id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
unknown
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0704.2452
Raman Yazdani
Raman Yazdani, Masoud Ardakani
Optimum Linear LLR Calculation for Iterative Decoding on Fading Channels
This paper will be presented in IEEE International Symposium on Information Theory (ISIT) 2007 in Nice, France
null
10.1109/ISIT.2007.4557204
null
cs.IT math.IT
null
On a fading channel with no channel state information at the receiver, calculating true log-likelihood ratios (LLR) is complicated. Existing work assume that the power of the additive noise is known and use the expected value of the fading gain in a linear function of the channel output to find approximate LLRs. In this work, we first assume that the power of the additive noise is known and we find the optimum linear approximation of LLRs in the sense of maximum achievable transmission rate on the channel. The maximum achievable rate under this linear LLR calculation is almost equal to the maximum achievable rate under true LLR calculation. We also observe that this method appears to be the optimum in the sense of bit error rate performance too. These results are then extended to the case that the noise power is unknown at the receiver and a performance almost identical to the case that the noise power is perfectly known is obtained.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 02:22:52 GMT" } ]
"2012-04-17T00:00:00"
[ [ "Yazdani", "Raman", "" ], [ "Ardakani", "Masoud", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2475
Zhang Shengli
Zhang Shengli, Soung-Chang Liew, Patrick P.K. Lam
Physical Layer Network Coding
null
null
null
null
cs.IT math.IT
null
A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in multi-hop networks. More specifically, the information-theoretic capacity of PNC is almost double that of traditional transmission in the SNR region of practical interest (higher than 0dB). We believe this is a first paper that ventures into EM-wave-based network coding at the physical layer and demonstrates its potential for boosting network capacity.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 08:15:37 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Shengli", "Zhang", "" ], [ "Liew", "Soung-Chang", "" ], [ "Lam", "Patrick P. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2505
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
Algebraic Distributed Space-Time Codes with Low ML Decoding Complexity
5 pages, no figures. To appear in Proceedings of IEEE ISIT 2007, Nice, France
null
10.1109/ISIT.2007.4557437
null
cs.IT cs.DM math.IT
null
"Extended Clifford algebras" are introduced as a means to obtain low ML decoding complexity space-time block codes. Using left regular matrix representations of two specific classes of extended Clifford algebras, two systematic algebraic constructions of full diversity Distributed Space-Time Codes (DSTCs) are provided for any power of two number of relays. The left regular matrix representation has been shown to naturally result in space-time codes meeting the additional constraints required for DSTCs. The DSTCs so constructed have the salient feature of reduced Maximum Likelihood (ML) decoding complexity. In particular, the ML decoding of these codes can be performed by applying the lattice decoder algorithm on a lattice of four times lesser dimension than what is required in general. Moreover these codes have a uniform distribution of power among the relays and in time, thus leading to a low Peak to Average Power Ratio at the relays.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 11:05:31 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2507
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
STBCs from Representation of Extended Clifford Algebras
5 pages, no figures, To appear in Proceedings of IEEE ISIT 2007, Nice, France
null
10.1109/ISIT.2007.4557141
null
cs.IT cs.DM math.IT
null
A set of sufficient conditions to construct $\lambda$-real symbol Maximum Likelihood (ML) decodable STBCs have recently been provided by Karmakar et al. STBCs satisfying these sufficient conditions were named as Clifford Unitary Weight (CUW) codes. In this paper, the maximal rate (as measured in complex symbols per channel use) of CUW codes for $\lambda=2^a,a\in\mathbb{N}$ is obtained using tools from representation theory. Two algebraic constructions of codes achieving this maximal rate are also provided. One of the constructions is obtained using linear representation of finite groups whereas the other construction is based on the concept of right module algebra over non-commutative rings. To the knowledge of the authors, this is the first paper in which matrices over non-commutative rings is used to construct STBCs. An algebraic explanation is provided for the 'ABBA' construction first proposed by Tirkkonen et al and the tensor product construction proposed by Karmakar et al. Furthermore, it is established that the 4 transmit antenna STBC originally proposed by Tirkkonen et al based on the ABBA construction is actually a single complex symbol ML decodable code if the design variables are permuted and signal sets of appropriate dimensions are chosen.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 11:16:40 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2509
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
Signal Set Design for Full-Diversity Low-Decoding-Complexity Differential Scaled-Unitary STBCs
5 pages, 2 figures. To appear in Proceedings of IEEE ISIT 2007, Nice, France
null
10.1109/ISIT.2007.4557453
null
cs.IT math.IT
null
The problem of designing high rate, full diversity noncoherent space-time block codes (STBCs) with low encoding and decoding complexity is addressed. First, the notion of $g$-group encodable and $g$-group decodable linear STBCs is introduced. Then for a known class of rate-1 linear designs, an explicit construction of fully-diverse signal sets that lead to four-group encodable and four-group decodable differential scaled unitary STBCs for any power of two number of antennas is provided. Previous works on differential STBCs either sacrifice decoding complexity for higher rate or sacrifice rate for lower decoding complexity.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 11:25:23 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2511
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
Noncoherent Low-Decoding-Complexity Space-Time Codes for Wireless Relay Networks
5 pages, no figures. To appear in Proceedings of IEEE ISIT 2007, Nice, France
null
10.1109/ISIT.2007.4557438
null
cs.IT math.IT
null
The differential encoding/decoding setup introduced by Kiran et al, Oggier et al and Jing et al for wireless relay networks that use codebooks consisting of unitary matrices is extended to allow codebooks consisting of scaled unitary matrices. For such codebooks to be used in the Jing-Hassibi protocol for cooperative diversity, the conditions that need to be satisfied by the relay matrices and the codebook are identified. A class of previously known rate one, full diversity, four-group encodable and four-group decodable Differential Space-Time Codes (DSTCs) is proposed for use as Distributed DSTCs (DDSTCs) in the proposed set up. To the best of our knowledge, this is the first known low decoding complexity DDSTC scheme for cooperative wireless networks.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 11:28:49 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2542
Joan Llobera
Joan Llobera
Narratives within immersive technologies
5 pages
null
null
null
cs.HC
null
The main goal of this project is to research technical advances in order to enhance the possibility to develop narratives within immersive mediated environments. An important part of the research is concerned with the question of how a script can be written, annotated and realized for an immersive context. A first description of the main theoretical framework and the ongoing work and a first script example is provided. This project is part of the program for presence research, and it will exploit physiological feedback and Computational Intelligence within virtual reality.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 14:27:25 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Llobera", "Joan", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.2544
Vishwambhar Rathi
Vishwambhar Rathi, Ruediger Urbanke
Existence Proofs of Some EXIT Like Functions
To appear in proc. of ISIT 2007
null
null
null
cs.IT math.IT
null
The Extended BP (EBP) Generalized EXIT (GEXIT) function introduced in \cite{MMRU05} plays a fundamental role in the asymptotic analysis of sparse graph codes. For transmission over the binary erasure channel (BEC) the analytic properties of the EBP GEXIT function are relatively simple and well understood. The general case is much harder and even the existence of the curve is not known in general. We introduce some tools from non-linear analysis which can be useful to prove the existence of EXIT like curves in some cases. The main tool is the Krasnoselskii-Rabinowitz (KR) bifurcation theorem.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 14:36:43 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Rathi", "Vishwambhar", "" ], [ "Urbanke", "Ruediger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2596
Markus Grassl
Markus Grassl
Computing Extensions of Linear Codes
accepted for publication at ISIT 07
Proceedings 2007 IEEE International Symposium on Information Theory (ISIT 2007), Nice, France, June 2007, pp. 476-480
10.1109/ISIT.2007.4557095
null
cs.IT cs.DM math.IT
null
This paper deals with the problem of increasing the minimum distance of a linear code by adding one or more columns to the generator matrix. Several methods to compute extensions of linear codes are presented. Many codes improving the previously known lower bounds on the minimum distance have been found.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 19:28:33 GMT" } ]
"2011-03-31T00:00:00"
[ [ "Grassl", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2609
Shamil Shakirov
V.Dolotin, A.Morozov and Sh.Shakirov
A-infinity structure on simplicial complexes
final version. 29 pages
null
10.1007/s11232-008-0093-9
ITEP/TH-13/07
math.GT cs.DM hep-th
null
A discrete (finite-difference) analogue of differential forms is considered, defined on simplicial complexes, including triangulations of continuous manifolds. Various operations are explicitly defined on these forms, including exterior derivative and exterior product. The latter one is non-associative. Instead, as anticipated, it is a part of non-trivial A-infinity structure, involving a chain of poly-linear operations, constrained by nilpotency relation: (d + \wedge + m + ...)^n = 0 with n=2.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 20:48:51 GMT" }, { "version": "v2", "created": "Sun, 22 Apr 2007 19:42:39 GMT" }, { "version": "v3", "created": "Thu, 17 May 2007 17:29:02 GMT" }, { "version": "v4", "created": "Sat, 23 Jun 2007 02:42:15 GMT" }, { "version": "v5", "created": "Fri, 19 Oct 2007 16:52:46 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Dolotin", "V.", "" ], [ "Morozov", "A.", "" ], [ "Shakirov", "Sh.", "" ] ]
[ { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" } ]
0704.2644
Maxim Raginsky
Maxim Raginsky
Joint universal lossy coding and identification of stationary mixing sources
5 pages, 1 eps figure; to appear in Proc. ISIT 2007
null
null
null
cs.IT cs.LG math.IT
null
The problem of joint universal source coding and modeling, treated in the context of lossless codes by Rissanen, was recently generalized to fixed-rate lossy coding of finitely parametrized continuous-alphabet i.i.d. sources. We extend these results to variable-rate lossy block coding of stationary ergodic sources and show that, for bounded metric distortion measures, any finitely parametrized family of stationary sources satisfying suitable mixing, smoothness and Vapnik-Chervonenkis learnability conditions admits universal schemes for joint lossy source coding and identification. We also give several explicit examples of parametric sources satisfying the regularity conditions.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 01:25:22 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2651
Lalitha Sankar
Lalitha Sankar, Yingbin Liang, H. Vincent Poor, Narayan B. Mandayam
Opportunistic Communications in an Orthogonal Multiaccess Relay Channel
To appear in the Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24 - 29, 2007
null
10.1109/ISIT.2007.4557396
null
cs.IT math.IT
null
The problem of resource allocation is studied for a two-user fading orthogonal multiaccess relay channel (MARC) where both users (sources) communicate with a destination in the presence of a relay. A half-duplex relay is considered that transmits on a channel orthogonal to that used by the sources. The instantaneous fading state between every transmit-receive pair in this network is assumed to be known at both the transmitter and receiver. Under an average power constraint at each source and the relay, the sum-rate for the achievable strategy of decode-and-forward (DF) is maximized over all power allocations (policies) at the sources and relay. It is shown that the sum-rate maximizing policy exploits the multiuser fading diversity to reveal the optimality of opportunistic channel use by each user. A geometric interpretation of the optimal power policy is also presented.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 04:02:33 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Sankar", "Lalitha", "" ], [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ], [ "Mandayam", "Narayan B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2659
Chris Ng
Chris T. K. Ng, Deniz Gunduz, Andrea J. Goldsmith, Elza Erkip
Minimum Expected Distortion in Gaussian Layered Broadcast Coding with Successive Refinement
To appear in the proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24-29, 2007
null
10.1109/ISIT.2007.4557165
null
cs.IT math.IT
null
A transmitter without channel state information (CSI) wishes to send a delay-limited Gaussian source over a slowly fading channel. The source is coded in superimposed layers, with each layer successively refining the description in the previous one. The receiver decodes the layers that are supported by the channel realization and reconstructs the source up to a distortion. In the limit of a continuum of infinite layers, the optimal power distribution that minimizes the expected distortion is given by the solution to a set of linear differential equations in terms of the density of the fading distribution. In the optimal power distribution, as SNR increases, the allocation over the higher layers remains unchanged; rather the extra power is allocated towards the lower layers. On the other hand, as the bandwidth ratio b (channel uses per source symbol) tends to zero, the power distribution that minimizes expected distortion converges to the power distribution that maximizes expected capacity. While expected distortion can be improved by acquiring CSI at the transmitter (CSIT) or by increasing diversity from the realization of independent fading paths, at high SNR the performance benefit from diversity exceeds that from CSIT, especially when b is large.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 07:41:35 GMT" }, { "version": "v2", "created": "Tue, 24 Apr 2007 00:23:10 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Ng", "Chris T. K.", "" ], [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea J.", "" ], [ "Erkip", "Elza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2668
Alex Smola J
Le Song, Alex Smola, Arthur Gretton, Karsten Borgwardt, Justin Bedo
Supervised Feature Selection via Dependence Estimation
9 pages
null
null
null
cs.LG
null
We introduce a framework for filtering features that employs the Hilbert-Schmidt Independence Criterion (HSIC) as a measure of dependence between the features and the labels. The key idea is that good features should maximise such dependence. Feature selection for various supervised learning problems (including classification and regression) is unified under this framework, and the solutions can be approximated using a backward-elimination algorithm. We demonstrate the usefulness of our method on both artificial and real world datasets.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 08:26:29 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Song", "Le", "" ], [ "Smola", "Alex", "" ], [ "Gretton", "Arthur", "" ], [ "Borgwardt", "Karsten", "" ], [ "Bedo", "Justin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0704.2680
Tobias Koch
Tobias Koch, Amos Lapidoth and Paul P. Sotiriadis
A Channel that Heats Up
to appear in Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT), Nice, France
null
null
null
cs.IT math.IT
null
Motivated by on-chip communication, a channel model is proposed where the variance of the additive noise depends on the weighted sum of the past channel input powers. For this channel, an expression for the capacity per unit cost is derived, and it is shown that the expression holds also in the presence of feedback.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 10:26:53 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ], [ "Sotiriadis", "Paul P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2725
Manuel Cebri\'an
Manuel Cebrian and Ivan Cantador
Exploiting Heavy Tails in Training Times of Multilayer Perceptrons: A Case Study with the UCI Thyroid Disease Database
8 pages, 4 figures, submitted for consideration to the "Statistics and Its Interface" journal
null
null
null
cs.NE
null
The random initialization of weights of a multilayer perceptron makes it possible to model its training process as a Las Vegas algorithm, i.e. a randomized algorithm which stops when some required training error is obtained, and whose execution time is a random variable. This modeling is used to perform a case study on a well-known pattern recognition benchmark: the UCI Thyroid Disease Database. Empirical evidence is presented of the training time probability distribution exhibiting a heavy tail behavior, meaning a big probability mass of long executions. This fact is exploited to reduce the training time cost by applying two simple restart strategies. The first assumes full knowledge of the distribution yielding a 40% cut down in expected time with respect to the training without restarts. The second, assumes null knowledge, yielding a reduction ranging from 9% to 23%.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 15:58:04 GMT" }, { "version": "v2", "created": "Fri, 7 Dec 2007 03:06:49 GMT" } ]
"2011-11-09T00:00:00"
[ [ "Cebrian", "Manuel", "" ], [ "Cantador", "Ivan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0704.2778
Brooke Shrader
Brooke Shrader and Anthony Ephremides
Random Access Broadcast: Stability and Throughput Analysis
19 pages, 5 figures. Submitted as correspondence to IEEE Transactions on Information Theory, Sept 2006. Revised April 2007
IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2915-2921, August 2007.
