id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0705.0124
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection
To appear in the Proc. of the 2007 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2007.4557221
null
cs.IT math.IT
null
The low-snr capacity of M-ary PSK transmission over both the additive white Gaussian noise (AWGN) and fading channels is analyzed when hard-decision detection is employed at the receiver. Closed-form expressions for the first and second derivatives of the capacity at zero snr are obtained. The spectral-efficiency/bit-energy tradeoff in the low-snr regime is analyzed by finding the wideband slope and the bit energy required at zero spectral efficiency. Practical design guidelines are drawn from the information-theoretic analysis. The fading channel analysis is conducted for both coherent and noncoherent cases, and the performance penalty in the low-power regime for not knowing the channel is identified.
[ { "version": "v1", "created": "Tue, 1 May 2007 15:38:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0128
Mustafa Cenk Gursoy
Sami Akin, Mustafa Cenk Gursoy
Training Optimization for Gauss-Markov Rayleigh Fading Channels
To appear in the Proc. of the 2007 IEEE International Conference on Communications
null
10.1109/ICC.2007.994
null
cs.IT math.IT
null
In this paper, pilot-assisted transmission over Gauss-Markov Rayleigh fading channels is considered. A simple scenario, where a single pilot signal is transmitted every T symbols and T-1 data symbols are transmitted in between the pilots, is studied. First, it is assumed that binary phase-shift keying (BPSK) modulation is employed at the transmitter. With this assumption, the training period, and data and training power allocation are jointly optimized by maximizing an achievable rate expression. Achievable rates and energy-per-bit requirements are computed using the optimal training parameters. Secondly, a capacity lower bound is obtained by considering the error in the estimate as another source of additive Gaussian noise, and the training parameters are optimized by maximizing this lower bound.
[ { "version": "v1", "created": "Tue, 1 May 2007 16:04:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Akin", "Sami", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0130
Mustafa Cenk Gursoy
Qingyun Wang, Mustafa Cenk Gursoy
Performance Analysis for Multichannel Reception of OOFSK Signaling
Proc. of the 2007 IEEE Wireless Communications and Networking Conference
null
10.1109/WCNC.2007.444
null
cs.IT math.IT
null
In this paper, the error performance of on-off frequency shift keying (OOFSK) modulation over fading channels is analyzed when the receiver is equipped with multiple antennas. The analysis is conducted in two cases: the coherent scenario where the fading is perfectly known at the receiver, and the noncoherent scenario where neither the receiver nor the transmitter knows the fading coefficients. For both cases, the maximum a posteriori probability (MAP) detection rule is derived and analytical probability of error expressions are obtained. The effect of fading correlation among the receiver antennas is also studied. Simulation results indicate that for sufficiently low duty cycle values, lower probability of error values with respect to FSK signaling are achieved. Equivalently, when compared to FSK modulation, OOFSK with low duty cycle requires less energy to achieve the same probability of error, which renders this modulation a more energy efficient transmission technique.
[ { "version": "v1", "created": "Tue, 1 May 2007 16:11:28 GMT" } ]
2016-11-17T00:00:00
[ [ "Wang", "Qingyun", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0132
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
Error Probability Analysis of Peaky Signaling over Fading Channels
Proc. of the 40th Annual Asilomar Conference on Signals, Systems, and Computers, 2006
null
null
null
cs.IT math.IT
null
In this paper, the performance of signaling strategies with high peak-to-average power ratio is analyzed in both coherent and noncoherent fading channels. Two recently proposed modulation schemes, namely on-off binary phase-shift keying and on-off quaternary phase-shift keying, are considered. For these modulation formats, the optimal decision rules used at the detector are identified and analytical expressions for the error probabilities are obtained. Numerical techniques are employed to compute the error probabilities. It is concluded that increasing the peakedness of the signals results in reduced error rates for a given power level and hence improve the energy efficiency.
[ { "version": "v1", "created": "Tue, 1 May 2007 16:20:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0150
Myung-Sin Song
Palle E. T. Jorgensen, Myung-Sin Song
Comparison of Discrete and Continuous Wavelet Transforms
22 pages, Springer Encyclopedia of Complexity and Systems Science, the full version with figures is available at http://www.siue.edu/~msong/Research/ency.pdf
null
null
null
cs.CE
null
In this paper we outline several points of view on the interplay between discrete and continuous wavelet transforms; stressing both pure and applied aspects of both. We outline some new links between the two transform technologies based on the theory of representations of generators and relations. By this we mean a finite system of generators which are represented by operators in Hilbert space. We further outline how these representations yield sub-band filter banks for signal and image processing algorithms.
[ { "version": "v1", "created": "Tue, 1 May 2007 18:24:52 GMT" }, { "version": "v2", "created": "Fri, 24 Aug 2007 17:53:30 GMT" } ]
2011-11-09T00:00:00
[ [ "Jorgensen", "Palle E. T.", "" ], [ "Song", "Myung-Sin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0705.0178
Abhishek Parakh
Abhishek Parakh
Oblivious Transfer based on Key Exchange
10 pages
Cryptologia, Volume 32, Issue 1 January 2008, pages 37 - 44
10.1080/01611190701593228
null
cs.CR
null
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the idea of obliviously exchanging encryption keys. Since, Diffie-Hellman scheme is widely used, our protocol may provide a useful alternative to the conventional methods for implementation of oblivious transfer and a useful primitive in building larger cryptographic schemes.
[ { "version": "v1", "created": "Wed, 2 May 2007 02:56:25 GMT" } ]
2008-01-10T00:00:00
[ [ "Parakh", "Abhishek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0705.0197
Tshilidzi Marwala
Tshilidzi Marwala, Unathi Mahola and Snehashish Chakraverty
Fault Classification in Cylinders Using Multilayer Perceptrons, Support Vector Machines and Guassian Mixture Models
10 pages, 2 figures, 4 tables
Computer Assisted Mechanics and Engineering Sciences, Vol. 14, No. 2, 2007.
null
null
cs.AI
null
Gaussian mixture models (GMM) and support vector machines (SVM) are introduced to classify faults in a population of cylindrical shells. The proposed procedures are tested on a population of 20 cylindrical shells and their performance is compared to the procedure, which uses multi-layer perceptrons (MLP). The modal properties extracted from vibration data are used to train the GMM, SVM and MLP. It is observed that the GMM produces 98%, SVM produces 94% classification accuracy while the MLP produces 88% classification rates.
[ { "version": "v1", "created": "Wed, 2 May 2007 03:13:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Marwala", "Tshilidzi", "" ], [ "Mahola", "Unathi", "" ], [ "Chakraverty", "Snehashish", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.0199
Erik Berglund
Erik Berglund, Joaquin Sitte
The Parameter-Less Self-Organizing Map algorithm
29 pages, 27 figures. Based on publication in IEEE Trans. on Neural Networks
IEEE Transactions on Neural Networks, 2006 v.17, n.2, pp.305-316
null
null
cs.NE cs.AI cs.CV
null
The Parameter-Less Self-Organizing Map (PLSOM) is a new neural network algorithm based on the Self-Organizing Map (SOM). It eliminates the need for a learning rate and annealing schemes for learning rate and neighbourhood size. We discuss the relative performance of the PLSOM and the SOM and demonstrate some tasks in which the SOM fails but the PLSOM performs satisfactory. Finally we discuss some example applications of the PLSOM and present a proof of ordering under certain limited conditions.
[ { "version": "v1", "created": "Wed, 2 May 2007 04:04:51 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 01:06:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Berglund", "Erik", "" ], [ "Sitte", "Joaquin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0705.0204
Tshilidzi Marwala
Lukasz A. Machowski, and Tshilidzi Marwala
Using Images to create a Hierarchical Grid Spatial Index
In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Taiwan, 2006, pp. 1974-1979
null
10.1109/ICSMC.2006.385020
null
cs.DS
null
This paper presents a hybrid approach to spatial indexing of two dimensional data. It sheds new light on the age old problem by thinking of the traditional algorithms as working with images. Inspiration is drawn from an analogous situation that is found in machine and human vision. Image processing techniques are used to assist in the spatial indexing of the data. A fixed grid approach is used and bins with too many records are sub-divided hierarchically. Search queries are pre-computed for bins that do not contain any data records. This has the effect of dividing the search space up into non rectangular regions which are based on the spatial properties of the data. The bucketing quad tree can be considered as an image with a resolution of two by two for each layer. The results show that this method performs better than the quad tree if there are more divisions per layer. This confirms our suspicions that the algorithm works better if it gets to look at the data with higher resolution images. An elegant class structure is developed where the implementation of concrete spatial indexes for a particular data type merely relies on rendering the data onto an image.
[ { "version": "v1", "created": "Wed, 2 May 2007 05:37:32 GMT" } ]
2016-11-17T00:00:00
[ [ "Machowski", "Lukasz A.", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0705.0214
Mourad Zerai
Mourad Zerai, Maher Moakher
Riemannian level-set methods for tensor-valued data
11 pages, 03 figures, to be published in the proceedings of SSVM 2007, LNCS Springer
null
null
null
cs.CV
null
We present a novel approach for the derivation of PDE modeling curvature-driven flows for matrix-valued data. This approach is based on the Riemannian geometry of the manifold of Symmetric Positive Definite Matrices Pos(n).
[ { "version": "v1", "created": "Wed, 2 May 2007 07:32:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Zerai", "Mourad", "" ], [ "Moakher", "Maher", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0705.0252
Khoa Nguyen
Khoa D. Nguyen, Albert Guillen i Fabregas and Lars K. Rasmussen
Power Allocation for Discrete-Input Non-Ergodic Block-Fading Channels
6 pages, 4 figures, submitted to Information Theory Workshop 2007
null
null
null
cs.IT math.IT
null
We consider power allocation algorithms for fixed-rate transmission over Nakagami-m non-ergodic block-fading channels with perfect transmitter and receiver channel state information and discrete input signal constellations under both short- and long-term power constraints. Optimal power allocation schemes are shown to be direct applications of previous results in the literature. We show that the SNR exponent of the optimal short-term scheme is given by the Singleton bound. We also illustrate the significant gains available by employing long-term power constraints. Due to the nature of the expressions involved, the complexity of optimal schemes may be prohibitive for system implementation. We propose simple sub-optimal power allocation schemes whose outage probability performance is very close to the minimum outage probability obtained by optimal schemes.
[ { "version": "v1", "created": "Wed, 2 May 2007 11:36:53 GMT" }, { "version": "v2", "created": "Thu, 3 May 2007 03:03:55 GMT" }, { "version": "v3", "created": "Wed, 4 Jul 2007 13:10:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Nguyen", "Khoa D.", "" ], [ "Fabregas", "Albert Guillen i", "" ], [ "Rasmussen", "Lars K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0253
Jian Li
Mordecai Golin and Li Jian
More Efficient Algorithms and Analyses for Unequal Letter Cost Prefix-Free Coding
29 pages;9 figures;
null
null
null
cs.IT cs.DS math.IT
null
There is a large literature devoted to the problem of finding an optimal (min-cost) prefix-free code with an unequal letter-cost encoding alphabet of size. While there is no known polynomial time algorithm for solving it optimally there are many good heuristics that all provide additive errors to optimal. The additive error in these algorithms usually depends linearly upon the largest encoding letter size. This paper was motivated by the problem of finding optimal codes when the encoding alphabet is infinite. Because the largest letter cost is infinite, the previous analyses could give infinite error bounds. We provide a new algorithm that works with infinite encoding alphabets. When restricted to the finite alphabet case, our algorithm often provides better error bounds than the best previous ones known.
[ { "version": "v1", "created": "Wed, 2 May 2007 11:23:52 GMT" }, { "version": "v2", "created": "Thu, 3 May 2007 09:00:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Golin", "Mordecai", "" ], [ "Jian", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0262
Thierry Cachat
Thierry Cachat (LIAFA), Igor Walukiewicz (LaBRI)
The Complexity of Games on Higher Order Pushdown Automata
null
null
null
null
cs.GT
null
We prove an n-EXPTIME lower bound for the problem of deciding the winner in a reachability game on Higher Order Pushdown Automata (HPDA) of level n. This bound matches the known upper bound for parity games on HPDA. As a consequence the mu-calculus model checking over graphs given by n-HPDA is n-EXPTIME complete.
[ { "version": "v1", "created": "Wed, 2 May 2007 11:48:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Cachat", "Thierry", "", "LIAFA" ], [ "Walukiewicz", "Igor", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0705.0281
Jerome Darmont
J\'er\^ome Darmont (LIMOS), Christophe Fromantin (LIMOS), St\'ephane R\'egnier (LIMOS), Le Gruenwald, Michel Schneider (LIMOS)
Dynamic Clustering in Object-Oriented Databases: An Advocacy for Simplicity
null
LNCS, Vol. 1944 (06/2000) 71-85
null
null
cs.DB
null
We present in this paper three dynamic clustering techniques for Object-Oriented Databases (OODBs). The first two, Dynamic, Statistical & Tunable Clustering (DSTC) and StatClust, exploit both comprehensive usage statistics and the inter-object reference graph. They are quite elaborate. However, they are also complex to implement and induce a high overhead. The third clustering technique, called Detection & Reclustering of Objects (DRO), is based on the same principles, but is much simpler to implement. These three clustering algorithm have been implemented in the Texas persistent object store and compared in terms of clustering efficiency (i.e., overall performance increase) and overhead using the Object Clustering Benchmark (OCB). The results obtained showed that DRO induced a lighter overhead while still achieving better overall performance.
