id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0705.0124 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy | On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision
Detection | To appear in the Proc. of the 2007 IEEE International Symposium on
Information Theory | null | 10.1109/ISIT.2007.4557221 | null | cs.IT math.IT | null | The low-snr capacity of M-ary PSK transmission over both the additive white
Gaussian noise (AWGN) and fading channels is analyzed when hard-decision
detection is employed at the receiver. Closed-form expressions for the first
and second derivatives of the capacity at zero snr are obtained. The
spectral-efficiency/bit-energy tradeoff in the low-snr regime is analyzed by
finding the wideband slope and the bit energy required at zero spectral
efficiency. Practical design guidelines are drawn from the
information-theoretic analysis. The fading channel analysis is conducted for
both coherent and noncoherent cases, and the performance penalty in the
low-power regime for not knowing the channel is identified.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 15:38:30 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0128 | Mustafa Cenk Gursoy | Sami Akin, Mustafa Cenk Gursoy | Training Optimization for Gauss-Markov Rayleigh Fading Channels | To appear in the Proc. of the 2007 IEEE International Conference on
Communications | null | 10.1109/ICC.2007.994 | null | cs.IT math.IT | null | In this paper, pilot-assisted transmission over Gauss-Markov Rayleigh fading
channels is considered. A simple scenario, where a single pilot signal is
transmitted every T symbols and T-1 data symbols are transmitted in between the
pilots, is studied. First, it is assumed that binary phase-shift keying (BPSK)
modulation is employed at the transmitter. With this assumption, the training
period, and data and training power allocation are jointly optimized by
maximizing an achievable rate expression. Achievable rates and energy-per-bit
requirements are computed using the optimal training parameters. Secondly, a
capacity lower bound is obtained by considering the error in the estimate as
another source of additive Gaussian noise, and the training parameters are
optimized by maximizing this lower bound.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 16:04:39 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Akin",
"Sami",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0130 | Mustafa Cenk Gursoy | Qingyun Wang, Mustafa Cenk Gursoy | Performance Analysis for Multichannel Reception of OOFSK Signaling | Proc. of the 2007 IEEE Wireless Communications and Networking
Conference | null | 10.1109/WCNC.2007.444 | null | cs.IT math.IT | null | In this paper, the error performance of on-off frequency shift keying (OOFSK)
modulation over fading channels is analyzed when the receiver is equipped with
multiple antennas. The analysis is conducted in two cases: the coherent
scenario where the fading is perfectly known at the receiver, and the
noncoherent scenario where neither the receiver nor the transmitter knows the
fading coefficients. For both cases, the maximum a posteriori probability (MAP)
detection rule is derived and analytical probability of error expressions are
obtained. The effect of fading correlation among the receiver antennas is also
studied. Simulation results indicate that for sufficiently low duty cycle
values, lower probability of error values with respect to FSK signaling are
achieved. Equivalently, when compared to FSK modulation, OOFSK with low duty
cycle requires less energy to achieve the same probability of error, which
renders this modulation a more energy efficient transmission technique.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 16:11:28 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Wang",
"Qingyun",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0132 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy | Error Probability Analysis of Peaky Signaling over Fading Channels | Proc. of the 40th Annual Asilomar Conference on Signals, Systems, and
Computers, 2006 | null | null | null | cs.IT math.IT | null | In this paper, the performance of signaling strategies with high
peak-to-average power ratio is analyzed in both coherent and noncoherent fading
channels. Two recently proposed modulation schemes, namely on-off binary
phase-shift keying and on-off quaternary phase-shift keying, are considered.
For these modulation formats, the optimal decision rules used at the detector
are identified and analytical expressions for the error probabilities are
obtained. Numerical techniques are employed to compute the error probabilities.
It is concluded that increasing the peakedness of the signals results in
reduced error rates for a given power level and hence improve the energy
efficiency.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 16:20:05 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0150 | Myung-Sin Song | Palle E. T. Jorgensen, Myung-Sin Song | Comparison of Discrete and Continuous Wavelet Transforms | 22 pages, Springer Encyclopedia of Complexity and Systems Science,
the full version with figures is available at
http://www.siue.edu/~msong/Research/ency.pdf | null | null | null | cs.CE | null | In this paper we outline several points of view on the interplay between
discrete and continuous wavelet transforms; stressing both pure and applied
aspects of both. We outline some new links between the two transform
technologies based on the theory of representations of generators and
relations. By this we mean a finite system of generators which are represented
by operators in Hilbert space. We further outline how these representations
yield sub-band filter banks for signal and image processing algorithms.
| [
{
"version": "v1",
"created": "Tue, 1 May 2007 18:24:52 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Aug 2007 17:53:30 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Jorgensen",
"Palle E. T.",
""
],
[
"Song",
"Myung-Sin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0705.0178 | Abhishek Parakh | Abhishek Parakh | Oblivious Transfer based on Key Exchange | 10 pages | Cryptologia, Volume 32, Issue 1 January 2008, pages 37 - 44 | 10.1080/01611190701593228 | null | cs.CR | null | Key-exchange protocols have been overlooked as a possible means for
implementing oblivious transfer (OT). In this paper we present a protocol for
mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to
Diffie-Hellman protocol using the idea of obliviously exchanging encryption
keys. Since, Diffie-Hellman scheme is widely used, our protocol may provide a
useful alternative to the conventional methods for implementation of oblivious
transfer and a useful primitive in building larger cryptographic schemes.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 02:56:25 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Parakh",
"Abhishek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0705.0197 | Tshilidzi Marwala | Tshilidzi Marwala, Unathi Mahola and Snehashish Chakraverty | Fault Classification in Cylinders Using Multilayer Perceptrons, Support
Vector Machines and Guassian Mixture Models | 10 pages, 2 figures, 4 tables | Computer Assisted Mechanics and Engineering Sciences, Vol. 14, No.
2, 2007. | null | null | cs.AI | null | Gaussian mixture models (GMM) and support vector machines (SVM) are
introduced to classify faults in a population of cylindrical shells. The
proposed procedures are tested on a population of 20 cylindrical shells and
their performance is compared to the procedure, which uses multi-layer
perceptrons (MLP). The modal properties extracted from vibration data are used
to train the GMM, SVM and MLP. It is observed that the GMM produces 98%, SVM
produces 94% classification accuracy while the MLP produces 88% classification
rates.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 03:13:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marwala",
"Tshilidzi",
""
],
[
"Mahola",
"Unathi",
""
],
[
"Chakraverty",
"Snehashish",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.0199 | Erik Berglund | Erik Berglund, Joaquin Sitte | The Parameter-Less Self-Organizing Map algorithm | 29 pages, 27 figures. Based on publication in IEEE Trans. on Neural
Networks | IEEE Transactions on Neural Networks, 2006 v.17, n.2, pp.305-316 | null | null | cs.NE cs.AI cs.CV | null | The Parameter-Less Self-Organizing Map (PLSOM) is a new neural network
algorithm based on the Self-Organizing Map (SOM). It eliminates the need for a
learning rate and annealing schemes for learning rate and neighbourhood size.
We discuss the relative performance of the PLSOM and the SOM and demonstrate
some tasks in which the SOM fails but the PLSOM performs satisfactory. Finally
we discuss some example applications of the PLSOM and present a proof of
ordering under certain limited conditions.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 04:04:51 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 01:06:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berglund",
"Erik",
""
],
[
"Sitte",
"Joaquin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.0204 | Tshilidzi Marwala | Lukasz A. Machowski, and Tshilidzi Marwala | Using Images to create a Hierarchical Grid Spatial Index | In Proceedings of the IEEE International Conference on Systems, Man
and Cybernetics, Taiwan, 2006, pp. 1974-1979 | null | 10.1109/ICSMC.2006.385020 | null | cs.DS | null | This paper presents a hybrid approach to spatial indexing of two dimensional
data. It sheds new light on the age old problem by thinking of the traditional
algorithms as working with images. Inspiration is drawn from an analogous
situation that is found in machine and human vision. Image processing
techniques are used to assist in the spatial indexing of the data. A fixed grid
approach is used and bins with too many records are sub-divided hierarchically.
Search queries are pre-computed for bins that do not contain any data records.
This has the effect of dividing the search space up into non rectangular
regions which are based on the spatial properties of the data. The bucketing
quad tree can be considered as an image with a resolution of two by two for
each layer. The results show that this method performs better than the quad
tree if there are more divisions per layer. This confirms our suspicions that
the algorithm works better if it gets to look at the data with higher
resolution images. An elegant class structure is developed where the
implementation of concrete spatial indexes for a particular data type merely
relies on rendering the data onto an image.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 05:37:32 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Machowski",
"Lukasz A.",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.0214 | Mourad Zerai | Mourad Zerai, Maher Moakher | Riemannian level-set methods for tensor-valued data | 11 pages, 03 figures, to be published in the proceedings of SSVM
2007, LNCS Springer | null | null | null | cs.CV | null | We present a novel approach for the derivation of PDE modeling
curvature-driven flows for matrix-valued data. This approach is based on the
Riemannian geometry of the manifold of Symmetric Positive Definite Matrices
Pos(n).
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 07:32:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zerai",
"Mourad",
""
],
[
"Moakher",
"Maher",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.0252 | Khoa Nguyen | Khoa D. Nguyen, Albert Guillen i Fabregas and Lars K. Rasmussen | Power Allocation for Discrete-Input Non-Ergodic Block-Fading Channels | 6 pages, 4 figures, submitted to Information Theory Workshop 2007 | null | null | null | cs.IT math.IT | null | We consider power allocation algorithms for fixed-rate transmission over
Nakagami-m non-ergodic block-fading channels with perfect transmitter and
receiver channel state information and discrete input signal constellations
under both short- and long-term power constraints. Optimal power allocation
schemes are shown to be direct applications of previous results in the
literature. We show that the SNR exponent of the optimal short-term scheme is
given by the Singleton bound. We also illustrate the significant gains
available by employing long-term power constraints. Due to the nature of the
expressions involved, the complexity of optimal schemes may be prohibitive for
system implementation. We propose simple sub-optimal power allocation schemes
whose outage probability performance is very close to the minimum outage
probability obtained by optimal schemes.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 11:36:53 GMT"
},
{
"version": "v2",
"created": "Thu, 3 May 2007 03:03:55 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Jul 2007 13:10:52 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Nguyen",
"Khoa D.",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Rasmussen",
"Lars K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0253 | Jian Li | Mordecai Golin and Li Jian | More Efficient Algorithms and Analyses for Unequal Letter Cost
Prefix-Free Coding | 29 pages;9 figures; | null | null | null | cs.IT cs.DS math.IT | null | There is a large literature devoted to the problem of finding an optimal
(min-cost) prefix-free code with an unequal letter-cost encoding alphabet of
size. While there is no known polynomial time algorithm for solving it
optimally there are many good heuristics that all provide additive errors to
optimal. The additive error in these algorithms usually depends linearly upon
the largest encoding letter size.
This paper was motivated by the problem of finding optimal codes when the
encoding alphabet is infinite. Because the largest letter cost is infinite, the
previous analyses could give infinite error bounds. We provide a new algorithm
that works with infinite encoding alphabets. When restricted to the finite
alphabet case, our algorithm often provides better error bounds than the best
previous ones known.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 11:23:52 GMT"
},
{
"version": "v2",
"created": "Thu, 3 May 2007 09:00:23 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Golin",
"Mordecai",
""
],
[
"Jian",
"Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0262 | Thierry Cachat | Thierry Cachat (LIAFA), Igor Walukiewicz (LaBRI) | The Complexity of Games on Higher Order Pushdown Automata | null | null | null | null | cs.GT | null | We prove an n-EXPTIME lower bound for the problem of deciding the winner in a
reachability game on Higher Order Pushdown Automata (HPDA) of level n. This
bound matches the known upper bound for parity games on HPDA. As a consequence
the mu-calculus model checking over graphs given by n-HPDA is n-EXPTIME
complete.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 11:48:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cachat",
"Thierry",
"",
"LIAFA"
],
[
"Walukiewicz",
"Igor",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0705.0281 | Jerome Darmont | J\'er\^ome Darmont (LIMOS), Christophe Fromantin (LIMOS), St\'ephane
R\'egnier (LIMOS), Le Gruenwald, Michel Schneider (LIMOS) | Dynamic Clustering in Object-Oriented Databases: An Advocacy for
Simplicity | null | LNCS, Vol. 1944 (06/2000) 71-85 | null | null | cs.DB | null | We present in this paper three dynamic clustering techniques for
Object-Oriented Databases (OODBs). The first two, Dynamic, Statistical &
Tunable Clustering (DSTC) and StatClust, exploit both comprehensive usage
statistics and the inter-object reference graph. They are quite elaborate.
