutaro Susukita, Koji Inoue, Taizo Kobayashi, Rie Nogita, and Mutsumi Aoyagi
Multi-physics Extension of OpenFMO Framework
4 pages with 11 figure files, to appear in the Proceedings of ICCMSE 2007
AIP Conf. Proc. 963, 122-125 (2007)
10.1063/1.2835969
null
cs.DC physics.comp-ph
null
OpenFMO framework, an open-source software (OSS) platform for Fragment Molecular Orbital (FMO) method, is extended to multi-physics simulations (MPS). After reviewing the several FMO implementations on distributed computer environments, the subsequent development planning corresponding to MPS is presented. It is discussed which should be selected as a scientific software, lightweight and reconfigurable form or large and self-contained form.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 05:34:08 GMT" } ]
2009-09-29T00:00:00
[ [ "Takami", "Toshiya", "" ], [ "Maki", "Jun", "" ], [ "Ooba", "Jun'ichi", "" ], [ "Inadomi", "Yuuichi", "" ], [ "Honda", "Hiroaki", "" ], [ "Susukita", "Ryutaro", "" ], [ "Inoue", "Koji", "" ], [ "Kobayashi", "Taizo", "" ], [ "Nogita", "Rie", "" ], [ "Aoyagi", "Mutsumi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0707.2701
Gernot Schaller
Gernot Schaller
A fixed point iteration for computing the matrix logarithm
4 pages, 3 figures, comments welcome
null
null
null
cs.NA cs.DS
null
In various areas of applied numerics, the problem of calculating the logarithm of a matrix A emerges. Since series expansions of the logarithm usually do not converge well for matrices far away from the identity, the standard numerical method calculates successive square roots. In this article, a new algorithm is presented that relies on the computation of successive matrix exponentials. Convergence of the method is demonstrated for a large class of initial matrices and favorable choices of the initial matrix are discussed.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 11:04:27 GMT" } ]
2007-07-19T00:00:00
[ [ "Schaller", "Gernot", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0707.2718
Damien Chablat
Damien Chablat (IRCCyN)
Animation of virtual mannequins, robot-like simulation or motion captures
null
3D Modelling Conferences - 3D Human (06/2006) 1-12
null
null
cs.RO
null
In order to optimize the costs and time of design of the new products while improving their quality, concurrent engineering is based on the digital model of these products, the numerical model. However, in order to be able to avoid definitively physical model, old support of the design, without loss of information, new tools must be available. Especially, a tool making it possible to check simply and quickly the maintainability of complex mechanical sets using the numerical model is necessary. Since one decade, our team works on the creation of tool for the generation and the analysis of trajectories of virtual mannequins. The simulation of human tasks can be carried out either by robot-like simulation or by simulation by motion capture. This paper presents some results on the both two methods. The first method is based on a multi-agent system and on a digital mock-up technology, to assess an efficient path planner for a manikin or a robot for access and visibility task taking into account ergonomic constraints or joint and mechanical limits. In order to solve this problem, the human operator is integrated in the process optimization to contribute to a global perception of the environment. This operator cooperates, in real-time, with several automatic local elementary agents. In the case of the second approach, we worked with the CEA and EADS/CCR to solve the constraints related to the evolution of human virtual in its environment on the basis of data resulting from motion capture system. An approach using of the virtual guides was developed to allow to the user the realization of precise trajectory in absence of force feedback. The result of this work validates solutions through the digital mock-up; it can be applied to simulate maintenability and mountability tasks.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 12:59:15 GMT" } ]
2007-07-19T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2721
Damien Chablat
Qinqin Zhang (IRCCyN, DIE), Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Wei Zhang (DIE)
A Framework to Illustrate Kinematic Behavior of Mechanisms by Haptic Feedback
null
Proceedings of Virtual Concept (25/11/2006) 1-6
null
null
cs.RO
null
The kinematic properties of mechanisms are well known by the researchers and teachers. The theory based on the study of Jacobian matrices allows us to explain, for example, the singular configuration. However, in many cases, the physical sense of such properties is difficult to explain to students. The aim of this article is to use haptic feedback to render to the user the signification of different kinematic indices. The framework uses a Phantom Omni and a serial and parallel mechanism with two degrees of freedom. The end-effector of both mechanisms can be moved either by classical mouse, or Phantom Omni with or without feedback.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 13:02:29 GMT" } ]
2007-07-19T00:00:00
[ [ "Zhang", "Qinqin", "", "IRCCyN, DIE" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Zhang", "Wei", "", "DIE" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2780
Aydin Sezgin
Aydin Sezgin, Mohamad Charafeddine, Arogyaswami Paulraj
On the ergodic sum-rate performance of CDD in multi-user systems
to appear in Proceedings of 2007 IEEE Information Theory Workshop (ITW) in Lake Tahoe
null
10.1109/ITW.2007.4313052