null
null
cs.IT math.IT
null
A wireless network in which packets are broadcast to a group of receivers through use of a random access protocol is considered in this work. The relation to previous work on networks of interacting queues is discussed and subsequently, the stability and throughput regions of the system are analyzed and presented. A simple network of two source nodes and two destination nodes is considered first. The broadcast service process is analyzed assuming a channel that allows for packet capture and multipacket reception. In this small network, the stability and throughput regions are observed to coincide. The same problem for a network with N sources and M destinations is considered next. The channel model is simplified in that multipacket reception is no longer permitted. Bounds on the stability region are developed using the concept of stability rank and the throughput region of the system is compared to the bounds. Our results show that as the number of destination nodes increases, the stability and throughput regions diminish. Additionally, a previous conjecture that the stability and throughput regions coincide for a network of arbitrarily many sources is supported for a broadcast scenario by the results presented in this work.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 19:17:43 GMT" } ]
"2007-11-05T00:00:00"
[ [ "Shrader", "Brooke", "" ], [ "Ephremides", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2779
J D
Jonas Dieckelmann
The Complexity of Simple Stochastic Games
Hi, while reading through literature i noticed that it has not yet been proved that computing the value vector of simple stochastic games is a Problem in FNP. This is why i came up with a prove in this seminar work of mine
null
null
null
cs.CC cs.GT
null
In this paper we survey the computational time complexity of assorted simple stochastic game problems, and we give an overview of the best known algorithms associated with each problem.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 19:51:36 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Dieckelmann", "Jonas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0704.2786
Wenyi Zhang
Wenyi Zhang, Shivaprasad Kotagiri, and J. Nicholas Laneman
Writing on Dirty Paper with Resizing and its Application to Quasi-Static Fading Broadcast Channels
To appear in IEEE International Symposium on Information Theory 2007
null
10.1109/ISIT.2007.4557255
null
cs.IT math.IT
null
This paper studies a variant of the classical problem of ``writing on dirty paper'' in which the sum of the input and the interference, or dirt, is multiplied by a random variable that models resizing, known to the decoder but not to the encoder. The achievable rate of Costa's dirty paper coding (DPC) scheme is calculated and compared to the case of the decoder's also knowing the dirt. In the ergodic case, the corresponding rate loss vanishes asymptotically in the limits of both high and low signal-to-noise ratio (SNR), and is small at all finite SNR for typical distributions like Rayleigh, Rician, and Nakagami. In the quasi-static case, the DPC scheme is lossless at all SNR in terms of outage probability. Quasi-static fading broadcast channels (BC) without transmit channel state information (CSI) are investigated as an application of the robustness properties. It is shown that the DPC scheme leads to an outage achievable rate region that strictly dominates that of time division.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 20:29:32 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Zhang", "Wenyi", "" ], [ "Kotagiri", "Shivaprasad", "" ], [ "Laneman", "J. Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2808
Aditya Ramamoorthy
Aditya Ramamoorthy
Minimum cost distributed source coding over a network
First version apppeared in the Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24 - 29, 2007. The second version is an expanded journal submission under consideration at the IEEE Transactions on Information Theory
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work considers the problem of transmitting multiple compressible sources over a network at minimum cost. The aim is to find the optimal rates at which the sources should be compressed and the network flows using which they should be transmitted so that the cost of the transmission is minimal. We consider networks with capacity constraints and linear cost functions. The problem is complicated by the fact that the description of the feasible rate region of distributed source coding problems typically has a number of constraints that is exponential in the number of sources. This renders general purpose solvers inefficient. We present a framework in which these problems can be solved efficiently by exploiting the structure of the feasible rate regions coupled with dual decomposition and optimization techniques such as the subgradient method and the proximal bundle method.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 17:41:35 GMT" }, { "version": "v2", "created": "Wed, 12 Aug 2009 22:56:01 GMT" } ]
"2009-08-13T00:00:00"
[ [ "Ramamoorthy", "Aditya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2811
Nandakishore Santhi
Nandakishore Santhi
On Algebraic Decoding of $q$-ary Reed-Muller and Product-Reed-Solomon Codes
5 pages, 5 figures, to be presented at 2007 IEEE International Symposium on Information Theory, Nice, France (ISIT 2007)
null
10.1109/ISIT.2007.4557130
LA-UR-07-0469
cs.IT cs.DM math.IT
null
We consider a list decoding algorithm recently proposed by Pellikaan-Wu \cite{PW2005} for $q$-ary Reed-Muller codes $\mathcal{RM}_q(\ell, m, n)$ of length $n \leq q^m$ when $\ell \leq q$. A simple and easily accessible correctness proof is given which shows that this algorithm achieves a relative error-correction radius of $\tau \leq (1 - \sqrt{{\ell q^{m-1}}/{n}})$. This is an improvement over the proof using one-point Algebraic-Geometric codes given in \cite{PW2005}. The described algorithm can be adapted to decode Product-Reed-Solomon codes. We then propose a new low complexity recursive algebraic decoding algorithm for Reed-Muller and Product-Reed-Solomon codes. Our algorithm achieves a relative error correction radius of $\tau \leq \prod_{i=1}^m (1 - \sqrt{k_i/q})$. This technique is then proved to outperform the Pellikaan-Wu method in both complexity and error correction radius over a wide range of code rates.
[ { "version": "v1", "created": "Sun, 22 Apr 2007 00:22:46 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Santhi", "Nandakishore", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2841
Lun Dong
Athina P. Petropulu, Lun Dong, H. Vincent Poor
A High-Throughput Cross-Layer Scheme for Distributed Wireless Ad Hoc Networks
6 pages, Appeared in the Proceedings of the 41st Annual Conference on Information Sciences and Systems, John Hopkins University, March 2007
null
null
null
cs.IT math.IT
null
In wireless ad hoc networks, distributed nodes can collaboratively form an antenna array for long-distance communications to achieve high energy efficiency. In recent work, Ochiai, et al., have shown that such collaborative beamforming can achieve a statistically nice beampattern with a narrow main lobe and low sidelobes. However, the process of collaboration introduces significant delay, since all collaborating nodes need access to the same information. In this paper, a technique that significantly reduces the collaboration overhead is proposed. It consists of two phases. In the first phase, nodes transmit locally in a random access fashion. Collisions, when they occur, are viewed as linear mixtures of the collided packets. In the second phase, a set of cooperating nodes acts as a distributed antenna system and beamform the received analog waveform to one or more faraway destinations. This step requires multiplication of the received analog waveform by a complex number, which is independently computed by each cooperating node, and which enables separation of the collided packets based on their final destination. The scheme requires that each node has global knowledge of the network coordinates. The proposed scheme can achieve high throughput, which in certain cases exceeds one.
[ { "version": "v1", "created": "Sat, 21 Apr 2007 17:44:24 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Petropulu", "Athina P.", "" ], [ "Dong", "Lun", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2852
Christof Teuscher
Christof Teuscher
Nature-Inspired Interconnects for Self-Assembled Large-Scale Network-on-Chip Designs
null
Chaos, 17(2):026106, 2007
10.1063/1.2740566
LA-UR-07-0204
cs.AR cond-mat.dis-nn nlin.AO
null
Future nano-scale electronics built up from an Avogadro number of components needs efficient, highly scalable, and robust means of communication in order to be competitive with traditional silicon approaches. In recent years, the Networks-on-Chip (NoC) paradigm emerged as a promising solution to interconnect challenges in silicon-based electronics. Current NoC architectures are either highly regular or fully customized, both of which represent implausible assumptions for emerging bottom-up self-assembled molecular electronics that are generally assumed to have a high degree of irregularity and imperfection. Here, we pragmatically and experimentally investigate important design trade-offs and properties of an irregular, abstract, yet physically plausible 3D small-world interconnect fabric that is inspired by modern network-on-chip paradigms. We vary the framework's key parameters, such as the connectivity, the number of switch nodes, the distribution of long- versus short-range connections, and measure the network's relevant communication characteristics. We further explore the robustness against link failures and the ability and efficiency to solve a simple toy problem, the synchronization task. The results confirm that (1) computation in irregular assemblies is a promising and disruptive computing paradigm for self-assembled nano-scale electronics and (2) that 3D small-world interconnect fabrics with a power-law decaying distribution of shortcut lengths are physically plausible and have major advantages over local 2D and 3D regular topologies.
[ { "version": "v1", "created": "Sat, 21 Apr 2007 21:26:03 GMT" } ]
"2007-07-01T00:00:00"
[ [ "Teuscher", "Christof", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0704.2857
Andrea Montanari
Andrea Montanari and Rudiger Urbanke
Modern Coding Theory: The Statistical Mechanics and Computer Science Point of View
Lectures at Les Houches Summer School on `Complex Systems', July 2006, 44 pages, 25 ps figures
null
null
null
cs.IT cond-mat.stat-mech math.IT
null
These are the notes for a set of lectures delivered by the two authors at the Les Houches Summer School on `Complex Systems' in July 2006. They provide an introduction to the basic concepts in modern (probabilistic) coding theory, highlighting connections with statistical mechanics. We also stress common concepts with other disciplines dealing with similar problems that can be generically referred to as `large graphical models'. While most of the lectures are devoted to the classical channel coding problem over simple memoryless channels, we present a discussion of more complex channel models. We conclude with an overview of the main open challenges in the field.
[ { "version": "v1", "created": "Sun, 22 Apr 2007 01:57:03 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Montanari", "Andrea", "" ], [ "Urbanke", "Rudiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2900
Marco Maggesi
Andre' Hirschowitz and Marco Maggesi
Higher-order theories
12 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend our approach to abstract syntax (with binding constructions) through modules and linearity. First we give a new general definition of arity, yielding the companion notion of signature. Then we obtain a modularity result as requested by Ghani and Uustalu (2003): in our setting, merging two extensions of syntax corresponds to building an amalgamated sum. Finally we define a natural notion of equation concerning a signature and prove the existence of an initial semantics for a so-called representable signature equipped with a set of equations.
[ { "version": "v1", "created": "Sun, 22 Apr 2007 18:19:46 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 15:45:27 GMT" } ]
"2008-09-09T00:00:00"
[ [ "Hirschowitz", "Andre'", "" ], [ "Maggesi", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0704.2902
Stefan Pohl
Stefan Pohl, Filip Radlinski and Thorsten Joachims
Recommending Related Papers Based on Digital Library Access Records
2 pages, 3 postscript figures, to appear in proceedings of JCDL'07, additional and more detailed results can be found in arXiv:0704.2963v1
null
null
null
cs.DL cs.IR
null
An important goal for digital libraries is to enable researchers to more easily explore related work. While citation data is often used as an indicator of relatedness, in this paper we demonstrate that digital access records (e.g. http-server logs) can be used as indicators as well. In particular, we show that measures based on co-access provide better coverage than co-citation, that they are available much sooner, and that they are more accurate for recent papers.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 16:51:40 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Pohl", "Stefan", "" ], [ "Radlinski", "Filip", "" ], [ "Joachims", "Thorsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0704.2919
David Eppstein
David Eppstein, Jean-Claude Falmagne, and Hasan Uzun
On Verifying and Engineering the Well-gradedness of a Union-closed Family
15 pages
J. Mathematical Psychology 53(1):34-39, 2009
10.1016/j.jmp.2008.09.002
null
math.CO cs.DM cs.DS
null
Current techniques for generating a knowledge space, such as QUERY, guarantees that the resulting structure is closed under union, but not that it satisfies wellgradedness, which is one of the defining conditions for a learning space. We give necessary and sufficient conditions on the base of a union-closed set family that ensures that the family is well-graded. We consider two cases, depending on whether or not the family contains the empty set. We also provide algorithms for efficiently testing these conditions, and for augmenting a set family in a minimal way to one that satisfies these conditions.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 04:37:08 GMT" }, { "version": "v2", "created": "Fri, 16 Nov 2007 06:56:35 GMT" }, { "version": "v3", "created": "Mon, 14 Apr 2008 00:23:39 GMT" } ]
"2009-08-28T00:00:00"
[ [ "Eppstein", "David", "" ], [ "Falmagne", "Jean-Claude", "" ], [ "Uzun", "Hasan", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.2926
Lawrence Ong
Lawrence Ong, Mehul Motani
Optimal Routing for the Gaussian Multiple-Relay Channel with Decode-and-Forward
Accepted and to be presented at the 2007 IEEE International Symposium on Information Theory (ISIT 2007), Acropolis Congress and Exhibition Center, Nice, France, June 24-29 2007
Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT 2007), Acropolis Congress and Exhibition Center, Nice, France, pp. 1061-1065, Jun. 24-29 2007.