[ { "version": "v1", "created": "Wed, 2 May 2007 12:50:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Darmont", "Jérôme", "", "LIMOS" ], [ "Fromantin", "Christophe", "", "LIMOS" ], [ "Régnier", "Stéphane", "", "LIMOS" ], [ "Gruenwald", "Le", "", "LIMOS" ], [ "Schneider", "Michel", "", "LIMOS" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0705.0286
Hajime Matsui
Hajime Matsui, Seiichi Mita
Inverse-free Berlekamp-Massey-Sakata Algorithm and Small Decoders for Algebraic-Geometric Codes
15 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper proposes a novel algorithm for finding error-locators of algebraic-geometric codes that can eliminate the division-calculations of finite fields from the Berlekamp-Massey-Sakata algorithm. This inverse-free algorithm provides full performance in correcting a certain class of errors, generic errors, which includes most errors, and can decode codes on algebraic curves without the determination of unknown syndromes. Moreover, we propose three different kinds of architectures that our algorithm can be applied to, and we represent the control operation of shift-registers and switches at each clock-timing with numerical simulations. We estimate the performance in comparison of the total running time and the numbers of multipliers and shift-registers in three architectures with those of the conventional ones for codes on algebraic curves.
[ { "version": "v1", "created": "Wed, 2 May 2007 13:13:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Matsui", "Hajime", "" ], [ "Mita", "Seiichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0315
Omid Amini
Omid Amini, Frederic Havet, Florian Huc, Stephan Thomasse
WDM and Directed Star Arboricity
18 pages, 2 figures. Final version
Combinatorics, Probability and Computing, Volume 19, Issue 02, March 2010, pp 161-182
null
null
cs.NI math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A digraph is $m$-labelled if every arc is labelled by an integer in $\{1, \dots,m\}$. Motivated by wavelength assignment for multicasts in optical networks, we introduce and study $n$-fibre colourings of labelled digraphs. These are colourings of the arcs of $D$ such that at each vertex $v$, and for each colour $\alpha$, $in(v,\alpha)+out(v,\alpha)\leq n$ with $in(v,\alpha)$ the number of arcs coloured $\alpha$ entering $v$ and $out(v,\alpha)$ the number of labels $l$ such that there is at least one arc of label $l$ leaving $v$ and coloured with $\alpha$. The problem is to find the minimum number of colours $\lambda_n(D)$ such that the $m$-labelled digraph $D$ has an $n$-fibre colouring. In the particular case when $D$ is $1$-labelled, $\lambda_1(D)$ is called the directed star arboricity of $D$, and is denoted by $dst(D)$. We first show that $dst(D)\leq 2\Delta^-(D)+1$, and conjecture that if $\Delta^-(D)\geq 2$, then $dst(D)\leq 2\Delta^-(D)$. We also prove that for a subcubic digraph $D$, then $dst(D)\leq 3$, and that if $\Delta^+(D), \Delta^-(D)\leq 2$, then $dst(D)\leq 4$. Finally, we study $\lambda_n(m,k)=\max\{\lambda_n(D) \tq D \mbox{is $m$-labelled} \et \Delta^-(D)\leq k\}$. We show that if $m\geq n$, then $\ds \left\lceil\frac{m}{n}\left\lceil \frac{k}{n}\right\rceil + \frac{k}{n} \right\rceil\leq \lambda_n(m,k) \leq\left\lceil\frac{m}{n}\left\lceil \frac{k}{n}\right\rceil + \frac{k}{n} \right\rceil + C \frac{m^2\log k}{n}$ for some constant $C$. We conjecture that the lower bound should be the right value of $\lambda_n(m,k)$.
[ { "version": "v1", "created": "Wed, 2 May 2007 15:54:55 GMT" }, { "version": "v2", "created": "Thu, 3 May 2007 08:38:06 GMT" }, { "version": "v3", "created": "Thu, 15 Jul 2010 01:05:23 GMT" } ]
2010-07-16T00:00:00
[ [ "Amini", "Omid", "" ], [ "Havet", "Frederic", "" ], [ "Huc", "Florian", "" ], [ "Thomasse", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0705.0326
Lei Ying
Lei Ying and R. Srikant
Optimal Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks: Hybrid Random Walk and One-Dimensional Mobility Models
13 pages
null
null
null
cs.NI cs.IT math.IT
null
Optimal delay-throughput trade-offs for two-dimensional i.i.d mobility models have been established in [23], where we showed that the optimal trade-offs can be achieved using rate-less codes when the required delay guarantees are sufficient large. In this paper, we extend the results to other mobility models including two-dimensional hybrid random walk model, one-dimensional i.i.d. mobility model and one-dimensional hybrid random walk model. We consider both fast mobiles and slow mobiles, and establish the optimal delay-throughput trade-offs under some conditions. Joint coding-scheduling algorithms are also proposed to achieve the optimal trade-offs.
[ { "version": "v1", "created": "Wed, 2 May 2007 16:43:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Ying", "Lei", "" ], [ "Srikant", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0350
Ruslan Sharipov
Ruslan Sharipov
Algorithms for laying points optimally on a plane and a circle
AmSTeX, 6 pages, amsppt style
null
null
null
cs.CG math.OC
null
Two averaging algorithms are considered which are intended for choosing an optimal plane and an optimal circle approximating a group of points in three-dimensional Euclidean space.
[ { "version": "v1", "created": "Wed, 2 May 2007 19:41:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharipov", "Ruslan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0705.0413
David Eppstein
David Eppstein, Marc van Kreveld, Elena Mumford, and Bettina Speckmann
Edges and Switches, Tunnels and Bridges
15 pages, 11 figures. To appear in 10th Worksh. Algorithms and Data Structures, Halifax, Nova Scotia, 2007. This version includes three pages of appendices that will not be included in the conference proceedings version
Computational Geometry Theory & Applications 42(8): 790-802, 2009
10.1016/j.comgeo.2008.05.005
null
cs.DS cs.CG
null
Edge casing is a well-known method to improve the readability of drawings of non-planar graphs. A cased drawing orders the edges of each edge crossing and interrupts the lower edge in an appropriate neighborhood of the crossing. Certain orders will lead to a more readable drawing than others. We formulate several optimization criteria that try to capture the concept of a "good" cased drawing. Further, we address the algorithmic question of how to turn a given drawing into an optimal cased drawing. For many of the resulting optimization problems, we either find polynomial time algorithms or NP-hardness results.
[ { "version": "v1", "created": "Thu, 3 May 2007 06:33:04 GMT" } ]
2009-07-09T00:00:00
[ [ "Eppstein", "David", "" ], [ "van Kreveld", "Marc", "" ], [ "Mumford", "Elena", "" ], [ "Speckmann", "Bettina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0705.0419
Luigi Santocanale
Walid Belkhir (LIF), Luigi Santocanale (LIF)
Undirected Graphs of Entanglement Two
null
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, Inde (2007)
10.1007/978-3-540-77050-3_42
null
cs.LO cs.GT
null
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical properties of transition systems. We are interested in the problem of deciding whether a graph has entanglement at most k. As this measure is defined by means of games, game theoretic ideas naturally lead to design polynomial algorithms that, for fixed k, decide the problem. Known characterizations of directed graphs of entanglement at most 1 lead, for k = 1, to design even faster algorithms. In this paper we present an explicit characterization of undirected graphs of entanglement at most 2. With such a characterization at hand, we devise a linear time algorithm to decide whether an undirected graph has this property.
[ { "version": "v1", "created": "Thu, 3 May 2007 08:07:11 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2007 09:04:14 GMT" } ]
2009-04-09T00:00:00
[ [ "Belkhir", "Walid", "", "LIF" ], [ "Santocanale", "Luigi", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0705.0422
Rapport De Recherche Inria
Omid Amini (INRIA Sophia Antipolis), Louis Esperet (LaBRI), Jan Van Den Heuvel (LSE)
Frugal Colouring of Graphs
null
null
null
null
cs.DM cs.NI
null
A $k$-frugal colouring of a graph $G$ is a proper colouring of the vertices of $G$ such that no colour appears more than $k$ times in the neighbourhood of a vertex. This type of colouring was introduced by Hind, Molloy and Reed in 1997. In this paper, we study the frugal chromatic number of planar graphs, planar graphs with large girth, and outerplanar graphs, and relate this parameter with several well-studied colourings, such as colouring of the square, cyclic colouring, and $L(p,q)$-labelling. We also study frugal edge-colourings of multigraphs.
[ { "version": "v1", "created": "Thu, 3 May 2007 08:52:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Amini", "Omid", "", "INRIA Sophia Antipolis" ], [ "Esperet", "Louis", "", "LaBRI" ], [ "Heuvel", "Jan Van Den", "", "LSE" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0705.0423
Farbod Kayhan
A. Braunstein, F. Kayhan, G. Montorsi and R. Zecchina
Encoding for the Blackwell Channel with Reinforced Belief Propagation
5 pages, 8 figures, submitted to ISIT 2007
IEEE International Symposium on Information Theory (ISIT07); 2007. p. 1891-5
10.1109/ISIT.2007.4557497
null
cs.IT math.IT
null
A key idea in coding for the broadcast channel (BC) is binning, in which the transmitter encode information by selecting a codeword from an appropriate bin (the messages are thus the bin indexes). This selection is normally done by solving an appropriate (possibly difficult) combinatorial problem. Recently it has been shown that binning for the Blackwell channel --a particular BC-- can be done by iterative schemes based on Survey Propagation (SP). This method uses decimation for SP and suffers a complexity of O(n^2). In this paper we propose a new variation of the Belief Propagation (BP) algorithm, named Reinforced BP algorithm, that turns BP into a solver. Our simulations show that this new algorithm has complexity O(n log n). Using this new algorithm together with a non-linear coding scheme, we can efficiently achieve rates close to the border of the capacity region of the Blackwell channel.
[ { "version": "v1", "created": "Thu, 3 May 2007 09:49:15 GMT" } ]
2016-11-17T00:00:00
[ [ "Braunstein", "A.", "" ], [ "Kayhan", "F.", "" ], [ "Montorsi", "G.", "" ], [ "Zecchina", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0425
Natalia Osipova
Natalia Osipova (INRIA Sophia Antipolis)
Batch Processor Sharing with Hyper-Exponential Service Time
Sophia Antipolis, France, 03 May 2007
null
null
null
cs.NI
null
We study Batch Processor-Sharing (BPS) queuing model with hyper-exponential service time distribution and Poisson batch arrival process. One of the main goals to study BPS is the possibility of its application in size-based scheduling, which is used in differentiation between Short and Long flows in the Internet. In the case of hyper-exponential service time distribution we find an analytical expression of the expected conditional response time for the BPS queue. We show, that the expected conditional response time is a concave function of the service time. We apply the received results to the Two Level Processor-Sharing (TLPS) model with hyper-exponential service time distribution and find the expression of the expected response time for the TLPS model. TLPS scheduling discipline can be applied to size-based differentiation in TCP/IP networks and Web server request handling.
[ { "version": "v1", "created": "Thu, 3 May 2007 10:09:06 GMT" }, { "version": "v2", "created": "Fri, 4 May 2007 12:51:53 GMT" }, { "version": "v3", "created": "Fri, 22 Jun 2007 09:53:50 GMT" } ]
2016-09-08T00:00:00
[ [ "Osipova", "Natalia", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0705.0449
Pierre-Francois Marteau
Pierre-Fran\c{c}ois Marteau (VALORIA), Gilbas M\'enier (VALORIA)
Multiresolution Approximation of Polygonal Curves in Linear Complexity
null
null
null
null
cs.CV
null
We propose a new algorithm to the problem of polygonal curve approximation based on a multiresolution approach. This algorithm is suboptimal but still maintains some optimality between successive levels of resolution using dynamic programming. We show theoretically and experimentally that this algorithm has a linear complexity in time and space. We experimentally compare the outcomes of our algorithm to the optimal "full search" dynamic programming solution and finally to classical merge and split approaches. The experimental evaluations confirm the theoretical derivations and show that the proposed approach evaluated on 2D coastal maps either show a lower time complexity or provide polygonal approximations closer to the input discrete curves.
[ { "version": "v1", "created": "Thu, 3 May 2007 12:47:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Marteau", "Pierre-François", "", "VALORIA" ], [ "Ménier", "Gilbas", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0705.0450
Jerome Darmont
J\'er\^ome Darmont (LIMOS), Michel Schneider (LIMOS)
VOODB: A Generic Discrete-Event Random Simulation Model to Evaluate the Performances of OODBs
null
25th International Conference on Very Large Databases (VLDB 99) (09/1999) 254-265
null
null
cs.DB
null
Performance of object-oriented database systems (OODBs) is still an issue to both designers and users nowadays. The aim of this paper is to propose a generic discrete-event random simulation model, called VOODB, in order to evaluate the performances of OODBs in general, and the performances of optimization methods like clustering in particular. Such optimization methods undoubtedly improve the performances of OODBs. Yet, they also always induce some kind of overhead for the system. Therefore, it is important to evaluate their exact impact on the overall performances. VOODB has been designed as a generic discrete-event random simulation model by putting to use a modelling approach, and has been validated by simulating the behavior of the O2 OODB and the Texas persistent object store. Since our final objective is to compare object clustering algorithms, some experiments have also been conducted on the DSTC clustering technique, which is implemented in Texas. To validate VOODB, performance results obtained by simulation for a given experiment have been compared to the results obtained by benchmarking the real systems in the same conditions. Benchmarking and simulation performance evaluations have been observed to be consistent, so it appears that simulation can be a reliable approach to evaluate the performances of OODBs.