However, they are also complex to implement and induce a high overhead. The
third clustering technique, called Detection & Reclustering of Objects (DRO),
is based on the same principles, but is much simpler to implement. These three
clustering algorithm have been implemented in the Texas persistent object store
and compared in terms of clustering efficiency (i.e., overall performance
increase) and overhead using the Object Clustering Benchmark (OCB). The results
obtained showed that DRO induced a lighter overhead while still achieving
better overall performance.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 12:50:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Darmont",
"Jérôme",
"",
"LIMOS"
],
[
"Fromantin",
"Christophe",
"",
"LIMOS"
],
[
"Régnier",
"Stéphane",
"",
"LIMOS"
],
[
"Gruenwald",
"Le",
"",
"LIMOS"
],
[
"Schneider",
"Michel",
"",
"LIMOS"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.0286 | Hajime Matsui | Hajime Matsui, Seiichi Mita | Inverse-free Berlekamp-Massey-Sakata Algorithm and Small Decoders for
Algebraic-Geometric Codes | 15 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | This paper proposes a novel algorithm for finding error-locators of
algebraic-geometric codes that can eliminate the division-calculations of
finite fields from the Berlekamp-Massey-Sakata algorithm. This inverse-free
algorithm provides full performance in correcting a certain class of errors,
generic errors, which includes most errors, and can decode codes on algebraic
curves without the determination of unknown syndromes. Moreover, we propose
three different kinds of architectures that our algorithm can be applied to,
and we represent the control operation of shift-registers and switches at each
clock-timing with numerical simulations. We estimate the performance in
comparison of the total running time and the numbers of multipliers and
shift-registers in three architectures with those of the conventional ones for
codes on algebraic curves.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 13:13:48 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Matsui",
"Hajime",
""
],
[
"Mita",
"Seiichi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0315 | Omid Amini | Omid Amini, Frederic Havet, Florian Huc, Stephan Thomasse | WDM and Directed Star Arboricity | 18 pages, 2 figures. Final version | Combinatorics, Probability and Computing, Volume 19, Issue 02,
March 2010, pp 161-182 | null | null | cs.NI math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A digraph is $m$-labelled if every arc is labelled by an integer in $\{1,
\dots,m\}$. Motivated by wavelength assignment for multicasts in optical
networks, we introduce and study $n$-fibre colourings of labelled digraphs.
These are colourings of the arcs of $D$ such that at each vertex $v$, and for
each colour $\alpha$, $in(v,\alpha)+out(v,\alpha)\leq n$ with $in(v,\alpha)$
the number of arcs coloured $\alpha$ entering $v$ and $out(v,\alpha)$ the
number of labels $l$ such that there is at least one arc of label $l$ leaving
$v$ and coloured with $\alpha$. The problem is to find the minimum number of
colours $\lambda_n(D)$ such that the $m$-labelled digraph $D$ has an $n$-fibre
colouring. In the particular case when $D$ is $1$-labelled, $\lambda_1(D)$ is
called the directed star arboricity of $D$, and is denoted by $dst(D)$. We
first show that $dst(D)\leq 2\Delta^-(D)+1$, and conjecture that if
$\Delta^-(D)\geq 2$, then $dst(D)\leq 2\Delta^-(D)$. We also prove that for a
subcubic digraph $D$, then $dst(D)\leq 3$, and that if $\Delta^+(D),
\Delta^-(D)\leq 2$, then $dst(D)\leq 4$. Finally, we study
$\lambda_n(m,k)=\max\{\lambda_n(D) \tq D \mbox{is $m$-labelled} \et
\Delta^-(D)\leq k\}$. We show that if $m\geq n$, then $\ds
\left\lceil\frac{m}{n}\left\lceil \frac{k}{n}\right\rceil + \frac{k}{n}
\right\rceil\leq \lambda_n(m,k) \leq\left\lceil\frac{m}{n}\left\lceil
\frac{k}{n}\right\rceil + \frac{k}{n} \right\rceil + C \frac{m^2\log k}{n}$ for
some constant $C$. We conjecture that the lower bound should be the right value
of $\lambda_n(m,k)$.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 15:54:55 GMT"
},
{
"version": "v2",
"created": "Thu, 3 May 2007 08:38:06 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Jul 2010 01:05:23 GMT"
}
] | 2010-07-16T00:00:00 | [
[
"Amini",
"Omid",
""
],
[
"Havet",
"Frederic",
""
],
[
"Huc",
"Florian",
""
],
[
"Thomasse",
"Stephan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0705.0326 | Lei Ying | Lei Ying and R. Srikant | Optimal Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks: Hybrid
Random Walk and One-Dimensional Mobility Models | 13 pages | null | null | null | cs.NI cs.IT math.IT | null | Optimal delay-throughput trade-offs for two-dimensional i.i.d mobility models
have been established in [23], where we showed that the optimal trade-offs can
be achieved using rate-less codes when the required delay guarantees are
sufficient large. In this paper, we extend the results to other mobility models
including two-dimensional hybrid random walk model, one-dimensional i.i.d.
mobility model and one-dimensional hybrid random walk model. We consider both
fast mobiles and slow mobiles, and establish the optimal delay-throughput
trade-offs under some conditions. Joint coding-scheduling algorithms are also
proposed to achieve the optimal trade-offs.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 16:43:30 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Ying",
"Lei",
""
],
[
"Srikant",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0350 | Ruslan Sharipov | Ruslan Sharipov | Algorithms for laying points optimally on a plane and a circle | AmSTeX, 6 pages, amsppt style | null | null | null | cs.CG math.OC | null | Two averaging algorithms are considered which are intended for choosing an
optimal plane and an optimal circle approximating a group of points in
three-dimensional Euclidean space.
| [
{
"version": "v1",
"created": "Wed, 2 May 2007 19:41:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sharipov",
"Ruslan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0705.0413 | David Eppstein | David Eppstein, Marc van Kreveld, Elena Mumford, and Bettina Speckmann | Edges and Switches, Tunnels and Bridges | 15 pages, 11 figures. To appear in 10th Worksh. Algorithms and Data
Structures, Halifax, Nova Scotia, 2007. This version includes three pages of
appendices that will not be included in the conference proceedings version | Computational Geometry Theory & Applications 42(8): 790-802, 2009 | 10.1016/j.comgeo.2008.05.005 | null | cs.DS cs.CG | null | Edge casing is a well-known method to improve the readability of drawings of
non-planar graphs. A cased drawing orders the edges of each edge crossing and
interrupts the lower edge in an appropriate neighborhood of the crossing.
Certain orders will lead to a more readable drawing than others. We formulate
several optimization criteria that try to capture the concept of a "good" cased
drawing. Further, we address the algorithmic question of how to turn a given
drawing into an optimal cased drawing. For many of the resulting optimization
problems, we either find polynomial time algorithms or NP-hardness results.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 06:33:04 GMT"
}
] | 2009-07-09T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"van Kreveld",
"Marc",
""
],
[
"Mumford",
"Elena",
""
],
[
"Speckmann",
"Bettina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0705.0419 | Luigi Santocanale | Walid Belkhir (LIF), Luigi Santocanale (LIF) | Undirected Graphs of Entanglement Two | null | FSTTCS 2007: Foundations of Software Technology and Theoretical
Computer Science, Inde (2007) | 10.1007/978-3-540-77050-3_42 | null | cs.LO cs.GT | null | Entanglement is a complexity measure of directed graphs that origins in fixed
point theory. This measure has shown its use in designing efficient algorithms
to verify logical properties of transition systems. We are interested in the
problem of deciding whether a graph has entanglement at most k. As this measure
is defined by means of games, game theoretic ideas naturally lead to design
polynomial algorithms that, for fixed k, decide the problem. Known
characterizations of directed graphs of entanglement at most 1 lead, for k = 1,
to design even faster algorithms. In this paper we present an explicit
characterization of undirected graphs of entanglement at most 2. With such a
characterization at hand, we devise a linear time algorithm to decide whether
an undirected graph has this property.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 08:07:11 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Aug 2007 09:04:14 GMT"
}
] | 2009-04-09T00:00:00 | [
[
"Belkhir",
"Walid",
"",
"LIF"
],
[
"Santocanale",
"Luigi",
"",
"LIF"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0705.0422 | Rapport De Recherche Inria | Omid Amini (INRIA Sophia Antipolis), Louis Esperet (LaBRI), Jan Van
Den Heuvel (LSE) | Frugal Colouring of Graphs | null | null | null | null | cs.DM cs.NI | null | A $k$-frugal colouring of a graph $G$ is a proper colouring of the vertices
of $G$ such that no colour appears more than $k$ times in the neighbourhood of
a vertex. This type of colouring was introduced by Hind, Molloy and Reed in
1997. In this paper, we study the frugal chromatic number of planar graphs,
planar graphs with large girth, and outerplanar graphs, and relate this
parameter with several well-studied colourings, such as colouring of the
square, cyclic colouring, and $L(p,q)$-labelling. We also study frugal
edge-colourings of multigraphs.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 08:52:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Amini",
"Omid",
"",
"INRIA Sophia Antipolis"
],
[
"Esperet",
"Louis",
"",
"LaBRI"
],
[
"Heuvel",
"Jan Van Den",
"",
"LSE"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.0423 | Farbod Kayhan | A. Braunstein, F. Kayhan, G. Montorsi and R. Zecchina | Encoding for the Blackwell Channel with Reinforced Belief Propagation | 5 pages, 8 figures, submitted to ISIT 2007 | IEEE International Symposium on Information Theory (ISIT07); 2007.
p. 1891-5 | 10.1109/ISIT.2007.4557497 | null | cs.IT math.IT | null | A key idea in coding for the broadcast channel (BC) is binning, in which the
transmitter encode information by selecting a codeword from an appropriate bin
(the messages are thus the bin indexes). This selection is normally done by
solving an appropriate (possibly difficult) combinatorial problem. Recently it
has been shown that binning for the Blackwell channel --a particular BC-- can
be done by iterative schemes based on Survey Propagation (SP). This method uses
decimation for SP and suffers a complexity of O(n^2). In this paper we propose
a new variation of the Belief Propagation (BP) algorithm, named Reinforced BP
algorithm, that turns BP into a solver. Our simulations show that this new
algorithm has complexity O(n log n). Using this new algorithm together with a
non-linear coding scheme, we can efficiently achieve rates close to the border
of the capacity region of the Blackwell channel.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 09:49:15 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Braunstein",
"A.",
""
],
[
"Kayhan",
"F.",
""
],
[
"Montorsi",
"G.",
""
],
[
"Zecchina",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0425 | Natalia Osipova | Natalia Osipova (INRIA Sophia Antipolis) | Batch Processor Sharing with Hyper-Exponential Service Time | Sophia Antipolis, France, 03 May 2007 | null | null | null | cs.NI | null | We study Batch Processor-Sharing (BPS) queuing model with hyper-exponential
service time distribution and Poisson batch arrival process. One of the main
goals to study BPS is the possibility of its application in size-based
scheduling, which is used in differentiation between Short and Long flows in
the Internet. In the case of hyper-exponential service time distribution we
find an analytical expression of the expected conditional response time for the
BPS queue. We show, that the expected conditional response time is a concave
function of the service time. We apply the received results to the Two Level
Processor-Sharing (TLPS) model with hyper-exponential service time distribution
and find the expression of the expected response time for the TLPS model. TLPS
scheduling discipline can be applied to size-based differentiation in TCP/IP
networks and Web server request handling.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 10:09:06 GMT"
},
{
"version": "v2",
"created": "Fri, 4 May 2007 12:51:53 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Jun 2007 09:53:50 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Osipova",
"Natalia",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.0449 | Pierre-Francois Marteau | Pierre-Fran\c{c}ois Marteau (VALORIA), Gilbas M\'enier (VALORIA) | Multiresolution Approximation of Polygonal Curves in Linear Complexity | null | null | null | null | cs.CV | null | We propose a new algorithm to the problem of polygonal curve approximation
based on a multiresolution approach. This algorithm is suboptimal but still
maintains some optimality between successive levels of resolution using dynamic
programming. We show theoretically and experimentally that this algorithm has a
linear complexity in time and space. We experimentally compare the outcomes of
our algorithm to the optimal "full search" dynamic programming solution and
finally to classical merge and split approaches. The experimental evaluations
confirm the theoretical derivations and show that the proposed approach
evaluated on 2D coastal maps either show a lower time complexity or provide
polygonal approximations closer to the input discrete curves.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 12:47:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
],
[
"Ménier",
"Gilbas",
"",
"VALORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.0450 | Jerome Darmont | J\'er\^ome Darmont (LIMOS), Michel Schneider (LIMOS) | VOODB: A Generic Discrete-Event Random Simulation Model to Evaluate the
Performances of OODBs | null | 25th International Conference on Very Large Databases (VLDB 99)
(09/1999) 254-265 | null | null | cs.DB | null | Performance of object-oriented database systems (OODBs) is still an issue to
both designers and users nowadays. The aim of this paper is to propose a
generic discrete-event random simulation model, called VOODB, in order to
evaluate the performances of OODBs in general, and the performances of
optimization methods like clustering in particular. Such optimization methods
undoubtedly improve the performances of OODBs. Yet, they also always induce
some kind of overhead for the system. Therefore, it is important to evaluate
their exact impact on the overall performances. VOODB has been designed as a
generic discrete-event random simulation model by putting to use a modelling
approach, and has been validated by simulating the behavior of the O2 OODB and
the Texas persistent object store. Since our final objective is to compare
object clustering algorithms, some experiments have also been conducted on the
DSTC clustering technique, which is implemented in Texas. To validate VOODB,
performance results obtained by simulation for a given experiment have been
compared to the results obtained by benchmarking the real systems in the same
conditions. Benchmarking and simulation performance evaluations have been
observed to be consistent, so it appears that simulation can be a reliable
approach to evaluate the performances of OODBs.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 12:50:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Darmont",