10.1109/ISIT.2007.4557364
null
cs.IT math.IT
null
In this paper, we study a routing problem on the Gaussian multiple relay channel, in which nodes employ a decode-and-forward coding strategy. We are interested in routes for the information flow through the relays that achieve the highest DF rate. We first construct an algorithm that provably finds optimal DF routes. As the algorithm runs in factorial time in the worst case, we propose a polynomial time heuristic algorithm that finds an optimal route with high probability. We demonstrate that that the optimal (and near optimal) DF routes are good in practice by simulating a distributed DF coding scheme using low density parity check codes with puncturing and incremental redundancy.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 06:33:38 GMT" } ]
"2010-04-15T00:00:00"
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.2963
Stefan Pohl
Stefan Pohl
Using Access Data for Paper Recommendations on ArXiv.org
73 pages, 31 figures, Master's Thesis
null
null
null
cs.DL cs.IR
null
This thesis investigates in the use of access log data as a source of information for identifying related scientific papers. This is done for arXiv.org, the authority for publication of e-prints in several fields of physics. Compared to citation information, access logs have the advantage of being immediately available, without manual or automatic extraction of the citation graph. Because of that, a main focus is on the question, how far user behavior can serve as a replacement for explicit meta-data, which potentially might be expensive or completely unavailable. Therefore, we compare access, content, and citation-based measures of relatedness on different recommendation tasks. As a final result, an online recommendation system has been built that can help scientists to find further relevant literature, without having to search for them actively.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 15:52:47 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Pohl", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0704.3019
Oliver Henkel
Oliver Henkel
Arbitrary Rate Permutation Modulation for the Gaussian Channel
to appear in the Proceedings of the International Symposium of Information Theory (ISIT 2007)
null
null
null
cs.IT math.IT
null
In this paper non-group permutation modulated sequences for the Gaussian channel are considered. Without the restriction to group codes rather than subsets of group codes, arbitrary rates are achievable. The code construction utilizes the known optimal group constellations to ensure at least the same performance but exploit the Gray code ordering structure of multiset permutations as a selection criterion at the decoder. The decoder achieves near maximum likelihood performance at low computational cost and low additional memory requirements at the receiver.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 14:31:17 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Henkel", "Oliver", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3035
Ender Tekin
Ender Tekin, Aylin Yener
Achievable Rates for Two-Way Wire-Tap Channels
International Symposium on Information Theory (ISIT) 2007, June 24-29
null
null
null
cs.IT cs.CR math.IT
null
We consider two-way wire-tap channels, where two users are communicating with each other in the presence of an eavesdropper, who has access to the communications through a multiple-access channel. We find achievable rates for two different scenarios, the Gaussian two-way wire-tap channel, (GTW-WT), and the binary additive two-way wire-tap channel, (BATW-WT). It is shown that the two-way channels inherently provide a unique advantage for wire-tapped scenarios, as the users know their own transmitted signals and in effect help encrypt the other user's messages, similar to a one-time pad. We compare the achievable rates to that of the Gaussian multiple-access wire-tap channel (GMAC-WT) to illustrate this advantage.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 19:26:59 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Tekin", "Ender", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3094
Olympia Hadjiliadis
Olympia Hadjiliadis and H.Vincent Poor
Detection of two-sided alternatives in a Brownian motion model
4 pages, to appear in the Proceedings of the 56th Session of the International Statistical Institute, Lisbon, Portugal, August 22- 29, 2007
null
null
null
cs.IT math.IT
null
This work examines the problem of sequential detection of a change in the drift of a Brownian motion in the case of two-sided alternatives. Applications to real life situations in which two-sided changes can occur are discussed. Traditionally, 2-CUSUM stopping rules have been used for this problem due to their asymptotically optimal character as the mean time between false alarms tends to $\infty$. In particular, attention has focused on 2-CUSUM harmonic mean rules due to the simplicity in calculating their first moments. In this paper, we derive closed-form expressions for the first moment of a general 2-CUSUM stopping rule. We use these expressions to obtain explicit upper and lower bounds for it. Moreover, we derive an expression for the rate of change of this first moment as one of the threshold parameters changes. Based on these expressions we obtain explicit upper and lower bounds to this rate of change. Using these expressions we are able to find the best 2-CUSUM stopping rule with respect to the extended Lorden criterion. In fact, we demonstrate not only the existence but also the uniqueness of the best 2-CUSUM stopping both in the case of a symmetric change and in the case of a non-symmetric case. Furthermore, we discuss the existence of a modification of the 2-CUSUM stopping rule that has a strictly better performance than its classical 2-CUSUM counterpart for small values of the mean time between false alarms. We conclude with a discussion on the open problem of strict optimality in the case of two-sided alternatives.
[ { "version": "v1", "created": "Mon, 23 Apr 2007 22:28:30 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Hadjiliadis", "Olympia", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3120
Oliver Henkel
Oliver Henkel
Space Time Codes from Permutation Codes
null
Proc. IEEE GlobeCom, San Francisco, California, Nov. 2006
null
null
cs.IT math.IT
null
A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 05:45:30 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Henkel", "Oliver", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3141
Evgueni Petrov
Evgueni Petrov
Algorithm for Evaluation of the Interval Power Function of Unconstrained Arguments
3 pages
null
null
null
cs.MS
null
We describe an algorithm for evaluation of the interval extension of the power function of variables x and y given by the expression x^y. Our algorithm reduces the general case to the case of non-negative bases.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 08:33:52 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Petrov", "Evgueni", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0704.3157
Giorgio Terracina
Giorgio Terracina, Nicola Leone, Vincenzino Lio, Claudio Panetta
Experimenting with recursive queries in database and logic programming systems
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI cs.DB
null
This paper considers the problem of reasoning on massive amounts of (possibly distributed) data. Presently, existing proposals show some limitations: {\em (i)} the quantity of data that can be handled contemporarily is limited, due to the fact that reasoning is generally carried out in main-memory; {\em (ii)} the interaction with external (and independent) DBMSs is not trivial and, in several cases, not allowed at all; {\em (iii)} the efficiency of present implementations is still not sufficient for their utilization in complex reasoning tasks involving massive amounts of data. This paper provides a contribution in this setting; it presents a new system, called DLV$^{DB}$, which aims to solve these problems. Moreover, the paper reports the results of a thorough experimental analysis we have carried out for comparing our system with several state-of-the-art systems (both logic and databases) on some classical deductive problems; the other tested systems are: LDL++, XSB, Smodels and three top-level commercial DBMSs. DLV$^{DB}$ significantly outperforms even the commercial Database Systems on recursive queries. To appear in Theory and Practice of Logic Programming (TPLP)
[ { "version": "v1", "created": "Tue, 24 Apr 2007 10:58:40 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Terracina", "Giorgio", "" ], [ "Leone", "Nicola", "" ], [ "Lio", "Vincenzino", "" ], [ "Panetta", "Claudio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0704.3177
Andreas Enge
Andreas Enge (INRIA Futurs)
Computing modular polynomials in quasi-linear time
null
Mathematics of Computation 78, 267 (2009) 1809-1824
null
null
math.NT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyse and compare the complexity of several algorithms for computing modular polynomials. We show that an algorithm relying on floating point evaluation of modular functions and on interpolation, which has received little attention in the literature, has a complexity that is essentially (up to logarithmic factors) linear in the size of the computed polynomials. In particular, it obtains the classical modular polynomials $\Phi_\ell$ of prime level $\ell$ in time O (\ell^3 \log^4 \ell \log \log \ell). Besides treating modular polynomials for $\Gamma^0 (\ell)$, which are an important ingredient in many algorithms dealing with isogenies of elliptic curves, the algorithm is easily adapted to more general situations. Composite levels are handled just as easily as prime levels, as well as polynomials between a modular function and its transform of prime level, such as the Schl\"afli polynomials and their generalisations. Our distributed implementation of the algorithm confirms the theoretical analysis by computing modular equations of record level around 10000 in less than two weeks on ten processors.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 12:27:39 GMT" }, { "version": "v2", "created": "Wed, 23 Jul 2008 12:33:49 GMT" } ]
"2009-05-08T00:00:00"
[ [ "Enge", "Andreas", "", "INRIA Futurs" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.3197
Reinhard Klette
Fajie Li and Reinhard Klette
Euclidean Shortest Paths in Simple Cube Curves at a Glance
8 pages
null
null
CITR-TR-198
cs.CG cs.DM
null
This paper reports about the development of two provably correct approximate algorithms which calculate the Euclidean shortest path (ESP) within a given cube-curve with arbitrary accuracy, defined by $\epsilon >0$, and in time complexity $\kappa(\epsilon) \cdot {\cal O}(n)$, where $\kappa(\epsilon)$ is the length difference between the path used for initialization and the minimum-length path, divided by $\epsilon$. A run-time diagram also illustrates this linear-time behavior of the implemented ESP algorithm.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 03:54:51 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Li", "Fajie", "" ], [ "Klette", "Reinhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0704.3199
Enrico Paolini
E. Paolini, M. Fossorier, M. Chiani
Generalized Stability Condition for Generalized and Doubly-Generalized LDPC Codes
5 pages, 2 figures, to appear in Proc. of IEEE ISIT 2007
null
10.1109/ISIT.2007.4557440
null
cs.IT math.IT
null
In this paper, the stability condition for low-density parity-check (LDPC) codes on the binary erasure channel (BEC) is extended to generalized LDPC (GLDPC) codes and doublygeneralized LDPC (D-GLDPC) codes. It is proved that, in both cases, the stability condition only involves the component codes with minimum distance 2. The stability condition for GLDPC codes is always expressed as an upper bound to the decoding threshold. This is not possible for D-GLDPC codes, unless all the generalized variable nodes have minimum distance at least 3. Furthermore, a condition called derivative matching is defined in the paper. This condition is sufficient for a GLDPC or DGLDPC code to achieve the stability condition with equality. If this condition is satisfied, the threshold of D-GLDPC codes (whose generalized variable nodes have all minimum distance at least 3) and GLDPC codes can be expressed in closed form.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 14:11:58 GMT" } ]
"2016-11-15T00:00:00"
[ [ "Paolini", "E.", "" ], [ "Fossorier", "M.", "" ], [ "Chiani", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3228
Thomas Silverston
Thomas Silverston, Olivier Fourmaux and Kave Salamatian
Characterization of P2P IPTV Traffic: Scaling Analysis
27p, submitted to a conference
null
null
null
cs.NI cs.MM
null
P2P IPTV applications arise on the Internet and will be massively used in the future. It is expected that P2P IPTV will contribute to increase the overall Internet traffic. In this context, it is important to measure the impact of P2P IPTV on the networks and to characterize this traffic. Dur- ing the 2006 FIFA World Cup, we performed an extensive measurement campaign. We measured network traffic generated by broadcasting soc- cer games by the most popular P2P IPTV applications, namely PPLive, PPStream, SOPCast and TVAnts. From the collected data, we charac- terized the P2P IPTV traffic structure at different time scales by using wavelet based transform method. To the best of our knowledge, this is the first work, which presents a complete multiscale analysis of the P2P IPTV traffic. Our results show that the scaling properties of the TCP traffic present periodic behavior whereas the UDP traffic is stationary and lead to long- range depedency characteristics. For all the applications, the download traffic has different characteristics than the upload traffic. The signaling traffic has a significant impact on the download traffic but it has negligible impact on the upload. Both sides of the traffic and its granularity has to be taken into account to design accurate P2P IPTV traffic models.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 16:18:13 GMT" }, { "version": "v2", "created": "Tue, 17 Jul 2007 14:26:05 GMT" } ]
"2007-07-17T00:00:00"
[ [ "Silverston", "Thomas", "" ], [ "Fourmaux", "Olivier", "" ], [ "Salamatian", "Kave", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0704.3238
Nicolas Troquard
Philippe Balbiani, Andreas Herzig and Nicolas Troquard
Alternative axiomatics and complexity of deliberative STIT theories
Submitted to the Journal of Philosophical Logic; 13 pages excluding annex
null
10.1007/s10992-007-9078-7
null
cs.LO
null
We propose two alternatives to Xu's axiomatization of the Chellas STIT. The first one also provides an alternative axiomatization of the deliberative STIT. The second one starts from the idea that the historic necessity operator can be defined as an abbreviation of operators of agency, and can thus be eliminated from the logic of the Chellas STIT. The second axiomatization also allows us to establish that the problem of deciding the satisfiability of a STIT formula without temporal operators is NP-complete in the single-agent case, and is NEXPTIME-complete in the multiagent case, both for the deliberative and the Chellas' STIT.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 16:36:13 GMT" } ]
"2011-04-29T00:00:00"
[ [ "Balbiani", "Philippe", "" ], [ "Herzig", "Andreas", "" ], [ "Troquard", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0704.3241
Marco Lops
Daniele Angelosante, Ezio Biglieri, Marco Lops
Neighbor Discovery in Wireless Networks:A Multiuser-Detection Approach
null
null
null
null
cs.IT math.IT
null
We examine the problem of determining which nodes are neighbors of a given one in a wireless network. We consider an unsupervised network operating on a frequency-flat Gaussian channel, where $K+1$ nodes associate their identities to nonorthogonal signatures, transmitted at random times, synchronously, and independently. A number of neighbor-discovery algorithms, based on different optimization criteria, are introduced and analyzed. Numerical results show how reduced-complexity algorithms can achieve a satisfactory performance.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 16:46:02 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Angelosante", "Daniele", "" ], [ "Biglieri", "Ezio", "" ], [ "Lops", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3268
Koray Karahaliloglu
Koray Karahaliloglu
2D Path Solutions from a Single Layer Excitable CNN Model
24 pages, 9 figures
null
null
null
cs.RO cs.NE
null
An easily implementable path solution algorithm for 2D spatial problems, based on excitable/programmable characteristics of a specific cellular nonlinear network (CNN) model is presented and numerically investigated. The network is a single layer bioinspired model which was also implemented in CMOS technology. It exhibits excitable characteristics with regionally bistable cells. The related response realizes propagations of trigger autowaves, where the excitable mode can be globally preset and reset. It is shown that, obstacle distributions in 2D space can also be directly mapped onto the coupled cell array in the network. Combining these two features, the network model can serve as the main block in a 2D path computing processor. The related algorithm and configurations are numerically experimented with circuit level parameters and performance estimations are also presented. The simplicity of the model also allows alternative technology and device level implementation, which may become critical in autonomous processor design of related micro or nanoscale robotic applications.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 20:20:46 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Karahaliloglu", "Koray", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0704.3287
N. Raj Rao
N. Raj Rao, Alan Edelman
Sample size cognizant detection of signals in white noise