[ { "version": "v1", "created": "Thu, 3 May 2007 12:50:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Darmont", "Jérôme", "", "LIMOS" ], [ "Schneider", "Michel", "", "LIMOS" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0705.0453
Jerome Darmont
J\'er\^ome Darmont (LIMOS), Bertrand Petit (LIMOS), Michel Schneider (LIMOS)
OCB: A Generic Benchmark to Evaluate the Performances of Object-Oriented Database Systems
null
LNCS, Vol. 1377 (03/1998) 326-340
null
null
cs.DB
null
We present in this paper a generic object-oriented benchmark (the Object Clustering Benchmark) that has been designed to evaluate the performances of clustering policies in object-oriented databases. OCB is generic because its sample database may be customized to fit the databases introduced by the main existing benchmarks (e.g., OO1). OCB's current form is clustering-oriented because of its clustering-oriented workload, but it can be easily adapted to other purposes. Lastly, OCB's code is compact and easily portable. OCB has been implemented in a real system (Texas, running on a Sun workstation), in order to test a specific clustering policy called DSTC. A few results concerning this test are presented.
[ { "version": "v1", "created": "Thu, 3 May 2007 12:54:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Darmont", "Jérôme", "", "LIMOS" ], [ "Petit", "Bertrand", "", "LIMOS" ], [ "Schneider", "Michel", "", "LIMOS" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0705.0454
Jerome Darmont
J\'er\^ome Darmont (LIMOS), Amar Attoui (LIMOS), Michel Gourgand (LIMOS)
Performance Evaluation for Clustering Algorithms in Object-Oriented Database Systems
null
LNCS, Vol. 978 (09/1995) 187-196
null
null
cs.DB
null
It is widely acknowledged that good object clustering is critical to the performance of object-oriented databases. However, object clustering always involves some kind of overhead for the system. The aim of this paper is to propose a modelling methodology in order to evaluate the performances of different clustering policies. This methodology has been used to compare the performances of three clustering algorithms found in the literature (Cactis, CK and ORION) that we considered representative of the current research in the field of object clustering. The actual performance evaluation was performed using simulation. Simulation experiments we performed showed that the Cactis algorithm is better than the ORION algorithm and that the CK algorithm totally outperforms both other algorithms in terms of response time and clustering overhead.
[ { "version": "v1", "created": "Thu, 3 May 2007 13:02:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Darmont", "Jérôme", "", "LIMOS" ], [ "Attoui", "Amar", "", "LIMOS" ], [ "Gourgand", "Michel", "", "LIMOS" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0705.0462
Nicolas Tabareau
Paul-Andr\'e Melli\`es (PPS), Nicolas Tabareau (PPS)
Resource modalities in game semantics
null
null
null
null
math.CT cs.CL
null
The description of resources in game semantics has never achieved the simplicity and precision of linear logic, because of a misleading conception: the belief that linear logic is more primitive than game semantics. We advocate instead the contrary: that game semantics is conceptually more primitive than linear logic. Starting from this revised point of view, we design a categorical model of resources in game semantics, and construct an arena game model where the usual notion of bracketing is extended to multi- bracketing in order to capture various resource policies: linear, affine and exponential.
[ { "version": "v1", "created": "Thu, 3 May 2007 13:44:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Melliès", "Paul-André", "", "PPS" ], [ "Tabareau", "Nicolas", "", "PPS" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0705.0543
Aditya Ramamoorthy
Jaehong Kim, Aditya Ramamoorthy and Steven W. McLaughlin
The Design of Efficiently-Encodable Rate-Compatible LDPC Codes
Accepted subject to minor revision to IEEE Trans. on Comm
null
10.1109/ICC.2006.254899
null
cs.IT math.IT
null
We present a new class of irregular low-density parity-check (LDPC) codes for moderate block lengths (up to a few thousand bits) that are well-suited for rate-compatible puncturing. The proposed codes show good performance under puncturing over a wide range of rates and are suitable for usage in incremental redundancy hybrid-automatic repeat request (ARQ) systems. In addition, these codes are linear-time encodable with simple shift-register circuits. For a block length of 1200 bits the codes outperform optimized irregular LDPC codes and extended irregular repeat-accumulate (eIRA) codes for all puncturing rates 0.6~0.9 (base code performance is almost the same) and are particularly good at high puncturing rates where good puncturing performance has been previously difficult to achieve.
[ { "version": "v1", "created": "Thu, 3 May 2007 22:17:51 GMT" } ]
2016-11-18T00:00:00
[ [ "Kim", "Jaehong", "" ], [ "Ramamoorthy", "Aditya", "" ], [ "McLaughlin", "Steven W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0552
Rajeev Raman
Rajeev Raman, Venkatesh Raman, Srinivasa Rao Satti
Succinct Indexable Dictionaries with Applications to Encoding $k$-ary Trees, Prefix Sums and Multisets
Final version of SODA 2002 paper; supersedes Leicester Tech report 2002/16
ACM Transactions on Algorithms vol 3 (2007), Article 43, 25pp
10.1145/1290672.1290680
null
cs.DS cs.DM cs.IT math.IT
null
We consider the {\it indexable dictionary} problem, which consists of storing a set $S \subseteq \{0,...,m-1\}$ for some integer $m$, while supporting the operations of $\Rank(x)$, which returns the number of elements in $S$ that are less than $x$ if $x \in S$, and -1 otherwise; and $\Select(i)$ which returns the $i$-th smallest element in $S$. We give a data structure that supports both operations in O(1) time on the RAM model and requires ${\cal B}(n,m) + o(n) + O(\lg \lg m)$ bits to store a set of size $n$, where ${\cal B}(n,m) = \ceil{\lg {m \choose n}}$ is the minimum number of bits required to store any $n$-element subset from a universe of size $m$. Previous dictionaries taking this space only supported (yes/no) membership queries in O(1) time. In the cell probe model we can remove the $O(\lg \lg m)$ additive term in the space bound, answering a question raised by Fich and Miltersen, and Pagh. We present extensions and applications of our indexable dictionary data structure, including: An information-theoretically optimal representation of a $k$-ary cardinal tree that supports standard operations in constant time, A representation of a multiset of size $n$ from $\{0,...,m-1\}$ in ${\cal B}(n,m+n) + o(n)$ bits that supports (appropriate generalizations of) $\Rank$ and $\Select$ operations in constant time, and A representation of a sequence of $n$ non-negative integers summing up to $m$ in ${\cal B}(n,m+n) + o(n)$ bits that supports prefix sum queries in constant time.
[ { "version": "v1", "created": "Fri, 4 May 2007 07:47:05 GMT" } ]
2011-08-10T00:00:00
[ [ "Raman", "Rajeev", "" ], [ "Raman", "Venkatesh", "" ], [ "Satti", "Srinivasa Rao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0561
Jingchao Chen
Jing-Chao Chen
Iterative Rounding for the Closest String Problem
This paper has been published in abstract Booklet of CiE09
null
null
null
cs.DS cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
The closest string problem is an NP-hard problem, whose task is to find a string that minimizes maximum Hamming distance to a given set of strings. This can be reduced to an integer program (IP). However, to date, there exists no known polynomial-time algorithm for IP. In 2004, Meneses et al. introduced a branch-and-bound (B & B) method for solving the IP problem. Their algorithm is not always efficient and has the exponential time complexity. In the paper, we attempt to solve efficiently the IP problem by a greedy iterative rounding technique. The proposed algorithm is polynomial time and much faster than the existing B & B IP for the CSP. If the number of strings is limited to 3, the algorithm is provably at most 1 away from the optimum. The empirical results show that in many cases we can find an exact solution. Even though we fail to find an exact solution, the solution found is very close to exact solution.
[ { "version": "v1", "created": "Fri, 4 May 2007 03:01:42 GMT" }, { "version": "v2", "created": "Wed, 11 May 2011 00:18:55 GMT" } ]
2011-05-12T00:00:00
[ [ "Chen", "Jing-Chao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0705.0564
Caleb Lo
Caleb K. Lo, Sriram Vishwanath and Robert W. Heath Jr
Rate Bounds for MIMO Relay Channels
25 pages, 6 figures, submitted to Journal on Communications and Networks in December 2007, revised in April 2008
null
null
null
cs.IT math.IT
null
This paper considers the multi-input multi-output (MIMO) relay channel where multiple antennas are employed by each terminal. Compared to single-input single-output (SISO) relay channels, MIMO relay channels introduce additional degrees of freedom, making the design and analysis of optimal cooperative strategies more complex. In this paper, a partial cooperation strategy that combines transmit-side message splitting and block-Markov encoding is presented. Lower bounds on capacity that improve on a previously proposed non-cooperative lower bound are derived for Gaussian MIMO relay channels.
[ { "version": "v1", "created": "Fri, 4 May 2007 06:43:42 GMT" }, { "version": "v2", "created": "Tue, 18 Dec 2007 17:39:33 GMT" }, { "version": "v3", "created": "Thu, 10 Apr 2008 15:52:35 GMT" }, { "version": "v4", "created": "Fri, 2 May 2008 21:33:42 GMT" } ]
2008-05-03T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Vishwanath", "Sriram", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0588
Edgar Graaf de
Edgar H. de Graaf, Joost N. Kok, Walter A. Kosters
Clustering Co-occurrence of Maximal Frequent Patterns in Streams
null
null
null
null
cs.AI cs.DS
null
One way of getting a better view of data is using frequent patterns. In this paper frequent patterns are subsets that occur a minimal number of times in a stream of itemsets. However, the discovery of frequent patterns in streams has always been problematic. Because streams are potentially endless it is in principle impossible to say if a pattern is often occurring or not. Furthermore the number of patterns can be huge and a good overview of the structure of the stream is lost quickly. The proposed approach will use clustering to facilitate the analysis of the structure of the stream. A clustering on the co-occurrence of patterns will give the user an improved view on the structure of the stream. Some patterns might occur so much together that they should form a combined pattern. In this way the patterns in the clustering will be the largest frequent patterns: maximal frequent patterns. Our approach to decide if patterns occur often together will be based on a method of clustering when only the distance between pairs is known. The number of maximal frequent patterns is much smaller and combined with clustering methods these patterns provide a good view on the structure of the stream.
[ { "version": "v1", "created": "Fri, 4 May 2007 10:36:53 GMT" } ]
2007-05-23T00:00:00
[ [ "de Graaf", "Edgar H.", "" ], [ "Kok", "Joost N.", "" ], [ "Kosters", "Walter A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0705.0593
Edgar Graaf de
Edgar H. de Graaf, Joost N. Kok, Walter A. Kosters
Clustering with Lattices in the Analysis of Graph Patterns
null
null
null
null
cs.AI cs.DS
null
Mining frequent subgraphs is an area of research where we have a given set of graphs (each graph can be seen as a transaction), and we search for (connected) subgraphs contained in many of these graphs. In this work we will discuss techniques used in our framework Lattice2SAR for mining and analysing frequent subgraph data and their corresponding lattice information. Lattice information is provided by the graph mining algorithm gSpan; it contains all supergraph-subgraph relations of the frequent subgraph patterns -- and their supports. Lattice2SAR is in particular used in the analysis of frequent graph patterns where the graphs are molecules and the frequent subgraphs are fragments. In the analysis of fragments one is interested in the molecules where patterns occur. This data can be very extensive and in this paper we focus on a technique of making it better available by using the lattice information in our clustering. Now we can reduce the number of times the highly compressed occurrence data needs to be accessed by the user. The user does not have to browse all the occurrence data in search of patterns occurring in the same molecules. Instead one can directly see which frequent subgraphs are of interest.
[ { "version": "v1", "created": "Fri, 4 May 2007 10:52:28 GMT" } ]
2007-05-23T00:00:00
[ [ "de Graaf", "Edgar H.", "" ], [ "Kok", "Joost N.", "" ], [ "Kosters", "Walter A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0705.0599
Nathalie Henry
Nathalie Henry, Jean-Daniel Fekete, Michael Mcguffin
NodeTrix: Hybrid Representation for Analyzing Social Networks
null
null
10.1109/TVCG.2007.70582
null
cs.HC
null
The need to visualize large social networks is growing as hardware capabilities make analyzing large networks feasible and many new data sets become available. Unfortunately, the visualizations in existing systems do not satisfactorily answer the basic dilemma of being readable both for the global structure of the network and also for detailed analysis of local communities. To address this problem, we present NodeTrix, a hybrid representation for networks that combines the advantages of two traditional representations: node-link diagrams are used to show the global structure of a network, while arbitrary portions of the network can be shown as adjacency matrices to better support the analysis of communities. A key contribution is a set of interaction techniques. These allow analysts to create a NodeTrix visualization by dragging selections from either a node-link or a matrix, flexibly manipulate the NodeTrix representation to explore the dataset, and create meaningful summary visualizations of their findings. Finally, we present a case study applying NodeTrix to the analysis of the InfoVis 2004 coauthorship dataset to illustrate the capabilities of NodeTrix as both an exploration tool and an effective means of communicating results.
