id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0809.4183
Aslan Tchamkerten
Gildas Avoine and Aslan Tchamkerten
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
10 pages
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover. We present an authentication protocol suited for RFID systems. Our solution is the first that prevents relay attacks without degrading the authentication security level: it minimizes the probability that the verifier accepts a fake proof of identity, whether or not a relay attack occurs.
[ { "version": "v1", "created": "Wed, 24 Sep 2008 13:27:43 GMT" } ]
2008-09-25T00:00:00
[ [ "Avoine", "Gildas", "" ], [ "Tchamkerten", "Aslan", "" ] ]
new_dataset
0.999611
0809.3942
Philippe Hoogvorst
Philippe Hoogvorst, Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Taha Beyrouthy and Laurent Fesquet
A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous FPGA resistant to Side-Channel Attacks
29 pages
null
null
null
cs.CR cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Side-channel attacks are efficient attacks against cryptographic devices. They use only quantities observable from outside, such as the duration and the power consumption. Attacks against synchronous devices using electric observations are facilitated by the fact that all transitions occur simultaneously with some global clock signal. Asynchronous control remove this synchronization and therefore makes it more difficult for the attacker to insulate \emph{interesting intervals}. In addition the coding of data in an asynchronous circuit is inherently more difficult to attack. This article describes the Programmable Logic Block of an asynchronous FPGA resistant against \emph{side-channel attacks}. Additionally it can implement different styles of asynchronous control and of data representation.
[ { "version": "v1", "created": "Tue, 23 Sep 2008 15:27:06 GMT" } ]
2008-09-24T00:00:00
[ [ "Hoogvorst", "Philippe", "" ], [ "Guilley", "Sylvain", "" ], [ "Chaudhuri", "Sumanta", "" ], [ "Danger", "Jean-Luc", "" ], [ "Beyrouthy", "Taha", "" ], [ "Fesquet", "Laurent", "" ] ]
new_dataset
0.99921
0809.3503
Praveen Sivadasan
Praveen Sivadasan, P Sojan Lal, Naveen Sivadasan
JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes
Manuscript submitted to ACM COMPUTE 2009 Conference,Bangalore
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. Hence programmers resort to adhoc manual ways of obscuring their program which makes it difficult for its maintenance and usability. To address this issue partially, we developed a user friendly tool JDATATRANS to obfuscate Java source code by obscuring the array usages. Using various array restructuring techniques such as 'array splitting', 'array folding' and 'array flattening', in addition to constant hiding, our system obfuscate the input Java source code and produce an obfuscated Java source code that is functionally equivalent to the input program. We also perform a number of experiments to measure the potency, resilience and cost incurred by our tool.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 13:18:26 GMT" } ]
2008-09-23T00:00:00
[ [ "Sivadasan", "Praveen", "" ], [ "Lal", "P Sojan", "" ], [ "Sivadasan", "Naveen", "" ] ]
new_dataset
0.999717
0809.3584
Grenville Croll
Jocelyn Paine
Spreadsheet Components For All
19 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 109-127 ISBN 978-905617-69-2
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have prototyped a "spreadsheet component repository" Web site, from which users can copy "components" into their own Excel or Google spreadsheets. Components are collections of cells containing formulae: in real life, they would do useful calculations that many practitioners find hard to program, and would be rigorously tested and documented. Crucially, the user can tell the repository which cells in their spreadsheet to use for a componen's inputs and outputs. The repository will then reshape the component to fit. A single component can therefore be used in many different sizes and shapes of spreadsheet. We hope to set up a spreadsheet equivalent of the high-quality numerical subroutine libraries that revolutionised scientific computing, but where instead of subroutines, the library contains such components.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 13:31:35 GMT" } ]
2008-09-23T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
new_dataset
0.987719
0809.3280
Zheng Sun
Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu
A Heuristic Scheduling Scheme in Multiuser OFDMA Networks
published in VTC Fall '08
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional heterogeneous-traffic scheduling schemes utilize zero-delay constraint for real-time services, which aims to minimize the average packet delay among real-time users. However, in light or moderate load networks this strategy is unnecessary and leads to low data throughput for non-real-time users. In this paper, we propose a heuristic scheduling scheme to solve this problem. The scheme measures and assigns scheduling priorities to both real-time and non-real-time users, and schedules the radio resources for the two user classes simultaneously. Simulation results show that the proposed scheme efficiently handles the heterogeneous-traffic scheduling with diverse QoS requirements and alleviates the unfairness between real-time and non-real-time services under various traffic loads.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 01:25:16 GMT" } ]
2008-09-22T00:00:00
[ [ "Sun", "Zheng", "" ], [ "He", "Zhiqiang", "" ], [ "Wang", "Ruochen", "" ], [ "Niu", "Kai", "" ] ]
new_dataset
0.968808
0809.3415
Cl\'emence Magnien
Frederic Aidouni, Matthieu Latapy and Clemence Magnien
Ten weeks in the life of an eDonkey server
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a capture of the queries managed by an eDonkey server during almost 10 weeks, leading to the observation of almost 9 billion messages involving almost 90 million users and more than 275 million distinct files. Acquisition and management of such data raises several challenges, which we discuss as well as the solutions we developed. We obtain a very rich dataset, orders of magnitude larger than previously avalaible ones, which we provide for public use. We finally present basic analysis of the obtained data, which already gives evidence of non-trivial features.
[ { "version": "v1", "created": "Fri, 19 Sep 2008 16:45:26 GMT" } ]
2008-09-22T00:00:00
[ [ "Aidouni", "Frederic", "" ], [ "Latapy", "Matthieu", "" ], [ "Magnien", "Clemence", "" ] ]
new_dataset
0.997924
0807.3223
Vincent Hugel
David Gouaillier, Vincent Hugel, Pierre Blazevic, Chris Kilner, Jerome Monceaux, Pascal Lafourcade, Brice Marnier, Julien Serre, Bruno Maisonnier
The NAO humanoid: a combination of performance and affordability
This paper has been withdrawn by the author(s) for revision
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents the design of the autonomous humanoid robot called NAO that is built by the French company Aldebaran-Robotics. With its height of 0.57 m and its weight about 4.5 kg, this innovative robot is lightweight and compact. It distinguishes itself from its existing Japanese, American, and other counterparts thanks to its pelvis kinematics design, its proprietary actuation system based on brush DC motors, its electronic, computer and distributed software architectures. This robot has been designed to be affordable without sacrificing quality and performance. It is an open and easy-to-handle platform where the user can change all the embedded system software or just add some applications to make the robot adopt specific behaviours. The robot's head and forearms are modular and can be changed to promote further evolution. The comprehensive and functional design is one of the reasons that helped select NAO to replace the AIBO quadrupeds in the 2008 RoboCup standard league.
[ { "version": "v1", "created": "Mon, 21 Jul 2008 09:28:09 GMT" }, { "version": "v2", "created": "Sun, 21 Sep 2008 18:41:16 GMT" } ]
2008-09-21T00:00:00
[ [ "Gouaillier", "David", "" ], [ "Hugel", "Vincent", "" ], [ "Blazevic", "Pierre", "" ], [ "Kilner", "Chris", "" ], [ "Monceaux", "Jerome", "" ], [ "Lafourcade", "Pascal", "" ], [ "Marnier", "Brice", "" ], [ "Serre", "Julien", "" ], [ "Maisonnier", "Bruno", "" ] ]
new_dataset
0.998542
0809.3140
Fang Wei
Georg Gottlob, Reinhard Pichler, Fang Wei
Monadic Datalog over Finite Structures with Bounded Treewidth
null
null
null
null
cs.DB cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bounded treewidth and Monadic Second Order (MSO) logic have proved to be key concepts in establishing fixed-parameter tractability results. Indeed, by Courcelle's Theorem we know: Any property of finite structures, which is expressible by an MSO sentence, can be decided in linear time (data complexity) if the structures have bounded treewidth. In principle, Courcelle's Theorem can be applied directly to construct concrete algorithms by transforming the MSO evaluation problem into a tree language recognition problem. The latter can then be solved via a finite tree automaton (FTA). However, this approach has turned out to be problematical, since even relatively simple MSO formulae may lead to a ``state explosion'' of the FTA. In this work we propose monadic datalog (i.e., datalog where all intentional predicate symbols are unary) as an alternative method to tackle this class of fixed-parameter tractable problems. We show that if some property of finite structures is expressible in MSO then this property can also be expressed by means of a monadic datalog program over the structure plus the tree decomposition. Moreover, we show that the resulting fragment of datalog can be evaluated in linear time (both w.r.t. the program size and w.r.t. the data size). This new approach is put to work by devising new algorithms for the 3-Colorability problem of graphs and for the PRIMALITY problem of relational schemas (i.e., testing if some attribute in a relational schema is part of a key). We also report on experimental results with a prototype implementation.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 12:40:49 GMT" } ]
2008-09-19T00:00:00
[ [ "Gottlob", "Georg", "" ], [ "Pichler", "Reinhard", "" ], [ "Wei", "Fang", "" ] ]
new_dataset
0.998403
0809.2691
Jerome Darmont
Marouane Hachicha (ERIC), Hadj Mahboubi (ERIC), J\'er\^ome Darmont (ERIC)
Expressing OLAP operators with the TAX XML algebra
in 3rd International Workshop on Database Technologies for Handling XML Information on the Web (DataX-EDBT 08), Nantes : France (2008)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rise of XML as a standard for representing business data, XML data warehouses appear as suitable solutions for Web-based decision-support applications. In this context, it is necessary to allow OLAP analyses over XML data cubes (XOLAP). Thus, XQuery extensions are needed. To help define a formal framework and allow much-needed performance optimizations on analytical queries expressed in XQuery, having an algebra at one's disposal is desirable. However, XOLAP approaches and algebras from the literature still largely rely on the relational model and/or only feature a small number of OLAP operators. In opposition, we propose in this paper to express a broad set of OLAP operators with the TAX XML algebra.
[ { "version": "v1", "created": "Tue, 16 Sep 2008 12:12:15 GMT" } ]
2008-09-17T00:00:00
[ [ "Hachicha", "Marouane", "", "ERIC" ], [ "Mahboubi", "Hadj", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
new_dataset
0.998566
0706.0431
Wolfgang Steiner
Emilie Charlier, Michel Rigo, Wolfgang Steiner (LIAFA)
Abstract numeration systems on bounded languages and multiplication by a constant
null
Integers: Electronic Journal of Combinatorial Number Theory 8, 1 (2008) #35
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set of integers is $S$-recognizable in an abstract numeration system $S$ if the language made up of the representations of its elements is accepted by a finite automaton. For abstract numeration systems built over bounded languages with at least three letters, we show that multiplication by an integer $\lambda\ge2$ does not preserve $S$-recognizability, meaning that there always exists a $S$-recognizable set $X$ such that $\lambda X$ is not $S$-recognizable. The main tool is a bijection between the representation of an integer over a bounded language and its decomposition as a sum of binomial coefficients with certain properties, the so-called combinatorial numeration system.
[ { "version": "v1", "created": "Mon, 4 Jun 2007 13:12:37 GMT" }, { "version": "v2", "created": "Tue, 16 Sep 2008 10:13:27 GMT" } ]
2008-09-16T00:00:00
[ [ "Charlier", "Emilie", "", "LIAFA" ], [ "Rigo", "Michel", "", "LIAFA" ], [ "Steiner", "Wolfgang", "", "LIAFA" ] ]
new_dataset
0.994148
0809.2315
Irfan Siap
Taher Abualrub, Ali Ghrayeb, Nuh Aydin, and Irfan Siap
On the Construction of Skew Quasi-Cyclic Codes
12 pages. submitted
null
null
null
cs.IT cs.DM math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a special type of quasi-cyclic (QC) codes called skew QC codes. This set of codes is constructed using a non-commutative ring called the skew polynomial rings $F[x;\theta ]$. After a brief description of the skew polynomial ring $F[x;\theta ]$ it is shown that skew QC codes are left submodules of the ring $R_{s}^{l}=(F[x;\theta ]/(x^{s}-1))^{l}.$ The notions of generator and parity-check polynomials are given. We also introduce the notion of similar polynomials in the ring $F[x;\theta ]$ and show that parity-check polynomials for skew QC codes are unique up to similarity. Our search results lead to the construction of several new codes with Hamming distances exceeding the Hamming distances of the previously best known linear codes with comparable parameters.
[ { "version": "v1", "created": "Sat, 13 Sep 2008 06:04:49 GMT" } ]
2008-09-16T00:00:00
[ [ "Abualrub", "Taher", "" ], [ "Ghrayeb", "Ali", "" ], [ "Aydin", "Nuh", "" ], [ "Siap", "Irfan", "" ] ]
new_dataset
0.990832
0809.2525
Michel Grabisch
Michel Grabisch (CES), Pedro Miranda
On the vertices of the k-addiive core
null
Discrete Mathematics (2008) 5204-5217
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The core of a game $v$ on $N$, which is the set of additive games $\phi$ dominating $v$ such that $\phi(N)=v(N)$, is a central notion in cooperative game theory, decision making and in combinatorics, where it is related to submodular functions, matroids and the greedy algorithm. In many cases however, the core is empty, and alternative solutions have to be found. We define the $k$-additive core by replacing additive games by $k$-additive games in the definition of the core, where $k$-additive games are those games whose M\"obius transform vanishes for subsets of more than $k$ elements. For a sufficiently high value of $k$, the $k$-additive core is nonempty, and is a convex closed polyhedron. Our aim is to establish results similar to the classical results of Shapley and Ichiishi on the core of convex games (corresponds to Edmonds' theorem for the greedy algorithm), which characterize the vertices of the core.