"Jérôme",
"",
"LIMOS"
],
[
"Schneider",
"Michel",
"",
"LIMOS"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.0453 | Jerome Darmont | J\'er\^ome Darmont (LIMOS), Bertrand Petit (LIMOS), Michel Schneider
(LIMOS) | OCB: A Generic Benchmark to Evaluate the Performances of Object-Oriented
Database Systems | null | LNCS, Vol. 1377 (03/1998) 326-340 | null | null | cs.DB | null | We present in this paper a generic object-oriented benchmark (the Object
Clustering Benchmark) that has been designed to evaluate the performances of
clustering policies in object-oriented databases. OCB is generic because its
sample database may be customized to fit the databases introduced by the main
existing benchmarks (e.g., OO1). OCB's current form is clustering-oriented
because of its clustering-oriented workload, but it can be easily adapted to
other purposes. Lastly, OCB's code is compact and easily portable. OCB has been
implemented in a real system (Texas, running on a Sun workstation), in order to
test a specific clustering policy called DSTC. A few results concerning this
test are presented.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 12:54:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Darmont",
"Jérôme",
"",
"LIMOS"
],
[
"Petit",
"Bertrand",
"",
"LIMOS"
],
[
"Schneider",
"Michel",
"",
"LIMOS"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.0454 | Jerome Darmont | J\'er\^ome Darmont (LIMOS), Amar Attoui (LIMOS), Michel Gourgand
(LIMOS) | Performance Evaluation for Clustering Algorithms in Object-Oriented
Database Systems | null | LNCS, Vol. 978 (09/1995) 187-196 | null | null | cs.DB | null | It is widely acknowledged that good object clustering is critical to the
performance of object-oriented databases. However, object clustering always
involves some kind of overhead for the system. The aim of this paper is to
propose a modelling methodology in order to evaluate the performances of
different clustering policies. This methodology has been used to compare the
performances of three clustering algorithms found in the literature (Cactis, CK
and ORION) that we considered representative of the current research in the
field of object clustering. The actual performance evaluation was performed
using simulation. Simulation experiments we performed showed that the Cactis
algorithm is better than the ORION algorithm and that the CK algorithm totally
outperforms both other algorithms in terms of response time and clustering
overhead.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 13:02:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Darmont",
"Jérôme",
"",
"LIMOS"
],
[
"Attoui",
"Amar",
"",
"LIMOS"
],
[
"Gourgand",
"Michel",
"",
"LIMOS"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.0462 | Nicolas Tabareau | Paul-Andr\'e Melli\`es (PPS), Nicolas Tabareau (PPS) | Resource modalities in game semantics | null | null | null | null | math.CT cs.CL | null | The description of resources in game semantics has never achieved the
simplicity and precision of linear logic, because of a misleading conception:
the belief that linear logic is more primitive than game semantics. We advocate
instead the contrary: that game semantics is conceptually more primitive than
linear logic. Starting from this revised point of view, we design a categorical
model of resources in game semantics, and construct an arena game model where
the usual notion of bracketing is extended to multi- bracketing in order to
capture various resource policies: linear, affine and exponential.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 13:44:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Melliès",
"Paul-André",
"",
"PPS"
],
[
"Tabareau",
"Nicolas",
"",
"PPS"
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0705.0543 | Aditya Ramamoorthy | Jaehong Kim, Aditya Ramamoorthy and Steven W. McLaughlin | The Design of Efficiently-Encodable Rate-Compatible LDPC Codes | Accepted subject to minor revision to IEEE Trans. on Comm | null | 10.1109/ICC.2006.254899 | null | cs.IT math.IT | null | We present a new class of irregular low-density parity-check (LDPC) codes for
moderate block lengths (up to a few thousand bits) that are well-suited for
rate-compatible puncturing. The proposed codes show good performance under
puncturing over a wide range of rates and are suitable for usage in incremental
redundancy hybrid-automatic repeat request (ARQ) systems. In addition, these
codes are linear-time encodable with simple shift-register circuits. For a
block length of 1200 bits the codes outperform optimized irregular LDPC codes
and extended irregular repeat-accumulate (eIRA) codes for all puncturing rates
0.6~0.9 (base code performance is almost the same) and are particularly good at
high puncturing rates where good puncturing performance has been previously
difficult to achieve.
| [
{
"version": "v1",
"created": "Thu, 3 May 2007 22:17:51 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Kim",
"Jaehong",
""
],
[
"Ramamoorthy",
"Aditya",
""
],
[
"McLaughlin",
"Steven W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0552 | Rajeev Raman | Rajeev Raman, Venkatesh Raman, Srinivasa Rao Satti | Succinct Indexable Dictionaries with Applications to Encoding $k$-ary
Trees, Prefix Sums and Multisets | Final version of SODA 2002 paper; supersedes Leicester Tech report
2002/16 | ACM Transactions on Algorithms vol 3 (2007), Article 43, 25pp | 10.1145/1290672.1290680 | null | cs.DS cs.DM cs.IT math.IT | null | We consider the {\it indexable dictionary} problem, which consists of storing
a set $S \subseteq \{0,...,m-1\}$ for some integer $m$, while supporting the
operations of $\Rank(x)$, which returns the number of elements in $S$ that are
less than $x$ if $x \in S$, and -1 otherwise; and $\Select(i)$ which returns
the $i$-th smallest element in $S$. We give a data structure that supports both
operations in O(1) time on the RAM model and requires ${\cal B}(n,m) + o(n) +
O(\lg \lg m)$ bits to store a set of size $n$, where ${\cal B}(n,m) = \ceil{\lg
{m \choose n}}$ is the minimum number of bits required to store any $n$-element
subset from a universe of size $m$. Previous dictionaries taking this space
only supported (yes/no) membership queries in O(1) time. In the cell probe
model we can remove the $O(\lg \lg m)$ additive term in the space bound,
answering a question raised by Fich and Miltersen, and Pagh.
We present extensions and applications of our indexable dictionary data
structure, including:
An information-theoretically optimal representation of a $k$-ary cardinal
tree that supports standard operations in constant time,
A representation of a multiset of size $n$ from $\{0,...,m-1\}$ in ${\cal
B}(n,m+n) + o(n)$ bits that supports (appropriate generalizations of) $\Rank$
and $\Select$ operations in constant time, and
A representation of a sequence of $n$ non-negative integers summing up to $m$
in ${\cal B}(n,m+n) + o(n)$ bits that supports prefix sum queries in constant
time.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 07:47:05 GMT"
}
] | 2011-08-10T00:00:00 | [
[
"Raman",
"Rajeev",
""
],
[
"Raman",
"Venkatesh",
""
],
[
"Satti",
"Srinivasa Rao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0561 | Jingchao Chen | Jing-Chao Chen | Iterative Rounding for the Closest String Problem | This paper has been published in abstract Booklet of CiE09 | null | null | null | cs.DS cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The closest string problem is an NP-hard problem, whose task is to find a
string that minimizes maximum Hamming distance to a given set of strings. This
can be reduced to an integer program (IP). However, to date, there exists no
known polynomial-time algorithm for IP. In 2004, Meneses et al. introduced a
branch-and-bound (B & B) method for solving the IP problem. Their algorithm is
not always efficient and has the exponential time complexity. In the paper, we
attempt to solve efficiently the IP problem by a greedy iterative rounding
technique. The proposed algorithm is polynomial time and much faster than the
existing B & B IP for the CSP. If the number of strings is limited to 3, the
algorithm is provably at most 1 away from the optimum. The empirical results
show that in many cases we can find an exact solution. Even though we fail to
find an exact solution, the solution found is very close to exact solution.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 03:01:42 GMT"
},
{
"version": "v2",
"created": "Wed, 11 May 2011 00:18:55 GMT"
}
] | 2011-05-12T00:00:00 | [
[
"Chen",
"Jing-Chao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0705.0564 | Caleb Lo | Caleb K. Lo, Sriram Vishwanath and Robert W. Heath Jr | Rate Bounds for MIMO Relay Channels | 25 pages, 6 figures, submitted to Journal on Communications and
Networks in December 2007, revised in April 2008 | null | null | null | cs.IT math.IT | null | This paper considers the multi-input multi-output (MIMO) relay channel where
multiple antennas are employed by each terminal. Compared to single-input
single-output (SISO) relay channels, MIMO relay channels introduce additional
degrees of freedom, making the design and analysis of optimal cooperative
strategies more complex. In this paper, a partial cooperation strategy that
combines transmit-side message splitting and block-Markov encoding is
presented. Lower bounds on capacity that improve on a previously proposed
non-cooperative lower bound are derived for Gaussian MIMO relay channels.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 06:43:42 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Dec 2007 17:39:33 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Apr 2008 15:52:35 GMT"
},
{
"version": "v4",
"created": "Fri, 2 May 2008 21:33:42 GMT"
}
] | 2008-05-03T00:00:00 | [
[
"Lo",
"Caleb K.",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0588 | Edgar Graaf de | Edgar H. de Graaf, Joost N. Kok, Walter A. Kosters | Clustering Co-occurrence of Maximal Frequent Patterns in Streams | null | null | null | null | cs.AI cs.DS | null | One way of getting a better view of data is using frequent patterns. In this
paper frequent patterns are subsets that occur a minimal number of times in a
stream of itemsets. However, the discovery of frequent patterns in streams has
always been problematic. Because streams are potentially endless it is in
principle impossible to say if a pattern is often occurring or not. Furthermore
the number of patterns can be huge and a good overview of the structure of the
stream is lost quickly. The proposed approach will use clustering to facilitate
the analysis of the structure of the stream.
A clustering on the co-occurrence of patterns will give the user an improved
view on the structure of the stream. Some patterns might occur so much together
that they should form a combined pattern. In this way the patterns in the
clustering will be the largest frequent patterns: maximal frequent patterns.
Our approach to decide if patterns occur often together will be based on a
method of clustering when only the distance between pairs is known. The number
of maximal frequent patterns is much smaller and combined with clustering
methods these patterns provide a good view on the structure of the stream.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 10:36:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Graaf",
"Edgar H.",
""
],
[
"Kok",
"Joost N.",
""
],
[
"Kosters",
"Walter A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.0593 | Edgar Graaf de | Edgar H. de Graaf, Joost N. Kok, Walter A. Kosters | Clustering with Lattices in the Analysis of Graph Patterns | null | null | null | null | cs.AI cs.DS | null | Mining frequent subgraphs is an area of research where we have a given set of
graphs (each graph can be seen as a transaction), and we search for (connected)
subgraphs contained in many of these graphs. In this work we will discuss
techniques used in our framework Lattice2SAR for mining and analysing frequent
subgraph data and their corresponding lattice information. Lattice information
is provided by the graph mining algorithm gSpan; it contains all
supergraph-subgraph relations of the frequent subgraph patterns -- and their
supports.
Lattice2SAR is in particular used in the analysis of frequent graph patterns
where the graphs are molecules and the frequent subgraphs are fragments. In the
analysis of fragments one is interested in the molecules where patterns occur.
This data can be very extensive and in this paper we focus on a technique of
making it better available by using the lattice information in our clustering.
Now we can reduce the number of times the highly compressed occurrence data
needs to be accessed by the user. The user does not have to browse all the
occurrence data in search of patterns occurring in the same molecules. Instead
one can directly see which frequent subgraphs are of interest.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 10:52:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"de Graaf",
"Edgar H.",
""
],
[
"Kok",
"Joost N.",
""
],
[
"Kosters",
"Walter A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.0599 | Nathalie Henry | Nathalie Henry, Jean-Daniel Fekete, Michael Mcguffin | NodeTrix: Hybrid Representation for Analyzing Social Networks | null | null | 10.1109/TVCG.2007.70582 | null | cs.HC | null | The need to visualize large social networks is growing as hardware
capabilities make analyzing large networks feasible and many new data sets
become available. Unfortunately, the visualizations in existing systems do not
satisfactorily answer the basic dilemma of being readable both for the global
structure of the network and also for detailed analysis of local communities.
To address this problem, we present NodeTrix, a hybrid representation for
networks that combines the advantages of two traditional representations:
node-link diagrams are used to show the global structure of a network, while
arbitrary portions of the network can be shown as adjacency matrices to better
support the analysis of communities. A key contribution is a set of interaction
techniques. These allow analysts to create a NodeTrix visualization by dragging
selections from either a node-link or a matrix, flexibly manipulate the
NodeTrix representation to explore the dataset, and create meaningful summary
visualizations of their findings. Finally, we present a case study applying
NodeTrix to the analysis of the InfoVis 2004 coauthorship dataset to illustrate
the capabilities of NodeTrix as both an exploration tool and an effective means
of communicating results.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 11:50:07 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2007 08:53:45 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Jun 2007 13:32:58 GMT"
}
] | 2020-08-04T00:00:00 | [
[
"Henry",
"Nathalie",
""
],
[
"Fekete",
"Jean-Daniel",
""
],
[
"Mcguffin",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0705.0602 | Alejandro Chinea Manrique De Lara | Alejandro Chinea Manrique De Lara (INRIA Rocquencourt), Michel Parent
(INRIA Rocquencourt) | Risk Assessment Algorithms Based On Recursive Neural Networks | null | Dans International Joint Conference On Neural Networks - IJCNN
2007 (2007) | null | null | cs.NE | null | The assessment of highly-risky situations at road intersections have been
recently revealed as an important research topic within the context of the
automotive industry. In this paper we shall introduce a novel approach to
compute risk functions by using a combination of a highly non-linear processing
model in conjunction with a powerful information encoding procedure.