[ { "version": "v1", "created": "Fri, 4 May 2007 11:50:07 GMT" }, { "version": "v2", "created": "Mon, 7 May 2007 08:53:45 GMT" }, { "version": "v3", "created": "Thu, 21 Jun 2007 13:32:58 GMT" } ]
2020-08-04T00:00:00
[ [ "Henry", "Nathalie", "" ], [ "Fekete", "Jean-Daniel", "" ], [ "Mcguffin", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0705.0602
Alejandro Chinea Manrique De Lara
Alejandro Chinea Manrique De Lara (INRIA Rocquencourt), Michel Parent (INRIA Rocquencourt)
Risk Assessment Algorithms Based On Recursive Neural Networks
null
Dans International Joint Conference On Neural Networks - IJCNN 2007 (2007)
null
null
cs.NE
null
The assessment of highly-risky situations at road intersections have been recently revealed as an important research topic within the context of the automotive industry. In this paper we shall introduce a novel approach to compute risk functions by using a combination of a highly non-linear processing model in conjunction with a powerful information encoding procedure. Specifically, the elements of information either static or dynamic that appear in a road intersection scene are encoded by using directed positional acyclic labeled graphs. The risk assessment problem is then reformulated in terms of an inductive learning task carried out by a recursive neural network. Recursive neural networks are connectionist models capable of solving supervised and non-supervised learning problems represented by directed ordered acyclic graphs. The potential of this novel approach is demonstrated through well predefined scenarios. The major difference of our approach compared to others is expressed by the fact of learning the structure of the risk. Furthermore, the combination of a rich information encoding procedure with a generalized model of dynamical recurrent networks permit us, as we shall demonstrate, a sophisticated processing of information that we believe as being a first step for building future advanced intersection safety systems
[ { "version": "v1", "created": "Fri, 4 May 2007 11:53:35 GMT" } ]
2007-05-23T00:00:00
[ [ "De Lara", "Alejandro Chinea Manrique", "", "INRIA Rocquencourt" ], [ "Parent", "Michel", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0705.0612
Katrin Borcea-Pfitzmann
Katrin Borcea-Pfitzmann, Anne-Katrin Stange
Privacy - an Issue for eLearning? A Trend Analysis Reflecting the Attitude of European eLearning Users
null
null
null
TUD-FI07-01
cs.CY
null
Availing services provided via the Internet became a widely accepted means in organising one's life. Beside others, eLearning goes with this trend as well. But, while employing Internet service makes life more convenient, at the same time, it raises risks with respect to the protection of the users' privacy. This paper analyses the attitudes of eLearning users towards their privacy by, initially, pointing out terminology and legal issues connected with privacy. Further, the concept and implementation as well as a result analysis of a conducted study is presented, which explores the problem area from different perspectives. The paper will show that eLearning users indeed care for the protection of their personal information when using eLearning services. However, their attitudes and behaviour slightly differ. In conclusion, we provide first approaches of assisting possibilities for users how to resolve the difference of requirements and their actual activities with respect to privacy protection.
[ { "version": "v1", "created": "Fri, 4 May 2007 12:30:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Borcea-Pfitzmann", "Katrin", "" ], [ "Stange", "Anne-Katrin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0705.0635
Jean Cardinal
J. Cardinal, S. Collette, F. Hurtado, S. Langerman and B. Palop
Moving Walkways, Escalators, and Elevators
16 pages. Presented at XII Encuentros de Geometria Computacional, Valladolid, Spain
null
null
null
cs.CG
null
We study a simple geometric model of transportation facility that consists of two points between which the travel speed is high. This elementary definition can model shuttle services, tunnels, bridges, teleportation devices, escalators or moving walkways. The travel time between a pair of points is defined as a time distance, in such a way that a customer uses the transportation facility only if it is helpful. We give algorithms for finding the optimal location of such a transportation facility, where optimality is defined with respect to the maximum travel time between two points in a given set.
[ { "version": "v1", "created": "Fri, 4 May 2007 14:52:06 GMT" }, { "version": "v2", "created": "Fri, 28 Sep 2007 11:30:09 GMT" } ]
2011-11-09T00:00:00
[ [ "Cardinal", "J.", "" ], [ "Collette", "S.", "" ], [ "Hurtado", "F.", "" ], [ "Langerman", "S.", "" ], [ "Palop", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0705.0693
Tshilidzi Marwala
Evan Hurwitz and Tshilidzi Marwala
Learning to Bluff
6 pages
null
null
null
cs.AI
null
The act of bluffing confounds game designers to this day. The very nature of bluffing is even open for debate, adding further complication to the process of creating intelligent virtual players that can bluff, and hence play, realistically. Through the use of intelligent, learning agents, and carefully designed agent outlooks, an agent can in fact learn to predict its opponents reactions based not only on its own cards, but on the actions of those around it. With this wider scope of understanding, an agent can in learn to bluff its opponents, with the action representing not an illogical action, as bluffing is often viewed, but rather as an act of maximising returns through an effective statistical optimisation. By using a tee dee lambda learning algorithm to continuously adapt neural network agent intelligence, agents have been shown to be able to learn to bluff without outside prompting, and even to learn to call each others bluffs in free, competitive play.
[ { "version": "v1", "created": "Mon, 7 May 2007 19:15:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hurwitz", "Evan", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.0734
Sanjiang Li
Sanjiang Li and Mingsheng Ying
Soft constraint abstraction based on semiring homomorphism
18 pages, 1 figure
Theoretical Computer Science 403(2-3) 192-201, 2008
10.1016/j.tcs.2008.03.029
null
cs.AI
null
The semiring-based constraint satisfaction problems (semiring CSPs), proposed by Bistarelli, Montanari and Rossi \cite{BMR97}, is a very general framework of soft constraints. In this paper we propose an abstraction scheme for soft constraints that uses semiring homomorphism. To find optimal solutions of the concrete problem, the idea is, first working in the abstract problem and finding its optimal solutions, then using them to solve the concrete problem. In particular, we show that a mapping preserves optimal solutions if and only if it is an order-reflecting semiring homomorphism. Moreover, for a semiring homomorphism $\alpha$ and a problem $P$ over $S$, if $t$ is optimal in $\alpha(P)$, then there is an optimal solution $\bar{t}$ of $P$ such that $\bar{t}$ has the same value as $t$ in $\alpha(P)$.
[ { "version": "v1", "created": "Sat, 5 May 2007 08:47:31 GMT" } ]
2010-07-01T00:00:00
[ [ "Li", "Sanjiang", "" ], [ "Ying", "Mingsheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.0738
Damien Chablat
Damien Chablat (IRCCyN), St\'ephane Caro (IRCCyN), Emilie Bouyer (IRCCyN)
The Optimization of a Novel Prismatic Drive
null
null
null
null
cs.RO
null
The design of a mechanical transmission taking into account the transmitted forces is reported in this paper. This transmission is based on Slide-o-Cam, a cam mechanism with multiple rollers mounted on a common translating follower. The design of Slide-o-Cam, a transmission intended to produce a sliding motion from a turning drive, or vice versa, was reported elsewhere. This transmission provides pure-rolling motion, thereby reducing the friction of rack-and-pinions and linear drives. The pressure angle is a relevant performance index for this transmission because it determines the amount of force transmitted to the load vs. that transmitted to the machine frame. To assess the transmission capability of the mechanism, the Hertz formula is introduced to calculate the stresses on the rollers and on the cams. The final transmission is intended to replace the current ball-screws in the Orthoglide, a three-DOF parallel robot for the production of translational motions, currently under development for machining applications at Ecole Centrale de Nantes.
[ { "version": "v1", "created": "Sat, 5 May 2007 10:28:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Bouyer", "Emilie", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0742
K. P.N. Murthy
V.Sundaram and K.P.N.Murthy
MIMO detection employing Markov Chain Monte Carlo
8 pages; 3 figures
null
null
null
cs.GL
null
We propose a soft-output detection scheme for Multiple-Input-Multiple-Output (MIMO) systems. The detector employs Markov Chain Monte Carlo method to compute bit reliabilities from the signals received and is thus suited for coded MIMO systems. It offers a good trade-off between achievable performance and algorithmic complexity.
[ { "version": "v1", "created": "Sat, 5 May 2007 12:04:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Sundaram", "V.", "" ], [ "Murthy", "K. P. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0705.0751
Pere Constans
Pere Constans
Approximate textual retrieval
null
null
null
null
cs.IR cs.DL
null
An approximate textual retrieval algorithm for searching sources with high levels of defects is presented. It considers splitting the words in a query into two overlapping segments and subsequently building composite regular expressions from interlacing subsets of the segments. This procedure reduces the probability of missed occurrences due to source defects, yet diminishes the retrieval of irrelevant, non-contextual occurrences.
[ { "version": "v1", "created": "Sat, 5 May 2007 17:27:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Constans", "Pere", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0705.0760
Sujay Sanghavi
Sujay Sanghavi
Equivalence of LP Relaxation and Max-Product for Weighted Matching in General Graphs
6 pages, 2 figures
null
null
null
cs.IT cs.AI cs.LG cs.NI math.IT
null
Max-product belief propagation is a local, iterative algorithm to find the mode/MAP estimate of a probability distribution. While it has been successfully employed in a wide variety of applications, there are relatively few theoretical guarantees of convergence and correctness for general loopy graphs that may have many short cycles. Of these, even fewer provide exact ``necessary and sufficient'' characterizations. In this paper we investigate the problem of using max-product to find the maximum weight matching in an arbitrary graph with edge weights. This is done by first constructing a probability distribution whose mode corresponds to the optimal matching, and then running max-product. Weighted matching can also be posed as an integer program, for which there is an LP relaxation. This relaxation is not always tight. In this paper we show that \begin{enumerate} \item If the LP relaxation is tight, then max-product always converges, and that too to the correct answer. \item If the LP relaxation is loose, then max-product does not converge. \end{enumerate} This provides an exact, data-dependent characterization of max-product performance, and a precise connection to LP relaxation, which is a well-studied optimization technique. Also, since LP relaxation is known to be tight for bipartite graphs, our results generalize other recent results on using max-product to find weighted matchings in bipartite graphs.
[ { "version": "v1", "created": "Sat, 5 May 2007 18:57:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Sanghavi", "Sujay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0761
Tshilidzi Marwala
Tshilidzi Marwala and Bodie Crossingham
Bayesian Approach to Neuro-Rough Models
24 pages, 5 figures, 1 table
null
null
null
cs.AI
null
This paper proposes a neuro-rough model based on multi-layered perceptron and rough set. The neuro-rough model is then tested on modelling the risk of HIV from demographic data. The model is formulated using Bayesian framework and trained using Monte Carlo method and Metropolis criterion. When the model was tested to estimate the risk of HIV infection given the demographic data it was found to give the accuracy of 62%. The proposed model is able to combine the accuracy of the Bayesian MLP model and the transparency of Bayesian rough set model.
[ { "version": "v1", "created": "Sun, 6 May 2007 22:55:58 GMT" }, { "version": "v2", "created": "Wed, 9 May 2007 04:13:04 GMT" }, { "version": "v3", "created": "Tue, 28 Aug 2007 09:24:46 GMT" } ]
2007-08-28T00:00:00
[ [ "Marwala", "Tshilidzi", "" ], [ "Crossingham", "Bodie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.0781
Tshilidzi Marwala
Jonathan M.Spiller and T. Marwala
Medical Image Segmentation and Localization using Deformable Templates
4 pages
null
null
null
cs.CV
null
This paper presents deformable templates as a tool for segmentation and localization of biological structures in medical images. Structures are represented by a prototype template, combined with a parametric warp mapping used to deform the original shape. The localization procedure is achieved using a multi-stage, multi-resolution algorithm de-signed to reduce computational complexity and time. The algorithm initially identifies regions in the image most likely to contain the desired objects and then examines these regions at progressively increasing resolutions. The final stage of the algorithm involves warping the prototype template to match the localized objects. The algorithm is presented along with the results of four example applications using MRI, x-ray and ultrasound images.
[ { "version": "v1", "created": "Sun, 6 May 2007 06:02:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Spiller", "Jonathan M.", "" ], [ "Marwala", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0705.0783
Stefano Buzzi
Stefano Buzzi, and H. Vincent Poor
Non-cooperative games for spreading code optimization, power control and receiver design in wireless data networks
appeared in the Proceedings of the 13th European Wireless Conference, Paris (France), April 2007
null
null
null
cs.IT cs.GT math.IT
null
This paper focuses on the issue of energy efficiency in wireless data networks through a game theoretic approach. The case considered is that in which each user is allowed to vary its transmit power, spreading code, and uplink receiver in order to maximize its own utility, which is here defined as the ratio of data throughput to transmit power. In particular, the case in which linear multiuser detectors are employed at the receiver is treated first, and, then, the more challenging case in which non-linear decision feedback multiuser receivers are adopted is addressed. It is shown that, for both receivers, the problem at hand of utility maximization can be regarded as a non-cooperative game, and it is proved that a unique Nash equilibrium point exists. Simulation results show that significant performance gains can be obtained through both non-linear processing and spreading code optimization; in particular, for systems with a number of users not larger than the processing gain, remarkable gains come from spreading code optimization, while, for overloaded systems, the largest gainscome from the use of non-linear processing. In every case, however, the non-cooperative games proposed here are shown to outperform competing alternatives.