[ { "version": "v1", "created": "Mon, 15 Sep 2008 13:33:53 GMT" } ]
2008-09-16T00:00:00
[ [ "Grabisch", "Michel", "", "CES" ], [ "Miranda", "Pedro", "" ] ]
new_dataset
0.996269
cs/0609062
James Cheney
James Cheney, Christian Urban
Nominal Logic Programming
46 pages; 19 page appendix; 13 figures. Revised journal submission as of July 23, 2007
ACM Transactions on Programming Languages and Systems 30(5):26, August 2008
10.1145/1387673.1387675
null
cs.PL cs.LO
null
Nominal logic is an extension of first-order logic which provides a simple foundation for formalizing and reasoning about abstract syntax modulo consistent renaming of bound names (that is, alpha-equivalence). This article investigates logic programming based on nominal logic. We describe some typical nominal logic programs, and develop the model-theoretic, proof-theoretic, and operational semantics of such programs. Besides being of interest for ensuring the correct behavior of implementations, these results provide a rigorous foundation for techniques for analysis and reasoning about nominal logic programs, as we illustrate via examples.
[ { "version": "v1", "created": "Tue, 12 Sep 2006 09:32:23 GMT" }, { "version": "v2", "created": "Mon, 20 Aug 2007 13:36:28 GMT" } ]
2008-09-15T00:00:00
[ [ "Cheney", "James", "" ], [ "Urban", "Christian", "" ] ]
new_dataset
0.998847
0809.1659
Robert Paul Morris
Scott Bardsley, Theodosios Thomas, and R. Paul Morris
A Tiered Security System for Mobile Devices
10 pages, 2 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have designed a tiered security system for mobile devices where each security tier holds user-defined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the security system is operated from a Web site or server, its configuration can be readily shared across multiple devices. When operated directly from the mobile device, no server is needed for activation. Many different types of security circumstances and actions can be set up and employed from its tiers. Security circumstances can range from temporary misplacement of a mobile device at home to malicious theft in a hostile region. Security actions can range from ringing a simple alarm to automatically erasing, overwriting, and re-erasing drives.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 20:23:51 GMT" } ]
2008-09-11T00:00:00
[ [ "Bardsley", "Scott", "" ], [ "Thomas", "Theodosios", "" ], [ "Morris", "R. Paul", "" ] ]
new_dataset
0.99753
0809.1710
Sreyash Kenkre
Ajit A. Diwan, Sreyash Kenkre, Sundar Vishwanathan
Circumference, Chromatic Number and Online Coloring
12 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erd\"os conjectured that if $G$ is a triangle free graph of chromatic number at least $k\geq 3$, then it contains an odd cycle of length at least $k^{2-o(1)}$ \cite{sudakovverstraete, verstraete}. Nothing better than a linear bound (\cite{gyarfas}, Problem 5.1.55 in \cite{West}) was so far known. We make progress on this conjecture by showing that $G$ contains an odd cycle of length at least $O(k\log\log k)$. Erd\"os' conjecture is known to hold for graphs with girth at least 5. We show that if a girth 4 graph is $C_5$ free, then Erd\"os' conjecture holds. When the number of vertices is not too large we can prove better bounds on $\chi$. We also give bounds on the chromatic number of graphs with at most $r$ cycles of length $1\bmod k$, or at most $s$ cycles of length $2\bmod k$, or no cycles of length $3\bmod k$. Our techniques essentially consist of using a depth first search tree to decompose the graph into ordered paths, which are then fed to an online coloring algorithm. Using this technique we give simple proofs of some old results, and also obtain several simpler results. We also obtain a lower bound on the number of colors an online coloring algorithm needs to use on triangle free graphs.
[ { "version": "v1", "created": "Wed, 10 Sep 2008 05:42:17 GMT" } ]
2008-09-11T00:00:00
[ [ "Diwan", "Ajit A.", "" ], [ "Kenkre", "Sreyash", "" ], [ "Vishwanathan", "Sundar", "" ] ]
new_dataset
0.98112
0809.1790
Carlos Perez-Delgado
Donny Cheung, Carlos A. Perez-Delgado
Cellular Automata as a Model of Physical Systems
To appear in the Proceedings of AUTOMATA 2007
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular Automata (CA), as they are presented in the literature, are abstract mathematical models of computation. In this pa- per we present an alternate approach: using the CA as a model or theory of physical systems and devices. While this approach abstracts away all details of the underlying physical system, it remains faithful to the fact that there is an underlying physical reality which it describes. This imposes certain restrictions on the types of computations a CA can physically carry out, and the resources it needs to do so. In this paper we explore these and other consequences of our reformalization.
[ { "version": "v1", "created": "Wed, 10 Sep 2008 13:46:25 GMT" } ]
2008-09-11T00:00:00
[ [ "Cheung", "Donny", "" ], [ "Perez-Delgado", "Carlos A.", "" ] ]
new_dataset
0.998976
0801.1783
Olivier Finkel
Jacques Duparc (UNIL), Olivier Finkel (LIP)
An omega-power of a context-free language which is Borel above Delta^0_omega
To appear in the Proceedings of the International Conference Foundations of the Formal Sciences V : Infinite Games, November 26th to 29th, 2004, Bonn, Germany, Stefan Bold, Benedikt L\"owe, Thoralf R\"asch, Johan van Benthem (eds.), College Publications at King's College (Studies in Logic), 2007
Dans Proceedings of the International Conference on Foundations of the Formal Sciences V : Infinite Games - Foundations of the Formal Sciences V : Infinite Games, November 26-29, 2004, Bonn : Allemagne
null
null
cs.CC cs.GT cs.LO math.LO
null
We use erasers-like basic operations on words to construct a set that is both Borel and above Delta^0_omega, built as a set V^\omega where V is a language of finite words accepted by a pushdown automaton. In particular, this gives a first example of an omega-power of a context free language which is a Borel set of infinite rank.
[ { "version": "v1", "created": "Fri, 11 Jan 2008 14:20:30 GMT" } ]
2008-09-10T00:00:00
[ [ "Duparc", "Jacques", "", "UNIL" ], [ "Finkel", "Olivier", "", "LIP" ] ]
new_dataset
0.999025
0809.1618
Antonio Pereira
Antonio Pereira
ECOLANG - Communications Language for Ecological Simulations Network
16 pages, language specification description
null
null
TR-LIACC-FEUP-AMCP 01.1
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document describes the communication language used in one multiagent system environment for ecological simulations, based on EcoDynamo simulator application linked with several intelligent agents and visualisation applications, and extends the initial definition of the language. The agents actions and perceptions are translated into messages exchanged with the simulator application and other agents. The concepts and definitions used follow the BNF notation (Backus et al. 1960) and is inspired in the Coach Unilang language (Reis and Lau 2002).
[ { "version": "v1", "created": "Tue, 9 Sep 2008 17:46:17 GMT" } ]
2008-09-10T00:00:00
[ [ "Pereira", "Antonio", "" ] ]
new_dataset
0.964977
0809.1177
Andrzej Karbowski
Andrzej Karbowski
Amdahl's and Gustafson-Barsis laws revisited
null
null
null
null
cs.DC cs.GT cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a simple derivation of the Gustafson-Barsis law from the Amdahl's law. In the computer literature these two laws describing the speedup limits of parallel applications are derived separately. It is shown, that treating the time of the execution of the sequential part of the application as a constant, in few lines the Gustafson-Barsis law can be obtained from the Amdahl's law and that the popular claim, that Gustafson-Barsis law overthrows Amdahl's law is a mistake.
[ { "version": "v1", "created": "Sat, 6 Sep 2008 15:06:53 GMT" } ]
2008-09-09T00:00:00
[ [ "Karbowski", "Andrzej", "" ] ]
new_dataset
0.999621
cs/0703096
Aleksandar Donev
Aleksandar Donev
Asynchronous Event-Driven Particle Algorithms
To appear in Simulation: Transactions of the Society for Modeling and Simulation International, 2008
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present, in a unifying way, the main components of three asynchronous event-driven algorithms for simulating physical systems of interacting particles. The first example, hard-particle molecular dynamics, is well-known. We also present a recently-developed diffusion kinetic Monte Carlo algorithm, as well as a novel stochastic molecular-dynamics algorithm that builds on the Direct Simulation Monte Carlo. We explain how to effectively combine asynchronous event-driven with classical time-driven or with synchronous event-driven handling. Finally, we discuss some promises and challenges for event-driven simulation of realistic physical systems.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 16:52:20 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 19:13:32 GMT" } ]
2008-09-09T00:00:00
[ [ "Donev", "Aleksandar", "" ] ]
new_dataset
0.962171
0809.0833
Fabien Mathieu
Fabien Mathieu (INRIA Rocquencourt, FT R&D, INRIA Rocquencourt), Gheorghe Postelnicu, Julien Reynier (INRIA Rocquencourt)
The stable configuration in acyclic preference-based systems
null
null
null
RR-6628
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Acyclic preferences recently appeared as an elegant way to model many distributed systems. An acyclic instance admits a unique stable configuration, which can reveal the performance of the system. In this paper, we give the statistical properties of the stable configuration for three classes of acyclic preferences: node-based preferences, distance-based preferences, and random acyclic systems. Using random overlay graphs, we prove using mean-field and fluid-limit techniques that these systems have an asymptotically continuous independent rank distribution for a proper scaling, and the analytical solution is compared to simulations. These results provide a theoretical ground for validating the performance of bandwidth-based or proximity-based unstructured systems.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 15:12:00 GMT" } ]
2008-09-05T00:00:00
[ [ "Mathieu", "Fabien", "", "INRIA Rocquencourt, FT R&D, INRIA Rocquencourt" ], [ "Postelnicu", "Gheorghe", "", "INRIA Rocquencourt" ], [ "Reynier", "Julien", "", "INRIA Rocquencourt" ] ]
new_dataset
0.988092
0802.1785
Ryutaroh Matsumoto
Atsushi Okawado, Ryutaroh Matsumoto, Tomohiko Uyematsu
Near ML detection using Dijkstra's algorithm with bounded list size over MIMO channels
8 pages, two column, 14 figures, LaTeX2e
Proceedings of 2008 IEEE International Symposium on Information Theory, pp. 2022-2025, 2008
10.1109/ISIT.2008.4595344
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose Dijkstra's algorithm with bounded list size after QR decomposition for decreasing the computational complexity of near maximum-likelihood (ML) detection of signals over multiple-input-multiple-output (MIMO) channels. After that, we compare the performances of proposed algorithm, QR decomposition M-algorithm (QRD-MLD), and its improvement. When the list size is set to achieve the almost same symbol error rate (SER) as the QRD-MLD, the proposed algorithm has smaller average computational complexity.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 09:43:14 GMT" } ]
2008-09-02T00:00:00
[ [ "Okawado", "Atsushi", "" ], [ "Matsumoto", "Ryutaroh", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
new_dataset
0.98114
0709.0749
Ketan Mulmuley D
Ketan D. Mulmuley
Geometric Complexity Theory VII: Nonstandard quantum group for the plethysm problem
59 pages, changed content
null
null
TR-2007-14, comp. sci. dept., The University Of Chicago
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes a {\em nonstandard} quantum group that may be used to derive a positive formula for the plethysm problem, just as the standard (Drinfeld-Jimbo) quantum group can be used to derive the positive Littlewood-Richardson rule for arbitrary complex semisimple Lie groups. The sequel \cite{GCT8} gives conjecturally correct algorithms to construct canonical bases of the coordinate rings of these nonstandard quantum groups and canonical bases of the dually paired nonstandard deformations of the symmetric group algebra. A positive $#P$-formula for the plethysm constant follows from the conjectural properties of these canonical bases and the duality and reciprocity conjectures herein.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 22:23:15 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2008 17:06:03 GMT" } ]
2008-09-01T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
new_dataset
0.980798
0808.4060
Wojciech Mazurczyk
Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
18 pages, 7 figures, accepted to The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008 (Proceedings will be published by Springer LNCS)
null
null
null
cs.CR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents TrustMAS - Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents. The platform includes anonymous technique based on random-walk algorithm for providing general purpose anonymous communication for agents. All agents, which take part in the proposed platform, benefit from trust and anonymity that is provided for their interactions. Moreover, in TrustMAS there are StegAgents (SA) that are able to perform various steganographic communication. To achieve that goal, SAs may use methods in different layers of TCP/IP model or specialized middleware enabling steganography that allows hidden communication through all layers of mentioned model. In TrustMAS steganographic channels are used to exchange routing tables between StegAgents. Thus all StegAgents in TrustMAS with their ability to exchange information by using hidden channels form distributed steganographic router (Stegrouter).
[ { "version": "v1", "created": "Fri, 29 Aug 2008 10:02:20 GMT" } ]
2008-09-01T00:00:00
[ [ "Szczypiorski", "Krzysztof", "" ], [ "Margasinski", "Igor", "" ], [ "Mazurczyk", "Wojciech", "" ], [ "Cabaj", "Krzysztof", "" ], [ "Radziszewski", "Pawel", "" ] ]
new_dataset
0.993067
0808.3889
Manuel Tomas Carrasco Benitez Mr.