To appear in the Proceedings of the 8th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki, Finland, June 17-20, 2007
null
null
null
cs.IT math.IT
null
The detection and estimation of signals in noisy, limited data is a problem of interest to many scientific and engineering communities. We present a computationally simple, sample eigenvalue based procedure for estimating the number of high-dimensional signals in white noise when there are relatively few samples. We highlight a fundamental asymptotic limit of sample eigenvalue based detection of weak high-dimensional signals from a limited sample size and discuss its implication for the detection of two closely spaced signals. This motivates our heuristic definition of the 'effective number of identifiable signals.' Numerical simulations are used to demonstrate the consistency of the algorithm with respect to the effective number of signals and the superior performance of the algorithm with respect to Wax and Kailath's "asymptotically consistent" MDL based estimator.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 00:23:20 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Rao", "N. Raj", "" ], [ "Edelman", "Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3292
Zhu Han
Zhu Han and H. Vincent Poor
Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks
null
in the Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks, WiOpt07, Limassol, Cyprus, April 16-20, 2007
null
null
cs.IT math.IT
null
In wireless packet-forwarding networks with selfish nodes, applications of a repeated game can induce the nodes to forward each others' packets, so that the network performance can be improved. However, the nodes on the boundary of such networks cannot benefit from this strategy, as the other nodes do not depend on them. This problem is sometimes known as the curse of the boundary nodes. To overcome this problem, an approach based on coalition games is proposed, in which the boundary nodes can use cooperative transmission to help the backbone nodes in the middle of the network. In return, the backbone nodes are willing to forward the boundary nodes' packets. The stability of the coalitions is studied using the concept of a core. Then two types of fairness, namely, the min-max fairness using nucleolus and the average fairness using the Shapley function are investigated. Finally, a protocol is designed using both repeated games and coalition games. Simulation results show how boundary nodes and backbone nodes form coalitions together according to different fairness criteria. The proposed protocol can improve the network connectivity by about 50%, compared with pure repeated game schemes.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 15:37:22 GMT" }, { "version": "v2", "created": "Wed, 25 Apr 2007 21:15:48 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Han", "Zhu", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3313
David Eppstein
David Eppstein and Michael T. Goodrich
Straggler Identification in Round-Trip Data Streams via Newton's Identities and Invertible Bloom Filters
Fuller version of paper appearing in 10th Worksh. Algorithms and Data Structures, Halifax, Nova Scotia, 2007
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the straggler identification problem, in which an algorithm must determine the identities of the remaining members of a set after it has had a large number of insertion and deletion operations performed on it, and now has relatively few remaining members. The goal is to do this in o(n) space, where n is the total number of identities. The straggler identification problem has applications, for example, in determining the set of unacknowledged packets in a high-bandwidth multicast data stream. We provide a deterministic solution to the straggler identification problem that uses only O(d log n) bits and is based on a novel application of Newton's identities for symmetric polynomials. This solution can identify any subset of d stragglers from a set of n O(log n)-bit identifiers, assuming that there are no false deletions of identities not already in the set. Indeed, we give a lower bound argument that shows that any small-space deterministic solution to the straggler identification problem cannot be guaranteed to handle false deletions. Nevertheless, we show that there is a simple randomized solution using O(d log n log(1/epsilon)) bits that can maintain a multiset and solve the straggler identification problem, tolerating false deletions, where epsilon>0 is a user-defined parameter bounding the probability of an incorrect response. This randomized solution is based on a new type of Bloom filter, which we call the invertible Bloom filter.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 06:59:43 GMT" }, { "version": "v2", "created": "Fri, 18 May 2007 21:56:45 GMT" }, { "version": "v3", "created": "Thu, 10 Sep 2009 04:13:31 GMT" } ]
"2009-09-10T00:00:00"
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.3316
Ciro Cattuto
Ciro Cattuto, Andrea Baldassarri, Vito D. P. Servedio, Vittorio Loreto
Vocabulary growth in collaborative tagging systems
6 pages, 7 figures
null
null
null
cs.IR cond-mat.stat-mech cs.CY physics.data-an
null
We analyze a large-scale snapshot of del.icio.us and investigate how the number of different tags in the system grows as a function of a suitably defined notion of time. We study the temporal evolution of the global vocabulary size, i.e. the number of distinct tags in the entire system, as well as the evolution of local vocabularies, that is the growth of the number of distinct tags used in the context of a given resource or user. In both cases, we find power-law behaviors with exponents smaller than one. Surprisingly, the observed growth behaviors are remarkably regular throughout the entire history of the system and across very different resources being bookmarked. Similar sub-linear laws of growth have been observed in written text, and this qualitative universality calls for an explanation and points in the direction of non-trivial cognitive processes in the complex interaction patterns characterizing collaborative tagging.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 07:47:40 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Cattuto", "Ciro", "" ], [ "Baldassarri", "Andrea", "" ], [ "Servedio", "Vito D. P.", "" ], [ "Loreto", "Vittorio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0704.3359
Alex Smola J
Quoc Le and Alexander Smola
Direct Optimization of Ranking Measures
null
null
null
null
cs.IR cs.AI
null
Web page ranking and collaborative filtering require the optimization of sophisticated performance measures. Current Support Vector approaches are unable to optimize them directly and focus on pairwise comparisons instead. We present a new approach which allows direct optimization of the relevant loss functions. This is achieved via structured estimation in Hilbert spaces. It is most related to Max-Margin-Markov networks optimization of multivariate performance measures. Key to our approach is that during training the ranking problem can be viewed as a linear assignment problem, which can be solved by the Hungarian Marriage algorithm. At test time, a sort operation is sufficient, as our algorithm assigns a relevance score to every (document, query) pair. Experiments show that the our algorithm is fast and that it works very well.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 12:36:55 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Le", "Quoc", "" ], [ "Smola", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.3391
Zhu Han
Zhu Han and H. Vincent Poor
Lifetime Improvement in Wireless Sensor Networks via Collaborative Beamforming and Cooperative Transmission
Invited paper to appear in the IEE Proceedings: Microwaves, Antennas and Propagation, Special Issue on Antenna Systems and Propagation for Future Wireless Communications
null
null
null
cs.IT math.IT
null
Collaborative beamforming (CB) and cooperative transmission (CT) have recently emerged as communication techniques that can make effective use of collaborative/cooperative nodes to create a virtual multiple-input/multiple-output (MIMO) system. Extending the lifetime of networks composed of battery-operated nodes is a key issue in the design and operation of wireless sensor networks. This paper considers the effects on network lifetime of allowing closely located nodes to use CB/CT to reduce the load or even to avoid packet-forwarding requests to nodes that have critical battery life. First, the effectiveness of CB/CT in improving the signal strength at a faraway destination using energy in nearby nodes is studied. Then, the performance improvement obtained by this technique is analyzed for a special 2D disk case. Further, for general networks in which information-generation rates are fixed, a new routing problem is formulated as a linear programming problem, while for other general networks, the cost for routing is dynamically adjusted according to the amount of energy remaining and the effectiveness of CB/CT. From the analysis and the simulation results, it is seen that the proposed method can reduce the payloads of energy-depleting nodes by about 90% in the special case network considered and improve the lifetimes of general networks by about 10%, compared with existing techniques.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 15:14:32 GMT" }, { "version": "v2", "created": "Thu, 26 Apr 2007 02:49:33 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Han", "Zhu", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3395
Marko A. Rodriguez
Marko A. Rodriguez
General-Purpose Computing on a Semantic Network Substrate
null
Emergent Web Intelligence: Advanced Semantic Technologies, Advanced Information and Knowledge Processing series, Springer-Verlag, pages 57-104, ISBN:978-1-84996-076-2, June 2010
null
LA-UR-07-2885
cs.AI cs.PL
http://creativecommons.org/licenses/publicdomain/
This article presents a model of general-purpose computing on a semantic network substrate. The concepts presented are applicable to any semantic network representation. However, due to the standards and technological infrastructure devoted to the Semantic Web effort, this article is presented from this point of view. In the proposed model of computing, the application programming interface, the run-time program, and the state of the computing virtual machine are all represented in the Resource Description Framework (RDF). The implementation of the concepts presented provides a practical computing paradigm that leverages the highly-distributed and standardized representational-layer of the Semantic Web.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 15:37:52 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2007 20:08:21 GMT" }, { "version": "v3", "created": "Sun, 7 Oct 2007 21:44:01 GMT" }, { "version": "v4", "created": "Sun, 6 Jun 2010 05:29:22 GMT" } ]
"2010-06-08T00:00:00"
[ [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0704.3396
Zhu Han
Zhu Han and H. Vincent Poor
Lifetime Improvement of Wireless Sensor Networks by Collaborative Beamforming and Cooperative Transmission
to appear, in the proceedings of IEEE International Conference on Communications, Glasgow, Scotland, 24-28 June 2007
null
null
null
cs.IT math.IT
null
Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensor networks. Collaborative beamforming (CB) and cooperative transmission (CT) have recently emerged as new communication techniques that enable and leverage effective resource sharing among collaborative/cooperative nodes. In this paper, we seek to maximize the lifetime of sensor networks by using the new idea that closely located nodes can use CB/CT to reduce the load or even avoid packet forwarding requests to nodes that have critical battery life. First, we study the effectiveness of CB/CT to improve the signal strength at a faraway destination using energy in nearby nodes. Then, a 2D disk case is analyzed to assess the resulting performance improvement. For general networks, if information-generation rates are fixed, the new routing problem is formulated as a linear programming problem; otherwise, the cost for routing is dynamically adjusted according to the amount of energy remaining and the effectiveness of CB/CT. From the analysis and simulation results, it is seen that the proposed schemes can improve the lifetime by about 90% in the 2D disk network and by about 10% in the general networks, compared to existing schemes.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 15:55:27 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Han", "Zhu", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3399
Zhu Han
Zhu Han, Xin Zhang, and H. Vincent Poor
Cooperative Transmission Protocols with High Spectral Efficiency and High Diversity Order Using Multiuser Detection and Network Coding
to appear, in the proceedings of IEEE International Conference on Communications, Glasgow, Scotland, 24-28 June 2007
null
10.1109/ICC.2007.698
null
cs.IT math.IT
null
Cooperative transmission is an emerging communication technique that takes advantages of the broadcast nature of wireless channels. However, due to low spectral efficiency and the requirement of orthogonal channels, its potential for use in future wireless networks is limited. In this paper, by making use of multiuser detection (MUD) and network coding, cooperative transmission protocols with high spectral efficiency, diversity order, and coding gain are developed. Compared with the traditional cooperative transmission protocols with single-user detection, in which the diversity gain is only for one source user, the proposed MUD cooperative transmission protocols have the merits that the improvement of one user's link can also benefit the other users. In addition, using MUD at the relay provides an environment in which network coding can be employed. The coding gain and high diversity order can be obtained by fully utilizing the link between the relay and the destination. From the analysis and simulation results, it is seen that the proposed protocols achieve higher diversity gain, better asymptotic efficiency, and lower bit error rate, compared to traditional MUD and to existing cooperative transmission protocols.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 15:58:10 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Han", "Zhu", "" ], [ "Zhang", "Xin", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3402
Pedro Coronel
Pedro Coronel and Helmut B\"olcskei
Diversity-Multiplexing Tradeoff in Selective-Fading MIMO Channels
To be presented at IEEE Int. Symp. Inf. Theory 2007, Nice, France
null
null
null
cs.IT math.IT
null
We establish the optimal diversity-multiplexing (DM) tradeoff of coherent time, frequency and time-frequency selective-fading MIMO channels and provide a code design criterion for DM-tradeoff optimality. Our results are based on the analysis of the "Jensen channel" associated to a given selective-fading MIMO channel. While the original problem seems analytically intractable due to the mutual information being a sum of correlated random variables, the Jensen channel is equivalent to the original channel in the sense of the DM-tradeoff and lends itself nicely to analytical treatment. Finally, as a consequence of our results, we find that the classical rank criterion for space-time code design (in selective-fading MIMO channels) ensures optimality in the sense of the DM-tradeoff.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 16:09:06 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Coronel", "Pedro", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3405
Shuguang Cui
Shuguang Cui and Jinjun Xiao and Andrea Goldsmith and Zhi-Quan Luo and H. Vincent Poor
Estimation Diversity and Energy Efficiency in Distributed Sensing
To appear at IEEE Transactions on Signal Processing
null
10.1109/TSP.2007.896019
null
cs.IT math.IT
null
Distributed estimation based on measurements from multiple wireless sensors is investigated. It is assumed that a group of sensors observe the same quantity in independent additive observation noises with possibly different variances. The observations are transmitted using amplify-and-forward (analog) transmissions over non-ideal fading wireless channels from the sensors to a fusion center, where they are combined to generate an estimate of the observed quantity. Assuming that the Best Linear Unbiased Estimator (BLUE) is used by the fusion center, the equal-power transmission strategy is first discussed, where the system performance is analyzed by introducing the concept of estimation outage and estimation diversity, and it is shown that there is an achievable diversity gain on the order of the number of sensors. The optimal power allocation strategies are then considered for two cases: minimum distortion under power constraints; and minimum power under distortion constraints. In the first case, it is shown that by turning off bad sensors, i.e., sensors with bad channels and bad observation quality, adaptive power gain can be achieved without sacrificing diversity gain. Here, the adaptive power gain is similar to the array gain achieved in Multiple-Input Single-Output (MISO) multi-antenna systems when channel conditions are known to the transmitter. In the second case, the sum power is minimized under zero-outage estimation distortion constraint, and some related energy efficiency issues in sensor networks are discussed.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 16:30:31 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Cui", "Shuguang", "" ], [ "Xiao", "Jinjun", "" ], [ "Goldsmith", "Andrea", "" ], [ "Luo", "Zhi-Quan", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3408
Sinan Gezici Dr
Sinan Gezici, Andreas F. Molisch, H. Vincent Poor, and Hisashi Kobayashi
The Trade-off between Processing Gains of an Impulse Radio UWB System in the Presence of Timing Jitter
To appear in the IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
In time hopping impulse radio, $N_f$ pulses of duration $T_c$ are transmitted for each information symbol. This gives rise to two types of processing gain: (i) pulse combining gain, which is a factor $N_f$, and (ii) pulse spreading gain, which is $N_c=T_f/T_c$, where $T_f$ is the mean interval between two subsequent pulses. This paper investigates the trade-off between these two types of processing gain in the presence of timing jitter. First, an additive white Gaussian noise (AWGN) channel is considered and approximate closed form expressions for bit error probability are derived for impulse radio systems with and without pulse-based polarity randomization. Both symbol-synchronous and chip-synchronous scenarios are considered. The effects of multiple-access interference and timing jitter on the selection of optimal system parameters are explained through theoretical analysis. Finally, a multipath scenario is considered and the trade-off between processing gains of a synchronous impulse radio system with pulse-based polarity randomization is analyzed. The effects of the timing jitter, multiple-access interference and inter-frame interference are investigated. Simulation studies support the theoretical results.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 16:47:35 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Gezici", "Sinan", "" ], [ "Molisch", "Andreas F.", "" ], [ "Poor", "H. Vincent", "" ], [ "Kobayashi", "Hisashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3433
Tshilidzi Marwala
Tshilidzi Marwala and Bodie Crossingham
Bayesian approach to rough set
20 pages, 3 figures
null
null
null
cs.AI
null
This paper proposes an approach to training rough set models using Bayesian framework trained using Markov Chain Monte Carlo (MCMC) method. The prior probabilities are constructed from the prior knowledge that good rough set models have fewer rules. Markov Chain Monte Carlo sampling is conducted through sampling in the rough set granule space and Metropolis algorithm is used as an acceptance criteria. The proposed method is tested to estimate the risk of HIV given demographic data. The results obtained shows that the proposed approach is able to achieve an average accuracy of 58% with the accuracy varying up to 66%. In addition the Bayesian rough set give the probabilities of the estimated HIV status as well as the linguistic rules describing how the demographic parameters drive the risk of HIV.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 19:50:59 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Marwala", "Tshilidzi", "" ], [ "Crossingham", "Bodie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.3434
Shuchin Aeron
Shuchin Aeron, Manqi Zhao and Venkatesh Saligrama
On sensing capacity of sensor networks for the class of linear observation, fixed SNR models
37 pages, single column
null
null
null
cs.IT math.IT
null
In this paper we address the problem of finding the sensing capacity of sensor networks for a class of linear observation models and a fixed SNR regime. Sensing capacity is defined as the maximum number of signal dimensions reliably identified per sensor observation. In this context sparsity of the phenomena is a key feature that determines sensing capacity. Precluding the SNR of the environment the effect of sparsity on the number of measurements required for accurate reconstruction of a sparse phenomena has been widely dealt with under compressed sensing. Nevertheless the development there was motivated from an algorithmic perspective. In this paper our aim is to derive these bounds in an information theoretic set-up and thus provide algorithm independent conditions for reliable reconstruction of sparse signals. In this direction we first generalize the Fano's inequality and provide lower bounds to the probability of error in reconstruction subject to an arbitrary distortion criteria. Using these lower bounds to the probability of error, we derive upper bounds to sensing capacity and show that for fixed SNR regime sensing capacity goes down to zero as sparsity goes down to zero. This means that disproportionately more sensors are required to monitor very sparse events. Our next main contribution is that we show the effect of sensing diversity on sensing capacity, an effect that has not been considered before. Sensing diversity is related to the effective \emph{coverage} of a sensor with respect to the field. In this direction we show the following results (a) Sensing capacity goes down as sensing diversity per sensor goes down; (b) Random sampling (coverage) of the field by sensors is better than contiguous location sampling (coverage).
[ { "version": "v1", "created": "Wed, 25 Apr 2007 19:52:47 GMT" }, { "version": "v2", "created": "Mon, 14 May 2007 19:08:44 GMT" }, { "version": "v3", "created": "Mon, 4 Jun 2007 18:21:46 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Aeron", "Shuchin", "" ], [ "Zhao", "Manqi", "" ], [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3453
Tshilidzi Marwala
S. Mohamed, D. Rubin, and T. Marwala
An Adaptive Strategy for the Classification of G-Protein Coupled Receptors
9 pages, 5 tables, 3 figures
null
null
null
cs.AI q-bio.QM
null
One of the major problems in computational biology is the inability of existing classification models to incorporate expanding and new domain knowledge. This problem of static classification models is addressed in this paper by the introduction of incremental learning for problems in bioinformatics. Many machine learning tools have been applied to this problem using static machine learning structures such as neural networks or support vector machines that are unable to accommodate new information into their existing models. We utilize the fuzzy ARTMAP as an alternate machine learning system that has the ability of incrementally learning new data as it becomes available. The fuzzy ARTMAP is found to be comparable to many of the widespread machine learning systems. The use of an evolutionary strategy in the selection and combination of individual classifiers into an ensemble system, coupled with the incremental learning ability of the fuzzy ARTMAP is proven to be suitable as a pattern classifier. The algorithm presented is tested using data from the G-Coupled Protein Receptors Database and shows good accuracy of 83%. The system presented is also generally applicable, and can be used in problems in genomics and proteomics.
[ { "version": "v1", "created": "Wed, 25 Apr 2007 21:23:31 GMT" } ]
"2007-06-25T00:00:00"
[ [ "Mohamed", "S.", "" ], [ "Rubin", "D.", "" ], [ "Marwala", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0704.3496
Frank Gurski
Frank Gurski
Polynomial algorithms for protein similarity search for restricted mRNA structures
10 Pages
null
null
null
cs.DS cs.CC
null
In this paper we consider the problem of computing an mRNA sequence of maximal similarity for a given mRNA of secondary structure constraints, introduced by Backofen et al. in [BNS02] denoted as the MRSO problem. The problem is known to be NP-complete for planar associated implied structure graphs of vertex degree at most 3. In [BFHV05] a first polynomial dynamic programming algorithms for MRSO on implied structure graphs with maximum vertex degree 3 of bounded cut-width is shown. We give a simple but more general polynomial dynamic programming solution for the MRSO problem for associated implied structure graphs of bounded clique-width. Our result implies that MRSO is polynomial for graphs of bounded tree-width, co-graphs, $P_4$-sparse graphs, and distance hereditary graphs. Further we conclude that the problem of comparing two solutions for MRSO is hard for the class of problems which can be solved in polynomial time with a number of parallel queries to an oracle in NP.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 08:30:14 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Gurski", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.3500
Jerome Darmont
Zhen He, J\'er\^ome Darmont (ERIC)
Une plate-forme dynamique pour l'\'evaluation des performances des bases de donn\'ees \`a objets
20 pages
19\`emes Journ\'ees de Bases de Donn\'ees Avanc\'ees (BDA 03), Lyon (20/10/2003) 423-442
null
null
cs.DB
null
In object-oriented or object-relational databases such as multimedia databases or most XML databases, access patterns are not static, i.e., applications do not always access the same objects in the same order repeatedly. However, this has been the way these databases and associated optimisation techniques such as clustering have been evaluated up to now. This paper opens up research regarding this issue by proposing a dynamic object evaluation framework (DOEF). DOEF accomplishes access pattern change by defining configurable styles of change. It is a preliminary prototype that has been designed to be open and fully extensible. Though originally designed for the object-oriented model, it can also be used within the object-relational model with few adaptations. Furthermore, new access pattern change models can be added too. To illustrate the capabilities of DOEF, we conducted two different sets of experiments. In the first set of experiments, we used DOEF to compare the performances of four state of the art dynamic clustering algorithms. The results show that DOEF is effective at determining the adaptability of each dynamic clustering algorithm to changes in access pattern. They also led us to conclude that dynamic clustering algorithms can cope with moderate levels of access pattern change, but that performance rapidly degrades to be worse than no clustering when vigorous styles of access pattern change are applied. In the second set of experiments, we used DOEF to compare the performance of two different object stores: Platypus and SHORE. The use of DOEF exposed the poor swapping performance of Platypus.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 09:10:41 GMT" } ]
"2007-05-23T00:00:00"
[ [ "He", "Zhen", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0704.3501
Jerome Darmont
J\'er\^ome Darmont (ERIC), Fadila Bentayeb (ERIC), Omar Boussa\"id (ERIC)
Conception d'un banc d'essais d\'ecisionnel
20 pages
20\`emes Journ\'ees Bases de Donn\'ees Avanc\'ees (BDA 04), Montpellier (19/10/2004) 493-511
null
null
cs.DB
null
We present in this paper a new benchmark for evaluating the performances of data warehouses. Benchmarking is useful either to system users for comparing the performances of different systems, or to system engineers for testing the effect of various design choices. While the TPC (Transaction Processing Performance Council) standard benchmarks address the first point, they are not tuneable enough to address the second one. Our Data Warehouse Engineering Benchmark (DWEB) allows to generate various ad-hoc synthetic data warehouses and workloads. DWEB is fully parameterized. However, two levels of parameterization keep it easy to tune. Since DWEB mainly meets engineering benchmarking needs, it is complimentary to the TPC standard benchmarks, and not a competitor. Finally, DWEB is implemented as a Java free software that can be interfaced with most existing relational database management systems.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 09:13:04 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Darmont", "Jérôme", "", "ERIC" ], [ "Bentayeb", "Fadila", "", "ERIC" ], [ "Boussaïd", "Omar", "", "ERIC" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0704.3504
Berry Schoenmakers
Berry Schoenmakers, Jilles Tjoelker, Pim Tuyls and Evgeny Verbitskiy
Smooth R\'enyi Entropy of Ergodic Quantum Information Sources
5 pages, no figures, ISIT 2007
null
null
null
quant-ph cs.IT math.IT
null
We prove that the average smooth Renyi entropy rate will approach the entropy rate of a stationary, ergodic information source, which is equal to the Shannon entropy rate for a classical information source and the von Neumann entropy rate for a quantum information source.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 09:28:58 GMT" } ]
"2018-02-13T00:00:00"
[ [ "Schoenmakers", "Berry", "" ], [ "Tjoelker", "Jilles", "" ], [ "Tuyls", "Pim", "" ], [ "Verbitskiy", "Evgeny", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3515
Jegor Uglov Mr
J. Uglov, V. Schetinin, C. Maple
Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition
null
null
10.1155/2008/468693
null
cs.AI
null
Noise, corruptions and variations in face images can seriously hurt the performance of face recognition systems. To make such systems robust, multiclass neuralnetwork classifiers capable of learning from noisy data have been suggested. However on large face data sets such systems cannot provide the robustness at a high level. In this paper we explore a pairwise neural-network system as an alternative approach to improving the robustness of face recognition. In our experiments this approach is shown to outperform the multiclass neural-network system in terms of the predictive accuracy on the face images corrupted by noise.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 11:29:19 GMT" } ]
"2016-02-17T00:00:00"
[ [ "Uglov", "J.", "" ], [ "Schetinin", "V.", "" ], [ "Maple", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.3520
Jerome Darmont
Kamel Aouiche (ERIC), J\'er\^ome Darmont (ERIC)
Vers l'auto-administration des entrep\^ots de donn\'ees
Version courte de 4 pages
XXXV\`emes Journ\'ees de Statistique, Session sp\'eciale Entreposage et Fouille de Donn\'ees, Lyon (02/06/2003) 105-108
null
null
cs.DB
null
With the wide development of databases in general and data warehouses in particular, it is important to reduce the tasks that a database administrator must perform manually. The idea of using data mining techniques to extract useful knowledge for administration from the data themselves has existed for some years. However, little research has been achieved. The aim of this study is to search for a way of extracting useful knowledge from stored data to automatically apply performance optimization techniques, and more particularly indexing techniques. We have designed a tool that extracts frequent itemsets from a given workload to compute an index configuration that helps optimizing data access time. The experiments we performed showed that the index configurations generated by our tool allowed performance gains of 15% to 25% on a test database and a test data warehouse.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 11:47:35 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Aouiche", "Kamel", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0704.3536
Carlos Galindo
C. Galindo and F.Monserrat
$\delta$-sequences and Evaluation Codes defined by Plane Valuations at Infinity
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the concept of $\delta$-sequence. A $\delta$-sequence $\Delta$ generates a well-ordered semigroup $S$ in $\mathbb{Z}^2$ or $\mathbb{R}$. We show how to construct (and compute parameters) for the dual code of any evaluation code associated with a weight function defined by $\Delta$ from the polynomial ring in two indeterminates to a semigroup $S$ as above. We prove that this is a simple procedure which can be understood by considering a particular class of valuations of function fields of surfaces, called plane valuations at infinity. We also give algorithms to construct an unlimited number of $\delta$-sequences of the different existing types, and so this paper provides the tools to know and use a new large set of codes.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 13:18:53 GMT" }, { "version": "v2", "created": "Mon, 14 Jul 2008 09:17:57 GMT" } ]
"2008-07-14T00:00:00"
[ [ "Galindo", "C.", "" ], [ "Monserrat", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3573
Andrea Maiorano
F. Belletti, M. Cotallo, A. Cruz, L. A. Fern\'andez, A. Gordillo, A. Maiorano, F. Mantovani, E. Marinari, V. Mart\'in-Mayor, A. Mu\~noz-Sudupe, D. Navarro, S. P\'erez-Gaviro, J. J. Ruiz-Lorenzo, S. F. Schifano, D. Sciretti, A. Taranc\'on, R. Tripiccione, J. L. Velasco
Simulating spin systems on IANUS, an FPGA-based computer
19 pages, 8 figures; submitted to Computer Physics Communications
Computer Physics Communications, 178 (3), p.208-216, (2008)
10.1016/j.cpc.2007.09.006
null
cond-mat.dis-nn cs.AR
null
We describe the hardwired implementation of algorithms for Monte Carlo simulations of a large class of spin models. We have implemented these algorithms as VHDL codes and we have mapped them onto a dedicated processor based on a large FPGA device. The measured performance on one such processor is comparable to O(100) carefully programmed high-end PCs: it turns out to be even better for some selected spin models. We describe here codes that we are currently executing on the IANUS massively parallel FPGA-based system.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 15:49:47 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Belletti", "F.", "" ], [ "Cotallo", "M.", "" ], [ "Cruz", "A.", "" ], [ "Fernández", "L. A.", "" ], [ "Gordillo", "A.", "" ], [ "Maiorano", "A.", "" ], [ "Mantovani", "F.", "" ], [ "Marinari", "E.", "" ], [ "Martín-Mayor", "V.", "" ], [ "Muñoz-Sudupe", "A.", "" ], [ "Navarro", "D.", "" ], [ "Pérez-Gaviro", "S.", "" ], [ "Ruiz-Lorenzo", "J. J.", "" ], [ "Schifano", "S. F.", "" ], [ "Sciretti", "D.", "" ], [ "Tarancón", "A.", "" ], [ "Tripiccione", "R.", "" ], [ "Velasco", "J. L.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0704.3588
Cristina Comaniciu
Cristina Comaniciu and H. Vincent Poor
On Energy Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks
To appear in the EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Mobile Ad Hoc Networks
null
null
null
cs.IT math.IT
null
In this paper, a hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 16:33:55 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Comaniciu", "Cristina", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3591
Peyman Razaghi
Marko Aleksic, Peyman Razaghi, Wei Yu
Capacity of a Class of Modulo-Sum Relay Channels
To be presented in IEEE Int. Symp. on Inform. Theory (ISIT) 2007
null
null
null
cs.IT math.IT
null
This paper characterizes the capacity of a class of modulo additive noise relay channels, in which the relay observes a corrupted version of the noise and has a separate channel to the destination. The capacity is shown to be strictly below the cut-set bound in general and achievable using a quantize-and-forward strategy at the relay. This result confirms a conjecture by Ahlswede and Han about the capacity of channels with rate limited state information at the destination for this particular class of channels.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 17:13:17 GMT" } ]
"2016-09-08T00:00:00"
[ [ "Aleksic", "Marko", "" ], [ "Razaghi", "Peyman", "" ], [ "Yu", "Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3635
Fulufhelo Vincent Nelwamondo
Fulufhelo Vincent Nelwamondo and Tshilidzi Marwala
Rough Sets Computations to Impute Missing Data
19 pages
null
null
null
cs.CV cs.IR
null
Many techniques for handling missing data have been proposed in the literature. Most of these techniques are overly complex. This paper explores an imputation technique based on rough set computations. In this paper, characteristic relations are introduced to describe incompletely specified decision tables.It is shown that the basic rough set idea of lower and upper approximations for incompletely specified decision tables may be defined in a variety of different ways. Empirical results obtained using real data are given and they provide a valuable and promising insight to the problem of missing data. Missing data were predicted with an accuracy of up to 99%.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 22:22:45 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Nelwamondo", "Fulufhelo Vincent", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0704.3643
Allison Woodruff
Allison Woodruff, Sally Augustin, and Brooke Foucault
Sabbath Day Home Automation: "It's Like Mixing Technology and Religion"
null
null
null
null
cs.HC
null
We present a qualitative study of 20 American Orthodox Jewish families' use of home automation for religious purposes. These lead users offer insight into real-life, long-term experience with home automation technologies. We discuss how automation was seen by participants to contribute to spiritual experience and how participants oriented to the use of automation as a religious custom. We also discuss the relationship of home automation to family life. We draw design implications for the broader population, including surrender of control as a design resource, home technologies that support long-term goals and lifestyle choices, and respite from technology.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 00:42:22 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Woodruff", "Allison", "" ], [ "Augustin", "Sally", "" ], [ "Foucault", "Brooke", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.3644
Chris Ng
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith, Urbashi Mitra
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Accepted for publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2007.904987
null
cs.IT math.IT
null
Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state information available at all terminals. The transmitters cooperate by first exchanging messages over an orthogonal transmitter cooperation channel, then encoding jointly with dirty paper coding. The receivers cooperate by using Wyner-Ziv compress-and-forward over an analogous orthogonal receiver cooperation channel. To account for the cost of cooperation, the allocation of network power and bandwidth among the data and cooperation channels is studied. It is shown that transmitter cooperation outperforms receiver cooperation and improves capacity over non-cooperative transmission under most operating conditions when the cooperation channel is strong. However, a weak cooperation channel limits the transmitter cooperation rate; in this case receiver cooperation is more advantageous. Transmitter-and-receiver cooperation offers sizable additional capacity gain over transmitter-only cooperation at low SNR, whereas at high SNR transmitter cooperation alone captures most of the cooperative capacity improvement.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 00:52:11 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Ng", "Chris T. K.", "" ], [ "Jindal", "Nihar", "" ], [ "Goldsmith", "Andrea J.", "" ], [ "Mitra", "Urbashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3646
Joseph Y. Halpern
Ittai Abraham, Danny Dolev, and Joseph Y. Halpern
Lower Bounds on Implementing Robust and Resilient Mediators
null
null
null
null
cs.GT cs.CR cs.DC
null
We consider games that have (k,t)-robust equilibria when played with a mediator, where an equilibrium is (k,t)-robust if it tolerates deviations by coalitions of size up to k and deviations by up to $t$ players with unknown utilities. We prove lower bounds that match upper bounds on the ability to implement such mediators using cheap talk (that is, just allowing communication among the players). The bounds depend on (a) the relationship between k, t, and n, the total number of players in the system; (b) whether players know the exact utilities of other players; (c) whether there are broadcast channels or just point-to-point channels; (d) whether cryptography is available; and (e) whether the game has a $k+t)-punishment strategy; that is, a strategy that, if used by all but at most $k+t$ players, guarantees that every player gets a worse outcome than they do with the equilibrium strategy.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 01:32:15 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2007 22:17:40 GMT" } ]
"2007-12-07T00:00:00"
[ [ "Abraham", "Ittai", "" ], [ "Dolev", "Danny", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0704.3647
Catherine Marshall
Catherine C. Marshall, Frank McCown, and Michael L. Nelson
Evaluating Personal Archiving Strategies for Internet-based Information
6 pages, 2 tables, to be published in the Proceedings of IS&T Archiving 2007, May 21-24 2007, Arlington, Virginia, USA
null
null
null
cs.DL cs.CY cs.HC
null
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites, in combination with supplementary interviews, to paint a fuller picture of current curatorial strategies and practices. We examine the types of personal, topical, and commercial websites that respondents have lost and the reasons they have lost this potentially valuable material. We further explore what they have tried to recover and how the loss influences their subsequent practices. We found that curation of personal digital materials in online stores bears some striking similarities to the curation of similar materials stored locally in that study participants continue to archive personal assets by relying on a combination of benign neglect, sporadic backups, and unsystematic file replication. However, we have also identified issues specific to Internet-based material: how risk is spread by distributing the files among multiple servers and services; the circular reasoning participants use when they discuss the safety of their digital assets; and the types of online material that are particularly vulnerable to loss. The study reveals ways in which expectations of permanence and notification are violated and situations in which benign neglect has far greater consequences for the long-term fate of important digital assets.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 01:38:55 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Marshall", "Catherine C.", "" ], [ "McCown", "Frank", "" ], [ "Nelson", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.3653
Catherine Marshall
Catherine C. Marshall, Sara Bly, and Francoise Brun-Cottan
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
6 pages, published in the Proceedings of IS&T Archiving 2006, (Ottawa, Canada, May 23-26, 2006), Society for Imaging Science and Technology, Springfield, VA, 2006, pp. 25-30
null
null
null
cs.DL cs.CY cs.HC
null
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preservation, and access of digital belongings by examining how personal archiving needs intersect with existing and emerging archiving technologies, best practices, and policies. Our findings not only confirmed that experienced home computer users are creating, receiving, and finding an increasing number of digital belongings, but also that they have already lost irreplaceable digital artifacts such as photos, creative efforts, and records. Although participants reported strategies such as backup and file replication for digital safekeeping, they were seldom able to implement them consistently. Four central archiving themes emerged from the data: (1) people find it difficult to evaluate the worth of accumulated materials; (2) personal storage is highly distributed both on- and offline; (3) people are experiencing magnified curatorial problems associated with managing files in the aggregate, creating appropriate metadata, and migrating materials to maintainable formats; and (4) facilities for long-term access are not supported by the current desktop metaphor. Four environmental factors further complicate archiving in consumer settings: the pervasive influence of malware; consumer reliance on ad hoc IT providers; an accretion of minor system and registry inconsistencies; and strong consumer beliefs about the incorruptibility of digital forms, the reliability of digital technologies, and the social vulnerability of networked storage.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 02:35:57 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Marshall", "Catherine C.", "" ], [ "Bly", "Sara", "" ], [ "Brun-Cottan", "Francoise", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.3662
Tian-Jian Jiang
Mike Tian-Jian Jiang, James Zhan, Jaimie Lin, Jerry Lin, Wen-Lien Hsu
An Automated Evaluation Metric for Chinese Text Entry
8 pages
Jiang, Mike Tian-Jian, et al. "Robustness analysis of adaptive chinese input methods." Advances in Text Input Methods (WTIM 2011) (2011): 53
null
null
cs.HC cs.CL
null
In this paper, we propose an automated evaluation metric for text entry. We also consider possible improvements to existing text entry evaluation metrics, such as the minimum string distance error rate, keystrokes per character, cost per correction, and a unified approach proposed by MacKenzie, so they can accommodate the special characteristics of Chinese text. Current methods lack an integrated concern about both typing speed and accuracy for Chinese text entry evaluation. Our goal is to remove the bias that arises due to human factors. First, we propose a new metric, called the correction penalty (P), based on Fitts' law and Hick's law. Next, we transform it into the approximate amortized cost (AAC) of information theory. An analysis of the AAC of Chinese text input methods with different context lengths is also presented.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 05:34:10 GMT" } ]
"2013-10-29T00:00:00"
[ [ "Jiang", "Mike Tian-Jian", "" ], [ "Zhan", "James", "" ], [ "Lin", "Jaimie", "" ], [ "Lin", "Jerry", "" ], [ "Hsu", "Wen-Lien", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0704.3665
Tian-Jian Jiang
Mike Tian-Jian Jiang, Deng Liu, Meng-Juei Hsieh, Wen-Lien Hsu
On the Development of Text Input Method - Lessons Learned
10 pages
null
null
null
cs.CL cs.HC
null
Intelligent Input Methods (IM) are essential for making text entries in many East Asian scripts, but their application to other languages has not been fully explored. This paper discusses how such tools can contribute to the development of computer processing of other oriental languages. We propose a design philosophy that regards IM as a text service platform, and treats the study of IM as a cross disciplinary subject from the perspectives of software engineering, human-computer interaction (HCI), and natural language processing (NLP). We discuss these three perspectives and indicate a number of possible future research directions.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 05:58:32 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Jiang", "Mike Tian-Jian", "" ], [ "Liu", "Deng", "" ], [ "Hsieh", "Meng-Juei", "" ], [ "Hsu", "Wen-Lien", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0704.3674
Wolfgang Steiner
Shigeki Akiyama, Horst Brunotte, Attila Petho, Wolfgang Steiner (LIAFA)
Periodicity of certain piecewise affine planar maps
null
Tsukuba Journal of Mathematics 32, 1 (2008) 197-251
null
null
math.DS cs.DM math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We determine periodic and aperiodic points of certain piecewise affine maps in the Euclidean plane. Using these maps, we prove for $\lambda\in\{\frac{\pm1\pm\sqrt5}2,\pm\sqrt2,\pm\sqrt3\}$ that all integer sequences $(a_k)_{k\in\mathbb Z}$ satisfying $0\le a_{k-1}+\lambda a_k+a_{k+1}<1$ are periodic.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 12:07:24 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 09:24:43 GMT" }, { "version": "v3", "created": "Tue, 16 Sep 2008 11:43:27 GMT" } ]
"2008-09-16T00:00:00"
[ [ "Akiyama", "Shigeki", "", "LIAFA" ], [ "Brunotte", "Horst", "", "LIAFA" ], [ "Petho", "Attila", "", "LIAFA" ], [ "Steiner", "Wolfgang", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0704.3683
Mark Jerrum
Martin Dyer, Leslie Ann Goldberg and Mark Jerrum
The Complexity of Weighted Boolean #CSP
Minor revision
SIAM J. Comput. 38(5), 1970-1986
10.1137/070690201
null
cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper gives a dichotomy theorem for the complexity of computing the partition function of an instance of a weighted Boolean constraint satisfaction problem. The problem is parameterised by a finite set F of non-negative functions that may be used to assign weights to the configurations (feasible solutions) of a problem instance. Classical constraint satisfaction problems correspond to the special case of 0,1-valued functions. We show that the partition function, i.e. the sum of the weights of all configurations, can be computed in polynomial time if either (1) every function in F is of ``product type'', or (2) every function in F is ``pure affine''. For every other fixed set F, computing the partition function is FP^{#P}-complete.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 13:19:32 GMT" }, { "version": "v2", "created": "Thu, 19 Jun 2008 08:00:54 GMT" } ]
"2009-02-23T00:00:00"
[ [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0704.3708
Bernat Corominas-Murtra BCM
Bernat Corominas-Murtra
Network statistics on early English Syntax: Structural criteria
New abstract. Due to a mistake, abstract from V1 was from an old, draft version of the work. The content of the paper is exactly the same, except on section "measures" where a new cite has been added. 28 pag
null
null
null
cs.CL
null
This paper includes a reflection on the role of networks in the study of English language acquisition, as well as a collection of practical criteria to annotate free-speech corpora from children utterances. At the theoretical level, the main claim of this paper is that syntactic networks should be interpreted as the outcome of the use of the syntactic machinery. Thus, the intrinsic features of such machinery are not accessible directly from (known) network properties. Rather, what one can see are the global patterns of its use and, thus, a global view of the power and organization of the underlying grammar. Taking a look into more practical issues, the paper examines how to build a net from the projection of syntactic relations. Recall that, as opposed to adult grammars, early-child language has not a well-defined concept of structure. To overcome such difficulty, we develop a set of systematic criteria assuming constituency hierarchy and a grammar based on lexico-thematic relations. At the end, what we obtain is a well defined corpora annotation that enables us i) to perform statistics on the size of structures and ii) to build a network from syntactic relations over which we can perform the standard measures of complexity. We also provide a detailed example.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 17:13:37 GMT" }, { "version": "v2", "created": "Mon, 30 Apr 2007 10:06:50 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Corominas-Murtra", "Bernat", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0704.3746
Yufang Xi
Yufang Xi, Edmund M. Yeh
Distributed Algorithms for Spectrum Allocation, Power Control, Routing, and Congestion Control in Wireless Networks
14 pages, 5 figures, submitted to IEEE/ACM Transactions on Networking
null
10.1145/1288107.1288132
null
cs.NI
null
We develop distributed algorithms to allocate resources in multi-hop wireless networks with the aim of minimizing total cost. In order to observe the fundamental duplexing constraint that co-located transmitters and receivers cannot operate simultaneously on the same frequency band, we first devise a spectrum allocation scheme that divides the whole spectrum into multiple sub-bands and activates conflict-free links on each sub-band. We show that the minimum number of required sub-bands grows asymptotically at a logarithmic rate with the chromatic number of network connectivity graph. A simple distributed and asynchronous algorithm is developed to feasibly activate links on the available sub-bands. Given a feasible spectrum allocation, we then design node-based distributed algorithms for optimally controlling the transmission powers on active links for each sub-band, jointly with traffic routes and user input rates in response to channel states and traffic demands. We show that under specified conditions, the algorithms asymptotically converge to the optimal operating point.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 20:43:30 GMT" } ]
"2016-11-15T00:00:00"
[ [ "Xi", "Yufang", "" ], [ "Yeh", "Edmund M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0704.3773
Sam Tannous
Sam Tannous
Avoiding Rotated Bitboards with Direct Lookup
7 pages, 1 figure, 4 listings; replaced test positions, fixed typos
ICGA Journal, Vol. 30, No. 2, pp. 85-91. (June 2007).
null
null
cs.DS
null
This paper describes an approach for obtaining direct access to the attacked squares of sliding pieces without resorting to rotated bitboards. The technique involves creating four hash tables using the built in hash arrays from an interpreted, high level language. The rank, file, and diagonal occupancy are first isolated by masking the desired portion of the board. The attacked squares are then directly retrieved from the hash tables. Maintaining incrementally updated rotated bitboards becomes unnecessary as does all the updating, mapping and shifting required to access the attacked squares. Finally, rotated bitboard move generation speed is compared with that of the direct hash table lookup method.
[ { "version": "v1", "created": "Sat, 28 Apr 2007 03:11:59 GMT" }, { "version": "v2", "created": "Mon, 23 Jul 2007 19:23:39 GMT" } ]
"2007-10-09T00:00:00"
[ [ "Tannous", "Sam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.3780
Jean-Philippe Rennard
Pierre Collet, Jean-Philippe Rennard
Stochastic Optimization Algorithms
16 pages, 4 figures, 2 tables
Rennard, J.-P., Handbook of Research on Nature Inspired Computing for Economics and Management, IGR, 2006
null
null
cs.NE
null
When looking for a solution, deterministic methods have the enormous advantage that they do find global optima. Unfortunately, they are very CPU-intensive, and are useless on untractable NP-hard problems that would require thousands of years for cutting-edge computers to explore. In order to get a result, one needs to revert to stochastic algorithms, that sample the search space without exploring it thoroughly. Such algorithms can find very good results, without any guarantee that the global optimum has been reached; but there is often no other choice than using them. This chapter is a short introduction to the main methods used in stochastic optimization.
[ { "version": "v1", "created": "Sat, 28 Apr 2007 06:52:19 GMT" } ]
"2011-12-20T00:00:00"
[ [ "Collet", "Pierre", "" ], [ "Rennard", "Jean-Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0704.3835
K. Y. Michael Wong
K. Y. Michael Wong and David Saad
Minimizing Unsatisfaction in Colourful Neighbourhoods
28 pages, 12 figures, substantially revised with additional explanation
J. Phys. A: Math. Theor. 41, 324023 (2008).
10.1088/1751-8113/41/32/324023
null
cs.DS cond-mat.dis-nn cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Colouring sparse graphs under various restrictions is a theoretical problem of significant practical relevance. Here we consider the problem of maximizing the number of different colours available at the nodes and their neighbourhoods, given a predetermined number of colours. In the analytical framework of a tree approximation, carried out at both zero and finite temperatures, solutions obtained by population dynamics give rise to estimates of the threshold connectivity for the incomplete to complete transition, which are consistent with those of existing algorithms. The nature of the transition as well as the validity of the tree approximation are investigated.
[ { "version": "v1", "created": "Sun, 29 Apr 2007 10:03:00 GMT" }, { "version": "v2", "created": "Fri, 21 Dec 2007 04:18:58 GMT" }, { "version": "v3", "created": "Tue, 1 Jul 2008 17:43:32 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Wong", "K. Y. Michael", "" ], [ "Saad", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0704.3878
Farhad Meshkati
Farhad Meshkati, Andrea J. Goldsmith, H. Vincent Poor and Stuart C. Schwartz
A Game-Theoretic Approach to Energy-Efficient Modulation in CDMA Networks with Delay Constraints
Appeared in the Proceedings of the 2007 IEEE Radio and Wireless Symposium, Long Beach, CA, January 9-11, 2007
null
10.1109/RWS.2007.351784
null
cs.IT cs.GT math.IT
null
A game-theoretic framework is used to study the effect of constellation size on the energy efficiency of wireless networks for M-QAM modulation. A non-cooperative game is proposed in which each user seeks to choose its transmit power (and possibly transmit symbol rate) as well as the constellation size in order to maximize its own utility while satisfying its delay quality-of-service (QoS) constraint. The utility function used here measures the number of reliable bits transmitted per joule of energy consumed, and is particularly suitable for energy-constrained networks. The best-response strategies and Nash equilibrium solution for the proposed game are derived. It is shown that in order to maximize its utility (in bits per joule), a user must choose the lowest constellation size that can accommodate the user's delay constraint. Using this framework, the tradeoffs among energy efficiency, delay, throughput and constellation size are also studied and quantified. The effect of trellis-coded modulation on energy efficiency is also discussed.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 06:33:05 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Meshkati", "Farhad", "" ], [ "Goldsmith", "Andrea J.", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3880
Farhad Meshkati
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz and Radu V. Balan
Energy-Efficient Resource Allocation in Wireless Networks with Quality-of-Service Constraints
Accpeted for publication in the IEEE Transactions on Communications
null
10.1109/TCOMM.2009.11.050638
null
cs.IT math.IT
null
A game-theoretic model is proposed to study the cross-layer problem of joint power and rate control with quality of service (QoS) constraints in multiple-access networks. In the proposed game, each user seeks to choose its transmit power and rate in a distributed manner in order to maximize its own utility while satisfying its QoS requirements. The user's QoS constraints are specified in terms of the average source rate and an upper bound on the average delay where the delay includes both transmission and queuing delays. The utility function considered here measures energy efficiency and is particularly suitable for wireless networks with energy constraints. The Nash equilibrium solution for the proposed non-cooperative game is derived and a closed-form expression for the utility achieved at equilibrium is obtained. It is shown that the QoS requirements of a user translate into a "size" for the user which is an indication of the amount of network resources consumed by the user. Using this competitive multiuser framework, the tradeoffs among throughput, delay, network capacity and energy efficiency are studied. In addition, analytical expressions are given for users' delay profiles and the delay performance of the users at Nash equilibrium is quantified.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 06:43:21 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Meshkati", "Farhad", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ], [ "Balan", "Radu V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3881
Farhad Meshkati
Farhad Meshkati, Dongning Guo, H. Vincent Poor and Stuart C. Schwartz
A Unified Approach to Energy-Efficient Power Control in Large CDMA Systems
Accepted for publication in the IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
null
A unified approach to energy-efficient power control is proposed for code-division multiple access (CDMA) networks. The approach is applicable to a large family of multiuser receivers including the matched filter, the decorrelator, the linear minimum mean-square error (MMSE) receiver, and the (nonlinear) optimal detectors. It exploits the linear relationship that has been shown to exist between the transmit power and the output signal-to-interference-plus-noise ratio (SIR) in the large-system limit. It is shown that, for this family of receivers, when users seek to selfishly maximize their own energy efficiency, the Nash equilibrium is SIR-balanced. In addition, a unified power control (UPC) algorithm for reaching the Nash equilibrium is proposed. The algorithm adjusts the user's transmit powers by iteratively computing the large-system multiuser efficiency, which is independent of instantaneous spreading sequences. The convergence of the algorithm is proved for the matched filter, the decorrelator, and the MMSE receiver, and is demonstrated by means of simulation for an optimal detector. Moreover, the performance of the algorithm in finite-size systems is studied and compared with that of a conventional power control scheme, in which user powers depend on the instantaneous spreading sequences.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 06:52:23 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Meshkati", "Farhad", "" ], [ "Guo", "Dongning", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0704.3886
W Saba
Walid S. Saba
A Note on Ontology and Ordinary Language
19 pages, 1 figure
null
null
null
cs.AI cs.CL
null
We argue for a compositional semantics grounded in a strongly typed ontology that reflects our commonsense view of the world and the way we talk about it. Assuming such a structure we show that the semantics of various natural language phenomena may become nearly trivial.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 17:55:39 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 13:43:32 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 18:13:22 GMT" }, { "version": "v4", "created": "Thu, 3 May 2007 08:34:47 GMT" }, { "version": "v5", "created": "Fri, 4 May 2007 17:49:03 GMT" }, { "version": "v6", "created": "Mon, 7 May 2007 16:04:50 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Saba", "Walid S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0704.3890
Valmir Barbosa
Rodolfo M. Pussente, Valmir C. Barbosa
An algorithm for clock synchronization with the gradient property in sensor networks
null
Journal of Parallel and Distributed Computing 69 (2009), 261-265
10.1016/j.jpdc.2008.11.001
null
cs.DC
null
We introduce a distributed algorithm for clock synchronization in sensor networks. Our algorithm assumes that nodes in the network only know their immediate neighborhoods and an upper bound on the network's diameter. Clock-synchronization messages are only sent as part of the communication, assumed reasonably frequent, that already takes place among nodes. The algorithm has the gradient property of [2], achieving an O(1) worst-case skew between the logical clocks of neighbors. As in the case of [3,8], the algorithm's actions are such that no constant lower bound exists on the rate at which logical clocks progress in time, and for this reason the lower bound of [2,5] that forbids constant skew between neighbors does not apply.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 19:59:14 GMT" } ]
"2009-02-05T00:00:00"
[ [ "Pussente", "Rodolfo M.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0704.3904
Fabien Mathieu
Anh-Tuan Gai (INRIA Rocquencourt), Dmitry Lebedev (FT R&D), Fabien Mathieu (FT R&D), Fabien De Montgolfier (LIAFA), Julien Reynier (LIENS), Laurent Viennot (INRIA Rocquencourt)
Acyclic Preference Systems in P2P Networks
null
null
null
null
cs.DS cs.GT
null
In this work we study preference systems natural for the Peer-to-Peer paradigm. Most of them fall in three categories: global, symmetric and complementary. All these systems share an acyclicity property. As a consequence, they admit a stable (or Pareto efficient) configuration, where no participant can collaborate with better partners than their current ones. We analyze the representation of the such preference systems and show that any acyclic system can be represented with a symmetric mark matrix. This gives a method to merge acyclic preference systems and retain the acyclicity. We also consider such properties of the corresponding collaboration graph, as clustering coefficient and diameter. In particular, studying the example of preferences based on real latency measurements, we observe that its stable configuration is a small-world graph.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 09:26:39 GMT" }, { "version": "v2", "created": "Wed, 2 May 2007 13:07:31 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Gai", "Anh-Tuan", "", "INRIA Rocquencourt" ], [ "Lebedev", "Dmitry", "", "FT R&D" ], [ "Mathieu", "Fabien", "", "FT R&D" ], [ "De Montgolfier", "Fabien", "", "LIAFA" ], [ "Reynier", "Julien", "", "LIENS" ], [ "Viennot", "Laurent", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0704.3905
Marc Schoenauer
Christian Gagn\'e (INFORMATIQUE WGZ INC.), Mich\`ele Sebag (INRIA Futurs), Marc Schoenauer (INRIA Futurs), Marco Tomassini (ISI)
Ensemble Learning for Free with Evolutionary Algorithms ?
null
Dans GECCO (2007)
null
null
cs.AI
null
Evolutionary Learning proceeds by evolving a population of classifiers, from which it generally returns (with some notable exceptions) the single best-of-run classifier as final result. In the meanwhile, Ensemble Learning, one of the most efficient approaches in supervised Machine Learning for the last decade, proceeds by building a population of diverse classifiers. Ensemble Learning with Evolutionary Computation thus receives increasing attention. The Evolutionary Ensemble Learning (EEL) approach presented in this paper features two contributions. First, a new fitness function, inspired by co-evolution and enforcing the classifier diversity, is presented. Further, a new selection criterion based on the classification margin is proposed. This criterion is used to extract the classifier ensemble from the final population only (Off-line) or incrementally along evolution (On-line). Experiments on a set of benchmark problems show that Off-line outperforms single-hypothesis evolutionary learning and state-of-art Boosting and generates smaller classifier ensembles.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 09:29:22 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Gagné", "Christian", "", "INFORMATIQUE WGZ INC." ], [ "Sebag", "Michèle", "", "INRIA\n Futurs" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ], [ "Tomassini", "Marco", "", "ISI" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0704.3931
Martin Lange
Roland Axelsson, Martin Lange, and Rafal Somla
The Complexity of Model Checking Higher-Order Fixpoint Logic
33 pages, 2 figures, to be published in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 3, Issue 2 (June 29, 2007) lmcs:754
10.2168/LMCS-3(2:7)2007
null
cs.LO
null
Higher-Order Fixpoint Logic (HFL) is a hybrid of the simply typed \lambda-calculus and the modal \lambda-calculus. This makes it a highly expressive temporal logic that is capable of expressing various interesting correctness properties of programs that are not expressible in the modal \lambda-calculus. This paper provides complexity results for its model checking problem. In particular we consider those fragments of HFL built by using only types of bounded order k and arity m. We establish k-fold exponential time completeness for model checking each such fragment. For the upper bound we use fixpoint elimination to obtain reachability games that are singly-exponential in the size of the formula and k-fold exponential in the size of the underlying transition system. These games can be solved in deterministic linear time. As a simple consequence, we obtain an exponential time upper bound on the expression complexity of each such fragment. The lower bound is established by a reduction from the word problem for alternating (k-1)-fold exponential space bounded Turing Machines. Since there are fixed machines of that type whose word problems are already hard with respect to k-fold exponential time, we obtain, as a corollary, k-fold exponential time completeness for the data complexity of our fragments of HFL, provided m exceeds 3. This also yields a hierarchy result in expressive power.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 13:09:20 GMT" }, { "version": "v2", "created": "Fri, 29 Jun 2007 12:15:42 GMT" } ]
"2015-07-01T00:00:00"
[ [ "Axelsson", "Roland", "" ], [ "Lange", "Martin", "" ], [ "Somla", "Rafal", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0704.3969
Jean-Claude Belfiore
Sheng Yang and Jean-Claude Belfiore
Diversity of MIMO Multihop Relay Channels - Part I: Amplify-and-Forward
37 pages, 15 figures. submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this two-part paper, we consider the multiantenna multihop relay channels in which the source signal arrives at the destination through N independent relaying hops in series. The main concern of this work is to design relaying strategies that utilize efficiently the relays in such a way that the diversity is maximized. In part I, we focus on the amplify-and-forward (AF) strategy with which the relays simply scale the received signal and retransmit it. More specifically, we characterize the diversity-multiplexing tradeoff (DMT) of the AF scheme in a general multihop channel with arbitrary number of antennas and arbitrary number of hops. The DMT is in closed-form expression as a function of the number of antennas at each node. First, we provide some basic results on the DMT of the general Rayleigh product channels. It turns out that these results have very simple and intuitive interpretation. Then, the results are applied to the AF multihop channels which is shown to be equivalent to the Rayleigh product channel, in the DMT sense. Finally, the project-and-forward (PF) scheme, a variant of the AF scheme, is proposed. We show that the PF scheme has the same DMT as the AF scheme, while the PF can have significant power gain over the AF scheme in some cases. In part II, we will derive the upper bound on the diversity of the multihop channels and show that it can be achieved by partitioning the multihop channel into AF subchannels.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 16:28:51 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Yang", "Sheng", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0010
Sergey Dorogovtsev
S. N. Dorogovtsev, A. V. Goltsev, J. F. F. Mendes
Critical phenomena in complex networks
Review article, 79 pages, 43 figures, 1 table, 508 references, extended
Rev. Mod. Phys. 80, 1275 (2008)
10.1103/RevModPhys.80.1275
null
cond-mat.stat-mech cs.NI math-ph math.MP physics.soc-ph
null
The combination of the compactness of networks, featuring small diameters, and their complex architectures results in a variety of critical effects dramatically different from those in cooperative systems on lattices. In the last few years, researchers have made important steps toward understanding the qualitatively new critical phenomena in complex networks. We review the results, concepts, and methods of this rapidly developing field. Here we mostly consider two closely related classes of these critical phenomena, namely structural phase transitions in the network architectures and transitions in cooperative models on networks as substrates. We also discuss systems where a network and interacting agents on it influence each other. We overview a wide range of critical phenomena in equilibrium and growing networks including the birth of the giant connected component, percolation, k-core percolation, phenomena near epidemic thresholds, condensation transitions, critical phenomena in spin models placed on networks, synchronization, and self-organized criticality effects in interacting systems on networks. We also discuss strong finite size effects in these systems and highlight open problems and perspectives.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 20:21:37 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 22:31:15 GMT" }, { "version": "v3", "created": "Tue, 30 Oct 2007 18:12:18 GMT" }, { "version": "v4", "created": "Fri, 9 Nov 2007 16:57:31 GMT" }, { "version": "v5", "created": "Tue, 13 Nov 2007 20:57:23 GMT" }, { "version": "v6", "created": "Fri, 16 Nov 2007 21:46:13 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Dorogovtsev", "S. N.", "" ], [ "Goltsev", "A. V.", "" ], [ "Mendes", "J. F. F.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0705.0017
George Viamontes Ph.D.
George F. Viamontes, Igor L. Markov, John P. Hayes
Checking Equivalence of Quantum Circuits and States
9 pages, 13 figures, 3 tables
Proc. Int'l Conf. on Computer-Aided Design (ICCAD), pp. 69-74, San Jose, CA, November 2007.
null
null
quant-ph cs.ET
null
Quantum computing promises exponential speed-ups for important simulation and optimization problems. It also poses new CAD problems that are similar to, but more challenging, than the related problems in classical (non-quantum) CAD, such as determining if two states or circuits are functionally equivalent. While differences in classical states are easy to detect, quantum states, which are represented by complex-valued vectors, exhibit subtle differences leading to several notions of equivalence. This provides flexibility in optimizing quantum circuits, but leads to difficult new equivalence-checking issues for simulation and synthesis. We identify several different equivalence-checking problems and present algorithms for practical benchmarks, including quantum communication and search circuits, which are shown to be very fast and robust for hundreds of qubits.
[ { "version": "v1", "created": "Tue, 1 May 2007 16:31:12 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 20:48:43 GMT" } ]
"2011-11-04T00:00:00"
[ [ "Viamontes", "George F.", "" ], [ "Markov", "Igor L.", "" ], [ "Hayes", "John P.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
0705.0025
Andreas Martin Lisewski
Andreas Martin Lisewski
Can the Internet cope with stress?
4 pages
null
null
null
cs.HC cs.AI
null
When will the Internet become aware of itself? In this note the problem is approached by asking an alternative question: Can the Internet cope with stress? By extrapolating the psychological difference between coping and defense mechanisms a distributed software experiment is outlined which could reject the hypothesis that the Internet is not a conscious entity.
[ { "version": "v1", "created": "Tue, 1 May 2007 15:44:17 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Lisewski", "Andreas Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0705.0043
Christian Goulding
Savas Dayanik, Christian Goulding, H. Vincent Poor
Joint Detection and Identification of an Unobservable Change in the Distribution of a Random Sequence
Appeared in the Proceedings of the 41st Annual Conference on Information Sciences and Systems, John Hopkins University, March 2007
null
null
null
cs.IT math.IT
null
This paper examines the joint problem of detection and identification of a sudden and unobservable change in the probability distribution function (pdf) of a sequence of independent and identically distributed (i.i.d.) random variables to one of finitely many alternative pdf's. The objective is quick detection of the change and accurate inference of the ensuing pdf. Following a Bayesian approach, a new sequential decision strategy for this problem is revealed and is proven optimal. Geometrical properties of this strategy are demonstrated via numerical examples.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 23:59:09 GMT" } ]
"2009-04-16T00:00:00"
[ [ "Dayanik", "Savas", "" ], [ "Goulding", "Christian", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0044
Shashi Kiran Chilappagari
Shashi Kiran Chilappagari and Bane Vasic
Reliable Memories Built from Unreliable Components Based on Expander Graphs
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper, memories built from components subject to transient faults are considered. A fault-tolerant memory architecture based on low-density parity-check codes is proposed and the existence of reliable memories for the adversarial failure model is proved. The proof relies on the expansion property of the underlying Tanner graph of the code. An equivalence between the Taylor-Kuznetsov (TK) scheme and Gallager B algorithm is established and the results are extended to the independent failure model. It is also shown that the proposed memory architecture has lower redundancy compared to the TK scheme. The results are illustrated with specific numerical examples.
[ { "version": "v1", "created": "Tue, 1 May 2007 00:07:46 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Chilappagari", "Shashi Kiran", "" ], [ "Vasic", "Bane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0081
Yeow Meng Chee
Yeow Meng Chee, San Ling
Constructions of q-Ary Constant-Weight Codes
12 pages
IEEE Transactions on Information Theory, Vol. 53, No. 1, January 2007, pp. 135-146
10.1109/TIT.2006.887499
null
cs.IT math.IT
null
This paper introduces a new combinatorial construction for q-ary constant-weight codes which yields several families of optimal codes and asymptotically optimal codes. The construction reveals intimate connection between q-ary constant-weight codes and sets of pairwise disjoint combinatorial designs of various types.
[ { "version": "v1", "created": "Tue, 1 May 2007 07:16:43 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Chee", "Yeow Meng", "" ], [ "Ling", "San", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0085
{\O}yvind Ytrehus
Angela I. Barbero Diez and Oyvind Ytrehus
An efficient centralized binary multicast network coding algorithm for any cyclic network
null
null
null
null
cs.IT math.IT
null
We give an algorithm for finding network encoding and decoding equations for error-free multicasting networks with multiple sources and sinks. The algorithm given is efficient (polynomial complexity) and works on any kind of network (acyclic, link cyclic, flow cyclic, or even in the presence of knots). The key idea will be the appropriate use of the delay (both natural and additional) during the encoding. The resulting code will always work with finite delay with binary encoding coefficients.
[ { "version": "v1", "created": "Tue, 1 May 2007 08:03:18 GMT" } ]
"2007-07-13T00:00:00"
[ [ "Diez", "Angela I. Barbero", "" ], [ "Ytrehus", "Oyvind", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0705.0086
Maurice Margenstern
Maurice Margenstern
About the domino problem in the hyperbolic plane, a new solution: complement
20 pages
M. Margenstern, "The domino problem of the hyperbolic plane is undecidable", Theoretical Computer Science, vol. 407, (2008), 29-84
10.1016/j.tcs.2008.04.038
null
cs.CG cs.DM
null
In this paper, we complete the construction of paper arXiv:cs.CG/0701096v2. Together with the proof contained in arXiv:cs.CG/0701096v2, this paper definitely proves that the general problem of tiling the hyperbolic plane with {\it \`a la} Wang tiles is undecidable.
[ { "version": "v1", "created": "Tue, 1 May 2007 09:29:59 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 20:09:36 GMT" }, { "version": "v3", "created": "Wed, 9 May 2007 06:25:50 GMT" }, { "version": "v4", "created": "Fri, 18 May 2007 15:14:52 GMT" } ]
"2009-07-06T00:00:00"
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0705.0123
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
An Energy Efficiency Perspective on Training for Fading Channels
To appear in the Proc. of the 2007 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2007.4557387
null
cs.IT math.IT
null
In this paper, the bit energy requirements of training-based transmission over block Rayleigh fading channels are studied. Pilot signals are employed to obtain the minimum mean-square-error (MMSE) estimate of the channel fading coefficients. Energy efficiency is analyzed in the worst case scenario where the channel estimate is assumed to be perfect and the error in the estimate is considered as another source of additive Gaussian noise. It is shown that bit energy requirement grows without bound as the snr goes to zero, and the minimum bit energy is achieved at a nonzero snr value below which one should not operate. The effect of the block length on both the minimum bit energy and the snr value at which the minimum is achieved is investigated. Flash training schemes are analyzed and shown to improve the energy efficiency in the low-snr regime. Energy efficiency analysis is also carried out when peak power constraints are imposed on pilot signals.
[ { "version": "v1", "created": "Tue, 1 May 2007 15:27:41 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]