Specifically, the elements of information either static or dynamic that appear
in a road intersection scene are encoded by using directed positional acyclic
labeled graphs. The risk assessment problem is then reformulated in terms of an
inductive learning task carried out by a recursive neural network. Recursive
neural networks are connectionist models capable of solving supervised and
non-supervised learning problems represented by directed ordered acyclic
graphs. The potential of this novel approach is demonstrated through well
predefined scenarios. The major difference of our approach compared to others
is expressed by the fact of learning the structure of the risk. Furthermore,
the combination of a rich information encoding procedure with a generalized
model of dynamical recurrent networks permit us, as we shall demonstrate, a
sophisticated processing of information that we believe as being a first step
for building future advanced intersection safety systems
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 11:53:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"De Lara",
"Alejandro Chinea Manrique",
"",
"INRIA Rocquencourt"
],
[
"Parent",
"Michel",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0705.0612 | Katrin Borcea-Pfitzmann | Katrin Borcea-Pfitzmann, Anne-Katrin Stange | Privacy - an Issue for eLearning? A Trend Analysis Reflecting the
Attitude of European eLearning Users | null | null | null | TUD-FI07-01 | cs.CY | null | Availing services provided via the Internet became a widely accepted means in
organising one's life. Beside others, eLearning goes with this trend as well.
But, while employing Internet service makes life more convenient, at the same
time, it raises risks with respect to the protection of the users' privacy.
This paper analyses the attitudes of eLearning users towards their privacy by,
initially, pointing out terminology and legal issues connected with privacy.
Further, the concept and implementation as well as a result analysis of a
conducted study is presented, which explores the problem area from different
perspectives. The paper will show that eLearning users indeed care for the
protection of their personal information when using eLearning services.
However, their attitudes and behaviour slightly differ. In conclusion, we
provide first approaches of assisting possibilities for users how to resolve
the difference of requirements and their actual activities with respect to
privacy protection.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 12:30:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borcea-Pfitzmann",
"Katrin",
""
],
[
"Stange",
"Anne-Katrin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0705.0635 | Jean Cardinal | J. Cardinal, S. Collette, F. Hurtado, S. Langerman and B. Palop | Moving Walkways, Escalators, and Elevators | 16 pages. Presented at XII Encuentros de Geometria Computacional,
Valladolid, Spain | null | null | null | cs.CG | null | We study a simple geometric model of transportation facility that consists of
two points between which the travel speed is high. This elementary definition
can model shuttle services, tunnels, bridges, teleportation devices, escalators
or moving walkways. The travel time between a pair of points is defined as a
time distance, in such a way that a customer uses the transportation facility
only if it is helpful.
We give algorithms for finding the optimal location of such a transportation
facility, where optimality is defined with respect to the maximum travel time
between two points in a given set.
| [
{
"version": "v1",
"created": "Fri, 4 May 2007 14:52:06 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Sep 2007 11:30:09 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Cardinal",
"J.",
""
],
[
"Collette",
"S.",
""
],
[
"Hurtado",
"F.",
""
],
[
"Langerman",
"S.",
""
],
[
"Palop",
"B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0705.0693 | Tshilidzi Marwala | Evan Hurwitz and Tshilidzi Marwala | Learning to Bluff | 6 pages | null | null | null | cs.AI | null | The act of bluffing confounds game designers to this day. The very nature of
bluffing is even open for debate, adding further complication to the process of
creating intelligent virtual players that can bluff, and hence play,
realistically. Through the use of intelligent, learning agents, and carefully
designed agent outlooks, an agent can in fact learn to predict its opponents
reactions based not only on its own cards, but on the actions of those around
it. With this wider scope of understanding, an agent can in learn to bluff its
opponents, with the action representing not an illogical action, as bluffing is
often viewed, but rather as an act of maximising returns through an effective
statistical optimisation. By using a tee dee lambda learning algorithm to
continuously adapt neural network agent intelligence, agents have been shown to
be able to learn to bluff without outside prompting, and even to learn to call
each others bluffs in free, competitive play.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 19:15:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hurwitz",
"Evan",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.0734 | Sanjiang Li | Sanjiang Li and Mingsheng Ying | Soft constraint abstraction based on semiring homomorphism | 18 pages, 1 figure | Theoretical Computer Science 403(2-3) 192-201, 2008 | 10.1016/j.tcs.2008.03.029 | null | cs.AI | null | The semiring-based constraint satisfaction problems (semiring CSPs), proposed
by Bistarelli, Montanari and Rossi \cite{BMR97}, is a very general framework of
soft constraints. In this paper we propose an abstraction scheme for soft
constraints that uses semiring homomorphism. To find optimal solutions of the
concrete problem, the idea is, first working in the abstract problem and
finding its optimal solutions, then using them to solve the concrete problem.
In particular, we show that a mapping preserves optimal solutions if and only
if it is an order-reflecting semiring homomorphism. Moreover, for a semiring
homomorphism $\alpha$ and a problem $P$ over $S$, if $t$ is optimal in
$\alpha(P)$, then there is an optimal solution $\bar{t}$ of $P$ such that
$\bar{t}$ has the same value as $t$ in $\alpha(P)$.
| [
{
"version": "v1",
"created": "Sat, 5 May 2007 08:47:31 GMT"
}
] | 2010-07-01T00:00:00 | [
[
"Li",
"Sanjiang",
""
],
[
"Ying",
"Mingsheng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.0738 | Damien Chablat | Damien Chablat (IRCCyN), St\'ephane Caro (IRCCyN), Emilie Bouyer
(IRCCyN) | The Optimization of a Novel Prismatic Drive | null | null | null | null | cs.RO | null | The design of a mechanical transmission taking into account the transmitted
forces is reported in this paper. This transmission is based on Slide-o-Cam, a
cam mechanism with multiple rollers mounted on a common translating follower.
The design of Slide-o-Cam, a transmission intended to produce a sliding motion
from a turning drive, or vice versa, was reported elsewhere. This transmission
provides pure-rolling motion, thereby reducing the friction of rack-and-pinions
and linear drives. The pressure angle is a relevant performance index for this
transmission because it determines the amount of force transmitted to the load
vs. that transmitted to the machine frame. To assess the transmission
capability of the mechanism, the Hertz formula is introduced to calculate the
stresses on the rollers and on the cams. The final transmission is intended to
replace the current ball-screws in the Orthoglide, a three-DOF parallel robot
for the production of translational motions, currently under development for
machining applications at Ecole Centrale de Nantes.
| [
{
"version": "v1",
"created": "Sat, 5 May 2007 10:28:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Bouyer",
"Emilie",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0742 | K. P.N. Murthy | V.Sundaram and K.P.N.Murthy | MIMO detection employing Markov Chain Monte Carlo | 8 pages; 3 figures | null | null | null | cs.GL | null | We propose a soft-output detection scheme for Multiple-Input-Multiple-Output
(MIMO) systems. The detector employs Markov Chain Monte Carlo method to compute
bit reliabilities from the signals received and is thus suited for coded MIMO
systems. It offers a good trade-off between achievable performance and
algorithmic complexity.
| [
{
"version": "v1",
"created": "Sat, 5 May 2007 12:04:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sundaram",
"V.",
""
],
[
"Murthy",
"K. P. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0705.0751 | Pere Constans | Pere Constans | Approximate textual retrieval | null | null | null | null | cs.IR cs.DL | null | An approximate textual retrieval algorithm for searching sources with high
levels of defects is presented. It considers splitting the words in a query
into two overlapping segments and subsequently building composite regular
expressions from interlacing subsets of the segments. This procedure reduces
the probability of missed occurrences due to source defects, yet diminishes the
retrieval of irrelevant, non-contextual occurrences.
| [
{
"version": "v1",
"created": "Sat, 5 May 2007 17:27:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Constans",
"Pere",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0705.0760 | Sujay Sanghavi | Sujay Sanghavi | Equivalence of LP Relaxation and Max-Product for Weighted Matching in
General Graphs | 6 pages, 2 figures | null | null | null | cs.IT cs.AI cs.LG cs.NI math.IT | null | Max-product belief propagation is a local, iterative algorithm to find the
mode/MAP estimate of a probability distribution. While it has been successfully
employed in a wide variety of applications, there are relatively few
theoretical guarantees of convergence and correctness for general loopy graphs
that may have many short cycles. Of these, even fewer provide exact ``necessary
and sufficient'' characterizations.
In this paper we investigate the problem of using max-product to find the
maximum weight matching in an arbitrary graph with edge weights. This is done
by first constructing a probability distribution whose mode corresponds to the
optimal matching, and then running max-product. Weighted matching can also be
posed as an integer program, for which there is an LP relaxation. This
relaxation is not always tight. In this paper we show that \begin{enumerate}
\item If the LP relaxation is tight, then max-product always converges, and
that too to the correct answer. \item If the LP relaxation is loose, then
max-product does not converge. \end{enumerate} This provides an exact,
data-dependent characterization of max-product performance, and a precise
connection to LP relaxation, which is a well-studied optimization technique.
Also, since LP relaxation is known to be tight for bipartite graphs, our
results generalize other recent results on using max-product to find weighted
matchings in bipartite graphs.
| [
{
"version": "v1",
"created": "Sat, 5 May 2007 18:57:47 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Sanghavi",
"Sujay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0761 | Tshilidzi Marwala | Tshilidzi Marwala and Bodie Crossingham | Bayesian Approach to Neuro-Rough Models | 24 pages, 5 figures, 1 table | null | null | null | cs.AI | null | This paper proposes a neuro-rough model based on multi-layered perceptron and
rough set. The neuro-rough model is then tested on modelling the risk of HIV
from demographic data. The model is formulated using Bayesian framework and
trained using Monte Carlo method and Metropolis criterion. When the model was
tested to estimate the risk of HIV infection given the demographic data it was
found to give the accuracy of 62%. The proposed model is able to combine the
accuracy of the Bayesian MLP model and the transparency of Bayesian rough set
model.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 22:55:58 GMT"
},
{
"version": "v2",
"created": "Wed, 9 May 2007 04:13:04 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Aug 2007 09:24:46 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Marwala",
"Tshilidzi",
""
],
[
"Crossingham",
"Bodie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.0781 | Tshilidzi Marwala | Jonathan M.Spiller and T. Marwala | Medical Image Segmentation and Localization using Deformable Templates | 4 pages | null | null | null | cs.CV | null | This paper presents deformable templates as a tool for segmentation and
localization of biological structures in medical images. Structures are
represented by a prototype template, combined with a parametric warp mapping
used to deform the original shape. The localization procedure is achieved using
a multi-stage, multi-resolution algorithm de-signed to reduce computational
complexity and time. The algorithm initially identifies regions in the image
most likely to contain the desired objects and then examines these regions at
progressively increasing resolutions. The final stage of the algorithm involves
warping the prototype template to match the localized objects. The algorithm is
presented along with the results of four example applications using MRI, x-ray
and ultrasound images.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 06:02:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spiller",
"Jonathan M.",
""
],
[
"Marwala",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.0783 | Stefano Buzzi | Stefano Buzzi, and H. Vincent Poor | Non-cooperative games for spreading code optimization, power control and
receiver design in wireless data networks | appeared in the Proceedings of the 13th European Wireless Conference,
Paris (France), April 2007 | null | null | null | cs.IT cs.GT math.IT | null | This paper focuses on the issue of energy efficiency in wireless data
networks through a game theoretic approach. The case considered is that in
which each user is allowed to vary its transmit power, spreading code, and
uplink receiver in order to maximize its own utility, which is here defined as
the ratio of data throughput to transmit power. In particular, the case in
which linear multiuser detectors are employed at the receiver is treated first,
and, then, the more challenging case in which non-linear decision feedback
multiuser receivers are adopted is addressed. It is shown that, for both
receivers, the problem at hand of utility maximization can be regarded as a
non-cooperative game, and it is proved that a unique Nash equilibrium point
exists. Simulation results show that significant performance gains can be
obtained through both non-linear processing and spreading code optimization; in
particular, for systems with a number of users not larger than the processing
gain, remarkable gains come from spreading code optimization, while, for
overloaded systems, the largest gainscome from the use of non-linear
processing. In every case, however, the non-cooperative games proposed here are
shown to outperform competing alternatives.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 06:49:07 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Buzzi",
"Stefano",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0815 | Andrea Lo Pumo | Andrea Lo Pumo | Overview of the Netsukuku network | null | null | null | null | cs.NI | null | Netsukuku is a P2P network system designed to handle a large number of nodes
with minimal CPU and memory resources. It can be easily used to build a
worldwide distributed, anonymous and not controlled network, separated from the
Internet, without the support of any servers, ISPs or authority controls. In
this document, we give a generic and non technical description of the Netsukuku
network, emphasizing its main ideas and features.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 19:36:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pumo",
"Andrea Lo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.0817 | Andrea Lo Pumo | Andrea Lo Pumo | Quantum Shortest Path Netsukuku | null | null | null | null | cs.NI | null | This document describes the QSPN, the routing discovery algorithm used by
Netsukuku. Through a deductive analysis the main proprieties of the QSPN are
shown. Moreover, a second version of the algorithm, is presented.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 20:05:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pumo",
"Andrea Lo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.0819 | Andrea Lo Pumo | Andrea Lo Pumo | The Netsukuku network topology | null | null | null | null | cs.NI | null | In this document, we describe the fractal structure of the Netsukuku
topology. Moreover, we show how it is possible to use the QSPN v2 on the high
levels of the fractal.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 20:12:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pumo",
"Andrea Lo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.0820 | Andrea Lo Pumo | Andrea Lo Pumo | ANDNA: the distributed hostname management system of Netsukuku | null | null | null | null | cs.NI | null | We present the Abnormal Netsukuku Domain Name Anarchy system. ANDNA is the
distributed, non hierarchical and decentralised system of hostname management
used in the Netsukuku network.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 20:19:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pumo",
"Andrea Lo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0705.0828 | Tshilidzi Marwala | D.L. Falk, D. M. Rubin and T. Marwala | Enhancement of Noisy Planar Nuclear Medicine Images using Mean Field
Annealing | 4 pages | null | null | null | cs.CV | null | Nuclear medicine (NM) images inherently suffer from large amounts of noise
and blur. The purpose of this research is to reduce the noise and blur while
maintaining image integrity for improved diagnosis. The proposed solution is to
increase image quality after the standard pre- and post-processing undertaken
by a gamma camera system. Mean Field Annealing (MFA) is the image processing
technique used in this research. It is a computational iterative technique that
makes use of the Point Spread Function (PSF) and the noise associated with the
NM image. MFA is applied to NM images with the objective of reducing noise
while not compromising edge integrity. Using a sharpening filter as a
post-processing technique (after MFA) yields image enhancement of planar NM
images.