[ { "version": "v1", "created": "Sun, 6 May 2007 06:49:07 GMT" } ]
2007-07-13T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0815
Andrea Lo Pumo
Andrea Lo Pumo
Overview of the Netsukuku network
null
null
null
null
cs.NI
null
Netsukuku is a P2P network system designed to handle a large number of nodes with minimal CPU and memory resources. It can be easily used to build a worldwide distributed, anonymous and not controlled network, separated from the Internet, without the support of any servers, ISPs or authority controls. In this document, we give a generic and non technical description of the Netsukuku network, emphasizing its main ideas and features.
[ { "version": "v1", "created": "Sun, 6 May 2007 19:36:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0705.0817
Andrea Lo Pumo
Andrea Lo Pumo
Quantum Shortest Path Netsukuku
null
null
null
null
cs.NI
null
This document describes the QSPN, the routing discovery algorithm used by Netsukuku. Through a deductive analysis the main proprieties of the QSPN are shown. Moreover, a second version of the algorithm, is presented.
[ { "version": "v1", "created": "Sun, 6 May 2007 20:05:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0705.0819
Andrea Lo Pumo
Andrea Lo Pumo
The Netsukuku network topology
null
null
null
null
cs.NI
null
In this document, we describe the fractal structure of the Netsukuku topology. Moreover, we show how it is possible to use the QSPN v2 on the high levels of the fractal.
[ { "version": "v1", "created": "Sun, 6 May 2007 20:12:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0705.0820
Andrea Lo Pumo
Andrea Lo Pumo
ANDNA: the distributed hostname management system of Netsukuku
null
null
null
null
cs.NI
null
We present the Abnormal Netsukuku Domain Name Anarchy system. ANDNA is the distributed, non hierarchical and decentralised system of hostname management used in the Netsukuku network.
[ { "version": "v1", "created": "Sun, 6 May 2007 20:19:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0705.0828
Tshilidzi Marwala
D.L. Falk, D. M. Rubin and T. Marwala
Enhancement of Noisy Planar Nuclear Medicine Images using Mean Field Annealing
4 pages
null
null
null
cs.CV
null
Nuclear medicine (NM) images inherently suffer from large amounts of noise and blur. The purpose of this research is to reduce the noise and blur while maintaining image integrity for improved diagnosis. The proposed solution is to increase image quality after the standard pre- and post-processing undertaken by a gamma camera system. Mean Field Annealing (MFA) is the image processing technique used in this research. It is a computational iterative technique that makes use of the Point Spread Function (PSF) and the noise associated with the NM image. MFA is applied to NM images with the objective of reducing noise while not compromising edge integrity. Using a sharpening filter as a post-processing technique (after MFA) yields image enhancement of planar NM images.
[ { "version": "v1", "created": "Sun, 6 May 2007 23:08:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Falk", "D. L.", "" ], [ "Rubin", "D. M.", "" ], [ "Marwala", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0705.0856
Damien Chablat
Emilie Bouyer (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Multiobjective Optimization of a Prismatic Drive
null
ASME Design Engineering Technical Conference (04/09/2007) 1-9
null
null
cs.RO
null
The multiobjective optimization of Slide-o-Cam is reported in this paper. Slide-o-Cam is a cam mechanism with multiple rollers mounted on a common translating follower. This transmission provides pure-rolling motion, thereby reducing the friction of rack-and-pinions and linear drives. A Pareto frontier is obtained by means of multiobjective optimization. This optimization is based on three objective functions: (i) the pressure angle, which is a suitable performance index for the transmission because it determines the amount of force transmitted to the load vs. that transmitted to the machine frame; (ii) the Hertz pressure used to evaluate the stresses produced on the contact surface between cam and roller; and (iii) the size of the mechanism, characterized by the number of cams and their width.
[ { "version": "v1", "created": "Mon, 7 May 2007 06:39:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Bouyer", "Emilie", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0895
Chazottes
C. Bonanno, J.-R. Chazottes, P. Collet
Epsilon-Distortion Complexity for Cantor Sets
null
null
null
null
math.DS cs.CC math.MG
null
We define the epsilon-distortion complexity of a set as the shortest program, running on a universal Turing machine, which produces this set at the precision epsilon in the sense of Hausdorff distance. Then, we estimate the epsilon-distortion complexity of various central Cantor sets on the line generated by iterated function systems (IFS's). In particular, the epsilon-distortion complexity of a C^k Cantor set depends, in general, on k and on its box counting dimension, contrarily to Cantor sets generated by polynomial IFS or random affine Cantor sets.
[ { "version": "v1", "created": "Mon, 7 May 2007 12:16:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Bonanno", "C.", "" ], [ "Chazottes", "J. -R.", "" ], [ "Collet", "P.", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0705.0909
Giacomo Bacci
Giacomo Bacci, Marco Luise, H. Vincent Poor
Game-Theoretic Power Control in Impulse Radio UWB Wireless Networks
Appeared in the Proceedings of the 13th European Wireless Conference, Paris, France, April 1-4, 2007
null
null
null
cs.GT cs.IT math.IT
null
In this paper, a game-theoretic model for studying power control for wireless data networks in frequency-selective multipath environments is analyzed. The uplink of an impulse-radio ultrawideband system is considered. The effects of self-interference and multiple-access interference on the performance of Rake receivers are investigated for synchronous systems. Focusing on energy efficiency, a noncooperative game is proposed in which users in the network are allowed to choose their transmit powers to maximize their own utilities, and the Nash equilibrium for the proposed game is derived. It is shown that, due to the frequency selective multipath, the noncooperative solution is achieved at different signal-to-interference-plus-noise ratios, respectively of the channel realization. A large-system analysis is performed to derive explicit expressions for the achieved utilities. The Pareto-optimal (cooperative) solution is also discussed and compared with the noncooperative approach.
[ { "version": "v1", "created": "Mon, 7 May 2007 13:58:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Bacci", "Giacomo", "" ], [ "Luise", "Marco", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0915
Joerg Rothe
Dorothea Baumeister and Joerg Rothe
Satisfiability Parsimoniously Reduces to the Tantrix(TM) Rotation Puzzle Problem
19 pages, 16 figures, appears in the Proceedings of "Machines, Computations and Universality" (MCU 2007)
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Holzer and Holzer (Discrete Applied Mathematics 144(3):345--358, 2004) proved that the Tantrix(TM) rotation puzzle problem is NP-complete. They also showed that for infinite rotation puzzles, this problem becomes undecidable. We study the counting version and the unique version of this problem. We prove that the satisfiability problem parsimoniously reduces to the Tantrix(TM) rotation puzzle problem. In particular, this reduction preserves the uniqueness of the solution, which implies that the unique Tantrix(TM) rotation puzzle problem is as hard as the unique satisfiability problem, and so is DP-complete under polynomial-time randomized reductions, where DP is the second level of the boolean hierarchy over NP.
[ { "version": "v1", "created": "Mon, 7 May 2007 14:23:20 GMT" }, { "version": "v2", "created": "Mon, 9 Jun 2008 11:28:24 GMT" } ]
2008-06-09T00:00:00
[ [ "Baumeister", "Dorothea", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0705.0932
Oliver Kosut
Oliver Kosut and Lang Tong
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors
5 pages, submitted to ISIT 2007
null
null
null
cs.IT math.IT
null
The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown number of sensors have been reprogrammed by a malicious intruder to undermine the reconstruction at the fusion center. Three different forms of the problem are considered. The first is a variable-rate setup, in which the decoder adaptively chooses the rates at which the sensors transmit. An explicit characterization of the variable-rate minimum achievable sum rate is stated, given by the maximum entropy over the set of distributions indistinguishable from the true source distribution by the decoder. In addition, two forms of the fixed-rate problem are considered, one with deterministic coding and one with randomized coding. The achievable rate regions are given for both these problems, with a larger region achievable using randomized coding, though both are suboptimal compared to variable-rate coding.
[ { "version": "v1", "created": "Mon, 7 May 2007 15:55:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Kosut", "Oliver", "" ], [ "Tong", "Lang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0933
Max Neunh\"offer
Max Neunhoeffer, Cheryl E. Praeger
Computing Minimal Polynomials of Matrices
null
null
null
null
math.RA cs.DS
null
We present and analyse a Monte-Carlo algorithm to compute the minimal polynomial of an $n\times n$ matrix over a finite field that requires $O(n^3)$ field operations and O(n) random vectors, and is well suited for successful practical implementation. The algorithm, and its complexity analysis, use standard algorithms for polynomial and matrix operations. We compare features of the algorithm with several other algorithms in the literature. In addition we present a deterministic verification procedure which is similarly efficient in most cases but has a worst-case complexity of $O(n^4)$. Finally, we report the results of practical experiments with an implementation of our algorithms in comparison with the current algorithms in the {\sf GAP} library.
[ { "version": "v1", "created": "Mon, 7 May 2007 15:48:12 GMT" }, { "version": "v2", "created": "Mon, 7 Apr 2008 12:18:34 GMT" } ]
2008-04-07T00:00:00
[ [ "Neunhoeffer", "Max", "" ], [ "Praeger", "Cheryl E.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0705.0936
Giacomo Bacci
Giacomo Bacci, Marco Luise, H. Vincent Poor
Performance Comparison of Energy-Efficient Power Control for CDMA and Multiuser UWB Networks
To appear in the Proceedings of the 16th IST Mobile and Wireless Communications Summit, Budapest, Hungary, July 1-5, 2007
null
null
null
cs.GT cs.IT math.IT
null
This paper studies the performance of a wireless data network using energy-efficient power control techniques when different multiple access schemes, namely direct-sequence code division multiple access (DS-CDMA) and impulse-radio ultrawideband (IR-UWB), are considered. Due to the large bandwidth of the system, the multipath channel is assumed to be frequency-selective. By making use of noncooperative game-theoretic models and large-system analysis tools, explicit expressions for the achieved utilities at the Nash equilibrium are derived in terms of the network parameters. A measure of the loss of DS-CDMA with respect to IR-UWB is proposed, which proves substantial equivalence between the two schemes. Simulation results are provided to validate the analysis.
[ { "version": "v1", "created": "Mon, 7 May 2007 15:58:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Bacci", "Giacomo", "" ], [ "Luise", "Marco", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0952
Tshilidzi Marwala
Dhiresh R. Surajpal and Tshilidzi Marwala
An Independent Evaluation of Subspace Face Recognition Algorithms
7 pages
null
null
null
cs.CV
null
This paper explores a comparative study of both the linear and kernel implementations of three of the most popular Appearance-based Face Recognition projection classes, these being the methodologies of Principal Component Analysis, Linear Discriminant Analysis and Independent Component Analysis. The experimental procedure provides a platform of equal working conditions and examines the ten algorithms in the categories of expression, illumination, occlusion and temporal delay. The results are then evaluated based on a sequential combination of assessment tools that facilitate both intuitive and statistical decisiveness among the intra and interclass comparisons. The best categorical algorithms are then incorporated into a hybrid methodology, where the advantageous effects of fusion strategies are considered.
[ { "version": "v1", "created": "Mon, 7 May 2007 19:19:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Surajpal", "Dhiresh R.", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0705.0956
Damien Chablat
Jorge Angeles (CIM), Damien Chablat (IRCCyN)
On Isotropic Sets of Points in the Plane. Application to the Design of Robot Archirectures
null
7th International Symposium on Advances in Robot Kinematics (2000) 1-10
null
null
cs.RO
null
Various performance indices are used for the design of serial manipulators. One method of optimization relies on the condition number of the Jacobian matrix. The minimization of the condition number leads, under certain conditions, to isotropic configurations, for which the roundoff-error amplification is lowest. In this paper, the isotropy conditions, introduced elsewhere, are the motivation behind the introduction of isotropic sets of points. By connecting together these points, we define families of isotropic manipulators. This paper is devoted to planar manipulators, the concepts being currently extended to their spatial counterparts. Furthermore, only manipulators with revolute joints are considered here.
[ { "version": "v1", "created": "Mon, 7 May 2007 18:19:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Angeles", "Jorge", "", "CIM" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0959
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
The Kinematic Analysis of a Symmetrical Three-Degree-of-Freedom Planar Parallel Manipulator
null
Symposium on Robot Design, Dynamics and Control (2004) 1-7
null
null
cs.RO
null
Presented in this paper is the kinematic analysis of a symmetrical three-degree-of-freedom planar parallel manipulator. In opposite to serial manipulators, parallel manipulators can admit not only multiple inverse kinematic solutions, but also multiple direct kinematic solutions. This property produces more complicated kinematic models but allows more flexibility in trajectory planning. To take into account this property, the notion of aspects, i.e. the maximal singularity-free domains, was introduced, based on the notion of working modes, which makes it possible to separate the inverse kinematic solutions. The aim of this paper is to show that a non-singular assembly-mode changing trajectory exist for a symmetrical planar parallel manipulator, with equilateral base and platform triangle.