null
cs.IT math.IT
null
The main focus of space-time coding design and analysis for MIMO systems has been so far focused on single-user systems. For single-user systems, transmit diversity schemes suffer a loss in spectral efficiency if the receiver is equipped with more than one antenna, making them unsuitable for high rate transmission. One such transmit diversity scheme is the cyclic delay diversity code (CDD). The advantage of CDD over other diversity schemes such as orthogonal space-time block codes (OSTBC) is that a code rate of one and delay optimality are achieved independent of the number of transmit antennas. In this work we analyze the ergodic rate of a multi-user multiple access channel (MAC) with each user applying such a cyclic delay diversity (CDD) code. We derive closed form expressions for the ergodic sum-rate of multi-user CDD and compare it with the sum-capacity. We study the ergodic rate region and show that in contrast to what is conventionally known regarding the single-user case, transmit diversity schemes are viable candidates for high rate transmission in multi-user systems. Finally, our theoretical findings are illustrated by numerical simulation results.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 18:39:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Sezgin", "Aydin", "" ], [ "Charafeddine", "Mohamad", "" ], [ "Paulraj", "Arogyaswami", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2792
Ivan Savov
David Avis, Patrick Hayden, Ivan Savov
Distributed Compression and Multiparty Squashed Entanglement
26 pages, 6 figures thanks to jPicEdt. In v2 we fixed some typos and made minor clarifications and updates
J. Phys. A 41 (2008) 115301
10.1088/1751-8113/41/11/115301
null
quant-ph cs.IT math.IT
null
We study a protocol in which many parties use quantum communication to transfer a shared state to a receiver without communicating with each other. This protocol is a multiparty version of the fully quantum Slepian-Wolf protocol for two senders and arises through the repeated application of the two-sender protocol. We describe bounds on the achievable rate region for the distributed compression problem. The inner bound arises by expressing the achievable rate region for our protocol in terms of its vertices and extreme rays and, equivalently, in terms of facet inequalities. We also prove an outer bound on all possible rates for distributed compression based on the multiparty squashed entanglement, a measure of multiparty entanglement.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 20:07:30 GMT" }, { "version": "v2", "created": "Tue, 5 Feb 2008 19:39:29 GMT" } ]
2012-07-06T00:00:00
[ [ "Avis", "David", "" ], [ "Hayden", "Patrick", "" ], [ "Savov", "Ivan", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2833
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jean-Pierre Merlet (INRIA Sophia Antipolis)
A Comparative Study between Two Three-DOF Parallel Kinematic Machines using Kinetostatic Criteria and Interval Analysis
null
11th World Congress in Mechanism and Machine Science (04/2004) 1-6
null
null
cs.RO
null
This paper addresses the workspace analysis of two 3-DOF translational parallel mechanisms designed for machining applications. The two machines features three fixed linear joints. The joint axes of the first machine are orthogonal whereas these of the second are parallel. In both cases, the mobile platform moves in the Cartesian $x-y-z$ space with fixed orientation. The workspace analysis is conducted on the basis of prescribed kinetostatic performances. Interval analysis based methods are used to compute the dextrous workspace and the largest cube enclosed in this workspace.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 04:44:06 GMT" } ]
2007-07-20T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Merlet", "Jean-Pierre", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2836
Inanc Inan
Inanc Inan, Feyza Keceli, Ender Ayanoglu
Multimedia Capacity Analysis of the IEEE 802.11e Contention-based Infrastructure Basic Service Set
null
null
null
null
cs.IT cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We first propose a simple mathematical analysis framework for the Enhanced Distributed Channel Access (EDCA) function of the recently ratified IEEE 802.11e standard. Our analysis considers the fact that the distributed random access systems exhibit cyclic behavior. The proposed model is valid for arbitrary assignments of AC-specific Arbitration Interframe Space (AIFS) values and Contention Window (CW) sizes and is the first that considers an arbitrary distribution of active Access Categories (ACs) at the stations. Validating the theoretical results via extensive simulations, we show that the proposed analysis accurately captures the EDCA saturation performance. Next, we propose a framework for multimedia capacity analysis of the EDCA function. We calculate an accurate station- and AC-specific queue utilization ratio by appropriately weighing the service time predictions of the cycle time model for different number of active stations. Based on the calculated queue utilization ratio, we design a simple model-based admission control scheme. We show that the proposed call admission control algorithm maintains satisfactory user-perceived quality for coexisting voice and video connections in an infrastructure BSS and does not present over- or under-admission problems of previously proposed models in the literature.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 05:16:53 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 18:08:46 GMT" }, { "version": "v3", "created": "Tue, 12 Aug 2008 05:55:21 GMT" } ]