| [
{
"version": "v1",
"created": "Sun, 6 May 2007 23:08:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Falk",
"D. L.",
""
],
[
"Rubin",
"D. M.",
""
],
[
"Marwala",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.0856 | Damien Chablat | Emilie Bouyer (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat
(IRCCyN), Jorge Angeles (CIM) | The Multiobjective Optimization of a Prismatic Drive | null | ASME Design Engineering Technical Conference (04/09/2007) 1-9 | null | null | cs.RO | null | The multiobjective optimization of Slide-o-Cam is reported in this paper.
Slide-o-Cam is a cam mechanism with multiple rollers mounted on a common
translating follower. This transmission provides pure-rolling motion, thereby
reducing the friction of rack-and-pinions and linear drives. A Pareto frontier
is obtained by means of multiobjective optimization. This optimization is based
on three objective functions: (i) the pressure angle, which is a suitable
performance index for the transmission because it determines the amount of
force transmitted to the load vs. that transmitted to the machine frame; (ii)
the Hertz pressure used to evaluate the stresses produced on the contact
surface between cam and roller; and (iii) the size of the mechanism,
characterized by the number of cams and their width.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 06:39:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bouyer",
"Emilie",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0895 | Chazottes | C. Bonanno, J.-R. Chazottes, P. Collet | Epsilon-Distortion Complexity for Cantor Sets | null | null | null | null | math.DS cs.CC math.MG | null | We define the epsilon-distortion complexity of a set as the shortest program,
running on a universal Turing machine, which produces this set at the precision
epsilon in the sense of Hausdorff distance. Then, we estimate the
epsilon-distortion complexity of various central Cantor sets on the line
generated by iterated function systems (IFS's). In particular, the
epsilon-distortion complexity of a C^k Cantor set depends, in general, on k and
on its box counting dimension, contrarily to Cantor sets generated by
polynomial IFS or random affine Cantor sets.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 12:16:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bonanno",
"C.",
""
],
[
"Chazottes",
"J. -R.",
""
],
[
"Collet",
"P.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
0705.0909 | Giacomo Bacci | Giacomo Bacci, Marco Luise, H. Vincent Poor | Game-Theoretic Power Control in Impulse Radio UWB Wireless Networks | Appeared in the Proceedings of the 13th European Wireless Conference,
Paris, France, April 1-4, 2007 | null | null | null | cs.GT cs.IT math.IT | null | In this paper, a game-theoretic model for studying power control for wireless
data networks in frequency-selective multipath environments is analyzed. The
uplink of an impulse-radio ultrawideband system is considered. The effects of
self-interference and multiple-access interference on the performance of Rake
receivers are investigated for synchronous systems. Focusing on energy
efficiency, a noncooperative game is proposed in which users in the network are
allowed to choose their transmit powers to maximize their own utilities, and
the Nash equilibrium for the proposed game is derived. It is shown that, due to
the frequency selective multipath, the noncooperative solution is achieved at
different signal-to-interference-plus-noise ratios, respectively of the channel
realization. A large-system analysis is performed to derive explicit
expressions for the achieved utilities. The Pareto-optimal (cooperative)
solution is also discussed and compared with the noncooperative approach.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 13:58:01 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Bacci",
"Giacomo",
""
],
[
"Luise",
"Marco",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0915 | Joerg Rothe | Dorothea Baumeister and Joerg Rothe | Satisfiability Parsimoniously Reduces to the Tantrix(TM) Rotation Puzzle
Problem | 19 pages, 16 figures, appears in the Proceedings of "Machines,
Computations and Universality" (MCU 2007) | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Holzer and Holzer (Discrete Applied Mathematics 144(3):345--358, 2004) proved
that the Tantrix(TM) rotation puzzle problem is NP-complete. They also showed
that for infinite rotation puzzles, this problem becomes undecidable. We study
the counting version and the unique version of this problem. We prove that the
satisfiability problem parsimoniously reduces to the Tantrix(TM) rotation
puzzle problem. In particular, this reduction preserves the uniqueness of the
solution, which implies that the unique Tantrix(TM) rotation puzzle problem is
as hard as the unique satisfiability problem, and so is DP-complete under
polynomial-time randomized reductions, where DP is the second level of the
boolean hierarchy over NP.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 14:23:20 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Jun 2008 11:28:24 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Baumeister",
"Dorothea",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0705.0932 | Oliver Kosut | Oliver Kosut and Lang Tong | Variable-Rate Distributed Source Coding in the Presence of Byzantine
Sensors | 5 pages, submitted to ISIT 2007 | null | null | null | cs.IT math.IT | null | The distributed source coding problem is considered when the sensors, or
encoders, are under Byzantine attack; that is, an unknown number of sensors
have been reprogrammed by a malicious intruder to undermine the reconstruction
at the fusion center. Three different forms of the problem are considered. The
first is a variable-rate setup, in which the decoder adaptively chooses the
rates at which the sensors transmit. An explicit characterization of the
variable-rate minimum achievable sum rate is stated, given by the maximum
entropy over the set of distributions indistinguishable from the true source
distribution by the decoder. In addition, two forms of the fixed-rate problem
are considered, one with deterministic coding and one with randomized coding.
The achievable rate regions are given for both these problems, with a larger
region achievable using randomized coding, though both are suboptimal compared
to variable-rate coding.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 15:55:06 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Kosut",
"Oliver",
""
],
[
"Tong",
"Lang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0933 | Max Neunh\"offer | Max Neunhoeffer, Cheryl E. Praeger | Computing Minimal Polynomials of Matrices | null | null | null | null | math.RA cs.DS | null | We present and analyse a Monte-Carlo algorithm to compute the minimal
polynomial of an $n\times n$ matrix over a finite field that requires $O(n^3)$
field operations and O(n) random vectors, and is well suited for successful
practical implementation. The algorithm, and its complexity analysis, use
standard algorithms for polynomial and matrix operations. We compare features
of the algorithm with several other algorithms in the literature. In addition
we present a deterministic verification procedure which is similarly efficient
in most cases but has a worst-case complexity of $O(n^4)$. Finally, we report
the results of practical experiments with an implementation of our algorithms
in comparison with the current algorithms in the {\sf GAP} library.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 15:48:12 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Apr 2008 12:18:34 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Neunhoeffer",
"Max",
""
],
[
"Praeger",
"Cheryl E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.0936 | Giacomo Bacci | Giacomo Bacci, Marco Luise, H. Vincent Poor | Performance Comparison of Energy-Efficient Power Control for CDMA and
Multiuser UWB Networks | To appear in the Proceedings of the 16th IST Mobile and Wireless
Communications Summit, Budapest, Hungary, July 1-5, 2007 | null | null | null | cs.GT cs.IT math.IT | null | This paper studies the performance of a wireless data network using
energy-efficient power control techniques when different multiple access
schemes, namely direct-sequence code division multiple access (DS-CDMA) and
impulse-radio ultrawideband (IR-UWB), are considered. Due to the large
bandwidth of the system, the multipath channel is assumed to be
frequency-selective. By making use of noncooperative game-theoretic models and
large-system analysis tools, explicit expressions for the achieved utilities at
the Nash equilibrium are derived in terms of the network parameters. A measure
of the loss of DS-CDMA with respect to IR-UWB is proposed, which proves
substantial equivalence between the two schemes. Simulation results are
provided to validate the analysis.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 15:58:58 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Bacci",
"Giacomo",
""
],
[
"Luise",
"Marco",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.0952 | Tshilidzi Marwala | Dhiresh R. Surajpal and Tshilidzi Marwala | An Independent Evaluation of Subspace Face Recognition Algorithms | 7 pages | null | null | null | cs.CV | null | This paper explores a comparative study of both the linear and kernel
implementations of three of the most popular Appearance-based Face Recognition
projection classes, these being the methodologies of Principal Component
Analysis, Linear Discriminant Analysis and Independent Component Analysis. The
experimental procedure provides a platform of equal working conditions and
examines the ten algorithms in the categories of expression, illumination,
occlusion and temporal delay. The results are then evaluated based on a
sequential combination of assessment tools that facilitate both intuitive and
statistical decisiveness among the intra and interclass comparisons. The best
categorical algorithms are then incorporated into a hybrid methodology, where
the advantageous effects of fusion strategies are considered.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 19:19:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Surajpal",
"Dhiresh R.",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0705.0956 | Damien Chablat | Jorge Angeles (CIM), Damien Chablat (IRCCyN) | On Isotropic Sets of Points in the Plane. Application to the Design of
Robot Archirectures | null | 7th International Symposium on Advances in Robot Kinematics (2000)
1-10 | null | null | cs.RO | null | Various performance indices are used for the design of serial manipulators.
One method of optimization relies on the condition number of the Jacobian
matrix. The minimization of the condition number leads, under certain
conditions, to isotropic configurations, for which the roundoff-error
amplification is lowest. In this paper, the isotropy conditions, introduced
elsewhere, are the motivation behind the introduction of isotropic sets of
points. By connecting together these points, we define families of isotropic
manipulators. This paper is devoted to planar manipulators, the concepts being
currently extended to their spatial counterparts. Furthermore, only
manipulators with revolute joints are considered here.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 18:19:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Angeles",
"Jorge",
"",
"CIM"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0959 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | The Kinematic Analysis of a Symmetrical Three-Degree-of-Freedom Planar
Parallel Manipulator | null | Symposium on Robot Design, Dynamics and Control (2004) 1-7 | null | null | cs.RO | null | Presented in this paper is the kinematic analysis of a symmetrical
three-degree-of-freedom planar parallel manipulator. In opposite to serial
manipulators, parallel manipulators can admit not only multiple inverse
kinematic solutions, but also multiple direct kinematic solutions. This
property produces more complicated kinematic models but allows more flexibility
in trajectory planning. To take into account this property, the notion of
aspects, i.e. the maximal singularity-free domains, was introduced, based on
the notion of working modes, which makes it possible to separate the inverse
kinematic solutions. The aim of this paper is to show that a non-singular
assembly-mode changing trajectory exist for a symmetrical planar parallel
manipulator, with equilateral base and platform triangle.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 18:28:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0960 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Uniqueness Domains in the Workspace of Parallel Manipulators | null | Syroco' 97 (1997) 1-6 | null | null | cs.RO | null | This work investigates new kinematic features of parallel manipulators. It is
well known that parallel manipulators admit generally several direct kinematic
solutions for a given set of input joint values. The aim of this paper is to
characterize the uniqueness domains in the workspace of parallel manipulators,
as well as their image in the joint space. The study focuses on the most usual
case of parallel manipulators with only one inverse kinematic solution. The
notion of aspect introduced for serial manipulators in [Borrel 86] is redefined
for such parallel manipulators. Then, it is shown that it is possible to link
several solutions to the forward kinematic problem without meeting a
singularity, thus meaning that the aspects are not uniqueness domains. An
additional set of surfaces, namely the characteristic surfaces, are
characterized which divide the workspace into basic regions and yield new
uniqueness domains. This study is illustrated all along the paper with a 3-RPR
planar parallel manipulator. An octree model of spaces is used to compute the
joint space, the workspace and all other newly defined sets.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 18:33:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0961 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jorge Angeles (CIM) | The Kinematic design of a 3-dof Hybrid Manipulator | null | 2nd International Conference On Integrated Design and
Manufacturing in Mechanical Engineering (1998) 1-8 | null | null | cs.RO | null | This paper focuses on the kinematic properties of a new
three-degree-of-freedom hybrid manipulator. This manipulator is obtained by
adding in series to a five-bar planar mechanism (similar to the one studied by
Bajpai and Roth) a third revolute passing through the line of centers of the
two actuated revolute joints of the above linkage. The resulting architecture
is hybrid in that it has both serial and parallel links. Fully-parallel
manipulators are known for the existence of particularly undesirable
singularities (referred to as parallel singularities) where control is lost [4]
and [6]. On the other hand, due to their cantilever type of kinematic
arrangement, fully serial manipulators suffer from a lack of stiffness and from
relatively large positioning errors. The hybrid manipulator studied is
intrinsically stiffer and more accurate. Furthermore, since all actuators are
located on the first axis, the inertial effects are considerably reduced. In
addition, it is shown that the special kinematic structure of our manipulator
has the potential of avoiding parallel singularities by a suitable choice of
the "working mode", thus leading to larger workspaces. The influence of the
different structural dimensions (e.g. the link lengths) on the kinematic and
mechanical properties are analysed in view of the optimal design of such hybrid
manipulators.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 18:36:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0962 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Definition sets for the Direct Kinematics of Parallel Manipulators | null | 8th International Conference in Advanced Robotics (1997) 1-6 | null | null | cs.RO | null | The aim of this paper is to characterize the uniqueness domains in the
workspace of parallel manipulators, as well as their image in the joint space.