M.T. Carrasco Benitez
Open architecture for multilingual parallel texts
22 pages - for comments to the author and follow-ups go to http://dragoman.org/par
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Multilingual parallel texts (abbreviated to parallel texts) are linguistic versions of the same content ("translations"); e.g., the Maastricht Treaty in English and Spanish are parallel texts. This document is about creating an open architecture for the whole Authoring, Translation and Publishing Chain (ATP-chain) for the processing of parallel texts.
[ { "version": "v1", "created": "Thu, 28 Aug 2008 11:59:34 GMT" } ]
2008-08-29T00:00:00
[ [ "Benitez", "M. T. Carrasco", "" ] ]
new_dataset
0.97639
0808.3693
Xavier Grehant
Xavier Grehant and J.M. Dana
Providing Virtual Execution Environments: A Twofold Illustration
openlab Technical Documents and Publications
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Platform virtualization helps solving major grid computing challenges: share resource with flexible, user-controlled and custom execution environments and in the meanwhile, isolate failures and malicious code. Grid resource management tools will evolve to embrace support for virtual resource. We present two open source projects that transparently supply virtual execution environments. Tycoon has been developed at HP Labs to optimise resource usage in creating an economy where users bid to access virtual machines and compete for CPU cycles. SmartDomains provides a peer-to-peer layer that automates virtual machines deployment using a description language and deployment engine from HP Labs. These projects demonstrate both client-server and peer-to-peer approaches to virtual resource management. The first case makes extensive use of virtual machines features for dynamic resource allocation. The second translates virtual machines capabilities into a sophisticated language where resource management components can be plugged in configurations and architectures defined at deployment time. We propose to share our experience at CERN openlab developing SmartDomains and deploying Tycoon to give an illustrative introduction to emerging research in virtual resource management.
[ { "version": "v1", "created": "Wed, 27 Aug 2008 12:48:39 GMT" } ]
2008-08-28T00:00:00
[ [ "Grehant", "Xavier", "" ], [ "Dana", "J. M.", "" ] ]
new_dataset
0.996194
0805.2938
Wojciech Mazurczyk
Wojciech Mazurczyk and Krzysztof Szczypiorski
Steganography of VoIP Streams
18 pages, 9 figures, content changed, accepted to The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008 (Proceedings will be published by Springer LNCS)
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second method, called LACK (Lost Audio Packets Steganography), provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
[ { "version": "v1", "created": "Mon, 19 May 2008 20:46:38 GMT" }, { "version": "v2", "created": "Mon, 25 Aug 2008 10:40:57 GMT" } ]
2008-08-25T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Szczypiorski", "Krzysztof", "" ] ]
new_dataset
0.994945
0807.1523
Philippe Dumas
Philippe Dumas (INRIA Rocquencourt)
Mean asymptotic behaviour of radix-rational sequences and dilation equations (Extended version)
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The generating series of a radix-rational sequence is a rational formal power series from formal language theory viewed through a fixed radix numeration system. For each radix-rational sequence with complex values we provide an asymptotic expansion for the sequence of its Ces\`aro means. The precision of the asymptotic expansion depends on the joint spectral radius of the linear representation of the sequence; the coefficients are obtained through some dilation equations. The proofs are based on elementary linear algebra.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 19:15:48 GMT" }, { "version": "v2", "created": "Thu, 21 Aug 2008 19:52:55 GMT" } ]
2008-08-21T00:00:00
[ [ "Dumas", "Philippe", "", "INRIA Rocquencourt" ] ]
new_dataset
0.998459
0808.2703
Alfonso Martinez
Alfonso Martinez
Low-Signal-Energy Asymptotics of Capacity and Mutual Information for the Discrete-Time Poisson Channel
Submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The first terms of the low-signal-energy asymptotics for the mutual information in the discrete-time Poisson channel are derived and compared to an asymptotic expression of the capacity. In the presence of non-zero additive noise (either Poisson or geometric), the mutual information is concave at zero signal-energy and the minimum energy per bit is not attained at zero capacity. Fixed signal constellations which scale with the signal energy do not attain the minimum energy per bit. The minimum energy per bit is zero when additive Poisson noise is present and $\ew\log 2$ when additive geometric noise of mean $\ew$ is present.
[ { "version": "v1", "created": "Wed, 20 Aug 2008 07:43:18 GMT" } ]
2008-08-21T00:00:00
[ [ "Martinez", "Alfonso", "" ] ]
new_dataset
0.97458
0805.3339
Daniel Lemire
Kamel Aouiche, Daniel Lemire, Owen Kaser
Tri de la table de faits et compression des index bitmaps avec alignement sur les mots
to appear at BDA'08
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitmap indexes are frequently used to index multidimensional data. They rely mostly on sequential input/output. Bitmaps can be compressed to reduce input/output costs and minimize CPU usage. The most efficient compression techniques are based on run-length encoding (RLE), such as Word-Aligned Hybrid (WAH) compression. This type of compression accelerates logical operations (AND, OR) over the bitmaps. However, run-length encoding is sensitive to the order of the facts. Thus, we propose to sort the fact tables. We review lexicographic, Gray-code, and block-wise sorting. We found that a lexicographic sort improves compression--sometimes generating indexes twice as small--and make indexes several times faster. While sorting takes time, this is partially offset by the fact that it is faster to index a sorted table. Column order is significant: it is generally preferable to put the columns having more distinct values at the beginning. A block-wise sort is much less efficient than a full sort. Moreover, we found that Gray-code sorting is not better than lexicographic sorting when using word-aligned compression.
[ { "version": "v1", "created": "Wed, 21 May 2008 19:50:46 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2008 23:46:51 GMT" }, { "version": "v3", "created": "Fri, 15 Aug 2008 00:08:42 GMT" } ]
2008-08-15T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Lemire", "Daniel", "" ], [ "Kaser", "Owen", "" ] ]
new_dataset
0.99834
0808.1470
Sudhakar Sahoo
Sudhakar Sahoo, Sanjaya Sahoo, Birendra Kumar Nayak and Pabitra Pal Choudhury
Encompression Using Two-dimensional Cellular Automata Rules
5 pages, 4 figures
null
null
null
cs.DM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze the algebraic structure of some null boundary as well as some periodic boundary 2-D Cellular Automata (CA) rules by introducing a new matrix multiplication operation using only AND, OR instead of most commonly used AND, EX-OR. This class includes any CA whose rule, when written as an algebra, is a finite Abelean cyclic group in case of periodic boundary and a finite commutative cyclic monoid in case of null boundary CA respectively. The concept of 1-D Multiple Attractor Cellular Automata (MACA) is extended to 2-D. Using the family of 2-D MACA and the finite Abelian cyclic group, an efficient encompression algorithm is proposed for binary images.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 09:11:44 GMT" } ]
2008-08-12T00:00:00
[ [ "Sahoo", "Sudhakar", "" ], [ "Sahoo", "Sanjaya", "" ], [ "Nayak", "Birendra Kumar", "" ], [ "Choudhury", "Pabitra Pal", "" ] ]
new_dataset
0.999213
0808.1215
Joseph Y. Halpern
Joseph Y. Halpern and Vicky Weissman
A Formal Foundation for XrML
null
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XrML is becoming a popular language in industry for writing software licenses. The semantics for XrML is implicitly given by an algorithm that determines if a permission follows from a set of licenses. We focus on a fragment of the language and use it to highlight some problematic aspects of the algorithm. We then correct the problems, introduce formal semantics, and show that our semantics captures the (corrected) algorithm. Next, we consider the complexity of determining if a permission is implied by a set of XrML licenses. We prove that the general problem is undecidable, but it is polynomial-time computable for an expressive fragment of the language. We extend XrML to capture a wider range of licenses by adding negation to the language. Finally, we discuss the key differences between XrML and MPEG-21, an international standard based on XrML.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 16:25:58 GMT" } ]
2008-08-11T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Weissman", "Vicky", "" ] ]
new_dataset
0.976397
0808.0920
Mahesh Arumugam
Mahesh Arumugam
A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
14 pages
null
null
null
cs.OS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several self-stabilizing time division multiple access (TDMA) algorithms are proposed for sensor networks. In addition to providing a collision-free communication service, such algorithms enable the transformation of programs written in abstract models considered in distributed computing literature into a model consistent with sensor networks, i.e., write all with collision (WAC) model. Existing TDMA slot assignment algorithms have one or more of the following properties: (i) compute slots using a randomized algorithm, (ii) assume that the topology is known upfront, and/or (iii) assign slots sequentially. If these algorithms are used to transform abstract programs into programs in WAC model then the transformed programs are probabilistically correct, do not allow the addition of new nodes, and/or converge in a sequential fashion. In this paper, we propose a self-stabilizing deterministic TDMA algorithm where a sensor is aware of only its neighbors. We show that the slots are assigned to the sensors in a concurrent fashion and starting from arbitrary initial states, the algorithm converges to states where collision-free communication among the sensors is restored. Moreover, this algorithm facilitates the transformation of abstract programs into programs in WAC model that are deterministically correct.
[ { "version": "v1", "created": "Wed, 6 Aug 2008 20:33:56 GMT" } ]
2008-08-08T00:00:00
[ [ "Arumugam", "Mahesh", "" ] ]
new_dataset
0.994687
0808.0556
Paul Tarau
Paul Tarau
Logic Engines as Interactors
unpublished draft
null
null
null
cs.PL cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new programming language construct, Interactors, supporting the agent-oriented view that programming is a dialog between simple, self-contained, autonomous building blocks. We define Interactors as an abstraction of answer generation and refinement in Logic Engines resulting in expressive language extension and metaprogramming patterns, including emulation of Prolog's dynamic database. A mapping between backtracking based answer generation in the callee and "forward" recursion in the caller enables interaction between different branches of the callee's search process and provides simplified design patterns for algorithms involving combinatorial generation and infinite answer streams. Interactors extend language constructs like Ruby, Python and C#'s multiple coroutining block returns through yield statements and they can emulate the action of monadic constructs and catamorphisms in functional languages. Keywords: generalized iterators, logic engines, agent oriented programming language constructs, interoperation with stateful objects, metaprogramming
[ { "version": "v1", "created": "Tue, 5 Aug 2008 05:48:32 GMT" } ]
2008-08-07T00:00:00
[ [ "Tarau", "Paul", "" ] ]
new_dataset
0.997041
0808.0754
Paul Tarau
Paul Tarau
A Functional Hitchhiker's Guide to Hereditarily Finite Sets, Ackermann Encodings and Pairing Functions
unpublished draft
null
null
null
cs.MS cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper is organized as a self-contained literate Haskell program that implements elements of an executable finite set theory with focus on combinatorial generation and arithmetic encodings. The code, tested under GHC 6.6.1, is available at http://logic.csci.unt.edu/tarau/research/2008/fSET.zip . We introduce ranking and unranking functions generalizing Ackermann's encoding to the universe of Hereditarily Finite Sets with Urelements. Then we build a lazy enumerator for Hereditarily Finite Sets with Urelements that matches the unranking function provided by the inverse of Ackermann's encoding and we describe functors between them resulting in arithmetic encodings for powersets, hypergraphs, ordinals and choice functions. After implementing a digraph representation of Hereditarily Finite Sets we define {\em decoration functions} that can recover well-founded sets from encodings of their associated acyclic digraphs. We conclude with an encoding of arbitrary digraphs and discuss a concept of duality induced by the set membership relation. Keywords: hereditarily finite sets, ranking and unranking functions, executable set theory, arithmetic encodings, Haskell data representations, functional programming and computational mathematics
[ { "version": "v1", "created": "Wed, 6 Aug 2008 01:05:09 GMT" } ]
2008-08-07T00:00:00
[ [ "Tarau", "Paul", "" ] ]
new_dataset
0.957694
0808.0596
Ido Tal
Ido Tal, Tuvi Etzion, Ron M. Roth
On row-by-row coding for 2-D constraints
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A constant-rate encoder--decoder pair is presented for a fairly large family of two-dimensional (2-D) constraints. Encoding and decoding is done in a row-by-row manner, and is sliding-block decodable. Essentially, the 2-D constraint is turned into a set of independent and relatively simple one-dimensional (1-D) constraints; this is done by dividing the array into fixed-width vertical strips. Each row in the strip is seen as a symbol, and a graph presentation of the respective 1-D constraint is constructed. The maxentropic stationary Markov chain on this graph is next considered: a perturbed version of the corresponding probability distribution on the edges of the graph is used in order to build an encoder which operates in parallel on the strips. This perturbation is found by means of a network flow, with upper and lower bounds on the flow through the edges. A key part of the encoder is an enumerative coder for constant-weight binary words. A fast realization of this coder is shown, using floating-point arithmetic.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 10:14:08 GMT" } ]
2008-08-06T00:00:00
[ [ "Tal", "Ido", "" ], [ "Etzion", "Tuvi", "" ], [ "Roth", "Ron M.", "" ] ]
new_dataset
0.991366
0808.0235
S Birenjith
K. Sreeram, S. Birenjith, P. Vijay Kumar
DMT of Multi-hop Cooperative Networks - Part II: Half-Duplex Networks with Full-Duplex Performance
This submission is Part-II of a two-part paper, which is a detailed version of the previous submission arXiv:0802.1888
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider single-source single-sink (ss-ss) multi-hop relay networks, with slow-fading links and single-antenna half-duplex relay nodes. In a companion paper, we established some basic results which laid the foundation for the results presented here. In the present paper, we consider two families of networks of half-duplex networks. KPP networks may be viewed as the union of K node-disjoint parallel relaying paths. Generalizations of these networks include KPP(I) networks, which permit interference between paths and KPP(D) networks, which possess a direct link between source and sink. We characterize the DMT of these families of networks completely and show that they can achieve the cut-set bound, thus proving that full-duplex performance can be obtained even in the presence of the half-duplex constraint. We then consider layered networks, and prove that a linear DMT between maximum diversity and maximum multiplexing gain is achievable. All protocols in this paper are explicit and use only amplify-and-forward relaying. We also construct codes that achieve the optimal DMT for all the proposed schemes. Two key implications of the results in the paper are that the half-duplex constraint does not entail any rate loss for a large class of cooperative networks and that AF protocols are often optimal.
