The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code:   DatasetGenerationError
Exception:    ArrowInvalid
Message:      Failed to parse string: 'quant-ph/9912100' as a scalar of type double
Traceback:    Traceback (most recent call last):
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 2011, in _prepare_split_single
                  writer.write_table(table)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 585, in write_table
                  pa_table = table_cast(pa_table, self._schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2302, in table_cast
                  return cast_table_to_schema(table, schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2261, in cast_table_to_schema
                  arrays = [cast_array_to_feature(table[name], feature) for name, feature in features.items()]
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2261, in <listcomp>
                  arrays = [cast_array_to_feature(table[name], feature) for name, feature in features.items()]
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1802, in wrapper
                  return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1802, in <listcomp>
                  return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2116, in cast_array_to_feature
                  return array_cast(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1804, in wrapper
                  return func(array, *args, **kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1963, in array_cast
                  return array.cast(pa_type)
                File "pyarrow/array.pxi", line 996, in pyarrow.lib.Array.cast
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pyarrow/compute.py", line 404, in cast
                  return call_function("cast", [arr], options, memory_pool)
                File "pyarrow/_compute.pyx", line 590, in pyarrow._compute.call_function
                File "pyarrow/_compute.pyx", line 385, in pyarrow._compute.Function.call
                File "pyarrow/error.pxi", line 154, in pyarrow.lib.pyarrow_internal_check_status
                File "pyarrow/error.pxi", line 91, in pyarrow.lib.check_status
              pyarrow.lib.ArrowInvalid: Failed to parse string: 'quant-ph/9912100' as a scalar of type double
              
              The above exception was the direct cause of the following exception:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1529, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1154, in convert_to_parquet
                  builder.download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1027, in download_and_prepare
                  self._download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1122, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1882, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 2038, in _prepare_split_single
                  raise DatasetGenerationError("An error occurred while generating the dataset") from e
              datasets.exceptions.DatasetGenerationError: An error occurred while generating the dataset

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

id
float64
submitter
string
title
string
categories
string
abstract
string
labels
string
domain
string
704.0002
Louis Theran
Sparsity-certifying Graph Decompositions
math.CO cs.CG
We describe a new algorithm, the $(k,\ell)$-pebble game with colors, and use it obtain a characterization of the family of $(k,\ell)$-sparse graphs and algorithmic solutions to a family of problems concerning tree decompositions of graphs. Special instances of sparse graphs appear in rigidity theory and have received...
Combinatorics, Computational Geometry
Mathematics
704.0046
Denes Petz
A limit relation for entropy and channel capacity per unit cost
quant-ph cs.IT math.IT
In a quantum mechanical model, Diosi, Feldmann and Kosloff arrived at a conjecture stating that the limit of the entropy of certain mixtures is the relative entropy as system size goes to infinity. The conjecture is proven in this paper for density matrices. The first proof is analytic and uses the quantum law of lar...
Quantum Physics, Information Theory, Information Theory
Physics
704.0047
Igor Grabec
Intelligent location of simultaneously active acoustic emission sources: Part I
cs.NE cs.AI
The intelligent acoustic emission locator is described in Part I, while Part II discusses blind source separation, time delay estimation and location of two simultaneously active continuous acoustic emission sources. The location of acoustic emission on complicated aircraft frame structures is a difficult problem o...
Neural and Evolutionary Computing, Artificial Intelligence
Computer Science
704.005
Igor Grabec
Intelligent location of simultaneously active acoustic emission sources: Part II
cs.NE cs.AI
Part I describes an intelligent acoustic emission locator, while Part II discusses blind source separation, time delay estimation and location of two continuous acoustic emission sources. Acoustic emission (AE) analysis is used for characterization and location of developing defects in materials. AE sources often g...
Neural and Evolutionary Computing, Artificial Intelligence
Computer Science
704.0062
Tom\'a\v{s} Vina\v{r}
On-line Viterbi Algorithm and Its Relationship to Random Walks
cs.DS
In this paper, we introduce the on-line Viterbi algorithm for decoding hidden Markov models (HMMs) in much smaller than linear space. Our analysis on two-state HMMs suggests that the expected maximum memory used to decode sequence of length $n$ with $m$-state HMM can be as low as $\Theta(m\log n)$, without a signific...
Data Structures and Algorithms
Computer Science
704.009
Lester Ingber
Real Options for Project Schedules (ROPS)
cs.CE cond-mat.stat-mech cs.MS cs.NA physics.data-an
Real Options for Project Schedules (ROPS) has three recursive sampling/optimization shells. An outer Adaptive Simulated Annealing (ASA) optimization shell optimizes parameters of strategic Plans containing multiple Projects containing ordered Tasks. A middle shell samples probability distributions of durations of Tas...
Computational Engineering, Finance, and Science, Statistical Mechanics, Mathematical Software, Numerical Analysis, Data Analysis, Statistics and Probability
Computer Science
704.0098
Jack Raymond
Sparsely-spread CDMA - a statistical mechanics based analysis
cs.IT math.IT
Sparse Code Division Multiple Access (CDMA), a variation on the standard CDMA method in which the spreading (signature) matrix contains only a relatively small number of non-zero elements, is presented and analysed using methods of statistical physics. The analysis provides results on the performance of maximum likel...
Information Theory, Information Theory
Computer Science
704.0108
Sergey Gubin
Reducing SAT to 2-SAT
cs.CC
Description of a polynomial time reduction of SAT to 2-SAT of polynomial size.
Computational Complexity
Computer Science
704.0213
Ketan Mulmuley D
Geometric Complexity Theory V: On deciding nonvanishing of a generalized Littlewood-Richardson coefficient
cs.CC
This article has been withdrawn because it has been merged with the earlier article GCT3 (arXiv: CS/0501076 [cs.CC]) in the series. The merged article is now available as: Geometric Complexity Theory III: on deciding nonvanishing of a Littlewood-Richardson Coefficient, Journal of Algebraic Combinatorics, vol. 36, i...
Computational Complexity
Computer Science
704.0217
Wiroonsak Santipach
Capacity of a Multiple-Antenna Fading Channel with a Quantized Precoding Matrix
cs.IT math.IT
Given a multiple-input multiple-output (MIMO) channel, feedback from the receiver can be used to specify a transmit precoding matrix, which selectively activates the strongest channel modes. Here we analyze the performance of Random Vector Quantization (RVQ), in which the precoding matrix is selected from a random co...
Information Theory, Information Theory
Computer Science
704.0218
Yuri Pritykin
On Almost Periodicity Criteria for Morphic Sequences in Some Particular Cases
cs.DM cs.LO
In some particular cases we give criteria for morphic sequences to be almost periodic (=uniformly recurrent). Namely, we deal with fixed points of non-erasing morphisms and with automatic sequences. In both cases a polynomial-time algorithm solving the problem is found. A result more or less supporting the conjecture...
Discrete Mathematics, Logic in Computer Science
Computer Science
704.0229
Ketan Mulmuley D
Geometric Complexity Theory VI: the flip via saturated and positive integer programming in representation theory and algebraic geometry
cs.CC
This article belongs to a series on geometric complexity theory (GCT), an approach to the P vs. NP and related problems through algebraic geometry and representation theory. The basic principle behind this approach is called the flip. In essence, it reduces the negative hypothesis in complexity theory (the lower boun...
Computational Complexity
Computer Science
704.0282
Samuele Bandi
On Punctured Pragmatic Space-Time Codes in Block Fading Channel
cs.IT cs.CC math.IT
This paper considers the use of punctured convolutional codes to obtain pragmatic space-time trellis codes over block-fading channel. We show that good performance can be achieved even when puncturation is adopted and that we can still employ the same Viterbi decoder of the convolutional mother code by using approxim...
Information Theory, Computational Complexity, Information Theory
Computer Science
704.0301
Akitoshi Kawamura
Differential Recursion and Differentially Algebraic Functions
cs.CC
Moore introduced a class of real-valued "recursive" functions by analogy with Kleene's formulation of the standard recursive functions. While his concise definition inspired a new line of research on analog computation, it contains some technical inaccuracies. Focusing on his "primitive recursive" functions, we pin d...
Computational Complexity
Computer Science
704.0304
Carlos Gershenson
The World as Evolving Information
cs.IT cs.AI math.IT q-bio.PE
This paper discusses the benefits of describing the world as information, especially in the study of the evolution of life and cognition. Traditional studies encounter problems because it is difficult to describe life and cognition in terms of matter and energy, since their laws are valid only at the physical scale. ...
Information Theory, Artificial Intelligence, Information Theory, Populations and Evolution
Computer Science
704.0309
Guohun Zhu
The Complexity of HCP in Digraps with Degree Bound Two
cs.CC cs.DM
The Hamiltonian cycle problem (HCP) in digraphs D with degree bound two is solved by two mappings in this paper. The first bijection is between an incidence matrix C_{nm} of simple digraph and an incidence matrix F of balanced bipartite undirected graph G; The second mapping is from a perfect matching of G to a cycle...
Computational Complexity, Discrete Mathematics
Computer Science
704.0361
Ioannis Chatzigeorgiou
Pseudo-random Puncturing: A Technique to Lower the Error Floor of Turbo Codes
cs.IT math.IT
It has been observed that particular rate-1/2 partially systematic parallel concatenated convolutional codes (PCCCs) can achieve a lower error floor than that of their rate-1/3 parent codes. Nevertheless, good puncturing patterns can only be identified by means of an exhaustive search, whilst convergence towards low ...
Information Theory, Information Theory
Computer Science
704.0468
Jinsong Tan
Inapproximability of Maximum Weighted Edge Biclique and Its Applications
cs.CC cs.DS
Given a bipartite graph $G = (V_1,V_2,E)$ where edges take on {\it both} positive and negative weights from set $\mathcal{S}$, the {\it maximum weighted edge biclique} problem, or $\mathcal{S}$-MWEB for short, asks to find a bipartite subgraph whose sum of edge weights is maximized. This problem has various applicati...
Computational Complexity, Data Structures and Algorithms
Computer Science
704.0492
Shenghui Su
Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
cs.CR
We illustrate through example 1 and 2 that the condition at theorem 1 in [8] dissatisfies necessity, and the converse proposition of fact 1.1 in [8] does not hold, namely the condition Z/M - L/Ak < 1/(2 Ak^2) is not sufficient for f(i) + f(j) = f(k). Illuminate through an analysis and ex.3 that there is a logic error...
Cryptography and Security
Computer Science
704.0499
Lawrence Ong
Optimal Routing for Decode-and-Forward based Cooperation in Wireless Networks
cs.IT math.IT
We investigate cooperative wireless relay networks in which the nodes can help each other in data transmission. We study different coding strategies in the single-source single-destination network with many relay nodes. Given the myriad of ways in which nodes can cooperate, there is a natural routing problem, i.e., d...
Information Theory, Information Theory
Computer Science
704.0528
Soung Liew
Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks
cs.NI cs.IT math.IT
This paper investigates the many-to-one throughput capacity (and by symmetry, one-to-many throughput capacity) of IEEE 802.11 multi-hop networks. It has generally been assumed in prior studies that the many-to-one throughput capacity is upper-bounded by the link capacity L. Throughput capacity L is not achievable und...
Networking and Internet Architecture, Information Theory, Information Theory
Computer Science
704.054
Jinhua Jiang
On the Achievable Rate Regions for Interference Channels with Degraded Message Sets
cs.IT math.IT
The interference channel with degraded message sets (IC-DMS) refers to a communication model in which two senders attempt to communicate with their respective receivers simultaneously through a common medium, and one of the senders has complete and a priori (non-causal) knowledge about the message being transmitted b...
Information Theory, Information Theory
Computer Science
704.059
Rachit Agarwal
A Low Complexity Algorithm and Architecture for Systematic Encoding of Hermitian Codes
cs.IT math.IT
We present an algorithm for systematic encoding of Hermitian codes. For a Hermitian code defined over GF(q^2), the proposed algorithm achieves a run time complexity of O(q^2) and is suitable for VLSI implementation. The encoder architecture uses as main blocks q varying-rate Reed-Solomon encoders and achieves a space...
Information Theory, Information Theory
Computer Science
704.0671
Maxim Raginsky
Learning from compressed observations
cs.IT cs.LG math.IT
The problem of statistical learning is to construct a predictor of a random variable $Y$ as a function of a related random variable $X$ on the basis of an i.i.d. training sample from the joint distribution of $(X,Y)$. Allowable predictors are drawn from some specified class, and the goal is to approach asymptotically...
Information Theory, Machine Learning, Information Theory
Computer Science
704.073
Hamed Haddadi MSc MIEE
Revisiting the Issues On Netflow Sample and Export Performance
cs.PF cs.NI
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics about the traffic which is traversing the router. Sampling is commonly applied on routers in order to limit the load incurred by the colle...
Performance, Networking and Internet Architecture
Computer Science
704.0788
Kerry Soileau
Optimal Synthesis of Multiple Algorithms
cs.DS cs.PF
In this paper we give a definition of "algorithm," "finite algorithm," "equivalent algorithms," and what it means for a single algorithm to dominate a set of algorithms. We define a derived algorithm which may have a smaller mean execution time than any of its component algorithms. We give an explicit expression for ...
Data Structures and Algorithms, Performance
Computer Science
704.0802
Caleb Lo
Hybrid-ARQ in Multihop Networks with Opportunistic Relay Selection
cs.IT math.IT
This paper develops a contention-based opportunistic feedback technique towards relay selection in a dense wireless network. This technique enables the forwarding of additional parity information from the selected relay to the destination. For a given network, the effects of varying key parameters such as the feedbac...
Information Theory, Information Theory
Computer Science
704.0805
Caleb Lo
Opportunistic Relay Selection with Limited Feedback
cs.IT math.IT
It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless networks. This selection strategy supports a hybrid-ARQ transmission approach where relays forward parity information to the destination in the event of ...
Information Theory, Information Theory
Computer Science
704.0831
Brooke Shrader
On packet lengths and overhead for random linear coding over the erasure channel
cs.IT math.IT
We assess the practicality of random network coding by illuminating the issue of overhead and considering it in conjunction with increasingly long packets sent over the erasure channel. We show that the transmission of increasingly long packets, consisting of either of an increasing number of symbols per packet or an...
Information Theory, Information Theory
Computer Science
704.0834
Anatoly Rodionov
P-adic arithmetic coding
cs.DS
A new incremental algorithm for data compression is presented. For a sequence of input symbols algorithm incrementally constructs a p-adic integer number as an output. Decoding process starts with less significant part of a p-adic integer and incrementally reconstructs a sequence of input symbols. Algorithm is based ...
Data Structures and Algorithms
Computer Science
704.0838
Gil Shamir
Universal Source Coding for Monotonic and Fast Decaying Monotonic Distributions
cs.IT math.IT
We study universal compression of sequences generated by monotonic distributions. We show that for a monotonic distribution over an alphabet of size $k$, each probability parameter costs essentially $0.5 \log (n/k^3)$ bits, where $n$ is the coded sequence length, as long as $k = o(n^{1/3})$. Otherwise, for $k = O(n)$...
Information Theory, Information Theory
Computer Science
704.0858
Mohamed Kaaniche
Lessons Learned from the deployment of a high-interaction honeypot
cs.CR
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained w...
Cryptography and Security
Computer Science
704.086
Mohamed Kaaniche
Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study
cs.PF
This paper presents a measurement-based availability assessment study using field data collected during a 4-year period from 373 SunOS/Solaris Unix workstations and servers interconnected through a local area network. We focus on the estimation of machine uptimes, downtimes and availability based on the identificatio...
Performance
Computer Science
704.0861
Mohamed Kaaniche
Empirical analysis and statistical modeling of attack processes based on honeypots
cs.PF cs.CR
Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected...
Performance, Cryptography and Security
Computer Science
704.0865
Mohamed Kaaniche
An architecture-based dependability modeling framework using AADL
cs.PF cs.SE
For efficiency reasons, the software system designers' will is to use an integrated set of methods and tools to describe specifications and designs, and also to perform analyses such as dependability, schedulability and performance. AADL (Architecture Analysis and Design Language) has proved to be efficient for softw...
Performance, Software Engineering
Computer Science
704.0879
Mohamed Kaaniche
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture
cs.PF
We present a hierarchical simulation approach for the dependability analysis and evaluation of a highly available commercial cache-based RAID storage system. The archi-tecture is complex and includes several layers of overlap-ping error detection and recovery mechanisms. Three ab-straction levels have been developed ...
Performance
Computer Science
704.0954
Jos\'e M. F. Moura
Sensor Networks with Random Links: Topology Design for Distributed Consensus
cs.IT cs.LG math.IT
In a sensor network, in practice, the communication among sensors is subject to:(1) errors or failures at random times; (3) costs; and(2) constraints since sensors and networks operate under scarce resources, such as power, data rate, or communication. The signal-to-noise ratio (SNR) is usually a main factor in deter...
Information Theory, Machine Learning, Information Theory
Computer Science
704.0967
Jia Liu
Cross-Layer Optimization of MIMO-Based Mesh Networks with Gaussian Vector Broadcast Channels
cs.IT cs.AR math.IT
MIMO technology is one of the most significant advances in the past decade to increase channel capacity and has a great potential to improve network capacity for mesh networks. In a MIMO-based mesh network, the links outgoing from each node sharing the common communication spectrum can be modeled as a Gaussian vector...
Information Theory, Hardware Architecture, Information Theory
Computer Science
704.0985
Mohd Abubakr
Architecture for Pseudo Acausal Evolvable Embedded Systems
cs.NE cs.AI
Advances in semiconductor technology are contributing to the increasing complexity in the design of embedded systems. Architectures with novel techniques such as evolvable nature and autonomous behavior have engrossed lot of attention. This paper demonstrates conceptually evolvable embedded systems can be characteriz...
Neural and Evolutionary Computing, Artificial Intelligence
Computer Science
704.102
Gyorgy Ottucsak
The on-line shortest path problem under partial monitoring
cs.LG cs.SC
The on-line shortest path problem is considered under various models of partial monitoring. Given a weighted directed acyclic graph whose edge weights can change in an arbitrary (adversarial) way, a decision maker has to choose in each round of a game a path between two distinguished vertices such that the loss of th...
Machine Learning, Symbolic Computation
Computer Science
704.1028
Jianlin Cheng
A neural network approach to ordinal regression
cs.LG cs.AI cs.NE
Ordinal regression is an important type of learning, which has properties of both classification and regression. Here we describe a simple and effective approach to adapt a traditional neural network to learn ordinal categories. Our approach is a generalization of the perceptron method for ordinal regression. On seve...
Machine Learning, Artificial Intelligence, Neural and Evolutionary Computing
Computer Science
704.1043
Hector Zenil
On the Kolmogorov-Chaitin Complexity for short sequences
cs.CC cs.IT math.IT
A drawback of Kolmogorov-Chaitin complexity (K) as a function from s to the shortest program producing s is its noncomputability which limits its range of applicability. Moreover, when strings are short, the dependence of K on a particular universal Turing machine U can be arbitrary. In practice one can approximate i...
Computational Complexity, Information Theory, Information Theory
Computer Science
704.1068
Leo Liberti
Fast paths in large-scale dynamic road networks
cs.NI cs.DS
Efficiently computing fast paths in large scale dynamic road networks (where dynamic traffic information is known over a part of the network) is a practical problem faced by several traffic information service providers who wish to offer a realistic fast path computation to GPS terminal enabled vehicles. The heuristi...
Networking and Internet Architecture, Data Structures and Algorithms
Computer Science
704.107
Hua Fu
Differential Diversity Reception of MDPSK over Independent Rayleigh Channels with Nonidentical Branch Statistics and Asymmetric Fading Spectrum
cs.IT cs.PF math.IT
This paper is concerned with optimum diversity receiver structure and its performance analysis of differential phase shift keying (DPSK) with differential detection over nonselective, independent, nonidentically distributed, Rayleigh fading channels. The fading process in each branch is assumed to have an arbitrary D...
Information Theory, Performance, Information Theory
Computer Science
704.1158
Bernardo Huberman
Novelty and Collective Attention
cs.CY cs.IR physics.soc-ph
The subject of collective attention is central to an information age where millions of people are inundated with daily messages. It is thus of interest to understand how attention to novel items propagates and eventually fades among large populations. We have analyzed the dynamics of collective attention among one mi...
Computers and Society, Information Retrieval, Physics and Society
Computer Science
704.1196
Shengchao Ding
Novel algorithm to calculate hypervolume indicator of Pareto approximation set
cs.CG cs.NE
Hypervolume indicator is a commonly accepted quality measure for comparing Pareto approximation set generated by multi-objective optimizers. The best known algorithm to calculate it for $n$ points in $d$-dimensional space has a run time of $O(n^{d/2})$ with special data structures. This paper presents a recursive, ve...
Computational Geometry, Neural and Evolutionary Computing
Computer Science
704.1198
Minkyu Kim
A Doubly Distributed Genetic Algorithm for Network Coding
cs.NE cs.NI
We present a genetic algorithm which is distributed in two novel ways: along genotype and temporal axes. Our algorithm first distributes, for every member of the population, a subset of the genotype to each network node, rather than a subset of the population to each. This genotype distribution is shown to offer a si...
Neural and Evolutionary Computing, Networking and Internet Architecture
Computer Science
704.1267
Laurence Likforman
Text Line Segmentation of Historical Documents: a Survey
cs.CV
There is a huge amount of historical documents in libraries and in various National Archives that have not been exploited electronically. Although automatic reading of complete pages remains, in most cases, a long-term objective, tasks such as word spotting, text/image alignment, authentication and extraction of spec...
Computer Vision and Pattern Recognition
Computer Science
704.1269
Lenka Zdeborova
Phase Transitions in the Coloring of Random Graphs
cond-mat.dis-nn cond-mat.stat-mech cs.CC
We consider the problem of coloring the vertices of a large sparse random graph with a given number of colors so that no adjacent vertices have the same color. Using the cavity method, we present a detailed and systematic analytical study of the space of proper colorings (solutions). We show that for a fixed number...
Disordered Systems and Neural Networks, Statistical Mechanics, Computational Complexity
Physics
704.1274
Dev Rajnarayan
Parametric Learning and Monte Carlo Optimization
cs.LG
This paper uncovers and explores the close relationship between Monte Carlo Optimization of a parametrized integral (MCO), Parametric machine-Learning (PL), and `blackbox' or `oracle'-based optimization (BO). We make four contributions. First, we prove that MCO is mathematically identical to a broad class of PL probl...
Machine Learning
Computer Science
704.1294
Ahmed Sidky Ahmed Sidky
A Disciplined Approach to Adopting Agile Practices: The Agile Adoption Framework
cs.SE
Many organizations aspire to adopt agile processes to take advantage of the numerous benefits that it offers to an organization. Those benefits include, but are not limited to, quicker return on investment, better software quality, and higher customer satisfaction. To date however, there is no structured process (at ...
Software Engineering
Computer Science
704.1308
Nihar Jindal
Antenna Combining for the MIMO Downlink Channel
cs.IT math.IT
A multiple antenna downlink channel where limited channel feedback is available to the transmitter is considered. In a vector downlink channel (single antenna at each receiver), the transmit antenna array can be used to transmit separate data streams to multiple receivers only if the transmitter has very accurate cha...
Information Theory, Information Theory
Computer Science
704.1317
Naftali Sommer
Low Density Lattice Codes
cs.IT math.IT
Low density lattice codes (LDLC) are novel lattice codes that can be decoded efficiently and approach the capacity of the additive white Gaussian noise (AWGN) channel. In LDLC a codeword x is generated directly at the n-dimensional Euclidean space as a linear transformation of a corresponding integer message vector b...
Information Theory, Information Theory
Computer Science
704.1353
Paul Prekop
Supporting Knowledge and Expertise Finding within Australia's Defence Science and Technology Organisation
cs.OH cs.DB cs.DL cs.HC
This paper reports on work aimed at supporting knowledge and expertise finding within a large Research and Development (R&D) organisation. The paper first discusses the nature of knowledge important to R&D organisations and presents a prototype information system developed to support knowledge and expertise finding. ...
Other Computer Science, Databases, Digital Libraries, Human-Computer Interaction
Computer Science
704.1358
Torleiv Kl{\o}ve
Distance preserving mappings from ternary vectors to permutations
cs.DM cs.IT math.IT
Distance-preserving mappings (DPMs) are mappings from the set of all q-ary vectors of a fixed length to the set of permutations of the same or longer length such that every two distinct vectors are mapped to permutations with the same or even larger Hamming distance than that of the vectors. In this paper, we propose...
Discrete Mathematics, Information Theory, Information Theory
Computer Science
704.1373
Burgy Laurent
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
cs.PL
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu,...
Programming Languages
Computer Science
704.1394
Tarik Had\v{z}i\'c
Calculating Valid Domains for BDD-Based Interactive Configuration
cs.AI
In these notes we formally describe the functionality of Calculating Valid Domains from the BDD representing the solution space of valid configurations. The formalization is largely based on the CLab configuration framework.
Artificial Intelligence
Computer Science
704.1409
Yao Hengshuai
Preconditioned Temporal Difference Learning
cs.LG cs.AI
This paper has been withdrawn by the author. This draft is withdrawn for its poor quality in english, unfortunately produced by the author when he was just starting his science route. Look at the ICML version instead: http://icml2008.cs.helsinki.fi/papers/111.pdf
Machine Learning, Artificial Intelligence
Computer Science
704.1411
Lorenzo Cappellari
Trellis-Coded Quantization Based on Maximum-Hamming-Distance Binary Codes
cs.IT math.IT
Most design approaches for trellis-coded quantization take advantage of the duality of trellis-coded quantization with trellis-coded modulation, and use the same empirically-found convolutional codes to label the trellis branches. This letter presents an alternative approach that instead takes advantage of maximum-Ha...
Information Theory, Information Theory
Computer Science
704.1455
Aaron Wagner
A Better Good-Turing Estimator for Sequence Probabilities
cs.IT math.IT
We consider the problem of estimating the probability of an observed string drawn i.i.d. from an unknown distribution. The key feature of our study is that the length of the observed string is assumed to be of the same order as the size of the underlying alphabet. In this setting, many letters are unseen and the empi...
Information Theory, Information Theory
Computer Science
704.1524
Daniel Ryan
GLRT-Optimal Noncoherent Lattice Decoding
cs.IT math.IT
This paper presents new low-complexity lattice-decoding algorithms for noncoherent block detection of QAM and PAM signals over complex-valued fading channels. The algorithms are optimal in terms of the generalized likelihood ratio test (GLRT). The computational complexity is polynomial in the block length; making GLR...
Information Theory, Information Theory
Computer Science
704.1571
Philippe Gambette
On restrictions of balanced 2-interval graphs
cs.DM q-bio.QM
The class of 2-interval graphs has been introduced for modelling scheduling and allocation problems, and more recently for specific bioinformatic problems. Some of those applications imply restrictions on the 2-interval graphs, and justify the introduction of a hierarchy of subclasses of 2-interval graphs that genera...
Discrete Mathematics, Quantitative Methods
Computer Science
704.1675
Kristina Lerman
Exploiting Social Annotation for Automatic Resource Discovery
cs.AI cs.CY cs.DL
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them in the application. Manual resource discovery is a slow process, requiring the user to sift through results obtained via keyword-based sear...
Artificial Intelligence, Computers and Society, Digital Libraries
Computer Science
704.1676
Kristina Lerman
Personalizing Image Search Results on Flickr
cs.IR cs.AI cs.CY cs.DL cs.HC
The social media site Flickr allows users to upload their photos, annotate them with tags, submit them to groups, and also to form social networks by adding other users as contacts. Flickr offers multiple ways of browsing or searching it. One option is tag search, which returns all images tagged with a specific keywo...
Information Retrieval, Artificial Intelligence, Computers and Society, Digital Libraries, Human-Computer Interaction
Computer Science
704.1678
Shanghua Teng
Settling the Complexity of Computing Two-Player Nash Equilibria
cs.GT cs.CC
We settle a long-standing open question in algorithmic game theory. We prove that Bimatrix, the problem of finding a Nash equilibrium in a two-player game, is complete for the complexity class PPAD Polynomial Parity Argument, Directed version) introduced by Papadimitriou in 1991. This is the first of a series of re...
Computer Science and Game Theory, Computational Complexity
Computer Science
704.1694
Sergey Yekhanin
Locally Decodable Codes From Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers
cs.CC math.NT
A k-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only k bits of the codeword C(x), even after some constant fraction of codeword bits has been corrupted. The major goal of LDC related researc...
Computational Complexity, Number Theory
Computer Science
704.1707
Linda Buisman
A Cut-free Sequent Calculus for Bi-Intuitionistic Logic: Extended Version
cs.LO
Bi-intuitionistic logic is the extension of intuitionistic logic with a connective dual to implication. Bi-intuitionistic logic was introduced by Rauszer as a Hilbert calculus with algebraic and Kripke semantics. But her subsequent ``cut-free'' sequent calculus for BiInt has recently been shown by Uustalu to fail cut...
Logic in Computer Science
Computer Science
704.1709
Marie Cottrell
Traitement Des Donnees Manquantes Au Moyen De L'Algorithme De Kohonen
stat.AP cs.NE
Nous montrons comment il est possible d'utiliser l'algorithme d'auto organisation de Kohonen pour traiter des donn\'ees avec valeurs manquantes et estimer ces derni\`eres. Apr\`es un rappel m\'ethodologique, nous illustrons notre propos \`a partir de trois applications \`a des donn\'ees r\'eelles. ----- We show h...
Applications, Neural and Evolutionary Computing
Statistics
704.1748
Frank Schweitzer
Self-Organization applied to Dynamic Network Layout
physics.comp-ph cs.DS nlin.AO
As networks and their structure have become a major field of research, a strong demand for network visualization has emerged. We address this challenge by formalizing the well established spring layout in terms of dynamic equations. We thus open up the design space for new algorithms. Drawing from the knowledge of sy...
Computational Physics, Data Structures and Algorithms, Adaptation and Self-Organizing Systems
Physics
704.1751
Olivier Rioul
Information Theoretic Proofs of Entropy Power Inequalities
cs.IT math.IT
While most useful information theoretic inequalities can be deduced from the basic properties of entropy or mutual information, up to now Shannon's entropy power inequality (EPI) is an exception: Existing information theoretic proofs of the EPI hinge on representations of differential entropy using either Fisher info...
Information Theory, Information Theory
Computer Science
704.1756
Jose M. Martin-Garcia
The Invar Tensor Package
cs.SC gr-qc hep-th
The Invar package is introduced, a fast manipulator of generic scalar polynomial expressions formed from the Riemann tensor of a four-dimensional metric-compatible connection. The package can maximally simplify any polynomial containing tensor products of up to seven Riemann tensors within seconds. It has been implem...
Symbolic Computation, General Relativity and Quantum Cosmology, High Energy Physics - Theory
Computer Science
704.1768
Enrique ter Horst A
Assessment and Propagation of Input Uncertainty in Tree-based Option Pricing Models
cs.CE cs.GT
This paper aims to provide a practical example on the assessment and propagation of input uncertainty for option pricing when using tree-based methods. Input uncertainty is propagated into output uncertainty, reflecting that option prices are as unknown as the inputs they are based on. Option pricing formulas are too...
Computational Engineering, Finance, and Science, Computer Science and Game Theory
Computer Science
704.1783
Francesco Santini
Unicast and Multicast Qos Routing with Soft Constraint Logic Programming
cs.LO cs.AI cs.NI
We present a formal model to represent and solve the unicast/multicast routing problem in networks with Quality of Service (QoS) requirements. To attain this, first we translate the network adapting it to a weighted graph (unicast) or and-or graph (multicast), where the weight on a connector corresponds to the multid...
Logic in Computer Science, Artificial Intelligence, Networking and Internet Architecture
Computer Science
704.1818
Martin Wainwright
Low-density graph codes that are optimal for source/channel coding and binning
cs.IT math.IT
We describe and analyze the joint source/channel coding properties of a class of sparse graphical codes based on compounding a low-density generator matrix (LDGM) code with a low-density parity check (LDPC) code. Our first pair of theorems establish that there exist codes from this ensemble, with all degrees remainin...
Information Theory, Information Theory
Computer Science
704.1827
Gerald Krafft
Transaction-Oriented Simulation In Ad Hoc Grids
cs.DC
This paper analyses the possibilities of performing parallel transaction-oriented simulations with a special focus on the space-parallel approach and discrete event simulation synchronisation algorithms that are suitable for transaction-oriented simulation and the target environment of Ad Hoc Grids. To demonstrate th...
Distributed, Parallel, and Cluster Computing
Computer Science
704.1829
Kamil Kloch
On-line Chain Partitions of Up-growing Semi-orders
cs.DM
On-line chain partition is a two-player game between Spoiler and Algorithm. Spoiler presents a partially ordered set, point by point. Algorithm assigns incoming points (immediately and irrevocably) to the chains which constitute a chain partition of the order. The value of the game for orders of width $w$ is a minimu...
Discrete Mathematics
Computer Science
704.1833
Inanc Inan
Analysis of the 802.11e Enhanced Distributed Channel Access Function
cs.NI
The IEEE 802.11e standard revises the Medium Access Control (MAC) layer of the former IEEE 802.11 standard for Quality-of-Service (QoS) provision in the Wireless Local Area Networks (WLANs). The Enhanced Distributed Channel Access (EDCA) function of 802.11e defines multiple Access Categories (AC) with AC-specific Con...
Networking and Internet Architecture
Computer Science
704.1838
Inanc Inan
Performance Analysis of the IEEE 802.11e Enhanced Distributed Coordination Function using Cycle Time Approach
cs.OH
The recently ratified IEEE 802.11e standard defines the Enhanced Distributed Channel Access (EDCA) function for Quality-of-Service (QoS) provisioning in the Wireless Local Area Networks (WLANs). The EDCA uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and slotted Binary Exponential Backoff (BEB)...
Other Computer Science
Computer Science
704.1842
Inanc Inan
Fairness Provision in the IEEE 802.11e Infrastructure Basic Service Set
cs.OH
Most of the deployed IEEE 802.11e Wireless Local Area Networks (WLANs) use infrastructure Basic Service Set (BSS) in which an Access Point (AP) serves as a gateway between wired and wireless domains. We present the unfairness problem between the uplink and the downlink flows of any Access Category (AC) in the 802.11e...
Other Computer Science
Computer Science
704.1873
Yi Cao
An Achievable Rate Region for Interference Channels with Conferencing
cs.IT math.IT
In this paper, we propose an achievable rate region for discrete memoryless interference channels with conferencing at the transmitter side. We employ superposition block Markov encoding, combined with simultaneous superposition coding, dirty paper coding, and random binning to obtain the achievable rate region. We s...
Information Theory, Information Theory
Computer Science
704.1886
Pedro Resende
An algebraic generalization of Kripke structures
math.LO cs.LO math.RA
The Kripke semantics of classical propositional normal modal logic is made algebraic via an embedding of Kripke structures into the larger class of pointed stably supported quantales. This algebraic semantics subsumes the traditional algebraic semantics based on lattices with unary operators, and it suggests natural ...
Logic, Logic in Computer Science, Rings and Algebras
Mathematics
704.1925
Yuanning Yu
Blind Identification of Distributed Antenna Systems with Multiple Carrier Frequency Offsets
cs.IT math.IT
In spatially distributed multiuser antenna systems, the received signal contains multiple carrier-frequency offsets (CFOs) arising from mismatch between the oscillators of transmitters and receivers. This results in a time-varying rotation of the data constellation, which needs to be compensated at the receiver befor...
Information Theory, Information Theory
Computer Science
704.201
Juliana Bernardes
A study of structural properties on profiles HMMs
cs.AI
Motivation: Profile hidden Markov Models (pHMMs) are a popular and very useful tool in the detection of the remote homologue protein families. Unfortunately, their performance is not always satisfactory when proteins are in the 'twilight zone'. We present HMMER-STRUCT, a model construction algorithm and tool that tri...
Artificial Intelligence
Computer Science
704.2014
Leandro R\^ego
Extensive Games with Possibly Unaware Players
cs.GT cs.MA
Standard game theory assumes that the structure of the game is common knowledge among players. We relax this assumption by considering extensive games where agents may be unaware of the complete structure of the game. In particular, they may not be aware of moves that they and other agents can make. We show how such ...
Computer Science and Game Theory, Multiagent Systems
Computer Science
704.2017
Giacomo Bacci
Large System Analysis of Game-Theoretic Power Control in UWB Wireless Networks with Rake Receivers
cs.IT cs.GT math.IT
This paper studies the performance of partial-Rake (PRake) receivers in impulse-radio ultrawideband wireless networks when an energy-efficient power control scheme is adopted. Due to the large bandwidth of the system, the multipath channel is assumed to be frequency-selective. By using noncooperative game-theoretic m...
Information Theory, Computer Science and Game Theory, Information Theory
Computer Science
704.2083
Hassan Satori
Introduction to Arabic Speech Recognition Using CMUSphinx System
cs.CL cs.AI
In this paper Arabic was investigated from the speech recognition problem point of view. We propose a novel approach to build an Arabic Automated Speech Recognition System (ASR). This system is based on the open source CMU Sphinx-4, from the Carnegie Mellon University. CMU Sphinx is a large-vocabulary; speaker-indepe...
Computation and Language, Artificial Intelligence
Computer Science
704.2092
Jinsong Tan
A Note on the Inapproximability of Correlation Clustering
cs.LG cs.DS
We consider inapproximability of the correlation clustering problem defined as follows: Given a graph $G = (V,E)$ where each edge is labeled either "+" (similar) or "-" (dissimilar), correlation clustering seeks to partition the vertices into clusters so that the number of pairs correctly (resp. incorrectly) classifi...
Machine Learning, Data Structures and Algorithms
Computer Science
704.2201
Hassan Satori
Arabic Speech Recognition System using CMU-Sphinx4
cs.CL cs.AI
In this paper we present the creation of an Arabic version of Automated Speech Recognition System (ASR). This system is based on the open source Sphinx-4, from the Carnegie Mellon University. Which is a speech recognition system based on discrete hidden Markov models (HMMs). We investigate the changes that must be ma...
Computation and Language, Artificial Intelligence
Computer Science
704.2258
Stefan Laendner
On the Hardness of Approximating Stopping and Trapping Sets in LDPC Codes
cs.IT math.IT
We prove that approximating the size of stopping and trapping sets in Tanner graphs of linear block codes, and more restrictively, the class of low-density parity-check (LDPC) codes, is NP-hard. The ramifications of our findings are that methods used for estimating the height of the error-floor of moderate- and long-...
Information Theory, Information Theory
Computer Science
704.2259
Lifeng Lai
The Wiretap Channel with Feedback: Encryption over the Channel
cs.IT cs.CR math.IT
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interesting...
Information Theory, Cryptography and Security, Information Theory
Computer Science
704.2282
Wim H. Hesselink
Kekul\'e Cells for Molecular Computation
cs.OH cs.DM
The configurations of single and double bonds in polycyclic hydrocarbons are abstracted as Kekul\'e states of graphs. Sending a so-called soliton over an open channel between ports (external nodes) of the graph changes the Kekul\'e state and therewith the set of open channels in the graph. This switching behaviour is...
Other Computer Science, Discrete Mathematics
Computer Science
704.2295
Hassan Jameel
Using Image Attributes for Human Identification Protocols
cs.CR
A secure human identification protocol aims at authenticating human users to a remote server when even the users' inputs are not hidden from an adversary. Recently, the authors proposed a human identification protocol in the RSA Conference 2007, which is loosely based on the ability of humans to efficiently process a...
Cryptography and Security
Computer Science
704.2344
Publications Ampere
Parallel computing for the finite element method
cs.DC
A finite element method is presented to compute time harmonic microwave fields in three dimensional configurations. Nodal-based finite elements have been coupled with an absorbing boundary condition to solve open boundary problems. This paper describes how the modeling of large devices has been made possible using pa...
Distributed, Parallel, and Cluster Computing
Computer Science
704.2351
Giorgi Pascal
Parallel computation of the rank of large sparse matrices from algebraic K-theory
math.KT cs.DC cs.SC math.NT
This paper deals with the computation of the rank and of some integer Smith forms of a series of sparse matrices arising in algebraic K-theory. The number of non zero entries in the considered matrices ranges from 8 to 37 millions. The largest rank computation took more than 35 days on 50 processors. We report on the...
K-Theory and Homology, Distributed, Parallel, and Cluster Computing, Symbolic Computation, Number Theory
Mathematics
704.2353
Natasha Devroye
Scaling Laws of Cognitive Networks
cs.IT math.IT
We consider a cognitive network consisting of n random pairs of cognitive transmitters and receivers communicating simultaneously in the presence of multiple primary users. Of interest is how the maximum throughput achieved by the cognitive users scales with n. Furthermore, how far these users must be from a primary ...
Information Theory, Information Theory
Computer Science
704.2355
Luigi Santocanale
A Nice Labelling for Tree-Like Event Structures of Degree 3
cs.DC
We address the problem of &#64257;nding nice labellings for event structures of degree 3. We develop a minimum theory by which we prove that the labelling number of an event structure of degree 3 is bounded by a linear function of the height. The main theorem we present in this paper states that event structures of d...
Distributed, Parallel, and Cluster Computing
Computer Science
704.2375
Stefano Buzzi
Power control algorithms for CDMA networks based on large system analysis
cs.IT math.IT
Power control is a fundamental task accomplished in any wireless cellular network; its aim is to set the transmit power of any mobile terminal, so that each user is able to achieve its own target SINR. While conventional power control algorithms require knowledge of a number of parameters of the signal of interest an...
Information Theory, Information Theory
Computer Science
704.2383
Stefano Buzzi
Power control and receiver design for energy efficiency in multipath CDMA channels with bandlimited waveforms
cs.IT math.IT
This paper is focused on the cross-layer design problem of joint multiuser detection and power control for energy-efficiency optimization in a wireless data network through a game-theoretic approach. Building on work of Meshkati, et al., wherein the tools of game-theory are used in order to achieve energy-efficiency ...
Information Theory, Information Theory
Computer Science
704.2386
Pilar Albert
Bounded Pushdown dimension vs Lempel Ziv information density
cs.CC cs.IT math.IT
In this paper we introduce a variant of pushdown dimension called bounded pushdown (BPD) dimension, that measures the density of information contained in a sequence, relative to a BPD automata, i.e. a finite state machine equipped with an extra infinite memory stack, with the additional requirement that every input s...
Computational Complexity, Information Theory, Information Theory
Computer Science
704.2448
Ugo Dal Lago
Light Logics and Optimal Reduction: Completeness and Complexity
cs.LO cs.PL
Typing of lambda-terms in Elementary and Light Affine Logic (EAL, LAL, resp.) has been studied for two different reasons: on the one hand the evaluation of typed terms using LAL (EAL, resp.) proof-nets admits a guaranteed polynomial (elementary, resp.) bound; on the other hand these terms can also be evaluated by opt...
Logic in Computer Science, Programming Languages
Computer Science
End of preview.