[ { "version": "v1", "created": "Mon, 7 May 2007 18:28:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0960
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Uniqueness Domains in the Workspace of Parallel Manipulators
null
Syroco' 97 (1997) 1-6
null
null
cs.RO
null
This work investigates new kinematic features of parallel manipulators. It is well known that parallel manipulators admit generally several direct kinematic solutions for a given set of input joint values. The aim of this paper is to characterize the uniqueness domains in the workspace of parallel manipulators, as well as their image in the joint space. The study focuses on the most usual case of parallel manipulators with only one inverse kinematic solution. The notion of aspect introduced for serial manipulators in [Borrel 86] is redefined for such parallel manipulators. Then, it is shown that it is possible to link several solutions to the forward kinematic problem without meeting a singularity, thus meaning that the aspects are not uniqueness domains. An additional set of surfaces, namely the characteristic surfaces, are characterized which divide the workspace into basic regions and yield new uniqueness domains. This study is illustrated all along the paper with a 3-RPR planar parallel manipulator. An octree model of spaces is used to compute the joint space, the workspace and all other newly defined sets.
[ { "version": "v1", "created": "Mon, 7 May 2007 18:33:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0961
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM)
The Kinematic design of a 3-dof Hybrid Manipulator
null
2nd International Conference On Integrated Design and Manufacturing in Mechanical Engineering (1998) 1-8
null
null
cs.RO
null
This paper focuses on the kinematic properties of a new three-degree-of-freedom hybrid manipulator. This manipulator is obtained by adding in series to a five-bar planar mechanism (similar to the one studied by Bajpai and Roth) a third revolute passing through the line of centers of the two actuated revolute joints of the above linkage. The resulting architecture is hybrid in that it has both serial and parallel links. Fully-parallel manipulators are known for the existence of particularly undesirable singularities (referred to as parallel singularities) where control is lost [4] and [6]. On the other hand, due to their cantilever type of kinematic arrangement, fully serial manipulators suffer from a lack of stiffness and from relatively large positioning errors. The hybrid manipulator studied is intrinsically stiffer and more accurate. Furthermore, since all actuators are located on the first axis, the inertial effects are considerably reduced. In addition, it is shown that the special kinematic structure of our manipulator has the potential of avoiding parallel singularities by a suitable choice of the "working mode", thus leading to larger workspaces. The influence of the different structural dimensions (e.g. the link lengths) on the kinematic and mechanical properties are analysed in view of the optimal design of such hybrid manipulators.
[ { "version": "v1", "created": "Mon, 7 May 2007 18:36:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0962
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Definition sets for the Direct Kinematics of Parallel Manipulators
null
8th International Conference in Advanced Robotics (1997) 1-6
null
null
cs.RO
null
The aim of this paper is to characterize the uniqueness domains in the workspace of parallel manipulators, as well as their image in the joint space. The notion of aspect introduced for serial manipulators in [Borrel 86] is redefined for such parallel manipulators. Then, it is shown that it is possible to link several solutions to the direct kinematic problem without meeting a singularity, thus meaning that the aspects are not uniqueness domains. Additional surfaces are characterized in the workspace which yield new uniqueness domains. An octree model of spaces is used to compute the joint space, the workspace and all other newly defined sets. This study is illustrated all along the paper with a 3-RPR planar parallel manipulator.
[ { "version": "v1", "created": "Mon, 7 May 2007 18:39:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0965
Guillaume Hanrot
Guillaume Hanrot (INRIA Lorraine - LORIA), Damien Stehl\'e (INRIA Rh\^one-Alpes)
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm
null
Dans Advances in Cryptology - Crypto'07 4622 (2007) 170-186
10.1007/978-3-540-74143-5_10
null
cs.CR cs.CC
null
The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest non-zero lattice vector and a closest lattice vector to a given target vector in high dimensions. The best algorithms for these tasks are due to Kannan, and, though remarkably simple, their complexity estimates have not been improved since more than twenty years. Kannan's algorithm for solving the shortest vector problem is in particular crucial in Schnorr's celebrated block reduction algorithm, on which are based the best known attacks against the lattice-based encryption schemes mentioned above. Understanding precisely Kannan's algorithm is of prime importance for providing meaningful key-sizes. In this paper we improve the complexity analyses of Kannan's algorithms and discuss the possibility of improving the underlying enumeration strategy.
[ { "version": "v1", "created": "Mon, 7 May 2007 18:44:05 GMT" }, { "version": "v2", "created": "Wed, 9 May 2007 15:32:57 GMT" } ]
2009-04-16T00:00:00
[ [ "Hanrot", "Guillaume", "", "INRIA Lorraine - LORIA" ], [ "Stehlé", "Damien", "", "INRIA\n Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0705.0969
Tshilidzi Marwala
Ishmael S. Msiza, Fulufhelo V. Nelwamondo and Tshilidzi Marwala
Artificial Neural Networks and Support Vector Machines for Water Demand Time Series Forecasting
6 pages
null
null
null
cs.AI
null
Water plays a pivotal role in many physical processes, and most importantly in sustaining human life, animal life and plant life. Water supply entities therefore have the responsibility to supply clean and safe water at the rate required by the consumer. It is therefore necessary to implement mechanisms and systems that can be employed to predict both short-term and long-term water demands. The increasingly growing field of computational intelligence techniques has been proposed as an efficient tool in the modelling of dynamic phenomena. The primary objective of this paper is to compare the efficiency of two computational intelligence techniques in water demand forecasting. The techniques under comparison are the Artificial Neural Networks (ANNs) and the Support Vector Machines (SVMs). In this study it was observed that the ANNs perform better than the SVMs. This performance is measured against the generalisation ability of the two.
[ { "version": "v1", "created": "Mon, 7 May 2007 19:00:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Msiza", "Ishmael S.", "" ], [ "Nelwamondo", "Fulufhelo V.", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.0982
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
A New Three-DOF Parallel Mechanism: Milling Machine Applications
null
The 2nd Chemnitz Parallel Kinematics Seminar (2000) 1-9
null
null
cs.RO
null
This paper describes a new parallel kinematic architecture for machining applications, namely, the orthoglide. This machine features three fixed parallel linear joints which are mounted orthogonally and a mobile platform which moves in the Cartesian x-y-z space with fixed orientation. The main interest of the orthoglide is that it takes benefit from the advantages of the popular PPP serial machines (regular Cartesian workspace shape and uniform performances) as well as from the parallel kinematic arrangement of the links (less inertia and better dynamic performances), which makes the orthoglide well suited to high-speed machining applications. Possible extension of the orthoglide to 5-axis machining is also investigated.
[ { "version": "v1", "created": "Mon, 7 May 2007 20:01:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.0999
Oren Somekh
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, and Shlomo Shamai (Shitz)
Cellular Systems with Full-Duplex Amplify-and-Forward Relaying and Cooperative Base-Stations
To appear in the Proc. of the 2007 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2007.4557197
null
cs.IT math.IT
null
In this paper the benefits provided by multi-cell processing of signals transmitted by mobile terminals which are received via dedicated relay terminals (RTs) are assessed. Unlike previous works, each RT is assumed here to be capable of full-duplex operation and receives the transmission of adjacent relay terminals. Focusing on intra-cell TDMA and non-fading channels, a simplified uplink cellular model introduced by Wyner is considered. This framework facilitates analytical derivation of the per-cell sum-rate of multi-cell and conventional single-cell receivers. In particular, the analysis is based on the observation that the signal received at the base stations can be interpreted as the outcome of a two-dimensional linear time invariant system. Numerical results are provided as well in order to provide further insight into the performance benefits of multi-cell processing with relaying.
[ { "version": "v1", "created": "Mon, 7 May 2007 20:47:37 GMT" } ]
2016-11-18T00:00:00
[ [ "Somekh", "Oren", "", "Shitz" ], [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.1013
Elizeu Santos-Neto
Elizeu Santos-Neto, Matei Ripeanu and Adriana Iamnitchi
Tracking User Attention in Collaborative Tagging Communities
8 pages. Proceedings of International ACM/IEEE Workshop on Contextualized Attention Metadata: personalized access to digital resources (http://ariadne.cs.kuleuven.ac.be/mediawiki/index.php/Cama2007)
null
null
null
cs.DL cs.CY
null
Collaborative tagging has recently attracted the attention of both industry and academia due to the popularity of content-sharing systems such as CiteULike, del.icio.us, and Flickr. These systems give users the opportunity to add data items and to attach their own metadata (or tags) to stored data. The result is an effective content management tool for individual users. Recent studies, however, suggest that, as tagging communities grow, the added content and the metadata become harder to manage due to an ease in content diversity. Thus, mechanisms that cope with increase of diversity are fundamental to improve the scalability and usability of collaborative tagging systems. This paper analyzes whether usage patterns can be harnessed to improve navigability in a growing knowledge space. To this end, it presents a characterization of two collaborative tagging communities that target scientific literature: CiteULike and Bibsonomy. We explore three main directions: First, we analyze the tagging activity distribution across the user population. Second, we define new metrics for similarity in user interest and use these metrics to uncover the structure of the tagging communities we study. The structure we uncover suggests a clear segmentation of interests into a large number of individuals with unique preferences and a core set of users with interspersed interests. Finally, we offer preliminary results that demonstrate that the interest-based structure of the tagging community can be used to facilitate content usage as communities scale.
[ { "version": "v1", "created": "Mon, 7 May 2007 23:57:46 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2007 19:38:28 GMT" }, { "version": "v3", "created": "Thu, 14 Jun 2007 19:44:46 GMT" }, { "version": "v4", "created": "Sun, 24 Jun 2007 05:24:07 GMT" } ]
2007-06-24T00:00:00
[ [ "Santos-Neto", "Elizeu", "" ], [ "Ripeanu", "Matei", "" ], [ "Iamnitchi", "Adriana", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0705.1025
David Eppstein
David Eppstein
Recognizing Partial Cubes in Quadratic Time
25 pages, five figures. This version significantly expands previous versions, including a new report on an implementation of the algorithm and experiments with it
Journal of Graph Algorithms and Applications 15(2) 269-293, 2011
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to test whether a graph with n vertices and m edges is a partial cube, and if so how to find a distance-preserving embedding of the graph into a hypercube, in the near-optimal time bound O(n^2), improving previous O(nm)-time solutions.
[ { "version": "v1", "created": "Tue, 8 May 2007 17:59:08 GMT" }, { "version": "v2", "created": "Tue, 19 Jul 2011 22:39:16 GMT" } ]
2011-07-21T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0705.1031
Tshilidzi Marwala
F.V. Nelwamondo and T. Marwala
Fuzzy Artmap and Neural Network Approach to Online Processing of Inputs with Missing Values
7 pages
null
null
null
cs.AI
null
An ensemble based approach for dealing with missing data, without predicting or imputing the missing values is proposed. This technique is suitable for online operations of neural networks and as a result, is used for online condition monitoring. The proposed technique is tested in both classification and regression problems. An ensemble of Fuzzy-ARTMAPs is used for classification whereas an ensemble of multi-layer perceptrons is used for the regression problem. Results obtained using this ensemble-based technique are compared to those obtained using a combination of auto-associative neural networks and genetic algorithms and findings show that this method can perform up to 9% better in regression problems. Another advantage of the proposed technique is that it eliminates the need for finding the best estimate of the data, and hence, saves time.
[ { "version": "v1", "created": "Tue, 8 May 2007 05:12:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Nelwamondo", "F. V.", "" ], [ "Marwala", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.1033
Kebin Wang
Michael A. Bender, Bradley C. Kuszmaul, Shang-Hua Teng, Kebin Wang
Optimal Cache-Oblivious Mesh Layouts
null
null
null
null
cs.DS cs.CE cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mesh is a graph that divides physical space into regularly-shaped regions. Meshes computations form the basis of many applications, e.g. finite-element methods, image rendering, and collision detection. In one important mesh primitive, called a mesh update, each mesh vertex stores a value and repeatedly updates this value based on the values stored in all neighboring vertices. The performance of a mesh update depends on the layout of the mesh in memory. This paper shows how to find a memory layout that guarantees that the mesh update has asymptotically optimal memory performance for any set of memory parameters. Such a memory layout is called cache-oblivious. Formally, for a $d$-dimensional mesh $G$, block size $B$, and cache size $M$ (where $M=\Omega(B^d)$), the mesh update of $G$ uses $O(1+|G|/B)$ memory transfers. The paper also shows how the mesh-update performance degrades for smaller caches, where $M=o(B^d)$. The paper then gives two algorithms for finding cache-oblivious mesh layouts. The first layout algorithm runs in time $O(|G|\log^2|G|)$ both in expectation and with high probability on a RAM. It uses $O(1+|G|\log^2(|G|/M)/B)$ memory transfers in expectation and $O(1+(|G|/B)(\log^2(|G|/M) + \log|G|))$ memory transfers with high probability in the cache-oblivious and disk-access machine (DAM) models. The layout is obtained by finding a fully balanced decomposition tree of $G$ and then performing an in-order traversal of the leaves of the tree. The second algorithm runs faster by almost a $\log|G|/\log\log|G|$ factor in all three memory models, both in expectation and with high probability. The layout obtained by finding a relax-balanced decomposition tree of $G$ and then performing an in-order traversal of the leaves of the tree.