[ { "version": "v1", "created": "Sat, 2 Aug 2008 07:38:14 GMT" } ]
2008-08-05T00:00:00
[ [ "Sreeram", "K.", "" ], [ "Birenjith", "S.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.986048
0808.0374
Eri Prasetyo Wibowo
Eri Prasetyo, Hamzah Afandi, Nurul Huda Dominique Ginhac, Michel Paindavoine
A 8 bits Pipeline Analog to Digital Converter Design for High Speed Camera Application
5 pages, 5 authors, conference
EEPIS, 2007
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- This paper describes a pipeline analog-to-digital converter is implemented for high speed camera. In the pipeline ADC design, prime factor is designing operational amplifier with high gain so ADC have been high speed. The other advantage of pipeline is simple on concept, easy to implement in layout and have flexibility to increase speed. We made design and simulation using Mentor Graphics Software with 0.6 \mu m CMOS technology with a total power dissipation of 75.47 mW. Circuit techniques used include a precise comparator, operational amplifier and clock management. A switched capacitor is used to sample and multiplying at each stage. Simulation a worst case DNL and INL of 0.75 LSB. The design operates at 5 V dc. The ADC achieves a SNDR of 44.86 dB. keywords: pipeline, switched capacitor, clock management
[ { "version": "v1", "created": "Mon, 4 Aug 2008 03:23:20 GMT" } ]
2008-08-05T00:00:00
[ [ "Prasetyo", "Eri", "" ], [ "Afandi", "Hamzah", "" ], [ "Ginhac", "Nurul Huda Dominique", "" ], [ "Paindavoine", "Michel", "" ] ]
new_dataset
0.975159
0807.4995
Kwankyu Lee
Kwankyu Lee and Michael E. O'Sullivan
Algebraic Soft-Decision Decoding of Hermitian Codes
17 pages, submitted to IEEE Transaction on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algebraic soft-decision decoder for Hermitian codes is presented. We apply Koetter and Vardy's soft-decision decoding framework, now well established for Reed-Solomon codes, to Hermitian codes. First we provide an algebraic foundation for soft-decision decoding. Then we present an interpolation algorithm finding the Q-polynomial that plays a key role in the decoding. With some simulation results, we compare performances of the algebraic soft-decision decoders for Hermitian codes and Reed-Solomon codes, favorable to the former.
[ { "version": "v1", "created": "Thu, 31 Jul 2008 07:05:27 GMT" } ]
2008-08-01T00:00:00
[ [ "Lee", "Kwankyu", "" ], [ "O'Sullivan", "Michael E.", "" ] ]
new_dataset
0.953498
0807.4620
Christoph Koch
Christoph Koch
A Compositional Query Algebra for Second-Order Logic and Uncertain Databases
22 pages, 1 figure
null
null
null
cs.DB cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
World-set algebra is a variable-free query language for uncertain databases. It constitutes the core of the query language implemented in MayBMS, an uncertain database system. This paper shows that world-set algebra captures exactly second-order logic over finite structures, or equivalently, the polynomial hierarchy. The proofs also imply that world-set algebra is closed under composition, a previously open problem.
[ { "version": "v1", "created": "Tue, 29 Jul 2008 11:22:01 GMT" } ]
2008-07-30T00:00:00
[ [ "Koch", "Christoph", "" ] ]
new_dataset
0.995866
0807.4309
Praveen Sivadasan
Praveen Sivadasan, P. Sojan Lal
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays. The class method definition codes are obscured through index transformation and constant hiding. The instantiated objects of these classes are used for source code writing. A tool named JDATATRANS is developed for generating classes and to the best of our knowledge this is the first tool available for array restructuring, on java source codes.
[ { "version": "v1", "created": "Sun, 27 Jul 2008 16:25:55 GMT" } ]
2008-07-29T00:00:00
[ [ "Sivadasan", "Praveen", "" ], [ "Lal", "P. Sojan", "" ] ]
new_dataset
0.998885
0807.4345
Eri Prasetyo Wibowo
Eri Prasetyo, Wahyu K.R. and Bumi Prabu Prabowo
Avoider robot design to dim the fire with dt basic mini system
5 pages, 5 figures, IES Conference
9 th IES 2007, EEPIS ITS Surabaya
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Avoider robot is mean robot who is designed to avoid the block in around. Except that, this robot is also added by an addition application to dim the fire. This robot is made with ultrasonic sensor PING. This sensor is set on the front, right and left from robot. This sensor is used robot to look for the right street, so that robot can walk on. After the robot can look for the right street, next accomplished the robot is looking for the fire in around. And the next, dim the fire with fan. This robot is made with basic stamp 2 micro-controller. And that micro-controller can be found in dt-basic mini system module. This robot is made with servo motor on the right and left side, which is used to movement.
[ { "version": "v1", "created": "Mon, 28 Jul 2008 02:46:45 GMT" } ]
2008-07-29T00:00:00
[ [ "Prasetyo", "Eri", "" ], [ "R.", "Wahyu K.", "" ], [ "Prabowo", "Bumi Prabu", "" ] ]
new_dataset
0.998924
0807.4478
Carlos Miravet
Carlos Miravet, Luis Pascual, Eloise Krouch, Juan Manuel del Cura
An Image-Based Sensor System for Autonomous Rendez-Vous with Uncooperative Satellites
12 pages, 13 figures. Presented in the 7th International ESA Conference on Guidance, Navigation & Control Systems, Tralee, Ireland, 2008
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper are described the image processing algorithms developed by SENER, Ingenieria y Sistemas to cope with the problem of image-based, autonomous rendez-vous (RV) with an orbiting satellite. The methods developed have a direct application in the OLEV (Orbital Life Extension Extension Vehicle) mission. OLEV is a commercial mission under development by a consortium formed by Swedish Space Corporation, Kayser-Threde and SENER, aimed to extend the operational life of geostationary telecommunication satellites by supplying them control, navigation and guidance services. OLEV is planned to use a set of cameras to determine the angular position and distance to the client satellite during the complete phases of rendez-vous and docking, thus enabling the operation with satellites not equipped with any specific navigational aid to provide support during the approach. The ability to operate with un-equipped client satellites significantly expands the range of applicability of the system under development, compared to other competing video technologies already tested in previous spatial missions, such as the ones described here below.
[ { "version": "v1", "created": "Mon, 28 Jul 2008 15:46:02 GMT" } ]
2008-07-29T00:00:00
[ [ "Miravet", "Carlos", "" ], [ "Pascual", "Luis", "" ], [ "Krouch", "Eloise", "" ], [ "del Cura", "Juan Manuel", "" ] ]
new_dataset
0.995232
0807.4128
Smarajit Das
Smarajit Das and B. Sundar Rajan
Square Complex Orthogonal Designs with Low PAPR and Signaling Complexity
Accepted for publication in IEEE Transactions on Wireless Communication. 10 pages, 6 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Space-Time Block Codes from square complex orthogonal designs (SCOD) have been extensively studied and most of the existing SCODs contain large number of zero. The zeros in the designs result in high peak-to-average power ratio (PAPR) and also impose a severe constraint on hardware implementation of the code when turning off some of the transmitting antennas whenever a zero is transmitted. Recently, rate 1/2 SCODs with no zero entry have been reported for 8 transmit antennas. In this paper, SCODs with no zero entry for $2^a$ transmit antennas whenever $a+1$ is a power of 2, are constructed which includes the 8 transmit antennas case as a special case. More generally, for arbitrary values of $a$, explicit construction of $2^a\times 2^a$ rate $\frac{a+1}{2^a}$ SCODs with the ratio of number of zero entries to the total number of entries equal to $1-\frac{a+1}{2^a}2^{\lfloor log_2(\frac{2^a}{a+1}) \rfloor}$ is reported, whereas for standard known constructions, the ratio is $1-\frac{a+1}{2^a}$. The codes presented do not result in increased signaling complexity. Simulation results show that the codes constructed in this paper outperform the codes using the standard construction under peak power constraint while performing the same under average power constraint.
[ { "version": "v1", "created": "Fri, 25 Jul 2008 15:57:23 GMT" } ]
2008-07-28T00:00:00
[ [ "Das", "Smarajit", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.996052
0807.3593
Chandra Nair
Chandra Nair
An outer bound for 2-receiver discrete memoryless broadcast channels
3 pages, a note
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An outer bound to the two-receiver discrete memoryless broadcast channel is presented. We compare it to the known outer bounds and show that the outer bound presented is at least as tight as the existing bounds.
[ { "version": "v1", "created": "Wed, 23 Jul 2008 03:43:30 GMT" } ]
2008-07-24T00:00:00
[ [ "Nair", "Chandra", "" ] ]
new_dataset
0.968236
0807.3699
Francisco Arguello
Francisco Arguello
Multiplication in Cyclotomic Rings and its Application to Finite Fields
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A representation of finite fields that has proved useful when implementing finite field arithmetic in hardware is based on an isomorphism between subrings and fields. In this paper, we present an unified formulation for multiplication in cyclotomic rings and cyclotomic fields in that most arithmetic operations are done on vectors. From this formulation we can generate optimized algorithms for multiplication. For example, one of the proposed algorithms requires approximately half the number of coordinate-level multiplications at the expense of extra coordinate-level additions. Our method is then applied to the finite fields GF(q^m) to further reduce the number of operations. We then present optimized algorithms for multiplication in finite fields with type-I and type-II optimal normal bases.
[ { "version": "v1", "created": "Wed, 23 Jul 2008 15:50:49 GMT" } ]
2008-07-24T00:00:00
[ [ "Arguello", "Francisco", "" ] ]
new_dataset
0.980307
0807.2997
Grenville Croll
Bill Bekenn and Ray Hooper
Reducing Spreadsheet Risk with FormulaDataSleuth
10 pages, 12 colour figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 33-44 ISBN 978-905617-69-2
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new MS Excel application has been developed which seeks to reduce the risks associated with the development, operation and auditing of Excel spreadsheets. FormulaDataSleuth provides a means of checking spreadsheet formulas and data as they are developed or used, enabling the users to identify actual or potential errors quickly and thereby halt their propagation. In this paper, we will describe, with examples, how the application works and how it can be applied to reduce the risks associated with Excel spreadsheets.
[ { "version": "v1", "created": "Fri, 18 Jul 2008 16:00:34 GMT" } ]
2008-07-21T00:00:00
[ [ "Bekenn", "Bill", "" ], [ "Hooper", "Ray", "" ] ]
new_dataset
0.985496
0807.2680
Yeow Meng Chee
Yeow Meng Chee, Gennian Ge, Alan C. H. Ling
Group Divisible Codes and Their Application in the Construction of Optimal Constant-Composition Codes of Weight Three
13 pages, 1 figure, 4 tables
IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3552-3564, 2008
10.1109/TIT.2008.926349
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of group divisible codes, a generalization of group divisible designs with constant block size, is introduced in this paper. This new class of codes is shown to be useful in recursive constructions for constant-weight and constant-composition codes. Large classes of group divisible codes are constructed which enabled the determination of the sizes of optimal constant-composition codes of weight three (and specified distance), leaving only four cases undetermined. Previously, the sizes of constant-composition codes of weight three were known only for those of sufficiently large length.
[ { "version": "v1", "created": "Thu, 17 Jul 2008 01:51:27 GMT" } ]
2008-07-18T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Ge", "Gennian", "" ], [ "Ling", "Alan C. H.", "" ] ]
new_dataset
0.999343
cs/0501023
Arindam Mitra
Arindam Mitra
No-cloning principal can alone provide security
Acknowledgement is due
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing quantum key distribution schemes need the support of classical authentication scheme to ensure security. This is a conceptual drawback of quantum cryptography. It is pointed out that quantum cryptosystem does not need any support of classical cryptosystem to ensure security. No-cloning principal can alone provide security in communication. Even no-cloning principle itself can help to authenticate each bit of information. It implies that quantum password need not to be a secret password.
[ { "version": "v1", "created": "Wed, 12 Jan 2005 07:28:13 GMT" }, { "version": "v10", "created": "Tue, 20 Nov 2007 15:30:55 GMT" }, { "version": "v11", "created": "Tue, 19 Feb 2008 13:13:19 GMT" }, { "version": "v12", "created": "Fri, 18 Jul 2008 14:02:21 GMT" }, { "version": "v2", "created": "Tue, 22 Mar 2005 15:43:11 GMT" }, { "version": "v3", "created": "Wed, 7 Dec 2005 15:22:55 GMT" }, { "version": "v4", "created": "Fri, 20 Oct 2006 16:07:27 GMT" }, { "version": "v5", "created": "Sat, 4 Nov 2006 15:37:38 GMT" }, { "version": "v6", "created": "Sun, 17 Dec 2006 16:14:06 GMT" }, { "version": "v7", "created": "Thu, 8 Mar 2007 14:45:46 GMT" }, { "version": "v8", "created": "Mon, 2 Apr 2007 15:30:27 GMT" }, { "version": "v9", "created": "Tue, 1 May 2007 14:36:56 GMT" } ]
2008-07-18T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
new_dataset
0.995619
0807.2383
Michel Rueher
H\'el\`ene Collavizza (I3S), Michel Rueher (I3S), Pascal Van Hentenryck (Brown University)
CPBVP: A Constraint-Programming Framework for Bounded Program Verification
null
The 14th International Conference on Principles and Practice of Constraint Programming, Sydney : Australie (2008)
null
null
cs.SE cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification (CPBPV). The CPBPV framework uses constraint stores to represent the specification and the program and explores execution paths nondeterministically. The input program is partially correct if each constraint store so produced implies the post-condition. CPBPV does not explore spurious execution paths as it incrementally prunes execution paths early by detecting that the constraint store is not consistent. CPBPV uses the rich language of constraint programming to express the constraint store. Finally, CPBPV is parametrized with a list of solvers which are tried in sequence, starting with the least expensive and less general. Experimental results often produce orders of magnitude improvements over earlier approaches, running times being often independent of the variable domains. Moreover, CPBPV was able to detect subtle errors in some programs while other frameworks based on model checking have failed.
[ { "version": "v1", "created": "Tue, 15 Jul 2008 14:18:43 GMT" } ]
2008-07-16T00:00:00
[ [ "Collavizza", "Hélène", "", "I3S" ], [ "Rueher", "Michel", "", "I3S" ], [ "Van Hentenryck", "Pascal", "", "Brown University" ] ]
new_dataset
0.969398
0807.2440
Natalia Silberstein
Tuvi Etzion, Natalia Silberstein
Construction of Error-Correcting Codes for Random Network Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present error-correcting codes for random network coding based on rank- metric codes, Ferrers diagrams, and puncturing. For most parameters, the constructed codes are larger than all previously known codes.
[ { "version": "v1", "created": "Tue, 15 Jul 2008 19:57:23 GMT" } ]
2008-07-16T00:00:00
[ [ "Etzion", "Tuvi", "" ], [ "Silberstein", "Natalia", "" ] ]
new_dataset
0.998828
0807.1524
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis), Ekaterina Komendantskaya (INRIA Sophia Antipolis)
Inductive and Coinductive Components of Corecursive Functions in Coq
Dans Coalgebraic Methods in Computer Science (2008)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Constructive Type Theory, recursive and corecursive definitions are subject to syntactic restrictions which guarantee termination for recursive functions and productivity for corecursive functions. However, many terminating and productive functions do not pass the syntactic tests. Bove proposed in her thesis an elegant reformulation of the method of accessibility predicates that widens the range of terminative recursive functions formalisable in Constructive Type Theory. In this paper, we pursue the same goal for productive corecursive functions. Notably, our method of formalisation of coinductive definitions of productive functions in Coq requires not only the use of ad-hoc predicates, but also a systematic algorithm that separates the inductive and coinductive parts of functions.
[ { "version": "v1", "created": "Wed, 9 Jul 2008 19:16:25 GMT" } ]
2008-07-10T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ], [ "Komendantskaya", "Ekaterina", "", "INRIA\n Sophia Antipolis" ] ]
new_dataset
0.980997
0807.1160
Charles Shen
Charles Shen, Henning Schulzrinne, Erich Nahum
Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation
In Proceedings of IPTComm 2008
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload problem calls for a pushback control solution in which the potentially overloaded receiving server may notify its upstream sending servers to have them send only the amount of load within the receiving server's processing capacity. The pushback framework can be achieved by either a rate-based feedback or a window-based feedback. The centerpiece of the feedback mechanism is the algorithm used to generate load regulation information. We propose three new window-based feedback algorithms and evaluate them together with two existing rate-based feedback algorithms. We compare the different algorithms in terms of the number of tuning parameters and performance under both steady and variable load. Furthermore, we identify two categories of fairness requirements for SIP overload control, namely, user-centric and provider-centric fairness. With the introduction of a new double-feed SIP overload control architecture, we show how the algorithms can meet those fairness criteria.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 03:23:41 GMT" } ]
2008-07-09T00:00:00
[ [ "Shen", "Charles", "" ], [ "Schulzrinne", "Henning", "" ], [ "Nahum", "Erich", "" ] ]
new_dataset
0.994833
0805.0615
Yingquan Wu
Yingquan Wu
On Expanded Cyclic Codes
23 pages. Submitted for publication in IEEE Trans. Inform. Theory
null
null
null
cs.IT cs.CC math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We characterize the properties of component codewords of a codeword and particularly identify the precise conditions under which a codeword can be represented by a subbasis. Our developments reveal an alternative while more general view on the subspace subcodes of Reed-Solomon codes. With the new insights, we present an improved lower bound on the minimum distance of an expanded cyclic code by exploiting the generalized concatenated structure. We also show that the fixed-rate binary expanded Reed-Solomon codes are asymptotically "bad", in the sense that the ratio of minimum distance over code length diminishes with code length going to infinity. It overturns the prevalent conjecture that they are "good" codes and deviates from the ensemble of generalized Reed-Solomon codes which asymptotically achieves the Gilbert-Varshamov bound.
[ { "version": "v1", "created": "Mon, 5 May 2008 22:51:12 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2008 16:53:04 GMT" } ]
2008-07-08T00:00:00
[ [ "Wu", "Yingquan", "" ] ]
new_dataset
0.989677
0807.0718
Flavio D'Alessandro
Flavio D'Alessandro, Benedetto Intrigila, Stefano Varricchio
The Parikh functions of sparse context-free languages are quasi-polynomials
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the Parikh map of a bounded context-free language is a box spline. Moreover we prove that in this case, such a function is rational.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 11:01:15 GMT" } ]
2008-07-08T00:00:00
[ [ "D'Alessandro", "Flavio", "" ], [ "Intrigila", "Benedetto", "" ], [ "Varricchio", "Stefano", "" ] ]
new_dataset
0.993176
0807.0626
Christian Tanguy
Christian Tanguy
Asymptotic Mean Time To Failure and Higher Moments for Large, Recursive Networks
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with asymptotic expressions of the Mean Time To Failure (MTTF) and higher moments for large, recursive, and non-repairable systems in the context of two-terminal reliability. Our aim is to extend the well-known results of the series and parallel cases. We first consider several exactly solvable configurations of identical components with exponential failure-time distribution functions to illustrate different (logarithmic or power-law) behaviors as the size of the system, indexed by an integer n, increases. The general case is then addressed: it provides a simple interpretation of the origin of the power-law exponent and an efficient asymptotic expression for the total reliability of large, recursive systems. Finally, we assess the influence of the non-exponential character of the component reliability on the n-dependence of the MTTF.
[ { "version": "v1", "created": "Thu, 3 Jul 2008 19:44:36 GMT" } ]
2008-07-04T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
new_dataset
0.988079
0806.4858
Guangwu Xu
Adrian Dumitrescu, Csaba D. T\'oth and Guangwu Xu
On stars and Steiner stars. II
10 pages, 1 figure
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A {\em Steiner star} for a set $P$ of $n$ points in $\RR^d$ connects an arbitrary center point to all points of $P$, while a {\em star} connects a point $p\in P$ to the remaining $n-1$ points of $P$. All connections are realized by straight line segments. Fekete and Meijer showed that the minimum star is at most $\sqrt{2}$ times longer than the minimum Steiner star for any finite point configuration in $\RR^d$. The maximum ratio between them, over all finite point configurations in $\RR^d$, is called the {\em star Steiner ratio} in $\RR^d$. It is conjectured that this ratio is $4/\pi = 1.2732...$ in the plane and $4/3=1.3333...$ in three dimensions. Here we give upper bounds of 1.3631 in the plane, and 1.3833 in 3-space, thereby substantially improving recent upper bounds of 1.3999, and $\sqrt{2}-10^{-4}$, respectively. Our results also imply improved bounds on the maximum ratios between the minimum star and the maximum matching in two and three dimensions.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 19:46:43 GMT" } ]
2008-07-01T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Tóth", "Csaba D.", "" ], [ "Xu", "Guangwu", "" ] ]
new_dataset
0.995875
0806.4221
Mirela Damian
Mirela Damian and Sriram V. Pemmaraju
Localized Spanners for Wireless Networks
21 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new efficient localized algorithm to construct, for any given quasi-unit disk graph G=(V,E) and any e > 0, a (1+e)-spanner for G of maximum degree O(1) and total weight O(w(MST)), where w(MST) denotes the weight of a minimum spanning tree for V. We further show that similar localized techniques can be used to construct, for a given unit disk graph G = (V, E), a planar Cdel(1+e)(1+pi/2)-spanner for G of maximum degree O(1) and total weight O(w(MST)). Here Cdel denotes the stretch factor of the unit Delaunay triangulation for V. Both constructions can be completed in O(1) communication rounds, and require each node to know its own coordinates.
[ { "version": "v1", "created": "Thu, 26 Jun 2008 02:09:17 GMT" } ]
2008-06-27T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Pemmaraju", "Sriram V.", "" ] ]
new_dataset
0.95185
0806.3938
Haluk Bingol
Ilker Yildirim and Haluk Bingol
Cooperation with Complement is Better
9 pages
null
null
null
cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a setting where heterogeneous agents interact to accomplish a given set of goals, cooperation is of utmost importance, especially when agents cannot achieve their individual goals by exclusive use of their own efforts. Even when we consider friendly environments and benevolent agents, cooperation involves several issues: with whom to cooperate, reciprocation, how to address credit assignment and complex division of gains, etc. We propose a model where heterogeneous agents cooperate by forming groups and formation of larger groups is promoted. Benefit of agents is proportional to the performance and the size of the group. There is a time pressure to form a group. We investigate how preferring similar or complement agents in group formation affects an agent's success. Preferring complement in group formation is found to be better, yet there is no need to push the strategy to the extreme since the effect of complementing partners is saturated.
[ { "version": "v1", "created": "Tue, 24 Jun 2008 17:38:05 GMT" } ]
2008-06-25T00:00:00
[ [ "Yildirim", "Ilker", "" ], [ "Bingol", "Haluk", "" ] ]
new_dataset
0.972676
0806.3628
Chau Yuen
Su Kiang Kuek, Chau Yuen, Woon Hau Chin
Four-node Relay Network with Bi-directional Traffic Employing Wireless Network Coding with Pre-cancellation
null
VTC Spring 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network coding has the potential to improve the overall throughput of a network by combining different streams of data and forwarding them. In wireless networks, the wireless channel provide an excellent medium for physical layer network coding as signals from different transmitters are combined automatically by the wireless channel. In such scenarios, it would be interesting to investigate protocols and algorithms which can optimally relay information. In this paper, we look at a four-node two-way or bidirectional relay network, and propose a relay protocol which can relay information efficiently in this network.
[ { "version": "v1", "created": "Mon, 23 Jun 2008 07:49:29 GMT" } ]
2008-06-24T00:00:00
[ [ "Kuek", "Su Kiang", "" ], [ "Yuen", "Chau", "" ], [ "Chin", "Woon Hau", "" ] ]
new_dataset
0.999102
0806.3320
Chau Yuen
Chau Yuen, Yong Liang Guan, T. T. Tjhung
Unitary Differential Space-Time Modulation with Joint Modulation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop two new designs of unitary differential space-time modulation (DSTM) with low decoding complexity. Their decoder can be separated into a few parallel decoders, each of which has a decoding search space of less than sqrt(N) if the DSTM codebook contains N codewords. Both designs are based on the concept of joint modulation, which means that several information symbols are jointly modulated, unlike the conventional symbol-by-symbol modulation. The first design is based on Orthogonal Space-Time Block Code (O-STBC) with joint constellation constructed from spherical codes. The second design is based on Quasi-Orthogonal Space-Time Block Code (QO-STBC) with specially designed pair-wise constellation sets. Both the proposed unitary DSTM schemes have considerably lower decoding complexity than many prior DSTM schemes, including those based on Group Codes and Sp(2) which generally have a decoding search space of N for a codebook size of N codewords, and much better decoding performance than the existing O-STBC DSTM scheme. Between two designs, the proposed DSTM based on O-STBC generally has better decoding performance, while the proposed DSTM based on QO-STBC has lower decoding complexity when 8 transmit antennas.
[ { "version": "v1", "created": "Fri, 20 Jun 2008 06:26:10 GMT" } ]
2008-06-23T00:00:00
[ [ "Yuen", "Chau", "" ], [ "Guan", "Yong Liang", "" ], [ "Tjhung", "T. T.", "" ] ]
new_dataset
0.987731
0803.0225
Tsiriniaina Andriamampianina
Tsiriniaina Andriamampianina
Random hypergraphs and algorithmics
103 pages, french
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hypergraphs are structures that can be decomposed or described; in other words they are recursively countable. Here, we get exact and asymptotic enumeration results on hypergraphs by means of exponential generating functions. The number of hypergraph component is bounded, as a generalisation of Wright inequalities for graphs: the proof is a combinatorial understanding of the structure by inclusion exclusion. Asymptotic results are obtained, thanks to generating functions proofs are at the end very easy to read, through complex analysis by saddle point method. By this way, we characterized: - the components with a given number of vertices and of hyperedges by the expected size of a random hypermatching in these structures. - the random hypergraphs (evolving hyperedge by hyperedge) according to the expected number of hyperedges when the first cycle appears in the evolving structure. This work is an open road to further works on random hypergraphs such as threshold phenomenon, tools used here seem to be sufficient at first sight.
[ { "version": "v1", "created": "Mon, 3 Mar 2008 12:13:17 GMT" }, { "version": "v2", "created": "Fri, 20 Jun 2008 12:59:13 GMT" } ]
2008-06-20T00:00:00
[ [ "Andriamampianina", "Tsiriniaina", "" ] ]
new_dataset
0.987976
0806.3133
Ori Shental
Ori Shental and Ido Kanter
Shannon Meets Carnot: Mutual Information Via Thermodynamics
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this contribution, the Gaussian channel is represented as an equivalent thermal system allowing to express its input-output mutual information in terms of thermodynamic quantities. This thermodynamic description of the mutual information is based upon a generalization of the $2^{nd}$ thermodynamic law and provides an alternative proof to the Guo-Shamai-Verd\'{u} theorem, giving an intriguing connection between this remarkable theorem and the most fundamental laws of nature - the laws of thermodynamics.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 06:31:51 GMT" } ]
2008-06-20T00:00:00
[ [ "Shental", "Ori", "" ], [ "Kanter", "Ido", "" ] ]
new_dataset
0.980828
0806.3246
Eyal Lubetzky
Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein
Broadcasting with side information
19 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sender holds a word x consisting of n blocks x_i, each of t bits, and wishes to broadcast a codeword to m receivers, R_1,...,R_m. Each receiver R_i is interested in one block, and has prior side information consisting of some subset of the other blocks. Let \beta_t be the minimum number of bits that has to be transmitted when each block is of length t, and let \beta be the limit \beta = \lim_{t \to \infty} \beta_t/t. In words, \beta is the average communication cost per bit in each block (for long blocks). Finding the coding rate \beta, for such an informed broadcast setting, generalizes several coding theoretic parameters related to Informed Source Coding on Demand, Index Coding and Network Coding. In this work we show that usage of large data blocks may strictly improve upon the trivial encoding which treats each bit in the block independently. To this end, we provide general bounds on \beta_t, and prove that for any constant C there is an explicit broadcast setting in which \beta = 2 but \beta_1 > C. One of these examples answers a question of Lubetzky and Stav. In addition, we provide examples with the following counterintuitive direct-sum phenomena. Consider a union of several mutually independent broadcast settings. The optimal code for the combined setting may yield a significant saving in communication over concatenating optimal encodings for the individual settings. This result also provides new non-linear coding schemes which improve upon the largest known gap between linear and non-linear Network Coding, thus improving the results of Dougherty, Freiling, and Zeger. The proofs use ideas related to Witsenhausen's rate, OR graph products, colorings of Cayley graphs and the chromatic numbers of Kneser graphs.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 17:42:34 GMT" } ]
2008-06-20T00:00:00
[ [ "Alon", "Noga", "" ], [ "Hasidim", "Avinatan", "" ], [ "Lubetzky", "Eyal", "" ], [ "Stav", "Uri", "" ], [ "Weinstein", "Amit", "" ] ]
new_dataset
0.992631
cs/0511070
Arindam Mitra
Arindam Mitra
A particle can carry more than one bit of information
1301 words
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is believed that a particle cannot carry more than one bit of information. It is pointed out that particle or single-particle quantum state can carry more than one bit of information. It implies that minimum energy cost of transmitting a bit will be less than the accepted limit KTlog2.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 15:21:56 GMT" }, { "version": "v2", "created": "Wed, 1 Nov 2006 15:04:36 GMT" }, { "version": "v3", "created": "Sat, 4 Nov 2006 15:33:36 GMT" }, { "version": "v4", "created": "Fri, 13 Jun 2008 15:50:00 GMT" } ]
2008-06-13T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
new_dataset
0.984669
0712.2094
Zachary Abel
Timothy G. Abbott, Zachary Abel, David Charlton, Erik D. Demaine, Martin L. Demaine, Scott D. Kominers
Hinged Dissections Exist
22 pages, 14 figures
Proceedings of the Twenty-fourth Annual Symposium on Computational Geometry (2008): 110-119.
10.1145/1377676.1377695
null
cs.CG
null
We prove that any finite collection of polygons of equal area has a common hinged dissection. That is, for any such collection of polygons there exists a chain of polygons hinged at vertices that can be folded in the plane continuously without self-intersection to form any polygon in the collection. This result settles the open problem about the existence of hinged dissections between pairs of polygons that goes back implicitly to 1864 and has been studied extensively in the past ten years. Our result generalizes and indeed builds upon the result from 1814 that polygons have common dissections (without hinges). We also extend our common dissection result to edge-hinged dissections of solid 3D polyhedra that have a common (unhinged) dissection, as determined by Dehn's 1900 solution to Hilbert's Third Problem. Our proofs are constructive, giving explicit algorithms in all cases. For a constant number of planar polygons, both the number of pieces and running time required by our construction are pseudopolynomial. This bound is the best possible, even for unhinged dissections. Hinged dissections have possible applications to reconfigurable robotics, programmable matter, and nanomanufacturing.
[ { "version": "v1", "created": "Thu, 13 Dec 2007 04:43:10 GMT" } ]
2008-06-12T00:00:00
[ [ "Abbott", "Timothy G.", "" ], [ "Abel", "Zachary", "" ], [ "Charlton", "David", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Kominers", "Scott D.", "" ] ]
new_dataset
0.998646
0806.1727
Laura Poplawski
Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng
Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget
20 pages, 10 figures, shorter version in PODC 2008
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players or nodes each of whom has a budget for purchasing links; each link has a cost as well as a length and each node has a set of preference weights for each of the remaining nodes; the objective of each node is to use its budget to buy a set of outgoing links so as to minimize its sum of preference-weighted distances to the remaining nodes. We study the structural and complexity-theoretic properties of pure Nash equilibria in BBC games. We show that determining the existence of a pure Nash equilibrium in general BBC games is NP-hard. However, in a natural variant, fractional BBC games - where it is permitted to buy fractions of links - a pure Nash equilibrium always exists. A major focus is the study of (n,k)-uniform BBC games - those in which all link costs, link lengths and preference weights are equal (to 1) and all budgets are equal (to k). We show that a pure Nash equilibrium or stable graph exists for all (n,k)-uniform BBC games and that all stable graphs are essentially fair (i.e. all nodes have similar costs). We provide an explicit construction of a family of stable graphs that spans the spectrum from minimum total social cost to maximum total social cost. We also study a special family of regular graphs in which all nodes imitate the "same" buying pattern, and show that if n is sufficiently large no such regular graph can be a pure Nash equilibrium. We analyze best-response walks on the configuration defined by the uniform game. Lastly, we extend our results to the case where each node seeks to minimize its maximum distance to the other nodes.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 19:18:14 GMT" } ]
2008-06-11T00:00:00
[ [ "Laoutaris", "Nikolaos", "" ], [ "Poplawski", "Laura J.", "" ], [ "Rajaraman", "Rajmohan", "" ], [ "Sundaram", "Ravi", "" ], [ "Teng", "Shang-Hua", "" ] ]
new_dataset
0.999734
0711.1827
Joerg Rothe
Dorothea Baumeister and Joerg Rothe
The Three-Color and Two-Color Tantrix(TM) Rotation Puzzle Problems are NP-Complete via Parsimonious Reductions
30 pages, 25 figures
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Holzer and Holzer (Discrete Applied Mathematics 144(3):345--358, 2004) proved that the Tantrix(TM) rotation puzzle problem with four colors is NP-complete, and they showed that the infinite variant of this problem is undecidable. In this paper, we study the three-color and two-color Tantrix(TM) rotation puzzle problems (3-TRP and 2-TRP) and their variants. Restricting the number of allowed colors to three (respectively, to two) reduces the set of available Tantrix(TM) tiles from 56 to 14 (respectively, to 8). We prove that 3-TRP and 2-TRP are NP-complete, which answers a question raised by Holzer and Holzer in the affirmative. Since our reductions are parsimonious, it follows that the problems Unique-3-TRP and Unique-2-TRP are DP-complete under randomized reductions. We also show that the another-solution problems associated with 4-TRP, 3-TRP, and 2-TRP are NP-complete. Finally, we prove that the infinite variants of 3-TRP and 2-TRP are undecidable.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 17:44:45 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2007 21:22:14 GMT" }, { "version": "v3", "created": "Mon, 9 Jun 2008 12:26:34 GMT" } ]
2008-06-09T00:00:00
[ [ "Baumeister", "Dorothea", "" ], [ "Rothe", "Joerg", "" ] ]
new_dataset
0.999269
0806.1062
Hamidreza Farmanbar
Hamid Farmanbar and Amir K. Khandani
Capacity of Block-Memoryless Channels with Causal Channel Side Information
8 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of a time-varying block-memoryless channel in which the transmitter and the receiver have access to (possibly different) noisy causal channel side information (CSI) is obtained. It is shown that the capacity formula obtained in this correspondence reduces to the capacity formula reported in \cite{Gold07} for the special case where the transmitter CSI is a deterministic function of the receiver CSI.
[ { "version": "v1", "created": "Thu, 5 Jun 2008 21:38:56 GMT" } ]
2008-06-09T00:00:00
[ [ "Farmanbar", "Hamid", "" ], [ "Khandani", "Amir K.", "" ] ]
new_dataset
0.998072
0806.0860
Amit K Awasthi
Amit K Awasthi
On the Security of Liaw et al.'s Scheme
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Liaw et al. proposed a remote user authentication scheme using smartcards. They claimed a number of features of their scheme, e.g. a dictionary of verification tables is not required to authenticate users; users can choose their password freely; mutual authentication is provided between the user and the remote system; the communication cost and the computational cost are very low; users can update their password after the registration phase; a session key agreed by the user and the remote system is generated in every session; and the nonce-based scheme which does not require a timestamp (to solve the serious time synchronization problem) etc. In this paper We show that Liaw et al.'s scheme does not stand with various security requirements and is completely insecure. Keywords: Authentication, Smartcards, Remote system, Attack.
[ { "version": "v1", "created": "Wed, 4 Jun 2008 20:44:33 GMT" } ]
2008-06-06T00:00:00
[ [ "Awasthi", "Amit K", "" ] ]
new_dataset
0.997753
0806.0576
Wojciech Mazurczyk
Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk
Steganographic Routing in Multi Agent System Environment
9 pages, 10 figures,
"Secured Information Systems" of Journal of Information Assurance and Security (JIAS), Dynamic Publishers Inc., Atlanta, GA 30362, USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010
null
null
cs.CR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have designed a new proactive hidden routing. Proposed steg-agents discovery procedure, as well as further routes updates and hidden communication, are cryptographically independent. Steganographic exchange can cover heterogeneous and geographically outlying environments using available cross-layer covert channels. Finally we have specified rules that agents have to follow to benefit the TrustMAS distributed router platform.
[ { "version": "v1", "created": "Tue, 3 Jun 2008 16:15:16 GMT" } ]
2008-06-04T00:00:00
[ [ "Szczypiorski", "Krzysztof", "" ], [ "Margasinski", "Igor", "" ], [ "Mazurczyk", "Wojciech", "" ] ]
new_dataset
0.983692
0806.0314
Nicholas Manoukis
N. C. Manoukis and E. C. Anderson
GuiLiner: A Configurable and Extensible Graphical User Interface for Scientific Analysis and Simulation Software
4 pages; for the current version of this software, please visit http://guiliner.sourceforge.net/
null
null
null
cs.HC cs.SE
http://creativecommons.org/licenses/publicdomain/
The computer programs most users interact with daily are driven by a graphical user interface (GUI). However, many scientific applications are used with a command line interface (CLI) for the ease of development and increased flexibility this mode provides. Scientific application developers would benefit from being able to provide a GUI easily for their CLI programs, thus retaining the advantages of both modes of interaction. GuiLiner is a generic, extensible and flexible front-end designed to ``host'' a wide variety of data analysis or simulation programs. Scientific application developers who produce a correctly formatted XML file describing their program's options and some of its documentation can immediately use GuiLiner to produce a carefully implemented GUI for their analysis or simulation programs.
[ { "version": "v1", "created": "Mon, 2 Jun 2008 15:57:55 GMT" } ]
2008-06-03T00:00:00
[ [ "Manoukis", "N. C.", "" ], [ "Anderson", "E. C.", "" ] ]
new_dataset
0.994737
0805.4748
Eric Chen
Eric Z. Chen
New Construction of 2-Generator Quasi-Twisted Codes
4 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quasi-twisted (QT) codes are a generalization of quasi-cyclic (QC) codes. Based on consta-cyclic simplex codes, a new explicit construction of a family of 2-generator quasi-twisted (QT) two-weight codes is presented. It is also shown that many codes in the family meet the Griesmer bound and therefore are length-optimal. New distance-optimal binary QC [195, 8, 96], [210, 8, 104] and [240, 8, 120] codes, and good ternary QC [208, 6, 135] and [221, 6, 144] codes are also obtained by the construction.
[ { "version": "v1", "created": "Fri, 30 May 2008 13:06:18 GMT" } ]
2008-06-02T00:00:00
[ [ "Chen", "Eric Z.", "" ] ]
new_dataset
0.99212
0805.3897
Harmen L.A. van der Spek
H.L.A. van der Spek, E.M. Bakker, H.A.G. Wijshoff
SPARK00: A Benchmark Package for the Compiler Evaluation of Irregular/Sparse Codes
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a set of benchmarks that specifically targets a major cause of performance degradation in high performance computing platforms: irregular access patterns. These benchmarks are meant to be used to asses the performance of optimizing compilers on codes with a varying degree of irregular access. The irregularity caused by the use of pointers and indirection arrays are a major challenge for optimizing compilers. Codes containing such patterns are notoriously hard to optimize but they have a huge impact on the performance of modern architectures, which are under-utilized when encountering irregular memory accesses. In this paper, a set of benchmarks is described that explicitly measures the performance of kernels containing a variety of different access patterns found in real world applications. By offering a varying degree of complexity, we provide a platform for measuring the effectiveness of transformations. The difference in complexity stems from a difference in traversal patterns, the use of multiple indirections and control flow statements. The kernels used cover a variety of different access patterns, namely pointer traversals, indirection arrays, dynamic loop bounds and run-time dependent if-conditions. The kernels are small enough to be fully understood which makes this benchmark set very suitable for the evaluation of restructuring transformations.
[ { "version": "v1", "created": "Mon, 26 May 2008 08:58:16 GMT" } ]
2008-05-27T00:00:00
[ [ "van der Spek", "H. L. A.", "" ], [ "Bakker", "E. M.", "" ], [ "Wijshoff", "H. A. G.", "" ] ]
new_dataset
0.965227
0805.3390
Agus Budiyono PhD
J. Muliadi, S.D. Jenie, A. Budiyono
Design of Attitude Stability System for Prolate Dual-spin Satellite in Its Inclined Elliptical Orbit
20 pages, 42 figures
Symposium on Aerospace Science and Technology, Jakarta, 2005
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In general, most of communication satellites were designed to be operated in geostationary orbit. And many of them were designed in prolate dual-spin configuration. As a prolate dual-spin vehicle, they have to be stabilized against their internal energy dissipation effect. Several countries that located in southern hemisphere, has shown interest to use communication satellite. Because of those countries southern latitude, an idea emerged to incline the communication satellite (due to its prolate dualspin configuration) in elliptical orbit. This work is focused on designing Attitude Stability System for prolate dual-spin satellite in the effect of perturbed field of gravity due to the inclination of its elliptical orbit. DANDE (De-spin Active Nutation Damping Electronics) provides primary stabilization method for the satellite in its orbit. Classical Control Approach is used for the iteration of DANDE parameters. The control performance is evaluated based on time response analysis.
[ { "version": "v1", "created": "Thu, 22 May 2008 06:17:57 GMT" } ]
2008-05-23T00:00:00
[ [ "Muliadi", "J.", "" ], [ "Jenie", "S. D.", "" ], [ "Budiyono", "A.", "" ] ]
new_dataset
0.999546
0805.3484
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen, Gert Schneider
A MacWilliams Identity for Convolutional Codes: The General Case
20 pages
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality appearing in the literature on convolutional coding theory.
[ { "version": "v1", "created": "Thu, 22 May 2008 15:06:50 GMT" } ]
2008-05-23T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Schneider", "Gert", "" ] ]
new_dataset
0.998723
0805.3164
Rahul Vaze
Rahul Vaze and Robert W. Heath Jr
To Code or Not To Code in Multi-Hop Relay Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-hop relay channels use multiple relay stages, each with multiple relay nodes, to facilitate communication between a source and destination. Previously, distributed space-time coding was used to maximize diversity gain. Assuming a low-rate feedback link from the destination to each relay stage and the source, this paper proposes end-to-end antenna selection strategies as an alternative to distributed space-time coding. One-way (where only the source has data for destination) and two-way (where the destination also has data for the source) multi-hop relay channels are considered with both the full-duplex and half duplex relay nodes. End-to-end antenna selection strategies are designed and proven to achieve maximum diversity gain by using a single antenna path (using single antenna of the source, each relay stage and the destination) with the maximum signal-to-noise ratio at the destination. For the half-duplex case, two single antenna paths with the two best signal-to-noise ratios in alternate time slots are used to overcome the rate loss with half-duplex nodes, with a small diversity gain penalty. Finally to answer the question, whether to code (distributed space-time code) or not (the proposed end-to-end antenna selection strategy) in a multi-hop relay channel, end-to-end antenna selection strategy and distributed space-time coding is compared with respect to several important performance metrics.
[ { "version": "v1", "created": "Tue, 20 May 2008 20:23:18 GMT" } ]
2008-05-22T00:00:00
[ [ "Vaze", "Rahul", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.99961
0802.2846
Pascal Weil
Atlas F. Cook IV, Carola Wenk
Geodesic Fr\'echet Distance Inside a Simple Polygon
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.DS cs.CG
null
We unveil an alluring alternative to parametric search that applies to both the non-geodesic and geodesic Fr\'echet optimization problems. This randomized approach is based on a variant of red-blue intersections and is appealing due to its elegance and practical efficiency when compared to parametric search. We present the first algorithm for the geodesic Fr\'echet distance between two polygonal curves $A$ and $B$ inside a simple bounding polygon $P$. The geodesic Fr\'echet decision problem is solved almost as fast as its non-geodesic sibling and requires $O(N^{2\log k)$ time and $O(k+N)$ space after $O(k)$ preprocessing, where $N$ is the larger of the complexities of $A$ and $B$ and $k$ is the complexity of $P$. The geodesic Fr\'echet optimization problem is solved by a randomized approach in $O(k+N^{2\log kN\log N)$ expected time and $O(k+N^{2)$ space. This runtime is only a logarithmic factor larger than the standard non-geodesic Fr\'echet algorithm (Alt and Godau 1995). Results are also presented for the geodesic Fr\'echet distance in a polygonal domain with obstacles and the geodesic Hausdorff distance for sets of points or sets of line segments inside a simple polygon $P$.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:21:19 GMT" } ]
2008-05-21T00:00:00
[ [ "Cook", "Atlas F.", "IV" ], [ "Wenk", "Carola", "" ] ]
new_dataset
0.996174
0805.2641
Seyed Abolfazl Motahari
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
On the Capacity of the Diamond Half-Duplex Relay Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a diamond-shaped dual-hop communication system consisting a source, two parallel half-duplex relays and a destination. In a single antenna configuration, it has been previously shown that a two-phase node-scheduling algorithm, along with the decode and forward strategy can achieve the capacity of the diamond channel for a certain symmetric channel gains [1]. In this paper, we obtain a more general condition for the optimality of the scheme in terms of power resources and channel gains. In particular, it is proved that if the product of the capacity of the simultaneously active links are equal in both transmission phases, the scheme achieves the capacity of the channel.
[ { "version": "v1", "created": "Sat, 17 May 2008 01:01:31 GMT" } ]
2008-05-20T00:00:00
[ [ "Bagheri", "Hossein", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
new_dataset
0.996598
0805.1886
Vadim Zaliva
Vadim Zaliva
Platform-Independent Firewall Policy Representation
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we will discuss the design of abstract firewall model along with platform-independent policy definition language. We will also discuss the main design challenges and solutions to these challenges, as well as examine several differences in policy semantics between vendors and how it could be mapped to our platform-independent language. We will also touch upon a processing model, describing the mechanism by which an abstract policy could be compiled into a concrete firewall policy syntax. We will discuss briefly some future research directions, such as policy optimization and validation
[ { "version": "v1", "created": "Tue, 13 May 2008 17:14:16 GMT" } ]
2008-05-14T00:00:00
[ [ "Zaliva", "Vadim", "" ] ]
new_dataset
0.980302
0707.0799
Xinjia Chen
Xinjia Chen, Kemin Zhou and Jorge Aravena
A New Family of Unitary Space-Time Codes with a Fast Parallel Sphere Decoder Algorithm
66 pages, 7 figures
IEEE Transactions on Information Theory, vol. 52, pp. 115-140, January 2006
null
null
cs.IT math.IT
null
In this paper we propose a new design criterion and a new class of unitary signal constellations for differential space-time modulation for multiple-antenna systems over Rayleigh flat-fading channels with unknown fading coefficients. Extensive simulations show that the new codes have significantly better performance than existing codes. We have compared the performance of our codes with differential detection schemes using orthogonal design, Cayley differential codes, fixed-point-free group codes and product of groups and for the same bit error rate, our codes allow smaller signal to noise ratio by as much as 10 dB. The design of the new codes is accomplished in a systematic way through the optimization of a performance index that closely describes the bit error rate as a function of the signal to noise ratio. The new performance index is computationally simple and we have derived analytical expressions for its gradient with respect to constellation parameters. Decoding of the proposed constellations is reduced to a set of one-dimensional closest point problems that we solve using parallel sphere decoder algorithms. This decoding strategy can also improve efficiency of existing codes.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 19:01:53 GMT" } ]
2008-05-12T00:00:00
[ [ "Chen", "Xinjia", "" ], [ "Zhou", "Kemin", "" ], [ "Aravena", "Jorge", "" ] ]
new_dataset
0.998873
0710.0198
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
Z4-Linear Perfect Codes
15p. Bibliography updated
transl. from: Diskretn. Anal. Issled. Oper. Ser.1., 7(4) 2000, 78-90 [Russian]
null
null
cs.IT math.IT
null
For every $n = 2^k > 8$ there exist exactly $[(k+1)/2]$ mutually nonequivalent $Z_4$-linear extended perfect codes with distance 4. All these codes have different ranks.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 05:58:04 GMT" } ]
2008-05-10T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
new_dataset
0.98628
0710.0199
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
Z4-linear Hadamard and extended perfect codes
7p. WCC-2001
Electron. Notes Discrete Math. 6 (2001) 107-112
10.1016/S1571-0653(04)00161-1
null
cs.IT math.IT
null
If $N=2^k > 8$ then there exist exactly $[(k-1)/2]$ pairwise nonequivalent $Z_4$-linear Hadamard $(N,2N,N/2)$-codes and $[(k+1)/2]$ pairwise nonequivalent $Z_4$-linear extended perfect $(N,2^N/2N,4)$-codes. A recurrent construction of $Z_4$-linear Hadamard codes is given.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 07:33:13 GMT" } ]
2008-05-10T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
new_dataset
0.991349
0805.0909
Michael Hilker
Michael Hilker and Christoph Schommer
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
9 pages,
Proceedings of the Trustworthy Software Workshop 2006, IBFI, Schloss Dagstuhl, May 2006, Saarbruecken, Germany
null
null
cs.CR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an artificial Immune System with artificial Cells which perform certain Tasks in order to to support existing systems to better secure the Network against Intrusions. The Advantages of SANA are that it is efficient, adaptive, autonomous, and massively-distributed. In this Article, we describe the Architecture of the artificial Immune System and the Functionality of the Components. We explain briefly the Implementation and discuss Results.
[ { "version": "v1", "created": "Wed, 7 May 2008 09:31:18 GMT" } ]
2008-05-08T00:00:00
[ [ "Hilker", "Michael", "" ], [ "Schommer", "Christoph", "" ] ]
new_dataset
0.976671
0803.0778
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Constant-Rank Codes
5 pages, to appear in Proc. IEEE ISIT 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constant-dimension codes have recently received attention due to their significance to error control in noncoherent random network coding. In this paper, we show that constant-rank codes are closely related to constant-dimension codes and we study the properties of constant-rank codes. We first introduce a relation between vectors in $\mathrm{GF}(q^m)^n$ and subspaces of $\mathrm{GF}(q)^m$ or $\mathrm{GF}(q)^n$, and use it to establish a relation between constant-rank codes and constant-dimension codes. We then derive bounds on the maximum cardinality of constant-rank codes with given rank weight and minimum rank distance. Finally, we investigate the asymptotic behavior of the maximal cardinality of constant-rank codes with given rank weight and minimum rank distance.
[ { "version": "v1", "created": "Thu, 6 Mar 2008 02:17:36 GMT" }, { "version": "v2", "created": "Wed, 7 May 2008 20:35:10 GMT" } ]
2008-05-07T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
new_dataset
0.951351
0805.0785
Michael Hilker
Michael Hilker and Christoph Schommer
AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies
5 pages, 2 figures
Proceedings of the 6th International Conference on Recent Advances in Soft Computing (RASC2006), July 2006, Canterbury, United Kingdom
null
null
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If a computer node is infected by a virus, worm or a backdoor, then this is a security risk for the complete network structure where the node is associated. Existing Network Intrusion Detection Systems (NIDS) provide a certain amount of support for the identification of such infected nodes but suffer from the need of plenty of communication and computational power. In this article, we present a novel approach called AGNOSCO to support the identification of infected nodes through the usage of artificial ant colonies. It is shown that AGNOSCO overcomes the communication and computational power problem while identifying infected nodes properly.
[ { "version": "v1", "created": "Tue, 6 May 2008 19:47:11 GMT" }, { "version": "v2", "created": "Wed, 7 May 2008 15:33:35 GMT" } ]
2008-05-07T00:00:00
[ [ "Hilker", "Michael", "" ], [ "Schommer", "Christoph", "" ] ]
new_dataset
0.999554
0805.0521
Mich\`ele Wigger
Amos Lapidoth, Stefan M. Moser, Michele A. Wigger
On the Capacity of Free-Space Optical Intensity Channels
To be presented at ISIT 2008 in Toronto
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New upper and lower bounds are presented on the capacity of the free-space optical intensity channel. This channel is characterized by inputs that are nonnegative (representing the transmitted optical intensity) and by outputs that are corrupted by additive white Gaussian noise (because in free space the disturbances arise from many independent sources). Due to battery and safety reasons the inputs are simultaneously constrained in both their average and peak power. For a fixed ratio of the average power to the peak power the difference between the upper and the lower bounds tends to zero as the average power tends to infinity, and the ratio of the upper and lower bounds tends to one as the average power tends to zero. The case where only an average-power constraint is imposed on the input is treated separately. In this case, the difference of the upper and lower bound tends to 0 as the average power tends to infinity, and their ratio tends to a constant as the power tends to zero.
[ { "version": "v1", "created": "Mon, 5 May 2008 13:04:23 GMT" } ]
2008-05-06T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Moser", "Stefan M.", "" ], [ "Wigger", "Michele A.", "" ] ]
new_dataset
0.980034
0805.0585
Jean Gallier
Jean Gallier
Discrete Mathematics for Computer Science, Some Notes
255 pages
null
null
null
cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These are notes on discrete mathematics for computer scientists. The presentation is somewhat unconventional. Indeed I begin with a discussion of the basic rules of mathematical reasoning and of the notion of proof formalized in a natural deduction system ``a la Prawitz''. The rest of the material is more or less traditional but I emphasize partial functions more than usual (after all, programs may not terminate for all input) and I provide a fairly complete account of the basic concepts of graph theory.
[ { "version": "v1", "created": "Mon, 5 May 2008 18:52:00 GMT" } ]
2008-05-06T00:00:00
[ [ "Gallier", "Jean", "" ] ]
new_dataset
0.99523
0805.0589
Rahul Vaze
Rahul Vaze and Robert W. Heath Jr
Cascaded Orthogonal Space-Time Block Codes for Wireless Multi-Hop Relay Networks
A part of this paper appears in the proceedings of the IEEE International Symposium on Information Theory 2008, Toronto, Canada 6-11 July 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed space-time block coding is a diversity technique to mitigate the effects of fading in multi-hop wireless networks, where multiple relay stages are used by a source to communicate with its destination. This paper proposes a new distributed space-time block code called the cascaded orthogonal space-time block code (COSTBC) for the case where the source and destination are equipped with multiple antennas and each relay stage has one or more single antenna relays. Each relay stage is assumed to have receive channel state information (CSI) for all the channels from the source to itself, while the destination is assumed to have receive CSI for all the channels. To construct the COSTBC, multiple orthogonal space-time block codes are used in cascade by the source and each relay stage. In the COSTBC, each relay stage separates the constellation symbols of the orthogonal space-time block code sent by the preceding relay stage using its CSI, and then transmits another orthogonal space-time block code to the next relay stage. COSTBCs are shown to achieve the maximum diversity gain in a multi-hop wireless network with flat Rayleigh fading channels. Several explicit constructions of COSTBCs are also provided for two-hop wireless networks with two and four source antennas and relay nodes. It is also shown that COSTBCs require minimum decoding complexity thanks to the connection to orthogonal space-time block codes.
[ { "version": "v1", "created": "Mon, 5 May 2008 19:10:21 GMT" } ]
2008-05-06T00:00:00
[ [ "Vaze", "Rahul", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.999412
0805.0173
Martin Dowd
Martin Dowd
A Computer Search for N1L-Configurations
submitted to IEEE Trans. Information Theory. 5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an earlier paper the author defined N1L configurations, and stated a conjecture concerning them which would lead to an improvement by a constant factor to the sphere-packing bound for linear double error correcting codes. Here a computer search is presented, in an effort to gather evidence on the conjecture.
[ { "version": "v1", "created": "Fri, 2 May 2008 03:27:23 GMT" } ]
2008-05-05T00:00:00
[ [ "Dowd", "Martin", "" ] ]
new_dataset
0.989091
0805.0022
David Eppstein
Gill Barequet, David Eppstein, Michael T. Goodrich, and Amir Vaxman
Straight Skeletons of Three-Dimensional Polyhedra
12 pages, 47 figure files in 8 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the straight skeleton of polyhedra in three dimensions. We first address voxel-based polyhedra (polycubes), formed as the union of a collection of cubical (axis-aligned) voxels. We analyze the ways in which the skeleton may intersect each voxel of the polyhedron, and show that the skeleton may be constructed by a simple voxel-sweeping algorithm taking constant time per voxel. In addition, we describe a more complex algorithm for straight skeletons of voxel-based polyhedra, which takes time proportional to the area of the surfaces of the straight skeleton rather than the volume of the polyhedron. We also consider more general polyhedra with axis-parallel edges and faces, and show that any n-vertex polyhedron of this type has a straight skeleton with O(n^2) features. We provide algorithms for constructing the straight skeleton, with running time O(min(n^2 log n, k log^{O(1)} n)) where k is the output complexity. Next, we discuss the straight skeleton of a general nonconvex polyhedron. We show that it has an ambiguity issue, and suggest a consistent method to resolve it. We prove that the straight skeleton of a general polyhedron has a superquadratic complexity in the worst case. Finally, we report on an implementation of a simple algorithm for the general case.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 22:52:34 GMT" } ]
2008-05-02T00:00:00
[ [ "Barequet", "Gill", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Vaxman", "Amir", "" ] ]
new_dataset
0.998734
0801.0672
Tobias Koch
Tobias Koch and Amos Lapidoth
On Multipath Fading Channels at High SNR
To be presented at the 2008 IEEE Symposium on Information Theory (ISIT), Toronto, Canada; replaced with version that appears in the proceedings
null
null
null
cs.IT math.IT
null
This paper studies the capacity of discrete-time multipath fading channels. It is assumed that the number of paths is finite, i.e., that the channel output is influenced by the present and by the L previous channel inputs. A noncoherent channel model is considered where neither transmitter nor receiver are cognizant of the fading's realization, but both are aware of its statistic. The focus is on capacity at high signal-to-noise ratios (SNR). In particular, the capacity pre-loglog - defined as the limiting ratio of the capacity to loglog SNR as SNR tends to infinity - is studied. It is shown that, irrespective of the number paths L, the capacity pre-loglog is 1.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 12:40:05 GMT" }, { "version": "v2", "created": "Thu, 1 May 2008 14:16:17 GMT" } ]
2008-05-01T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.967668
0804.4717
Icius Committee
T. Kubota and T. Yoshimitsu
Intelligent Unmanned Explorer for Deep Space Exploration
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 10 figures, 4 tables
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-A004-OP
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
asteroids or comets have received remarkable attention in the world. In small body explorations, especially, detailed in-situ surface exploration by tiny rover is one of effective and fruitful means and is expected to make strong contributions towards scientific studies. JAXA ISAS is promoting MUSES C mission, which is the worlds first sample and return attempt to or from the near earth asteroid. Hayabusa spacecraft in MUSES C mission took the tiny rover, which was expected to perform the in-situ surface exploration by hopping. This paper describes the system design, mobility and intelligence of the developed unmanned explorer. This paper also presents the ground experimental results and the flight results.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 01:18:37 GMT" } ]
2008-05-01T00:00:00
[ [ "Kubota", "T.", "" ], [ "Yoshimitsu", "T.", "" ] ]
new_dataset
0.99361
0804.4752
Icius Committee
M.A. Moelyadi, and G. Sachs
Simulation of Dynamic Yaw Stability Derivatives of a Bird Using CFD
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 15 figures, tables 3, Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007
null
null
ICIUS2007-B012
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simulation results on dynamic yaw stability derivatives of a gull bird by means of computational fluid dynamics are presented. Two different kinds of motions are used for determining the dynamic yaw stability derivatives CNr and CNbeta . Concerning the first one, simple lateral translation and yaw rotary motions in yaw are considered. The second one consists of combined motions. To determine dynamic yaw stability derivatives of the bird, the simulation of an unsteady flow with a bird model showing a harmonic motion is performed. The unsteady flow solution for each time step is obtained by solving unsteady Euler equations based on a finite volume approach for a smaller reduced frequency. Then, an evaluation of unsteady forces and moments for one cycle is conducted using harmonic Fourier analysis. The results on the dynamic yaw stability derivatives for both simulations of the model motion show a good agreement.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:16:33 GMT" } ]
2008-05-01T00:00:00
[ [ "Moelyadi", "M. A.", "" ], [ "Sachs", "G.", "" ] ]
new_dataset
0.997983
0804.4799
Carl Bracken
Carl Bracken, Eimear Byrne, Nadya Markin and Gary McGuire
A Few More Quadratic APN Functions
12 pages, submitted to Cryptography and Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two infinite families of APN functions where the degree of the field is divisible by 3 but not 9. Our families contain two already known families as special cases. We also discuss the inequivalence proof (by computation) which shows that these functions are new.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 11:50:58 GMT" } ]
2008-05-01T00:00:00
[ [ "Bracken", "Carl", "" ], [ "Byrne", "Eimear", "" ], [ "Markin", "Nadya", "" ], [ "McGuire", "Gary", "" ] ]
new_dataset
0.997314
0804.4885
Corey Bohil
C. Owen, F. Biocca, C. Bohil, J. Conley
SimDialog: A visual game dialog editor
null
null
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SimDialog is a visual editor for dialog in computer games. This paper presents the design of SimDialog, illustrating how script writers and non-programmers can easily create dialog for video games with complex branching structures and dynamic response characteristics. The system creates dialog as a directed graph. This allows for play using the dialog with a state-based cause and effect system that controls selection of non-player character responses and can provide a basic scoring mechanism for games.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 18:44:52 GMT" } ]
2008-05-01T00:00:00
[ [ "Owen", "C.", "" ], [ "Biocca", "F.", "" ], [ "Bohil", "C.", "" ], [ "Conley", "J.", "" ] ]
new_dataset
0.989517
0801.1060
Navin Kashyap
Akiko Manada and Navin Kashyap
On the Period of a Periodic-Finite-Type Shift
revised version; 5 pages; to appear in the Proceedings of the 2008 IEEE International Symposium on Information Theory (ISIT'08), Toronto, Canada
null
null
null
cs.IT math.IT
null
Periodic-finite-type shifts (PFT's) form a class of sofic shifts that strictly contains the class of shifts of finite type (SFT's). In this paper, we investigate how the notion of "period" inherent in the definition of a PFT causes it to differ from an SFT, and how the period influences the properties of a PFT.
[ { "version": "v1", "created": "Mon, 7 Jan 2008 16:53:32 GMT" }, { "version": "v2", "created": "Wed, 30 Apr 2008 15:19:23 GMT" } ]
2008-04-30T00:00:00
[ [ "Manada", "Akiko", "" ], [ "Kashyap", "Navin", "" ] ]
new_dataset
0.960503
0804.4237
Robert Burger PhD
John Robert Burger
Explaining the Logical Nature of Electrical Solitons in Neural Circuits
13 pages, 16 figures
null
null
null
cs.NE q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neurons are modeled electrically based on ferroelectric membranes thin enough to permit charge transfer, conjectured to be the tunneling result of thermally energetic ions and random electrons. These membranes can be triggered to produce electrical solitons, the main signals for brain associative memory and logical processing. Dendritic circuits are modeled, and electrical solitons are simulated to demonstrate the nature of soliton propagation, soliton reflection, the collision of solitons, as well as soliton OR gates, AND gates, XOR gates and NOT gates.
[ { "version": "v1", "created": "Sat, 26 Apr 2008 16:55:59 GMT" } ]
2008-04-30T00:00:00
[ [ "Burger", "John Robert", "" ] ]
new_dataset
0.996378
0804.4662
Yijia Fan
Yijia Fan, Lifeng Lai, Elza Erkip, H. Vincent Poor
Rateless Coding for MIMO Block Fading Channels
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
In this paper the performance limits and design principles of rateless codes over fading channels are studied. The diversity-multiplexing tradeoff (DMT) is used to analyze the system performance for all possible transmission rates. It is revealed from the analysis that the design of such rateless codes follows the design principle of approximately universal codes for parallel multiple-input multiple-output (MIMO) channels, in which each sub-channel is a MIMO channel. More specifically, it is shown that for a single-input single-output (SISO) channel, the previously developed permutation codes of unit length for parallel channels having rate LR can be transformed directly into rateless codes of length L having multiple rate levels (R, 2R, . . ., LR), to achieve the DMT performance limit.
[ { "version": "v1", "created": "Tue, 29 Apr 2008 17:45:53 GMT" } ]
2008-04-30T00:00:00
[ [ "Fan", "Yijia", "" ], [ "Lai", "Lifeng", "" ], [ "Erkip", "Elza", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.983082
0804.4195
Ruoheng Liu
Ruoheng Liu and H. Vincent Poor
Multi-Antenna Gaussian Broadcast Channels with Confidential Messages
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6-11, 2008
null
null
null
cs.IT cs.CR math.IT
http://creativecommons.org/licenses/by/3.0/
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over a Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users with \emph{information-theoretic secrecy}. That is, each user would like to obtain its own confidential message in a reliable and safe manner. This communication model is referred to as the multi-antenna Gaussian broadcast channel with confidential messages (MGBC-CM). Under this communication scenario, a secret dirty-paper coding scheme and the corresponding achievable secrecy rate region are first developed based on Gaussian codebooks. Next, a computable Sato-type outer bound on the secrecy capacity region is provided for the MGBC-CM. Furthermore, the Sato-type outer bound proves to be consistent with the boundary of the secret dirty-paper coding achievable rate region, and hence, the secrecy capacity region of the MGBC-CM is established. Finally, a numerical example demonstrates that both users can achieve positive rates simultaneously under the information-theoretic secrecy requirement.
[ { "version": "v1", "created": "Sat, 26 Apr 2008 01:52:09 GMT" } ]
2008-04-29T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.996146