The notion of aspect introduced for serial manipulators in [Borrel 86] is
redefined for such parallel manipulators. Then, it is shown that it is possible
to link several solutions to the direct kinematic problem without meeting a
singularity, thus meaning that the aspects are not uniqueness domains.
Additional surfaces are characterized in the workspace which yield new
uniqueness domains. An octree model of spaces is used to compute the joint
space, the workspace and all other newly defined sets. This study is
illustrated all along the paper with a 3-RPR planar parallel manipulator.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 18:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0965 | Guillaume Hanrot | Guillaume Hanrot (INRIA Lorraine - LORIA), Damien Stehl\'e (INRIA
Rh\^one-Alpes) | Improved Analysis of Kannan's Shortest Lattice Vector Algorithm | null | Dans Advances in Cryptology - Crypto'07 4622 (2007) 170-186 | 10.1007/978-3-540-74143-5_10 | null | cs.CR cs.CC | null | The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork
essentially relies upon the intractability of computing a shortest non-zero
lattice vector and a closest lattice vector to a given target vector in high
dimensions. The best algorithms for these tasks are due to Kannan, and, though
remarkably simple, their complexity estimates have not been improved since more
than twenty years. Kannan's algorithm for solving the shortest vector problem
is in particular crucial in Schnorr's celebrated block reduction algorithm, on
which are based the best known attacks against the lattice-based encryption
schemes mentioned above. Understanding precisely Kannan's algorithm is of prime
importance for providing meaningful key-sizes. In this paper we improve the
complexity analyses of Kannan's algorithms and discuss the possibility of
improving the underlying enumeration strategy.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 18:44:05 GMT"
},
{
"version": "v2",
"created": "Wed, 9 May 2007 15:32:57 GMT"
}
] | 2009-04-16T00:00:00 | [
[
"Hanrot",
"Guillaume",
"",
"INRIA Lorraine - LORIA"
],
[
"Stehlé",
"Damien",
"",
"INRIA\n Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0705.0969 | Tshilidzi Marwala | Ishmael S. Msiza, Fulufhelo V. Nelwamondo and Tshilidzi Marwala | Artificial Neural Networks and Support Vector Machines for Water Demand
Time Series Forecasting | 6 pages | null | null | null | cs.AI | null | Water plays a pivotal role in many physical processes, and most importantly
in sustaining human life, animal life and plant life. Water supply entities
therefore have the responsibility to supply clean and safe water at the rate
required by the consumer. It is therefore necessary to implement mechanisms and
systems that can be employed to predict both short-term and long-term water
demands. The increasingly growing field of computational intelligence
techniques has been proposed as an efficient tool in the modelling of dynamic
phenomena. The primary objective of this paper is to compare the efficiency of
two computational intelligence techniques in water demand forecasting. The
techniques under comparison are the Artificial Neural Networks (ANNs) and the
Support Vector Machines (SVMs). In this study it was observed that the ANNs
perform better than the SVMs. This performance is measured against the
generalisation ability of the two.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 19:00:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Msiza",
"Ishmael S.",
""
],
[
"Nelwamondo",
"Fulufhelo V.",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.0982 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | A New Three-DOF Parallel Mechanism: Milling Machine Applications | null | The 2nd Chemnitz Parallel Kinematics Seminar (2000) 1-9 | null | null | cs.RO | null | This paper describes a new parallel kinematic architecture for machining
applications, namely, the orthoglide. This machine features three fixed
parallel linear joints which are mounted orthogonally and a mobile platform
which moves in the Cartesian x-y-z space with fixed orientation. The main
interest of the orthoglide is that it takes benefit from the advantages of the
popular PPP serial machines (regular Cartesian workspace shape and uniform
performances) as well as from the parallel kinematic arrangement of the links
(less inertia and better dynamic performances), which makes the orthoglide well
suited to high-speed machining applications. Possible extension of the
orthoglide to 5-axis machining is also investigated.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 20:01:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.0999 | Oren Somekh | Oren Somekh, Osvaldo Simeone, H. Vincent Poor, and Shlomo Shamai
(Shitz) | Cellular Systems with Full-Duplex Amplify-and-Forward Relaying and
Cooperative Base-Stations | To appear in the Proc. of the 2007 IEEE International Symposium on
Information Theory | null | 10.1109/ISIT.2007.4557197 | null | cs.IT math.IT | null | In this paper the benefits provided by multi-cell processing of signals
transmitted by mobile terminals which are received via dedicated relay
terminals (RTs) are assessed. Unlike previous works, each RT is assumed here to
be capable of full-duplex operation and receives the transmission of adjacent
relay terminals. Focusing on intra-cell TDMA and non-fading channels, a
simplified uplink cellular model introduced by Wyner is considered. This
framework facilitates analytical derivation of the per-cell sum-rate of
multi-cell and conventional single-cell receivers. In particular, the analysis
is based on the observation that the signal received at the base stations can
be interpreted as the outcome of a two-dimensional linear time invariant
system. Numerical results are provided as well in order to provide further
insight into the performance benefits of multi-cell processing with relaying.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 20:47:37 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Somekh",
"Oren",
"",
"Shitz"
],
[
"Simeone",
"Osvaldo",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.1013 | Elizeu Santos-Neto | Elizeu Santos-Neto, Matei Ripeanu and Adriana Iamnitchi | Tracking User Attention in Collaborative Tagging Communities | 8 pages. Proceedings of International ACM/IEEE Workshop on
Contextualized Attention Metadata: personalized access to digital resources
(http://ariadne.cs.kuleuven.ac.be/mediawiki/index.php/Cama2007) | null | null | null | cs.DL cs.CY | null | Collaborative tagging has recently attracted the attention of both industry
and academia due to the popularity of content-sharing systems such as
CiteULike, del.icio.us, and Flickr. These systems give users the opportunity to
add data items and to attach their own metadata (or tags) to stored data. The
result is an effective content management tool for individual users. Recent
studies, however, suggest that, as tagging communities grow, the added content
and the metadata become harder to manage due to an ease in content diversity.
Thus, mechanisms that cope with increase of diversity are fundamental to
improve the scalability and usability of collaborative tagging systems. This
paper analyzes whether usage patterns can be harnessed to improve navigability
in a growing knowledge space. To this end, it presents a characterization of
two collaborative tagging communities that target scientific literature:
CiteULike and Bibsonomy. We explore three main directions: First, we analyze
the tagging activity distribution across the user population. Second, we define
new metrics for similarity in user interest and use these metrics to uncover
the structure of the tagging communities we study. The structure we uncover
suggests a clear segmentation of interests into a large number of individuals
with unique preferences and a core set of users with interspersed interests.
Finally, we offer preliminary results that demonstrate that the interest-based
structure of the tagging community can be used to facilitate content usage as
communities scale.
| [
{
"version": "v1",
"created": "Mon, 7 May 2007 23:57:46 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jun 2007 19:38:28 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Jun 2007 19:44:46 GMT"
},
{
"version": "v4",
"created": "Sun, 24 Jun 2007 05:24:07 GMT"
}
] | 2007-06-24T00:00:00 | [
[
"Santos-Neto",
"Elizeu",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Iamnitchi",
"Adriana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0705.1025 | David Eppstein | David Eppstein | Recognizing Partial Cubes in Quadratic Time | 25 pages, five figures. This version significantly expands previous
versions, including a new report on an implementation of the algorithm and
experiments with it | Journal of Graph Algorithms and Applications 15(2) 269-293, 2011 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how to test whether a graph with n vertices and m edges is a partial
cube, and if so how to find a distance-preserving embedding of the graph into a
hypercube, in the near-optimal time bound O(n^2), improving previous O(nm)-time
solutions.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 17:59:08 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Jul 2011 22:39:16 GMT"
}
] | 2011-07-21T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0705.1031 | Tshilidzi Marwala | F.V. Nelwamondo and T. Marwala | Fuzzy Artmap and Neural Network Approach to Online Processing of Inputs
with Missing Values | 7 pages | null | null | null | cs.AI | null | An ensemble based approach for dealing with missing data, without predicting
or imputing the missing values is proposed. This technique is suitable for
online operations of neural networks and as a result, is used for online
condition monitoring. The proposed technique is tested in both classification
and regression problems. An ensemble of Fuzzy-ARTMAPs is used for
classification whereas an ensemble of multi-layer perceptrons is used for the
regression problem. Results obtained using this ensemble-based technique are
compared to those obtained using a combination of auto-associative neural
networks and genetic algorithms and findings show that this method can perform
up to 9% better in regression problems. Another advantage of the proposed
technique is that it eliminates the need for finding the best estimate of the
data, and hence, saves time.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 05:12:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nelwamondo",
"F. V.",
""
],
[
"Marwala",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.1033 | Kebin Wang | Michael A. Bender, Bradley C. Kuszmaul, Shang-Hua Teng, Kebin Wang | Optimal Cache-Oblivious Mesh Layouts | null | null | null | null | cs.DS cs.CE cs.MS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A mesh is a graph that divides physical space into regularly-shaped regions.
Meshes computations form the basis of many applications, e.g. finite-element
methods, image rendering, and collision detection. In one important mesh
primitive, called a mesh update, each mesh vertex stores a value and repeatedly
updates this value based on the values stored in all neighboring vertices. The
performance of a mesh update depends on the layout of the mesh in memory.
This paper shows how to find a memory layout that guarantees that the mesh
update has asymptotically optimal memory performance for any set of memory
parameters. Such a memory layout is called cache-oblivious. Formally, for a
$d$-dimensional mesh $G$, block size $B$, and cache size $M$ (where
$M=\Omega(B^d)$), the mesh update of $G$ uses $O(1+|G|/B)$ memory transfers.
The paper also shows how the mesh-update performance degrades for smaller
caches, where $M=o(B^d)$.
The paper then gives two algorithms for finding cache-oblivious mesh layouts.