[ { "version": "v1", "created": "Tue, 8 May 2007 05:59:55 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 18:45:25 GMT" } ]
2009-10-05T00:00:00
[ [ "Bender", "Michael A.", "" ], [ "Kuszmaul", "Bradley C.", "" ], [ "Teng", "Shang-Hua", "" ], [ "Wang", "Kebin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0705.1036
Damien Chablat
Damien Chablat (IRCCyN), Jorge Angeles (CIM)
Strategies for the Design of a Slide-o-Cam Transmission
null
Proceedings of CK2005, International Workshop on Computational Kinematics (10/05/2005) 1-10
null
null
cs.RO
null
The optimization of the pressure angle in a cam-follower transmission is reported in this paper. This transmission is based on Slide-o-Cam, a cam mechanism with multiple rollers mounted on a common translating follower. The design of Slide-o-Cam, a transmission intended to produce a sliding motion from a turning drive, or vice versa, was reported elsewhere. This transmission provides pure-rolling motion, thereby reducing the friction of rack-and-pinions and linear drives. The pressure angle is a suitable performance index for this transmission because it determines the amount of force transmitted to the load vs. that transmitted to the machine frame. Two alternative design strategies are studied, namely, (i) increase the number of lobes on each cam or (ii) increase the number of cams. This device is intended to replace the current ball-screws in Orthoglide, a three-DOF parallel robot for the production of translational motions, currently under development at Ecole Centrale de Nantes for machining applications.
[ { "version": "v1", "created": "Tue, 8 May 2007 07:09:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1037
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Regions of Feasible Point-to-Point Trajectories in the Cartesian Workspace of Fully-Parallel Manipulators
null
25th Design Automation Conference (1999) 1-6
null
null
cs.RO
null
The goal of this paper is to define the n-connected regions in the Cartesian workspace of fully-parallel manipulators, i.e. the maximal regions where it is possible to execute point-to-point motions. The manipulators considered in this study may have multiple direct and inverse kinematic solutions. The N-connected regions are characterized by projection, onto the Cartesian workspace, of the connected components of the reachable configuration space defined in the Cartesian product of the Cartesian space by the joint space. Generalized octree models are used for the construction of all spaces. This study is illustrated with a simple planar fully-parallel manipulator.
[ { "version": "v1", "created": "Tue, 8 May 2007 07:11:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1038
Damien Chablat
F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
The Design of Parallel Kinematic Machine Tools Using Kinetostatic Performance Criteria
null
3d Int. Conference on Metal Cutting (2001) 1-10
null
null
cs.RO
null
Most industrial machine tools have a serial kinematic architecture, which means that each axis has to carry the following one, including its actuators and joints. High Speed Machining highlights some drawbacks of such architectures: heavy moving parts require from the machine structure high stiffness to limit bending problems that lower the machine accuracy, and limit the dynamic performances of the feed axes. That is why PKMs attract more and more researchers and companies, because they are claimed to offer several advantages over their serial counterparts, like high structural rigidity and high dynamic capacities. Indeed, the parallel kinematic arrangement of the links provides higher stiffness and lower moving masses that reduce inertia effects. Thus, PKMs have better dynamic performances. However, the design of a parallel kinematic machine tool (PKMT) is a hard task that requires further research studies before wide industrial use can be expected. Many criteria need to be taken into account in the design of a PKMT. We pay special attention to the description of kinetostatic criteria that rely on the conditioning of the Jacobian matrix of the mechanism. The organisation of this paper is as follows: next section introduces general remarks about PKMs, then is explained why PKMs can be interesting alternative machine tool designs. Then are presented existing PKMTs. An application to the design of a small-scale machine tool prototype developed at IRCCyN is presented at the end of this paper.
[ { "version": "v1", "created": "Tue, 8 May 2007 07:13:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Majou", "Félix", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1110
Edgar Graaf de
Edgar de Graaf Joost Kok Walter Kosters
Mining Patterns with a Balanced Interval
null
null
null
null
cs.AI cs.DB
null
In many applications it will be useful to know those patterns that occur with a balanced interval, e.g., a certain combination of phone numbers are called almost every Friday or a group of products are sold a lot on Tuesday and Thursday. In previous work we proposed a new measure of support (the number of occurrences of a pattern in a dataset), where we count the number of times a pattern occurs (nearly) in the middle between two other occurrences. If the number of non-occurrences between two occurrences of a pattern stays almost the same then we call the pattern balanced. It was noticed that some very frequent patterns obviously also occur with a balanced interval, meaning in every transaction. However more interesting patterns might occur, e.g., every three transactions. Here we discuss a solution using standard deviation and average. Furthermore we propose a simpler approach for pruning patterns with a balanced interval, making estimating the pruning threshold more intuitive.
[ { "version": "v1", "created": "Tue, 8 May 2007 15:22:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kosters", "Edgar de Graaf Joost Kok Walter", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0705.1148
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
S\'eparation des Solutions aux Mod\`eles G\'eom\'etriques Direct et Inverse pour les Manipulateurs Pleinement Parall\`eles
null
Journal of Mechanism and Machine Theory 36, 6 (2001) 763-783
null
null
cs.RO
null
This article provides a formalism making it possible to manage the solutions of the direct and inverse kinematic models of the fully parallel manipulators. We introduce the concept of working modes to separate the solutions from the opposite geometrical model. Then, we define, for each working mode, the aspects of these manipulators. To separate the solutions from the direct kinematics model, we introduce the concept of characteristic surfaces. Then, we define the uniqueness domains, as being the greatest domains of the workspace in which there is unicity of solutions. The principal applications of this work are the design, the trajectory planning.
[ { "version": "v1", "created": "Tue, 8 May 2007 19:10:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1150
Damien Chablat
Damien Chablat (IRCCyN), Jorge Angeles (CIM)
On the Kinetostatic Optimization of Revolute-Coupled Planar Manipulators
null
Journal of Mechanism and Machine Theory (2002) 351-374
null
null
cs.RO
null
Proposed in this paper is a kinetostatic performance index for the optimum dimensioning of planar manipulators of the serial type. The index is based on the concept of distance of the underlying Jacobian matrix to a given isotropic matrix that is used as a reference model for purposes of performance evaluation. Applications of the index fall in the realm of design, but control applications are outlined. The paper focuses on planar manipulators, the basic concepts being currently extended to their three-dimensional counterparts.
[ { "version": "v1", "created": "Tue, 8 May 2007 19:11:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1151
Mustafa Cenk Gursoy
Junwei Zhang, Mustafa Cenk Gursoy
Achievable Rates and Optimal Resource Allocation for Imperfectly-Known Fading Relay Channels
null
null
null
null
cs.IT math.IT
null
In this paper, achievable rates of imperfectly-known fading relay channels are studied. It is assumed that communication starts with the network training phase in which the receivers estimate the fading coefficients of their respective channels. In the data transmission phase, amplify-and-forward and decode-and-forward relaying schemes are considered, and the corresponding achievable rate expressions are obtained. The achievable rate expressions are then employed to identify the optimal resource allocation strategies.
[ { "version": "v1", "created": "Tue, 8 May 2007 19:21:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhang", "Junwei", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.1159
Andrew Eckford
Andrew W. Eckford
Ordering Finite-State Markov Channels by Mutual Information
5 pages, no figures. To be presented at the 2007 IEEE International Symposium on Information Theory, Nice, France, June 2007
null
null
null
cs.IT math.IT
null
In previous work, an ordering result was given for the symbolwise probability of error using general Markov channels, under iterative decoding of LDPC codes. In this paper, the ordering result is extended to mutual information, under the assumption of an iid input distribution. For certain channels, in which the capacity-achieving input distribution is iid, this allows ordering of the channels by capacity. The complexity of analyzing general Markov channels is mitigated by this ordering, since it is possible to immediately determine that a wide class of channels, with different numbers of states, has a smaller mutual information than a given channel.
[ { "version": "v1", "created": "Tue, 8 May 2007 20:48:18 GMT" } ]
2007-07-13T00:00:00
[ [ "Eckford", "Andrew W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.1161
Lillian Lee
Lillian Lee
IDF revisited: A simple new derivation within the Robertson-Sp\"arck Jones probabilistic model
To appear, Proceedings of SIGIR 2007, poster paper (2 pages)
null
null
null
cs.IR cs.CL
null
There have been a number of prior attempts to theoretically justify the effectiveness of the inverse document frequency (IDF). Those that take as their starting point Robertson and Sparck Jones's probabilistic model are based on strong or complex assumptions. We show that a more intuitively plausible assumption suffices. Moreover, the new assumption, while conceptually very simple, provides a solution to an estimation problem that had been deemed intractable by Robertson and Walker (1997).
[ { "version": "v1", "created": "Tue, 8 May 2007 20:08:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Lillian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0705.1183
Ruoheng Liu
Ruoheng Liu and H. Vincent Poor
Multiple Antenna Secure Broadcast over Wireless Networks
14 pages, 3 figures, to appear in the Proceedings of the First International Workshop on Information Theory for Sensor Networks, Santa Fe, NM, June 18 - 20, 2007
null
null
null
cs.IT math.IT
null
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users with perfect secrecy. That is, each user would like to obtain its own message reliably and confidentially. First, a computable Sato-type outer bound on the secrecy capacity region is provided for a multi-antenna broadcast channel with confidential messages. Next, a dirty-paper secure coding scheme and its simplified version are described. For each case, the corresponding achievable rate region is derived under the perfect secrecy requirement. Finally, two numerical examples demonstrate that the Sato-type outer bound is consistent with the boundary of the simplified dirty-paper coding secrecy rate region.
[ { "version": "v1", "created": "Tue, 8 May 2007 21:50:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.1187
Sergey Loyka
Sergey Loyka, Victoria Kostina, Francois Gagnon
Symbol Error Rates of Maximum-Likelihood Detector: Convex/Concave Behavior and Applications
To appear in 2007 IEEE International Symposium on Information Theory (ISIT 2007), Nice, June 2007
null
10.1109/ISIT.2007.4557176
null
cs.IT math.IT
null
Convexity/concavity properties of symbol error rates (SER) of the maximum likelihood detector operating in the AWGN channel (non-fading and fading) are studied. Generic conditions are identified under which the SER is a convex/concave function of the SNR. Universal bounds for the SER 1st and 2nd derivatives are obtained, which hold for arbitrary constellations and are tight for some of them. Applications of the results are discussed, which include optimum power allocation in spatial multiplexing systems, optimum power/time sharing to decrease or increase (jamming problem) error rate, and implication for fading channels.
[ { "version": "v1", "created": "Tue, 8 May 2007 23:18:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Loyka", "Sergey", "" ], [ "Kostina", "Victoria", "" ], [ "Gagnon", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.1209
Tshilidzi Marwala
E. Habtemariam, T. Marwala and M. Lagazio
Artificial Intelligence for Conflict Management
20 pages
null
null
null
cs.AI
null
Militarised conflict is one of the risks that have a significant impact on society. Militarised Interstate Dispute (MID) is defined as an outcome of interstate interactions, which result on either peace or conflict. Effective prediction of the possibility of conflict between states is an important decision support tool for policy makers. In a previous research, neural networks (NNs) have been implemented to predict the MID. Support Vector Machines (SVMs) have proven to be very good prediction techniques and are introduced for the prediction of MIDs in this study and compared to neural networks. The results show that SVMs predict MID better than NNs while NNs give more consistent and easy to interpret sensitivity analysis than SVMs.
[ { "version": "v1", "created": "Wed, 9 May 2007 05:53:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Habtemariam", "E.", "" ], [ "Marwala", "T.", "" ], [ "Lagazio", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.1214
Tshilidzi Marwala
Tshilidzi Marwala
Control of Complex Systems Using Bayesian Networks and Genetic Algorithm
6 pages
null
null
null
cs.CE cs.NE
null
A method based on Bayesian neural networks and genetic algorithm is proposed to control the fermentation process. The relationship between input and output variables is modelled using Bayesian neural network that is trained using hybrid Monte Carlo method. A feedback loop based on genetic algorithm is used to change input variables so that the output variables are as close to the desired target as possible without the loss of confidence level on the prediction that the neural network gives. The proposed procedure is found to reduce the distance between the desired target and measured outputs significantly.
[ { "version": "v1", "created": "Wed, 9 May 2007 07:08:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0705.1215
Damien Chablat
Anatoly Pashkevich (Robotic Laboratory), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Kinematic Calibration of the Orthoglide-Type Mechanisms
null
Symposium on Information Control Problems in Manufacturing (2006) 1-6
null
null
cs.RO
null
The paper proposes a novel calibration approach for the Orthoglide-type mechanisms based on observations of the manipulator leg parallelism during motions between the prespecified test postures. It employs a low-cost measuring system composed of standard comparator indicators attached to the universal magnetic stands. They are sequentially used for measuring the deviation of the relevant leg location while the manipulator moves the TCP along the Cartesian axes. Using the measured differences, the developed algorithm estimates the joint offsets that are treated as the most essential parameters to be adjusted. The sensitivity of the measurement methods and the calibration accuracy are also studied. Experimental results are presented that demonstrate validity of the proposed calibration technique.
[ { "version": "v1", "created": "Wed, 9 May 2007 07:21:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Pashkevich", "Anatoly", "", "Robotic Laboratory" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1217
Damien Chablat
J\'erome Renotte (IRCCyN), Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Design of a Novel Prismatic Drive for a Three-DOF Parallel-Kinematics Machine
null
ASME Design Engineering Technical Conferences (2004) 1-10
null
null
cs.RO
null
The design of a novel prismatic drive is reported in this paper. This transmission is based on Slide-O-Cam, a cam mechanism with multiple rollers mounted on a common translating follower. The design of Slide-O-Cam was reported elsewhere. This drive thus provides pure-rolling motion, thereby reducing the friction of rack-and-pinions and linear drives. Such properties can be used to design new transmissions for parallel-kinematics machines. In this paper, this transmission is optimized to replace ball-screws in Orthoglide, a three-DOF parallel robot optimized for machining applications.
[ { "version": "v1", "created": "Wed, 9 May 2007 07:27:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Renotte", "Jérome", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1218
Damien Chablat
Anatoly Pashkevich (ROBOTIC Laboratory), Roman Gomolitsky (ROBOTIC Laboratory), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Calibration of quasi-isotropic parallel kinematic Machines: Orthoglide
null
Fourth International Conference on Informatics in Control, Automation and Robotics (09/05/2007) 1-8
null
null
cs.RO
null
The paper proposes a novel approach for the geometrical model calibration of quasi-isotropic parallel kinematic mechanisms of the Orthoglide family. It is based on the observations of the manipulator leg parallelism during motions between the specific test postures and employs a low-cost measuring system composed of standard comparator indicators attached to the universal magnetic stands. They are sequentially used for measuring the deviation of the relevant leg location while the manipulator moves the TCP along the Cartesian axes. Using the measured differences, the developed algorithm estimates the joint offsets and the leg lengths that are treated as the most essential parameters. Validity of the proposed calibration technique is confirmed by the experimental results.
[ { "version": "v1", "created": "Wed, 9 May 2007 07:30:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pashkevich", "Anatoly", "", "ROBOTIC Laboratory" ], [ "Gomolitsky", "Roman", "", "ROBOTIC\n Laboratory" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1227
Petar Popovski
Petar Popovski, Hiroyuki Yomo, Kentaro Nishimori, and Rocco Di Taranto
Rate Adaptation for Cognitive Radio under Interference from Primary Spectrum User
submitted to IEEE Journal on Selected Areas in Communications "Cognitive Radio: Theory and Applications", March 2007
null
null
null
cs.IT cs.NI math.IT
null
A cognitive radio can operate as a secondary system in a given spectrum. This operation should use limited power in order not to disturb the communication by primary spectrum user. Under such conditions, in this paper we investigate how to maximize the spectral efficiency in the secondary system. A secondary receiver observes a multiple access channel of two users, the secondary and the primary transmitter, respectively. We show that, for spectrally-efficient operation, the secondary system should apply Opportunistic Interference Cancellation (OIC). With OIC, the secondary system decodes the primary signal when such an opportunity is created by the primary rate and the power received from the primary system. For such an operation, we derive the achievable data rate in the secondary system. When the primary signal is decodable, we devise a method, based on superposition coding, by which the secondary system can achieve the maximal possible rate. Finally, we investigate the power allocation in the secondary system when multiple channels are used. We show that the optimal power allocation with OIC can be achieved through intercepted water-filling instead of the conventional water-filling. The results show a significant gain for the rate achieved through an opportunistic interference cancellation.
[ { "version": "v1", "created": "Wed, 9 May 2007 08:50:53 GMT" } ]
2007-07-13T00:00:00
[ [ "Popovski", "Petar", "" ], [ "Yomo", "Hiroyuki", "" ], [ "Nishimori", "Kentaro", "" ], [ "Di Taranto", "Rocco", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.1244
Marc Schoenauer
Nicolas Godzik (INRIA Futurs, INRIA Rocquencourt), Marc Schoenauer (INRIA Futurs, INRIA Rocquencourt), Mich\`ele Sebag (INRIA Futurs, LRI)
Evolving Symbolic Controllers
null
Dans 4th European Workshop on Evolutionary Robotics, 2611 (2003) 638-650
null
null
cs.AI
null
The idea of symbolic controllers tries to bridge the gap between the top-down manual design of the controller architecture, as advocated in Brooks' subsumption architecture, and the bottom-up designer-free approach that is now standard within the Evolutionary Robotics community. The designer provides a set of elementary behavior, and evolution is given the goal of assembling them to solve complex tasks. Two experiments are presented, demonstrating the efficiency and showing the recursiveness of this approach. In particular, the sensitivity with respect to the proposed elementary behaviors, and the robustness w.r.t. generalization of the resulting controllers are studied in detail.
[ { "version": "v1", "created": "Wed, 9 May 2007 09:53:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Godzik", "Nicolas", "", "INRIA Futurs, INRIA Rocquencourt" ], [ "Schoenauer", "Marc", "", "INRIA Futurs, INRIA Rocquencourt" ], [ "Sebag", "Michèle", "", "INRIA Futurs, LRI" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.1271
Damien Chablat
F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Design of a 3 Axis Parallel Machine Tool for High Speed Machining: The Orthoglide
null
4\`eme Conf\'erence Internationale sur la Conception et la fabrication Int\'egr\'ees en M\'ecanique (2002) 1-10
null
null
cs.RO
null
The Orthoglide project aims at designing a new 3-axis machine tool for High Speed Machining. Basis kinematics is a 3 degree-of-freedom translational parallel mechanism. This basis was submitted to isotropic and manipulability constraints that allowed the optmization of its kinematic architecture and legs architecture. Thus, several leg morphologies are convenient for the chosen mechanism. We explain the process that led us to the choice we made for the Orthoglide. A static study is presented to show how singular configurations of the legs can cause stiffness problems.
[ { "version": "v1", "created": "Wed, 9 May 2007 12:23:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Majou", "Félix", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1272
Damien Chablat
Damien Chablat (IRCCyN), St\'ephane Caro (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM)
The Isoconditioning Loci of Planar Three-DOF Parallel Manipulators
null
4\`eme Conf\'erence Internationale sur la Conception et la fabrication Int\'egr\'ees en M\'ecanique (2002) 1-10
null
null
cs.RO
null
The subject of this paper is a special class of parallel manipulators. First, we analyze a family of three-degree-of-freedom manipulators. Two Jacobian matrices appear in the kinematic relations between the joint-rate and the Cartesian-velocity vectors, which are called the "inverse kinematics" and the "direct kinematics" matrices. The singular configurations of these matrices are studied. The isotropic configurations are then studied based on the characteristic length of this manipulator. The isoconditioning loci of all Jacobian matrices are computed to define a global performance index to compare the different working modes.
[ { "version": "v1", "created": "Wed, 9 May 2007 12:27:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1280
Damien Chablat
F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
A Novel method for the design of 2-DOF Parallel mechanisms for machining applications
null
8th International Symposium on Advances in Robot Kinematics (2002) 1-11
null
null
cs.RO
null
Parallel Kinematic Mechanisms (PKM) are interesting alternative designs for machine tools. A design method based on velocity amplification factors analysis is presented in this paper. The comparative study of two simple two-degree-of-freedom PKM dedicated to machining applications is led through this method: the common desired properties are the largest square Cartesian workspace for given kinetostatic performances. The orientation and position of the Cartesian workspace are chosen to avoid singularities and to produce the best ratio between Cartesian workspace size and mechanism size. The machine size of each resulting design is used as a comparative criterion.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:18:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Majou", "Félix", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1282
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Design of a Three-Axis Isotropic Parallel Manipulator for Machining Applications: The Orthoglide
null
Workshop on Fundamental Issues and Future Research Directions for Parallel Mechanisms and Manipulators (2002) 1-9
null
null
cs.RO
null
The orthoglide is a 3-DOF parallel mechanism designed at IRCCyN for machining applications. It features three fixed parallel linear joints which are mounted orthogonally and a mobile platform which moves in the Cartesian x-y-z space with fixed orientation. The orthoglide has been designed as function of a prescribed Cartesian workspace with prescribed kinetostatic performances. The interesting features of the orthoglide are a regular Cartesian workspace shape, uniform performances in all directions and good compactness. A small-scale prototype of the orthoglide under development is presented at the end of this paper.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:23:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1284
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jean-Pierre Merlet (COPRIN)
Workspace Analysis of the Orthoglide using Interval Analysis
null
8th International Symposium on Advances in Robot Kinematics, Kluwer Academic Publishers (2002) 1-10
null
null
cs.RO
null
This paper addresses the workspace analysis of the orthoglide, a 3-DOF parallel mechanism designed for machining applications. This machine features three fixed parallel linear joints which are mounted orthogonally and a mobile platform which moves in the Cartesian x-y-z space with fixed orientation. The workspace analysis is conducted on the bases of prescribed kinetostatic performances. The interesting features of the orthoglide are a regular Cartesian workspace shape, uniform performances in all directions and good compactness. Interval analysis based methods for computing the dextrous workspace and the largest cube enclosed in this workspace are presented.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:24:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Merlet", "Jean-Pierre", "", "COPRIN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1285
Damien Chablat
Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Bernard Hoessler, Matthieu Guibert
P\'eriph\'eriques haptiques et simulation d'objets, de robots et de mannequins dans un environnement de CAO-Robotique : eM-Virtual Desktop
null
Virtual Concept (2002) 51-56
null
null
cs.RO
null
This paper presents the development of a new software in order to manage objects, robots and mannequins in using the possibilities given by the haptic feedback of the Phantom desktop devices. The haptic device provides 6 positional degree of freedom sensing but three degrees force feedback. This software called eM-Virtual Desktop is integrated in the Tecnomatix's solution called eM-Workplace. The eM-Workplace provides powerful solutions for planning and designing of complex assembly facilities, lines and workplaces. In the digital mockup context, the haptic interfaces can be used to reduce the development cycle of products. Three different loops are used to manage the graphic, the collision detection and the haptic feedback according to theirs own frequencies. The developed software is currently tested in industrial context by a European automotive constructor.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:26:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Hoessler", "Bernard", "" ], [ "Guibert", "Matthieu", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0705.1288
Tshilidzi Marwala
E. Marais, T. Marwala
Predicting the Presence of Internet Worms using Novelty Detection
12 pages
null
null
null
cs.CR
null
Internet worms cause billions of dollars in damage yearly, affecting millions of users worldwide. For countermeasures to be deployed timeously, it is necessary to use an automated system to detect the spread of a worm. This paper discusses a method of determining the presence of a worm, based on routing information currently available from Internet routers. An autoencoder, which is a specialized type of neural network, was used to detect anomalies in normal routing behavior. The autoencoder was trained using information from a single router, and was able to detect both global instability caused by worms as well as localized routing instability.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:33:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Marais", "E.", "" ], [ "Marwala", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0705.1309
Marc Schoenauer
Alexandre Devert (INRIA Futurs), Nicolas Bred\`eche (INRIA Futurs), Marc Schoenauer (INRIA Futurs)
Robust Multi-Cellular Developmental Design
null
Dans Genetic and Evolutionary Computation COnference (2007)
null
null
cs.AI
null
This paper introduces a continuous model for Multi-cellular Developmental Design. The cells are fixed on a 2D grid and exchange "chemicals" with their neighbors during the growth process. The quantity of chemicals that a cell produces, as well as the differentiation value of the cell in the phenotype, are controlled by a Neural Network (the genotype) that takes as inputs the chemicals produced by the neighboring cells at the previous time step. In the proposed model, the number of iterations of the growth process is not pre-determined, but emerges during evolution: only organisms for which the growth process stabilizes give a phenotype (the stable state), others are declared nonviable. The optimization of the controller is done using the NEAT algorithm, that optimizes both the topology and the weights of the Neural Networks. Though each cell only receives local information from its neighbors, the experimental results of the proposed approach on the 'flags' problems (the phenotype must match a given 2D pattern) are almost as good as those of a direct regression approach using the same model with global information. Moreover, the resulting multi-cellular organisms exhibit almost perfect self-healing characteristics.
[ { "version": "v1", "created": "Wed, 9 May 2007 15:33:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Devert", "Alexandre", "", "INRIA Futurs" ], [ "Bredèche", "Nicolas", "", "INRIA Futurs" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.1336
Sergey Loyka
Sergey Loyka, George Levin
Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems
To appear in 2007 IEEE International Symposium on Information Theory (ISIT 2007), Nice, June 2007
null
10.1109/ISIT.2007.4557189
null
cs.IT math.IT
null
Diversity-multiplexing tradeoff (DMT) presents a compact framework to compare various MIMO systems and channels in terms of the two main advantages they provide (i.e. high data rate and/or low error rate). This tradeoff was characterized asymptotically (SNR-> infinity) for i.i.d. Rayleigh fading channel by Zheng and Tse [1]. The asymptotic DMT overestimates the finite-SNR one [2]. In this paper, using the recent results on the asymptotic (in the number of antennas) outage capacity distribution, we derive and analyze the finite-SNR DMT for a broad class of channels (not necessarily Rayleigh fading). Based on this, we give the convergence conditions for the asymptotic DMT to be approached by the finite-SNR one. The multiplexing gain definition is shown to affect critically the convergence point: when the multiplexing gain is defined via the mean (ergodic) capacity, the convergence takes place at realistic SNR values. Furthermore, in this case the diversity gain can also be used to estimate the outage probability with reasonable accuracy. The multiplexing gain definition via the high-SNR asymptote of the mean capacity (as in [1]) results in very slow convergence for moderate to large systems (as 1/ln(SNR)^2) and, hence, the asymptotic DMT cannot be used at realistic SNR values. For this definition, the high-SNR threshold increases exponentially in the number of antennas and in the multiplexing gain. For correlated keyhole channel, the diversity gain is shown to decrease with correlation and power imbalance of the channel. While the SNR-asymptotic DMT of Zheng and Tse does not capture this effect, the size-asymptotic DMT does.
[ { "version": "v1", "created": "Wed, 9 May 2007 17:49:54 GMT" } ]
2016-11-15T00:00:00
[ [ "Loyka", "Sergey", "" ], [ "Levin", "George", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]