2008-08-12T00:00:00
[ [ "Inan", "Inanc", "" ], [ "Keceli", "Feyza", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.2841
Damien Chablat
Damien Chablat (IRCCyN), Philippe D\'epinc\'e, Eric No\"el, Peer-Oliver Woelk (IFW)
The Virtual Manufacturing concept: Scope, Socio-Economic Aspects and Future Trends
null
Design Engineering Technical Conferences (09/2004) 1-6
null
null
cs.RO
null
The research area "Virtual Manufacturing (VM)'' is the use of information technology and computer simulation to model real world manufacturing processes for the purpose of analysing and understanding them. As automation technologies such as CAD/CAM have substantially shortened the time required to design products, Virtual Manufacturing will have a similar effect on the manufacturing phase thanks to the modelling, simulation and optimisation of the product and the processes involved in its fabrication. After a description of Virtual Manufacturing (definitions and scope), we present some socio-economic factors of VM and finaly some "hot topics'' for the future are proposed.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 07:15:53 GMT" } ]
2007-07-20T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Dépincé", "Philippe", "", "IFW" ], [ "Noël", "Eric", "", "IFW" ], [ "Woelk", "Peer-Oliver", "", "IFW" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2842
Damien Chablat
Maher Baili (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
null
Proc. IEEE Int. Conf. Rob. and Automation (04/2004) 1-6
null
null
cs.RO
null
A classification of a family of 3-revolute (3R) positining manipulators is established. This classification is based on the topology of their workspace. The workspace is characterized in a half-cross section by the singular curves. The workspace topology is defined by the number of cusps and nodes that appear on these singular curves. The design parameters space is shown to be divided into nine domains of distinct workspace topologies, in which all manipulators have similar global kinematic properties. Each separating surface is given as an explicit expression in the DH-parameters.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 07:20:26 GMT" } ]
2007-07-20T00:00:00
[ [ "Baili", "Maher", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.2886
Laurent Romary
Laurent Romary (MPDL)
OA@MPS - a colourful view
null
Zeitschrift f\"ur Bibliothekswesen und Bibliographie (15/08/2007) 7 pages
null
null
cs.DL
null
The open access agenda of the Max Planck Society, initiator of the Berlin Declaration, envisions the support of both the green way and the golden way to open access. For the implementation of the green way the Max Planck Society through its newly established unit (Max Planck Digital Library) follows the idea of providing a centralized technical platform for publications and a local support for editorial issues. With regard to the golden way, the Max Planck Society fosters the development of open access publication models and experiments new publishing concepts like the Living Reviews journals.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 12:30:42 GMT" } ]
2007-07-20T00:00:00
[ [ "Romary", "Laurent", "", "MPDL" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0707.2921
Andrea Pacifici
Alessandro Agnetis, Enrico Grande, Pitu B. Mirchandani, Andrea Pacifici
Covering a line segment with variable radius discs
21 pages, 2 figures
null
null
null
cs.DM cs.NA
null
The paper addresses the problem of locating sensors with a circular field of view so that a given line segment is under full surveillance, which is termed as the Disc Covering Problem on a Line. The cost of each sensor includes a fixed component, and a variable component that is proportional to the field-of-view area. When only one type of sensor or, in general, one type of disc, is available, then a simple polynomial algorithm solves the problem. When there are different types of sensors in terms of fixed and variable costs, the problem becomes NP-hard. A branch-and-bound algorithm as well as an efficient heuristic are developed. The heuristic very often obtains the optimal solution as shown in extensive computational testing.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 14:59:47 GMT" } ]
2007-07-20T00:00:00
[ [ "Agnetis", "Alessandro", "" ], [ "Grande", "Enrico", "" ], [ "Mirchandani", "Pitu B.", "" ], [ "Pacifici", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0707.2926
Bernard Levy
Bernard C. Levy
Robust Hypothesis Testing with a Relative Entropy Tolerance
14 pages, 5 figures, submitted to the IEEE Transactions on Information Theory, July 2007, revised April 2008
null
10.1109/TIT.2008.2008128
null
cs.IT math.IT
null
This paper considers the design of a minimax test for two hypotheses where the actual probability densities of the observations are located in neighborhoods obtained by placing a bound on the relative entropy between actual and nominal densities. The minimax problem admits a saddle point which is characterized. The robust test applies a nonlinear transformation which flattens the nominal likelihood ratio in the vicinity of one. Results are illustrated by considering the transmission of binary data in the presence of additive noise.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 15:33:36 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2008 00:18:43 GMT" } ]
2016-11-18T00:00:00
[ [ "Levy", "Bernard C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]