The first layout algorithm runs in time $O(|G|\log^2|G|)$ both in expectation
and with high probability on a RAM. It uses $O(1+|G|\log^2(|G|/M)/B)$ memory
transfers in expectation and $O(1+(|G|/B)(\log^2(|G|/M) + \log|G|))$ memory
transfers with high probability in the cache-oblivious and disk-access machine
(DAM) models. The layout is obtained by finding a fully balanced decomposition
tree of $G$ and then performing an in-order traversal of the leaves of the
tree. The second algorithm runs faster by almost a $\log|G|/\log\log|G|$ factor
in all three memory models, both in expectation and with high probability. The
layout obtained by finding a relax-balanced decomposition tree of $G$ and then
performing an in-order traversal of the leaves of the tree.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 05:59:55 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 18:45:25 GMT"
}
] | 2009-10-05T00:00:00 | [
[
"Bender",
"Michael A.",
""
],
[
"Kuszmaul",
"Bradley C.",
""
],
[
"Teng",
"Shang-Hua",
""
],
[
"Wang",
"Kebin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0705.1036 | Damien Chablat | Damien Chablat (IRCCyN), Jorge Angeles (CIM) | Strategies for the Design of a Slide-o-Cam Transmission | null | Proceedings of CK2005, International Workshop on Computational
Kinematics (10/05/2005) 1-10 | null | null | cs.RO | null | The optimization of the pressure angle in a cam-follower transmission is
reported in this paper. This transmission is based on Slide-o-Cam, a cam
mechanism with multiple rollers mounted on a common translating follower. The
design of Slide-o-Cam, a transmission intended to produce a sliding motion from
a turning drive, or vice versa, was reported elsewhere. This transmission
provides pure-rolling motion, thereby reducing the friction of rack-and-pinions
and linear drives. The pressure angle is a suitable performance index for this
transmission because it determines the amount of force transmitted to the load
vs. that transmitted to the machine frame. Two alternative design strategies
are studied, namely, (i) increase the number of lobes on each cam or (ii)
increase the number of cams. This device is intended to replace the current
ball-screws in Orthoglide, a three-DOF parallel robot for the production of
translational motions, currently under development at Ecole Centrale de Nantes
for machining applications.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 07:09:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1037 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | Regions of Feasible Point-to-Point Trajectories in the Cartesian
Workspace of Fully-Parallel Manipulators | null | 25th Design Automation Conference (1999) 1-6 | null | null | cs.RO | null | The goal of this paper is to define the n-connected regions in the Cartesian
workspace of fully-parallel manipulators, i.e. the maximal regions where it is
possible to execute point-to-point motions. The manipulators considered in this
study may have multiple direct and inverse kinematic solutions. The N-connected
regions are characterized by projection, onto the Cartesian workspace, of the
connected components of the reachable configuration space defined in the
Cartesian product of the Cartesian space by the joint space. Generalized octree
models are used for the construction of all spaces. This study is illustrated
with a simple planar fully-parallel manipulator.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 07:11:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1038 | Damien Chablat | F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | The Design of Parallel Kinematic Machine Tools Using Kinetostatic
Performance Criteria | null | 3d Int. Conference on Metal Cutting (2001) 1-10 | null | null | cs.RO | null | Most industrial machine tools have a serial kinematic architecture, which
means that each axis has to carry the following one, including its actuators
and joints. High Speed Machining highlights some drawbacks of such
architectures: heavy moving parts require from the machine structure high
stiffness to limit bending problems that lower the machine accuracy, and limit
the dynamic performances of the feed axes. That is why PKMs attract more and
more researchers and companies, because they are claimed to offer several
advantages over their serial counterparts, like high structural rigidity and
high dynamic capacities. Indeed, the parallel kinematic arrangement of the
links provides higher stiffness and lower moving masses that reduce inertia
effects. Thus, PKMs have better dynamic performances. However, the design of a
parallel kinematic machine tool (PKMT) is a hard task that requires further
research studies before wide industrial use can be expected. Many criteria need
to be taken into account in the design of a PKMT. We pay special attention to
the description of kinetostatic criteria that rely on the conditioning of the
Jacobian matrix of the mechanism. The organisation of this paper is as follows:
next section introduces general remarks about PKMs, then is explained why PKMs
can be interesting alternative machine tool designs. Then are presented
existing PKMTs. An application to the design of a small-scale machine tool
prototype developed at IRCCyN is presented at the end of this paper.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 07:13:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Majou",
"Félix",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1110 | Edgar Graaf de | Edgar de Graaf Joost Kok Walter Kosters | Mining Patterns with a Balanced Interval | null | null | null | null | cs.AI cs.DB | null | In many applications it will be useful to know those patterns that occur with
a balanced interval, e.g., a certain combination of phone numbers are called
almost every Friday or a group of products are sold a lot on Tuesday and
Thursday.
In previous work we proposed a new measure of support (the number of
occurrences of a pattern in a dataset), where we count the number of times a
pattern occurs (nearly) in the middle between two other occurrences. If the
number of non-occurrences between two occurrences of a pattern stays almost the
same then we call the pattern balanced.
It was noticed that some very frequent patterns obviously also occur with a
balanced interval, meaning in every transaction. However more interesting
patterns might occur, e.g., every three transactions. Here we discuss a
solution using standard deviation and average. Furthermore we propose a simpler
approach for pruning patterns with a balanced interval, making estimating the
pruning threshold more intuitive.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 15:22:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kosters",
"Edgar de Graaf Joost Kok Walter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0705.1148 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | S\'eparation des Solutions aux Mod\`eles G\'eom\'etriques Direct et
Inverse pour les Manipulateurs Pleinement Parall\`eles | null | Journal of Mechanism and Machine Theory 36, 6 (2001) 763-783 | null | null | cs.RO | null | This article provides a formalism making it possible to manage the solutions
of the direct and inverse kinematic models of the fully parallel manipulators.
We introduce the concept of working modes to separate the solutions from the
opposite geometrical model. Then, we define, for each working mode, the aspects
of these manipulators. To separate the solutions from the direct kinematics
model, we introduce the concept of characteristic surfaces. Then, we define the
uniqueness domains, as being the greatest domains of the workspace in which
there is unicity of solutions. The principal applications of this work are the
design, the trajectory planning.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 19:10:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1150 | Damien Chablat | Damien Chablat (IRCCyN), Jorge Angeles (CIM) | On the Kinetostatic Optimization of Revolute-Coupled Planar Manipulators | null | Journal of Mechanism and Machine Theory (2002) 351-374 | null | null | cs.RO | null | Proposed in this paper is a kinetostatic performance index for the optimum
dimensioning of planar manipulators of the serial type. The index is based on
the concept of distance of the underlying Jacobian matrix to a given isotropic
matrix that is used as a reference model for purposes of performance
evaluation. Applications of the index fall in the realm of design, but control
applications are outlined. The paper focuses on planar manipulators, the basic
concepts being currently extended to their three-dimensional counterparts.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 19:11:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1151 | Mustafa Cenk Gursoy | Junwei Zhang, Mustafa Cenk Gursoy | Achievable Rates and Optimal Resource Allocation for Imperfectly-Known
Fading Relay Channels | null | null | null | null | cs.IT math.IT | null | In this paper, achievable rates of imperfectly-known fading relay channels
are studied. It is assumed that communication starts with the network training
phase in which the receivers estimate the fading coefficients of their
respective channels. In the data transmission phase, amplify-and-forward and
decode-and-forward relaying schemes are considered, and the corresponding
achievable rate expressions are obtained. The achievable rate expressions are
then employed to identify the optimal resource allocation strategies.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 19:21:40 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Zhang",
"Junwei",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.1159 | Andrew Eckford | Andrew W. Eckford | Ordering Finite-State Markov Channels by Mutual Information | 5 pages, no figures. To be presented at the 2007 IEEE International
Symposium on Information Theory, Nice, France, June 2007 | null | null | null | cs.IT math.IT | null | In previous work, an ordering result was given for the symbolwise probability
of error using general Markov channels, under iterative decoding of LDPC codes.
In this paper, the ordering result is extended to mutual information, under the
assumption of an iid input distribution. For certain channels, in which the
capacity-achieving input distribution is iid, this allows ordering of the
channels by capacity. The complexity of analyzing general Markov channels is
mitigated by this ordering, since it is possible to immediately determine that
a wide class of channels, with different numbers of states, has a smaller
mutual information than a given channel.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 20:48:18 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Eckford",
"Andrew W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.1161 | Lillian Lee | Lillian Lee | IDF revisited: A simple new derivation within the Robertson-Sp\"arck
Jones probabilistic model | To appear, Proceedings of SIGIR 2007, poster paper (2 pages) | null | null | null | cs.IR cs.CL | null | There have been a number of prior attempts to theoretically justify the
effectiveness of the inverse document frequency (IDF). Those that take as their
starting point Robertson and Sparck Jones's probabilistic model are based on
strong or complex assumptions. We show that a more intuitively plausible
assumption suffices. Moreover, the new assumption, while conceptually very
simple, provides a solution to an estimation problem that had been deemed
intractable by Robertson and Walker (1997).
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 20:08:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Lillian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0705.1183 | Ruoheng Liu | Ruoheng Liu and H. Vincent Poor | Multiple Antenna Secure Broadcast over Wireless Networks | 14 pages, 3 figures, to appear in the Proceedings of the First
International Workshop on Information Theory for Sensor Networks, Santa Fe,
NM, June 18 - 20, 2007 | null | null | null | cs.IT math.IT | null | In wireless data networks, communication is particularly susceptible to
eavesdropping due to its broadcast nature. Security and privacy systems have
become critical for wireless providers and enterprise networks. This paper
considers the problem of secret communication over the Gaussian broadcast
channel, where a multi-antenna transmitter sends independent confidential
messages to two users with perfect secrecy. That is, each user would like to
obtain its own message reliably and confidentially. First, a computable
Sato-type outer bound on the secrecy capacity region is provided for a
multi-antenna broadcast channel with confidential messages. Next, a dirty-paper
secure coding scheme and its simplified version are described. For each case,
the corresponding achievable rate region is derived under the perfect secrecy
requirement. Finally, two numerical examples demonstrate that the Sato-type
outer bound is consistent with the boundary of the simplified dirty-paper
coding secrecy rate region.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 21:50:24 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Liu",
"Ruoheng",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.1187 | Sergey Loyka | Sergey Loyka, Victoria Kostina, Francois Gagnon | Symbol Error Rates of Maximum-Likelihood Detector: Convex/Concave
Behavior and Applications | To appear in 2007 IEEE International Symposium on Information Theory
(ISIT 2007), Nice, June 2007 | null | 10.1109/ISIT.2007.4557176 | null | cs.IT math.IT | null | Convexity/concavity properties of symbol error rates (SER) of the maximum
likelihood detector operating in the AWGN channel (non-fading and fading) are
studied. Generic conditions are identified under which the SER is a
convex/concave function of the SNR. Universal bounds for the SER 1st and 2nd
derivatives are obtained, which hold for arbitrary constellations and are tight
for some of them. Applications of the results are discussed, which include
optimum power allocation in spatial multiplexing systems, optimum power/time
sharing to decrease or increase (jamming problem) error rate, and implication
for fading channels.
| [
{
"version": "v1",
"created": "Tue, 8 May 2007 23:18:16 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Loyka",
"Sergey",
""
],
[
"Kostina",
"Victoria",
""
],
[
"Gagnon",
"Francois",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.1209 | Tshilidzi Marwala | E. Habtemariam, T. Marwala and M. Lagazio | Artificial Intelligence for Conflict Management | 20 pages | null | null | null | cs.AI | null | Militarised conflict is one of the risks that have a significant impact on
society. Militarised Interstate Dispute (MID) is defined as an outcome of
interstate interactions, which result on either peace or conflict. Effective
prediction of the possibility of conflict between states is an important
decision support tool for policy makers. In a previous research, neural
networks (NNs) have been implemented to predict the MID. Support Vector
Machines (SVMs) have proven to be very good prediction techniques and are
introduced for the prediction of MIDs in this study and compared to neural
networks. The results show that SVMs predict MID better than NNs while NNs give
more consistent and easy to interpret sensitivity analysis than SVMs.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 05:53:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Habtemariam",
"E.",
""
],
[
"Marwala",
"T.",
""
],
[
"Lagazio",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.1214 | Tshilidzi Marwala | Tshilidzi Marwala | Control of Complex Systems Using Bayesian Networks and Genetic Algorithm | 6 pages | null | null | null | cs.CE cs.NE | null | A method based on Bayesian neural networks and genetic algorithm is proposed
to control the fermentation process. The relationship between input and output
variables is modelled using Bayesian neural network that is trained using
hybrid Monte Carlo method. A feedback loop based on genetic algorithm is used
to change input variables so that the output variables are as close to the
desired target as possible without the loss of confidence level on the
prediction that the neural network gives. The proposed procedure is found to
reduce the distance between the desired target and measured outputs
significantly.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 07:08:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0705.1215 | Damien Chablat | Anatoly Pashkevich (Robotic Laboratory), Damien Chablat (IRCCyN),
Philippe Wenger (IRCCyN) | Kinematic Calibration of the Orthoglide-Type Mechanisms | null | Symposium on Information Control Problems in Manufacturing (2006)
1-6 | null | null | cs.RO | null | The paper proposes a novel calibration approach for the Orthoglide-type
mechanisms based on observations of the manipulator leg parallelism during
motions between the prespecified test postures. It employs a low-cost measuring
system composed of standard comparator indicators attached to the universal
magnetic stands. They are sequentially used for measuring the deviation of the
relevant leg location while the manipulator moves the TCP along the Cartesian
axes. Using the measured differences, the developed algorithm estimates the
joint offsets that are treated as the most essential parameters to be adjusted.
The sensitivity of the measurement methods and the calibration accuracy are
also studied. Experimental results are presented that demonstrate validity of
the proposed calibration technique.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 07:21:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"Robotic Laboratory"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1217 | Damien Chablat | J\'erome Renotte (IRCCyN), Damien Chablat (IRCCyN), Jorge Angeles
(CIM) | The Design of a Novel Prismatic Drive for a Three-DOF
Parallel-Kinematics Machine | null | ASME Design Engineering Technical Conferences (2004) 1-10 | null | null | cs.RO | null | The design of a novel prismatic drive is reported in this paper. This
transmission is based on Slide-O-Cam, a cam mechanism with multiple rollers
mounted on a common translating follower. The design of Slide-O-Cam was
reported elsewhere. This drive thus provides pure-rolling motion, thereby
reducing the friction of rack-and-pinions and linear drives. Such properties
can be used to design new transmissions for parallel-kinematics machines. In
this paper, this transmission is optimized to replace ball-screws in
Orthoglide, a three-DOF parallel robot optimized for machining applications.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 07:27:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Renotte",
"Jérome",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1218 | Damien Chablat | Anatoly Pashkevich (ROBOTIC Laboratory), Roman Gomolitsky (ROBOTIC
Laboratory), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Calibration of quasi-isotropic parallel kinematic Machines: Orthoglide | null | Fourth International Conference on Informatics in Control,
Automation and Robotics (09/05/2007) 1-8 | null | null | cs.RO | null | The paper proposes a novel approach for the geometrical model calibration of
quasi-isotropic parallel kinematic mechanisms of the Orthoglide family. It is
based on the observations of the manipulator leg parallelism during motions
between the specific test postures and employs a low-cost measuring system
composed of standard comparator indicators attached to the universal magnetic
stands. They are sequentially used for measuring the deviation of the relevant
leg location while the manipulator moves the TCP along the Cartesian axes.
