title
stringlengths
1
275
id
stringlengths
9
16
abstract
stringlengths
320
3.75k
categories
stringlengths
5
104
doi
stringlengths
3
151
created
timestamp[ns]
updated
timestamp[ns]
authors
stringlengths
5
9.47k
url
stringlengths
31
38
abstract_length
int64
320
3.75k
id_n
int64
0
556k
on-line viterbi algorithm and its relationship to random walks
0704.0062
in this paper, we introduce the on-line viterbi algorithm for decoding hiddenmarkov models (hmms) in much smaller than linear space. our analysis ontwo-state hmms suggests that the expected maximum memory used to decodesequence of length $n$ with $m$-state hmm can be as low as $\theta(m\log n)$,without a significant slow-down compared to the classical viterbi algorithm.classical viterbi algorithm requires $o(mn)$ space, which is impractical foranalysis of long dna sequences (such as complete human genome chromosomes) andfor continuous data streams. we also experimentally demonstrate the performanceof the on-line viterbi algorithm on a simple hmm for gene finding on bothsimulated and real dna sequences.
cs.ds
10.1007/978-3-540-74126-8_23
2007-03-31T00:00:00
null
['šrámek', 'brejová', 'vinař']
https://arxiv.org/abs/0704.0062
711
0
capacity of a multiple-antenna fading channel with a quantized precoding matrix
0704.0217
given a multiple-input multiple-output (mimo) channel, feedback from thereceiver can be used to specify a transmit precoding matrix, which selectivelyactivates the strongest channel modes. here we analyze the performance ofrandom vector quantization (rvq), in which the precoding matrix is selectedfrom a random codebook containing independent, isotropically distributedentries. we assume that channel elements are i.i.d. and known to the receiver,which relays the optimal (rate-maximizing) precoder codebook index to thetransmitter using b bits. we first derive the large system capacity ofbeamforming (rank-one precoding matrix) as a function of b, where large systemrefers to the limit as b and the number of transmit and receive antennas all goto infinity with fixed ratios. with beamforming rvq is asymptotically optimal,i.e., no other quantization scheme can achieve a larger asymptotic rate. theperformance of rvq is also compared with that of a simpler reduced-rank scalarquantization scheme in which the beamformer is constrained to lie in a randomsubspace. we subsequently consider a precoding matrix with arbitrary rank, andapproximate the asymptotic rvq performance with optimal and linear receivers(matched filter and minimum mean squared error (mmse)). numerical examples showthat these approximations accurately predict the performance of finite-sizesystems of interest. given a target spectral efficiency, numerical examplesshow that the amount of feedback required by the linear mmse receiver is onlyslightly more than that required by the optimal receiver, whereas the matchedfilter can require significantly more feedback.
cs.it math.it
10.1109/tit.2008.2011437
2007-04-02T00:00:00
2009-02-16T00:00:00
['santipach', 'honig']
https://arxiv.org/abs/0704.0217
1,641
1
refuting the pseudo attack on the reesse1+ cryptosystem
0704.0492
we illustrate through example 1 and 2 that the condition at theorem 1 in [8]dissatisfies necessity, and the converse proposition of fact 1.1 in [8] doesnot hold, namely the condition z/m - l/ak < 1/(2 ak^2) is not sufficient forf(i) + f(j) = f(k). illuminate through an analysis and ex.3 that there is alogic error during deduction of fact 1.2, which causes each of fact 1.2, 1.3, 4to be invalid. demonstrate through ex.4 and 5 that each or the combination ofqu+1 > qu * d at fact 4 and table 1 at fact 2.2 is not sufficient for f(i) +f(j) = f(k), property 1, 2, 3, 4, 5 each are invalid, and alg.1 based on fact 4and alg.2 based on table 1 are disordered and wrong logically. further,manifest through a repeated experiment and ex.5 that the data at table 2 isfalsified, and the example in [8] is woven elaborately. we explain why cx = ax* w^f(x) (% m) is changed to cx = (ax * w^f(x))^d (% m) in reesse1+ v2.1. tothe signature fraud, we point out that [8] misunderstands the existence of t^-1and q^-1 % (m-1), and forging of q can be easily avoided through moving h.therefore, the conclusion of [8] that reesse1+ is not secure at all (whichconnotes that [8] can extract a related private key from any public key inreesse1+) is fully incorrect, and as long as the parameter omega is fitlyselected, reesse1+ with cx = ax * w^f(x) (% m) is secure.
cs.cr
nan
2007-04-04T00:00:00
2010-02-04T00:00:00
['su', 'lu']
https://arxiv.org/abs/0704.0492
1,345
2
optimal routing for decode-and-forward based cooperation in wireless networks
0704.0499
we investigate cooperative wireless relay networks in which the nodes canhelp each other in data transmission. we study different coding strategies inthe single-source single-destination network with many relay nodes. given themyriad of ways in which nodes can cooperate, there is a natural routingproblem, i.e., determining an ordered set of nodes to relay the data from thesource to the destination. we find that for a given route, thedecode-and-forward strategy, which is an information theoretic cooperativecoding strategy, achieves rates significantly higher than that achievable bythe usual multi-hop coding strategy, which is a point-to-point non-cooperativecoding strategy. we construct an algorithm to find an optimal route (in termsof rate maximizing) for the decode-and-forward strategy. since the algorithmruns in factorial time in the worst case, we propose a heuristic algorithm thatruns in polynomial time. the heuristic algorithm outputs an optimal route whenthe nodes transmit independent codewords. we implement these coding strategiesusing practical low density parity check codes to compare the performance ofthe strategies on different routes.
cs.it math.it
10.1109/sahcn.2007.4292845
2007-04-04T00:00:00
null
['ong', 'motani']
https://arxiv.org/abs/0704.0499
1,164
3
on the kolmogorov-chaitin complexity for short sequences
0704.1043
a drawback of kolmogorov-chaitin complexity (k) as a function from s to theshortest program producing s is its noncomputability which limits its range ofapplicability. moreover, when strings are short, the dependence of k on aparticular universal turing machine u can be arbitrary. in practice one canapproximate it by computable compression methods. however, such compressionmethods do not always provide meaningful approximations--for strings shorter,for example, than typical compiler lengths. in this paper we suggest anempirical approach to overcome this difficulty and to obtain a stabledefinition of the kolmogorov-chaitin complexity for short sequences.additionally, a correlation in terms of distribution frequencies was foundacross the output of two models of abstract machines, namely unidimensionalcellular automata and deterministic turing machine.
cs.cc cs.it math.it
nan
2007-04-08T00:00:00
2010-12-16T00:00:00
['delahaye', 'zenil']
https://arxiv.org/abs/0704.1043
861
4
optimal routing for the gaussian multiple-relay channel with decode-and-forward
0704.2926
in this paper, we study a routing problem on the gaussian multiple relaychannel, in which nodes employ a decode-and-forward coding strategy. we areinterested in routes for the information flow through the relays that achievethe highest df rate. we first construct an algorithm that provably findsoptimal df routes. as the algorithm runs in factorial time in the worst case,we propose a polynomial time heuristic algorithm that finds an optimal routewith high probability. we demonstrate that that the optimal (and near optimal)df routes are good in practice by simulating a distributed df coding schemeusing low density parity check codes with puncturing and incrementalredundancy.
cs.it math.it
10.1109/isit.2007.4557364
2007-04-23T00:00:00
null
['ong', 'motani']
https://arxiv.org/abs/0704.2926
681
5
general-purpose computing on a semantic network substrate
0704.3395
this article presents a model of general-purpose computing on a semanticnetwork substrate. the concepts presented are applicable to any semanticnetwork representation. however, due to the standards and technologicalinfrastructure devoted to the semantic web effort, this article is presentedfrom this point of view. in the proposed model of computing, the applicationprogramming interface, the run-time program, and the state of the computingvirtual machine are all represented in the resource description framework(rdf). the implementation of the concepts presented provides a practicalcomputing paradigm that leverages the highly-distributed and standardizedrepresentational-layer of the semantic web.
cs.ai cs.pl
nan
2007-04-25T00:00:00
2010-06-06T00:00:00
['rodriguez']
https://arxiv.org/abs/0704.3395
703
6
wdm and directed star arboricity
0705.0315
a digraph is $m$-labelled if every arc is labelled by an integer in $\{1,\dots,m\}$. motivated by wavelength assignment for multicasts in opticalnetworks, we introduce and study $n$-fibre colourings of labelled digraphs.these are colourings of the arcs of $d$ such that at each vertex $v$, and foreach colour $\alpha$, $in(v,\alpha)+out(v,\alpha)\leq n$ with $in(v,\alpha)$the number of arcs coloured $\alpha$ entering $v$ and $out(v,\alpha)$ thenumber of labels $l$ such that there is at least one arc of label $l$ leaving$v$ and coloured with $\alpha$. the problem is to find the minimum number ofcolours $\lambda_n(d)$ such that the $m$-labelled digraph $d$ has an $n$-fibrecolouring. in the particular case when $d$ is $1$-labelled, $\lambda_1(d)$ iscalled the directed star arboricity of $d$, and is denoted by $dst(d)$. wefirst show that $dst(d)\leq 2\delta^-(d)+1$, and conjecture that if$\delta^-(d)\geq 2$, then $dst(d)\leq 2\delta^-(d)$. we also prove that for asubcubic digraph $d$, then $dst(d)\leq 3$, and that if $\delta^+(d),\delta^-(d)\leq 2$, then $dst(d)\leq 4$. finally, we study$\lambda_n(m,k)=\max\{\lambda_n(d) \tq d \mbox{is $m$-labelled} \et\delta^-(d)\leq k\}$. we show that if $m\geq n$, then $\ds\left\lceil\frac{m}{n}\left\lceil \frac{k}{n}\right\rceil + \frac{k}{n}\right\rceil\leq \lambda_n(m,k) \leq\left\lceil\frac{m}{n}\left\lceil\frac{k}{n}\right\rceil + \frac{k}{n} \right\rceil + c \frac{m^2\log k}{n}$ forsome constant $c$. we conjecture that the lower bound should be the right valueof $\lambda_n(m,k)$.
cs.ni math.co
nan
2007-05-02T00:00:00
2010-07-14T00:00:00
['amini', 'havet', 'huc', 'thomasse']
https://arxiv.org/abs/0705.0315
1,541
7
soft constraint abstraction based on semiring homomorphism
0705.0734
the semiring-based constraint satisfaction problems (semiring csps), proposedby bistarelli, montanari and rossi \cite{bmr97}, is a very general framework ofsoft constraints. in this paper we propose an abstraction scheme for softconstraints that uses semiring homomorphism. to find optimal solutions of theconcrete problem, the idea is, first working in the abstract problem andfinding its optimal solutions, then using them to solve the concrete problem. in particular, we show that a mapping preserves optimal solutions if and onlyif it is an order-reflecting semiring homomorphism. moreover, for a semiringhomomorphism $\alpha$ and a problem $p$ over $s$, if $t$ is optimal in$\alpha(p)$, then there is an optimal solution $\bar{t}$ of $p$ such that$\bar{t}$ has the same value as $t$ in $\alpha(p)$.
cs.ai
10.1016/j.tcs.2008.03.029
2007-05-05T00:00:00
null
['li', 'ying']
https://arxiv.org/abs/0705.0734
804
8
block locally optimal preconditioned eigenvalue xolvers (blopex) in hypre and petsc
0705.2626
we describe our software package block locally optimal preconditionedeigenvalue xolvers (blopex) publicly released recently. blopex is available asa stand-alone serial library, as an external package to petsc (``portable,extensible toolkit for scientific computation'', a general purpose suite oftools for the scalable solution of partial differential equations and relatedproblems developed by argonne national laboratory), and is also built into {\ithypre} (``high performance preconditioners'', scalable linear solvers packagedeveloped by lawrence livermore national laboratory). the present blopexrelease includes only one solver--the locally optimal block preconditionedconjugate gradient (lobpcg) method for symmetric eigenvalue problems. {\ithypre} provides users with advanced high-quality parallel preconditioners forlinear systems, in particular, with domain decomposition and multigridpreconditioners. with blopex, the same preconditioners can now be efficientlyused for symmetric eigenvalue problems. petsc facilitates the integration ofindependently developed application modules with strict attention to componentinteroperability, and makes blopex extremely easy to compile and use withpreconditioners that are available via petsc. we present the lobpcg algorithmin blopex for {\it hypre} and petsc. we demonstrate numerically the scalabilityof blopex by testing it on a number of distributed and shared memory parallelsystems, including a beowulf system, sun fire 880, an amd dual-core opteronworkstation, and ibm bluegene/l supercomputer, using petsc domain decompositionand {\it hypre} multigrid preconditioning. we test blopex on a model problem,the standard 7-point finite-difference approximation of the 3-d laplacian, withthe problem size in the range $10^5-10^8$.
cs.ms cs.na
10.1137/060661624
2007-05-17T00:00:00
null
['knyazev', 'argentati', 'lashuk', 'ovtchinnikov']
https://arxiv.org/abs/0705.2626
1,785
9
maximizing maximal angles for plane straight-line graphs
0705.3820
let $g=(s, e)$ be a plane straight-line graph on a finite point set$s\subset\r^2$ in general position. the incident angles of a vertex $p \in s$of $g$ are the angles between any two edges of $g$ that appear consecutively inthe circular order of the edges incident to $p$. a plane straight-line graph is called $\phi$-open if each vertex has anincident angle of size at least $\phi$. in this paper we study the followingtype of question: what is the maximum angle $\phi$ such that for any finite set$s\subset\r^2$ of points in general position we can find a graph from a certainclass of graphs on $s$ that is $\phi$-open? in particular, we consider theclasses of triangulations, spanning trees, and paths on $s$ and give tightbounds in most cases.
cs.cg cs.dm math.co
10.1007/978-3-540-73951-7_40
2007-05-25T00:00:00
2009-10-12T00:00:00
['aichholzer', 'hackl', 'hoffmann', 'huemer', 'por', 'santos', 'speckmann', 'vogtenhuber']
https://arxiv.org/abs/0705.3820
747
10
mixed membership stochastic blockmodels
0705.4485
observations consisting of measurements on relationships for pairs of objectsarise in many settings, such as protein interaction and gene regulatorynetworks, collections of author-recipient email, and social networks. analyzingsuch data with probabilisic models can be delicate because the simpleexchangeability assumptions underlying many boilerplate models no longer hold.in this paper, we describe a latent variable model of such data called themixed membership stochastic blockmodel. this model extends blockmodels forrelational data to ones which capture mixed membership latent relationalstructure, thus providing an object-specific low-dimensional representation. wedevelop a general variational inference algorithm for fast approximateposterior inference. we explore applications to social and protein interactionnetworks.
stat.me cs.lg math.st physics.soc-ph stat.ml stat.th
nan
2007-05-30T00:00:00
null
['airoldi', 'blei', 'fienberg', 'xing']
https://arxiv.org/abs/0705.4485
830
11
sampling colourings of the triangular lattice
0706.0489
we show that the glauber dynamics on proper 9-colourings of the triangularlattice is rapidly mixing, which allows for efficient sampling. consequently,there is a fully polynomial randomised approximation scheme (fpras) forcounting proper 9-colourings of the triangular lattice. proper colouringscorrespond to configurations in the zero-temperature anti-ferromagnetic pottsmodel. we show that the spin system consisting of proper 9-colourings of thetriangular lattice has strong spatial mixing. this implies that there is aunique infinite-volume gibbs distribution, which is an important propertystudied in statistical physics. our results build on previous work by goldberg,martin and paterson, who showed similar results for 10 colours on thetriangular lattice. their work was preceded by salas and sokal's 11-colourresult. both proofs rely on computational assistance, and so does our 9-colourproof. we have used a randomised heuristic to guide us towards rigourousresults.
math-ph cs.dm cs.ds math.mp
nan
2007-06-04T00:00:00
2010-10-25T00:00:00
['jalsenius']
https://arxiv.org/abs/0706.0489
975
12
tropical implicitization and mixed fiber polytopes
0706.0564
the software trim offers implementations of tropical implicitization andtropical elimination, as developed by tevelev and the authors. given apolynomial map with generic coefficients, trim computes the tropical variety ofthe image. when the image is a hypersurface, the output is the newton polytopeof the defining polynomial. trim can thus be used to compute mixed fiberpolytopes, including secondary polytopes.
cs.sc math.ag math.co
nan
2007-06-04T00:00:00
2010-06-20T00:00:00
['sturmfels', 'yu']
https://arxiv.org/abs/0706.0564
412
13
getting started in probabilistic graphical models
0706.2040
probabilistic graphical models (pgms) have become a popular tool forcomputational analysis of biological data in a variety of domains. but, whatexactly are they and how do they work? how can we use pgms to discover patternsthat are biologically relevant? and to what extent can pgms help us formulatenew hypotheses that are testable at the bench? this note sketches out someanswers and illustrates the main ideas behind the statistical approach tobiological pattern discovery.
q-bio.qm cs.lg physics.soc-ph stat.me stat.ml
10.1371/journal.pcbi.0030252
2007-06-14T00:00:00
2007-11-10T00:00:00
['airoldi']
https://arxiv.org/abs/0706.2040
476
14
stability of boundary measures
0706.2153
we introduce the boundary measure at scale r of a compact subset of then-dimensional euclidean space. we show how it can be computed for point cloudsand suggest these measures can be used for feature detection. the maincontribution of this work is the proof a quantitative stability theorem forboundary measures using tools of convex analysis and geometric measure theory.as a corollary we obtain a stability result for federer's curvature measures ofa compact, allowing to compute them from point-cloud approximations of thecompact.
cs.cg math.ca math.mg
10.1007/s10208-009-9056-2
2007-06-14T00:00:00
2007-06-18T00:00:00
['chazal', 'cohen-steiner', 'mérigot']
https://arxiv.org/abs/0706.2153
533
15
interference and outage in clustered wireless ad hoc networks
0706.2434
in the analysis of large random wireless networks, the underlying nodedistribution is almost ubiquitously assumed to be the homogeneous poisson pointprocess. in this paper, the node locations are assumed to form a poissonclustered process on the plane. we derive the distributional properties of theinterference and provide upper and lower bounds for its ccdf. we consider theprobability of successful transmission in an interference limited channel whenfading is modeled as rayleigh. we provide a numerically integrable expressionfor the outage probability and closed-form upper and lower bounds.we show thatwhen the transmitter-receiver distance is large, the success probability isgreater than that of a poisson arrangement. these results characterize theperformance of the system under geographical or mac-induced clustering. weobtain the maximum intensity of transmitting nodes for a given outageconstraint, i.e., the transmission capacity (of this spatial arrangement) andshow that it is equal to that of a poisson arrangement of nodes. for theanalysis, techniques from stochastic geometry are used, in particular theprobability generating functional of poisson cluster processes, the palmcharacterization of poisson cluster processes and the campbell-mecke theorem.
cs.it math.it
10.1109/tit.2009.2025543
2007-06-16T00:00:00
null
['ganti', 'haenggi']
https://arxiv.org/abs/0706.2434
1,272
16
approximations of lovasz extensions and their induced interaction index
0706.3856
the lovasz extension of a pseudo-boolean function $f : \{0,1\}^n \to r$ isdefined on each simplex of the standard triangulation of $[0,1]^n$ as theunique affine function $\hat f : [0,1]^n \to r$ that interpolates $f$ at the$n+1$ vertices of the simplex. its degree is that of the unique multilinearpolynomial that expresses $f$. in this paper we investigate the least squaresapproximation problem of an arbitrary lovasz extension $\hat f$ by lovaszextensions of (at most) a specified degree. we derive explicit expressions ofthese approximations. the corresponding approximation problem forpseudo-boolean functions was investigated by hammer and holzman (1992) and thensolved explicitly by grabisch, marichal, and roubens (2000), giving rise to analternative definition of banzhaf interaction index. similarly we introduce anew interaction index from approximations of $\hat f$ and we present some ofits properties. it turns out that its corresponding power index identifies withthe power index introduced by grabisch and labreuche (2001).
math.co cs.dm
nan
2007-06-26T00:00:00
null
['marichal', 'mathonet']
https://arxiv.org/abs/0706.3856
1,039
17
determinacy in a synchronous pi-calculus
0707.0556
the s-pi-calculus is a synchronous pi-calculus which is based on the slmodel. the latter is a relaxation of the esterel model where the reaction tothe absence of a signal within an instant can only happen at the next instant.in the present work, we present and characterise a compositional semantics ofthe s-pi-calculus based on suitable notions of labelled transition system andbisimulation. based on this semantic framework, we explore the notion ofdeterminacy and the related one of (local) confluence.
cs.lo
nan
2007-07-04T00:00:00
2008-02-11T00:00:00
['amadio', 'dogguy']
https://arxiv.org/abs/0707.0556
505
18
the cyborg astrobiologist: porting from a wearable computer to the astrobiology phone-cam
0707.0808
we have used a simple camera phone to significantly improve an `explorationsystem' for astrobiology and geology. this camera phone will make it mucheasier to develop and test computer-vision algorithms for future planetaryexploration. we envision that the `astrobiology phone-cam' exploration systemcan be fruitfully used in other problem domains as well.
cs.cv astro-ph cs.ai cs.ce cs.hc cs.ni cs.ro cs.se
10.1017/s1473550407003862
2007-07-05T00:00:00
null
['bartolo', 'mcguire', 'camilleri', 'spiteri', 'borg', 'farrugia', 'ormo', 'gomez-elvira', 'rodriguez-manfredi', 'diaz-martinez', 'ritter', 'haschke', 'oesker', 'ontrup']
https://arxiv.org/abs/0707.0808
355
19
p-adic modelling of the genome and the genetic code
0707.3043
the present paper is devoted to foundations of p-adic modelling in genomics.considering nucleotides, codons, dna and rna sequences, amino acids, andproteins as information systems, we have formulated the corresponding p-adicformalisms for their investigations. each of these systems has itscharacteristic prime number used for construction of the related informationspace. relevance of this approach is illustrated by some examples. inparticular, it is shown that degeneration of the genetic code is a p-adicphenomenon. we have also put forward a hypothesis on evolution of the geneticcode assuming that primitive code was based on single nucleotides andchronologically first four amino acids. this formalism of p-adic genomicinformation systems can be implemented in computer programs and applied tovarious concrete cases.
q-bio.ot cs.it math.it physics.bio-ph
10.1093/comjnl/bxm083
2007-07-20T00:00:00
null
['dragovich', 'dragovich']
https://arxiv.org/abs/0707.3043
823
20
separable and low-rank continuous games
0707.3462
in this paper, we study nonzero-sum separable games, which are continuousgames whose payoffs take a sum-of-products form. included in this subclass areall finite games and polynomial games. we investigate the structure ofequilibria in separable games. we show that these games admit finitelysupported nash equilibria. motivated by the bounds on the supports of mixedequilibria in two-player finite games in terms of the ranks of the payoffmatrices, we define the notion of the rank of an n-player continuous game anduse this to provide bounds on the cardinality of the support of equilibriumstrategies. we present a general characterization theorem that states that acontinuous game has finite rank if and only if it is separable. using our rankresults, we present an efficient algorithm for computing approximate equilibriaof two-player separable games with fixed strategy spaces in time polynomial inthe rank of the game.
cs.gt math.oc
10.1007/s00182-008-0129-2
2007-07-24T00:00:00
null
['stein', 'ozdaglar', 'parrilo']
https://arxiv.org/abs/0707.3462
923
21
mumford dendrograms
0707.3540
an effective $p$-adic encoding of dendrograms is presented through anexplicit embedding into the bruhat-tits tree for a $p$-adic number field. thisfield depends on the number of children of a vertex and is a finite extensionof the field of $p$-adic numbers. it is shown that fixing $p$-adicrepresentatives of the residue field allows a natural way of encoding stringsby identifying a given alphabet with such representatives. a simple $p$-adichierarchic classification algorithm is derived for $p$-adic numbers, and isapplied to strings over finite alphabets. examples of dna coding are presentedand discussed. finally, new geometric and combinatorial invariants of timeseries of $p$-adic dendrograms are developped.
cs.dm
10.1093/comjnl/bxm088
2007-07-24T00:00:00
null
['bradley']
https://arxiv.org/abs/0707.3540
716
22
complexity of propositional proofs under a promise
0707.4255
we study -- within the framework of propositional proof complexity -- theproblem of certifying unsatisfiability of cnf formulas under the promise thatany satisfiable formula has many satisfying assignments, where ``many'' standsfor an explicitly specified function $\lam$ in the number of variables $n$. tothis end, we develop propositional proof systems under different measures ofpromises (that is, different $\lam$) as extensions of resolution. this is doneby augmenting resolution with axioms that, roughly, can eliminate sets of truthassignments defined by boolean circuits. we then investigate the complexity ofsuch systems, obtaining an exponential separation in the average-case betweenresolution under different size promises: 1. resolution has polynomial-size refutations for all unsatisfiable 3cnfformulas when the promise is $\eps\cd2^n$, for any constant $0<\eps<1$. 2. there are no sub-exponential size resolution refutations for random 3cnfformulas, when the promise is $2^{\delta n}$ (and the number of clauses is$o(n^{3/2})$), for any constant $0<\delta<1$.
cs.cc cs.lo
nan
2007-07-28T00:00:00
null
['dershowitz', 'tzameret']
https://arxiv.org/abs/0707.4255
1,076
23
efficient divide-and-conquer implementations of symmetric fsas
0708.0580
a deterministic finite-state automaton (fsa) is an abstract sequentialmachine that reads the symbols comprising an input word one at a time. an fsais symmetric if its output is independent of the order in which the inputsymbols are read, i.e., if the output is invariant under permutations of theinput. we show how to convert a symmetric fsa a into an automaton-likedivide-and-conquer process whose intermediate results are no larger than thesize of a's memory. in comparison, a similar result for general fsa's has beenlong known via functional composition, but entails an exponential increase inmemory size. the new result has applications to parallel processing andsymmetric fsa networks.
cs.fl cs.dm
nan
2007-08-03T00:00:00
2010-08-05T00:00:00
['pritchard']
https://arxiv.org/abs/0708.0580
691
24
on perfect, amicable, and sociable chains
0708.1491
let $x = (x_0,...,x_{n-1})$ be an n-chain, i.e., an n-tuple of non-negativeintegers $< n$. consider the operator $s: x \mapsto x' = (x'_0,...,x'_{n-1})$,where x'_j represents the number of $j$'s appearing among the components of x.an n-chain x is said to be perfect if $s(x) = x$. for example, (2,1,2,0,0) is aperfect 5-chain. analogously to the theory of perfect, amicable, and sociablenumbers, one can define from the operator s the concepts of amicable pair andsociable group of chains. in this paper we give an exhaustive list of all theperfect, amicable, and sociable chains.
math.co cs.dm math.nt
nan
2007-08-10T00:00:00
null
['marichal']
https://arxiv.org/abs/0708.1491
580
25
resolution over linear equations and multilinear proofs
0708.1529
we develop and study the complexity of propositional proof systems of varyingstrength extending resolution by allowing it to operate with disjunctions oflinear equations instead of clauses. we demonstrate polynomial-size refutationsfor hard tautologies like the pigeonhole principle, tseitin graph tautologiesand the clique-coloring tautologies in these proof systems. using the(monotone) interpolation by a communication game technique we establish anexponential-size lower bound on refutations in a certain, considerably strong,fragment of resolution over linear equations, as well as a general polynomialupper bound on (non-monotone) interpolants in this fragment. we then apply these results to extend and improve previous results onmultilinear proofs (over fields of characteristic 0), as studied in[raztzameret06]. specifically, we show the following: 1. proofs operating with depth-3 multilinear formulas polynomially simulate acertain, considerably strong, fragment of resolution over linear equations. 2. proofs operating with depth-3 multilinear formulas admit polynomial-sizerefutations of the pigeonhole principle and tseitin graph tautologies. theformer improve over a previous result that established small multilinear proofsonly for the \emph{functional} pigeonhole principle. the latter are differentthan previous proofs, and apply to multilinear proofs of tseitin mod p graphtautologies over any field of characteristic 0. we conclude by connecting resolution over linear equations with extensions ofthe cutting planes proof system.
cs.cc cs.lo
10.1016/j.apal.2008.04.001
2007-08-10T00:00:00
null
['raz', 'tzameret']
https://arxiv.org/abs/0708.1529
1,553
26
optimal causal inference: estimating stored information and approximating causal architecture
0708.1580
we introduce an approach to inferring the causal architecture of stochasticdynamical systems that extends rate distortion theory to use causalshielding---a natural principle of learning. we study two distinct cases ofcausal inference: optimal causal filtering and optimal causal estimation. filtering corresponds to the ideal case in which the probability distributionof measurement sequences is known, giving a principled method to approximate asystem's causal structure at a desired level of representation. we show that,in the limit in which a model complexity constraint is relaxed, filtering findsthe exact causal architecture of a stochastic dynamical system, known as thecausal-state partition. from this, one can estimate the amount of historicalinformation the process stores. more generally, causal filtering finds a gradedmodel-complexity hierarchy of approximations to the causal architecture. abruptchanges in the hierarchy, as a function of approximation, capture distinctscales of structural organization. for nonideal cases with finite data, we show how the correct number ofunderlying causal states can be found by optimal causal estimation. apreviously derived model complexity control term allows us to correct for theeffect of statistical fluctuations in probability estimates and thereby avoidover-fitting.
cs.it cond-mat.stat-mech cs.lg math.it math.st stat.th
nan
2007-08-11T00:00:00
2010-08-19T00:00:00
['still', 'crutchfield', 'ellison']
https://arxiv.org/abs/0708.1580
1,329
27
obstructions to genericity in study of parametric problems in control theory
0708.2078
we investigate systems of equations, involving parameters from the point ofview of both control theory and computer algebra. the equations might involvelinear operators such as partial (q-)differentiation, (q-)shift, (q-)differenceas well as more complicated ones, which act trivially on the parameters. such asystem can be identified algebraically with a certain left module over anon-commutative algebra, where the operators commute with the parameters. wedevelop, implement and use in practice the algorithm for revealing all theexpressions in parameters, for which e.g. homological properties of a systemdiffer from the generic properties. we use groebner bases and groebner basicsin rings of solvable type as main tools. in particular, we demonstrate anoptimized algorithm for computing the left inverse of a matrix over a ring ofsolvable type. we illustrate the article with interesting examples. inparticular, we provide a complete solution to the "two pendula, mounted on acart" problem from the classical book of polderman and willems, including thecase, where the friction at the joints is essential . to the best of ourknowledge, the latter example has not been solved before in a complete way.
math.oc cs.sc math.ra
nan
2007-08-15T00:00:00
null
['levandovskyy', 'zerz']
https://arxiv.org/abs/0708.2078
1,205
28
a dichotomy theorem for general minimum cost homomorphism problem
0708.3226
in the constraint satisfaction problem ($csp$), the aim is to find anassignment of values to a set of variables subject to specified constraints. inthe minimum cost homomorphism problem ($minhom$), one is additionally givenweights $c_{va}$ for every variable $v$ and value $a$, and the aim is to findan assignment $f$ to the variables that minimizes $\sum_{v} c_{vf(v)}$. let$minhom(\gamma)$ denote the $minhom$ problem parameterized by the set ofpredicates allowed for constraints. $minhom(\gamma)$ is related to manywell-studied combinatorial optimization problems, and concrete applications canbe found in, for instance, defence logistics and machine learning. we show that$minhom(\gamma)$ can be studied by using algebraic methods similar to thoseused for csps. with the aid of algebraic techniques, we classify thecomputational complexity of $minhom(\gamma)$ for all choices of $\gamma$. ourresult settles a general dichotomy conjecture previously resolved only forcertain classes of directed graphs, [gutin, hell, rafiey, yeo, european j. ofcombinatorics, 2008].
cs.lg cs.cc
nan
2007-08-23T00:00:00
2010-04-04T00:00:00
['takhanov']
https://arxiv.org/abs/0708.3226
1,068
29
bounding the betti numbers and computing the euler-poincar\'e characteristic of semi-algebraic sets defined by partly quadratic systems of polynomials
0708.3522
let $\r$ be a real closed field, $ {\mathcal q} \subset\r[y_1,...,y_\ell,x_1,...,x_k], $ with $ \deg_{y}(q) \leq 2, \deg_{x}(q) \leqd, q \in {\mathcal q}, #({\mathcal q})=m,$ and $ {\mathcal p} \subset\r[x_1,...,x_k] $ with $\deg_{x}(p) \leq d, p \in {\mathcal p}, #({\mathcalp})=s$, and $s \subset \r^{\ell+k}$ a semi-algebraic set defined by a booleanformula without negations, with atoms $p=0, p \geq 0, p \leq 0, p \in {\mathcalp} \cup {\mathcal q}$. we prove that the sum of the betti numbers of $s$ isbounded by \[ \ell^2 (o(s+\ell+m)\ell d)^{k+2m}. \] this is a commongeneralization of previous results on bounding the betti numbers of closedsemi-algebraic sets defined by polynomials of degree $d$ and 2, respectively. we also describe an algorithm for computing the euler-poincar\'echaracteristic of such sets, generalizing similar algorithms known before. thecomplexity of the algorithm is bounded by $(\ell s m d)^{o(m(m+k))}$.
math.ag cs.sc math.at math.gt
10.1137/070711141
2007-08-26T00:00:00
2008-06-24T00:00:00
['basu', 'pasechnik', 'roy']
https://arxiv.org/abs/0708.3522
939
30
convolutional entanglement distillation
0708.3699
we develop a theory of entanglement distillation that exploits aconvolutional coding structure. we provide a method for converting an arbitraryclassical binary or quaternary convolutional code into a convolutionalentanglement distillation protocol. the imported classical convolutional codedoes not have to be dual-containing or self-orthogonal. the yield anderror-correcting properties of such a protocol depend respectively on the rateand error-correcting properties of the imported classical convolutional code. aconvolutional entanglement distillation protocol has several other benefits.two parties sharing noisy ebits can distill noiseless ebits ``online'' as theyacquire more noisy ebits. distillation yield is high and decoding complexity issimple for a convolutional entanglement distillation protocol. our theory ofconvolutional entanglement distillation reduces the problem of finding a goodconvolutional entanglement distillation protocol to the well-establishedproblem of finding a good classical convolutional code.
quant-ph cs.it math.it
10.1109/isit.2010.5513666
2007-08-27T00:00:00
2007-09-19T00:00:00
['wilde', 'krovi', 'brun']
https://arxiv.org/abs/0708.3699
1,029
31
conjugates of characteristic sturmian words generated by morphisms
0708.4387
this article is concerned with characteristic sturmian words of slope$\alpha$ and $1-\alpha$ (denoted by $c_\alpha$ and $c_{1-\alpha}$respectively), where $\alpha \in (0,1)$ is an irrational number such that$\alpha = [0;1+d_1,\bar{d_2,...,d_n}]$ with $d_n \geq d_1 \geq 1$. it is knownthat both $c_\alpha$ and $c_{1-\alpha}$ are fixed points of non-trivial(standard) morphisms $\sigma$ and $\hat{\sigma}$, respectively, if and only if$\alpha$ has a continued fraction expansion as above. accordingly, such words$c_\alpha$ and $c_{1-\alpha}$ are generated by the respective morphisms$\sigma$ and $\hat{\sigma}$. for the particular case when $\alpha =[0;2,\bar{r}]$ ($r\geq1$), we give a decomposition of each conjugate of$c_\alpha$ (and hence $c_{1-\alpha}$) into generalized adjoining singularwords, by considering conjugates of powers of the standard morphism $\sigma$ bywhich it is generated. this extends a recent result of lev\'{e} and s\ee boldon conjugates of the infinite fibonacci word.
math.co cs.dm
10.1016/j.ejc.2003.12.012
2007-08-31T00:00:00
null
['glen']
https://arxiv.org/abs/0708.4387
994
32
occurrences of palindromes in characteristic sturmian words
0708.4389
this paper is concerned with palindromes occurring in characteristic sturmianwords $c_\alpha$ of slope $\alpha$, where $\alpha \in (0,1)$ is an irrational.as $c_\alpha$ is a uniformly recurrent infinite word, any (palindromic) factorof $c_\alpha$ occurs infinitely many times in $c_\alpha$ with bounded gaps. ouraim is to completely describe where palindromes occur in $c_\alpha$. inparticular, given any palindromic factor $u$ of $c_\alpha$, we shall establisha decomposition of $c_\alpha$ with respect to the occurrences of $u$. such adecomposition shows precisely where $u$ occurs in $c_\alpha$, and this isdirectly related to the continued fraction expansion of $\alpha$.
math.co cs.dm
10.1016/j.tcs.2005.09.075
2007-08-31T00:00:00
null
['glen']
https://arxiv.org/abs/0708.4389
675
33
powers in a class of a-strict standard episturmian words
0708.4400
this paper concerns a specific class of strict standard episturmian wordswhose directive words resemble those of characteristic sturmian words. inparticular, we explicitly determine all integer powers occurring in suchinfinite words, extending recent results of damanik and lenz (2003), whostudied powers in sturmian words. the key tools in our analysis are canonicaldecompositions and a generalization of singular words, which were originallydefined for the ubiquitous fibonacci word. our main results are demonstratedvia some examples, including the $k$-bonacci word: a generalization of thefibonacci word to a $k$-letter alphabet ($k\geq2$).
math.co cs.dm
10.1016/j.tcs.2007.03.023
2007-08-31T00:00:00
null
['glen']
https://arxiv.org/abs/0708.4400
644
34
a characterization of fine words over a finite alphabet
0708.4406
to any infinite word w over a finite alphabet a we can associate two infinitewords min(w) and max(w) such that any prefix of min(w) (resp. max(w)) is thelexicographically smallest (resp. greatest) amongst the factors of w of thesame length. we say that an infinite word w over a is "fine" if there exists aninfinite word u such that, for any lexicographic order, min(w) = au where a =min(a). in this paper, we characterize fine words; specifically, we prove thatan infinite word w is fine if and only if w is either a "strict episturmianword" or a strict "skew episturmian word''. this characterization generalizes arecent result of g. pirillo, who proved that a fine word over a 2-letteralphabet is either an (aperiodic) sturmian word, or an ultimately periodic (butnot periodic) infinite word, all of whose factors are (finite) sturmian.
math.co cs.dm
10.1016/j.tcs.2007.10.029
2007-08-31T00:00:00
null
['glen']
https://arxiv.org/abs/0708.4406
839
35
characterizations of finite and infinite episturmian words via lexicographic orderings
0708.4409
in this paper, we characterize by lexicographic order all finite sturmian andepisturmian words, i.e., all (finite) factors of such infinite words.consequently, we obtain a characterization of infinite episturmian words in a"wide sense" (episturmian and episkew infinite words). that is, we characterizethe set of all infinite words whose factors are (finite) episturmian.similarly, we characterize by lexicographic order all balanced infinite wordsover a 2-letter alphabet; in other words, all sturmian and skew infinite words,the factors of which are (finite) sturmian.
math.co cs.dm
10.1016/j.ejc.2007.01.002
2007-08-31T00:00:00
null
['glen', 'justin', 'pirillo']
https://arxiv.org/abs/0708.4409
570
36
a new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation
0709.0961
each node in a wireless multi-hop network can adjust the power level at whichit transmits and thus change the topology of the network to save energy bychoosing the neighbors with which it directly communicates. many previousalgorithms for distributed topology control have assumed an ability at eachnode to deduce some location-based information such as the direction and thedistance of its neighbor nodes with respect to itself. such a deduction oflocation-based information, however, cannot be relied upon in real environmentswhere the path loss exponents vary greatly leading to significant errors indistance estimates. also, multipath effects may result in different signalpaths with different loss characteristics, and none of these paths may beline-of-sight, making it difficult to estimate the direction of a neighboringnode. in this paper, we present step topology control (stc), a simpledistributed topology control algorithm which reduces energy consumption whilepreserving the connectivity of a heterogeneous sensor network without use ofany location-based information. we show that the stc algorithm achieves thesame or better order of communication and computational complexity whencompared to other known algorithms that also preserve connectivity without theuse of location-based information. we also present a detailed simulation-basedcomparative analysis of the energy savings and interference reduction achievedby the algorithms. the results show that, in spite of not incurring a highercommunication or computational complexity, the stc algorithm performs betterthan other algorithms in uniform wireless environments and especially betterwhen path loss characteristics are non-uniform.
cs.ni
nan
2007-09-07T00:00:00
2009-11-13T00:00:00
['sethu', 'gerety']
https://arxiv.org/abs/0709.0961
1,704
37
the graver complexity of integer programming
0709.1500
in this article we establish an exponential lower bound on the gravercomplexity of integer programs. this provides new type of evidence supportingthe presumable intractability of integer programming. specifically, we showthat the graver complexity of the incidence matrix of the complete bipartitegraph $k_{3,m}$ satisfies $g(m)=\omega(2^m)$, with $g(m)\geq 17\cdot 2^{m-3}-7$for every $m>3$ .
math.co cs.cc cs.dm math.ac
nan
2007-09-10T00:00:00
2007-11-22T00:00:00
['berstein', 'onn']
https://arxiv.org/abs/0709.1500
393
38
toward psycho-robots
0709.2065
we try to perform geometrization of psychology by representing mental states,<<ideas>>, by points of a metric space, <<mental space>>. evolution of ideas isdescribed by dynamical systems in metric mental space. we apply the mentalspace approach for modeling of flows of unconscious and conscious informationin the human brain. in a series of models, models 1-4, we consider cognitivesystems with increasing complexity of psychological behavior determined bystructure of flows of ideas. since our models are in fact models of theai-type, one immediately recognizes that they can be used for creation ofai-systems, which we call psycho-robots, exhibiting important elements of humanpsyche. creation of such psycho-robots may be useful improvement of domesticrobots. at the moment domestic robots are merely simple working devices (e.g.vacuum cleaners or lawn mowers) . however, in future one can expect demand insystems which be able not only perform simple work tasks, but would haveelements of human self-developing psyche. such ai-psyche could play animportant role both in relations between psycho-robots and their owners as wellas between psycho-robots. since the presence of a huge numbers ofpsycho-complexes is an essential characteristic of human psychology, it wouldbe interesting to model them in the ai-framework.
cs.ai
10.2478/s13230-010-0014-0
2007-09-13T00:00:00
null
['khrennikov']
https://arxiv.org/abs/0709.2065
1,322
39
algebraic characterization of logically defined tree languages
0709.2962
we give an algebraic characterization of the tree languages that are definedby logical formulas using certain lindstr\"om quantifiers. an importantinstance of our result concerns first-order definable tree languages. ourcharacterization relies on the usage of preclones, an algebraic structureintroduced by the authors in a previous paper, and of the block productoperation on preclones. our results generalize analogous results on finite wordlanguages, but it must be noted that, as they stand, they do not yield analgorithm to decide whether a given regular tree language is first-orderdefinable.
cs.lo math.lo
nan
2007-09-19T00:00:00
2009-01-22T00:00:00
['esik', 'weil']
https://arxiv.org/abs/0709.2962
598
40
the extended edit distance metric
0709.4669
similarity search is an important problem in information retrieval. thissimilarity is based on a distance. symbolic representation of time series hasattracted many researchers recently, since it reduces the dimensionality ofthese high dimensional data objects. we propose a new distance metric that isapplied to symbolic data objects and we test it on time series data bases in aclassification task. we compare it to other distances that are well known inthe literature for symbolic data objects. we also prove, mathematically, thatour distance is metric.
cs.ir
10.1109/cbmi.2008.4564953
2007-09-28T00:00:00
null
['fuad', 'marteau']
https://arxiv.org/abs/0709.4669
555
41
faster least squares approximation
0710.1435
least squares approximation is a technique to find an approximate solution toa system of linear equations that has no exact solution. in a typical setting,one lets $n$ be the number of constraints and $d$ be the number of variables,with $n \gg d$. then, existing exact methods find a solution vector in$o(nd^2)$ time. we present two randomized algorithms that provide very accuraterelative-error approximations to the optimal value and the solution vector of aleast squares approximation problem more rapidly than existing exactalgorithms. both of our algorithms preprocess the data with the randomizedhadamard transform. one then uniformly randomly samples constraints and solvesthe smaller problem on those constraints, and the other performs a sparserandom projection and solves the smaller problem on those projectedcoordinates. in both cases, solving the smaller problem provides relative-errorapproximations, and, if $n$ is sufficiently larger than $d$, the approximatesolution can be computed in $o(nd \log d)$ time.
cs.ds
nan
2007-10-07T00:00:00
2010-09-26T00:00:00
['drineas', 'mahoney', 'muthukrishnan', 'sarlos']
https://arxiv.org/abs/0710.1435
1,023
42
a polynomial bound for untangling geometric planar graphs
0710.1641
to untangle a geometric graph means to move some of the vertices so that theresulting geometric graph has no crossings. pach and tardos [discrete comput.geom., 2002] asked if every n-vertex geometric planar graph can be untangledwhile keeping at least n^\epsilon vertices fixed. we answer this question inthe affirmative with \epsilon=1/4. the previous best known bound was\omega((\log n / \log\log n)^{1/2}). we also consider untangling geometrictrees. it is known that every n-vertex geometric tree can be untangled whilekeeping at least (n/3)^{1/2} vertices fixed, while the best upper bound waso(n\log n)^{2/3}. we answer a question of spillner and wolff [arxiv:0709.01702007] by closing this gap for untangling trees. in particular, we show that forinfinitely many values of n, there is an n-vertex geometric tree that cannot beuntangled while keeping more than 3(n^{1/2}-1) vertices fixed. moreover, weimprove the lower bound to (n/2)^{1/2}.
cs.cg cs.dm math.co
10.1007/s00454-008-9125-3
2007-10-09T00:00:00
2007-11-30T00:00:00
['bose', 'dujmovic', 'hurtado', 'langerman', 'morin', 'wood']
https://arxiv.org/abs/0710.1641
947
43
analyzing covert social network foundation behind terrorism disaster
0710.4231
this paper addresses a method to analyze the covert social network foundationhidden behind the terrorism disaster. it is to solve a node discovery problem,which means to discover a node, which functions relevantly in a social network,but escaped from monitoring on the presence and mutual relationship of nodes.the method aims at integrating the expert investigator's prior understanding,insight on the terrorists' social network nature derived from the complex graphtheory, and computational data processing. the social network responsible forthe 9/11 attack in 2001 is used to execute simulation experiment to evaluatethe performance of the method.
cs.ai
10.1504/ijssci.2009.024936
2007-10-23T00:00:00
null
['maeno', 'ohsawa']
https://arxiv.org/abs/0710.4231
650
44
a multi-level blocking distinct degree factorization algorithm
0710.4410
we give a new algorithm for performing the distinct-degree factorization of apolynomial p(x) over gf(2), using a multi-level blocking strategy. the coarsestlevel of blocking replaces gcd computations by multiplications, as suggested bypollard (1975), von zur gathen and shoup (1992), and others. the novelty of ourapproach is that a finer level of blocking replaces multiplications bysquarings, which speeds up the computation in gf(2)[x]/p(x) of certain intervalpolynomials when p(x) is sparse. as an application we give a fast algorithm tosearch for all irreducible trinomials x^r + x^s + 1 of degree r over gf(2),while producing a certificate that can be checked in less time than the fullsearch. naive algorithms cost o(r^2) per trinomial, thus o(r^3) to search overall trinomials of given degree r. under a plausible assumption about thedistribution of factors of trinomials, the new algorithm has complexity o(r^2(log r)^{3/2}(log log r)^{1/2}) for the search over all trinomials of degree r.our implementation achieves a speedup of greater than a factor of 560 over thenaive algorithm in the case r = 24036583 (a mersenne exponent). using ourprogram, we have found two new primitive trinomials of degree 24036583 overgf(2) (the previous record degree was 6972593).
cs.ds
nan
2007-10-24T00:00:00
null
['brent', 'zimmermann']
https://arxiv.org/abs/0710.4410
1,271
45
a numerical algorithm for zero counting. i: complexity and accuracy
0710.4508
we describe an algorithm to count the number of distinct real zeros of apolynomial (square) system f. the algorithm performs o(n d kappa(f)) iterationswhere n is the number of polynomials (as well as the dimension of the ambientspace), d is a bound on the polynomials' degree, and kappa(f) is a conditionnumber for the system. each iteration uses an exponential number of operations.the algorithm uses finite-precision arithmetic and a polynomial bound for theprecision required to ensure the returned output is correct is exhibited. thisbound is a major feature of our algorithm since it is in contrast with theexponential precision required by the existing (symbolic) algorithms forcounting real zeros. the algorithm parallelizes well in the sense that eachiteration can be computed in parallel polynomial time with an exponentialnumber of processors.
cs.cc cs.na cs.sc math.na
10.1016/j.jco.2008.03.001
2007-10-24T00:00:00
2008-03-19T00:00:00
['cucker', 'krick', 'malajovich', 'wschebor']
https://arxiv.org/abs/0710.4508
853
46
on compositions of numbers and graphs
0710.4965
the main purpose of this note is to pose a couple of problems which areeasily formulated thought some seem to be not yet solved. these problems are ofgeneral interest for discrete mathematics including a new twig of a bough oftheory of graphs i.e. a given graph compositions. the problems result from andare served in the entourage of series of exercises with hints basedpredominantly on the second reference and other related recent papers.
math.co cs.dm
nan
2007-10-25T00:00:00
2010-11-12T00:00:00
['kwasniewski']
https://arxiv.org/abs/0710.4965
441
47
node discovery problem for a social network
0710.4975
methods to solve a node discovery problem for a social network are presented.covert nodes refer to the nodes which are not observable directly. theytransmit the influence and affect the resulting collaborative activities amongthe persons in a social network, but do not appear in the surveillance logswhich record the participants of the collaborative activities. discovering thecovert nodes is identifying the suspicious logs where the covert nodes wouldappear if the covert nodes became overt. the performance of the methods isdemonstrated with a test dataset generated from computationally synthesizednetworks and a real organization.
cs.ai
nan
2007-10-25T00:00:00
2009-08-07T00:00:00
['maeno']
https://arxiv.org/abs/0710.4975
637
48
analog chaos-based secure communications and cryptanalysis: a brief survey
0710.5455
a large number of analog chaos-based secure communication systems have beenproposed since the early 1990s exploiting the technique of chaossynchronization. a brief survey of these chaos-based cryptosystems and ofrelated cryptanalytic results is given. some recently proposed countermeasuresagainst known attacks are also introduced.
nlin.cd cs.cr
nan
2007-10-29T00:00:00
null
['li', 'alvarez', 'li', 'halang']
https://arxiv.org/abs/0710.5455
332
49
cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
0710.5465
chaotic systems have been broadly exploited through the last two decades tobuild encryption methods. recently, two new image encryption schemes have beenproposed, where the encryption process involves a permutation operation and anxor-like transformation of the shuffled pixels, which are controlled by threechaotic systems. this paper discusses some defects of the schemes and how tobreak them with a chosen-plaintext attack.
nlin.cd cs.cr cs.mm
10.1016/j.chaos.2008.09.051
2007-10-29T00:00:00
null
['arroyo', 'li', 'li', 'alvarez', 'halang']
https://arxiv.org/abs/0710.5465
426
50
an interface group for process components
0711.0834
we take a process component as a pair of an interface and a behaviour. westudy the composition of interacting process components in the setting ofprocess algebra. we formalize the interfaces of interacting process componentsby means of an interface group. an interesting feature of the interface groupis that it allows for distinguishing between expectations and promises ininterfaces of process components. this distinction comes into play in casecomponents with both client and server behaviour are involved.
cs.lo
10.3233/fi-2010-254
2007-11-06T00:00:00
2008-12-19T00:00:00
['bergstra', 'middelburg']
https://arxiv.org/abs/0711.0834
510
51
on the operating unit size of load/store architectures
0711.0838
we introduce a strict version of the concept of a load/store instruction setarchitecture in the setting of maurer machines. we take the view thattransformations on the states of a maurer machine are achieved by applyingthreads as considered in thread algebra to the maurer machine. we study how thetransformations on the states of the main memory of a strict load/storeinstruction set architecture that can be achieved by applying threads depend onthe operating unit size, the cardinality of the instruction set, and themaximal number of states of the threads.
cs.ar
10.1017/s0960129509990314
2007-11-06T00:00:00
2008-11-25T00:00:00
['bergstra', 'middelburg']
https://arxiv.org/abs/0711.0838
560
52
a thread calculus with molecular dynamics
0711.0840
we present a theory of threads, interleaving of threads, and interactionbetween threads and services with features of molecular dynamics, a model ofcomputation that bears on computations in which dynamic data structures areinvolved. threads can interact with services of which the states consist ofstructured data objects and computations take place by means of actions whichmay change the structure of the data objects. the features introduced includerestriction of the scope of names used in threads to refer to data objects.because that feature makes it troublesome to provide a model based onstructural operational semantics and bisimulation, we construct a projectivelimit model for the theory.
cs.lo
10.1016/j.ic.2010.01.004
2007-11-06T00:00:00
2008-11-18T00:00:00
['bergstra', 'middelburg']
https://arxiv.org/abs/0711.0840
699
53
predicting relevant empty spots in social interaction
0711.1466
an empty spot refers to an empty hard-to-fill space which can be found in therecords of the social interaction, and is the clue to the persons in theunderlying social network who do not appear in the records. this contributionaddresses a problem to predict relevant empty spots in social interaction.homogeneous and inhomogeneous networks are studied as a model underlying thesocial interaction. a heuristic predictor function approach is presented as anew method to address the problem. simulation experiment is demonstrated over ahomogeneous network. a test data in the form of baskets is generated from thesimulated communication. precision to predict the empty spots is calculated todemonstrate the performance of the presented approach.
cs.ai
nan
2007-11-09T00:00:00
2008-02-21T00:00:00
['maeno', 'ohsawa']
https://arxiv.org/abs/0711.1466
741
54
asymptotic capacity of wireless ad hoc networks with realistic links under a honey comb topology
0711.1605
we consider the effects of rayleigh fading and lognormal shadowing in thephysical interference model for all the successful transmissions of trafficacross the network. new bounds are derived for the capacity of a given randomad hoc wireless network that reflect packet drop or capture probability of thetransmission links. these bounds are based on a simplified network topologytermed as honey-comb topology under a given routing and scheduling scheme.
cs.it math.it
nan
2007-11-10T00:00:00
2010-10-04T00:00:00
['asnani', 'karandikar']
https://arxiv.org/abs/0711.1605
452
55
natural realizations of sparsity matroids
0711.3013
a hypergraph g with n vertices and m hyperedges with d endpoints each is(k,l)-sparse if for all sub-hypergraphs g' on n' vertices and m' edges, m'\lekn'-l. for integers k and l satisfying 0\le l\le dk-1, this is known to be alinearly representable matroidal family. motivated by problems in rigidity theory, we give a new linear representationtheorem for the (k,l)-sparse hypergraphs that is natural; i.e., therepresenting matrix captures the vertex-edge incidence structure of theunderlying hypergraph g.
math.co cs.cg math.ag math.mg
nan
2007-11-19T00:00:00
2010-12-20T00:00:00
['streinu', 'theran']
https://arxiv.org/abs/0711.3013
506
56
an estimation of distribution algorithm with intelligent local search for rule-based nurse rostering
0711.3591
this paper proposes a new memetic evolutionary algorithm to achieve explicitlearning in rule-based nurse rostering, which involves applying a set ofheuristic rules for each nurse's assignment. the main framework of thealgorithm is an estimation of distribution algorithm, in which an ant-minermethodology improves the individual solutions produced in each generation.unlike our previous work (where learning is implicit), the learning in thememetic estimation of distribution algorithm is explicit, i.e. we are able toidentify building blocks directly. the overall approach learns by building aprobabilistic model, i.e. an estimation of the probability distribution ofindividual nurse-rule pairs that are used to construct schedules. the localsearch processor (i.e. the ant-miner) reinforces nurse-rule pairs that receivehigher rewards. a challenging real world nurse rostering problem is used as thetest problem. computational results show that the proposed approach outperformsmost existing approaches. it is suggested that the learning methodologiessuggested in this paper may be applied to other scheduling problems whereschedules are built systematically according to specific rules
cs.ne cs.ce
10.1057/palgrave.jors.2602308
2007-11-22T00:00:00
2008-03-03T00:00:00
['aickelin', 'burke', 'li']
https://arxiv.org/abs/0711.3591
1,187
57
instruction sequences with dynamically instantiated instructions
0711.4217
we study sequential programs that are instruction sequences with dynamicallyinstantiated instructions. we define the meaning of such programs in twodifferent ways. in either case, we give a translation by which each programwith dynamically instantiated instructions is turned into a program withoutthem that exhibits on execution the same behaviour by interaction with someservice. the complexity of the translations differ considerably, whereas theservices concerned are equally simple. however, the service concerned in thecase of the simpler translation is far more powerful than the service concernedin the other case.
cs.pl
10.3233/fi-2009-165
2007-11-27T00:00:00
2009-08-04T00:00:00
['bergstra', 'middelburg']
https://arxiv.org/abs/0711.4217
622
58
evolving localizations in reaction-diffusion cellular automata
0712.0836
we consider hexagonal cellular automata with immediate cell neighbourhood andthree cell-states. every cell calculates its next state depending on theintegral representation of states in its neighbourhood, i.e. how manyneighbours are in each one state. we employ evolutionary algorithms to breedlocal transition functions that support mobile localizations (gliders), andcharacterize sets of the functions selected in terms of quasi-chemical systems.analysis of the set of functions evolved allows to speculate that mobilelocalizations are likely to emerge in the quasi-chemical systems with limiteddiffusion of one reagent, a small number of molecules is required foramplification of travelling localizations, and reactions leading to stationarylocalizations involve relatively equal amount of quasi-chemical species.techniques developed can be applied in cascading signals in nature-inspiredspatially extended computing devices, and phenomenological studies andclassification of non-linear discrete systems.
cs.ai
10.1142/s0129183108012376
2007-12-05T00:00:00
null
['adamatzky', 'bull', 'collet', 'sapin']
https://arxiv.org/abs/0712.0836
1,007
59
reconstruction of markov random fields from samples: some easy observations and algorithms
0712.1402
markov random fields are used to model high dimensional distributions in anumber of applied areas. much recent interest has been devoted to thereconstruction of the dependency structure from independent samples from themarkov random fields. we analyze a simple algorithm for reconstructing theunderlying graph defining a markov random field on $n$ nodes and maximum degree$d$ given observations. we show that under mild non-degeneracy conditions itreconstructs the generating graph with high probability using $\theta(d\epsilon^{-2}\delta^{-4} \log n)$ samples where $\epsilon,\delta$ depend on thelocal interactions. for most local interaction $\eps,\delta$ are of order$\exp(-o(d))$. our results are optimal as a function of $n$ up to a multiplicative constantdepending on $d$ and the strength of the local interactions. our results seemto be the first results for general models that guarantee that {\em the}generating model is reconstructed. furthermore, we provide explicit $o(n^{d+2}\epsilon^{-2}\delta^{-4} \log n)$ running time bound. in cases where themeasure on the graph has correlation decay, the running time is $o(n^2 \log n)$for all fixed $d$. we also discuss the effect of observing noisy samples andshow that as long as the noise level is low, our algorithm is effective. on theother hand, we construct an example where large noise impliesnon-identifiability even for generic noise and interactions. finally, webriefly show that in some simple cases, models with hidden nodes can also berecovered.
cs.cc cs.lg
nan
2007-12-10T00:00:00
2010-03-08T00:00:00
['bresler', 'mossel', 'sly']
https://arxiv.org/abs/0712.1402
1,515
60
two-connected graphs with prescribed three-connected components
0712.1869
we adapt the classical 3-decomposition of any 2-connected graph to the caseof simple graphs (no loops or multiple edges). by analogy with theblock-cutpoint tree of a connected graph, we deduce from this decomposition abicolored tree tc(g) associated with any 2-connected graph g, whose whitevertices are the 3-components of g (3-connected components or polygons) andwhose black vertices are bonds linking together these 3-components, arisingfrom separating pairs of vertices of g. two fundamental relationships on graphsand networks follow from this construction. the first one is a dissymmetrytheorem which leads to the expression of the class b=b(f) of 2-connectedgraphs, all of whose 3-connected components belong to a given class f of3-connected graphs, in terms of various rootings of b. the second one is afunctional equation which characterizes the corresponding class r=r(f) oftwo-pole networks all of whose 3-connected components are in f. all therootings of b are then expressed in terms of f and r. there followcorresponding identities for all the associated series, in particular the edgeindex series. numerous enumerative consequences are discussed.
math.co cs.dm
10.1016/j.aam.2009.01.002
2007-12-12T00:00:00
2008-01-21T00:00:00
['gagarin', 'labelle', 'leroux', 'walsh']
https://arxiv.org/abs/0712.1869
1,162
61
entanglement-assisted quantum convolutional coding
0712.2223
we show how to protect a stream of quantum information from decoherenceinduced by a noisy quantum communication channel. we exploit presharedentanglement and a convolutional coding structure to develop a theory ofentanglement-assisted quantum convolutional coding. our construction produces acalderbank-shor-steane (css) entanglement-assisted quantum convolutional codefrom two arbitrary classical binary convolutional codes. the rate anderror-correcting properties of the classical convolutional codes directlydetermine the corresponding properties of the resulting entanglement-assistedquantum convolutional code. we explain how to encode our cssentanglement-assisted quantum convolutional codes starting from a stream ofinformation qubits, ancilla qubits, and shared entangled bits.
quant-ph cs.it math.it
10.1103/physreva.81.042333
2007-12-13T00:00:00
2010-04-02T00:00:00
['wilde', 'brun']
https://arxiv.org/abs/0712.2223
785
62
distinguishing short quantum computations
0712.2595
distinguishing logarithmic depth quantum circuits on mixed states is shown tobe complete for qip, the class of problems having quantum interactive proofsystems. circuits in this model can represent arbitrary quantum processes, andthus this result has implications for the verification of implementations ofquantum algorithms. the distinguishability problem is also complete for qip onconstant depth circuits containing the unbounded fan-out gate. these resultsare shown by reducing a qip-complete problem to a logarithmic depth version ofitself using a parallelization technique.
quant-ph cs.cc
10.4230/lipics.stacs.2008.1322
2007-12-16T00:00:00
null
['rosgen']
https://arxiv.org/abs/0712.2595
579
63
algorithmic permutation of part of the torah
0712.2606
a small part of the torah is arranged into a two dimensional array. thecharacters are then permuted using a simple recursive deterministic algorithm.the various permutations are then passed through three stochastic filters andone deterministic filter to identify the permutations which most closelyapproximate readable biblical hebrew. of the 15 billion sequences available atthe second level of recursion, 800 pass the a priori thresholds set for eachfilter. the resulting "biblical hebrew" text is available for inspection andthe generation of further material continues.
cs.cr
nan
2007-12-16T00:00:00
2010-10-19T00:00:00
['croll']
https://arxiv.org/abs/0712.2606
573
64
on the monotonicity of the generalized marcum and nuttall q-functions
0712.4103
monotonicity criteria are established for the generalized marcum q-function,$\emph{q}_{m}$, the standard nuttall q-function, $\emph{q}_{m,n}$, and thenormalized nuttall q-function, $\mathcal{q}_{m,n}$, with respect to their realorder indices m,n. besides, closed-form expressions are derived for thecomputation of the standard and normalized nuttall q-functions for the casewhen m,n are odd multiples of 0.5 and $m\geq n$. by exploiting these results,novel upper and lower bounds for $\emph{q}_{m,n}$ and $\mathcal{q}_{m,n}$ areproposed. furthermore, specific tight upper and lower bounds for$\emph{q}_{m}$, previously reported in the literature, are extended for realvalues of m. the offered theoretical results can be efficiently applied in thestudy of digital communications over fading channels, in theinformation-theoretic analysis of multiple-input multiple-output systems and inthe description of stochastic processes in probability theory, among others.
cs.it math.it
10.1109/tit.2009.2023710
2007-12-26T00:00:00
2010-01-23T00:00:00
['kapinas', 'mihos', 'karagiannidis']
https://arxiv.org/abs/0712.4103
961
65
on the maximum span of fixed-angle chains
0801.0258
soss proved that it is np-hard to find the maximum 2d span of a fixed-anglepolygonal chain: the largest distance achievable between the endpoints in aplanar embedding. these fixed-angle chains can serve as models of proteinbackbones. the corresponding problem in 3d is open. we show that three specialcases of particular relevance to the protein model are solvable in polynomialtime. when all link lengths and all angles are equal, the maximum 3d span isachieved in a flat configuration and can be computed in constant time. when allangles are equal and the chain is simple (non-self-crossing), the maximum flatspan can be found in linear time. in 3d, when all angles are equal to 90 deg(but the link lengths arbitrary), the maximum 3d span is in general nonplanarbut can be found in quadratic time.
cs.cg
nan
2007-12-31T00:00:00
2010-06-02T00:00:00
['benbernou', "o'rourke"]
https://arxiv.org/abs/0801.0258
799
66
episturmian words: a survey
0801.1655
in this paper, we survey the rich theory of infinite episturmian words whichgeneralize to any finite alphabet, in a rather resembling way, the well-knownfamily of sturmian words on two letters. after recalling definitions and basicproperties, we consider episturmian morphisms that allow for a deeper study ofthese words. some properties of factors are described, including factorcomplexity, palindromes, fractional powers, frequencies, and return words. wealso consider lexicographical properties of episturmian words, as well as theirconnection to the balance property, and related notions such as finiteepisturmian words, arnoux-rauzy sequences, and "episkew words" that generalizethe skew words of morse and hedlund.
math.co cs.dm
10.1051/ita/2009003
2008-01-10T00:00:00
2008-09-17T00:00:00
['glen', 'justin']
https://arxiv.org/abs/0801.1655
720
67
palindromic richness
0801.1656
in this paper, we study combinatorial and structural properties of a newclass of finite and infinite words that are 'rich' in palindromes in the utmostsense. a characteristic property of so-called "rich words" is that all completereturns to any palindromic factor are themselves palindromes. these wordsencompass the well-known episturmian words, originally introduced by the secondauthor together with x. droubay and g. pirillo in 2001. other examples of richwords have appeared in many different contexts. here we present the firstunified approach to the study of this intriguing family of words. amongst our main results, we give an explicit description of the periodicrich infinite words and show that the recurrent balanced rich infinite wordscoincide with the balanced episturmian words. we also consider two widerclasses of infinite words, namely "weakly rich words" and almost rich words(both strictly contain all rich words, but neither one is contained in theother). in particular, we classify all recurrent balanced weakly rich words. asa consequence, we show that any such word on at least three letters isnecessarily episturmian; hence weakly rich words obey fraenkel's conjecture.likewise, we prove that a certain class of almost rich words obeys fraenkel'sconjecture by showing that the recurrent balanced ones are episturmian orcontain at least two distinct letters with the same frequency. lastly, we study the action of morphisms on (almost) rich words withparticular interest in morphisms that preserve (almost) richness. suchmorphisms belong to the class of "p-morphisms" that was introduced by a. hof,o. knill, and b. simon in 1995.
math.co cs.dm
10.1016/j.ejc.2008.04.006
2008-01-10T00:00:00
2008-04-11T00:00:00
['glen', 'justin', 'widmer', 'zamboni']
https://arxiv.org/abs/0801.1656
1,655
68
computational approach to the emergence and evolution of language - evolutionary naming game model
0801.1658
computational modelling with multi-agent systems is becoming an importanttechnique of studying language evolution. we present a brief introduction intothis rapidly developing field, as well as our own contributions that include ananalysis of the evolutionary naming-game model. in this model communicatingagents, that try to establish a common vocabulary, are equipped with anevolutionarily selected learning ability. such a coupling of biological andlinguistic ingredients results in an abrupt transition: upon a small change ofthe model control parameter a poorly communicating group of linguisticallyunskilled agents transforms into almost perfectly communicating group withlarge learning abilities. genetic imprinting of the learning abilities proceedsvia baldwin effect: initially unskilled communicating agents learn a languageand that creates a niche in which there is an evolutionary pressure for theincrease of learning ability. under the assumption that communication intensityincreases continuously with finite speed, the transition is split into severaltransition-like changes. it shows that the speed of cultural changes, that setsan additional characteristic timescale, might be yet another factor affectingthe evolution of language. in our opinion, this model shows that linguistic andbiological processes have a strong influence on each other and this effectcertainly has contributed to an explosive development of our species.
physics.soc-ph cs.cl cs.ma
nan
2008-01-10T00:00:00
2010-08-21T00:00:00
['lipowski', 'lipowska']
https://arxiv.org/abs/0801.1658
1,443
69
an algorithm for road coloring
0801.2838
a coloring of edges of a finite directed graph turns the graph intofinite-state automaton. the synchronizing word of a deterministic automaton isa word in the alphabet of colors (considered as letters) of its edges that mapsthe automaton to a single state. a coloring of edges of a directed graph ofuniform outdegree (constant outdegree of any vertex) is synchronizing if thecoloring turns the graph into a deterministic finite automaton possessing asynchronizing word. the road coloring problem is the problem of synchronizingcoloring of a directed finite strongly connected graph of uniform outdegree ifthe greatest common divisor of the lengths of all its cycles is one. theproblem posed in 1970 had evoked a noticeable interest among the specialists inthe theory of graphs, automata, codes, symbolic dynamics as well as among thewide mathematical community. a polynomial time algorithm of $o(n^3)$ complexityin the most worst case and quadratic in majority of studied cases for the roadcoloring of the considered graph is presented below. the work is based onrecent positive solution of the road coloring problem. the algorithm wasimplemented in the package testas
cs.dm
nan
2008-01-18T00:00:00
2010-11-23T00:00:00
['trahtman']
https://arxiv.org/abs/0801.2838
1,168
70
a pyramidal evolutionary algorithm with different inter-agent partnering strategies for scheduling problems
0801.3209
this paper combines the idea of a hierarchical distributed genetic algorithmwith different inter-agent partnering strategies. cascading clusters ofsub-populations are built from bottom up, with higher-level sub-populationsoptimising larger parts of the problem. hence higher-level sub-populationssearch a larger search space with a lower resolution whilst lower-levelsub-populations search a smaller search space with a higher resolution. theeffects of different partner selection schemes amongst the agents on solutionquality are examined for two multiple-choice optimisation problems. it is shownthat partnering strategies that exploit problem-specific knowledge are superiorand can counter inappropriate (sub-) fitness measurements.
cs.ne cs.ce
nan
2008-01-21T00:00:00
2008-03-03T00:00:00
['aickelin']
https://arxiv.org/abs/0801.3209
735
71
on the effects of idiotypic interactions for recommendation communities in artificial immune systems
0801.3539
it has previously been shown that a recommender based on immune systemidiotypic principles can out perform one based on correlation alone. this paperreports the results of work in progress, where we undertake some investigationsinto the nature of this beneficial effect. the initial findings are that theimmune system recommender tends to produce different neighbourhoods, and thatthe superior performance of this recommender is due partly to the differentneighbourhoods, and partly to the way that the idiotypic effect is used toweight each neighbours recommendations.
cs.ne cs.ai
nan
2008-01-23T00:00:00
2008-05-16T00:00:00
['cayzer', 'aickelin']
https://arxiv.org/abs/0801.3539
569
72
a recommender system based on the immune network
0801.3547
the immune system is a complex biological system with a highly distributed,adaptive and self-organising nature. this paper presents an artificial immunesystem (ais) that exploits some of these characteristics and is applied to thetask of film recommendation by collaborative filtering (cf). natural evolutionand in particular the immune system have not been designed for classicaloptimisation. however, for this problem, we are not interested in finding asingle optimum. rather we intend to identify a sub-set of good matches on whichrecommendations can be based. it is our hypothesis that an ais built on twocentral aspects of the biological immune system will be an ideal candidate toachieve this: antigen - antibody interaction for matching and antibody -antibody interaction for diversity. computational results are presented insupport of this conjecture and compared to those found by other cf techniques.
cs.ne cs.ai
nan
2008-01-23T00:00:00
2008-03-03T00:00:00
['cazyer', 'aickelin']
https://arxiv.org/abs/0801.3547
910
73
the danger theory and its application to artificial immune systems
0801.3549
over the last decade, a new idea challenging the classical self-non-selfviewpoint has become popular amongst immunologists. it is called the dangertheory. in this conceptual paper, we look at this theory from the perspectiveof artificial immune system practitioners. an overview of the danger theory ispresented with particular emphasis on analogies in the artificial immunesystems world. a number of potential application areas are then used to providea framing for a critical assessment of the concept, and its relevance forartificial immune systems.
cs.ne cs.ai cs.cr
nan
2008-01-23T00:00:00
2008-05-16T00:00:00
['aickelin', 'cayzer']
https://arxiv.org/abs/0801.3549
552
74
partnering strategies for fitness evaluation in a pyramidal evolutionary algorithm
0801.3550
this paper combines the idea of a hierarchical distributed genetic algorithmwith different inter-agent partnering strategies. cascading clusters ofsub-populations are built from bottom up, with higher-level sub-populationsoptimising larger parts of the problem. hence higher-level sub-populationssearch a larger search space with a lower resolution whilst lower-levelsub-populations search a smaller search space with a higher resolution. theeffects of different partner selection schemes for (sub-)fitness evaluationpurposes are examined for two multiple-choice optimisation problems. it isshown that random partnering strategies perform best by providing bettersampling and more diversity.
cs.ne cs.ai
nan
2008-01-23T00:00:00
2008-03-03T00:00:00
['aickelin', 'bull']
https://arxiv.org/abs/0801.3550
691
75
on minimality of convolutional ring encoders
0801.3703
convolutional codes are considered with code sequences modelled assemi-infinite laurent series. it is wellknown that a convolutional code c overa finite group g has a minimal trellis representation that can be derived fromcode sequences. it is also wellknown that, for the case that g is a finitefield, any polynomial encoder of c can be algebraically manipulated to yield aminimal polynomial encoder whose controller canonical realization is a minimaltrellis. in this paper we seek to extend this result to the finite ring case g= z_{p^r} by introducing a socalled "p-encoder". we show how to manipulate apolynomial encoding of a noncatastrophic convolutional code over z_{p^r} toproduce a particular type of p-encoder ("minimal p-encoder") whose controllercanonical realization is a minimal trellis with nonlinear features. the minimumnumber of trellis states is then expressed as p^gamma, where gamma is the sumof the row degrees of the minimal p-encoder. in particular, we show that anyconvolutional code over z_{p^r} admits a delay-free p-encoder which implies thenovel result that delay-freeness is not a property of the code but of theencoder, just as in the field case. we conjecture that a similar result holdswith respect to catastrophicity, i.e., any catastrophic convolutional code overz_{p^r} admits a noncatastrophic p-encoder.
cs.it math.it
nan
2008-01-24T00:00:00
2009-04-14T00:00:00
['kuijper', 'pinto']
https://arxiv.org/abs/0801.3703
1,341
76
a bayesian optimisation algorithm for the nurse scheduling problem
0801.3971
a bayesian optimization algorithm for the nurse scheduling problem ispresented, which involves choosing a suitable scheduling rule from a set foreach nurses assignment. unlike our previous work that used gas to implementimplicit learning, the learning in the proposed algorithm is explicit, ie.eventually, we will be able to identify and mix building blocks directly. thebayesian optimization algorithm is applied to implement such explicit learningby building a bayesian network of the joint distribution of solutions. theconditional probability of each variable in the network is computed accordingto an initial set of promising solutions. subsequently, each new instance foreach variable is generated, ie in our case, a new rule string has beenobtained. another set of rule strings will be generated in this way, some ofwhich will replace previous strings based on fitness selection. if stoppingconditions are not met, the conditional probabilities for all nodes in thebayesian network are updated again using the current set of promising rulestrings. computational results from 52 real data instances demonstrate thesuccess of this approach. it is also suggested that the learning mechanism inthe proposed approach might be suitable for other scheduling problems.
cs.ne cs.ce
nan
2008-01-25T00:00:00
2008-05-16T00:00:00
['li', 'aickelin']
https://arxiv.org/abs/0801.3971
1,267
77
strategic alert throttling for intrusion detection systems
0801.4119
network intrusion detection systems are themselves becoming targets ofattackers. alert flood attacks may be used to conceal malicious activity byhiding it among a deluge of false alerts sent by the attacker. although thesetypes of attacks are very hard to stop completely, our aim is to presenttechniques that improve alert throughput and capacity to such an extent thatthe resources required to successfully mount the attack become prohibitive. thekey idea presented is to combine a token bucket filter with a realtimecorrelation algorithm. the proposed algorithm throttles alert output from theids when an attack is detected. the attack graph used in the correlationalgorithm is used to make sure that alerts crucial to forming strategies arenot discarded by throttling.
cs.ne cs.cr
nan
2008-01-28T00:00:00
2008-05-16T00:00:00
['tedesco', 'aickelin']
https://arxiv.org/abs/0801.4119
772
78
movie recommendation systems using an artificial immune system
0801.4287
we apply the artificial immune system (ais) technology to the collaborativefiltering (cf) technology when we build the movie recommendation system. twodifferent affinity measure algorithms of ais, kendall tau and weighted kappa,are used to calculate the correlation coefficients for this movierecommendation system. from the testing we think that weighted kappa is moresuitable than kendall tau for movie problems.
cs.ne cs.ai
nan
2008-01-28T00:00:00
2008-03-03T00:00:00
['chen', 'aickelin']
https://arxiv.org/abs/0801.4287
414
79
investigating artificial immune systems for job shop rescheduling in changing environments
0801.4312
artificial immune system can be used to generate schedules in changingenvironments and it has been proven to be more robust than schedules developedusing a genetic algorithm. good schedules can be produced especially when thenumber of the antigens is increased. however, an increase in the range of theantigens had somehow affected the fitness of the immune system. in thisresearch, we are trying to improve the result of the system by rescheduling thesame problem using the same method while at the same time maintaining therobustness of the schedules.
cs.ne cs.ce
nan
2008-01-28T00:00:00
2008-05-16T00:00:00
['aickelin', 'burke', 'din']
https://arxiv.org/abs/0801.4312
553
80
artificial immune systems (ais) - a new paradigm for heuristic decision making
0801.4314
over the last few years, more and more heuristic decision making techniqueshave been inspired by nature, e.g. evolutionary algorithms, ant colonyoptimisation and simulated annealing. more recently, a novel computationalintelligence technique inspired by immunology has emerged, called artificialimmune systems (ais). this immune system inspired technique has already beenuseful in solving some computational problems. in this keynote, we will verybriefly describe the immune system metaphors that are relevant to ais. we willthen give some illustrative real-world problems suitable for ais use and show astep-by-step algorithm walkthrough. a comparison of ais to other well-knownalgorithms and areas for future work will round this keynote off. it should benoted that as ais is still a young and evolving field, there is not yet a fixedalgorithm template and hence actual implementations might differ somewhat fromthe examples given here.
cs.ne cs.ai
nan
2008-01-28T00:00:00
2008-05-16T00:00:00
['aickelin']
https://arxiv.org/abs/0801.4314
938
81
mimo networks: the effects of interference
0802.0738
multiple-input/multiple-output (mimo) systems promise enormous capacityincrease and are being considered as one of the key technologies for futurewireless networks. however, the decrease in capacity due to the presence ofinterferers in mimo networks is not well understood. in this paper, we developan analytical framework to characterize the capacity of mimo communicationsystems in the presence of multiple mimo co-channel interferers and noise. weconsider the situation in which transmitters have no information about thechannel and all links undergo rayleigh fading. we first generalize the knowndeterminant representation of hypergeometric functions with matrix arguments tothe case when the argument matrices have eigenvalues of arbitrary multiplicity.this enables the derivation of the distribution of the eigenvalues of gaussianquadratic forms and wishart matrices with arbitrary correlation, withapplication to both single user and multiuser mimo systems. in particular, wederive the ergodic mutual information for mimo systems in the presence ofmultiple mimo interferers. our analysis is valid for any number of interferers,each with arbitrary number of antennas having possibly unequal power levels.this framework, therefore, accommodates the study of distributed mimo systemsand accounts for different positions of the mimo interferers.
cs.it math.it
10.1109/tit.2009.2034810
2008-02-05T00:00:00
2009-10-08T00:00:00
['chiani', 'win', 'shin']
https://arxiv.org/abs/0802.0738
1,348
82
doubly-generalized ldpc codes: stability bound over the bec
0802.0823
the iterative decoding threshold of low-density parity-check (ldpc) codesover the binary erasure channel (bec) fulfills an upper bound depending only onthe variable and check nodes with minimum distance 2. this bound is aconsequence of the stability condition, and is here referred to as stabilitybound. in this paper, a stability bound over the bec is developed fordoubly-generalized ldpc codes, where the variable and the check nodes can begeneric linear block codes, assuming maximum a posteriori erasure correction ateach node. it is proved that in this generalized context as well the bounddepends only on the variable and check component codes with minimum distance 2.a condition is also developed, namely the derivative matching condition, underwhich the bound is achieved with equality.
cs.it math.it
10.1109/tit.2008.2011446
2008-02-06T00:00:00
null
['paolini', 'fossorier', 'chiani']
https://arxiv.org/abs/0802.0823
794
83
a connection between palindromic and factor complexity using return words
0802.1332
in this paper we prove that for any infinite word w whose set of factors isclosed under reversal, the following conditions are equivalent: (i) all complete returns to palindromes are palindromes; (ii) p(n) + p(n+1) = c(n+1) - c(n) + 2 for all n, where p (resp. c) denotesthe palindromic complexity (resp. factor complexity) function of w, whichcounts the number of distinct palindromic factors (resp. factors) of eachlength in w.
math.co cs.dm
10.1016/j.aam.2008.03.005
2008-02-10T00:00:00
2008-04-11T00:00:00
['bucci', 'de luca', 'glen', 'zamboni']
https://arxiv.org/abs/0802.1332
431
84
new type stirling like numbers - an email style letter
0802.1382
the notion of the fibonacci cobweb poset from [1] has been naturally extendedto any admissible sequence $f$ in [2] where it was also recognized that thecelebrated prefab notion of bender and goldman [3] - (see also [4,5]) - admitssuch an extension so as to encompass the new type combinatorial objects from[2] as leading examples. recently the present author had introduced also [6]two natural partial orders in there: one $\leq$ in grading-natural subsets ofcobweb`s prefabs sets [2] and in the second proposal one endows the set sums ofthe so called "prefabiants" with such another partial order that one arrives atbell-like numbers including fibonacci triad sequences introduced by the presentauthor in [7]. here we quote the basic observations concerning the new typestirling like numbers as they appear in [6]. for more on notation, stirlinglike numbers of the first kind and for proofs - see [6].
math.co cs.dm
nan
2008-02-11T00:00:00
null
['kwasniewski']
https://arxiv.org/abs/0802.1382
902
85
exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
0802.2001
there is considerable interest in the use of genetic algorithms to solveproblems arising in the areas of scheduling and timetabling. however, theclassical genetic algorithm paradigm is not well equipped to handle theconflict between objectives and constraints that typically occurs in suchproblems. in order to overcome this, successful implementations frequently makeuse of problem specific knowledge. this paper is concerned with the developmentof a ga for a nurse rostering problem at a major uk hospital. the structure ofthe constraints is used as the basis for a co-evolutionary strategy usingco-operating sub-populations. problem specific knowledge is also used to definea system of incentives and disincentives, and a complementary mutationoperator. empirical results based on 52 weeks of live data show how thesefeatures are able to improve an unsuccessful canonical ga to the point where itis able to provide a practical solution to the problem
cs.ne cs.ce
10.1002/(sici)1099-1425(200005/06)3:3<139::aid-jos41>3.0.co;2-2
2008-02-14T00:00:00
2008-05-16T00:00:00
['aickelin', 'dowsland']
https://arxiv.org/abs/0802.2001
953
86
well-centered triangulation
0802.2108
meshes composed of well-centered simplices have nice orthogonal dual meshes(the dual voronoi diagram). this is useful for certain numerical algorithmsthat prefer such primal-dual mesh pairs. we prove that well-centered meshesalso have optimality properties and relationships to delaunay and minmax angletriangulations. we present an iterative algorithm that seeks to transform agiven triangulation in two or three dimensions into a well-centered one byminimizing a cost function and moving the interior vertices while keeping themesh connectivity and boundary vertices fixed. the cost function is a directresult of a new characterization of well-centeredness in arbitrary dimensionsthat we present. ours is the first optimization-based heuristic forwell-centeredness, and the first one that applies in both two and threedimensions. we show the results of applying our algorithm to small and largetwo-dimensional meshes, some with a complex boundary, and obtain awell-centered tetrahedralization of the cube. we also show numerical evidencethat our algorithm preserves gradation and that it improves the maximum andminimum angles of acute triangulations created by the best known previousmethod.
cs.cg cs.na
10.1137/090748214
2008-02-14T00:00:00
2009-08-18T00:00:00
['vanderzee', 'hirani', 'guoy', 'ramos']
https://arxiv.org/abs/0802.2108
1,194
87
essential variables and positions in terms
0802.2385
the paper deals with $\sigma-$composition of terms, which allows us to extendthe derivation rules in formal deduction of identities. the concept of essential variables and essential positions of terms withrespect to a set of identities is a key step in the simplification of theprocess of formal deduction. $\sigma-$composition of terms is defined asreplacement between $\sigma$-equal terms. this composition induces $\sigmar-$deductively closed sets of identities. in analogy to balanced identities weintroduce and investigate $\sigma-$balanced identities for a given set ofidentities $\sigma$.
math.gm cs.it math.it
nan
2008-02-17T00:00:00
2010-01-19T00:00:00
['shtrakov']
https://arxiv.org/abs/0802.2385
596
88
fixed point and aperiodic tilings
0802.2432
an aperiodic tile set was first constructed by r.berger while proving theundecidability of the domino problem. it turned out that aperiodic tile setsappear in many topics ranging from logic (the entscheidungsproblem) to physics(quasicrystals) we present a new construction of an aperiodic tile set that isbased on kleene's fixed-point construction instead of geometric arguments. thisconstruction is similar to j. von neumann self-reproducing automata; similarideas were also used by p. gacs in the context of error-correctingcomputations. the flexibility of this construction allows us to construct a"robust" aperiodic tile set that does not have periodic (or close to periodic)tilings even if we allow some (sparse enough) tiling errors. this property wasnot known for any of the existing aperiodic tile sets.
cs.cc cs.dm
10.1007/978-3-540-85780-8_22
2008-02-18T00:00:00
2010-01-27T00:00:00
['durand', 'romashchenko', 'shen']
https://arxiv.org/abs/0802.2432
811
89
capacity of general discrete noiseless channels
0802.2451
this paper concerns the capacity of the discrete noiseless channel introducedby shannon. a sufficient condition is given for the capacity to bewell-defined. for a general discrete noiseless channel allowing non-integervalued symbol weights, it is shown that the capacity--if well-defined--can bedetermined from the radius of convergence of its generating function, from thesmallest positive pole of its generating function, or from the rightmost realsingularity of its complex generating function. a generalisation is given forpringsheim's theorem and for the exponential growth formula to generatingfunctions of combinatorial structures with non-integer valued symbol weights.
cs.it math.it
nan
2008-02-18T00:00:00
2010-06-10T00:00:00
['bocherer', 'junior', 'pimentel']
https://arxiv.org/abs/0802.2451
677
90
pure exploration for multi-armed bandit problems
0802.2655
we consider the framework of stochastic multi-armed bandit problems and studythe possibilities and limitations of forecasters that perform an on-lineexploration of the arms. these forecasters are assessed in terms of theirsimple regret, a regret notion that captures the fact that exploration is onlyconstrained by the number of available rounds (not necessarily known inadvance), in contrast to the case when the cumulative regret is considered andwhen exploitation needs to be performed at the same time. we believe that thisperformance criterion is suited to situations when the cost of pulling an armis expressed in terms of resources rather than rewards. we discuss the linksbetween the simple and the cumulative regret. one of the main results in thecase of a finite number of arms is a general lower bound on the simple regretof a forecaster in terms of its cumulative regret: the smaller the latter, thelarger the former. keeping this result in mind, we then exhibit upper bounds onthe simple regret of some forecasters. the paper ends with a study devoted tocontinuous-armed bandit problems; we show that the simple regret can beminimized with respect to a family of probability distributions if and only ifthe cumulative regret can be minimized for it. based on this equivalence, weare able to prove that the separable metric spaces are exactly the metricspaces on which these regrets can be minimized with respect to the family ofall probability distributions with continuous mean-payoff functions.
math.st cs.lg stat.th
nan
2008-02-19T00:00:00
2010-06-09T00:00:00
['bubeck', 'munos', 'stoltz']
https://arxiv.org/abs/0802.2655
1,509
91
wavelet and curvelet moments for image classification: application to aggregate mixture grading
0802.3528
we show the potential for classifying images of mixtures of aggregate, basedthemselves on varying, albeit well-defined, sizes and shapes, in order toprovide a far more effective approach compared to the classification ofindividual sizes and shapes. while a dominant (additive, stationary) gaussiannoise component in image data will ensure that wavelet coefficients are ofgaussian distribution, long tailed distributions (symptomatic, for example, ofextreme values) may well hold in practice for wavelet coefficients. energy (2ndorder moment) has often been used for image characterization for imagecontent-based retrieval, and higher order moments may be important also, notleast for capturing long tailed distributional behavior. in this work, weassess 2nd, 3rd and 4th order moments of multiresolution transform -- waveletand curvelet transform -- coefficients as features. as analysis methodology,taking account of image types, multiresolution transforms, and moments ofcoefficients in the scales or bands, we use correspondence analysis as well ask-nearest neighbors supervised classification.
cs.cv
nan
2008-02-24T00:00:00
null
['murtagh', 'starck']
https://arxiv.org/abs/0802.3528
1,097
92
are complex systems hard to evolve?
0802.3875
evolutionary complexity is here measured by the number of trials/evaluationsneeded for evolving a logical gate in a non-linear medium. behaviouralcomplexity of the gates evolved is characterised in terms of cellular automatabehaviour. we speculate that hierarchies of behavioural and evolutionarycomplexities are isomorphic up to some degree, subject to substrate specificityof evolution and the spectrum of evolution parameters.
cs.ne
10.1002/cplx.20269
2008-02-26T00:00:00
null
['adamatzky', 'bull']
https://arxiv.org/abs/0802.3875
429
93
rich, sturmian, and trapezoidal words
0802.3885
in this paper we explore various interconnections between rich words,sturmian words, and trapezoidal words. rich words, first introduced inarxiv:0801.1656 by the second and third authors together with j. justin and s.widmer, constitute a new class of finite and infinite words characterized byhaving the maximal number of palindromic factors. every finite sturmian word isrich, but not conversely. trapezoidal words were first introduced by the firstauthor in studying the behavior of the subword complexity of finite sturmianwords. unfortunately this property does not characterize finite sturmian words.in this note we show that the only trapezoidal palindromes are sturmian. moregenerally we show that sturmian palindromes can be characterized either interms of their subword complexity (the trapezoidal property) or in terms oftheir palindromic complexity. we also obtain a similar characterization of richpalindromes in terms of a relation between palindromic complexity and subwordcomplexity.
math.co cs.dm
10.1016/j.tcs.2008.06.009
2008-02-26T00:00:00
null
['de luca', 'glen', 'zamboni']
https://arxiv.org/abs/0802.3885
998
94
directive words of episturmian words: equivalences and normalization
0802.3888
episturmian morphisms constitute a powerful tool to study episturmian words.indeed, any episturmian word can be infinitely decomposed over the set of pureepisturmian morphisms. thus, an episturmian word can be defined by one of itsmorphic decompositions or, equivalently, by a certain directive word. here wecharacterize pairs of words directing a common episturmian word. we alsopropose a way to uniquely define any episturmian word through a normalizationof its directive words. as a consequence of these results, we characterizeepisturmian words having a unique directive word.
cs.dm math.co
10.1051/ita:2008029
2008-02-26T00:00:00
null
['glen', 'levé', 'richomme']
https://arxiv.org/abs/0802.3888
580
95
sensing danger: innate immunology for intrusion detection
0802.4002
the immune system provides an ideal metaphor for anomaly detection in generaland computer security in particular. based on this idea, artificial immunesystems have been used for a number of years for intrusion detection,unfortunately so far with little success. however, these previous systems werelargely based on immunological theory from the 1970s and 1980s and over thelast decade our understanding of immunological processes has vastly improved.in this paper we present two new immune inspired algorithms based on the latestimmunological discoveries, such as the behaviour of dendritic cells. theresultant algorithms are applied to real world intrusion problems and showencouraging results. overall, we believe there is a bright future for thesenext generation artificial immune algorithms.
cs.ne cs.cr
10.1016/j.istr.2007.10.003
2008-02-27T00:00:00
2008-05-16T00:00:00
['aickelin', 'greensmith']
https://arxiv.org/abs/0802.4002
795
96
safety alternating automata on data words
0802.4237
a data word is a sequence of pairs of a letter from a finite alphabet and anelement from an infinite set, where the latter can only be compared forequality. safety one-way alternating automata with one register on infinitedata words are considered, their nonemptiness is shown expspace-complete, andtheir inclusion decidable but not primitive recursive. the same complexitybounds are obtained for satisfiability and refinement, respectively, for thesafety fragment of linear temporal logic with freeze quantification. droppingthe safety restriction, adding past temporal operators, or adding one moreregister, each causes undecidability.
cs.lo
nan
2008-02-28T00:00:00
2010-04-09T00:00:00
['lazic']
https://arxiv.org/abs/0802.4237
637
97
polynomial time algorithms for bi-criteria, multi-objective and ratio problems in clustering and imaging. part i: normalized cut and ratio regions
0803.0146
partitioning and grouping of similar objects plays a fundamental role inimage segmentation and in clustering problems. in such problems a typical goalis to group together similar objects, or pixels in the case of imageprocessing. at the same time another goal is to have each group distinctlydissimilar from the rest and possibly to have the group size fairly large.these goals are often combined as a ratio optimization problem. one example ofsuch problem is the normalized cut problem, another is the ratio regionsproblem. we devise here the first polynomial time algorithms solving theseproblems optimally. the algorithms are efficient and combinatorial. thiscontrasts with the heuristic approaches used in the image segmentationliterature that formulate those problems as nonlinear optimization problems,which are then relaxed and solved with spectral techniques in real numbers.these approaches not only fail to deliver an optimal solution, but they arealso computationally expensive. the algorithms presented here use as asubroutine a minimum $s,t-cut procedure on a related graph which is ofpolynomial size. the output consists of the optimal solution to the respectiveratio problem, as well as a sequence of nested solution with respect to anyrelative weighting of the objectives of the numerator and denominator. an extension of the results here to bi-criteria and multi-criteria objectivefunctions is presented in part ii.
cs.cv cs.dm
nan
2008-03-02T00:00:00
null
['hochbaum']
https://arxiv.org/abs/0803.0146
1,433
98
stream sampling for variance-optimal estimation of subset sums
0803.0473
from a high volume stream of weighted items, we want to maintain a genericsample of a certain limited size $k$ that we can later use to estimate thetotal weight of arbitrary subsets. this is the classic context of on-linereservoir sampling, thinking of the generic sample as a reservoir. we presentan efficient reservoir sampling scheme, $\varoptk$, that dominates all previousschemes in terms of estimation quality. $\varoptk$ provides {\em variance optimal unbiased estimation of subsetsums}. more precisely, if we have seen $n$ items of the stream, then for {\emany} subset size $m$, our scheme based on $k$ samples minimizes the averagevariance over all subsets of size $m$. in fact, the optimality is against anyoff-line scheme with $k$ samples tailored for the concrete set of items seen.in addition to optimal average variance, our scheme provides tighter worst-casebounds on the variance of {\em particular} subsets than previously possible. itis efficient, handling each new item of the stream in $o(\log k)$ time.finally, it is particularly well suited for combination of samples fromdifferent streams in a distributed setting.
cs.ds
nan
2008-03-04T00:00:00
2010-11-15T00:00:00
['cohen', 'duffield', 'kaplan', 'lund', 'thorup']
https://arxiv.org/abs/0803.0473
1,138
99

CS Research Dataset

Description

This dataset is a collection of scientific abstracts from the field of computer science, sourced from arXiv. It was created to facilitate research in natural language processing, specifically for tasks such as thematic modeling, trend analysis, and keyword extraction.

Dataset Structure

The dataset is structured as follows:

  • title: Title of the research paper.
  • id: Unique identifier for each abstract.
  • abstract: Abstract of the research paper.
  • categories: Categories associated with the paper, primarily within the field of computer science.
  • doi: Digital Object Identifier for the paper.
  • created: Date when the paper was submitted to arXiv.
  • updated: Date when the paper was last updated.
  • authors: List of authors of the paper.
  • url: URL to the original paper on arXiv.
  • abstract_length: Length of the abstract in characters.
  • id_n: Sequential number assigned to each abstract, starting from 0.

Usage

This dataset can be used for various natural language processing tasks such as thematic modeling, trend analysis, keyword extraction, and more. It is particularly suitable for researchers and practitioners interested in the latest developments in computer science.

How to Load the Dataset

You can load the dataset using the datasets library in Python:

from datasets import load_dataset

dataset = load_dataset("CCRss/arxiv_papers_cs")

Dataset Creation

The dataset was created using the arxivscraper library in Python to scrape abstracts from the arXiv website. Here is an example of how the data was collected:

import arxivscraper

scraper = arxivscraper.Scraper(category='cs', date_from='20200101', date_until='20201231')
output = scraper.scrape()

You can find a detailed example in this Google Colab notebook and test it.

Application

This dataset was used to train a thematic modeling algorithm for analyzing trends in UAV-related research. The trained model is available in our model repository on Hugging Face.

Acknowledgments

We would like to acknowledge Mahdi Sadjadi for creating the arxivscraper library, which was instrumental in collecting data for this dataset. The library is available on Zenodo: arxivscraper (2017).

License

This dataset is provided under the MIT License.

Downloads last month
63

Models trained or fine-tuned on CCRss/arxiv_papers_cs