title
stringlengths 1
275
| id
stringlengths 9
16
| abstract
stringlengths 320
3.75k
| categories
stringlengths 5
104
| doi
stringlengths 3
151
| created
timestamp[ns] | updated
timestamp[ns] | authors
stringlengths 5
9.47k
| url
stringlengths 31
38
| abstract_length
int64 320
3.75k
| id_n
int64 0
556k
|
---|---|---|---|---|---|---|---|---|---|---|
regularities of the distribution of abstract van der corput sequences | 0809.3994 | similarly to $\beta$-adic van der corput sequences, abstract van der corputsequences can be defined for abstract numeration systems. under someassumptions, these sequences are low discrepancy sequences. the discrepancyfunction is computed explicitely, and a characterization of bounded remaindersets of the form $[0,y)$ is provided. | math.nt cs.dm | nan | 2008-09-23T00:00:00 | 2010-01-23T00:00:00 | ['steiner'] | https://arxiv.org/abs/0809.3994 | 332 | 200 |
modelling interdependencies between the electricity and information infrastructures | 0809.4107 | the aim of this paper is to provide qualitative models characterizinginterdependencies related failures of two critical infrastructures: theelectricity infrastructure and the associated information infrastructure. theinterdependencies of these two infrastructures are increasing due to a growingconnection of the power grid networks to the global information infrastructure,as a consequence of market deregulation and opening. these interdependenciesincrease the risk of failures. we focus on cascading, escalating andcommon-cause failures, which correspond to the main causes of failures due tointerdependencies. we address failures in the electricity infrastructure, incombination with accidental failures in the information infrastructure, then weshow briefly how malicious attacks in the information infrastructure can beaddressed. | cs.dc | nan | 2008-09-24T00:00:00 | null | ['laprie', 'kanoun', 'kaaniche'] | https://arxiv.org/abs/0809.4107 | 835 | 201 |
3d mimo scheme for broadcasting future digital tv in single frequency networks | 0809.5145 | this letter introduces a 3d space-time-space block code for future digital tvsystems. the code is based on a double layer structure for inter-cell andintra-cell transmission mode in single frequency networks. without increasingthe complexity of the receiver, the proposed code is very efficient fordifferent transmission scenarios. | cs.ni | nan | 2008-09-30T00:00:00 | null | ['nasser', 'hélard', 'crussière'] | https://arxiv.org/abs/0809.5145 | 331 | 202 |
a coded bit-loading linear precoded discrete multitone solution for power line communication | 0809.5191 | linear precoded discrete multitone modulation (lp-dmt) system has beenalready proved advantageous with adaptive resource allocation algorithm in apower line communication (plc) context. in this paper, we investigate the bitand energy allocation algorithm of an adaptive lp-dmt system taking intoaccount the channel coding scheme. a coded adaptive lp-dmt system is presentedin the plc context with a loading algorithm which ccommodates the channelcoding gains in bit and energy calculations. the performance of a concatenatedchannel coding scheme, consisting of an inner wei's 4-dimensional 16-statestrellis code and an outer reed-solomon code, in combination with the roposedalgorithm is analyzed. simulation results are presented for a fixed target biterror rate in a multicarrier scenario under power spectral density constraint.using a multipath model of plc channel, it is shown that the proposed codedadaptive lp-dmt system performs better than classical coded discrete multitone. | cs.it math.it | 10.1109/spawc.2008.4641669 | 2008-09-30T00:00:00 | null | ['muhammad', 'baudais', 'hélard', 'crussière'] | https://arxiv.org/abs/0809.5191 | 985 | 203 |
coded adaptive linear precoded discrete multitone over plc channel | 0809.5275 | discrete multitone modulation (dmt) systems exploit the capabilities oforthogonal subcarriers to cope efficiently with narrowband interference, highfrequency attenuations and multipath fadings with the help of simpleequalization filters. adaptive linear precoded discrete multitone (lp-dmt)system is based on classical dmt, combined with a linear precoding component.in this paper, we investigate the bit and energy allocation algorithm of anadaptive lp-dmt system taking into account the channel coding scheme. a codedadaptive lpdmt system is presented in the power line communication (plc)context with a loading algorithm which accommodates the channel coding gains inbit and energy calculations. the performance of a concatenated channel codingscheme, consisting of an inner wei's 4-dimensional 16-states trellis code andan outer reed-solomon code, in combination with the proposed algorithm isanalyzed. theoretical coding gains are derived and simulation results arepresented for a fixed target bit error rate in a multicarrier scenario underpower spectral density constraint. using a multipath model of plc channel, itis shown that the proposed coded adaptive lp-dmt system performs better thancoded dmt and can achieve higher throughput for plc applications. | cs.it math.it | 10.1109/isplc.2008.4510410 | 2008-09-30T00:00:00 | null | ['muhammad', 'baudais', 'hélard', 'crussière'] | https://arxiv.org/abs/0809.5275 | 1,264 | 204 |
cognitive radio with partial channel state information at the transmitter | 0810.0870 | in this paper, we present the cognitive radio system design with partialchannel state information known at the transmitter (csit).we replace the dirtypaper coding (dpc) used in the cognitive radio with full csit by the linearassignment gel'fand-pinsker coding (la-gpc), which can utilize the limitedknowledge of the channel more efficiently. based on the achievable rate derivedfrom the la-gpc, two optimization problems under the fast and slow fadingchannels are formulated. we derive semianalytical solutions to find therelaying ratios and precoding coefficients. the critical observation is thatthe complex rate functions in these problems are closely related to ratios ofquadratic form. simulation results show that the proposed semi-analyticalsolutions perform close to the optimal solutions found by brute-force search,and outperform the systems based on naive dpc. asymptotic analysis also showsthat these solutions converge to the optimal ones solved with full csit whenthe k-factor of rician channel approaches infinity. moreover, a new codingscheme is proposed to implement the la-gpc in practice. simulation results showthat the proposed practical coding scheme can efficiently reach the theoreticalrate performance. | cs.it math.it | 10.1109/twc.2010.092410.090725 | 2008-10-05T00:00:00 | 2009-05-19T00:00:00 | ['lin', 'lin', 'lee', 'su'] | https://arxiv.org/abs/0810.0870 | 1,227 | 205 |
a linear time algorithm for l(2,1)-labeling of trees | 0810.0906 | an l(2,1)-labeling of a graph $g$ is an assignment $f$ from the vertex set$v(g)$ to the set of nonnegative integers such that $|f(x)-f(y)|\ge 2$ if $x$and $y$ are adjacent and $|f(x)-f(y)|\ge 1$ if $x$ and $y$ are at distance 2,for all $x$ and $y$ in $v(g)$. a $k$-l(2,1)-labeling is an assignment$f:v(g)\to\{0,..., k\}$, and the l(2,1)-labeling problem asks the minimum $k$,which we denote by $\lambda(g)$, among all possible assignments. it is knownthat this problem is np-hard even for graphs of treewidth 2, and tree is one ofa very few classes for which the problem is polynomially solvable. the runningtime of the best known algorithm for trees had been $\mo(\delta^{4.5} n)$ formore than a decade, however, an $\mo(n^{1.75})$-time algorithm has beenproposed recently, which substantially improved the previous one, where$\delta$ is the maximum degree of $t$ and $n=|v(t)|$. in this paper, we finallyestablish a linear time algorithm for l(2,1)-labeling of trees. | cs.ds | nan | 2008-10-06T00:00:00 | 2010-11-24T00:00:00 | ['hasunuma', 'ishii', 'ono', 'uno'] | https://arxiv.org/abs/0810.0906 | 969 | 206 |
bi-directional half-duplex protocols with multiple relays | 0810.1268 | in a bi-directional relay channel, two nodes wish to exchange independentmessages over a shared wireless half-duplex channel with the help of relays.recent work has considered information theoretic limits of the bi-directionalrelay channel with a single relay. in this work we consider bi-directionalrelaying with multiple relays. we derive achievable rate regions and outerbounds for half-duplex protocols with multiple decode and forward relays andcompare these to the same protocols with amplify and forward relays in anadditive white gaussian noise channel. we consider three novel classes ofhalf-duplex protocols: the (m,2) 2 phase protocol with m relays, the (m,3) 3phase protocol with m relays, and general (m, t) multiple hops and multiplerelays (mhmr) protocols, where m is the total number of relays and 3<t< m+3 isthe number of temporal phases in the protocol. the (m,2) and (m,3) protocolsextend previous bi-directional relaying protocols for a single m=1 relay, whilethe new (m,t) protocol efficiently combines multi-hop routing withmessage-level network coding. finally, we provide a comprehensive treatment ofthe mhmr protocols with decode and forward relaying and amplify and forwardrelaying in the gaussian noise, obtaining their respective achievable rateregions, outer bounds and relative performance under different snrs and relaygeometries, including an analytical comparison on the protocols at low and highsnr. | cs.it math.it | nan | 2008-10-07T00:00:00 | 2010-09-09T00:00:00 | ['kim', 'devroye', 'tarokh'] | https://arxiv.org/abs/0810.1268 | 1,433 | 207 |
an analytical model of information dissemination for a gossip-based protocol | 0810.1571 | we develop an analytical model of information dissemination for a gossipingprotocol that combines both pull and push approaches. with this model weanalyse how fast an item is replicated through a network, and how fast the itemspreads in the network, and how fast the item covers the network. we alsodetermine the optimal size of the exchange buffer, to obtain fast replication.our results are confirmed by large-scale simulation experiments. | cs.dc cs.dm cs.it cs.pf math.it | 10.1016/j.comnet.2009.03.017 | 2008-10-09T00:00:00 | null | ['bakhshi', 'gavidia', 'fokkink', 'van steen'] | https://arxiv.org/abs/0810.1571 | 441 | 208 |
on finite functions with non-trivial arity gap | 0810.2279 | given an $n$-ary $k-$valued function $f$, $gap(f)$ denotes the minimal number of essentialvariables in $f$ which become fictive when identifying any two distinctessential variables in $f$. we particularly solve a problem concerning the explicit determination of$n$-ary $k-$valued functions $f$ with $2\leq gap(f)\leq n\leq k$. our methods yieldnew combinatorial results about the number of such functions. | cs.dm cs.cc | nan | 2008-10-13T00:00:00 | 2010-03-05T00:00:00 | ['shtrakov', 'koppitz'] | https://arxiv.org/abs/0810.2279 | 408 | 209 |
a mordell inequality for lattices over maximal orders | 0810.2336 | in this paper we prove an analogue of mordell's inequality for lattices infinite-dimensional complex or quaternionic hermitian space that are modulesover a maximal order in an imaginary quadratic number field or a totallydefinite rational quaternion algebra. this inequality implies that the16-dimensional barnes-wall lattice has optimal density among all 16-dimensionallattices with hurwitz structures. | math.mg cs.it math.it math.nt | nan | 2008-10-13T00:00:00 | 2010-07-30T00:00:00 | ['vance'] | https://arxiv.org/abs/0810.2336 | 403 | 210 |
faster and better: a machine learning approach to corner detection | 0810.2434 | the repeatability and efficiency of a corner detector determines how likelyit is to be useful in a real-world application. the repeatability is importandbecause the same scene viewed from different positions should yield featureswhich correspond to the same real-world 3d locations [schmid et al 2000]. theefficiency is important because this determines whether the detector combinedwith further processing can operate at frame rate. three advances are described in this paper. first, we present a new heuristicfor feature detection, and using machine learning we derive a feature detectorfrom this which can fully process live pal video using less than 5% of theavailable processing time. by comparison, most other detectors cannot evenoperate at frame rate (harris detector 115%, sift 195%). second, we generalizethe detector, allowing it to be optimized for repeatability, with little lossof efficiency. third, we carry out a rigorous comparison of corner detectorsbased on the above repeatability criterion applied to 3d scenes. we show thatdespite being principally constructed for speed, on these stringent tests, ourheuristic detector significantly outperforms existing feature detectors.finally, the comparison demonstrates that using machine learning producessignificant improvements in repeatability, yielding a detector that is bothvery fast and very high quality. | cs.cv cs.lg | 10.1109/tpami.2008.275 | 2008-10-14T00:00:00 | null | ['rosten', 'porter', 'drummond'] | https://arxiv.org/abs/0810.2434 | 1,376 | 211 |
a minimum relative entropy principle for learning and acting | 0810.3605 | this paper proposes a method to construct an adaptive agent that is universalwith respect to a given class of experts, where each expert is an agent thathas been designed specifically for a particular environment. this adaptivecontrol problem is formalized as the problem of minimizing the relative entropyof the adaptive agent from the expert that is most suitable for the unknownenvironment. if the agent is a passive observer, then the optimal solution isthe well-known bayesian predictor. however, if the agent is active, then itspast actions need to be treated as causal interventions on the i/o streamrather than normal probability conditions. here it is shown that the solutionto this new variational problem is given by a stochastic controller called thebayesian control rule, which implements adaptive behavior as a mixture ofexperts. furthermore, it is shown that under mild assumptions, the bayesiancontrol rule converges to the control law of the most suitable expert. | cs.ai cs.lg | nan | 2008-10-20T00:00:00 | 2010-04-10T00:00:00 | ['ortega', 'braun'] | https://arxiv.org/abs/0810.3605 | 980 | 212 |
optimal codes in deletion and insertion metric | 0810.3729 | we improve the upper bound of levenshtein for the cardinality of a code oflength 4 capable of correcting single deletions over an alphabet of even size.we also illustrate that the new upper bound is sharp. furthermore we willconstruct an optimal perfect code capable of correcting single deletions forthe same parameters. | cs.it cs.dm math.co math.it | nan | 2008-10-20T00:00:00 | 2010-03-22T00:00:00 | ['kim', 'lee', 'oh'] | https://arxiv.org/abs/0810.3729 | 321 | 213 |
directed transmission method, a fully asynchronous approach to solve sparse linear systems in parallel | 0810.3783 | in this paper, we propose a new distributed algorithm, called directedtransmission method (dtm). dtm is a fully asynchronous and continuous-timeiterative algorithm to solve spd sparse linear system. as an architecture-awarealgorithm, dtm could be freely running on all kinds of heterogeneous parallelcomputer. we proved that dtm is convergent by making use of the final-valuetheorem of laplacian transformation. numerical experiments show that dtm isstable and efficient. | math.na cs.dc | 10.1145/1378533.1378598 | 2008-10-21T00:00:00 | 2010-09-07T00:00:00 | ['wei', 'yang'] | https://arxiv.org/abs/0810.3783 | 471 | 214 |
best-effort group service in dynamic networks | 0810.3836 | we propose a group membership service for dynamic ad hoc networks. itmaintains as long as possible the existing groups and ensures that each groupdiameter is always smaller than a constant, fixed according to the applicationusing the groups. the proposed protocol is self-stabilizing and works indynamic distributed systems. moreover, it ensures a kind of continuity in theservice offer to the application while the system is converging, except if toostrong topology changes happen. such a best effort behavior allows applicationsto rely on the groups while the stabilization has not been reached, which isvery useful in dynamic ad hoc networks. | cs.dc | nan | 2008-10-21T00:00:00 | 2010-10-11T00:00:00 | ['ducourthial', 'khalfallah', 'petit'] | https://arxiv.org/abs/0810.3836 | 645 | 215 |
sums of residues on algebraic surfaces and application to coding theory | 0810.4112 | in this paper, we study residues of differential 2-forms on a smoothalgebraic surface over an arbitrary field and give several statements aboutsums of residues. afterwards, using these results we constructalgebraic-geometric codes which are an extension to surfaces of the well-knowndifferential codes on curves. we also study some properties of these codes andextend to them some known properties for codes on curves. | math.ag cs.it math.it | nan | 2008-10-22T00:00:00 | null | ['couvreur'] | https://arxiv.org/abs/0810.4112 | 418 | 216 |
bicycle cycles and mobility patterns - exploring and characterizing data from a community bicycle program | 0810.4187 | this paper provides an analysis of human mobility data in an urban area usingthe amount of available bikes in the stations of the community bicycle programbicing in barcelona. the data was obtained by periodic mining of a kml-fileaccessible through the bicing website. although in principle very noisy, aftersome preprocessing and filtering steps the data allows to detect temporalpatterns in mobility as well as identify residential, university, business andleisure areas of the city. the results lead to a proposal for an improvement ofthe bicing website, including a prediction of the number of available bikes ina certain station within the next minutes/hours. furthermore a model foridentifying the most probable routes between stations is briefly sketched. | cs.cy cs.hc | nan | 2008-10-22T00:00:00 | null | ['kaltenbrunner', 'meza', 'grivolla', 'codina', 'banchs'] | https://arxiv.org/abs/0810.4187 | 762 | 217 |
camera distortion self-calibration using the plumb-line constraint and minimal hough entropy | 0810.4426 | in this paper we present a simple and robust method for self-correction ofcamera distortion using single images of scenes which contain straight lines.since the most common distortion can be modelled as radial distortion, weillustrate the method using the harris radial distortion model, but the methodis applicable to any distortion model. the method is based on transforming theedgels of the distorted image to a 1-d angular hough space, and optimizing thedistortion correction parameters which minimize the entropy of thecorresponding normalized histogram. properly corrected imagery will have fewercurved lines, and therefore less spread in hough space. since the method doesnot rely on any image structure beyond the existence of edgels sharing somecommon orientations and does not use edge fitting, it is applicable to a widevariety of image types. for instance, it can be applied equally well to imagesof texture with weak but dominant orientations, or images with strong vanishingpoints. finally, the method is performed on both synthetic and real datarevealing that it is particularly robust to noise. | cs.cv | 10.1007/s00138-009-0196-9 | 2008-10-24T00:00:00 | 2009-01-04T00:00:00 | ['rosten', 'loveland'] | https://arxiv.org/abs/0810.4426 | 1,110 | 218 |
relating web pages to enable information-gathering tasks | 0810.5428 | we argue that relationships between web pages are functions of the user'sintent. we identify a class of web tasks - information-gathering - that can befacilitated by a search engine that provides links to pages which are relatedto the page the user is currently viewing. we define three kinds of intentionalrelationships that correspond to whether the user is a) seeking sources ofinformation, b) reading pages which provide information, or c) surfing throughpages as part of an extended information-gathering process. we show that thesethree relationships can be productively mined using a combination of textualand link information and provide three scoring mechanisms that correspond tothem: {\em seekrel}, {\em factrel} and {\em surfrel}. these scoring mechanismsincorporate both textual and link information. we build a set of capacitatedsubnetworks - each corresponding to a particular keyword - that mirror theinterconnection structure of the world wide web. the scores are computed bycomputing flows on these subnetworks. the capacities of the links are derivedfrom the {\em hub} and {\em authority} values of the nodes they connect,following the work of kleinberg (1998) on assigning authority to pages inhyperlinked environments. we evaluated our scoring mechanism by runningexperiments on four data sets taken from the web. we present user evaluationsof the relevance of the top results returned by our scoring mechanisms andcompare those to the top results returned by google's similar pages feature,and the {\em companion} algorithm proposed by dean and henzinger (1999). | cs.ir cs.ds | nan | 2008-10-30T00:00:00 | 2010-05-19T00:00:00 | ['bagchi', 'lahoti'] | https://arxiv.org/abs/0810.5428 | 1,584 | 219 |
model checking memoryful linear-time logics over one-counter automata | 0810.5517 | we study complexity of the model-checking problems for ltl with registers(also known as freeze ltl) and for first-order logic with data equality testsover one-counter automata. we consider several classes of one-counter automata(mainly deterministic vs. nondeterministic) and several logical fragments(restriction on the number of registers or variables and on the use ofpropositional variables for control locations). the logics have the ability tostore a counter value and to test it later against the current counter value.we show that model checking over deterministic one-counter automata ispspace-complete with infinite and finite accepting runs. by constrast, we provethat model checking freeze ltl in which the until operator is restricted to theeventually operator over nondeterministic one-counter automata is undecidableeven if only one register is used and with no propositional variable. as acorollary of our proof, this also holds for first-order logic with dataequality tests restricted to two variables. this makes a difference with thefacts that several verification problems for one-counter automata are known tobe decidable with relatively low complexity, and that finitary satisfiabilityfor the two logics are decidable. our results pave the way for model-checkingmemoryful (linear-time) logics over other classes of operational models, suchas reversal-bounded counter machines. | cs.lo | nan | 2008-10-30T00:00:00 | 2010-01-18T00:00:00 | ['demri', 'lazic', 'sangnier'] | https://arxiv.org/abs/0810.5517 | 1,398 | 220 |
effective complexity and its relation to logical depth | 0810.5663 | effective complexity measures the information content of the regularities ofan object. it has been introduced by m. gell-mann and s. lloyd to avoid some ofthe disadvantages of kolmogorov complexity, also known as algorithmicinformation content. in this paper, we give a precise formal definition ofeffective complexity and rigorous proofs of its basic properties. inparticular, we show that incompressible binary strings are effectively simple,and we prove the existence of strings that have effective complexity close totheir lengths. furthermore, we show that effective complexity is related tobennett's logical depth: if the effective complexity of a string $x$ exceeds acertain explicit threshold then that string must have astronomically largedepth; otherwise, the depth can be arbitrarily small. | cs.it math.it | 10.1109/tit.2010.2053892 | 2008-10-31T00:00:00 | null | ['ay', 'mueller', 'szkola'] | https://arxiv.org/abs/0810.5663 | 801 | 221 |
interpolation of shifted-lacunary polynomials | 0810.5685 | given a "black box" function to evaluate an unknown rational polynomial f inq[x] at points modulo a prime p, we exhibit algorithms to compute therepresentation of the polynomial in the sparsest shifted power basis. that is,we determine the sparsity t, the shift s (a rational), the exponents 0 <= e1 <e2 < ... < et, and the coefficients c1,...,ct in q\{0} such that f(x) =c1(x-s)^e1+c2(x-s)^e2+...+ct(x-s)^et. the computed sparsity t is absolutelyminimal over any shifted power basis. the novelty of our algorithm is that thecomplexity is polynomial in the (sparse) representation size, and in particularis logarithmic in deg(f). our method combines previous celebrated results onsparse interpolation and computing sparsest shifts, and provides a way tohandle polynomials with extremely high degree which are, in some sense, sparsein information. | cs.sc cs.ds cs.ms | 10.1007/s00037-010-0294-0 | 2008-10-31T00:00:00 | 2010-08-23T00:00:00 | ['giesbrecht', 'roche'] | https://arxiv.org/abs/0810.5685 | 846 | 222 |
a complexity dichotomy for hypergraph partition functions | 0811.0037 | we consider the complexity of counting homomorphisms from an $r$-uniformhypergraph $g$ to a symmetric $r$-ary relation $h$. we give a dichotomy theoremfor $r>2$, showing for which $h$ this problem is in fp and for which $h$ it is#p-complete. this generalises a theorem of dyer and greenhill (2000) for thecase $r=2$, which corresponds to counting graph homomorphisms. our dichotomytheorem extends to the case in which the relation $h$ is weighted, and the goalis to compute the \emph{partition function}, which is the sum of weights of thehomomorphisms. this problem is motivated by statistical physics, where itarises as computing the partition function for particle models in which certaincombinations of $r$ sites interact symmetrically. in the weighted case, ourdichotomy theorem generalises a result of bulatov and grohe (2005) for graphs,where $r=2$. when $r=2$, the polynomial time cases of the dichotomy correspondsimply to rank-1 weights. surprisingly, for all $r>2$ the polynomial time casesof the dichotomy have rather more structure. it turns out that the weights mustbe superimposed on a combinatorial structure defined by solutions of anequation over an abelian group. our result also gives a dichotomy for a closelyrelated constraint satisfaction problem. | cs.cc cs.dm | nan | 2008-10-31T00:00:00 | 2010-01-01T00:00:00 | ['dyer', 'goldberg', 'jerrum'] | https://arxiv.org/abs/0811.0037 | 1,270 | 223 |
embedding non-ground logic programs into autoepistemic logic for knowledge base combination | 0811.0359 | in the context of the semantic web, several approaches to the combination ofontologies, given in terms of theories of classical first-order logic and rulebases, have been proposed. they either cast rules into classical logic or limitthe interaction between rules and ontologies. autoepistemic logic (ael) is anattractive formalism which allows to overcome these limitations, by serving asa uniform host language to embed ontologies and nonmonotonic logic programsinto it. for the latter, so far only the propositional setting has beenconsidered. in this paper, we present three embeddings of normal and threeembeddings of disjunctive non-ground logic programs under the stable modelsemantics into first-order ael. while the embeddings all correspond withrespect to objective ground atoms, differences arise when consideringnon-atomic formulas and combinations with first-order theories. we compare theembeddings with respect to stable expansions and autoepistemic consequences,considering the embeddings by themselves, as well as combinations withclassical theories. our results reveal differences and correspondences of theembeddings and provide useful guidance in the choice of a particular embeddingfor knowledge combination. | cs.lo cs.ai | nan | 2008-11-03T00:00:00 | 2010-06-11T00:00:00 | ['de bruijn', 'eiter', 'polleres', 'tompits'] | https://arxiv.org/abs/0811.0359 | 1,228 | 224 |
on the dynamics of social balance on general networks (with an application to xor-sat) | 0811.0381 | we study nondeterministic and probabilistic versions of a discrete dynamicalsystem (due to t. antal, p. l. krapivsky, and s. redner) inspired by heider'ssocial balance theory. we investigate the convergence time of this dynamics onseveral classes of graphs. our contributions include: 1. we point out the connection between the triad dynamics and ageneralization of annihilating walks to hypergraphs. in particular, thisconnection allows us to completely characterize the recurrent states in graphswhere each edge belongs to at most two triangles. 2. we also solve the case of hypergraphs that do not contain edges consistingof one or two vertices. 3. we show that on the so-called "triadic cycle" graph, the convergence timeis linear. 4. we obtain a cubic upper bound on the convergence time on 2-regular triadicsimplexes g. this bound can be further improved to a quantity that depends onthe cheeger constant of g. in particular this provides some rigorouscounterparts to previous experimental observations. we also point out an application to the analysis of the random walk algorithmon certain instances of the 3-xor-sat problem. | cs.dm math.co math.pr physics.soc-ph | nan | 2008-11-03T00:00:00 | null | ['istrate'] | https://arxiv.org/abs/0811.0381 | 1,138 | 225 |
non-classical role of potential energy in adiabatic quantum annealing | 0811.0881 | adiabatic quantum annealing is a paradigm of analog quantum computation,where a given computational job is converted to the task of finding the globalminimum of some classical potential energy function and the search for theglobal potential minimum is performed by employing external kinetic quantumfluctuations and subsequent slow reduction (annealing) of them. in this method,the entire potential energy landscape (pel) may be accessed simultaneouslythrough a delocalized wave-function, in contrast to a classical search, wherethe searcher has to visit different points in the landscape (i.e., individualclassical configurations) sequentially. thus in such searches, the role of thepotential energy might be significantly different in the two cases. here wediscuss this in the context of searching of a single isolated hole (potentialminimum) in a golf-course type gradient free pel. we show, that the quantumparticle would be able to locate the hole faster if the hole is deeper, whilethe classical particle of course would have no scope to exploit the depth ofthe hole. we also discuss the effect of the underlying quantum phase transitionon the adiabatic dynamics. | quant-ph cond-mat.stat-mech cs.cc physics.comp-ph | 10.1088/1742-6596/143/1/012001 | 2008-11-06T00:00:00 | null | ['das'] | https://arxiv.org/abs/0811.0881 | 1,169 | 226 |
the complexity of propositional implication | 0811.0959 | the question whether a set of formulae g implies a formula f is fundamental.the present paper studies the complexity of the above implication problem forpropositional formulae that are built from a systematically restricted set ofboolean connectives. we give a complete complexity classification for all setsof boolean functions in the meaning of post's lattice and show that theimplication problem is efficentily solvable only if the connectives aredefinable using the constants {false,true} and only one of {and,or,xor}. theproblem remains conp-complete in all other cases. we also consider therestriction of g to singletons. | cs.cc cs.lo | 10.1016/j.ipl.2009.06.015 | 2008-11-06T00:00:00 | 2009-08-12T00:00:00 | ['beyersdorff', 'meier', 'thomas', 'vollmer'] | https://arxiv.org/abs/0811.0959 | 627 | 227 |
modeling social annotation: a bayesian approach | 0811.1319 | collaborative tagging systems, such as delicious, citeulike, and others,allow users to annotate resources, e.g., web pages or scientific papers, withdescriptive labels called tags. the social annotations contributed by thousandsof users, can potentially be used to infer categorical knowledge, classifydocuments or recommend new relevant information. traditional text inferencemethods do not make best use of social annotation, since they do not take intoaccount variations in individual users' perspectives and vocabulary. in aprevious work, we introduced a simple probabilistic model that takes interestsof individual annotators into account in order to find hidden topics ofannotated resources. unfortunately, that approach had one major shortcoming:the number of topics and interests must be specified a priori. to address thisdrawback, we extend the model to a fully bayesian framework, which offers a wayto automatically estimate these numbers. in particular, the model allows thenumber of interests and topics to change as suggested by the structure of thedata. we evaluate the proposed model in detail on the synthetic and real-worlddata by comparing its performance to latent dirichlet allocation on the topicextraction task. for the latter evaluation, we apply the model to infer topicsof web resources from social annotations obtained from delicious in order todiscover new resources similar to a specified one. our empirical resultsdemonstrate that the proposed model is a promising method for exploiting socialknowledge contained in user-generated annotations. | cs.ai | nan | 2008-11-09T00:00:00 | 2010-05-26T00:00:00 | ['plangprasopchok', 'lerman'] | https://arxiv.org/abs/0811.1319 | 1,573 | 228 |
on the long time behavior of the tcp window size process | 0811.2180 | the tcp window size process appears in the modeling of the famoustransmission control protocol used for data transmission over the internet.this continuous time markov process takes its values in $[0,\infty)$, isergodic and irreversible. it belongs to the additive increase multiplicativedecrease class of processes. the sample paths are piecewise lineardeterministic and the whole randomness of the dynamics comes from the jumpmechanism. several aspects of this process have already been investigated inthe literature. in the present paper, we mainly get quantitative estimates forthe convergence to equilibrium, in terms of the $w_1$ wasserstein couplingdistance, for the process and also for its embedded chain. | math.pr cs.ni | 10.1016/j.spa.2010.03.019 | 2008-11-13T00:00:00 | 2009-12-16T00:00:00 | ['chafai', 'malrieu', 'paroux'] | https://arxiv.org/abs/0811.2180 | 714 | 229 |
computing voting power in easy weighted voting games | 0811.2497 | weighted voting games are ubiquitous mathematical models which are used ineconomics, political science, neuroscience, threshold logic, reliability theoryand distributed systems. they model situations where agents with variablevoting weight vote in favour of or against a decision. a coalition of agents iswinning if and only if the sum of weights of the coalition exceeds or equals aspecified quota. the banzhaf index is a measure of voting power of an agent ina weighted voting game. it depends on the number of coalitions in which theagent is the difference in the coalition winning or losing. it is well knownthat computing banzhaf indices in a weighted voting game is np-hard. we give acomprehensive classification of weighted voting games which can be solved inpolynomial time. among other results, we provide a polynomial($o(k{(\frac{n}{k})}^k)$) algorithm to compute the banzhaf indices in weightedvoting games in which the number of weight values is bounded by $k$. | cs.gt cs.cc cs.ds | nan | 2008-11-15T00:00:00 | 2010-02-01T00:00:00 | ['aziz', 'paterson'] | https://arxiv.org/abs/0811.2497 | 973 | 230 |
an efficient algorithm for partial order production | 0811.2572 | we consider the problem of partial order production: arrange the elements ofan unknown totally ordered set t into a target partially ordered set s, bycomparing a minimum number of pairs in t. special cases include sorting bycomparisons, selection, multiple selection, and heap construction. we give an algorithm performing itlb + o(itlb) + o(n) comparisons in theworst case. here, n denotes the size of the ground sets, and itlb denotes anatural information-theoretic lower bound on the number of comparisons neededto produce the target partial order. our approach is to replace the target partial order by a weak order (that is,a partial order with a layered structure) extending it, without increasing theinformation theoretic lower bound too much. we then solve the problem byapplying an efficient multiple selection algorithm. the overall complexity ofour algorithm is polynomial. this answers a question of yao (siam j. comput.18, 1989). we base our analysis on the entropy of the target partial order, a quantitythat can be efficiently computed and provides a good estimate of theinformation-theoretic lower bound. | cs.ds | 10.1137/090759860 | 2008-11-17T00:00:00 | 2009-12-01T00:00:00 | ['cardinal', 'fiorini', 'joret', 'jungers', 'munro'] | https://arxiv.org/abs/0811.2572 | 1,123 | 231 |
ag codes from polyhedral divisors | 0811.2696 | a description of complete normal varieties with lower dimensional torusaction has been given by altmann, hausen, and suess, generalizing the theory oftoric varieties. considering the case where the acting torus t has codimensionone, we describe t-invariant weil and cartier divisors and provide formulae forcalculating global sections, intersection numbers, and euler characteristics.as an application, we use divisors on these so-called t-varieties to define newevaluation codes called t-codes. we find estimates on their minimum distanceusing intersection theory. this generalizes the theory of toric codes andcombines it with ag codes on curves. as the simplest application of our generaltechniques we look at codes on ruled surfaces coming from decomposable vectorbundles. already this construction gives codes that are better than the relatedproduct code. further examples show that we can improve these codes byconstructing more sophisticated t-varieties. these results suggest to lookfurther for good codes on t-varieties. | math.ag cs.it math.it | 10.1016/j.jsc.2010.03.008 | 2008-11-17T00:00:00 | 2009-01-30T00:00:00 | ['ilten', 'süß'] | https://arxiv.org/abs/0811.2696 | 1,029 | 232 |
geometric properties of satisfying assignments of random $\epsilon$-1-in-k sat | 0811.3116 | we study the geometric structure of the set of solutions of random$\epsilon$-1-in-k sat problem. for $l\geq 1$, two satisfying assignments $a$and $b$ are $l$-connected if there exists a sequence of satisfying assignmentsconnecting them by changing at most $l$ bits at a time. we first prove that w.h.p. two assignments of a random $\epsilon$-1-in-$k$sat instance are $o(\log n)$-connected, conditional on being satisfyingassignments. also, there exists $\epsilon_{0}\in (0,\frac{1}{k-2})$ such thatw.h.p. no two satisfying assignments at distance at least $\epsilon_{0}\cdot n$form a "hole" in the set of assignments. we believe that this is true for all$\epsilon >0$, and thus satisfying assignments of a random 1-in-$k$ satinstance form a single cluster. | cs.cc cs.dm | nan | 2008-11-19T00:00:00 | null | ['istrate'] | https://arxiv.org/abs/0811.3116 | 757 | 233 |
packing and covering properties of subspace codes for error control in random linear network coding | 0811.4163 | codes in the projective space and codes in the grassmannian over a finitefield - referred to as subspace codes and constant-dimension codes (cdcs),respectively - have been proposed for error control in random linear networkcoding. for subspace codes and cdcs, a subspace metric was introduced tocorrect both errors and erasures, and an injection metric was proposed tocorrect adversarial errors. in this paper, we investigate the packing andcovering properties of subspace codes with both metrics. we first determinesome fundamental geometric properties of the projective space with bothmetrics. using these properties, we then derive bounds on the cardinalities ofpacking and covering subspace codes, and determine the asymptotic rates ofoptimal packing and optimal covering subspace codes with both metrics. ourresults not only provide guiding principles for the code design for errorcontrol in random linear network coding, but also illustrate the differencebetween the two metrics from a geometric perspective. in particular, ourresults show that optimal packing cdcs are optimal packing subspace codes up toa scalar for both metrics if and only if their dimension is half of theirlength (up to rounding). in this case, cdcs suffer from only limited rate lossas opposed to subspace codes with the same minimum distance. we also show thatoptimal covering cdcs can be used to construct asymptotically optimal coveringsubspace codes with the injection metric only. | cs.it math.it | nan | 2008-11-25T00:00:00 | 2010-03-30T00:00:00 | ['gadouleau', 'yan'] | https://arxiv.org/abs/0811.4163 | 1,465 | 234 |
high resolution dynamical mapping of social interactions with active rfid | 0811.4170 | in this paper we present an experimental framework to gather data onface-to-face social interactions between individuals, with a high spatial andtemporal resolution. we use active radio frequency identification (rfid)devices that assess contacts with one another by exchanging low-power radiopackets. when individuals wear the beacons as a badge, a persistent radiocontact between the rfid devices can be used as a proxy for a socialinteraction between individuals. we present the results of a pilot studyrecently performed during a conference, and a subsequent preliminary dataanalysis, that provides an assessment of our method and highlights itsversatility and applicability in many areas concerned with human dynamics. | cs.cy cs.hc physics.soc-ph | 10.1371/journal.pone.0011596 | 2008-11-25T00:00:00 | 2008-11-25T00:00:00 | ['barrat', 'cattuto', 'colizza', 'pinton', 'broeck', 'vespignani'] | https://arxiv.org/abs/0811.4170 | 722 | 235 |
entanglement-assisted communication of classical and quantum information | 0811.4227 | we consider the problem of transmitting classical and quantum informationreliably over an entanglement-assisted quantum channel. our main result is acapacity theorem that gives a three-dimensional achievable rate region. pointsin the region are rate triples, consisting of the classical communication rate,the quantum communication rate, and the entanglement consumption rate of aparticular coding scheme. the crucial protocol in achieving the boundary pointsof the capacity region is a protocol that we name the classically-enhancedfather protocol. the classically-enhanced father protocol is more general thanother protocols in the family tree of quantum shannon theoretic protocols, inthe sense that several previously known quantum protocols are now childprotocols of it. the classically-enhanced father protocol also shows animprovement over a time-sharing strategy for the case of a qubit dephasingchannel--this result justifies the need for simultaneous coding of classicaland quantum information over an entanglement-assisted quantum channel. ourcapacity theorem is of a multi-letter nature (requiring a limit over many usesof the channel), but it reduces to a single-letter characterization for atleast three channels: the completely depolarizing channel, the quantum erasurechannel, and the qubit dephasing channel. | quant-ph cs.it math.it | 10.1109/tit.2010.2053903 | 2008-11-26T00:00:00 | 2010-03-02T00:00:00 | ['hsieh', 'wilde'] | https://arxiv.org/abs/0811.4227 | 1,325 | 236 |
hybrid: a definitional two-level approach to reasoning with higher-order abstract syntax | 0811.4367 | combining higher-order abstract syntax and (co)induction in a logicalframework is well known to be problematic. previous work described theimplementation of a tool called hybrid, within isabelle hol, which aims toaddress many of these difficulties. it allows object logics to be representedusing higher-order abstract syntax, and reasoned about using tactical theoremproving and principles of (co)induction. in this paper we describe how to useit in a multi-level reasoning fashion, similar in spirit to other meta-logicssuch as twelf. by explicitly referencing provability in a middle layer called aspecification logic, we solve the problem of reasoning by (co)induction in thepresence of non-stratifiable hypothetical judgments, which allow very elegantand succinct specifications of object logic inference rules. | cs.lo | nan | 2008-11-26T00:00:00 | 2010-05-26T00:00:00 | ['felty', 'momigliano'] | https://arxiv.org/abs/0811.4367 | 815 | 237 |
mapping images with the coherence length diagrams | 0811.4699 | statistical pattern recognition methods based on the coherence length diagram(cld) have been proposed for medical image analyses, such as quantitativecharacterisation of human skin textures, and for polarized light microscopy ofliquid crystal textures. further investigations are made on image mapsoriginated from such diagram and some examples related to irregularity ofmicrostructures are shown. | cs.cv | nan | 2008-11-28T00:00:00 | 2009-03-03T00:00:00 | ['sparavigna', 'marazzato'] | https://arxiv.org/abs/0811.4699 | 397 | 238 |
omnidirectional relay in wireless networks | 0812.0038 | for wireless networks with multiple sources, an omnidirectional relay schemeis developed, where each node can simultaneously relay different messages indifferent directions. this is accomplished by the decode-and-forward relaystrategy, with each relay binning the multiple messages to be transmitted, inthe same spirit of network coding. specially for the all-source all-castproblem, where each node is an independent source to be transmitted to all theother nodes, this scheme completely eliminates interference in the wholenetwork, and the signal transmitted by any node can be used by any other node.for networks with some kind of symmetry, assuming no beamforming is to beperformed, this omnidirectional relay scheme is capable of achieving themaximum achievable rate. | cs.it math.it | nan | 2008-11-28T00:00:00 | 2010-11-14T00:00:00 | ['xie'] | https://arxiv.org/abs/0812.0038 | 772 | 239 |
dilation, smoothed distance, and minimization diagrams of convex functions | 0812.0607 | we study voronoi diagrams for distance functions that add together two convexfunctions, each taking as its argument the difference between cartesiancoordinates of two planar points. when the functions do not grow too quickly,then the voronoi diagram has linear complexity and can be constructed innear-linear randomized expected time. additionally, the level sets of thedistances from the sites form a family of pseudocircles in the plane, all cellsin the voronoi diagram are connected, and the set of bisectors separating anyone cell in the diagram from each of the others forms an arrangement ofpseudolines in the plane. we apply these results to the smoothed distance orbiotope transform metric, a geometric analogue of the jaccard distance whosevoronoi diagrams can be used to determine the dilation of a star network with agiven hub. for sufficiently closely spaced points in the plane, the voronoidiagram of smoothed distance has linear complexity and can be computedefficiently. we also experiment with a variant of lloyd's algorithm, adapted tosmoothed distance, to find uniformly spaced point samples with exponentiallydecreasing density around a given point. | cs.cg | nan | 2008-12-02T00:00:00 | 2010-05-13T00:00:00 | ['dickerson', 'eppstein', 'wortman'] | https://arxiv.org/abs/0812.0607 | 1,168 | 240 |
hierarchy and equivalence of multi-letter quantum finite automata | 0812.0852 | multi-letter {\it quantum finite automata} (qfas) were a new one-way qfamodel proposed recently by belovs, rosmanis, and smotrovs (lncs, vol. 4588,springer, berlin, 2007, pp. 60-71), and they showed that multi-letter qfas canaccept with no error some regular languages ($(a+b)^{*}b$) that areunacceptable by the one-way qfas. in this paper, we continue to studymulti-letter qfas. we mainly focus on two issues: (1) we show that$(k+1)$-letter qfas are computationally more powerful than $k$-letter qfas,that is, $(k+1)$-letter qfas can accept some regular languages that areunacceptable by any $k$-letter qfa. a comparison with the one-way qfas is madeby some examples; (2) we prove that a $k_{1}$-letter qfa ${\cal a}_1$ andanother $k_{2}$-letter qfa ${\cal a}_2$ are equivalent if and only if they are$(n_{1}+n_{2})^{4}+k-1$-equivalent, and the time complexity of determining theequivalence of two multi-letter qfas using this method is$o(n^{12}+k^{2}n^{4}+kn^{8})$, where $n_{1}$ and $n_{2}$ are the numbers ofstates of ${\cal a}_{1}$ and ${\cal a}_{2}$, respectively, and$k=\max(k_{1},k_{2})$. some other issues are addressed for furtherconsideration. | cs.cc | nan | 2008-12-03T00:00:00 | 2009-03-10T00:00:00 | ['qiu', 'yu'] | https://arxiv.org/abs/0812.0852 | 1,154 | 241 |
linear-time algorithms for geometric graphs with sublinearly many edge crossings | 0812.0893 | we provide linear-time algorithms for geometric graphs with sublinearly manycrossings. that is, we provide algorithms running in o(n) time on connectedgeometric graphs having n vertices and k crossings, where k is smaller than nby an iterated logarithmic factor. specific problems we study include voronoidiagrams and single-source shortest paths. our algorithms all run in lineartime in the standard comparison-based computational model; hence, we make noassumptions about the distribution or bit complexities of edge weights, nor dowe utilize unusual bit-level operations on memory words. instead, ouralgorithms are based on a planarization method that "zeroes in" on edgecrossings, together with methods for extending planar separator decompositionsto geometric graphs with sublinearly many crossings. incidentally, ourplanarization algorithm also solves an open computational geometry problem ofchazelle for triangulating a self-intersecting polygonal chain having nsegments and k crossings in linear time, for the case when k is sublinear in nby an iterated logarithmic factor. | cs.cg cs.dm cs.ds cs.gr | 10.1137/090759112 | 2008-12-04T00:00:00 | 2009-05-13T00:00:00 | ['eppstein', 'goodrich', 'strash'] | https://arxiv.org/abs/0812.0893 | 1,082 | 242 |
ecotrade - a multi player network game of a tradable permit market for biodiversity credits | 0812.0956 | ecotrade is a multi player network game of a virtual biodiversity creditmarket. each player controls the land use of a certain amount of parcels on avirtual landscape. the biodiversity credits of a particular parcel depend onneighboring parcels, which may be owned by other players. the game can be usedto study the strategies of players in experiments or classroom games and alsoas a communication tool for stakeholders participating in credit markets thatinclude spatially interdependent credits. | cs.gt | 10.1016/j.envsoft.2009.01.003 | 2008-12-04T00:00:00 | 2010-09-03T00:00:00 | ['hartig', 'horn', 'drechsler'] | https://arxiv.org/abs/0812.0956 | 498 | 243 |
adaptive uncertainty resolution in bayesian combinatorial optimization problems | 0812.1012 | in several applications such as databases, planning, and sensor networks,parameters such as selectivity, load, or sensed values are known only with someassociated uncertainty. the performance of such a system (as captured by someobjective function over the parameters) is significantly improved if some ofthese parameters can be probed or observed. in a resource constrainedsituation, deciding which parameters to observe in order to optimize systemperformance itself becomes an interesting and important optimization problem.this general problem is the focus of this paper. one of the most important considerations in this framework is whetheradaptivity is required for the observations. adaptive observations introduceblocking or sequential operations in the system whereas non-adaptiveobservations can be performed in parallel. one of the important questions inthis regard is to characterize the benefit of adaptivity for probes andobservation. we present general techniques for designing constant factor approximations tothe optimal observation schemes for several widely used scheduling and metricobjective functions. we show a unifying technique that relates thisoptimization problem to the outlier version of the corresponding deterministicoptimization. by making this connection, our technique shows constant factorupper bounds for the benefit of adaptivity of the observation schemes. we showthat while probing yields significant improvement in the objective function,being adaptive about the probing is not beneficial beyond constant factors. | cs.ds | nan | 2008-12-04T00:00:00 | 2010-01-28T00:00:00 | ['guha', 'munagala'] | https://arxiv.org/abs/0812.1012 | 1,554 | 244 |
decidability of the equivalence of multi-letter quantum finite automata | 0812.1061 | multi-letter {\it quantum finite automata} (qfas) were a quantum variant ofclassical {\it one-way multi-head finite automata} (j. hromkovi\v{c}, actainformatica 19 (1983) 377-384), and it has been shown that this new one-wayqfas (multi-letter qfas) can accept with no error some regular languages$(a+b)^{*}b$ that are unacceptable by the previous one-way qfas. in this paper,we study the decidability of the equivalence of multi-letter qfas, and the maintechnical contributions are as follows: (1) we show that any two automata, a$k_{1}$-letter qfa ${\cal a}_1$ and a $k_{2}$-letter qfa ${\cal a}_2$, over thesame input alphabet $\sigma$ are equivalent if and only if they are$(n^2m^{k-1}-m^{k-1}+k)$-equivalent, where $m=|\sigma|$ is the cardinality of$\sigma$, $k=\max(k_{1},k_{2})$, and $n=n_{1}+n_{2}$, with $n_{1}$ and $n_{2}$being the numbers of states of ${\cal a}_{1}$ and ${\cal a}_{2}$, respectively.when $k=1$, we obtain the decidability of equivalence of measure-once qfas inthe literature. it is worth mentioning that our technical method is essentiallydifferent from that for the decidability of the case of single input alphabet(i.e., $m=1$). (2) however, if we determine the equivalence of multi-letterqfas by checking all strings of length not more than $ n^2m^{k-1}-m^{k-1}+k$,then the worst time complexity is exponential, i.e.,$o(n^6m^{n^2m^{k-1}-m^{k-1}+2k-1})$. therefore, we design a polynomial-time$o(m^{2k-1}n^{8}+km^kn^{6})$ algorithm for determining the equivalence of anytwo multi-letter qfas. here, the time complexity is concerning the number ofstates in the multi-letter qfas, and $k$ is thought of as a constant. | cs.fl cs.cc | nan | 2008-12-04T00:00:00 | 2010-10-24T00:00:00 | ['qiu', 'zou', 'li', 'mateus'] | https://arxiv.org/abs/0812.1061 | 1,644 | 245 |
cooperative hybrid arq protocols: unified frameworks for protocol analysis | 0812.2301 | cooperative hybrid-arq (harq) protocols, which can exploit the spatial andtemporal diversities, have been widely studied. the efficiency of cooperativeharq protocols is higher than that of cooperative protocols, becauseretransmissions are only performed when necessary. we classify cooperative harqprotocols as three decode-and-forward based harq (df-harq) protocols and twoamplified-and-forward based (af-harq) protocols. to compare these protocols andobtain the optimum parameters, two unified frameworks are developed forprotocol analysis. using the frameworks, we can evaluate and compare themaximum throughput and outage probabilities according to the snr, the relaylocation, and the delay constraint for the protocols. | cs.it math.it | nan | 2008-12-12T00:00:00 | 2010-10-18T00:00:00 | ['byun', 'kim'] | https://arxiv.org/abs/0812.2301 | 724 | 246 |
on the decoder error probability of rank metric codes and constant-dimension codes | 0812.2379 | rank metric codes and constant-dimension codes (cdcs) have been consideredfor error control in random network coding. since decoder errors are moredetrimental to system performance than decoder failures, in this paper weinvestigate the decoder error probability (dep) of bounded distance decoders(bdds) for rank metric codes and cdcs. for rank metric codes, we consider achannel motivated by network coding, where errors with the same row space areequiprobable. over such channels, we establish upper bounds on the deps ofbdds, determine the exact dep of bdds for maximum rank distance (mrd) codes,and show that mrd codes have the greatest deps up to a scalar. to evaluate thedeps of bdds for cdcs, we first establish some fundamental geometric propertiesof the projective space. using these geometric properties, we then considerbdds in both subspace and injection metrics and derive analytical expressionsof their deps for cdcs, over a symmetric operator channel, as functions oftheir distance distributions. finally, we focus on cdcs obtained by liftingrank metric codes and establish two important results: first, we deriveasymptotically tight upper bounds on the deps of bdds in both metrics; second,we show that the deps for kk codes are the greatest up to a scalar among allcdcs obtained by lifting rank metric codes. | cs.it math.it | nan | 2008-12-12T00:00:00 | 2010-03-31T00:00:00 | ['gadouleau', 'yan'] | https://arxiv.org/abs/0812.2379 | 1,324 | 247 |
the violation heap: a relaxed fibonacci-like heap | 0812.2851 | we give a priority queue that achieves the same amortized bounds as fibonacciheaps. namely, find-min requires o(1) worst-case time, insert, meld anddecrease-key require o(1) amortized time, and delete-min requires $o(\log n)$amortized time. our structure is simple and promises an efficient practicalbehavior when compared to other known fibonacci-like heaps. the main ideabehind our construction is to propagate rank updates instead of performingcascaded cuts following a decrease-key operation, allowing for a relaxedstructure. | cs.ds | nan | 2008-12-15T00:00:00 | 2010-02-11T00:00:00 | ['elmasry'] | https://arxiv.org/abs/0812.2851 | 529 | 248 |
linearly parameterized bandits | 0812.3465 | we consider bandit problems involving a large (possibly infinite) collectionof arms, in which the expected reward of each arm is a linear function of an$r$-dimensional random vector $\mathbf{z} \in \mathbb{r}^r$, where $r \geq 2$.the objective is to minimize the cumulative regret and bayes risk. when the setof arms corresponds to the unit sphere, we prove that the regret and bayes riskis of order $\theta(r \sqrt{t})$, by establishing a lower bound for anarbitrary policy, and showing that a matching upper bound is obtained through apolicy that alternates between exploration and exploitation phases. thephase-based policy is also shown to be effective if the set of arms satisfies astrong convexity condition. for the case of a general set of arms, we describea near-optimal policy whose regret and bayes risk admit upper bounds of theform $o(r \sqrt{t} \log^{3/2} t)$. | cs.lg | nan | 2008-12-18T00:00:00 | 2010-02-24T00:00:00 | ['rusmevichientong', 'tsitsiklis'] | https://arxiv.org/abs/0812.3465 | 874 | 249 |
indoor channel measurements and communications system design at 60 ghz | 0812.4710 | this paper presents a brief overview of several studies concerning the indoorwireless communications at 60 ghz performed by the ietr. the characterizationand the modeling of the radio propagation channel are based on severalmeasurement campaigns realized with the channel sounder developed at ietr. sometypical residential environments were also simulated by ray tracing andgaussian beam tracking. the obtained results show a good agreement with thesimilar experimental results. currently, the ietr is developing a high datarate wireless communication system operating at 60 ghz. the single-carrierarchitecture of this system is also presented. | cs.ni | nan | 2008-12-26T00:00:00 | null | ['rakotondrainibe', 'zaharia', 'zein', 'lostanlen'] | https://arxiv.org/abs/0812.4710 | 644 | 250 |
a pseudopolynomial algorithm for alexandrov's theorem | 0812.5030 | alexandrov's theorem states that every metric with the global topology andlocal geometry required of a convex polyhedron is in fact the intrinsic metricof a unique convex polyhedron. recent work by bobenko and izmestiev describes adifferential equation whose solution leads to the polyhedron corresponding to agiven metric. we describe an algorithm based on this differential equation tocompute the polyhedron to arbitrary precision given the metric, and prove apseudopolynomial bound on its running time. along the way, we developpseudopolynomial algorithms for computing shortest paths and weighted delaunaytriangulations on a polyhedral surface, even when the surface edges are notshortest paths. | cs.cg | nan | 2008-12-30T00:00:00 | 2010-01-03T00:00:00 | ['kane', 'price', 'demaine'] | https://arxiv.org/abs/0812.5030 | 699 | 251 |
a novel clustering algorithm based upon games on evolving network | 0812.5064 | this paper introduces a model based upon games on an evolving network, anddevelops three clustering algorithms according to it. in the clusteringalgorithms, data points for clustering are regarded as players who can makedecisions in games. on the network describing relationships among data points,an edge-removing-and-rewiring (err) function is employed to explore in aneighborhood of a data point, which removes edges connecting to neighbors withsmall payoffs, and creates new edges to neighbors with larger payoffs. as such,the connections among data points vary over time. during the evolution ofnetwork, some strategies are spread in the network. as a consequence, clustersare formed automatically, in which data points with the same evolutionarilystable strategy are collected as a cluster, so the number of evolutionarilystable strategies indicates the number of clusters. moreover, the experimentalresults have demonstrated that data points in datasets are clustered reasonablyand efficiently, and the comparison with other algorithms also provides anindication of the effectiveness of the proposed algorithms. | cs.lg cs.cv cs.gt nlin.ao | 10.1016/j.eswa.2010.02.050 | 2008-12-30T00:00:00 | 2010-03-19T00:00:00 | ['li', 'chen', 'he', 'jiang'] | https://arxiv.org/abs/0812.5064 | 1,118 | 252 |
maximum entropy on compact groups | 0901.0015 | on a compact group the haar probability measure plays the role of uniformdistribution. the entropy and rate distortion theory for this uniformdistribution is studied. new results and simplified proofs on convergence ofconvolutions on compact groups are presented and they can be formulated asentropy increases to its maximum. information theoretic techniques and markovchains play a crucial role. the convergence results are also formulated viarate distortion functions. the rate of convergence is shown to be exponential. | cs.it math.it math.pr | 10.3390/e11020222 | 2008-12-30T00:00:00 | 2009-03-29T00:00:00 | ['harremoes'] | https://arxiv.org/abs/0901.0015 | 522 | 253 |
information inequalities for joint distributions, with interpretations and applications | 0901.0044 | upper and lower bounds are obtained for the joint entropy of a collection ofrandom variables in terms of an arbitrary collection of subset joint entropies.these inequalities generalize shannon's chain rule for entropy as well asinequalities of han, fujishige and shearer. a duality between the upper andlower bounds for joint entropy is developed. all of these results are shown tobe special cases of general, new results for submodular functions-- thus, theinequalities presented constitute a richly structured class of shannon-typeinequalities. the new inequalities are applied to obtain new results incombinatorics, such as bounds on the number of independent sets in an arbitrarygraph and the number of zero-error source-channel codes, as well as newdeterminantal inequalities in matrix theory. a new inequality for relativeentropies is also developed, along with interpretations in terms of hypothesistesting. finally, revealing connections of the results to literature ineconomics, computer science, and physics are explored. | cs.it math.co math.it math.pr | nan | 2008-12-30T00:00:00 | 2009-08-03T00:00:00 | ['madiman', 'tetali'] | https://arxiv.org/abs/0901.0044 | 1,031 | 254 |
towards the characterization of individual users through web analytics | 0901.0498 | we perform an analysis of the way individual users navigate in the web. wefocus primarily in the temporal patterns of they return to a given page. thereturn probability as a function of time as well as the distribution of timeintervals between consecutive visits are measured and found to be independentof the level of activity of single users. the results indicate a rich varietyof individual behaviors and seem to preclude the possibility of defining acharacteristic frequency for each user in his/her visits to a single site. | cs.hc cs.cy physics.soc-ph | 10.1007/978-3-642-02469-6_102 | 2009-01-05T00:00:00 | null | ['goncalves', 'ramasco'] | https://arxiv.org/abs/0901.0498 | 528 | 255 |
on the optimal convergence probability of univariate estimation of distribution algorithms | 0901.0597 | in this paper, we obtain bounds on the probability of convergence to theoptimal solution for the compact genetic algorithm (cga) and the populationbased incremental learning (pbil). we also give a sufficient condition forconvergence of these algorithms to the optimal solution and compute a range ofpossible values of the parameters of these algorithms for which they convergeto the optimal solution with a confidence level. | cs.ne cs.ai | nan | 2009-01-06T00:00:00 | 2010-09-13T00:00:00 | ['rastegar'] | https://arxiv.org/abs/0901.0597 | 424 | 256 |
multicasting correlated multi-source to multi-sink over a network | 0901.0608 | the problem of network coding with multicast of a single source to multisinkhas first been studied by ahlswede, cai, li and yeung in 2000, in which theyhave established the celebrated max-flow mini-cut theorem on non-physicalinformation flow over a network of independent channels. on the other hand, in1980, han has studied the case with correlated multisource and a single sinkfrom the viewpoint of polymatroidal functions in which a necessary andsufficient condition has been demonstrated for reliable transmission over thenetwork. this paper presents an attempt to unify both cases, which leads toestablish a necessary and sufficient condition for reliable transmission over anetwork multicasting correlated multisource to multisink. here, the problem ofseparation of source coding and channel coding is also discussed. | cs.it math.it | nan | 2009-01-06T00:00:00 | 2010-01-29T00:00:00 | ['han'] | https://arxiv.org/abs/0901.0608 | 823 | 257 |
simple channel coding bounds | 0901.0834 | new channel coding converse and achievability bounds are derived for a singleuse of an arbitrary channel. both bounds are expressed using a quantity calledthe "smooth 0-divergence", which is a generalization of renyi's divergence oforder 0. the bounds are also studied in the limit of large block-lengths. inparticular, they combine to give a general capacity formula which is equivalentto the one derived by verdu and han. | cs.it math.it | nan | 2009-01-07T00:00:00 | 2010-07-28T00:00:00 | ['wang', 'colbeck', 'renner'] | https://arxiv.org/abs/0901.0834 | 423 | 258 |
weighted well-covered graphs without cycles of length 4, 5, 6 and 7 | 0901.0858 | a graph is well-covered if every maximal independent set has the samecardinality. the recognition problem of well-covered graphs is known to beco-np-complete. let w be a weight function defined on the vertices of g. then gis w-well-covered if all maximal independent sets of g are of the same weight.the set of weight functions w for which a graph is w-well-covered is a vectorspace. we prove that finding the vector space of weight functions under whichan input graph is w-well-covered can be done in polynomial time, if the inputgraph does not contain cycles of length 4, 5, 6 and 7. | cs.dm cs.cc | nan | 2009-01-07T00:00:00 | 2010-09-16T00:00:00 | ['levit', 'tankus'] | https://arxiv.org/abs/0901.0858 | 585 | 259 |
when do nonlinear filters achieve maximal accuracy? | 0901.1084 | the nonlinear filter for an ergodic signal observed in white noise is said toachieve maximal accuracy if the stationary filtering error vanishes as thesignal to noise ratio diverges. we give a general characterization of themaximal accuracy property in terms of various systems theoretic notions. whenthe signal state space is a finite set explicit necessary and sufficientconditions are obtained, while the linear gaussian case reduces to a classicresult of kwakernaak and sivan (1972). | math.pr cs.it math.it | nan | 2009-01-08T00:00:00 | 2009-07-01T00:00:00 | ['van handel'] | https://arxiv.org/abs/0901.1084 | 487 | 260 |
novel architectures and algorithms for delay reduction in back-pressure scheduling and routing | 0901.1312 | the back-pressure algorithm is a well-known throughput-optimal algorithm.however, its delay performance may be quite poor even when the traffic load isnot close to network capacity due to the following two reasons. first, eachnode has to maintain a separate queue for each commodity in the network, andonly one queue is served at a time. second, the back-pressure routing algorithmmay route some packets along very long routes. in this paper, we presentsolutions to address both of the above issues, and hence, improve the delayperformance of the back-pressure algorithm. one of the suggested solutions alsodecreases the complexity of the queueing data structures to be maintained ateach node. | cs.ni | nan | 2009-01-09T00:00:00 | 2010-05-28T00:00:00 | ['bui', 'srikant', 'stolyar'] | https://arxiv.org/abs/0901.1312 | 693 | 261 |
multishot codes for network coding: bounds and a multilevel construction | 0901.1655 | the subspace channel was introduced by koetter and kschischang as an adequatemodel for the communication channel from the source node to a sink node of amulticast network that performs random linear network coding. so far, attentionhas been given to one-shot subspace codes, that is, codes that use the subspacechannel only once. in contrast, this paper explores the idea of using thesubspace channel more than once and investigates the so called multishotsubspace codes. we present definitions for the problem, a motivating example,lower and upper bounds for the size of codes, and a multilevel construction ofcodes based on block-coded modulation. | cs.it math.it | 10.1109/isit.2009.5205750 | 2009-01-12T00:00:00 | null | ['nobrega', 'uchoa-filho'] | https://arxiv.org/abs/0901.1655 | 649 | 262 |
pilot contamination and precoding in multi-cell tdd systems | 0901.1703 | this paper considers a multi-cell multiple antenna system with precoding usedat the base stations for downlink transmission. for precoding at the basestations, channel state information (csi) is essential at the base stations. apopular technique for obtaining this csi in time division duplex (tdd) systemsis uplink training by utilizing the reciprocity of the wireless medium. thispaper mathematically characterizes the impact that uplink training has on theperformance of such multi-cell multiple antenna systems. when non-orthogonaltraining sequences are used for uplink training, the paper shows that theprecoding matrix used by the base station in one cell becomes corrupted by thechannel between that base station and the users in other cells in anundesirable manner. this paper analyzes this fundamental problem of pilotcontamination in multi-cell systems. furthermore, it develops a new multi-cellmmse-based precoding method that mitigate this problem. in addition to being alinear precoding method, this precoding method has a simple closed-formexpression that results from an intuitive optimization problem formulation.numerical results show significant performance gains compared to certainpopular single-cell precoding methods. | cs.it math.it | nan | 2009-01-12T00:00:00 | 2010-06-29T00:00:00 | ['jose', 'ashikhmin', 'marzetta', 'vishwanath'] | https://arxiv.org/abs/0901.1703 | 1,239 | 263 |
interference avoidance game in the gaussian interference channel: sub-optimal and optimal schemes | 0901.1924 | this paper considers a distributed interference avoidance problem employingfrequency assignment in the gaussian interference channel (ic). we divide thecommon channel into several subchannels and each user chooses the subchannelwith less amount of interference from other users as the transmit channel. thismechanism named interference avoidance in this paper can be modeled as acompetitive game model. and a completely autonomous distributed iterativealgorithm called tdistributed interference avoidance algorithm (dia) is adoptedto achieve the nash equilibriumt (ne) of the game. due to the self-optimum, diais a sub-optimal algorithm. therefore, through introducing an optimalcompensation into the competitive game model, we successfully develop acompensation-based game model to approximate the optimal interference avoidanceproblem. moreover, an optimal algorithm called iterative optimal interferenceavoidance algorithm (ioia) is proposed to reach the optimality of theinterference avoidance scheme. we analyze the implementation complexities ofthe two algorithms. we also give the proof on the convergence of the proposedalgorithms. the performance upper bound and lower bound are also derived forthe proposed algorithms. the simulation results show that ioia does reach theoptimality under condition of interference avoidance mechanism. | cs.it math.it | nan | 2009-01-13T00:00:00 | 2010-03-22T00:00:00 | ['jing', 'bai', 'ma', 'li'] | https://arxiv.org/abs/0901.1924 | 1,344 | 264 |
concept-oriented model and query language | 0901.2224 | we describe a new approach to data modeling, called the concept-orientedmodel (com), and a novel concept-oriented query language (coql). the model isbased on three principles: duality principle postulates that any element is acouple consisting of one identity and one entity, inclusion principlepostulates that any element has a super-element, and order principle assumesthat any element has a number of greater elements within a partially orderedset. concept-oriented query language is based on a new data modeling construct,called concept, inclusion relation between concepts, and concept partialordering in which greater concepts are represented by their field types. it isdemonstrated how com and coql can be used to solve three general data modelingtasks: logical navigation, multidimensional analysis and inference. logicalnavigation is based on two operations of projection and de-projection.multidimensional analysis uses product operation for producing a cube fromlevel concepts chosen along the chosen dimension paths. inference is defined asa two-step procedure where input constraints are first propagated downwardsusing de-projection and then the constrained result is propagated upwards usingprojection. | cs.db | nan | 2009-01-15T00:00:00 | 2010-08-02T00:00:00 | ['savinov'] | https://arxiv.org/abs/0901.2224 | 1,217 | 265 |
distributed large scale network utility maximization | 0901.2684 | recent work by zymnis et al. proposes an efficient primal-dual interior-pointmethod, using a truncated newton method, for solving the network utilitymaximization (num) problem. this method has shown superior performance relativeto the traditional dual-decomposition approach. other recent work by bickson etal. shows how to compute efficiently and distributively the newton step, whichis the main computational bottleneck of the newton method, utilizing thegaussian belief propagation algorithm. in the current work, we combine both approaches to create an efficientdistributed algorithm for solving the num problem. unlike the work of zymnis,which uses a centralized approach, our new algorithm is easily distributed.using an empirical evaluation we show that our new method outperforms previousapproaches, including the truncated newton method and dual-decompositionmethods. as an additional contribution, this is the first work that evaluatesthe performance of the gaussian belief propagation algorithm vs. thepreconditioned conjugate gradient method, for a large scale problem. | cs.it cs.dc math.it math.oc | 10.1109/isit.2009.5205655 | 2009-01-18T00:00:00 | 2009-05-09T00:00:00 | ['bickson', 'tock', 'zymnis', 'boyd', 'dolev'] | https://arxiv.org/abs/0901.2684 | 1,082 | 266 |
a hybrid multicast-unicast infrastructure for efficient publish-subscribe in enterprise networks | 0901.2687 | one of the main challenges in building a large scale publish-subscribeinfrastructure in an enterprise network, is to provide the subscribers with therequired information, while minimizing the consumed host and network resources.typically, previous approaches utilize either ip multicast or point-to-pointunicast for efficient dissemination of the information. in this work, we propose a novel hybrid framework, which is a combination ofboth multicast and unicast data dissemination. our hybrid framework allows usto take the advantages of both multicast and unicast, while avoiding theirdrawbacks. we investigate several algorithms for computing the best mapping ofpublishers' transmissions into multicast and unicast transport. using extensive simulations, we show that our hybrid framework reducesconsumed host and network resources, outperforming traditional solutions. toinsure the subscribers interests closely resemble those of real-world settings,our simulations are based on stock market data and on recorded ibm webshperesubscriptions. | cs.ni cs.dc | 10.1145/1815695.1815722 | 2009-01-18T00:00:00 | 2010-04-12T00:00:00 | ['bickson', 'hoch', 'naaman', 'tock'] | https://arxiv.org/abs/0901.2687 | 1,046 | 267 |
peer-to-peer secure multi-party numerical computation facing malicious adversaries | 0901.2689 | we propose an efficient framework for enabling secure multi-party numericalcomputations in a peer-to-peer network. this problem arises in a range ofapplications such as collaborative filtering, distributed computation of trustand reputation, monitoring and other tasks, where the computing nodes isexpected to preserve the privacy of their inputs while performing a jointcomputation of a certain function. although there is a rich literature in thefield of distributed systems security concerning secure multi-partycomputation, in practice it is hard to deploy those methods in very large scalepeer-to-peer networks. in this work, we try to bridge the gap betweentheoretical algorithms in the security domain, and a practical peer-to-peerdeployment. we consider two security models. the first is the semi-honest model wherepeers correctly follow the protocol, but try to reveal private information. weprovide three possible schemes for secure multi-party numerical computation forthis model and identify a single light-weight scheme which outperforms theothers. using extensive simulation results over real internet topologies, wedemonstrate that our scheme is scalable to very large networks, with up tomillions of nodes. the second model we consider is the malicious peers model,where peers can behave arbitrarily, deliberately trying to affect the resultsof the computation as well as compromising the privacy of other peers. for thismodel we provide a fourth scheme to defend the execution of the computationagainst the malicious peers. the proposed scheme has a higher complexityrelative to the semi-honest model. overall, we provide the peer-to-peer networkdesigner a set of tools to choose from, based on the desired level of security. | cs.cr cs.ni | 10.1007/s12083-009-0051-9 | 2009-01-18T00:00:00 | null | ['bickson', 'reinman', 'dolev', 'pinkas'] | https://arxiv.org/abs/0901.2689 | 1,743 | 268 |
language recognition by generalized quantum finite automata with unbounded error (abstract & poster) | 0901.2703 | in this note, we generalize the results of arxiv:0901.2703v1 we show that allone-way quantum finite automaton (qfa) models that are at least as general askondacs-watrous qfa's are equivalent in power to classical probabilistic finiteautomata in this setting. unlike their probabilistic counterparts, allowing thetape head to stay put for some steps during its traversal of the input doesenlarge the class of languages recognized by such qfa's with unbounded error.(note that, the proof of theorem 1 in the abstract was presented in theprevious version (arxiv:0901.2703v1).) | cs.cc | nan | 2009-01-18T00:00:00 | 2010-09-17T00:00:00 | ['yakaryilmaz', 'say'] | https://arxiv.org/abs/0901.2703 | 573 | 269 |
an extension of the order bound for ag codes | 0901.2864 | the most successful method to obtain lower bounds for the minimum distance ofan algebraic geometric code is the order bound, which generalizes the feng-raobound. we provide a significant extension of the bound that improves the orderbounds by beelen and by duursma and park. we include an exhaustive numericalcomparison of the different bounds for 10168 two-point codes on the suzukicurve of genus g=124 over the field of 32 elements. keywords: algebraicgeometric code, order bound, suzuki curve. | math.nt cs.it math.ag math.it | 10.1007/978-3-642-02181-7 | 2009-01-19T00:00:00 | null | ['duursma', 'kirov'] | https://arxiv.org/abs/0901.2864 | 496 | 270 |
entropy measures vs. algorithmic information | 0901.2903 | algorithmic entropy and shannon entropy are two conceptually differentinformation measures, as the former is based on size of programs and the laterin probability distributions. however, it is known that, for any recursiveprobability distribution, the expected value of algorithmic entropy equals itsshannon entropy, up to a constant that depends only on the distribution. westudy if a similar relationship holds for r\'{e}nyi and tsallis entropies oforder $\alpha$, showing that it only holds for r\'{e}nyi and tsallis entropiesof order 1 (i.e., for shannon entropy). regarding a time bounded analoguerelationship, we show that, for distributions such that the cumulativeprobability distribution is computable in time $t(n)$, the expected value oftime-bounded algorithmic entropy (where the alloted time is $nt(n)\log(nt(n))$) is in the same range as the unbounded version. so, for thesedistributions, shannon entropy captures the notion of computationallyaccessible information. we prove that, for universal time-bounded distribution$\m^t(x)$, tsallis and r\'{e}nyi entropies converge if and only if $\alpha$ isgreater than 1. | cs.it cs.cc math.it | nan | 2009-01-19T00:00:00 | 2010-06-02T00:00:00 | ['teixeira', 'souto', 'matos', 'antunes'] | https://arxiv.org/abs/0901.2903 | 1,128 | 271 |
on linear balancing sets | 0901.3170 | let n be an even positive integer and f be the field \gf(2). a word in f^n iscalled balanced if its hamming weight is n/2. a subset c \subseteq f^n$ iscalled a balancing set if for every word y \in f^n there is a word x \in c suchthat y + x is balanced. it is shown that most linear subspaces of f^n ofdimension slightly larger than 3/2\log_2(n) are balancing sets. ageneralization of this result to linear subspaces that are "almost balancing"is also presented. on the other hand, it is shown that the problem of decidingwhether a given set of vectors in f^n spans a balancing set, is np-hard. anapplication of linear balancing sets is presented for designing efficienterror-correcting coding schemes in which the codewords are balanced. | cs.it cs.dm math.it | 10.3934/amc.2010.4.345 | 2009-01-21T00:00:00 | 2009-10-29T00:00:00 | ['mazumdar', 'roth', 'vontobel'] | https://arxiv.org/abs/0901.3170 | 738 | 272 |
a low density lattice decoder via non-parametric belief propagation | 0901.3197 | the recent work of sommer, feder and shalvi presented a new family of codescalled low density lattice codes (ldlc) that can be decoded efficiently andapproach the capacity of the awgn channel. a linear time iterative decodingscheme which is based on a message-passing formulation on a factor graph isgiven. in the current work we report our theoretical findings regarding the relationbetween the ldlc decoder and belief propagation. we show that the ldlc decoderis an instance of non-parametric belief propagation and further connect it tothe gaussian belief propagation algorithm. our new results enable borrowingknowledge from the non-parametric and gaussian belief propagation domains intothe ldlc domain. specifically, we give more general convergence conditions forconvergence of the ldlc decoder (under the same assumptions of the originalldlc convergence analysis). we discuss how to extend the ldlc decoder fromlatin square to full rank, non-square matrices. we propose an efficientconstruction of sparse generator matrix and its matching decoder. we reportpreliminary experimental results which show our decoder has comparable symbolto error rate compared to the original ldlc decoder.% | cs.it math.it | 10.1109/allerton.2009.5394798 | 2009-01-21T00:00:00 | 2009-10-07T00:00:00 | ['bickson', 'ihler', 'dolev'] | https://arxiv.org/abs/0901.3197 | 1,196 | 273 |
computing rooted and unrooted maximum consistent supertrees | 0901.3299 | a chief problem in phylogenetics and database theory is the computation of amaximum consistent tree from a set of rooted or unrooted trees. a standardinput are triplets, rooted binary trees on three leaves, or quartets, unrootedbinary trees on four leaves. we give exact algorithms constructing rooted andunrooted maximum consistent supertrees in time o(2^n n^5 m^2 log(m)) for a setof m triplets (quartets), each one distinctly leaf-labeled by some subset of nlabels. the algorithms extend to weighted triplets (quartets). we furtherpresent fast exact algorithms for constructing rooted and unrooted maximumconsistent trees in polynomial space. finally, for a set t of m rooted orunrooted trees with maximum degree d and distinctly leaf-labeled by some subsetof a set l of n labels, we compute, in o(2^{md} n^m m^5 n^6 log(m)) time, atree distinctly leaf-labeled by a maximum-size subset x of l that all trees int, when restricted to x, are consistent with. | cs.dm cs.ds | nan | 2009-01-21T00:00:00 | 2010-05-28T00:00:00 | ['van iersel', 'mnich'] | https://arxiv.org/abs/0901.3299 | 958 | 274 |
a boundary approximation algorithm for distributed sensor networks | 0901.3384 | we present an algorithm for boundary approximation in locally-linked sensornetworks that communicate with a remote monitoring station. delaunaytriangulations and voronoi diagrams are used to generate a sensor communicationnetwork and define boundary segments between sensors, respectively. theproposed algorithm reduces remote station communication by approximatingboundaries via a decentralized computation executed within the sensor network.moreover, the algorithm identifies boundaries based on differences betweenneighboring sensor readings, and not absolute sensor values. an analysis of thebandwidth consumption of the algorithm is presented and compared to two naiveapproaches. the proposed algorithm reduces the amount of remote communication(compared to the naive approaches) and becomes increasingly useful in networkswith more nodes. | cs.dc | nan | 2009-01-21T00:00:00 | null | ['ham', 'rodriguez'] | https://arxiv.org/abs/0901.3384 | 844 | 275 |
symmetric tensor decomposition | 0901.3706 | we present an algorithm for decomposing a symmetric tensor, of dimension nand order d as a sum of rank-1 symmetric tensors, extending the algorithm ofsylvester devised in 1886 for binary forms. we recall the correspondencebetween the decomposition of a homogeneous polynomial in n variables of totaldegree d as a sum of powers of linear forms (waring's problem), incidenceproperties on secant varieties of the veronese variety and the representationof linear forms as a linear combination of evaluations at distinct points. thenwe reformulate sylvester's approach from the dual point of view. exploitingthis duality, we propose necessary and sufficient conditions for the existenceof such a decomposition of a given rank, using the properties of hankel (andquasi-hankel) matrices, derived from multivariate polynomials and normal formcomputations. this leads to the resolution of polynomial equations of smalldegree in non-generic cases. we propose a new algorithm for symmetric tensordecomposition, based on this characterization and on linear algebracomputations with these hankel matrices. the impact of this contribution istwo-fold. first it permits an efficient computation of the decomposition of anytensor of sub-generic rank, as opposed to widely used iterative algorithms withunproved global convergence (e.g. alternate least squares or gradientdescents). second, it gives tools for understanding uniqueness conditions, andfor detecting the rank. | cs.sc math.ag | nan | 2009-01-23T00:00:00 | 2009-01-25T00:00:00 | ['brachat', 'comon', 'mourrain', 'tsigaridas'] | https://arxiv.org/abs/0901.3706 | 1,455 | 276 |
remembering what we like: toward an agent-based model of web traffic | 0901.3839 | analysis of aggregate web traffic has shown that pagerank is a poor model ofhow people actually navigate the web. using the empirical traffic patternsgenerated by a thousand users over the course of two months, we characterizethe properties of web traffic that cannot be reproduced by markovian models, inwhich destinations are independent of past decisions. in particular, we showthat the diversity of sites visited by individual users is smaller and morebroadly distributed than predicted by the pagerank model; that link traffic ismore broadly distributed than predicted; and that the time between consecutivevisits to the same site by a user is less broadly distributed than predicted.to account for these discrepancies, we introduce a more realistic navigationmodel in which agents maintain individual lists of bookmarks that are used asteleportation targets. the model can also account for branching, a trafficproperty caused by browser features such as tabs and the back button. the modelreproduces aggregate traffic patterns such as site popularity, while alsogenerating more accurate predictions of diversity, link traffic, and returntime distributions. this model for the first time allows us to capture theextreme heterogeneity of aggregate traffic measurements while explaining themore narrowly focused browsing patterns of individual users. | cs.hc cs.cy cs.ir cs.ma physics.soc-ph | nan | 2009-01-24T00:00:00 | null | ['goncalves', 'meiss', 'ramasco', 'flammini', 'menczer'] | https://arxiv.org/abs/0901.3839 | 1,353 | 277 |
distributed lossy averaging | 0901.4134 | an information theoretic formulation of the distributed averaging problempreviously studied in computer science and control is presented. we assume anetwork with m nodes each observing a wgn source. the nodes communicate andperform local processing with the goal of computing the average of the sourcesto within a prescribed mean squared error distortion. the network ratedistortion function r^*(d) for a 2-node network with correlated gaussiansources is established. a general cutset lower bound on r^*(d) is establishedand shown to be achievable to within a factor of 2 via a centralized protocolover a star network. a lower bound on the network rate distortion function fordistributed weighted-sum protocols, which is larger in order than the cutsetbound by a factor of log m is established. an upper bound on the network ratedistortion function for gossip-base weighted-sum protocols, which is only loglog m larger in order than the lower bound for a complete graph network, isestablished. the results suggest that using distributed protocols results in afactor of log m increase in order relative to centralized protocols. | cs.it math.it | nan | 2009-01-26T00:00:00 | 2010-03-02T00:00:00 | ['su', 'gamal'] | https://arxiv.org/abs/0901.4134 | 1,127 | 278 |
fixing convergence of gaussian belief propagation | 0901.4192 | gaussian belief propagation (gabp) is an iterative message-passing algorithmfor inference in gaussian graphical models. it is known that when gabpconverges it converges to the correct map estimate of the gaussian randomvector and simple sufficient conditions for its convergence have beenestablished. in this paper we develop a double-loop algorithm for forcingconvergence of gabp. our method computes the correct map estimate even in caseswhere standard gabp would not have converged. we further extend thisconstruction to compute least-squares solutions of over-constrained linearsystems. we believe that our construction has numerous applications, since thegabp algorithm is linked to solution of linear systems of equations, which is afundamental problem in computer science and engineering. as a case study, wediscuss the linear detection problem. we show that using our new construction,we are able to force convergence of montanari's linear detection algorithm, incases where it would originally fail. as a consequence, we are able to increasesignificantly the number of users that can transmit concurrently. | cs.it cs.lg math.it stat.co | 10.1109/isit.2009.5205777 | 2009-01-27T00:00:00 | 2009-07-03T00:00:00 | ['johnson', 'bickson', 'dolev'] | https://arxiv.org/abs/0901.4192 | 1,115 | 279 |
physarum boats: if plasmodium sailed it would never leave a port | 0901.4466 | plasmodium of \emph{physarum polycephalum} is a single huge (visible by nakedeye) cell with myriad of nuclei. the plasmodium is a promising substrate fornon-classical, nature-inspired, computing devices. it is capable forapproximation of shortest path, computation of planar proximity graphs andplane tessellations, primitive memory and decision-making. the uniqueproperties of the plasmodium make it an ideal candidate for a role of amorphousbiological robots with massive parallel information processing and distributedinputs and outputs. we show that when adhered to light-weight object resting ona water surface the plasmodium can propel the object by oscillating itsprotoplasmic pseudopodia. in experimental laboratory conditions andcomputational experiments we study phenomenology of the plasmodium-floatersystem, and possible mechanisms of controlling motion of objects propelled byon board plasmodium. | cs.ro q-bio.cb | 10.1080/11762320902863890 | 2009-01-28T00:00:00 | null | ['adamatzky'] | https://arxiv.org/abs/0901.4466 | 909 | 280 |
space efficient secret sharing: a recursive approach | 0901.4814 | this paper presents a recursive secret sharing technique that distributes k-1secrets of length b each into n shares such that each share is effectively oflength (n/(k-1))*b and any k pieces suffice for reconstructing all the k-1secrets. since n/(k-1) is near the optimal factor of n/k, and can be chosen tobe close to 1, the proposed technique is space efficient. furthermore, eachshare is information theoretically secure, i.e. it does not depend on anyunproven assumption of computational intractability. such a recursive techniquehas potential applications in secure and reliable storage of information on theweb and in sensor networks. | cs.cr | nan | 2009-01-29T00:00:00 | null | ['parakh', 'kak'] | https://arxiv.org/abs/0901.4814 | 639 | 281 |
a mathematical basis for the chaining of lossy interface adapters | 0901.4835 | despite providing similar functionality, multiple network services mayrequire the use of different interfaces to access the functionality, and thisproblem will only get worse with the widespread deployment of ubiquitouscomputing environments. one way around this problem is to use interfaceadapters that adapt one interface into another. chaining these adapters allowsflexible interface adaptation with fewer adapters, but the loss incurred due toimperfect interface adaptation must be considered. this paper outlines amathematical basis for analyzing the chaining of lossy interface adapters. wealso show that the problem of finding an optimal interface adapter chain isnp-complete. | cs.dm cs.dc cs.se | 10.1049/iet-sen.2009.0019 | 2009-01-30T00:00:00 | 2010-02-09T00:00:00 | ['chung', 'lee'] | https://arxiv.org/abs/0901.4835 | 683 | 282 |
a historical perspective on developing foundations iinfo(tm) information systems: iconsult(tm) and ientertain(tm) apps using idescribers(tm) information integration for iorgs(tm) information systems | 0901.4934 | technology now at hand can integrate all kinds of digital information forindividuals, groups, and organizations so their information usefully linkstogether. iinfo(tm) information integration works by making connectionsincluding examples like the following: - a statistical connection between "being in a traffic jam" and "driving indowntown trenton between 5pm and 6pm on a weekday." - a terminological connection between "msr" and "microsoft research." - a causal connection between "joining a group" and "being a member of thegroup." - a syntactic connection between "a pin dropped" and "a dropped pin." - a biological connection between "a dolphin" and "a mammal". - a demographic connection between "undocumented residents of california" and"7% of the population of california." - a geographical connection between "leeds" and "england." - a temporal connection between "turning on a computer" and "joining anon-line discussion." by making these connections, iinfo offers tremendous value for individuals,families, groups, and organizations in making more effective use of informationtechnology. in practice, integrated information is invariably pervasively inconsistent.therefore iinfo must be able to make connections even in the face ofinconsistency. the business of iinfo is not to make difficult decisions likedeciding the ultimate truth or probability of propositions. instead it providesmeans for processing information and carefully recording its provenanceincluding arguments (including arguments about arguments) for and againstpropositions that is used by iconsult(tm) and ientertain(tm) apps in iorgs(tm)information systems. a historical perspective on the above questions is highly pertinent to thecurrent quest to develop foundations for privacy-friendly client-cloudcomputing. | cs.dc cs.db cs.lo | nan | 2009-01-30T00:00:00 | 2010-10-04T00:00:00 | ['hewitt'] | https://arxiv.org/abs/0901.4934 | 1,806 | 283 |
the complexity of nash equilibria in simple stochastic multiplayer games | 0902.0101 | we analyse the computational complexity of finding nash equilibria in simplestochastic multiplayer games. we show that restricting the search space toequilibria whose payoffs fall into a certain interval may lead toundecidability. in particular, we prove that the following problem isundecidable: given a game g, does there exist a pure-strategy nash equilibriumof g where player 0 wins with probability 1. moreover, this problem remainsundecidable if it is restricted to strategies with (unbounded) finite memory.however, if mixed strategies are allowed, decidability remains an open problem.one way to obtain a provably decidable variant of the problem is restrictingthe strategies to be positional or stationary. for the complexity of these twoproblems, we obtain a common lower bound of np and upper bounds of np andpspace respectively. | cs.gt cs.cc cs.lo | 10.1007/978-3-642-02930-1_25 | 2009-02-02T00:00:00 | 2009-04-10T00:00:00 | ['ummels', 'wojtczak'] | https://arxiv.org/abs/0902.0101 | 840 | 284 |
an optimal multi-unit combinatorial procurement auction with single minded bidders | 0902.0524 | the current art in optimal combinatorial auctions is limited to handling thecase of single units of multiple items, with each bidder bidding on exactly onebundle (single minded bidders). this paper extends the current art by proposingan optimal auction for procuring multiple units of multiple items when thebidders are single minded. the auction minimizes the cost of procurement whilesatisfying bayesian incentive compatibility and interim individual rationality.under appropriate regularity conditions, this optimal auction also satisfiesdominant strategy incentive compatibility. | cs.gt | nan | 2009-02-03T00:00:00 | 2010-04-24T00:00:00 | ['gujar', 'narahari'] | https://arxiv.org/abs/0902.0524 | 583 | 285 |
a unified perspective on parity- and syndrome-based binary data compression using off-the-shelf turbo codecs | 0902.0562 | we consider the problem of compressing memoryless binary data with or withoutside information at the decoder. we review the parity- and the syndrome-basedapproaches and discuss their theoretical limits, assuming that there exists avirtual binary symmetric channel between the source and the side information,and that the source is not necessarily uniformly distributed. we take afactor-graph-based approach in order to devise how to take full advantage ofthe ready-available iterative decoding procedures when turbo codes areemployed, in both a parity- or a syndrome-based fashion. we end up obtaining aunified decoder formulation that holds both for error-free and for error-proneencoder-to-decoder transmission over generic channels. to support thetheoretical results, the different compression systems analyzed in the paperare also experimentally tested. they are compared against several differentapproaches proposed in literature and shown to be competitive in a variety ofcases. | cs.it math.it | nan | 2009-02-03T00:00:00 | 2010-08-02T00:00:00 | ['cappellari', 'de giusti'] | https://arxiv.org/abs/0902.0562 | 984 | 286 |
interference and congestion aware gradient broadcasting routing for wireless sensor networks | 0902.0746 | this paper addresses the problem of reliable transmission of data through asensor network. we focus on networks rapidly deployed in harsh environments.for these networks, important design requirements are fast data transmissionand rapid network setup, as well as minimized energy consumption for increasednetwork lifetime. we propose a novel broadcasting solution that accounts forthe interference impact and the congestion level of the channel, in order toimprove robustness, energy consumption and delay performance, compared to abenchmark routing protocol, the grab algorithm. three solutions are proposed:p-grab, a probabilistic routing algorithm for interference mitigation, u-grab,a utility-based algorithm that adjusts to real-time congestion and up-grab, acombination of p-grab and u-grab. it is shown that p-grab provides the bestperformance for geometry-aware networks while the u-grab approach is the bestoption for unreliable and unstable networks. | cs.ni | nan | 2009-02-04T00:00:00 | 2010-01-06T00:00:00 | ['jaffrès-runser', 'comaniciu', 'gorce'] | https://arxiv.org/abs/0902.0746 | 960 | 287 |
a multiobjective optimization framework for routing in wireless ad hoc networks | 0902.0782 | wireless ad hoc networks are seldom characterized by one single performancemetric, yet the current literature lacks a flexible framework to assist incharacterizing the design tradeoffs in such networks. in this work, we addressthis problem by proposing a new modeling framework for routing in ad hocnetworks, which used in conjunction with metaheuristic multiobjective searchalgorithms, will result in a better understanding of network behavior andperformance when multiple criteria are relevant. our approach is to take aholistic view of the network that captures the cross-interactions amonginterference management techniques implemented at various layers of theprotocol stack. the resulting framework is a complex multiobjectiveoptimization problem that can be efficiently solved through existingmultiobjective search techniques. in this contribution, we present the paretooptimal sets for an example sensor network when delay, robustness and energyare considered. the aim of this paper is to present the framework and hence forconciseness purposes, the multiobjective optimization search is not developedherein. | cs.ni cs.pf | nan | 2009-02-04T00:00:00 | 2010-01-06T00:00:00 | ['jaffrès-runser', 'comaniciu', 'gorce'] | https://arxiv.org/abs/0902.0782 | 1,115 | 288 |
on the gaussian mac with imperfect feedback | 0902.0947 | new achievable rate regions are derived for the two-user additive whitegaussian multiple-access channel with noisy feedback. the regions exhibit thefollowing two properties. irrespective of the (finite) gaussian feedback-noisevariances, the regions include rate points that lie outside the no-feedbackcapacity region, and when the feedback-noise variances tend to 0 the regionsconverge to the perfect-feedback capacity region. the new achievable regionsalso apply to the partial-feedback setting where one of the transmitters has anoisy feedback link and the other transmitter has no feedback at all. again,irrespective of the (finite) noise variance on the feedback link, the regionsinclude rate points that lie outside the no-feedback capacity region. moreover,in the case of perfect partial feedback, i.e., where the only feedback link isnoise-free, for certain channel parameters the new regions include rate pointsthat lie outside the cover-leung region. this answers in the negative thequestion posed by van der meulen as to whether the cover-leung region equalsthe capacity region of the gaussian multiple-access channel with perfectpartial feedback. finally, we propose new achievable regions also for a settingwhere the receiver is cognizant of the realizations of the noise sequences onthe feedback links. | cs.it math.it | nan | 2009-02-05T00:00:00 | 2010-04-12T00:00:00 | ['lapidoth', 'wigger'] | https://arxiv.org/abs/0902.0947 | 1,315 | 289 |
compilation of extended recursion in call-by-value functional languages | 0902.1257 | this paper formalizes and proves correct a compilation scheme formutually-recursive definitions in call-by-value functional languages. thisscheme supports a wider range of recursive definitions than previous methods.we formalize our technique as a translation scheme to a lambda-calculusfeaturing in-place update of memory blocks, and prove the translation to becorrect. | cs.pl | 10.1007/s10990-009-9042-z | 2009-02-07T00:00:00 | null | ['hirschowitz', 'leroy', 'wells'] | https://arxiv.org/abs/0902.1257 | 370 | 290 |
fundamental delay bounds in peer-to-peer chunk-based real-time streaming systems | 0902.1394 | this paper addresses the following foundational question: what is the maximumtheoretical delay performance achievable by an overlay peer-to-peer streamingsystem where the streamed content is subdivided into chunks? as shown in thispaper, when posed for chunk-based systems, and as a consequence of thestore-and-forward way in which chunks are delivered across the network, thisquestion has a fundamentally different answer with respect to the case ofsystems where the streamed content is distributed through one or more flows(sub-streams). to circumvent the complexity emerging when directly dealing withdelay, we express performance in term of a convenient metric, called "streamdiffusion metric". we show that it is directly related to the end-to-endminimum delay achievable in a p2p streaming network. in a homogeneous scenario,we derive a performance bound for such metric, and we show how this boundrelates to two fundamental parameters: the upload bandwidth available at eachnode, and the number of neighbors a node may deliver chunks to. in this bound,k-step fibonacci sequences do emerge, and appear to set the fundamental lawsthat characterize the optimal operation of chunk-based systems. | cs.pf cs.mm | nan | 2009-02-09T00:00:00 | 2010-02-01T00:00:00 | ['bianchi', 'melazzi', 'bracciale', 'piccolo', 'salsano'] | https://arxiv.org/abs/0902.1394 | 1,198 | 291 |
on the bures volume of separable quantum states | 0902.1505 | we obtain two sided estimates for the bures volume of an arbitrary subset ofthe set of $n\times n$ density matrices, in terms of the hilbert-schmidt volumeof that subset. for general subsets, our results are essentially optimal (forlarge $n$). as applications, we derive in particular nontrivial lower and upperbounds for the bures volume of sets of separable states and for sets of stateswith positive partial transpose. pacs numbers: 02.40.ft, 03.65.db, 03.65.ud, 03.67.mn | quant-ph cs.it math.fa math.it math.mg | 10.1063/1.3187216 | 2009-02-09T00:00:00 | 2009-05-21T00:00:00 | ['ye'] | https://arxiv.org/abs/0902.1505 | 475 | 292 |
feature hashing for large scale multitask learning | 0902.2206 | empirical evidence suggests that hashing is an effective strategy fordimensionality reduction and practical nonparametric estimation. in this paperwe provide exponential tail bounds for feature hashing and show that theinteraction between random subspaces is negligible with high probability. wedemonstrate the feasibility of this approach with experimental results for anew use case -- multitask learning with hundreds of thousands of tasks. | cs.ai | nan | 2009-02-12T00:00:00 | 2010-02-27T00:00:00 | ['weinberger', 'dasgupta', 'attenberg', 'langford', 'smola'] | https://arxiv.org/abs/0902.2206 | 442 | 293 |
inseparability and strong hypotheses for disjoint np pairs | 0902.2674 | this paper investigates the existence of inseparable disjoint pairs of nplanguages and related strong hypotheses in computational complexity. our maintheorem says that, if np does not have measure 0 in exp, then there existdisjoint pairs of np languages that are p-inseparable, in facttime(2^(n^k))-inseparable. we also relate these conditions to strong hypothesesconcerning randomness and genericity of disjoint pairs. | cs.cc | nan | 2009-02-16T00:00:00 | 2010-02-03T00:00:00 | ['fortnow', 'lutz', 'mayordomo'] | https://arxiv.org/abs/0902.2674 | 419 | 294 |
a formal calculus on the riordan near algebra | 0902.2853 | the riordan group is the semi-direct product of a multiplicative group ofinvertible series and a group, under substitution, of non units. the riordannear algebra, as introduced in this paper, is the cartesian product of thealgebra of formal power series and its principal ideal of non units, equippedwith a product that extends the multiplication of the riordan group. the lateris naturally embedded as a subgroup of units into the former. in this paper, weprove the existence of a formal calculus on the riordan algebra. this formalcalculus plays a role similar to those of holomorphic calculi in the banach orfr\'echet algebras setting, but without the constraint of a radius ofconvergence. using this calculus, we define \emph{en passant} a notion ofgeneralized powers in the riordan group. | cs.sc math.co | nan | 2009-02-17T00:00:00 | 2010-03-04T00:00:00 | ['poinsot', 'duchamp'] | https://arxiv.org/abs/0902.2853 | 793 | 295 |
error-correcting tournaments | 0902.3176 | we present a family of pairwise tournaments reducing $k$-class classificationto binary classification. these reductions are provably robust against aconstant fraction of binary errors. the results improve on the pecocconstruction \cite{secoc} with an exponential improvement in computation, from$o(k)$ to $o(\log_2 k)$, and the removal of a square root in the regretdependence, matching the best possible computation and regret up to a constant. | cs.ai cs.lg | nan | 2009-02-18T00:00:00 | 2010-02-03T00:00:00 | ['beygelzimer', 'langford', 'ravikumar'] | https://arxiv.org/abs/0902.3176 | 445 | 296 |
on optimum end-to-end distortion in mimo systems | 0902.3595 | this paper presents the joint impact of the numbers of antennas,source-to-channel bandwidth ratio and spatial correlation on the optimumexpected end-to-end distortion in an outage-free mimo system. in particular,based on an analytical expression valid for any snr, a closed-form expressionof the optimum asymptotic expected end-to-end distortion valid for high snr isderived. it is comprised of the optimum distortion exponent and themultiplicative optimum distortion factor. demonstrated by the simulationresults, the analysis on the joint impact of the optimum distortion exponentand the optimum distortion factor explains the behavior of the optimum expectedend-to-end distortion varying with the numbers of antennas, source-to-channelbandwidth ratio and spatial correlation. it is also proved that as thecorrelation tends to zero, the optimum asymptotic expected end-to-enddistortion in the setting of correlated channel approaches that in the settingof uncorrelated channel. the results in this paper could be performanceobjectives for analog-source transmission systems. to some extend, they areinstructive for system design. | cs.it math.it | nan | 2009-02-20T00:00:00 | 2010-01-14T00:00:00 | ['chen', 'slock'] | https://arxiv.org/abs/0902.3595 | 1,131 | 297 |
a self-contained and easily accessible discussion of the method of descente infinie and fermat's only explicitly known proof by descente infinie | 0902.3623 | we present the only proof of pierre fermat by descente infinie that is knownto exist today. as the text of its latin original requires active mathematicalinterpretation, it is more a proof sketch than a proper mathematical proof. wediscuss descente infinie from the mathematical, logical, historical,linguistic, and refined logic-historical points of view. we provide therequired preliminaries from number theory and develop a self-contained proof ina modern form, which nevertheless is intended to follow fermat's ideas closely.we then annotate an english translation of fermat's original proof with termsfrom the modern proof. including all important facts, we present a concise andself-contained discussion of fermat's proof sketch, which is easily accessibleto laymen in number theory as well as to laymen in the history of mathematics,and which provides new clarification of the method of descente infinie to theexperts in these fields. last but not least, this paper fills a gap regardingthe easy accessibility of the subject. | cs.ai cs.lo | nan | 2009-02-20T00:00:00 | 2010-12-14T00:00:00 | ['wirth'] | https://arxiv.org/abs/0902.3623 | 1,032 | 298 |
distributed agreement in tile self-assembly | 0902.3631 | laboratory investigations have shown that a formal theory of fault-tolerancewill be essential to harness nanoscale self-assembly as a medium ofcomputation. several researchers have voiced an intuition that self-assemblyphenomena are related to the field of distributed computing. this paperformalizes some of that intuition. we construct tile assembly systems that areable to simulate the solution of the wait-free consensus problem in somedistributed systems. (for potential future work, this may allow binding errorsin tile assembly to be analyzed, and managed, with positive results indistributed computing, as a "blockage" in our tile assembly model is analogousto a crash failure in a distributed computing model.) we also define astrengthening of the "traditional" consensus problem, to make explicit anexpectation about consensus algorithms that is often implicit in distributedcomputing literature. we show that solution of this strengthened consensusproblem can be simulated by a two-dimensional tile assembly model only for twoprocesses, whereas a three-dimensional tile assembly model can simulate itssolution in a distributed system with any number of processes. | cs.dc cs.ne | nan | 2009-02-20T00:00:00 | 2010-07-16T00:00:00 | ['sterling'] | https://arxiv.org/abs/0902.3631 | 1,174 | 299 |