Using the measured differences, the developed algorithm estimates the joint
offsets and the leg lengths that are treated as the most essential parameters.
Validity of the proposed calibration technique is confirmed by the experimental
results.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 07:30:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"ROBOTIC Laboratory"
],
[
"Gomolitsky",
"Roman",
"",
"ROBOTIC\n Laboratory"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1227 | Petar Popovski | Petar Popovski, Hiroyuki Yomo, Kentaro Nishimori, and Rocco Di Taranto | Rate Adaptation for Cognitive Radio under Interference from Primary
Spectrum User | submitted to IEEE Journal on Selected Areas in Communications
"Cognitive Radio: Theory and Applications", March 2007 | null | null | null | cs.IT cs.NI math.IT | null | A cognitive radio can operate as a secondary system in a given spectrum. This
operation should use limited power in order not to disturb the communication by
primary spectrum user. Under such conditions, in this paper we investigate how
to maximize the spectral efficiency in the secondary system. A secondary
receiver observes a multiple access channel of two users, the secondary and the
primary transmitter, respectively. We show that, for spectrally-efficient
operation, the secondary system should apply Opportunistic Interference
Cancellation (OIC). With OIC, the secondary system decodes the primary signal
when such an opportunity is created by the primary rate and the power received
from the primary system. For such an operation, we derive the achievable data
rate in the secondary system. When the primary signal is decodable, we devise a
method, based on superposition coding, by which the secondary system can
achieve the maximal possible rate. Finally, we investigate the power allocation
in the secondary system when multiple channels are used. We show that the
optimal power allocation with OIC can be achieved through intercepted
water-filling instead of the conventional water-filling. The results show a
significant gain for the rate achieved through an opportunistic interference
cancellation.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 08:50:53 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Popovski",
"Petar",
""
],
[
"Yomo",
"Hiroyuki",
""
],
[
"Nishimori",
"Kentaro",
""
],
[
"Di Taranto",
"Rocco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0705.1244 | Marc Schoenauer | Nicolas Godzik (INRIA Futurs, INRIA Rocquencourt), Marc Schoenauer
(INRIA Futurs, INRIA Rocquencourt), Mich\`ele Sebag (INRIA Futurs, LRI) | Evolving Symbolic Controllers | null | Dans 4th European Workshop on Evolutionary Robotics, 2611 (2003)
638-650 | null | null | cs.AI | null | The idea of symbolic controllers tries to bridge the gap between the top-down
manual design of the controller architecture, as advocated in Brooks'
subsumption architecture, and the bottom-up designer-free approach that is now
standard within the Evolutionary Robotics community. The designer provides a
set of elementary behavior, and evolution is given the goal of assembling them
to solve complex tasks. Two experiments are presented, demonstrating the
efficiency and showing the recursiveness of this approach. In particular, the
sensitivity with respect to the proposed elementary behaviors, and the
robustness w.r.t. generalization of the resulting controllers are studied in
detail.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 09:53:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Godzik",
"Nicolas",
"",
"INRIA Futurs, INRIA Rocquencourt"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs, INRIA Rocquencourt"
],
[
"Sebag",
"Michèle",
"",
"INRIA Futurs, LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.1271 | Damien Chablat | F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | Design of a 3 Axis Parallel Machine Tool for High Speed Machining: The
Orthoglide | null | 4\`eme Conf\'erence Internationale sur la Conception et la
fabrication Int\'egr\'ees en M\'ecanique (2002) 1-10 | null | null | cs.RO | null | The Orthoglide project aims at designing a new 3-axis machine tool for High
Speed Machining. Basis kinematics is a 3 degree-of-freedom translational
parallel mechanism. This basis was submitted to isotropic and manipulability
constraints that allowed the optmization of its kinematic architecture and legs
architecture. Thus, several leg morphologies are convenient for the chosen
mechanism. We explain the process that led us to the choice we made for the
Orthoglide. A static study is presented to show how singular configurations of
the legs can cause stiffness problems.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 12:23:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Majou",
"Félix",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1272 | Damien Chablat | Damien Chablat (IRCCyN), St\'ephane Caro (IRCCyN), Philippe Wenger
(IRCCyN), Jorge Angeles (CIM) | The Isoconditioning Loci of Planar Three-DOF Parallel Manipulators | null | 4\`eme Conf\'erence Internationale sur la Conception et la
fabrication Int\'egr\'ees en M\'ecanique (2002) 1-10 | null | null | cs.RO | null | The subject of this paper is a special class of parallel manipulators. First,
we analyze a family of three-degree-of-freedom manipulators. Two Jacobian
matrices appear in the kinematic relations between the joint-rate and the
Cartesian-velocity vectors, which are called the "inverse kinematics" and the
"direct kinematics" matrices. The singular configurations of these matrices are
studied. The isotropic configurations are then studied based on the
characteristic length of this manipulator. The isoconditioning loci of all
Jacobian matrices are computed to define a global performance index to compare
the different working modes.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 12:27:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1280 | Damien Chablat | F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | A Novel method for the design of 2-DOF Parallel mechanisms for machining
applications | null | 8th International Symposium on Advances in Robot Kinematics (2002)
1-11 | null | null | cs.RO | null | Parallel Kinematic Mechanisms (PKM) are interesting alternative designs for
machine tools. A design method based on velocity amplification factors analysis
is presented in this paper. The comparative study of two simple
two-degree-of-freedom PKM dedicated to machining applications is led through
this method: the common desired properties are the largest square Cartesian
workspace for given kinetostatic performances. The orientation and position of
the Cartesian workspace are chosen to avoid singularities and to produce the
best ratio between Cartesian workspace size and mechanism size. The machine
size of each resulting design is used as a comparative criterion.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 13:18:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Majou",
"Félix",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1282 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Design of a Three-Axis Isotropic Parallel Manipulator for Machining
Applications: The Orthoglide | null | Workshop on Fundamental Issues and Future Research Directions for
Parallel Mechanisms and Manipulators (2002) 1-9 | null | null | cs.RO | null | The orthoglide is a 3-DOF parallel mechanism designed at IRCCyN for machining
applications. It features three fixed parallel linear joints which are mounted
orthogonally and a mobile platform which moves in the Cartesian x-y-z space
with fixed orientation. The orthoglide has been designed as function of a
prescribed Cartesian workspace with prescribed kinetostatic performances. The
interesting features of the orthoglide are a regular Cartesian workspace shape,
uniform performances in all directions and good compactness. A small-scale
prototype of the orthoglide under development is presented at the end of this
paper.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 13:23:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1284 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Jean-Pierre Merlet
(COPRIN) | Workspace Analysis of the Orthoglide using Interval Analysis | null | 8th International Symposium on Advances in Robot Kinematics,
Kluwer Academic Publishers (2002) 1-10 | null | null | cs.RO | null | This paper addresses the workspace analysis of the orthoglide, a 3-DOF
parallel mechanism designed for machining applications. This machine features
three fixed parallel linear joints which are mounted orthogonally and a mobile
platform which moves in the Cartesian x-y-z space with fixed orientation. The
workspace analysis is conducted on the bases of prescribed kinetostatic
performances. The interesting features of the orthoglide are a regular
Cartesian workspace shape, uniform performances in all directions and good
compactness. Interval analysis based methods for computing the dextrous
workspace and the largest cube enclosed in this workspace are presented.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 13:24:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Merlet",
"Jean-Pierre",
"",
"COPRIN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1285 | Damien Chablat | Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Bernard Hoessler,
Matthieu Guibert | P\'eriph\'eriques haptiques et simulation d'objets, de robots et de
mannequins dans un environnement de CAO-Robotique : eM-Virtual Desktop | null | Virtual Concept (2002) 51-56 | null | null | cs.RO | null | This paper presents the development of a new software in order to manage
objects, robots and mannequins in using the possibilities given by the haptic
feedback of the Phantom desktop devices. The haptic device provides 6
positional degree of freedom sensing but three degrees force feedback. This
software called eM-Virtual Desktop is integrated in the Tecnomatix's solution
called eM-Workplace. The eM-Workplace provides powerful solutions for planning
and designing of complex assembly facilities, lines and workplaces. In the
digital mockup context, the haptic interfaces can be used to reduce the
development cycle of products. Three different loops are used to manage the
graphic, the collision detection and the haptic feedback according to theirs
own frequencies. The developed software is currently tested in industrial
context by a European automotive constructor.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 13:26:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Hoessler",
"Bernard",
""
],
[
"Guibert",
"Matthieu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0705.1288 | Tshilidzi Marwala | E. Marais, T. Marwala | Predicting the Presence of Internet Worms using Novelty Detection | 12 pages | null | null | null | cs.CR | null | Internet worms cause billions of dollars in damage yearly, affecting millions
of users worldwide. For countermeasures to be deployed timeously, it is
necessary to use an automated system to detect the spread of a worm. This paper
discusses a method of determining the presence of a worm, based on routing
information currently available from Internet routers. An autoencoder, which is
a specialized type of neural network, was used to detect anomalies in normal
routing behavior. The autoencoder was trained using information from a single
router, and was able to detect both global instability caused by worms as well
as localized routing instability.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 13:33:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marais",
"E.",
""
],
[
"Marwala",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0705.1309 | Marc Schoenauer | Alexandre Devert (INRIA Futurs), Nicolas Bred\`eche (INRIA Futurs),
Marc Schoenauer (INRIA Futurs) | Robust Multi-Cellular Developmental Design | null | Dans Genetic and Evolutionary Computation COnference (2007) | null | null | cs.AI | null | This paper introduces a continuous model for Multi-cellular Developmental
Design. The cells are fixed on a 2D grid and exchange "chemicals" with their
neighbors during the growth process. The quantity of chemicals that a cell
produces, as well as the differentiation value of the cell in the phenotype,
are controlled by a Neural Network (the genotype) that takes as inputs the
chemicals produced by the neighboring cells at the previous time step. In the
proposed model, the number of iterations of the growth process is not
pre-determined, but emerges during evolution: only organisms for which the
growth process stabilizes give a phenotype (the stable state), others are
declared nonviable. The optimization of the controller is done using the NEAT
algorithm, that optimizes both the topology and the weights of the Neural
Networks. Though each cell only receives local information from its neighbors,
the experimental results of the proposed approach on the 'flags' problems (the
phenotype must match a given 2D pattern) are almost as good as those of a
direct regression approach using the same model with global information.
Moreover, the resulting multi-cellular organisms exhibit almost perfect
self-healing characteristics.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 15:33:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devert",
"Alexandre",
"",
"INRIA Futurs"
],
[
"Bredèche",
"Nicolas",
"",
"INRIA Futurs"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0705.1336 | Sergey Loyka | Sergey Loyka, George Levin | Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO
Systems | To appear in 2007 IEEE International Symposium on Information Theory
(ISIT 2007), Nice, June 2007 | null | 10.1109/ISIT.2007.4557189 | null | cs.IT math.IT | null | Diversity-multiplexing tradeoff (DMT) presents a compact framework to compare
various MIMO systems and channels in terms of the two main advantages they
provide (i.e. high data rate and/or low error rate). This tradeoff was
characterized asymptotically (SNR-> infinity) for i.i.d. Rayleigh fading
channel by Zheng and Tse [1]. The asymptotic DMT overestimates the finite-SNR
one [2]. In this paper, using the recent results on the asymptotic (in the
number of antennas) outage capacity distribution, we derive and analyze the
finite-SNR DMT for a broad class of channels (not necessarily Rayleigh fading).
Based on this, we give the convergence conditions for the asymptotic DMT to be
approached by the finite-SNR one. The multiplexing gain definition is shown to
affect critically the convergence point: when the multiplexing gain is defined
via the mean (ergodic) capacity, the convergence takes place at realistic SNR
values. Furthermore, in this case the diversity gain can also be used to
estimate the outage probability with reasonable accuracy. The multiplexing gain
definition via the high-SNR asymptote of the mean capacity (as in [1]) results
in very slow convergence for moderate to large systems (as 1/ln(SNR)^2) and,
hence, the asymptotic DMT cannot be used at realistic SNR values. For this
definition, the high-SNR threshold increases exponentially in the number of
antennas and in the multiplexing gain. For correlated keyhole channel, the
diversity gain is shown to decrease with correlation and power imbalance of the
channel. While the SNR-asymptotic DMT of Zheng and Tse does not capture this
effect, the size-asymptotic DMT does.
| [
{
"version": "v1",
"created": "Wed, 9 May 2007 17:49:54 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Loyka",
"Sergey",
""
],
[
"Levin",
"George",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |