id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0704.2452 | Raman Yazdani | Raman Yazdani, Masoud Ardakani | Optimum Linear LLR Calculation for Iterative Decoding on Fading Channels | This paper will be presented in IEEE International Symposium on
Information Theory (ISIT) 2007 in Nice, France | null | 10.1109/ISIT.2007.4557204 | null | cs.IT math.IT | null | On a fading channel with no channel state information at the receiver,
calculating true log-likelihood ratios (LLR) is complicated. Existing work
assume that the power of the additive noise is known and use the expected value
of the fading gain in a linear function of the channel output to find
approximate LLRs. In this work, we first assume that the power of the additive
noise is known and we find the optimum linear approximation of LLRs in the
sense of maximum achievable transmission rate on the channel. The maximum
achievable rate under this linear LLR calculation is almost equal to the
maximum achievable rate under true LLR calculation. We also observe that this
method appears to be the optimum in the sense of bit error rate performance
too. These results are then extended to the case that the noise power is
unknown at the receiver and a performance almost identical to the case that the
noise power is perfectly known is obtained.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 02:22:52 GMT"
}
] | 2012-04-17T00:00:00 | [
[
"Yazdani",
"Raman",
""
],
[
"Ardakani",
"Masoud",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2475 | Zhang Shengli | Zhang Shengli, Soung-Chang Liew, Patrick P.K. Lam | Physical Layer Network Coding | null | null | null | null | cs.IT math.IT | null | A main distinguishing feature of a wireless network compared with a wired
network is its broadcast nature, in which the signal transmitted by a node may
reach several other nodes, and a node may receive signals from several other
nodes simultaneously. Rather than a blessing, this feature is treated more as
an interference-inducing nuisance in most wireless networks today (e.g., IEEE
802.11). This paper shows that the concept of network coding can be applied at
the physical layer to turn the broadcast property into a capacity-boosting
advantage in wireless ad hoc networks. Specifically, we propose a
physical-layer network coding (PNC) scheme to coordinate transmissions among
nodes. In contrast to straightforward network coding which performs coding
arithmetic on digital bit streams after they have been received, PNC makes use
of the additive nature of simultaneously arriving electromagnetic (EM) waves
for equivalent coding operation. And in doing so, PNC can potentially achieve
100% and 50% throughput increases compared with traditional transmission and
straightforward network coding, respectively, in multi-hop networks. More
specifically, the information-theoretic capacity of PNC is almost double that
of traditional transmission in the SNR region of practical interest (higher
than 0dB). We believe this is a first paper that ventures into EM-wave-based
network coding at the physical layer and demonstrates its potential for
boosting network capacity.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 08:15:37 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Shengli",
"Zhang",
""
],
[
"Liew",
"Soung-Chang",
""
],
[
"Lam",
"Patrick P. K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2505 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | Algebraic Distributed Space-Time Codes with Low ML Decoding Complexity | 5 pages, no figures. To appear in Proceedings of IEEE ISIT 2007,
Nice, France | null | 10.1109/ISIT.2007.4557437 | null | cs.IT cs.DM math.IT | null | "Extended Clifford algebras" are introduced as a means to obtain low ML
decoding complexity space-time block codes. Using left regular matrix
representations of two specific classes of extended Clifford algebras, two
systematic algebraic constructions of full diversity Distributed Space-Time
Codes (DSTCs) are provided for any power of two number of relays. The left
regular matrix representation has been shown to naturally result in space-time
codes meeting the additional constraints required for DSTCs. The DSTCs so
constructed have the salient feature of reduced Maximum Likelihood (ML)
decoding complexity. In particular, the ML decoding of these codes can be
performed by applying the lattice decoder algorithm on a lattice of four times
lesser dimension than what is required in general. Moreover these codes have a
uniform distribution of power among the relays and in time, thus leading to a
low Peak to Average Power Ratio at the relays.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 11:05:31 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2507 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | STBCs from Representation of Extended Clifford Algebras | 5 pages, no figures, To appear in Proceedings of IEEE ISIT 2007,
Nice, France | null | 10.1109/ISIT.2007.4557141 | null | cs.IT cs.DM math.IT | null | A set of sufficient conditions to construct $\lambda$-real symbol Maximum
Likelihood (ML) decodable STBCs have recently been provided by Karmakar et al.
STBCs satisfying these sufficient conditions were named as Clifford Unitary
Weight (CUW) codes. In this paper, the maximal rate (as measured in complex
symbols per channel use) of CUW codes for $\lambda=2^a,a\in\mathbb{N}$ is
obtained using tools from representation theory. Two algebraic constructions of
codes achieving this maximal rate are also provided. One of the constructions
is obtained using linear representation of finite groups whereas the other
construction is based on the concept of right module algebra over
non-commutative rings. To the knowledge of the authors, this is the first paper
in which matrices over non-commutative rings is used to construct STBCs. An
algebraic explanation is provided for the 'ABBA' construction first proposed by
Tirkkonen et al and the tensor product construction proposed by Karmakar et al.
Furthermore, it is established that the 4 transmit antenna STBC originally
proposed by Tirkkonen et al based on the ABBA construction is actually a single
complex symbol ML decodable code if the design variables are permuted and
signal sets of appropriate dimensions are chosen.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 11:16:40 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2509 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | Signal Set Design for Full-Diversity Low-Decoding-Complexity
Differential Scaled-Unitary STBCs | 5 pages, 2 figures. To appear in Proceedings of IEEE ISIT 2007, Nice,
France | null | 10.1109/ISIT.2007.4557453 | null | cs.IT math.IT | null | The problem of designing high rate, full diversity noncoherent space-time
block codes (STBCs) with low encoding and decoding complexity is addressed.
First, the notion of $g$-group encodable and $g$-group decodable linear STBCs
is introduced. Then for a known class of rate-1 linear designs, an explicit
construction of fully-diverse signal sets that lead to four-group encodable and
four-group decodable differential scaled unitary STBCs for any power of two
number of antennas is provided. Previous works on differential STBCs either
sacrifice decoding complexity for higher rate or sacrifice rate for lower
decoding complexity.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 11:25:23 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2511 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | Noncoherent Low-Decoding-Complexity Space-Time Codes for Wireless Relay
Networks | 5 pages, no figures. To appear in Proceedings of IEEE ISIT 2007,
Nice, France | null | 10.1109/ISIT.2007.4557438 | null | cs.IT math.IT | null | The differential encoding/decoding setup introduced by Kiran et al, Oggier et
al and Jing et al for wireless relay networks that use codebooks consisting of
unitary matrices is extended to allow codebooks consisting of scaled unitary
matrices. For such codebooks to be used in the Jing-Hassibi protocol for
cooperative diversity, the conditions that need to be satisfied by the relay
matrices and the codebook are identified. A class of previously known rate one,
full diversity, four-group encodable and four-group decodable Differential
Space-Time Codes (DSTCs) is proposed for use as Distributed DSTCs (DDSTCs) in
the proposed set up. To the best of our knowledge, this is the first known low
decoding complexity DDSTC scheme for cooperative wireless networks.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 11:28:49 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2542 | Joan Llobera | Joan Llobera | Narratives within immersive technologies | 5 pages | null | null | null | cs.HC | null | The main goal of this project is to research technical advances in order to
enhance the possibility to develop narratives within immersive mediated
environments. An important part of the research is concerned with the question
of how a script can be written, annotated and realized for an immersive
context. A first description of the main theoretical framework and the ongoing
work and a first script example is provided. This project is part of the
program for presence research, and it will exploit physiological feedback and
Computational Intelligence within virtual reality.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 14:27:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Llobera",
"Joan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0704.2544 | Vishwambhar Rathi | Vishwambhar Rathi, Ruediger Urbanke | Existence Proofs of Some EXIT Like Functions | To appear in proc. of ISIT 2007 | null | null | null | cs.IT math.IT | null | The Extended BP (EBP) Generalized EXIT (GEXIT) function introduced in
\cite{MMRU05} plays a fundamental role in the asymptotic analysis of sparse
graph codes. For transmission over the binary erasure channel (BEC) the
analytic properties of the EBP GEXIT function are relatively simple and well
understood. The general case is much harder and even the existence of the curve
is not known in general. We introduce some tools from non-linear analysis which
can be useful to prove the existence of EXIT like curves in some cases. The
main tool is the Krasnoselskii-Rabinowitz (KR) bifurcation theorem.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 14:36:43 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rathi",
"Vishwambhar",
""
],
[
"Urbanke",
"Ruediger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2596 | Markus Grassl | Markus Grassl | Computing Extensions of Linear Codes | accepted for publication at ISIT 07 | Proceedings 2007 IEEE International Symposium on Information
Theory (ISIT 2007), Nice, France, June 2007, pp. 476-480 | 10.1109/ISIT.2007.4557095 | null | cs.IT cs.DM math.IT | null | This paper deals with the problem of increasing the minimum distance of a
linear code by adding one or more columns to the generator matrix. Several
methods to compute extensions of linear codes are presented. Many codes
improving the previously known lower bounds on the minimum distance have been
found.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 19:28:33 GMT"
}
] | 2011-03-31T00:00:00 | [
[
"Grassl",
"Markus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2609 | Shamil Shakirov | V.Dolotin, A.Morozov and Sh.Shakirov | A-infinity structure on simplicial complexes | final version. 29 pages | null | 10.1007/s11232-008-0093-9 | ITEP/TH-13/07 | math.GT cs.DM hep-th | null | A discrete (finite-difference) analogue of differential forms is considered,
defined on simplicial complexes, including triangulations of continuous
manifolds. Various operations are explicitly defined on these forms, including
exterior derivative and exterior product. The latter one is non-associative.
Instead, as anticipated, it is a part of non-trivial A-infinity structure,
involving a chain of poly-linear operations, constrained by nilpotency
relation: (d + \wedge + m + ...)^n = 0 with n=2.
| [
{
"version": "v1",
"created": "Thu, 19 Apr 2007 20:48:51 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Apr 2007 19:42:39 GMT"
},
{
"version": "v3",
"created": "Thu, 17 May 2007 17:29:02 GMT"
},
{
"version": "v4",
"created": "Sat, 23 Jun 2007 02:42:15 GMT"
},
{
"version": "v5",
"created": "Fri, 19 Oct 2007 16:52:46 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dolotin",
"V.",
""
],
[
"Morozov",
"A.",
""
],
[
"Shakirov",
"Sh.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
}
] |
0704.2644 | Maxim Raginsky | Maxim Raginsky | Joint universal lossy coding and identification of stationary mixing
sources | 5 pages, 1 eps figure; to appear in Proc. ISIT 2007 | null | null | null | cs.IT cs.LG math.IT | null | The problem of joint universal source coding and modeling, treated in the
context of lossless codes by Rissanen, was recently generalized to fixed-rate
lossy coding of finitely parametrized continuous-alphabet i.i.d. sources. We
extend these results to variable-rate lossy block coding of stationary ergodic
sources and show that, for bounded metric distortion measures, any finitely
parametrized family of stationary sources satisfying suitable mixing,
smoothness and Vapnik-Chervonenkis learnability conditions admits universal
schemes for joint lossy source coding and identification. We also give several
explicit examples of parametric sources satisfying the regularity conditions.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 01:25:22 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Raginsky",
"Maxim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2651 | Lalitha Sankar | Lalitha Sankar, Yingbin Liang, H. Vincent Poor, Narayan B. Mandayam | Opportunistic Communications in an Orthogonal Multiaccess Relay Channel | To appear in the Proceedings of the 2007 IEEE International Symposium
on Information Theory, Nice, France, June 24 - 29, 2007 | null | 10.1109/ISIT.2007.4557396 | null | cs.IT math.IT | null | The problem of resource allocation is studied for a two-user fading
orthogonal multiaccess relay channel (MARC) where both users (sources)
communicate with a destination in the presence of a relay. A half-duplex relay
is considered that transmits on a channel orthogonal to that used by the
sources. The instantaneous fading state between every transmit-receive pair in
this network is assumed to be known at both the transmitter and receiver. Under
an average power constraint at each source and the relay, the sum-rate for the
achievable strategy of decode-and-forward (DF) is maximized over all power
allocations (policies) at the sources and relay. It is shown that the sum-rate
maximizing policy exploits the multiuser fading diversity to reveal the
optimality of opportunistic channel use by each user. A geometric
interpretation of the optimal power policy is also presented.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 04:02:33 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sankar",
"Lalitha",
""
],
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Mandayam",
"Narayan B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2659 | Chris Ng | Chris T. K. Ng, Deniz Gunduz, Andrea J. Goldsmith, Elza Erkip | Minimum Expected Distortion in Gaussian Layered Broadcast Coding with
Successive Refinement | To appear in the proceedings of the 2007 IEEE International Symposium
on Information Theory, Nice, France, June 24-29, 2007 | null | 10.1109/ISIT.2007.4557165 | null | cs.IT math.IT | null | A transmitter without channel state information (CSI) wishes to send a
delay-limited Gaussian source over a slowly fading channel. The source is coded
in superimposed layers, with each layer successively refining the description
in the previous one. The receiver decodes the layers that are supported by the
channel realization and reconstructs the source up to a distortion. In the
limit of a continuum of infinite layers, the optimal power distribution that
minimizes the expected distortion is given by the solution to a set of linear
differential equations in terms of the density of the fading distribution. In
the optimal power distribution, as SNR increases, the allocation over the
higher layers remains unchanged; rather the extra power is allocated towards
the lower layers. On the other hand, as the bandwidth ratio b (channel uses per
source symbol) tends to zero, the power distribution that minimizes expected
distortion converges to the power distribution that maximizes expected
capacity. While expected distortion can be improved by acquiring CSI at the
transmitter (CSIT) or by increasing diversity from the realization of
independent fading paths, at high SNR the performance benefit from diversity
exceeds that from CSIT, especially when b is large.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 07:41:35 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Apr 2007 00:23:10 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Ng",
"Chris T. K.",
""
],
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea J.",
""
],
[
"Erkip",
"Elza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2668 | Alex Smola J | Le Song, Alex Smola, Arthur Gretton, Karsten Borgwardt, Justin Bedo | Supervised Feature Selection via Dependence Estimation | 9 pages | null | null | null | cs.LG | null | We introduce a framework for filtering features that employs the
Hilbert-Schmidt Independence Criterion (HSIC) as a measure of dependence
between the features and the labels. The key idea is that good features should
maximise such dependence. Feature selection for various supervised learning
problems (including classification and regression) is unified under this
framework, and the solutions can be approximated using a backward-elimination
algorithm. We demonstrate the usefulness of our method on both artificial and
real world datasets.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 08:26:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Song",
"Le",
""
],
[
"Smola",
"Alex",
""
],
[
"Gretton",
"Arthur",
""
],
[
"Borgwardt",
"Karsten",
""
],
[
"Bedo",
"Justin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0704.2680 | Tobias Koch | Tobias Koch, Amos Lapidoth and Paul P. Sotiriadis | A Channel that Heats Up | to appear in Proceedings of the 2007 IEEE International Symposium on
Information Theory (ISIT), Nice, France | null | null | null | cs.IT math.IT | null | Motivated by on-chip communication, a channel model is proposed where the
variance of the additive noise depends on the weighted sum of the past channel
input powers. For this channel, an expression for the capacity per unit cost is
derived, and it is shown that the expression holds also in the presence of
feedback.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 10:26:53 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Sotiriadis",
"Paul P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2725 | Manuel Cebri\'an | Manuel Cebrian and Ivan Cantador | Exploiting Heavy Tails in Training Times of Multilayer Perceptrons: A
Case Study with the UCI Thyroid Disease Database | 8 pages, 4 figures, submitted for consideration to the "Statistics
and Its Interface" journal | null | null | null | cs.NE | null | The random initialization of weights of a multilayer perceptron makes it
possible to model its training process as a Las Vegas algorithm, i.e. a
randomized algorithm which stops when some required training error is obtained,
and whose execution time is a random variable. This modeling is used to perform
a case study on a well-known pattern recognition benchmark: the UCI Thyroid
Disease Database. Empirical evidence is presented of the training time
probability distribution exhibiting a heavy tail behavior, meaning a big
probability mass of long executions. This fact is exploited to reduce the
training time cost by applying two simple restart strategies. The first assumes
full knowledge of the distribution yielding a 40% cut down in expected time
with respect to the training without restarts. The second, assumes null
knowledge, yielding a reduction ranging from 9% to 23%.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 15:58:04 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Dec 2007 03:06:49 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Cebrian",
"Manuel",
""
],
[
"Cantador",
"Ivan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0704.2778 | Brooke Shrader | Brooke Shrader and Anthony Ephremides | Random Access Broadcast: Stability and Throughput Analysis | 19 pages, 5 figures. Submitted as correspondence to IEEE Transactions
on Information Theory, Sept 2006. Revised April 2007 | IEEE Transactions on Information Theory, vol. 53, no. 8, pp.
2915-2921, August 2007. | null | null | cs.IT math.IT | null | A wireless network in which packets are broadcast to a group of receivers
through use of a random access protocol is considered in this work. The
relation to previous work on networks of interacting queues is discussed and
subsequently, the stability and throughput regions of the system are analyzed
and presented. A simple network of two source nodes and two destination nodes
is considered first. The broadcast service process is analyzed assuming a
channel that allows for packet capture and multipacket reception. In this small
network, the stability and throughput regions are observed to coincide. The
same problem for a network with N sources and M destinations is considered
next. The channel model is simplified in that multipacket reception is no
longer permitted. Bounds on the stability region are developed using the
concept of stability rank and the throughput region of the system is compared
to the bounds. Our results show that as the number of destination nodes
increases, the stability and throughput regions diminish. Additionally, a
previous conjecture that the stability and throughput regions coincide for a
network of arbitrarily many sources is supported for a broadcast scenario by
the results presented in this work.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 19:17:43 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Shrader",
"Brooke",
""
],
[
"Ephremides",
"Anthony",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2779 | J D | Jonas Dieckelmann | The Complexity of Simple Stochastic Games | Hi, while reading through literature i noticed that it has not yet
been proved that computing the value vector of simple stochastic games is a
Problem in FNP. This is why i came up with a prove in this seminar work of
mine | null | null | null | cs.CC cs.GT | null | In this paper we survey the computational time complexity of assorted simple
stochastic game problems, and we give an overview of the best known algorithms
associated with each problem.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 19:51:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dieckelmann",
"Jonas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0704.2786 | Wenyi Zhang | Wenyi Zhang, Shivaprasad Kotagiri, and J. Nicholas Laneman | Writing on Dirty Paper with Resizing and its Application to Quasi-Static
Fading Broadcast Channels | To appear in IEEE International Symposium on Information Theory 2007 | null | 10.1109/ISIT.2007.4557255 | null | cs.IT math.IT | null | This paper studies a variant of the classical problem of ``writing on dirty
paper'' in which the sum of the input and the interference, or dirt, is
multiplied by a random variable that models resizing, known to the decoder but
not to the encoder. The achievable rate of Costa's dirty paper coding (DPC)
scheme is calculated and compared to the case of the decoder's also knowing the
dirt. In the ergodic case, the corresponding rate loss vanishes asymptotically
in the limits of both high and low signal-to-noise ratio (SNR), and is small at
all finite SNR for typical distributions like Rayleigh, Rician, and Nakagami.
In the quasi-static case, the DPC scheme is lossless at all SNR in terms of
outage probability. Quasi-static fading broadcast channels (BC) without
transmit channel state information (CSI) are investigated as an application of
the robustness properties. It is shown that the DPC scheme leads to an outage
achievable rate region that strictly dominates that of time division.
| [
{
"version": "v1",
"created": "Fri, 20 Apr 2007 20:29:32 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Zhang",
"Wenyi",
""
],
[
"Kotagiri",
"Shivaprasad",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2808 | Aditya Ramamoorthy | Aditya Ramamoorthy | Minimum cost distributed source coding over a network | First version apppeared in the Proceedings of the 2007 IEEE
International Symposium on Information Theory, Nice, France, June 24 - 29,
2007. The second version is an expanded journal submission under
consideration at the IEEE Transactions on Information Theory | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work considers the problem of transmitting multiple compressible sources
over a network at minimum cost. The aim is to find the optimal rates at which
the sources should be compressed and the network flows using which they should
be transmitted so that the cost of the transmission is minimal. We consider
networks with capacity constraints and linear cost functions. The problem is
complicated by the fact that the description of the feasible rate region of
distributed source coding problems typically has a number of constraints that
is exponential in the number of sources. This renders general purpose solvers
inefficient. We present a framework in which these problems can be solved
efficiently by exploiting the structure of the feasible rate regions coupled
with dual decomposition and optimization techniques such as the subgradient
method and the proximal bundle method.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 17:41:35 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Aug 2009 22:56:01 GMT"
}
] | 2009-08-13T00:00:00 | [
[
"Ramamoorthy",
"Aditya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2811 | Nandakishore Santhi | Nandakishore Santhi | On Algebraic Decoding of $q$-ary Reed-Muller and Product-Reed-Solomon
Codes | 5 pages, 5 figures, to be presented at 2007 IEEE International
Symposium on Information Theory, Nice, France (ISIT 2007) | null | 10.1109/ISIT.2007.4557130 | LA-UR-07-0469 | cs.IT cs.DM math.IT | null | We consider a list decoding algorithm recently proposed by Pellikaan-Wu
\cite{PW2005} for $q$-ary Reed-Muller codes $\mathcal{RM}_q(\ell, m, n)$ of
length $n \leq q^m$ when $\ell \leq q$. A simple and easily accessible
correctness proof is given which shows that this algorithm achieves a relative
error-correction radius of $\tau \leq (1 - \sqrt{{\ell q^{m-1}}/{n}})$. This is
an improvement over the proof using one-point Algebraic-Geometric codes given
in \cite{PW2005}. The described algorithm can be adapted to decode
Product-Reed-Solomon codes.
We then propose a new low complexity recursive algebraic decoding algorithm
for Reed-Muller and Product-Reed-Solomon codes. Our algorithm achieves a
relative error correction radius of $\tau \leq \prod_{i=1}^m (1 -
\sqrt{k_i/q})$. This technique is then proved to outperform the Pellikaan-Wu
method in both complexity and error correction radius over a wide range of code
rates.
| [
{
"version": "v1",
"created": "Sun, 22 Apr 2007 00:22:46 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Santhi",
"Nandakishore",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2841 | Lun Dong | Athina P. Petropulu, Lun Dong, H. Vincent Poor | A High-Throughput Cross-Layer Scheme for Distributed Wireless Ad Hoc
Networks | 6 pages, Appeared in the Proceedings of the 41st Annual Conference on
Information Sciences and Systems, John Hopkins University, March 2007 | null | null | null | cs.IT math.IT | null | In wireless ad hoc networks, distributed nodes can collaboratively form an
antenna array for long-distance communications to achieve high energy
efficiency. In recent work, Ochiai, et al., have shown that such collaborative
beamforming can achieve a statistically nice beampattern with a narrow main
lobe and low sidelobes. However, the process of collaboration introduces
significant delay, since all collaborating nodes need access to the same
information. In this paper, a technique that significantly reduces the
collaboration overhead is proposed. It consists of two phases. In the first
phase, nodes transmit locally in a random access fashion. Collisions, when they
occur, are viewed as linear mixtures of the collided packets. In the second
phase, a set of cooperating nodes acts as a distributed antenna system and
beamform the received analog waveform to one or more faraway destinations. This
step requires multiplication of the received analog waveform by a complex
number, which is independently computed by each cooperating node, and which
enables separation of the collided packets based on their final destination.
The scheme requires that each node has global knowledge of the network
coordinates. The proposed scheme can achieve high throughput, which in certain
cases exceeds one.
| [
{
"version": "v1",
"created": "Sat, 21 Apr 2007 17:44:24 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Petropulu",
"Athina P.",
""
],
[
"Dong",
"Lun",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2852 | Christof Teuscher | Christof Teuscher | Nature-Inspired Interconnects for Self-Assembled Large-Scale
Network-on-Chip Designs | null | Chaos, 17(2):026106, 2007 | 10.1063/1.2740566 | LA-UR-07-0204 | cs.AR cond-mat.dis-nn nlin.AO | null | Future nano-scale electronics built up from an Avogadro number of components
needs efficient, highly scalable, and robust means of communication in order to
be competitive with traditional silicon approaches. In recent years, the
Networks-on-Chip (NoC) paradigm emerged as a promising solution to interconnect
challenges in silicon-based electronics. Current NoC architectures are either
highly regular or fully customized, both of which represent implausible
assumptions for emerging bottom-up self-assembled molecular electronics that
are generally assumed to have a high degree of irregularity and imperfection.
Here, we pragmatically and experimentally investigate important design
trade-offs and properties of an irregular, abstract, yet physically plausible
3D small-world interconnect fabric that is inspired by modern network-on-chip
paradigms. We vary the framework's key parameters, such as the connectivity,
the number of switch nodes, the distribution of long- versus short-range
connections, and measure the network's relevant communication characteristics.
We further explore the robustness against link failures and the ability and
efficiency to solve a simple toy problem, the synchronization task. The results
confirm that (1) computation in irregular assemblies is a promising and
disruptive computing paradigm for self-assembled nano-scale electronics and (2)
that 3D small-world interconnect fabrics with a power-law decaying distribution
of shortcut lengths are physically plausible and have major advantages over
local 2D and 3D regular topologies.
| [
{
"version": "v1",
"created": "Sat, 21 Apr 2007 21:26:03 GMT"
}
] | 2007-07-01T00:00:00 | [
[
"Teuscher",
"Christof",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0704.2857 | Andrea Montanari | Andrea Montanari and Rudiger Urbanke | Modern Coding Theory: The Statistical Mechanics and Computer Science
Point of View | Lectures at Les Houches Summer School on `Complex Systems', July
2006, 44 pages, 25 ps figures | null | null | null | cs.IT cond-mat.stat-mech math.IT | null | These are the notes for a set of lectures delivered by the two authors at the
Les Houches Summer School on `Complex Systems' in July 2006. They provide an
introduction to the basic concepts in modern (probabilistic) coding theory,
highlighting connections with statistical mechanics. We also stress common
concepts with other disciplines dealing with similar problems that can be
generically referred to as `large graphical models'.
While most of the lectures are devoted to the classical channel coding
problem over simple memoryless channels, we present a discussion of more
complex channel models. We conclude with an overview of the main open
challenges in the field.
| [
{
"version": "v1",
"created": "Sun, 22 Apr 2007 01:57:03 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Urbanke",
"Rudiger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2900 | Marco Maggesi | Andre' Hirschowitz and Marco Maggesi | Higher-order theories | 12 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend our approach to abstract syntax (with binding constructions)
through modules and linearity. First we give a new general definition of arity,
yielding the companion notion of signature. Then we obtain a modularity result
as requested by Ghani and Uustalu (2003): in our setting, merging two
extensions of syntax corresponds to building an amalgamated sum. Finally we
define a natural notion of equation concerning a signature and prove the
existence of an initial semantics for a so-called representable signature
equipped with a set of equations.
| [
{
"version": "v1",
"created": "Sun, 22 Apr 2007 18:19:46 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2008 15:45:27 GMT"
}
] | 2008-09-09T00:00:00 | [
[
"Hirschowitz",
"Andre'",
""
],
[
"Maggesi",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0704.2902 | Stefan Pohl | Stefan Pohl, Filip Radlinski and Thorsten Joachims | Recommending Related Papers Based on Digital Library Access Records | 2 pages, 3 postscript figures, to appear in proceedings of JCDL'07,
additional and more detailed results can be found in arXiv:0704.2963v1 | null | null | null | cs.DL cs.IR | null | An important goal for digital libraries is to enable researchers to more
easily explore related work. While citation data is often used as an indicator
of relatedness, in this paper we demonstrate that digital access records (e.g.
http-server logs) can be used as indicators as well. In particular, we show
that measures based on co-access provide better coverage than co-citation, that
they are available much sooner, and that they are more accurate for recent
papers.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 16:51:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pohl",
"Stefan",
""
],
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0704.2919 | David Eppstein | David Eppstein, Jean-Claude Falmagne, and Hasan Uzun | On Verifying and Engineering the Well-gradedness of a Union-closed
Family | 15 pages | J. Mathematical Psychology 53(1):34-39, 2009 | 10.1016/j.jmp.2008.09.002 | null | math.CO cs.DM cs.DS | null | Current techniques for generating a knowledge space, such as QUERY,
guarantees that the resulting structure is closed under union, but not that it
satisfies wellgradedness, which is one of the defining conditions for a
learning space. We give necessary and sufficient conditions on the base of a
union-closed set family that ensures that the family is well-graded. We
consider two cases, depending on whether or not the family contains the empty
set. We also provide algorithms for efficiently testing these conditions, and
for augmenting a set family in a minimal way to one that satisfies these
conditions.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 04:37:08 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Nov 2007 06:56:35 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Apr 2008 00:23:39 GMT"
}
] | 2009-08-28T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Falmagne",
"Jean-Claude",
""
],
[
"Uzun",
"Hasan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0704.2926 | Lawrence Ong | Lawrence Ong, Mehul Motani | Optimal Routing for the Gaussian Multiple-Relay Channel with
Decode-and-Forward | Accepted and to be presented at the 2007 IEEE International Symposium
on Information Theory (ISIT 2007), Acropolis Congress and Exhibition Center,
Nice, France, June 24-29 2007 | Proceedings of the 2007 IEEE International Symposium on
Information Theory (ISIT 2007), Acropolis Congress and Exhibition Center,
Nice, France, pp. 1061-1065, Jun. 24-29 2007. | 10.1109/ISIT.2007.4557364 | null | cs.IT math.IT | null | In this paper, we study a routing problem on the Gaussian multiple relay
channel, in which nodes employ a decode-and-forward coding strategy. We are
interested in routes for the information flow through the relays that achieve
the highest DF rate. We first construct an algorithm that provably finds
optimal DF routes. As the algorithm runs in factorial time in the worst case,
we propose a polynomial time heuristic algorithm that finds an optimal route
with high probability. We demonstrate that that the optimal (and near optimal)
DF routes are good in practice by simulating a distributed DF coding scheme
using low density parity check codes with puncturing and incremental
redundancy.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 06:33:38 GMT"
}
] | 2010-04-15T00:00:00 | [
[
"Ong",
"Lawrence",
""
],
[
"Motani",
"Mehul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.2963 | Stefan Pohl | Stefan Pohl | Using Access Data for Paper Recommendations on ArXiv.org | 73 pages, 31 figures, Master's Thesis | null | null | null | cs.DL cs.IR | null | This thesis investigates in the use of access log data as a source of
information for identifying related scientific papers. This is done for
arXiv.org, the authority for publication of e-prints in several fields of
physics.
Compared to citation information, access logs have the advantage of being
immediately available, without manual or automatic extraction of the citation
graph. Because of that, a main focus is on the question, how far user behavior
can serve as a replacement for explicit meta-data, which potentially might be
expensive or completely unavailable. Therefore, we compare access, content, and
citation-based measures of relatedness on different recommendation tasks. As a
final result, an online recommendation system has been built that can help
scientists to find further relevant literature, without having to search for
them actively.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 15:52:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pohl",
"Stefan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0704.3019 | Oliver Henkel | Oliver Henkel | Arbitrary Rate Permutation Modulation for the Gaussian Channel | to appear in the Proceedings of the International Symposium of
Information Theory (ISIT 2007) | null | null | null | cs.IT math.IT | null | In this paper non-group permutation modulated sequences for the Gaussian
channel are considered. Without the restriction to group codes rather than
subsets of group codes, arbitrary rates are achievable. The code construction
utilizes the known optimal group constellations to ensure at least the same
performance but exploit the Gray code ordering structure of multiset
permutations as a selection criterion at the decoder. The decoder achieves near
maximum likelihood performance at low computational cost and low additional
memory requirements at the receiver.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 14:31:17 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Henkel",
"Oliver",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3035 | Ender Tekin | Ender Tekin, Aylin Yener | Achievable Rates for Two-Way Wire-Tap Channels | International Symposium on Information Theory (ISIT) 2007, June 24-29 | null | null | null | cs.IT cs.CR math.IT | null | We consider two-way wire-tap channels, where two users are communicating with
each other in the presence of an eavesdropper, who has access to the
communications through a multiple-access channel. We find achievable rates for
two different scenarios, the Gaussian two-way wire-tap channel, (GTW-WT), and
the binary additive two-way wire-tap channel, (BATW-WT). It is shown that the
two-way channels inherently provide a unique advantage for wire-tapped
scenarios, as the users know their own transmitted signals and in effect help
encrypt the other user's messages, similar to a one-time pad. We compare the
achievable rates to that of the Gaussian multiple-access wire-tap channel
(GMAC-WT) to illustrate this advantage.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 19:26:59 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3094 | Olympia Hadjiliadis | Olympia Hadjiliadis and H.Vincent Poor | Detection of two-sided alternatives in a Brownian motion model | 4 pages, to appear in the Proceedings of the 56th Session of the
International Statistical Institute, Lisbon, Portugal, August 22- 29, 2007 | null | null | null | cs.IT math.IT | null | This work examines the problem of sequential detection of a change in the
drift of a Brownian motion in the case of two-sided alternatives. Applications
to real life situations in which two-sided changes can occur are discussed.
Traditionally, 2-CUSUM stopping rules have been used for this problem due to
their asymptotically optimal character as the mean time between false alarms
tends to $\infty$. In particular, attention has focused on 2-CUSUM harmonic
mean rules due to the simplicity in calculating their first moments. In this
paper, we derive closed-form expressions for the first moment of a general
2-CUSUM stopping rule. We use these expressions to obtain explicit upper and
lower bounds for it. Moreover, we derive an expression for the rate of change
of this first moment as one of the threshold parameters changes. Based on these
expressions we obtain explicit upper and lower bounds to this rate of change.
Using these expressions we are able to find the best 2-CUSUM stopping rule with
respect to the extended Lorden criterion. In fact, we demonstrate not only the
existence but also the uniqueness of the best 2-CUSUM stopping both in the case
of a symmetric change and in the case of a non-symmetric case. Furthermore, we
discuss the existence of a modification of the 2-CUSUM stopping rule that has a
strictly better performance than its classical 2-CUSUM counterpart for small
values of the mean time between false alarms. We conclude with a discussion on
the open problem of strict optimality in the case of two-sided alternatives.
| [
{
"version": "v1",
"created": "Mon, 23 Apr 2007 22:28:30 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Hadjiliadis",
"Olympia",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3120 | Oliver Henkel | Oliver Henkel | Space Time Codes from Permutation Codes | null | Proc. IEEE GlobeCom, San Francisco, California, Nov. 2006 | null | null | cs.IT math.IT | null | A new class of space time codes with high performance is presented. The code
design utilizes tailor-made permutation codes, which are known to have large
minimal distances as spherical codes. A geometric connection between spherical
and space time codes has been used to translate them into the final space time
codes. Simulations demonstrate that the performance increases with the block
lengths, a result that has been conjectured already in previous work. Further,
the connection to permutation codes allows for moderate complex en-/decoding
algorithms.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 05:45:30 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Henkel",
"Oliver",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3141 | Evgueni Petrov | Evgueni Petrov | Algorithm for Evaluation of the Interval Power Function of Unconstrained
Arguments | 3 pages | null | null | null | cs.MS | null | We describe an algorithm for evaluation of the interval extension of the
power function of variables x and y given by the expression x^y. Our algorithm
reduces the general case to the case of non-negative bases.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 08:33:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petrov",
"Evgueni",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0704.3157 | Giorgio Terracina | Giorgio Terracina, Nicola Leone, Vincenzino Lio, Claudio Panetta | Experimenting with recursive queries in database and logic programming
systems | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.AI cs.DB | null | This paper considers the problem of reasoning on massive amounts of (possibly
distributed) data. Presently, existing proposals show some limitations: {\em
(i)} the quantity of data that can be handled contemporarily is limited, due to
the fact that reasoning is generally carried out in main-memory; {\em (ii)} the
interaction with external (and independent) DBMSs is not trivial and, in
several cases, not allowed at all; {\em (iii)} the efficiency of present
implementations is still not sufficient for their utilization in complex
reasoning tasks involving massive amounts of data. This paper provides a
contribution in this setting; it presents a new system, called DLV$^{DB}$,
which aims to solve these problems. Moreover, the paper reports the results of
a thorough experimental analysis we have carried out for comparing our system
with several state-of-the-art systems (both logic and databases) on some
classical deductive problems; the other tested systems are: LDL++, XSB, Smodels
and three top-level commercial DBMSs. DLV$^{DB}$ significantly outperforms even
the commercial Database Systems on recursive queries. To appear in Theory and
Practice of Logic Programming (TPLP)
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 10:58:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Terracina",
"Giorgio",
""
],
[
"Leone",
"Nicola",
""
],
[
"Lio",
"Vincenzino",
""
],
[
"Panetta",
"Claudio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0704.3177 | Andreas Enge | Andreas Enge (INRIA Futurs) | Computing modular polynomials in quasi-linear time | null | Mathematics of Computation 78, 267 (2009) 1809-1824 | null | null | math.NT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse and compare the complexity of several algorithms for computing
modular polynomials. We show that an algorithm relying on floating point
evaluation of modular functions and on interpolation, which has received little
attention in the literature, has a complexity that is essentially (up to
logarithmic factors) linear in the size of the computed polynomials. In
particular, it obtains the classical modular polynomials $\Phi_\ell$ of prime
level $\ell$ in time O (\ell^3 \log^4 \ell \log \log \ell). Besides treating
modular polynomials for $\Gamma^0 (\ell)$, which are an important ingredient in
many algorithms dealing with isogenies of elliptic curves, the algorithm is
easily adapted to more general situations. Composite levels are handled just as
easily as prime levels, as well as polynomials between a modular function and
its transform of prime level, such as the Schl\"afli polynomials and their
generalisations. Our distributed implementation of the algorithm confirms the
theoretical analysis by computing modular equations of record level around
10000 in less than two weeks on ten processors.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 12:27:39 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jul 2008 12:33:49 GMT"
}
] | 2009-05-08T00:00:00 | [
[
"Enge",
"Andreas",
"",
"INRIA Futurs"
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0704.3197 | Reinhard Klette | Fajie Li and Reinhard Klette | Euclidean Shortest Paths in Simple Cube Curves at a Glance | 8 pages | null | null | CITR-TR-198 | cs.CG cs.DM | null | This paper reports about the development of two provably correct approximate
algorithms which calculate the Euclidean shortest path (ESP) within a given
cube-curve with arbitrary accuracy, defined by $\epsilon >0$, and in time
complexity $\kappa(\epsilon) \cdot {\cal O}(n)$, where $\kappa(\epsilon)$ is
the length difference between the path used for initialization and the
minimum-length path, divided by $\epsilon$. A run-time diagram also illustrates
this linear-time behavior of the implemented ESP algorithm.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 03:54:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Fajie",
""
],
[
"Klette",
"Reinhard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0704.3199 | Enrico Paolini | E. Paolini, M. Fossorier, M. Chiani | Generalized Stability Condition for Generalized and Doubly-Generalized
LDPC Codes | 5 pages, 2 figures, to appear in Proc. of IEEE ISIT 2007 | null | 10.1109/ISIT.2007.4557440 | null | cs.IT math.IT | null | In this paper, the stability condition for low-density parity-check (LDPC)
codes on the binary erasure channel (BEC) is extended to generalized LDPC
(GLDPC) codes and doublygeneralized LDPC (D-GLDPC) codes. It is proved that, in
both cases, the stability condition only involves the component codes with
minimum distance 2. The stability condition for GLDPC codes is always expressed
as an upper bound to the decoding threshold. This is not possible for D-GLDPC
codes, unless all the generalized variable nodes have minimum distance at least
3. Furthermore, a condition called derivative matching is defined in the paper.
This condition is sufficient for a GLDPC or DGLDPC code to achieve the
stability condition with equality. If this condition is satisfied, the
threshold of D-GLDPC codes (whose generalized variable nodes have all minimum
distance at least 3) and GLDPC codes can be expressed in closed form.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 14:11:58 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Paolini",
"E.",
""
],
[
"Fossorier",
"M.",
""
],
[
"Chiani",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3228 | Thomas Silverston | Thomas Silverston, Olivier Fourmaux and Kave Salamatian | Characterization of P2P IPTV Traffic: Scaling Analysis | 27p, submitted to a conference | null | null | null | cs.NI cs.MM | null | P2P IPTV applications arise on the Internet and will be massively used in the
future. It is expected that P2P IPTV will contribute to increase the overall
Internet traffic. In this context, it is important to measure the impact of P2P
IPTV on the networks and to characterize this traffic. Dur- ing the 2006 FIFA
World Cup, we performed an extensive measurement campaign. We measured network
traffic generated by broadcasting soc- cer games by the most popular P2P IPTV
applications, namely PPLive, PPStream, SOPCast and TVAnts. From the collected
data, we charac- terized the P2P IPTV traffic structure at different time
scales by using wavelet based transform method. To the best of our knowledge,
this is the first work, which presents a complete multiscale analysis of the
P2P IPTV traffic. Our results show that the scaling properties of the TCP
traffic present periodic behavior whereas the UDP traffic is stationary and
lead to long- range depedency characteristics. For all the applications, the
download traffic has different characteristics than the upload traffic. The
signaling traffic has a significant impact on the download traffic but it has
negligible impact on the upload. Both sides of the traffic and its granularity
has to be taken into account to design accurate P2P IPTV traffic models.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 16:18:13 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jul 2007 14:26:05 GMT"
}
] | 2007-07-17T00:00:00 | [
[
"Silverston",
"Thomas",
""
],
[
"Fourmaux",
"Olivier",
""
],
[
"Salamatian",
"Kave",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0704.3238 | Nicolas Troquard | Philippe Balbiani, Andreas Herzig and Nicolas Troquard | Alternative axiomatics and complexity of deliberative STIT theories | Submitted to the Journal of Philosophical Logic; 13 pages excluding
annex | null | 10.1007/s10992-007-9078-7 | null | cs.LO | null | We propose two alternatives to Xu's axiomatization of the Chellas STIT. The
first one also provides an alternative axiomatization of the deliberative STIT.
The second one starts from the idea that the historic necessity operator can be
defined as an abbreviation of operators of agency, and can thus be eliminated
from the logic of the Chellas STIT. The second axiomatization also allows us to
establish that the problem of deciding the satisfiability of a STIT formula
without temporal operators is NP-complete in the single-agent case, and is
NEXPTIME-complete in the multiagent case, both for the deliberative and the
Chellas' STIT.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 16:36:13 GMT"
}
] | 2011-04-29T00:00:00 | [
[
"Balbiani",
"Philippe",
""
],
[
"Herzig",
"Andreas",
""
],
[
"Troquard",
"Nicolas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0704.3241 | Marco Lops | Daniele Angelosante, Ezio Biglieri, Marco Lops | Neighbor Discovery in Wireless Networks:A Multiuser-Detection Approach | null | null | null | null | cs.IT math.IT | null | We examine the problem of determining which nodes are neighbors of a given
one in a wireless network. We consider an unsupervised network operating on a
frequency-flat Gaussian channel, where $K+1$ nodes associate their identities
to nonorthogonal signatures, transmitted at random times, synchronously, and
independently. A number of neighbor-discovery algorithms, based on different
optimization criteria, are introduced and analyzed. Numerical results show how
reduced-complexity algorithms can achieve a satisfactory performance.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 16:46:02 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Angelosante",
"Daniele",
""
],
[
"Biglieri",
"Ezio",
""
],
[
"Lops",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3268 | Koray Karahaliloglu | Koray Karahaliloglu | 2D Path Solutions from a Single Layer Excitable CNN Model | 24 pages, 9 figures | null | null | null | cs.RO cs.NE | null | An easily implementable path solution algorithm for 2D spatial problems,
based on excitable/programmable characteristics of a specific cellular
nonlinear network (CNN) model is presented and numerically investigated. The
network is a single layer bioinspired model which was also implemented in CMOS
technology. It exhibits excitable characteristics with regionally bistable
cells. The related response realizes propagations of trigger autowaves, where
the excitable mode can be globally preset and reset. It is shown that, obstacle
distributions in 2D space can also be directly mapped onto the coupled cell
array in the network. Combining these two features, the network model can serve
as the main block in a 2D path computing processor. The related algorithm and
configurations are numerically experimented with circuit level parameters and
performance estimations are also presented. The simplicity of the model also
allows alternative technology and device level implementation, which may become
critical in autonomous processor design of related micro or nanoscale robotic
applications.
| [
{
"version": "v1",
"created": "Tue, 24 Apr 2007 20:20:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karahaliloglu",
"Koray",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0704.3287 | N. Raj Rao | N. Raj Rao, Alan Edelman | Sample size cognizant detection of signals in white noise | To appear in the Proceedings of the 8th IEEE International Workshop
on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki,
Finland, June 17-20, 2007 | null | null | null | cs.IT math.IT | null | The detection and estimation of signals in noisy, limited data is a problem
of interest to many scientific and engineering communities. We present a
computationally simple, sample eigenvalue based procedure for estimating the
number of high-dimensional signals in white noise when there are relatively few
samples. We highlight a fundamental asymptotic limit of sample eigenvalue based
detection of weak high-dimensional signals from a limited sample size and
discuss its implication for the detection of two closely spaced signals.
This motivates our heuristic definition of the 'effective number of
identifiable signals.' Numerical simulations are used to demonstrate the
consistency of the algorithm with respect to the effective number of signals
and the superior performance of the algorithm with respect to Wax and Kailath's
"asymptotically consistent" MDL based estimator.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 00:23:20 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Rao",
"N. Raj",
""
],
[
"Edelman",
"Alan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3292 | Zhu Han | Zhu Han and H. Vincent Poor | Coalition Games with Cooperative Transmission: A Cure for the Curse of
Boundary Nodes in Selfish Packet-Forwarding Wireless Networks | null | in the Proceedings of the 5th International Symposium on Modeling
and Optimization in Mobile Ad Hoc and Wireless Networks, WiOpt07, Limassol,
Cyprus, April 16-20, 2007 | null | null | cs.IT math.IT | null | In wireless packet-forwarding networks with selfish nodes, applications of a
repeated game can induce the nodes to forward each others' packets, so that the
network performance can be improved. However, the nodes on the boundary of such
networks cannot benefit from this strategy, as the other nodes do not depend on
them. This problem is sometimes known as the curse of the boundary nodes. To
overcome this problem, an approach based on coalition games is proposed, in
which the boundary nodes can use cooperative transmission to help the backbone
nodes in the middle of the network. In return, the backbone nodes are willing
to forward the boundary nodes' packets. The stability of the coalitions is
studied using the concept of a core. Then two types of fairness, namely, the
min-max fairness using nucleolus and the average fairness using the Shapley
function are investigated. Finally, a protocol is designed using both repeated
games and coalition games. Simulation results show how boundary nodes and
backbone nodes form coalitions together according to different fairness
criteria. The proposed protocol can improve the network connectivity by about
50%, compared with pure repeated game schemes.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 15:37:22 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Apr 2007 21:15:48 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Han",
"Zhu",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3313 | David Eppstein | David Eppstein and Michael T. Goodrich | Straggler Identification in Round-Trip Data Streams via Newton's
Identities and Invertible Bloom Filters | Fuller version of paper appearing in 10th Worksh. Algorithms and Data
Structures, Halifax, Nova Scotia, 2007 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the straggler identification problem, in which an algorithm must
determine the identities of the remaining members of a set after it has had a
large number of insertion and deletion operations performed on it, and now has
relatively few remaining members. The goal is to do this in o(n) space, where n
is the total number of identities. The straggler identification problem has
applications, for example, in determining the set of unacknowledged packets in
a high-bandwidth multicast data stream. We provide a deterministic solution to
the straggler identification problem that uses only O(d log n) bits and is
based on a novel application of Newton's identities for symmetric polynomials.
This solution can identify any subset of d stragglers from a set of n O(log
n)-bit identifiers, assuming that there are no false deletions of identities
not already in the set. Indeed, we give a lower bound argument that shows that
any small-space deterministic solution to the straggler identification problem
cannot be guaranteed to handle false deletions. Nevertheless, we show that
there is a simple randomized solution using O(d log n log(1/epsilon)) bits that
can maintain a multiset and solve the straggler identification problem,
tolerating false deletions, where epsilon>0 is a user-defined parameter
bounding the probability of an incorrect response. This randomized solution is
based on a new type of Bloom filter, which we call the invertible Bloom filter.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 06:59:43 GMT"
},
{
"version": "v2",
"created": "Fri, 18 May 2007 21:56:45 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Sep 2009 04:13:31 GMT"
}
] | 2009-09-10T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0704.3316 | Ciro Cattuto | Ciro Cattuto, Andrea Baldassarri, Vito D. P. Servedio, Vittorio Loreto | Vocabulary growth in collaborative tagging systems | 6 pages, 7 figures | null | null | null | cs.IR cond-mat.stat-mech cs.CY physics.data-an | null | We analyze a large-scale snapshot of del.icio.us and investigate how the
number of different tags in the system grows as a function of a suitably
defined notion of time. We study the temporal evolution of the global
vocabulary size, i.e. the number of distinct tags in the entire system, as well
as the evolution of local vocabularies, that is the growth of the number of
distinct tags used in the context of a given resource or user. In both cases,
we find power-law behaviors with exponents smaller than one. Surprisingly, the
observed growth behaviors are remarkably regular throughout the entire history
of the system and across very different resources being bookmarked. Similar
sub-linear laws of growth have been observed in written text, and this
qualitative universality calls for an explanation and points in the direction
of non-trivial cognitive processes in the complex interaction patterns
characterizing collaborative tagging.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 07:47:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cattuto",
"Ciro",
""
],
[
"Baldassarri",
"Andrea",
""
],
[
"Servedio",
"Vito D. P.",
""
],
[
"Loreto",
"Vittorio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0704.3359 | Alex Smola J | Quoc Le and Alexander Smola | Direct Optimization of Ranking Measures | null | null | null | null | cs.IR cs.AI | null | Web page ranking and collaborative filtering require the optimization of
sophisticated performance measures. Current Support Vector approaches are
unable to optimize them directly and focus on pairwise comparisons instead. We
present a new approach which allows direct optimization of the relevant loss
functions. This is achieved via structured estimation in Hilbert spaces. It is
most related to Max-Margin-Markov networks optimization of multivariate
performance measures. Key to our approach is that during training the ranking
problem can be viewed as a linear assignment problem, which can be solved by
the Hungarian Marriage algorithm. At test time, a sort operation is sufficient,
as our algorithm assigns a relevance score to every (document, query) pair.
Experiments show that the our algorithm is fast and that it works very well.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 12:36:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Le",
"Quoc",
""
],
[
"Smola",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0704.3391 | Zhu Han | Zhu Han and H. Vincent Poor | Lifetime Improvement in Wireless Sensor Networks via Collaborative
Beamforming and Cooperative Transmission | Invited paper to appear in the IEE Proceedings: Microwaves, Antennas
and Propagation, Special Issue on Antenna Systems and Propagation for Future
Wireless Communications | null | null | null | cs.IT math.IT | null | Collaborative beamforming (CB) and cooperative transmission (CT) have
recently emerged as communication techniques that can make effective use of
collaborative/cooperative nodes to create a virtual
multiple-input/multiple-output (MIMO) system. Extending the lifetime of
networks composed of battery-operated nodes is a key issue in the design and
operation of wireless sensor networks. This paper considers the effects on
network lifetime of allowing closely located nodes to use CB/CT to reduce the
load or even to avoid packet-forwarding requests to nodes that have critical
battery life. First, the effectiveness of CB/CT in improving the signal
strength at a faraway destination using energy in nearby nodes is studied.
Then, the performance improvement obtained by this technique is analyzed for a
special 2D disk case. Further, for general networks in which
information-generation rates are fixed, a new routing problem is formulated as
a linear programming problem, while for other general networks, the cost for
routing is dynamically adjusted according to the amount of energy remaining and
the effectiveness of CB/CT. From the analysis and the simulation results, it is
seen that the proposed method can reduce the payloads of energy-depleting nodes
by about 90% in the special case network considered and improve the lifetimes
of general networks by about 10%, compared with existing techniques.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 15:14:32 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Apr 2007 02:49:33 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Han",
"Zhu",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3395 | Marko A. Rodriguez | Marko A. Rodriguez | General-Purpose Computing on a Semantic Network Substrate | null | Emergent Web Intelligence: Advanced Semantic Technologies,
Advanced Information and Knowledge Processing series, Springer-Verlag, pages
57-104, ISBN:978-1-84996-076-2, June 2010 | null | LA-UR-07-2885 | cs.AI cs.PL | http://creativecommons.org/licenses/publicdomain/ | This article presents a model of general-purpose computing on a semantic
network substrate. The concepts presented are applicable to any semantic
network representation. However, due to the standards and technological
infrastructure devoted to the Semantic Web effort, this article is presented
from this point of view. In the proposed model of computing, the application
programming interface, the run-time program, and the state of the computing
virtual machine are all represented in the Resource Description Framework
(RDF). The implementation of the concepts presented provides a practical
computing paradigm that leverages the highly-distributed and standardized
representational-layer of the Semantic Web.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 15:37:52 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Oct 2007 20:08:21 GMT"
},
{
"version": "v3",
"created": "Sun, 7 Oct 2007 21:44:01 GMT"
},
{
"version": "v4",
"created": "Sun, 6 Jun 2010 05:29:22 GMT"
}
] | 2010-06-08T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0704.3396 | Zhu Han | Zhu Han and H. Vincent Poor | Lifetime Improvement of Wireless Sensor Networks by Collaborative
Beamforming and Cooperative Transmission | to appear, in the proceedings of IEEE International Conference on
Communications, Glasgow, Scotland, 24-28 June 2007 | null | null | null | cs.IT math.IT | null | Extending network lifetime of battery-operated devices is a key design issue
that allows uninterrupted information exchange among distributive nodes in
wireless sensor networks. Collaborative beamforming (CB) and cooperative
transmission (CT) have recently emerged as new communication techniques that
enable and leverage effective resource sharing among collaborative/cooperative
nodes. In this paper, we seek to maximize the lifetime of sensor networks by
using the new idea that closely located nodes can use CB/CT to reduce the load
or even avoid packet forwarding requests to nodes that have critical battery
life. First, we study the effectiveness of CB/CT to improve the signal strength
at a faraway destination using energy in nearby nodes. Then, a 2D disk case is
analyzed to assess the resulting performance improvement. For general networks,
if information-generation rates are fixed, the new routing problem is
formulated as a linear programming problem; otherwise, the cost for routing is
dynamically adjusted according to the amount of energy remaining and the
effectiveness of CB/CT. From the analysis and simulation results, it is seen
that the proposed schemes can improve the lifetime by about 90% in the 2D disk
network and by about 10% in the general networks, compared to existing schemes.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 15:55:27 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Han",
"Zhu",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3399 | Zhu Han | Zhu Han, Xin Zhang, and H. Vincent Poor | Cooperative Transmission Protocols with High Spectral Efficiency and
High Diversity Order Using Multiuser Detection and Network Coding | to appear, in the proceedings of IEEE International Conference on
Communications, Glasgow, Scotland, 24-28 June 2007 | null | 10.1109/ICC.2007.698 | null | cs.IT math.IT | null | Cooperative transmission is an emerging communication technique that takes
advantages of the broadcast nature of wireless channels. However, due to low
spectral efficiency and the requirement of orthogonal channels, its potential
for use in future wireless networks is limited. In this paper, by making use of
multiuser detection (MUD) and network coding, cooperative transmission
protocols with high spectral efficiency, diversity order, and coding gain are
developed. Compared with the traditional cooperative transmission protocols
with single-user detection, in which the diversity gain is only for one source
user, the proposed MUD cooperative transmission protocols have the merits that
the improvement of one user's link can also benefit the other users. In
addition, using MUD at the relay provides an environment in which network
coding can be employed. The coding gain and high diversity order can be
obtained by fully utilizing the link between the relay and the destination.
From the analysis and simulation results, it is seen that the proposed
protocols achieve higher diversity gain, better asymptotic efficiency, and
lower bit error rate, compared to traditional MUD and to existing cooperative
transmission protocols.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 15:58:10 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Han",
"Zhu",
""
],
[
"Zhang",
"Xin",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3402 | Pedro Coronel | Pedro Coronel and Helmut B\"olcskei | Diversity-Multiplexing Tradeoff in Selective-Fading MIMO Channels | To be presented at IEEE Int. Symp. Inf. Theory 2007, Nice, France | null | null | null | cs.IT math.IT | null | We establish the optimal diversity-multiplexing (DM) tradeoff of coherent
time, frequency and time-frequency selective-fading MIMO channels and provide a
code design criterion for DM-tradeoff optimality. Our results are based on the
analysis of the "Jensen channel" associated to a given selective-fading MIMO
channel. While the original problem seems analytically intractable due to the
mutual information being a sum of correlated random variables, the Jensen
channel is equivalent to the original channel in the sense of the DM-tradeoff
and lends itself nicely to analytical treatment. Finally, as a consequence of
our results, we find that the classical rank criterion for space-time code
design (in selective-fading MIMO channels) ensures optimality in the sense of
the DM-tradeoff.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 16:09:06 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Coronel",
"Pedro",
""
],
[
"Bölcskei",
"Helmut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3405 | Shuguang Cui | Shuguang Cui and Jinjun Xiao and Andrea Goldsmith and Zhi-Quan Luo and
H. Vincent Poor | Estimation Diversity and Energy Efficiency in Distributed Sensing | To appear at IEEE Transactions on Signal Processing | null | 10.1109/TSP.2007.896019 | null | cs.IT math.IT | null | Distributed estimation based on measurements from multiple wireless sensors
is investigated. It is assumed that a group of sensors observe the same
quantity in independent additive observation noises with possibly different
variances. The observations are transmitted using amplify-and-forward (analog)
transmissions over non-ideal fading wireless channels from the sensors to a
fusion center, where they are combined to generate an estimate of the observed
quantity. Assuming that the Best Linear Unbiased Estimator (BLUE) is used by
the fusion center, the equal-power transmission strategy is first discussed,
where the system performance is analyzed by introducing the concept of
estimation outage and estimation diversity, and it is shown that there is an
achievable diversity gain on the order of the number of sensors. The optimal
power allocation strategies are then considered for two cases: minimum
distortion under power constraints; and minimum power under distortion
constraints. In the first case, it is shown that by turning off bad sensors,
i.e., sensors with bad channels and bad observation quality, adaptive power
gain can be achieved without sacrificing diversity gain. Here, the adaptive
power gain is similar to the array gain achieved in Multiple-Input
Single-Output (MISO) multi-antenna systems when channel conditions are known to
the transmitter. In the second case, the sum power is minimized under
zero-outage estimation distortion constraint, and some related energy
efficiency issues in sensor networks are discussed.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 16:30:31 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Cui",
"Shuguang",
""
],
[
"Xiao",
"Jinjun",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Luo",
"Zhi-Quan",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3408 | Sinan Gezici Dr | Sinan Gezici, Andreas F. Molisch, H. Vincent Poor, and Hisashi
Kobayashi | The Trade-off between Processing Gains of an Impulse Radio UWB System in
the Presence of Timing Jitter | To appear in the IEEE Transactions on Communications | null | null | null | cs.IT math.IT | null | In time hopping impulse radio, $N_f$ pulses of duration $T_c$ are transmitted
for each information symbol. This gives rise to two types of processing gain:
(i) pulse combining gain, which is a factor $N_f$, and (ii) pulse spreading
gain, which is $N_c=T_f/T_c$, where $T_f$ is the mean interval between two
subsequent pulses. This paper investigates the trade-off between these two
types of processing gain in the presence of timing jitter. First, an additive
white Gaussian noise (AWGN) channel is considered and approximate closed form
expressions for bit error probability are derived for impulse radio systems
with and without pulse-based polarity randomization. Both symbol-synchronous
and chip-synchronous scenarios are considered. The effects of multiple-access
interference and timing jitter on the selection of optimal system parameters
are explained through theoretical analysis. Finally, a multipath scenario is
considered and the trade-off between processing gains of a synchronous impulse
radio system with pulse-based polarity randomization is analyzed. The effects
of the timing jitter, multiple-access interference and inter-frame interference
are investigated. Simulation studies support the theoretical results.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 16:47:35 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gezici",
"Sinan",
""
],
[
"Molisch",
"Andreas F.",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Kobayashi",
"Hisashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3433 | Tshilidzi Marwala | Tshilidzi Marwala and Bodie Crossingham | Bayesian approach to rough set | 20 pages, 3 figures | null | null | null | cs.AI | null | This paper proposes an approach to training rough set models using Bayesian
framework trained using Markov Chain Monte Carlo (MCMC) method. The prior
probabilities are constructed from the prior knowledge that good rough set
models have fewer rules. Markov Chain Monte Carlo sampling is conducted through
sampling in the rough set granule space and Metropolis algorithm is used as an
acceptance criteria. The proposed method is tested to estimate the risk of HIV
given demographic data. The results obtained shows that the proposed approach
is able to achieve an average accuracy of 58% with the accuracy varying up to
66%. In addition the Bayesian rough set give the probabilities of the estimated
HIV status as well as the linguistic rules describing how the demographic
parameters drive the risk of HIV.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 19:50:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marwala",
"Tshilidzi",
""
],
[
"Crossingham",
"Bodie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0704.3434 | Shuchin Aeron | Shuchin Aeron, Manqi Zhao and Venkatesh Saligrama | On sensing capacity of sensor networks for the class of linear
observation, fixed SNR models | 37 pages, single column | null | null | null | cs.IT math.IT | null | In this paper we address the problem of finding the sensing capacity of
sensor networks for a class of linear observation models and a fixed SNR
regime. Sensing capacity is defined as the maximum number of signal dimensions
reliably identified per sensor observation. In this context sparsity of the
phenomena is a key feature that determines sensing capacity. Precluding the SNR
of the environment the effect of sparsity on the number of measurements
required for accurate reconstruction of a sparse phenomena has been widely
dealt with under compressed sensing. Nevertheless the development there was
motivated from an algorithmic perspective. In this paper our aim is to derive
these bounds in an information theoretic set-up and thus provide algorithm
independent conditions for reliable reconstruction of sparse signals. In this
direction we first generalize the Fano's inequality and provide lower bounds to
the probability of error in reconstruction subject to an arbitrary distortion
criteria. Using these lower bounds to the probability of error, we derive upper
bounds to sensing capacity and show that for fixed SNR regime sensing capacity
goes down to zero as sparsity goes down to zero. This means that
disproportionately more sensors are required to monitor very sparse events. Our
next main contribution is that we show the effect of sensing diversity on
sensing capacity, an effect that has not been considered before. Sensing
diversity is related to the effective \emph{coverage} of a sensor with respect
to the field. In this direction we show the following results (a) Sensing
capacity goes down as sensing diversity per sensor goes down; (b) Random
sampling (coverage) of the field by sensors is better than contiguous location
sampling (coverage).
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 19:52:47 GMT"
},
{
"version": "v2",
"created": "Mon, 14 May 2007 19:08:44 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Jun 2007 18:21:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Aeron",
"Shuchin",
""
],
[
"Zhao",
"Manqi",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3453 | Tshilidzi Marwala | S. Mohamed, D. Rubin, and T. Marwala | An Adaptive Strategy for the Classification of G-Protein Coupled
Receptors | 9 pages, 5 tables, 3 figures | null | null | null | cs.AI q-bio.QM | null | One of the major problems in computational biology is the inability of
existing classification models to incorporate expanding and new domain
knowledge. This problem of static classification models is addressed in this
paper by the introduction of incremental learning for problems in
bioinformatics. Many machine learning tools have been applied to this problem
using static machine learning structures such as neural networks or support
vector machines that are unable to accommodate new information into their
existing models. We utilize the fuzzy ARTMAP as an alternate machine learning
system that has the ability of incrementally learning new data as it becomes
available. The fuzzy ARTMAP is found to be comparable to many of the widespread
machine learning systems. The use of an evolutionary strategy in the selection
and combination of individual classifiers into an ensemble system, coupled with
the incremental learning ability of the fuzzy ARTMAP is proven to be suitable
as a pattern classifier. The algorithm presented is tested using data from the
G-Coupled Protein Receptors Database and shows good accuracy of 83%. The system
presented is also generally applicable, and can be used in problems in genomics
and proteomics.
| [
{
"version": "v1",
"created": "Wed, 25 Apr 2007 21:23:31 GMT"
}
] | 2007-06-25T00:00:00 | [
[
"Mohamed",
"S.",
""
],
[
"Rubin",
"D.",
""
],
[
"Marwala",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0704.3496 | Frank Gurski | Frank Gurski | Polynomial algorithms for protein similarity search for restricted mRNA
structures | 10 Pages | null | null | null | cs.DS cs.CC | null | In this paper we consider the problem of computing an mRNA sequence of
maximal similarity for a given mRNA of secondary structure constraints,
introduced by Backofen et al. in [BNS02] denoted as the MRSO problem. The
problem is known to be NP-complete for planar associated implied structure
graphs of vertex degree at most 3. In [BFHV05] a first polynomial dynamic
programming algorithms for MRSO on implied structure graphs with maximum vertex
degree 3 of bounded cut-width is shown. We give a simple but more general
polynomial dynamic programming solution for the MRSO problem for associated
implied structure graphs of bounded clique-width. Our result implies that MRSO
is polynomial for graphs of bounded tree-width, co-graphs, $P_4$-sparse graphs,
and distance hereditary graphs. Further we conclude that the problem of
comparing two solutions for MRSO is hard for the class of problems which can be
solved in polynomial time with a number of parallel queries to an oracle in NP.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 08:30:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gurski",
"Frank",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0704.3500 | Jerome Darmont | Zhen He, J\'er\^ome Darmont (ERIC) | Une plate-forme dynamique pour l'\'evaluation des performances des bases
de donn\'ees \`a objets | 20 pages | 19\`emes Journ\'ees de Bases de Donn\'ees Avanc\'ees (BDA 03),
Lyon (20/10/2003) 423-442 | null | null | cs.DB | null | In object-oriented or object-relational databases such as multimedia
databases or most XML databases, access patterns are not static, i.e.,
applications do not always access the same objects in the same order
repeatedly. However, this has been the way these databases and associated
optimisation techniques such as clustering have been evaluated up to now. This
paper opens up research regarding this issue by proposing a dynamic object
evaluation framework (DOEF). DOEF accomplishes access pattern change by
defining configurable styles of change. It is a preliminary prototype that has
been designed to be open and fully extensible. Though originally designed for
the object-oriented model, it can also be used within the object-relational
model with few adaptations. Furthermore, new access pattern change models can
be added too. To illustrate the capabilities of DOEF, we conducted two
different sets of experiments. In the first set of experiments, we used DOEF to
compare the performances of four state of the art dynamic clustering
algorithms. The results show that DOEF is effective at determining the
adaptability of each dynamic clustering algorithm to changes in access pattern.
They also led us to conclude that dynamic clustering algorithms can cope with
moderate levels of access pattern change, but that performance rapidly degrades
to be worse than no clustering when vigorous styles of access pattern change
are applied. In the second set of experiments, we used DOEF to compare the
performance of two different object stores: Platypus and SHORE. The use of DOEF
exposed the poor swapping performance of Platypus.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 09:10:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zhen",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0704.3501 | Jerome Darmont | J\'er\^ome Darmont (ERIC), Fadila Bentayeb (ERIC), Omar Boussa\"id
(ERIC) | Conception d'un banc d'essais d\'ecisionnel | 20 pages | 20\`emes Journ\'ees Bases de Donn\'ees Avanc\'ees (BDA 04),
Montpellier (19/10/2004) 493-511 | null | null | cs.DB | null | We present in this paper a new benchmark for evaluating the performances of
data warehouses. Benchmarking is useful either to system users for comparing
the performances of different systems, or to system engineers for testing the
effect of various design choices. While the TPC (Transaction Processing
Performance Council) standard benchmarks address the first point, they are not
tuneable enough to address the second one. Our Data Warehouse Engineering
Benchmark (DWEB) allows to generate various ad-hoc synthetic data warehouses
and workloads. DWEB is fully parameterized. However, two levels of
parameterization keep it easy to tune. Since DWEB mainly meets engineering
benchmarking needs, it is complimentary to the TPC standard benchmarks, and not
a competitor. Finally, DWEB is implemented as a Java free software that can be
interfaced with most existing relational database management systems.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 09:13:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Darmont",
"Jérôme",
"",
"ERIC"
],
[
"Bentayeb",
"Fadila",
"",
"ERIC"
],
[
"Boussaïd",
"Omar",
"",
"ERIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0704.3504 | Berry Schoenmakers | Berry Schoenmakers, Jilles Tjoelker, Pim Tuyls and Evgeny Verbitskiy | Smooth R\'enyi Entropy of Ergodic Quantum Information Sources | 5 pages, no figures, ISIT 2007 | null | null | null | quant-ph cs.IT math.IT | null | We prove that the average smooth Renyi entropy rate will approach the entropy
rate of a stationary, ergodic information source, which is equal to the Shannon
entropy rate for a classical information source and the von Neumann entropy
rate for a quantum information source.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 09:28:58 GMT"
}
] | 2018-02-13T00:00:00 | [
[
"Schoenmakers",
"Berry",
""
],
[
"Tjoelker",
"Jilles",
""
],
[
"Tuyls",
"Pim",
""
],
[
"Verbitskiy",
"Evgeny",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3515 | Jegor Uglov Mr | J. Uglov, V. Schetinin, C. Maple | Comparing Robustness of Pairwise and Multiclass Neural-Network Systems
for Face Recognition | null | null | 10.1155/2008/468693 | null | cs.AI | null | Noise, corruptions and variations in face images can seriously hurt the
performance of face recognition systems. To make such systems robust,
multiclass neuralnetwork classifiers capable of learning from noisy data have
been suggested. However on large face data sets such systems cannot provide the
robustness at a high level. In this paper we explore a pairwise neural-network
system as an alternative approach to improving the robustness of face
recognition. In our experiments this approach is shown to outperform the
multiclass neural-network system in terms of the predictive accuracy on the
face images corrupted by noise.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 11:29:19 GMT"
}
] | 2016-02-17T00:00:00 | [
[
"Uglov",
"J.",
""
],
[
"Schetinin",
"V.",
""
],
[
"Maple",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0704.3520 | Jerome Darmont | Kamel Aouiche (ERIC), J\'er\^ome Darmont (ERIC) | Vers l'auto-administration des entrep\^ots de donn\'ees | Version courte de 4 pages | XXXV\`emes Journ\'ees de Statistique, Session sp\'eciale
Entreposage et Fouille de Donn\'ees, Lyon (02/06/2003) 105-108 | null | null | cs.DB | null | With the wide development of databases in general and data warehouses in
particular, it is important to reduce the tasks that a database administrator
must perform manually. The idea of using data mining techniques to extract
useful knowledge for administration from the data themselves has existed for
some years. However, little research has been achieved. The aim of this study
is to search for a way of extracting useful knowledge from stored data to
automatically apply performance optimization techniques, and more particularly
indexing techniques. We have designed a tool that extracts frequent itemsets
from a given workload to compute an index configuration that helps optimizing
data access time. The experiments we performed showed that the index
configurations generated by our tool allowed performance gains of 15% to 25% on
a test database and a test data warehouse.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 11:47:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aouiche",
"Kamel",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0704.3536 | Carlos Galindo | C. Galindo and F.Monserrat | $\delta$-sequences and Evaluation Codes defined by Plane Valuations at
Infinity | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the concept of $\delta$-sequence. A $\delta$-sequence $\Delta$
generates a well-ordered semigroup $S$ in $\mathbb{Z}^2$ or $\mathbb{R}$. We
show how to construct (and compute parameters) for the dual code of any
evaluation code associated with a weight function defined by $\Delta$ from the
polynomial ring in two indeterminates to a semigroup $S$ as above. We prove
that this is a simple procedure which can be understood by considering a
particular class of valuations of function fields of surfaces, called plane
valuations at infinity. We also give algorithms to construct an unlimited
number of $\delta$-sequences of the different existing types, and so this paper
provides the tools to know and use a new large set of codes.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 13:18:53 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2008 09:17:57 GMT"
}
] | 2008-07-14T00:00:00 | [
[
"Galindo",
"C.",
""
],
[
"Monserrat",
"F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3573 | Andrea Maiorano | F. Belletti, M. Cotallo, A. Cruz, L. A. Fern\'andez, A. Gordillo, A.
Maiorano, F. Mantovani, E. Marinari, V. Mart\'in-Mayor, A. Mu\~noz-Sudupe, D.
Navarro, S. P\'erez-Gaviro, J. J. Ruiz-Lorenzo, S. F. Schifano, D. Sciretti,
A. Taranc\'on, R. Tripiccione, J. L. Velasco | Simulating spin systems on IANUS, an FPGA-based computer | 19 pages, 8 figures; submitted to Computer Physics Communications | Computer Physics Communications, 178 (3), p.208-216, (2008) | 10.1016/j.cpc.2007.09.006 | null | cond-mat.dis-nn cs.AR | null | We describe the hardwired implementation of algorithms for Monte Carlo
simulations of a large class of spin models. We have implemented these
algorithms as VHDL codes and we have mapped them onto a dedicated processor
based on a large FPGA device. The measured performance on one such processor is
comparable to O(100) carefully programmed high-end PCs: it turns out to be even
better for some selected spin models. We describe here codes that we are
currently executing on the IANUS massively parallel FPGA-based system.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 15:49:47 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Belletti",
"F.",
""
],
[
"Cotallo",
"M.",
""
],
[
"Cruz",
"A.",
""
],
[
"Fernández",
"L. A.",
""
],
[
"Gordillo",
"A.",
""
],
[
"Maiorano",
"A.",
""
],
[
"Mantovani",
"F.",
""
],
[
"Marinari",
"E.",
""
],
[
"Martín-Mayor",
"V.",
""
],
[
"Muñoz-Sudupe",
"A.",
""
],
[
"Navarro",
"D.",
""
],
[
"Pérez-Gaviro",
"S.",
""
],
[
"Ruiz-Lorenzo",
"J. J.",
""
],
[
"Schifano",
"S. F.",
""
],
[
"Sciretti",
"D.",
""
],
[
"Tarancón",
"A.",
""
],
[
"Tripiccione",
"R.",
""
],
[
"Velasco",
"J. L.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0704.3588 | Cristina Comaniciu | Cristina Comaniciu and H. Vincent Poor | On Energy Efficient Hierarchical Cross-Layer Design: Joint Power Control
and Routing for Ad Hoc Networks | To appear in the EURASIP Journal on Wireless Communications and
Networking, Special Issue on Wireless Mobile Ad Hoc Networks | null | null | null | cs.IT math.IT | null | In this paper, a hierarchical cross-layer design approach is proposed to
increase energy efficiency in ad hoc networks through joint adaptation of
nodes' transmitting powers and route selection. The design maintains the
advantages of the classic OSI model, while accounting for the cross-coupling
between layers, through information sharing. The proposed joint power control
and routing algorithm is shown to increase significantly the overall energy
efficiency of the network, at the expense of a moderate increase in complexity.
Performance enhancement of the joint design using multiuser detection is also
investigated, and it is shown that the use of multiuser detection can increase
the capacity of the ad hoc network significantly for a given level of energy
consumption.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 16:33:55 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Comaniciu",
"Cristina",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3591 | Peyman Razaghi | Marko Aleksic, Peyman Razaghi, Wei Yu | Capacity of a Class of Modulo-Sum Relay Channels | To be presented in IEEE Int. Symp. on Inform. Theory (ISIT) 2007 | null | null | null | cs.IT math.IT | null | This paper characterizes the capacity of a class of modulo additive noise
relay channels, in which the relay observes a corrupted version of the noise
and has a separate channel to the destination. The capacity is shown to be
strictly below the cut-set bound in general and achievable using a
quantize-and-forward strategy at the relay. This result confirms a conjecture
by Ahlswede and Han about the capacity of channels with rate limited state
information at the destination for this particular class of channels.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 17:13:17 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Aleksic",
"Marko",
""
],
[
"Razaghi",
"Peyman",
""
],
[
"Yu",
"Wei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3635 | Fulufhelo Vincent Nelwamondo | Fulufhelo Vincent Nelwamondo and Tshilidzi Marwala | Rough Sets Computations to Impute Missing Data | 19 pages | null | null | null | cs.CV cs.IR | null | Many techniques for handling missing data have been proposed in the
literature. Most of these techniques are overly complex. This paper explores an
imputation technique based on rough set computations. In this paper,
characteristic relations are introduced to describe incompletely specified
decision tables.It is shown that the basic rough set idea of lower and upper
approximations for incompletely specified decision tables may be defined in a
variety of different ways. Empirical results obtained using real data are given
and they provide a valuable and promising insight to the problem of missing
data. Missing data were predicted with an accuracy of up to 99%.
| [
{
"version": "v1",
"created": "Thu, 26 Apr 2007 22:22:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nelwamondo",
"Fulufhelo Vincent",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0704.3643 | Allison Woodruff | Allison Woodruff, Sally Augustin, and Brooke Foucault | Sabbath Day Home Automation: "It's Like Mixing Technology and Religion" | null | null | null | null | cs.HC | null | We present a qualitative study of 20 American Orthodox Jewish families' use
of home automation for religious purposes. These lead users offer insight into
real-life, long-term experience with home automation technologies. We discuss
how automation was seen by participants to contribute to spiritual experience
and how participants oriented to the use of automation as a religious custom.
We also discuss the relationship of home automation to family life. We draw
design implications for the broader population, including surrender of control
as a design resource, home technologies that support long-term goals and
lifestyle choices, and respite from technology.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 00:42:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Augustin",
"Sally",
""
],
[
"Foucault",
"Brooke",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0704.3644 | Chris Ng | Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith, Urbashi Mitra | Capacity Gain from Two-Transmitter and Two-Receiver Cooperation | Accepted for publication in IEEE Transactions on Information Theory | null | 10.1109/TIT.2007.904987 | null | cs.IT math.IT | null | Capacity improvement from transmitter and receiver cooperation is
investigated in a two-transmitter, two-receiver network with phase fading and
full channel state information available at all terminals. The transmitters
cooperate by first exchanging messages over an orthogonal transmitter
cooperation channel, then encoding jointly with dirty paper coding. The
receivers cooperate by using Wyner-Ziv compress-and-forward over an analogous
orthogonal receiver cooperation channel. To account for the cost of
cooperation, the allocation of network power and bandwidth among the data and
cooperation channels is studied. It is shown that transmitter cooperation
outperforms receiver cooperation and improves capacity over non-cooperative
transmission under most operating conditions when the cooperation channel is
strong. However, a weak cooperation channel limits the transmitter cooperation
rate; in this case receiver cooperation is more advantageous.
Transmitter-and-receiver cooperation offers sizable additional capacity gain
over transmitter-only cooperation at low SNR, whereas at high SNR transmitter
cooperation alone captures most of the cooperative capacity improvement.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 00:52:11 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Ng",
"Chris T. K.",
""
],
[
"Jindal",
"Nihar",
""
],
[
"Goldsmith",
"Andrea J.",
""
],
[
"Mitra",
"Urbashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3646 | Joseph Y. Halpern | Ittai Abraham, Danny Dolev, and Joseph Y. Halpern | Lower Bounds on Implementing Robust and Resilient Mediators | null | null | null | null | cs.GT cs.CR cs.DC | null | We consider games that have (k,t)-robust equilibria when played with a
mediator, where an equilibrium is (k,t)-robust if it tolerates deviations by
coalitions of size up to k and deviations by up to $t$ players with unknown
utilities. We prove lower bounds that match upper bounds on the ability to
implement such mediators using cheap talk (that is, just allowing communication
among the players). The bounds depend on (a) the relationship between k, t, and
n, the total number of players in the system; (b) whether players know the
exact utilities of other players; (c) whether there are broadcast channels or
just point-to-point channels; (d) whether cryptography is available; and (e)
whether the game has a $k+t)-punishment strategy; that is, a strategy that, if
used by all but at most $k+t$ players, guarantees that every player gets a
worse outcome than they do with the equilibrium strategy.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 01:32:15 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 22:17:40 GMT"
}
] | 2007-12-07T00:00:00 | [
[
"Abraham",
"Ittai",
""
],
[
"Dolev",
"Danny",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0704.3647 | Catherine Marshall | Catherine C. Marshall, Frank McCown, and Michael L. Nelson | Evaluating Personal Archiving Strategies for Internet-based Information | 6 pages, 2 tables, to be published in the Proceedings of IS&T
Archiving 2007, May 21-24 2007, Arlington, Virginia, USA | null | null | null | cs.DL cs.CY cs.HC | null | Internet-based personal digital belongings present different vulnerabilities
than locally stored materials. We use responses to a survey of people who have
recovered lost websites, in combination with supplementary interviews, to paint
a fuller picture of current curatorial strategies and practices. We examine the
types of personal, topical, and commercial websites that respondents have lost
and the reasons they have lost this potentially valuable material. We further
explore what they have tried to recover and how the loss influences their
subsequent practices. We found that curation of personal digital materials in
online stores bears some striking similarities to the curation of similar
materials stored locally in that study participants continue to archive
personal assets by relying on a combination of benign neglect, sporadic
backups, and unsystematic file replication. However, we have also identified
issues specific to Internet-based material: how risk is spread by distributing
the files among multiple servers and services; the circular reasoning
participants use when they discuss the safety of their digital assets; and the
types of online material that are particularly vulnerable to loss. The study
reveals ways in which expectations of permanence and notification are violated
and situations in which benign neglect has far greater consequences for the
long-term fate of important digital assets.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 01:38:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marshall",
"Catherine C.",
""
],
[
"McCown",
"Frank",
""
],
[
"Nelson",
"Michael L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0704.3653 | Catherine Marshall | Catherine C. Marshall, Sara Bly, and Francoise Brun-Cottan | The Long Term Fate of Our Digital Belongings: Toward a Service Model for
Personal Archives | 6 pages, published in the Proceedings of IS&T Archiving 2006,
(Ottawa, Canada, May 23-26, 2006), Society for Imaging Science and
Technology, Springfield, VA, 2006, pp. 25-30 | null | null | null | cs.DL cs.CY cs.HC | null | We conducted a preliminary field study to understand the current state of
personal digital archiving in practice. Our aim is to design a service for the
long-term storage, preservation, and access of digital belongings by examining
how personal archiving needs intersect with existing and emerging archiving
technologies, best practices, and policies. Our findings not only confirmed
that experienced home computer users are creating, receiving, and finding an
increasing number of digital belongings, but also that they have already lost
irreplaceable digital artifacts such as photos, creative efforts, and records.
Although participants reported strategies such as backup and file replication
for digital safekeeping, they were seldom able to implement them consistently.
Four central archiving themes emerged from the data: (1) people find it
difficult to evaluate the worth of accumulated materials; (2) personal storage
is highly distributed both on- and offline; (3) people are experiencing
magnified curatorial problems associated with managing files in the aggregate,
creating appropriate metadata, and migrating materials to maintainable formats;
and (4) facilities for long-term access are not supported by the current
desktop metaphor. Four environmental factors further complicate archiving in
consumer settings: the pervasive influence of malware; consumer reliance on ad
hoc IT providers; an accretion of minor system and registry inconsistencies;
and strong consumer beliefs about the incorruptibility of digital forms, the
reliability of digital technologies, and the social vulnerability of networked
storage.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 02:35:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marshall",
"Catherine C.",
""
],
[
"Bly",
"Sara",
""
],
[
"Brun-Cottan",
"Francoise",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0704.3662 | Tian-Jian Jiang | Mike Tian-Jian Jiang, James Zhan, Jaimie Lin, Jerry Lin, Wen-Lien Hsu | An Automated Evaluation Metric for Chinese Text Entry | 8 pages | Jiang, Mike Tian-Jian, et al. "Robustness analysis of adaptive
chinese input methods." Advances in Text Input Methods (WTIM 2011) (2011): 53 | null | null | cs.HC cs.CL | null | In this paper, we propose an automated evaluation metric for text entry. We
also consider possible improvements to existing text entry evaluation metrics,
such as the minimum string distance error rate, keystrokes per character, cost
per correction, and a unified approach proposed by MacKenzie, so they can
accommodate the special characteristics of Chinese text. Current methods lack
an integrated concern about both typing speed and accuracy for Chinese text
entry evaluation. Our goal is to remove the bias that arises due to human
factors. First, we propose a new metric, called the correction penalty (P),
based on Fitts' law and Hick's law. Next, we transform it into the approximate
amortized cost (AAC) of information theory. An analysis of the AAC of Chinese
text input methods with different context lengths is also presented.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 05:34:10 GMT"
}
] | 2013-10-29T00:00:00 | [
[
"Jiang",
"Mike Tian-Jian",
""
],
[
"Zhan",
"James",
""
],
[
"Lin",
"Jaimie",
""
],
[
"Lin",
"Jerry",
""
],
[
"Hsu",
"Wen-Lien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0704.3665 | Tian-Jian Jiang | Mike Tian-Jian Jiang, Deng Liu, Meng-Juei Hsieh, Wen-Lien Hsu | On the Development of Text Input Method - Lessons Learned | 10 pages | null | null | null | cs.CL cs.HC | null | Intelligent Input Methods (IM) are essential for making text entries in many
East Asian scripts, but their application to other languages has not been fully
explored. This paper discusses how such tools can contribute to the development
of computer processing of other oriental languages. We propose a design
philosophy that regards IM as a text service platform, and treats the study of
IM as a cross disciplinary subject from the perspectives of software
engineering, human-computer interaction (HCI), and natural language processing
(NLP). We discuss these three perspectives and indicate a number of possible
future research directions.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 05:58:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jiang",
"Mike Tian-Jian",
""
],
[
"Liu",
"Deng",
""
],
[
"Hsieh",
"Meng-Juei",
""
],
[
"Hsu",
"Wen-Lien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0704.3674 | Wolfgang Steiner | Shigeki Akiyama, Horst Brunotte, Attila Petho, Wolfgang Steiner
(LIAFA) | Periodicity of certain piecewise affine planar maps | null | Tsukuba Journal of Mathematics 32, 1 (2008) 197-251 | null | null | math.DS cs.DM math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We determine periodic and aperiodic points of certain piecewise affine maps
in the Euclidean plane. Using these maps, we prove for
$\lambda\in\{\frac{\pm1\pm\sqrt5}2,\pm\sqrt2,\pm\sqrt3\}$ that all integer
sequences $(a_k)_{k\in\mathbb Z}$ satisfying $0\le a_{k-1}+\lambda
a_k+a_{k+1}<1$ are periodic.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 12:07:24 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 09:24:43 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Sep 2008 11:43:27 GMT"
}
] | 2008-09-16T00:00:00 | [
[
"Akiyama",
"Shigeki",
"",
"LIAFA"
],
[
"Brunotte",
"Horst",
"",
"LIAFA"
],
[
"Petho",
"Attila",
"",
"LIAFA"
],
[
"Steiner",
"Wolfgang",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0704.3683 | Mark Jerrum | Martin Dyer, Leslie Ann Goldberg and Mark Jerrum | The Complexity of Weighted Boolean #CSP | Minor revision | SIAM J. Comput. 38(5), 1970-1986 | 10.1137/070690201 | null | cs.CC math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper gives a dichotomy theorem for the complexity of computing the
partition function of an instance of a weighted Boolean constraint satisfaction
problem. The problem is parameterised by a finite set F of non-negative
functions that may be used to assign weights to the configurations (feasible
solutions) of a problem instance. Classical constraint satisfaction problems
correspond to the special case of 0,1-valued functions. We show that the
partition function, i.e. the sum of the weights of all configurations, can be
computed in polynomial time if either (1) every function in F is of ``product
type'', or (2) every function in F is ``pure affine''. For every other fixed
set F, computing the partition function is FP^{#P}-complete.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 13:19:32 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jun 2008 08:00:54 GMT"
}
] | 2009-02-23T00:00:00 | [
[
"Dyer",
"Martin",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0704.3708 | Bernat Corominas-Murtra BCM | Bernat Corominas-Murtra | Network statistics on early English Syntax: Structural criteria | New abstract. Due to a mistake, abstract from V1 was from an old,
draft version of the work. The content of the paper is exactly the same,
except on section "measures" where a new cite has been added. 28 pag | null | null | null | cs.CL | null | This paper includes a reflection on the role of networks in the study of
English language acquisition, as well as a collection of practical criteria to
annotate free-speech corpora from children utterances. At the theoretical
level, the main claim of this paper is that syntactic networks should be
interpreted as the outcome of the use of the syntactic machinery. Thus, the
intrinsic features of such machinery are not accessible directly from (known)
network properties. Rather, what one can see are the global patterns of its use
and, thus, a global view of the power and organization of the underlying
grammar. Taking a look into more practical issues, the paper examines how to
build a net from the projection of syntactic relations. Recall that, as opposed
to adult grammars, early-child language has not a well-defined concept of
structure. To overcome such difficulty, we develop a set of systematic criteria
assuming constituency hierarchy and a grammar based on lexico-thematic
relations. At the end, what we obtain is a well defined corpora annotation that
enables us i) to perform statistics on the size of structures and ii) to build
a network from syntactic relations over which we can perform the standard
measures of complexity. We also provide a detailed example.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 17:13:37 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Apr 2007 10:06:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Corominas-Murtra",
"Bernat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0704.3746 | Yufang Xi | Yufang Xi, Edmund M. Yeh | Distributed Algorithms for Spectrum Allocation, Power Control, Routing,
and Congestion Control in Wireless Networks | 14 pages, 5 figures, submitted to IEEE/ACM Transactions on Networking | null | 10.1145/1288107.1288132 | null | cs.NI | null | We develop distributed algorithms to allocate resources in multi-hop wireless
networks with the aim of minimizing total cost. In order to observe the
fundamental duplexing constraint that co-located transmitters and receivers
cannot operate simultaneously on the same frequency band, we first devise a
spectrum allocation scheme that divides the whole spectrum into multiple
sub-bands and activates conflict-free links on each sub-band. We show that the
minimum number of required sub-bands grows asymptotically at a logarithmic rate
with the chromatic number of network connectivity graph. A simple distributed
and asynchronous algorithm is developed to feasibly activate links on the
available sub-bands. Given a feasible spectrum allocation, we then design
node-based distributed algorithms for optimally controlling the transmission
powers on active links for each sub-band, jointly with traffic routes and user
input rates in response to channel states and traffic demands. We show that
under specified conditions, the algorithms asymptotically converge to the
optimal operating point.
| [
{
"version": "v1",
"created": "Fri, 27 Apr 2007 20:43:30 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Xi",
"Yufang",
""
],
[
"Yeh",
"Edmund M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0704.3773 | Sam Tannous | Sam Tannous | Avoiding Rotated Bitboards with Direct Lookup | 7 pages, 1 figure, 4 listings; replaced test positions, fixed typos | ICGA Journal, Vol. 30, No. 2, pp. 85-91. (June 2007). | null | null | cs.DS | null | This paper describes an approach for obtaining direct access to the attacked
squares of sliding pieces without resorting to rotated bitboards. The technique
involves creating four hash tables using the built in hash arrays from an
interpreted, high level language. The rank, file, and diagonal occupancy are
first isolated by masking the desired portion of the board. The attacked
squares are then directly retrieved from the hash tables. Maintaining
incrementally updated rotated bitboards becomes unnecessary as does all the
updating, mapping and shifting required to access the attacked squares.
Finally, rotated bitboard move generation speed is compared with that of the
direct hash table lookup method.
| [
{
"version": "v1",
"created": "Sat, 28 Apr 2007 03:11:59 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jul 2007 19:23:39 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Tannous",
"Sam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0704.3780 | Jean-Philippe Rennard | Pierre Collet, Jean-Philippe Rennard | Stochastic Optimization Algorithms | 16 pages, 4 figures, 2 tables | Rennard, J.-P., Handbook of Research on Nature Inspired Computing
for Economics and Management, IGR, 2006 | null | null | cs.NE | null | When looking for a solution, deterministic methods have the enormous
advantage that they do find global optima. Unfortunately, they are very
CPU-intensive, and are useless on untractable NP-hard problems that would
require thousands of years for cutting-edge computers to explore. In order to
get a result, one needs to revert to stochastic algorithms, that sample the
search space without exploring it thoroughly. Such algorithms can find very
good results, without any guarantee that the global optimum has been reached;
but there is often no other choice than using them. This chapter is a short
introduction to the main methods used in stochastic optimization.
| [
{
"version": "v1",
"created": "Sat, 28 Apr 2007 06:52:19 GMT"
}
] | 2011-12-20T00:00:00 | [
[
"Collet",
"Pierre",
""
],
[
"Rennard",
"Jean-Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0704.3835 | K. Y. Michael Wong | K. Y. Michael Wong and David Saad | Minimizing Unsatisfaction in Colourful Neighbourhoods | 28 pages, 12 figures, substantially revised with additional
explanation | J. Phys. A: Math. Theor. 41, 324023 (2008). | 10.1088/1751-8113/41/32/324023 | null | cs.DS cond-mat.dis-nn cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Colouring sparse graphs under various restrictions is a theoretical problem
of significant practical relevance. Here we consider the problem of maximizing
the number of different colours available at the nodes and their
neighbourhoods, given a predetermined number of colours. In the analytical
framework of a tree approximation, carried out at both zero and finite
temperatures, solutions obtained by population dynamics give rise to estimates
of the threshold connectivity for the incomplete to complete transition, which
are consistent with those of existing algorithms. The nature of the transition
as well as the validity of the tree approximation are investigated.
| [
{
"version": "v1",
"created": "Sun, 29 Apr 2007 10:03:00 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Dec 2007 04:18:58 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Jul 2008 17:43:32 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Wong",
"K. Y. Michael",
""
],
[
"Saad",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0704.3878 | Farhad Meshkati | Farhad Meshkati, Andrea J. Goldsmith, H. Vincent Poor and Stuart C.
Schwartz | A Game-Theoretic Approach to Energy-Efficient Modulation in CDMA
Networks with Delay Constraints | Appeared in the Proceedings of the 2007 IEEE Radio and Wireless
Symposium, Long Beach, CA, January 9-11, 2007 | null | 10.1109/RWS.2007.351784 | null | cs.IT cs.GT math.IT | null | A game-theoretic framework is used to study the effect of constellation size
on the energy efficiency of wireless networks for M-QAM modulation. A
non-cooperative game is proposed in which each user seeks to choose its
transmit power (and possibly transmit symbol rate) as well as the constellation
size in order to maximize its own utility while satisfying its delay
quality-of-service (QoS) constraint. The utility function used here measures
the number of reliable bits transmitted per joule of energy consumed, and is
particularly suitable for energy-constrained networks. The best-response
strategies and Nash equilibrium solution for the proposed game are derived. It
is shown that in order to maximize its utility (in bits per joule), a user must
choose the lowest constellation size that can accommodate the user's delay
constraint. Using this framework, the tradeoffs among energy efficiency, delay,
throughput and constellation size are also studied and quantified. The effect
of trellis-coded modulation on energy efficiency is also discussed.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 06:33:05 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Meshkati",
"Farhad",
""
],
[
"Goldsmith",
"Andrea J.",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Schwartz",
"Stuart C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3880 | Farhad Meshkati | Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz and Radu V. Balan | Energy-Efficient Resource Allocation in Wireless Networks with
Quality-of-Service Constraints | Accpeted for publication in the IEEE Transactions on Communications | null | 10.1109/TCOMM.2009.11.050638 | null | cs.IT math.IT | null | A game-theoretic model is proposed to study the cross-layer problem of joint
power and rate control with quality of service (QoS) constraints in
multiple-access networks. In the proposed game, each user seeks to choose its
transmit power and rate in a distributed manner in order to maximize its own
utility while satisfying its QoS requirements. The user's QoS constraints are
specified in terms of the average source rate and an upper bound on the average
delay where the delay includes both transmission and queuing delays. The
utility function considered here measures energy efficiency and is particularly
suitable for wireless networks with energy constraints. The Nash equilibrium
solution for the proposed non-cooperative game is derived and a closed-form
expression for the utility achieved at equilibrium is obtained. It is shown
that the QoS requirements of a user translate into a "size" for the user which
is an indication of the amount of network resources consumed by the user. Using
this competitive multiuser framework, the tradeoffs among throughput, delay,
network capacity and energy efficiency are studied. In addition, analytical
expressions are given for users' delay profiles and the delay performance of
the users at Nash equilibrium is quantified.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 06:43:21 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Meshkati",
"Farhad",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Schwartz",
"Stuart C.",
""
],
[
"Balan",
"Radu V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3881 | Farhad Meshkati | Farhad Meshkati, Dongning Guo, H. Vincent Poor and Stuart C. Schwartz | A Unified Approach to Energy-Efficient Power Control in Large CDMA
Systems | Accepted for publication in the IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | null | A unified approach to energy-efficient power control is proposed for
code-division multiple access (CDMA) networks. The approach is applicable to a
large family of multiuser receivers including the matched filter, the
decorrelator, the linear minimum mean-square error (MMSE) receiver, and the
(nonlinear) optimal detectors. It exploits the linear relationship that has
been shown to exist between the transmit power and the output
signal-to-interference-plus-noise ratio (SIR) in the large-system limit. It is
shown that, for this family of receivers, when users seek to selfishly maximize
their own energy efficiency, the Nash equilibrium is SIR-balanced. In addition,
a unified power control (UPC) algorithm for reaching the Nash equilibrium is
proposed. The algorithm adjusts the user's transmit powers by iteratively
computing the large-system multiuser efficiency, which is independent of
instantaneous spreading sequences. The convergence of the algorithm is proved
for the matched filter, the decorrelator, and the MMSE receiver, and is
demonstrated by means of simulation for an optimal detector. Moreover, the
performance of the algorithm in finite-size systems is studied and compared
with that of a conventional power control scheme, in which user powers depend
on the instantaneous spreading sequences.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 06:52:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Meshkati",
"Farhad",
""
],
[
"Guo",
"Dongning",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Schwartz",
"Stuart C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0704.3886 | W Saba | Walid S. Saba | A Note on Ontology and Ordinary Language | 19 pages, 1 figure | null | null | null | cs.AI cs.CL | null | We argue for a compositional semantics grounded in a strongly typed ontology
that reflects our commonsense view of the world and the way we talk about it.
Assuming such a structure we show that the semantics of various natural
language phenomena may become nearly trivial.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 17:55:39 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 13:43:32 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 18:13:22 GMT"
},
{
"version": "v4",
"created": "Thu, 3 May 2007 08:34:47 GMT"
},
{
"version": "v5",
"created": "Fri, 4 May 2007 17:49:03 GMT"
},
{
"version": "v6",
"created": "Mon, 7 May 2007 16:04:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Saba",
"Walid S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0704.3890 | Valmir Barbosa | Rodolfo M. Pussente, Valmir C. Barbosa | An algorithm for clock synchronization with the gradient property in
sensor networks | null | Journal of Parallel and Distributed Computing 69 (2009), 261-265 | 10.1016/j.jpdc.2008.11.001 | null | cs.DC | null | We introduce a distributed algorithm for clock synchronization in sensor
networks. Our algorithm assumes that nodes in the network only know their
immediate neighborhoods and an upper bound on the network's diameter.
Clock-synchronization messages are only sent as part of the communication,
assumed reasonably frequent, that already takes place among nodes. The
algorithm has the gradient property of [2], achieving an O(1) worst-case skew
between the logical clocks of neighbors. As in the case of [3,8], the
algorithm's actions are such that no constant lower bound exists on the rate at
which logical clocks progress in time, and for this reason the lower bound of
[2,5] that forbids constant skew between neighbors does not apply.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 19:59:14 GMT"
}
] | 2009-02-05T00:00:00 | [
[
"Pussente",
"Rodolfo M.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0704.3904 | Fabien Mathieu | Anh-Tuan Gai (INRIA Rocquencourt), Dmitry Lebedev (FT R&D), Fabien
Mathieu (FT R&D), Fabien De Montgolfier (LIAFA), Julien Reynier (LIENS),
Laurent Viennot (INRIA Rocquencourt) | Acyclic Preference Systems in P2P Networks | null | null | null | null | cs.DS cs.GT | null | In this work we study preference systems natural for the Peer-to-Peer
paradigm. Most of them fall in three categories: global, symmetric and
complementary. All these systems share an acyclicity property. As a
consequence, they admit a stable (or Pareto efficient) configuration, where no
participant can collaborate with better partners than their current ones. We
analyze the representation of the such preference systems and show that any
acyclic system can be represented with a symmetric mark matrix. This gives a
method to merge acyclic preference systems and retain the acyclicity. We also
consider such properties of the corresponding collaboration graph, as
clustering coefficient and diameter. In particular, studying the example of
preferences based on real latency measurements, we observe that its stable
configuration is a small-world graph.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 09:26:39 GMT"
},
{
"version": "v2",
"created": "Wed, 2 May 2007 13:07:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gai",
"Anh-Tuan",
"",
"INRIA Rocquencourt"
],
[
"Lebedev",
"Dmitry",
"",
"FT R&D"
],
[
"Mathieu",
"Fabien",
"",
"FT R&D"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
],
[
"Reynier",
"Julien",
"",
"LIENS"
],
[
"Viennot",
"Laurent",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0704.3905 | Marc Schoenauer | Christian Gagn\'e (INFORMATIQUE WGZ INC.), Mich\`ele Sebag (INRIA
Futurs), Marc Schoenauer (INRIA Futurs), Marco Tomassini (ISI) | Ensemble Learning for Free with Evolutionary Algorithms ? | null | Dans GECCO (2007) | null | null | cs.AI | null | Evolutionary Learning proceeds by evolving a population of classifiers, from
which it generally returns (with some notable exceptions) the single
best-of-run classifier as final result. In the meanwhile, Ensemble Learning,
one of the most efficient approaches in supervised Machine Learning for the
last decade, proceeds by building a population of diverse classifiers. Ensemble
Learning with Evolutionary Computation thus receives increasing attention. The
Evolutionary Ensemble Learning (EEL) approach presented in this paper features
two contributions. First, a new fitness function, inspired by co-evolution and
enforcing the classifier diversity, is presented. Further, a new selection
criterion based on the classification margin is proposed. This criterion is
used to extract the classifier ensemble from the final population only
(Off-line) or incrementally along evolution (On-line). Experiments on a set of
benchmark problems show that Off-line outperforms single-hypothesis
evolutionary learning and state-of-art Boosting and generates smaller
classifier ensembles.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 09:29:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gagné",
"Christian",
"",
"INFORMATIQUE WGZ INC."
],
[
"Sebag",
"Michèle",
"",
"INRIA\n Futurs"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
],
[
"Tomassini",
"Marco",
"",
"ISI"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0704.3931 | Martin Lange | Roland Axelsson, Martin Lange, and Rafal Somla | The Complexity of Model Checking Higher-Order Fixpoint Logic | 33 pages, 2 figures, to be published in Logical Methods in Computer
Science | Logical Methods in Computer Science, Volume 3, Issue 2 (June 29,
2007) lmcs:754 | 10.2168/LMCS-3(2:7)2007 | null | cs.LO | null | Higher-Order Fixpoint Logic (HFL) is a hybrid of the simply typed
\lambda-calculus and the modal \lambda-calculus. This makes it a highly
expressive temporal logic that is capable of expressing various interesting
correctness properties of programs that are not expressible in the modal
\lambda-calculus.
This paper provides complexity results for its model checking problem. In
particular we consider those fragments of HFL built by using only types of
bounded order k and arity m. We establish k-fold exponential time completeness
for model checking each such fragment. For the upper bound we use fixpoint
elimination to obtain reachability games that are singly-exponential in the
size of the formula and k-fold exponential in the size of the underlying
transition system. These games can be solved in deterministic linear time. As a
simple consequence, we obtain an exponential time upper bound on the expression
complexity of each such fragment.
The lower bound is established by a reduction from the word problem for
alternating (k-1)-fold exponential space bounded Turing Machines. Since there
are fixed machines of that type whose word problems are already hard with
respect to k-fold exponential time, we obtain, as a corollary, k-fold
exponential time completeness for the data complexity of our fragments of HFL,
provided m exceeds 3. This also yields a hierarchy result in expressive power.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 13:09:20 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jun 2007 12:15:42 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Axelsson",
"Roland",
""
],
[
"Lange",
"Martin",
""
],
[
"Somla",
"Rafal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0704.3969 | Jean-Claude Belfiore | Sheng Yang and Jean-Claude Belfiore | Diversity of MIMO Multihop Relay Channels - Part I: Amplify-and-Forward | 37 pages, 15 figures. submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | In this two-part paper, we consider the multiantenna multihop relay channels
in which the source signal arrives at the destination through N independent
relaying hops in series. The main concern of this work is to design relaying
strategies that utilize efficiently the relays in such a way that the diversity
is maximized. In part I, we focus on the amplify-and-forward (AF) strategy with
which the relays simply scale the received signal and retransmit it. More
specifically, we characterize the diversity-multiplexing tradeoff (DMT) of the
AF scheme in a general multihop channel with arbitrary number of antennas and
arbitrary number of hops. The DMT is in closed-form expression as a function of
the number of antennas at each node. First, we provide some basic results on
the DMT of the general Rayleigh product channels. It turns out that these
results have very simple and intuitive interpretation. Then, the results are
applied to the AF multihop channels which is shown to be equivalent to the
Rayleigh product channel, in the DMT sense. Finally, the project-and-forward
(PF) scheme, a variant of the AF scheme, is proposed. We show that the PF
scheme has the same DMT as the AF scheme, while the PF can have significant
power gain over the AF scheme in some cases. In part II, we will derive the
upper bound on the diversity of the multihop channels and show that it can be
achieved by partitioning the multihop channel into AF subchannels.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 16:28:51 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Yang",
"Sheng",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0010 | Sergey Dorogovtsev | S. N. Dorogovtsev, A. V. Goltsev, J. F. F. Mendes | Critical phenomena in complex networks | Review article, 79 pages, 43 figures, 1 table, 508 references,
extended | Rev. Mod. Phys. 80, 1275 (2008) | 10.1103/RevModPhys.80.1275 | null | cond-mat.stat-mech cs.NI math-ph math.MP physics.soc-ph | null | The combination of the compactness of networks, featuring small diameters,
and their complex architectures results in a variety of critical effects
dramatically different from those in cooperative systems on lattices. In the
last few years, researchers have made important steps toward understanding the
qualitatively new critical phenomena in complex networks. We review the
results, concepts, and methods of this rapidly developing field. Here we mostly
consider two closely related classes of these critical phenomena, namely
structural phase transitions in the network architectures and transitions in
cooperative models on networks as substrates. We also discuss systems where a
network and interacting agents on it influence each other. We overview a wide
range of critical phenomena in equilibrium and growing networks including the
birth of the giant connected component, percolation, k-core percolation,
phenomena near epidemic thresholds, condensation transitions, critical
phenomena in spin models placed on networks, synchronization, and
self-organized criticality effects in interacting systems on networks. We also
discuss strong finite size effects in these systems and highlight open problems
and perspectives.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 20:21:37 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 22:31:15 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Oct 2007 18:12:18 GMT"
},
{
"version": "v4",
"created": "Fri, 9 Nov 2007 16:57:31 GMT"
},
{
"version": "v5",
"created": "Tue, 13 Nov 2007 20:57:23 GMT"
},
{
"version": "v6",
"created": "Fri, 16 Nov 2007 21:46:13 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dorogovtsev",
"S. N.",
""
],
[
"Goltsev",
"A. V.",
""
],
[
"Mendes",
"J. F. F.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0705.0017 | George Viamontes Ph.D. | George F. Viamontes, Igor L. Markov, John P. Hayes | Checking Equivalence of Quantum Circuits and States | 9 pages, 13 figures, 3 tables | Proc. Int'l Conf. on Computer-Aided Design (ICCAD), pp. 69-74, San
Jose, CA, November 2007. | null | null | quant-ph cs.ET | null | Quantum computing promises exponential speed-ups for important simulation and
optimization problems. It also poses new CAD problems that are similar to, but
more challenging, than the related problems in classical (non-quantum) CAD,
such as determining if two states or circuits are functionally equivalent.
While differences in classical states are easy to detect, quantum states, which
are represented by complex-valued vectors, exhibit subtle differences leading
to several notions of equivalence. This provides flexibility in optimizing
quantum circuits, but leads to difficult new equivalence-checking issues for
simulation and synthesis. We identify several different equivalence-checking
problems and present algorithms for practical benchmarks, including quantum
communication and search circuits, which are shown to be very fast and robust
for hundreds of qubits.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 16:31:12 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 20:48:43 GMT"
}
] | 2011-11-04T00:00:00 | [
[
"Viamontes",
"George F.",
""
],
[
"Markov",
"Igor L.",
""
],
[
"Hayes",
"John P.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.ET",
"description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.",
"span": "(Emerging Technologies)"
}
] |
0705.0025 | Andreas Martin Lisewski | Andreas Martin Lisewski | Can the Internet cope with stress? | 4 pages | null | null | null | cs.HC cs.AI | null | When will the Internet become aware of itself? In this note the problem is
approached by asking an alternative question: Can the Internet cope with
stress? By extrapolating the psychological difference between coping and
defense mechanisms a distributed software experiment is outlined which could
reject the hypothesis that the Internet is not a conscious entity.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 15:44:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lisewski",
"Andreas Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.0043 | Christian Goulding | Savas Dayanik, Christian Goulding, H. Vincent Poor | Joint Detection and Identification of an Unobservable Change in the
Distribution of a Random Sequence | Appeared in the Proceedings of the 41st Annual Conference on
Information Sciences and Systems, John Hopkins University, March 2007 | null | null | null | cs.IT math.IT | null | This paper examines the joint problem of detection and identification of a
sudden and unobservable change in the probability distribution function (pdf)
of a sequence of independent and identically distributed (i.i.d.) random
variables to one of finitely many alternative pdf's. The objective is quick
detection of the change and accurate inference of the ensuing pdf. Following a
Bayesian approach, a new sequential decision strategy for this problem is
revealed and is proven optimal. Geometrical properties of this strategy are
demonstrated via numerical examples.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2007 23:59:09 GMT"
}
] | 2009-04-16T00:00:00 | [
[
"Dayanik",
"Savas",
""
],
[
"Goulding",
"Christian",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0044 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari and Bane Vasic | Reliable Memories Built from Unreliable Components Based on Expander
Graphs | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | In this paper, memories built from components subject to transient faults are
considered. A fault-tolerant memory architecture based on low-density
parity-check codes is proposed and the existence of reliable memories for the
adversarial failure model is proved. The proof relies on the expansion property
of the underlying Tanner graph of the code. An equivalence between the
Taylor-Kuznetsov (TK) scheme and Gallager B algorithm is established and the
results are extended to the independent failure model. It is also shown that
the proposed memory architecture has lower redundancy compared to the TK
scheme. The results are illustrated with specific numerical examples.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 00:07:46 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Vasic",
"Bane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0081 | Yeow Meng Chee | Yeow Meng Chee, San Ling | Constructions of q-Ary Constant-Weight Codes | 12 pages | IEEE Transactions on Information Theory, Vol. 53, No. 1, January
2007, pp. 135-146 | 10.1109/TIT.2006.887499 | null | cs.IT math.IT | null | This paper introduces a new combinatorial construction for q-ary
constant-weight codes which yields several families of optimal codes and
asymptotically optimal codes. The construction reveals intimate connection
between q-ary constant-weight codes and sets of pairwise disjoint combinatorial
designs of various types.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 07:16:43 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Chee",
"Yeow Meng",
""
],
[
"Ling",
"San",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0085 | {\O}yvind Ytrehus | Angela I. Barbero Diez and Oyvind Ytrehus | An efficient centralized binary multicast network coding algorithm for
any cyclic network | null | null | null | null | cs.IT math.IT | null | We give an algorithm for finding network encoding and decoding equations for
error-free multicasting networks with multiple sources and sinks. The algorithm
given is efficient (polynomial complexity) and works on any kind of network
(acyclic, link cyclic, flow cyclic, or even in the presence of knots). The key
idea will be the appropriate use of the delay (both natural and additional)
during the encoding. The resulting code will always work with finite delay with
binary encoding coefficients.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 08:03:18 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Diez",
"Angela I. Barbero",
""
],
[
"Ytrehus",
"Oyvind",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0086 | Maurice Margenstern | Maurice Margenstern | About the domino problem in the hyperbolic plane, a new solution:
complement | 20 pages | M. Margenstern, "The domino problem of the hyperbolic plane is
undecidable", Theoretical Computer Science, vol. 407, (2008), 29-84 | 10.1016/j.tcs.2008.04.038 | null | cs.CG cs.DM | null | In this paper, we complete the construction of paper arXiv:cs.CG/0701096v2.
Together with the proof contained in arXiv:cs.CG/0701096v2, this paper
definitely proves that the general problem of tiling the hyperbolic plane with
{\it \`a la} Wang tiles is undecidable.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 09:29:59 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2007 20:09:36 GMT"
},
{
"version": "v3",
"created": "Wed, 9 May 2007 06:25:50 GMT"
},
{
"version": "v4",
"created": "Fri, 18 May 2007 15:14:52 GMT"
}
] | 2009-07-06T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0705.0123 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy | An Energy Efficiency Perspective on Training for Fading Channels | To appear in the Proc. of the 2007 IEEE International Symposium on
Information Theory | null | 10.1109/ISIT.2007.4557387 | null | cs.IT math.IT | null | In this paper, the bit energy requirements of training-based transmission
over block Rayleigh fading channels are studied. Pilot signals are employed to
obtain the minimum mean-square-error (MMSE) estimate of the channel fading
coefficients. Energy efficiency is analyzed in the worst case scenario where
the channel estimate is assumed to be perfect and the error in the estimate is
considered as another source of additive Gaussian noise. It is shown that bit
energy requirement grows without bound as the snr goes to zero, and the minimum
bit energy is achieved at a nonzero snr value below which one should not
operate. The effect of the block length on both the minimum bit energy and the
snr value at which the minimum is achieved is investigated. Flash training
schemes are analyzed and shown to improve the energy efficiency in the low-snr
regime. Energy efficiency analysis is also carried out when peak power
constraints are imposed on pilot signals.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 15:27:41 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |