Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0704.0002
Louis Theran
Ileana Streinu and Louis Theran
Sparsity-certifying Graph Decompositions
To appear in Graphs and Combinatorics
null
null
null
math.CO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new algorithm, the $(k,\ell)$-pebble game with colors, and use it obtain a characterization of the family of $(k,\ell)$-sparse graphs and algorithmic solutions to a family of problems concerning tree decompositions of graphs. Special instances of sparse graphs appear in rigidity theory and have received...
[ { "version": "v1", "created": "Sat, 31 Mar 2007 02:26:18 GMT" }, { "version": "v2", "created": "Sat, 13 Dec 2008 17:26:00 GMT" } ]
2008-12-13T00:00:00
[ [ "Streinu", "Ileana", "" ], [ "Theran", "Louis", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly in...
0704.0046
Denes Petz
I. Csiszar, F. Hiai and D. Petz
A limit relation for entropy and channel capacity per unit cost
LATEX file, 11 pages
J. Math. Phys. 48(2007), 092102.
10.1063/1.2779138
null
quant-ph cs.IT math.IT
null
In a quantum mechanical model, Diosi, Feldmann and Kosloff arrived at a conjecture stating that the limit of the entropy of certain mixtures is the relative entropy as system size goes to infinity. The conjecture is proven in this paper for density matrices. The first proof is analytic and uses the quantum law of lar...
[ { "version": "v1", "created": "Sun, 1 Apr 2007 16:37:36 GMT" } ]
2009-11-13T00:00:00
[ [ "Csiszar", "I.", "" ], [ "Hiai", "F.", "" ], [ "Petz", "D.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Su...
0704.0047
Igor Grabec
T. Kosel and I. Grabec
Intelligent location of simultaneously active acoustic emission sources: Part I
5 pages, 5 eps figures, uses IEEEtran.cls
null
null
null
cs.NE cs.AI
null
The intelligent acoustic emission locator is described in Part I, while Part II discusses blind source separation, time delay estimation and location of two simultaneously active continuous acoustic emission sources. The location of acoustic emission on complicated aircraft frame structures is a difficult problem o...
[ { "version": "v1", "created": "Sun, 1 Apr 2007 13:06:50 GMT" } ]
2009-09-29T00:00:00
[ [ "Kosel", "T.", "" ], [ "Grabec", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": ...
0704.0050
Igor Grabec
T. Kosel and I. Grabec
Intelligent location of simultaneously active acoustic emission sources: Part II
5 pages, 7 eps figures, uses IEEEtran.cls
null
null
null
cs.NE cs.AI
null
Part I describes an intelligent acoustic emission locator, while Part II discusses blind source separation, time delay estimation and location of two continuous acoustic emission sources. Acoustic emission (AE) analysis is used for characterization and location of developing defects in materials. AE sources often g...
[ { "version": "v1", "created": "Sun, 1 Apr 2007 18:53:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Kosel", "T.", "" ], [ "Grabec", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": ...
0704.0062
Tom\'a\v{s} Vina\v{r}
Rastislav \v{S}r\'amek, Bro\v{n}a Brejov\'a, Tom\'a\v{s} Vina\v{r}
On-line Viterbi Algorithm and Its Relationship to Random Walks
null
Algorithms in Bioinformatics: 7th International Workshop (WABI), 4645 volume of Lecture Notes in Computer Science, pp. 240-251, Philadelphia, PA, USA, September 2007. Springer
10.1007/978-3-540-74126-8_23
null
cs.DS
null
In this paper, we introduce the on-line Viterbi algorithm for decoding hidden Markov models (HMMs) in much smaller than linear space. Our analysis on two-state HMMs suggests that the expected maximum memory used to decode sequence of length $n$ with $m$-state HMM can be as low as $\Theta(m\log n)$, without a signific...
[ { "version": "v1", "created": "Sat, 31 Mar 2007 23:52:33 GMT" } ]
2010-01-25T00:00:00
[ [ "Šrámek", "Rastislav", "" ], [ "Brejová", "Broňa", "" ], [ "Vinař", "Tomáš", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.0090
Lester Ingber
Lester Ingber
Real Options for Project Schedules (ROPS)
null
null
null
Report 2007:ROPS
cs.CE cond-mat.stat-mech cs.MS cs.NA physics.data-an
null
Real Options for Project Schedules (ROPS) has three recursive sampling/optimization shells. An outer Adaptive Simulated Annealing (ASA) optimization shell optimizes parameters of strategic Plans containing multiple Projects containing ordered Tasks. A middle shell samples probability distributions of durations of Tas...
[ { "version": "v1", "created": "Sun, 1 Apr 2007 14:35:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ingber", "Lester", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that e...
0704.0098
Jack Raymond
Jack Raymond, David Saad
Sparsely-spread CDMA - a statistical mechanics based analysis
23 pages, 5 figures, figure 1 amended since published version
J. Phys. A: Math. Theor. 40 No 41 (12 October 2007) 12315-12333
10.1088/1751-8113/40/41/004
null
cs.IT math.IT
null
Sparse Code Division Multiple Access (CDMA), a variation on the standard CDMA method in which the spreading (signature) matrix contains only a relatively small number of non-zero elements, is presented and analysed using methods of statistical physics. The analysis provides results on the performance of maximum likel...
[ { "version": "v1", "created": "Sun, 1 Apr 2007 18:27:26 GMT" }, { "version": "v2", "created": "Fri, 27 Apr 2007 12:39:14 GMT" }, { "version": "v3", "created": "Wed, 1 Aug 2007 19:10:18 GMT" }, { "version": "v4", "created": "Sun, 7 Oct 2007 16:50:39 GMT" }, { "vers...
2009-11-13T00:00:00
[ [ "Raymond", "Jack", "" ], [ "Saad", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0108
Sergey Gubin
Sergey Gubin
Reducing SAT to 2-SAT
8 pages
null
null
null
cs.CC
null
Description of a polynomial time reduction of SAT to 2-SAT of polynomial size.
[ { "version": "v1", "created": "Sun, 1 Apr 2007 23:16:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.0213
Ketan Mulmuley D
Ketan D. Mulmuley Hariharan Narayanan
Geometric Complexity Theory V: On deciding nonvanishing of a generalized Littlewood-Richardson coefficient
This article has been withdrawn because it has been merged with the earlier article (GCT3) in the series, and a new article appears in this GCT5 slot now as shown in the abstract
null
null
null
cs.CC
null
This article has been withdrawn because it has been merged with the earlier article GCT3 (arXiv: CS/0501076 [cs.CC]) in the series. The merged article is now available as: Geometric Complexity Theory III: on deciding nonvanishing of a Littlewood-Richardson Coefficient, Journal of Algebraic Combinatorics, vol. 36, i...
[ { "version": "v1", "created": "Mon, 2 Apr 2007 15:13:27 GMT" }, { "version": "v2", "created": "Thu, 27 Sep 2012 15:23:39 GMT" } ]
2012-09-28T00:00:00
[ [ "Narayanan", "Ketan D. Mulmuley Hariharan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.0217
Wiroonsak Santipach
Wiroonsak Santipach and Michael L. Honig
Capacity of a Multiple-Antenna Fading Channel with a Quantized Precoding Matrix
null
IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1218--1234, March 2009
10.1109/TIT.2008.2011437
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a multiple-input multiple-output (MIMO) channel, feedback from the receiver can be used to specify a transmit precoding matrix, which selectively activates the strongest channel modes. Here we analyze the performance of Random Vector Quantization (RVQ), in which the precoding matrix is selected from a random co...
[ { "version": "v1", "created": "Mon, 2 Apr 2007 15:35:24 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2009 03:49:20 GMT" } ]
2010-08-27T00:00:00
[ [ "Santipach", "Wiroonsak", "" ], [ "Honig", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0218
Yuri Pritykin
Yuri Pritykin
On Almost Periodicity Criteria for Morphic Sequences in Some Particular Cases
9 pages. To be presented on 11th International Conference on Developments in Language Theory (DLT'2007), Turku, Finland, July 2007.
null
null
null
cs.DM cs.LO
null
In some particular cases we give criteria for morphic sequences to be almost periodic (=uniformly recurrent). Namely, we deal with fixed points of non-erasing morphisms and with automatic sequences. In both cases a polynomial-time algorithm solving the problem is found. A result more or less supporting the conjecture...
[ { "version": "v1", "created": "Mon, 2 Apr 2007 15:45:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "descri...
0704.0229
Ketan Mulmuley D
Ketan D. Mulmuley
Geometric Complexity Theory VI: the flip via saturated and positive integer programming in representation theory and algebraic geometry
139 pages. Corrects error in the conjectural saturation hypothesis (SH) in the earlier version, which was pointed out in a recent paper of Briand et al (arXIv:0810.3163v1 [math.CO])
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article belongs to a series on geometric complexity theory (GCT), an approach to the P vs. NP and related problems through algebraic geometry and representation theory. The basic principle behind this approach is called the flip. In essence, it reduces the negative hypothesis in complexity theory (the lower boun...
[ { "version": "v1", "created": "Mon, 2 Apr 2007 16:41:38 GMT" }, { "version": "v2", "created": "Fri, 18 May 2007 19:55:46 GMT" }, { "version": "v3", "created": "Mon, 28 Apr 2008 19:49:27 GMT" }, { "version": "v4", "created": "Thu, 22 Jan 2009 15:25:24 GMT" } ]
2009-01-22T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.0282
Samuele Bandi
Samuele Bandi, Luca Stabellini, Andrea Conti and Velio Tralli
On Punctured Pragmatic Space-Time Codes in Block Fading Channel
null
null
null
null
cs.IT cs.CC math.IT
null
This paper considers the use of punctured convolutional codes to obtain pragmatic space-time trellis codes over block-fading channel. We show that good performance can be achieved even when puncturation is adopted and that we can still employ the same Viterbi decoder of the convolutional mother code by using approxim...
[ { "version": "v1", "created": "Mon, 2 Apr 2007 22:44:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Bandi", "Samuele", "" ], [ "Stabellini", "Luca", "" ], [ "Conti", "Andrea", "" ], [ "Tralli", "Velio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.0301
Akitoshi Kawamura
Akitoshi Kawamura
Differential Recursion and Differentially Algebraic Functions
14 pages, 3 figures
Revised and published in ACM Trans. Comput. Logic 10, Article 22, 2009, under the title "Differential Recursion".
10.1145/1507244.1507252
null
cs.CC
null
Moore introduced a class of real-valued "recursive" functions by analogy with Kleene's formulation of the standard recursive functions. While his concise definition inspired a new line of research on analog computation, it contains some technical inaccuracies. Focusing on his "primitive recursive" functions, we pin d...
[ { "version": "v1", "created": "Tue, 3 Apr 2007 19:50:14 GMT" } ]
2009-04-19T00:00:00
[ [ "Kawamura", "Akitoshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.0304
Carlos Gershenson
Carlos Gershenson
The World as Evolving Information
16 pages. Extended version, three more laws of information, two classifications, and discussion added. To be published (soon) in International Conference on Complex Systems 2007 Proceedings
Minai, A., Braha, D., and Bar-Yam, Y., eds. Unifying Themes in Complex Systems VII, pp. 100-115. Springer, Berlin Heidelberg, 2012
10.1007/978-3-642-18003-3_10
null
cs.IT cs.AI math.IT q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the benefits of describing the world as information, especially in the study of the evolution of life and cognition. Traditional studies encounter problems because it is difficult to describe life and cognition in terms of matter and energy, since their laws are valid only at the physical scale. ...
[ { "version": "v1", "created": "Tue, 3 Apr 2007 02:08:48 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2007 20:03:59 GMT" }, { "version": "v3", "created": "Wed, 13 Oct 2010 19:49:16 GMT" } ]
2013-04-05T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.0309
Guohun Zhu
Guohun Zhu
The Complexity of HCP in Digraps with Degree Bound Two
10 pages, 4 figures, had been submitted to a Journal
null
null
null
cs.CC cs.DM
null
The Hamiltonian cycle problem (HCP) in digraphs D with degree bound two is solved by two mappings in this paper. The first bijection is between an incidence matrix C_{nm} of simple digraph and an incidence matrix F of balanced bipartite undirected graph G; The second mapping is from a perfect matching of G to a cycle...
[ { "version": "v1", "created": "Tue, 3 Apr 2007 03:50:43 GMT" }, { "version": "v2", "created": "Wed, 13 Jun 2007 15:42:14 GMT" }, { "version": "v3", "created": "Fri, 13 Jul 2007 01:38:24 GMT" } ]
2011-11-09T00:00:00
[ [ "Zhu", "Guohun", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.0361
Ioannis Chatzigeorgiou
Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell and Rolando Carrasco
Pseudo-random Puncturing: A Technique to Lower the Error Floor of Turbo Codes
5 pages, 1 figure, Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24-29, 2007
null
10.1109/ISIT.2007.4557299
null
cs.IT math.IT
null
It has been observed that particular rate-1/2 partially systematic parallel concatenated convolutional codes (PCCCs) can achieve a lower error floor than that of their rate-1/3 parent codes. Nevertheless, good puncturing patterns can only be identified by means of an exhaustive search, whilst convergence towards low ...
[ { "version": "v1", "created": "Tue, 3 Apr 2007 10:24:38 GMT" } ]
2016-11-18T00:00:00
[ [ "Chatzigeorgiou", "Ioannis", "" ], [ "Rodrigues", "Miguel R. D.", "" ], [ "Wassell", "Ian J.", "" ], [ "Carrasco", "Rolando", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0468
Jinsong Tan
Jinsong Tan
Inapproximability of Maximum Weighted Edge Biclique and Its Applications
null
LNCS 4978, TAMC 2008, pp 282-293
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a bipartite graph $G = (V_1,V_2,E)$ where edges take on {\it both} positive and negative weights from set $\mathcal{S}$, the {\it maximum weighted edge biclique} problem, or $\mathcal{S}$-MWEB for short, asks to find a bipartite subgraph whose sum of edge weights is maximized. This problem has various applicati...
[ { "version": "v1", "created": "Tue, 3 Apr 2007 21:39:11 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2009 02:50:29 GMT" } ]
2009-03-23T00:00:00
[ [ "Tan", "Jinsong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.0492
Shenghui Su
Shenghui Su, and Shuwang Lu
Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
14 pages, and 2 table
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We illustrate through example 1 and 2 that the condition at theorem 1 in [8] dissatisfies necessity, and the converse proposition of fact 1.1 in [8] does not hold, namely the condition Z/M - L/Ak < 1/(2 Ak^2) is not sufficient for f(i) + f(j) = f(k). Illuminate through an analysis and ex.3 that there is a logic error...
[ { "version": "v1", "created": "Wed, 4 Apr 2007 04:31:00 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2010 14:06:43 GMT" } ]
2010-02-04T00:00:00
[ [ "Su", "Shenghui", "" ], [ "Lu", "Shuwang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0704.0499
Lawrence Ong
Lawrence Ong and Mehul Motani
Optimal Routing for Decode-and-Forward based Cooperation in Wireless Networks
Accepted and to be presented at Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2007), San Diego, California, June 18-21 2007
Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2007), San Diego, CA, pp. 334-343, Jun. 18-21 2007.
10.1109/SAHCN.2007.4292845
null
cs.IT math.IT
null
We investigate cooperative wireless relay networks in which the nodes can help each other in data transmission. We study different coding strategies in the single-source single-destination network with many relay nodes. Given the myriad of ways in which nodes can cooperate, there is a natural routing problem, i.e., d...
[ { "version": "v1", "created": "Wed, 4 Apr 2007 07:22:56 GMT" } ]
2010-04-15T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0528
Soung Liew
Chi Pan Chan, Soung Chang Liew, An Chan
Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks
null
null
null
null
cs.NI cs.IT math.IT
null
This paper investigates the many-to-one throughput capacity (and by symmetry, one-to-many throughput capacity) of IEEE 802.11 multi-hop networks. It has generally been assumed in prior studies that the many-to-one throughput capacity is upper-bounded by the link capacity L. Throughput capacity L is not achievable und...
[ { "version": "v1", "created": "Wed, 4 Apr 2007 09:17:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Chan", "Chi Pan", "" ], [ "Liew", "Soung Chang", "" ], [ "Chan", "An", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet...
0704.0540
Jinhua Jiang
Jinhua Jiang and Xin Yan
On the Achievable Rate Regions for Interference Channels with Degraded Message Sets
22 pages, 8 figures, submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT math.IT
null
The interference channel with degraded message sets (IC-DMS) refers to a communication model in which two senders attempt to communicate with their respective receivers simultaneously through a common medium, and one of the senders has complete and a priori (non-causal) knowledge about the message being transmitted b...
[ { "version": "v1", "created": "Wed, 4 Apr 2007 10:28:16 GMT" }, { "version": "v2", "created": "Thu, 5 Apr 2007 01:41:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Jiang", "Jinhua", "" ], [ "Yan", "Xin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0590
Rachit Agarwal
Rachit Agarwal, Ralf Koetter and Emanuel Popovici
A Low Complexity Algorithm and Architecture for Systematic Encoding of Hermitian Codes
5 Pages, Accepted in IEEE International Symposium on Information Theory ISIT 2007
null
10.1109/ISIT.2007.4557408
null
cs.IT math.IT
null
We present an algorithm for systematic encoding of Hermitian codes. For a Hermitian code defined over GF(q^2), the proposed algorithm achieves a run time complexity of O(q^2) and is suitable for VLSI implementation. The encoder architecture uses as main blocks q varying-rate Reed-Solomon encoders and achieves a space...
[ { "version": "v1", "created": "Wed, 4 Apr 2007 15:06:14 GMT" }, { "version": "v2", "created": "Thu, 5 Apr 2007 11:47:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Agarwal", "Rachit", "" ], [ "Koetter", "Ralf", "" ], [ "Popovici", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0671
Maxim Raginsky
Maxim Raginsky
Learning from compressed observations
6 pages; submitted to the 2007 IEEE Information Theory Workshop (ITW 2007)
null
10.1109/ITW.2007.4313111
null
cs.IT cs.LG math.IT
null
The problem of statistical learning is to construct a predictor of a random variable $Y$ as a function of a related random variable $X$ on the basis of an i.i.d. training sample from the joint distribution of $(X,Y)$. Allowable predictors are drawn from some specified class, and the goal is to approach asymptotically...
[ { "version": "v1", "created": "Thu, 5 Apr 2007 02:57:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.0730
Hamed Haddadi MSc MIEE
Hamed Haddadi, Raul Landa, Miguel Rio, Saleem Bhatti
Revisiting the Issues On Netflow Sample and Export Performance
null
null
null
null
cs.PF cs.NI
null
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics about the traffic which is traversing the router. Sampling is commonly applied on routers in order to limit the load incurred by the colle...
[ { "version": "v1", "created": "Thu, 5 Apr 2007 14:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Haddadi", "Hamed", "" ], [ "Landa", "Raul", "" ], [ "Rio", "Miguel", "" ], [ "Bhatti", "Saleem", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "des...
0704.0788
Kerry Soileau
Kerry M. Soileau
Optimal Synthesis of Multiple Algorithms
null
null
null
null
cs.DS cs.PF
null
In this paper we give a definition of "algorithm," "finite algorithm," "equivalent algorithms," and what it means for a single algorithm to dominate a set of algorithms. We define a derived algorithm which may have a smaller mean execution time than any of its component algorithms. We give an explicit expression for ...
[ { "version": "v1", "created": "Thu, 5 Apr 2007 19:47:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Soileau", "Kerry M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.PF", ...
0704.0802
Caleb Lo
Caleb K. Lo, Robert W. Heath, Jr. and Sriram Vishwanath
Hybrid-ARQ in Multihop Networks with Opportunistic Relay Selection
4 pages, 5 figures, to appear in Proceedings of the 2007 International Conference on Acoustics, Speech, and Signal Processing in Honolulu, HI
null
null
null
cs.IT math.IT
null
This paper develops a contention-based opportunistic feedback technique towards relay selection in a dense wireless network. This technique enables the forwarding of additional parity information from the selected relay to the destination. For a given network, the effects of varying key parameters such as the feedbac...
[ { "version": "v1", "created": "Thu, 5 Apr 2007 20:37:44 GMT" } ]
2012-08-27T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Heath,", "Robert W.", "Jr." ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0805
Caleb Lo
Caleb K. Lo, Robert W. Heath, Jr. and Sriram Vishwanath
Opportunistic Relay Selection with Limited Feedback
5 pages, 6 figures, to appear in Proceedings of 2007 IEEE Vehicular Technology Conference-Spring in Dublin, Ireland
null
10.1109/VETECS.2007.40
null
cs.IT math.IT
null
It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless networks. This selection strategy supports a hybrid-ARQ transmission approach where relays forward parity information to the destination in the event of ...
[ { "version": "v1", "created": "Thu, 5 Apr 2007 20:52:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Heath,", "Robert W.", "Jr." ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0831
Brooke Shrader
Brooke Shrader and Anthony Ephremides
On packet lengths and overhead for random linear coding over the erasure channel
5 pages, 5 figures, submitted to the 2007 International Wireless Communications and Mobile Computing Conference
null
null
null
cs.IT math.IT
null
We assess the practicality of random network coding by illuminating the issue of overhead and considering it in conjunction with increasingly long packets sent over the erasure channel. We show that the transmission of increasingly long packets, consisting of either of an increasing number of symbols per packet or an...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 02:25:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Shrader", "Brooke", "" ], [ "Ephremides", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0834
Anatoly Rodionov
Anatoly Rodionov, Sergey Volkov
P-adic arithmetic coding
29 pages
null
null
null
cs.DS
null
A new incremental algorithm for data compression is presented. For a sequence of input symbols algorithm incrementally constructs a p-adic integer number as an output. Decoding process starts with less significant part of a p-adic integer and incrementally reconstructs a sequence of input symbols. Algorithm is based ...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 02:30:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodionov", "Anatoly", "" ], [ "Volkov", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0704.0838
Gil Shamir
Gil I. Shamir
Universal Source Coding for Monotonic and Fast Decaying Monotonic Distributions
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We study universal compression of sequences generated by monotonic distributions. We show that for a monotonic distribution over an alphabet of size $k$, each probability parameter costs essentially $0.5 \log (n/k^3)$ bits, where $n$ is the coded sequence length, as long as $k = o(n^{1/3})$. Otherwise, for $k = O(n)$...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 03:12:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Shamir", "Gil I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.0858
Mohamed Kaaniche
Eric Alata (LAAS), Vincent Nicomette (LAAS), Mohamed Ka\^aniche (LAAS), Marc Dacier (LAAS), Matthieu Herrb (LAAS)
Lessons Learned from the deployment of a high-interaction honeypot
null
Proc. 6th European Dependable Computing Conference (EDCC-6), Coimbra (Portugal), 18-20 octobre 2006 (18/10/2006) 39-44
null
null
cs.CR
null
This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained w...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 08:22:50 GMT" } ]
2016-08-14T00:00:00
[ [ "Alata", "Eric", "", "LAAS" ], [ "Nicomette", "Vincent", "", "LAAS" ], [ "Kaâniche", "Mohamed", "", "LAAS" ], [ "Dacier", "Marc", "", "LAAS" ], [ "Herrb", "Matthieu", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0704.0860
Mohamed Kaaniche
Cristina Simache (LAAS), Mohamed Kaaniche (LAAS)
Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study
null
Proc. 2005 IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'2005), Changsha, Hunan (Chine), 12-14 D{\'e}cembre 2005 (18/12/2005) 49-56
null
null
cs.PF
null
This paper presents a measurement-based availability assessment study using field data collected during a 4-year period from 373 SunOS/Solaris Unix workstations and servers interconnected through a local area network. We focus on the estimation of machine uptimes, downtimes and availability based on the identificatio...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 08:24:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Simache", "Cristina", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0704.0861
Mohamed Kaaniche
Mohamed Kaaniche (LAAS), Y. Deswarte (LAAS), Eric Alata (LAAS), Marc Dacier (SC), Vincent Nicomette (LAAS)
Empirical analysis and statistical modeling of attack processes based on honeypots
null
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006) (25/06/2006) 119-124
null
null
cs.PF cs.CR
null
Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 08:50:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaaniche", "Mohamed", "", "LAAS" ], [ "Deswarte", "Y.", "", "LAAS" ], [ "Alata", "Eric", "", "LAAS" ], [ "Dacier", "Marc", "", "SC" ], [ "Nicomette", "Vincent", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.CR", "des...
0704.0865
Mohamed Kaaniche
Ana-Elena Rugina (LAAS), Karama Kanoun (LAAS), Mohamed Kaaniche (LAAS)
An architecture-based dependability modeling framework using AADL
null
Proc. 10th IASTED International Conference on Software Engineering and Applications (SEA'2006), Dallas (USA), 13-15 November2006 (13/11/2006) 222-227
null
null
cs.PF cs.SE
null
For efficiency reasons, the software system designers' will is to use an integrated set of methods and tools to describe specifications and designs, and also to perform analyses such as dependability, schedulability and performance. AADL (Architecture Analysis and Design Language) has proved to be efficient for softw...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 09:33:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Rugina", "Ana-Elena", "", "LAAS" ], [ "Kanoun", "Karama", "", "LAAS" ], [ "Kaaniche", "Mohamed", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.SE", "des...
0704.0879
Mohamed Kaaniche
Mohamed Kaaniche (LAAS), Luigi Romano (UIUC), Zbigniew Kalbarczyk (UIUC), Ravishankar Iyer (UIUC), Rick Karcich (STORAGETEK)
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture
null
Proc. 28th IEEE International Symposium on Fault-Tolerant Computing (FTCS-28), Munich (Germany), IEEE Computer Society, June 1998, pp.6-15 (1998) 6-15
null
null
cs.PF
null
We present a hierarchical simulation approach for the dependability analysis and evaluation of a highly available commercial cache-based RAID storage system. The archi-tecture is complex and includes several layers of overlap-ping error detection and recovery mechanisms. Three ab-straction levels have been developed ...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 11:46:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaaniche", "Mohamed", "", "LAAS" ], [ "Romano", "Luigi", "", "UIUC" ], [ "Kalbarczyk", "Zbigniew", "", "UIUC" ], [ "Iyer", "Ravishankar", "", "UIUC" ], [ "Karcich", "Rick", "", "STORAGETEK" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0704.0954
Jos\'e M. F. Moura
Soummya Kar and Jose M. F. Moura
Sensor Networks with Random Links: Topology Design for Distributed Consensus
Submitted to IEEE Transactions
null
10.1109/TSP.2008.920143
null
cs.IT cs.LG math.IT
null
In a sensor network, in practice, the communication among sensors is subject to:(1) errors or failures at random times; (3) costs; and(2) constraints since sensors and networks operate under scarce resources, such as power, data rate, or communication. The signal-to-noise ratio (SNR) is usually a main factor in deter...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 21:58:52 GMT" } ]
2009-11-13T00:00:00
[ [ "Kar", "Soummya", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.0967
Jia Liu
Jia Liu and Y. Thomas Hou
Cross-Layer Optimization of MIMO-Based Mesh Networks with Gaussian Vector Broadcast Channels
null
null
null
null
cs.IT cs.AR math.IT
null
MIMO technology is one of the most significant advances in the past decade to increase channel capacity and has a great potential to improve network capacity for mesh networks. In a MIMO-based mesh network, the links outgoing from each node sharing the common communication spectrum can be modeled as a Gaussian vector...
[ { "version": "v1", "created": "Sat, 7 Apr 2007 03:18:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Jia", "" ], [ "Hou", "Y. Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.0985
Mohd Abubakr
Mohd Abubakr, R.M.Vinay
Architecture for Pseudo Acausal Evolvable Embedded Systems
4 pages, 2 figures. Submitted to SASO 2007
null
null
null
cs.NE cs.AI
null
Advances in semiconductor technology are contributing to the increasing complexity in the design of embedded systems. Architectures with novel techniques such as evolvable nature and autonomous behavior have engrossed lot of attention. This paper demonstrates conceptually evolvable embedded systems can be characteriz...
[ { "version": "v1", "created": "Sat, 7 Apr 2007 13:40:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Abubakr", "Mohd", "" ], [ "Vinay", "R. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": ...
0704.1020
Gyorgy Ottucsak
Andras Gyorgy, Tamas Linder, Gabor Lugosi, Gyorgy Ottucsak
The on-line shortest path problem under partial monitoring
35 pages
null
null
null
cs.LG cs.SC
null
The on-line shortest path problem is considered under various models of partial monitoring. Given a weighted directed acyclic graph whose edge weights can change in an arbitrary (adversarial) way, a decision maker has to choose in each round of a game a path between two distinguished vertices such that the loss of th...
[ { "version": "v1", "created": "Sun, 8 Apr 2007 10:15:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Gyorgy", "Andras", "" ], [ "Linder", "Tamas", "" ], [ "Lugosi", "Gabor", "" ], [ "Ottucsak", "Gyorgy", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary catego...
0704.1028
Jianlin Cheng
Jianlin Cheng
A neural network approach to ordinal regression
8 pages
null
null
null
cs.LG cs.AI cs.NE
null
Ordinal regression is an important type of learning, which has properties of both classification and regression. Here we describe a simple and effective approach to adapt a traditional neural network to learn ordinal categories. Our approach is a generalization of the perceptron method for ordinal regression. On seve...
[ { "version": "v1", "created": "Sun, 8 Apr 2007 17:36:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Jianlin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary catego...
0704.1043
Hector Zenil
Jean-Paul Delahaye and Hector Zenil
On the Kolmogorov-Chaitin Complexity for short sequences
21 pages. Paper webpage: http://www.mathrix.org/experimentalAIT/
null
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A drawback of Kolmogorov-Chaitin complexity (K) as a function from s to the shortest program producing s is its noncomputability which limits its range of applicability. Moreover, when strings are short, the dependence of K on a particular universal Turing machine U can be arbitrary. In practice one can approximate i...
[ { "version": "v1", "created": "Sun, 8 Apr 2007 20:01:47 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 13:00:55 GMT" }, { "version": "v3", "created": "Wed, 30 May 2007 10:16:36 GMT" }, { "version": "v4", "created": "Tue, 1 Jun 2010 20:03:20 GMT" }, { "ver...
2010-12-20T00:00:00
[ [ "Delahaye", "Jean-Paul", "" ], [ "Zenil", "Hector", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.1068
Leo Liberti
Giacomo Nannicini, Philippe Baptiste, Gilles Barbier, Daniel Krob, Leo Liberti
Fast paths in large-scale dynamic road networks
12 pages, 4 figures
null
null
null
cs.NI cs.DS
null
Efficiently computing fast paths in large scale dynamic road networks (where dynamic traffic information is known over a part of the network) is a practical problem faced by several traffic information service providers who wish to offer a realistic fast path computation to GPS terminal enabled vehicles. The heuristi...
[ { "version": "v1", "created": "Mon, 9 Apr 2007 07:04:19 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 18:17:35 GMT" } ]
2007-06-27T00:00:00
[ [ "Nannicini", "Giacomo", "" ], [ "Baptiste", "Philippe", "" ], [ "Barbier", "Gilles", "" ], [ "Krob", "Daniel", "" ], [ "Liberti", "Leo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet...
0704.1070
Hua Fu
Hua Fu and Pooi Yuen Kam
Differential Diversity Reception of MDPSK over Independent Rayleigh Channels with Nonidentical Branch Statistics and Asymmetric Fading Spectrum
5 pages, 3 figures, to present at ISIT2007
null
null
null
cs.IT cs.PF math.IT
null
This paper is concerned with optimum diversity receiver structure and its performance analysis of differential phase shift keying (DPSK) with differential detection over nonselective, independent, nonidentically distributed, Rayleigh fading channels. The fading process in each branch is assumed to have an arbitrary D...
[ { "version": "v1", "created": "Mon, 9 Apr 2007 07:16:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Fu", "Hua", "" ], [ "Kam", "Pooi Yuen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.1158
Bernardo Huberman
Fang Wu and Bernardo A. Huberman
Novelty and Collective Attention
null
null
10.1073/pnas.0704916104
null
cs.CY cs.IR physics.soc-ph
null
The subject of collective attention is central to an information age where millions of people are inundated with daily messages. It is thus of interest to understand how attention to novel items propagates and eventually fades among large populations. We have analyzed the dynamics of collective attention among one mi...
[ { "version": "v1", "created": "Mon, 9 Apr 2007 22:02:29 GMT" } ]
2009-11-13T00:00:00
[ [ "Wu", "Fang", "" ], [ "Huberman", "Bernardo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", ...
0704.1196
Shengchao Ding
Qing Yang and Shengchao Ding
Novel algorithm to calculate hypervolume indicator of Pareto approximation set
9 pages, 2 figures. Comments are welcome
null
null
null
cs.CG cs.NE
null
Hypervolume indicator is a commonly accepted quality measure for comparing Pareto approximation set generated by multi-objective optimizers. The best known algorithm to calculate it for $n$ points in $d$-dimensional space has a run time of $O(n^{d/2})$ with special data structures. This paper presents a recursive, ve...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 07:21:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Yang", "Qing", "" ], [ "Ding", "Shengchao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic alg...
0704.1198
Minkyu Kim
Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard
A Doubly Distributed Genetic Algorithm for Network Coding
8 pages, 7 figures, accepted to the Genetic and Evolutionary Computation Conference (GECCO 2007)
null
null
null
cs.NE cs.NI
null
We present a genetic algorithm which is distributed in two novel ways: along genotype and temporal axes. Our algorithm first distributes, for every member of the population, a subset of the genotype to each network node, rather than a subset of the population to each. This genotype distribution is shown to offer a si...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 13:36:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Minkyu", "" ], [ "Aggarwal", "Varun", "" ], [ "O'Reilly", "Una-May", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": ...
0704.1267
Laurence Likforman
Laurence Likforman-Sulem, Abderrazak Zahour, Bruno Taconet
Text Line Segmentation of Historical Documents: a Survey
25 pages, submitted version, To appear in International Journal on Document Analysis and Recognition, On line version available at http://www.springerlink.com/content/k2813176280456k3/
Vol. 9, no 2-4, April 2007, pp. 123-138
10.1007/s10032-006-0023-z
null
cs.CV
null
There is a huge amount of historical documents in libraries and in various National Archives that have not been exploited electronically. Although automatic reading of complete pages remains, in most cases, a long-term objective, tasks such as word spotting, text/image alignment, authentication and extraction of spec...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 16:26:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Likforman-Sulem", "Laurence", "" ], [ "Zahour", "Abderrazak", "" ], [ "Taconet", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0704.1269
Lenka Zdeborova
Lenka Zdeborov\'a, Florent Krzakala
Phase Transitions in the Coloring of Random Graphs
36 pages, 15 figures
Phys. Rev. E 76, 031131 (2007)
10.1103/PhysRevE.76.031131
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC
null
We consider the problem of coloring the vertices of a large sparse random graph with a given number of colors so that no adjacent vertices have the same color. Using the cavity method, we present a detailed and systematic analytical study of the space of proper colorings (solutions). We show that for a fixed number...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 16:42:15 GMT" }, { "version": "v2", "created": "Wed, 20 Jun 2007 15:26:20 GMT" } ]
2011-11-09T00:00:00
[ [ "Zdeborová", "Lenka", "" ], [ "Krzakala", "Florent", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Net...
0704.1274
Dev Rajnarayan
David H. Wolpert and Dev G. Rajnarayan
Parametric Learning and Monte Carlo Optimization
null
null
null
null
cs.LG
null
This paper uncovers and explores the close relationship between Monte Carlo Optimization of a parametrized integral (MCO), Parametric machine-Learning (PL), and `blackbox' or `oracle'-based optimization (BO). We make four contributions. First, we prove that MCO is mathematically identical to a broad class of PL probl...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 17:01:07 GMT" } ]
2011-11-09T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Rajnarayan", "Dev G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary catego...
0704.1294
Ahmed Sidky Ahmed Sidky
Ahmed Sidky, James Arthur, Shawn Bohner
A Disciplined Approach to Adopting Agile Practices: The Agile Adoption Framework
null
null
null
null
cs.SE
null
Many organizations aspire to adopt agile processes to take advantage of the numerous benefits that it offers to an organization. Those benefits include, but are not limited to, quicker return on investment, better software quality, and higher customer satisfaction. To date however, there is no structured process (at ...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 19:11:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidky", "Ahmed", "" ], [ "Arthur", "James", "" ], [ "Bohner", "Shawn", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Scien...
0704.1308
Nihar Jindal
Nihar Jindal
Antenna Combining for the MIMO Downlink Channel
Submitted to IEEE Trans. Wireless Communications April 2007. Revised August 2007
null
10.1109/T-WC.2008.070383
null
cs.IT math.IT
null
A multiple antenna downlink channel where limited channel feedback is available to the transmitter is considered. In a vector downlink channel (single antenna at each receiver), the transmit antenna array can be used to transmit separate data streams to multiple receivers only if the transmitter has very accurate cha...
[ { "version": "v1", "created": "Tue, 10 Apr 2007 20:56:14 GMT" }, { "version": "v2", "created": "Sun, 19 Aug 2007 17:06:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1317
Naftali Sommer
Naftali Sommer, Meir Feder and Ofir Shalvi
Low Density Lattice Codes
24 pages, 4 figures. Submitted for publication in IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
null
Low density lattice codes (LDLC) are novel lattice codes that can be decoded efficiently and approach the capacity of the additive white Gaussian noise (AWGN) channel. In LDLC a codeword x is generated directly at the n-dimensional Euclidean space as a linear transformation of a corresponding integer message vector b...
[ { "version": "v1", "created": "Wed, 11 Apr 2007 16:07:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Sommer", "Naftali", "" ], [ "Feder", "Meir", "" ], [ "Shalvi", "Ofir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1353
Paul Prekop
Paul Prekop
Supporting Knowledge and Expertise Finding within Australia's Defence Science and Technology Organisation
40th Hawaii International Conference on System Sciences (HICSS40) 2007
null
null
null
cs.OH cs.DB cs.DL cs.HC
null
This paper reports on work aimed at supporting knowledge and expertise finding within a large Research and Development (R&D) organisation. The paper first discusses the nature of knowledge important to R&D organisations and presents a prototype information system developed to support knowledge and expertise finding. ...
[ { "version": "v1", "created": "Wed, 11 Apr 2007 06:49:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Prekop", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, dataminin...
0704.1358
Torleiv Kl{\o}ve
Jyh-Shyan Lin, Jen-Chun Chang, Rong-Jaye Chen, Torleiv Kl{\o}ve
Distance preserving mappings from ternary vectors to permutations
21 pages
null
null
null
cs.DM cs.IT math.IT
null
Distance-preserving mappings (DPMs) are mappings from the set of all q-ary vectors of a fixed length to the set of permutations of the same or longer length such that every two distinct vectors are mapped to permutations with the same or even larger Hamming distance than that of the vectors. In this paper, we propose...
[ { "version": "v1", "created": "Wed, 11 Apr 2007 07:20:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Lin", "Jyh-Shyan", "" ], [ "Chang", "Jen-Chun", "" ], [ "Chen", "Rong-Jaye", "" ], [ "Kløve", "Torleiv", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "descri...
0704.1373
Burgy Laurent
Burgy Laurent (INRIA Futurs), Laurent R\'eveill\`ere (INRIA Futurs), Julia Lawall (DIKU), Gilles Muller (INRIA Rennes)
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
null
null
null
null
cs.PL
null
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu,...
[ { "version": "v1", "created": "Wed, 11 Apr 2007 08:35:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Laurent", "Burgy", "", "INRIA Futurs" ], [ "Réveillère", "Laurent", "", "INRIA Futurs" ], [ "Lawall", "Julia", "", "DIKU" ], [ "Muller", "Gilles", "", "INRIA Rennes" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; o...
0704.1394
Tarik Had\v{z}i\'c
Tarik Hadzic, Rune Moller Jensen, Henrik Reif Andersen
Calculating Valid Domains for BDD-Based Interactive Configuration
null
null
null
null
cs.AI
null
In these notes we formally describe the functionality of Calculating Valid Domains from the BDD representing the solution space of valid configurations. The formalization is largely based on the CLab configuration framework.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 10:59:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hadzic", "Tarik", "" ], [ "Jensen", "Rune Moller", "" ], [ "Andersen", "Henrik Reif", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (al...
0704.1409
Yao Hengshuai
Yao HengShuai
Preconditioned Temporal Difference Learning
This paper has been withdrawn by the author. Look at the ICML version instead: http://icml2008.cs.helsinki.fi/papers/111.pdf
null
null
null
cs.LG cs.AI
null
This paper has been withdrawn by the author. This draft is withdrawn for its poor quality in english, unfortunately produced by the author when he was just starting his science route. Look at the ICML version instead: http://icml2008.cs.helsinki.fi/papers/111.pdf
[ { "version": "v1", "created": "Wed, 11 Apr 2007 13:17:01 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2007 03:33:26 GMT" }, { "version": "v3", "created": "Fri, 8 Jun 2012 14:08:19 GMT" } ]
2012-06-11T00:00:00
[ [ "HengShuai", "Yao", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary catego...
0704.1411
Lorenzo Cappellari
Lorenzo Cappellari
Trellis-Coded Quantization Based on Maximum-Hamming-Distance Binary Codes
4 pages, 4 graphic files (2 figures using subfigures), LaTeX; minor revisions; submitted to IEEE Trans. Commun
null
null
null
cs.IT math.IT
null
Most design approaches for trellis-coded quantization take advantage of the duality of trellis-coded quantization with trellis-coded modulation, and use the same empirically-found convolutional codes to label the trellis branches. This letter presents an alternative approach that instead takes advantage of maximum-Ha...
[ { "version": "v1", "created": "Wed, 11 Apr 2007 13:21:39 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2007 12:33:03 GMT" }, { "version": "v3", "created": "Thu, 20 Dec 2007 16:31:47 GMT" } ]
2007-12-20T00:00:00
[ [ "Cappellari", "Lorenzo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1455
Aaron Wagner
Aaron B. Wagner, Pramod Viswanath, and Sanjeev R. Kulkarni
A Better Good-Turing Estimator for Sequence Probabilities
ISIT 2007, to appear
null
null
null
cs.IT math.IT
null
We consider the problem of estimating the probability of an observed string drawn i.i.d. from an unknown distribution. The key feature of our study is that the length of the observed string is assumed to be of the same order as the size of the underlying alphabet. In this setting, many letters are unseen and the empi...
[ { "version": "v1", "created": "Wed, 11 Apr 2007 17:02:33 GMT" }, { "version": "v2", "created": "Sat, 21 Apr 2007 21:23:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Wagner", "Aaron B.", "" ], [ "Viswanath", "Pramod", "" ], [ "Kulkarni", "Sanjeev R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1524
Daniel Ryan
Daniel J. Ryan, Iain B. Collings and I. Vaughan L. Clarkson
GLRT-Optimal Noncoherent Lattice Decoding
30 pages, 6 figures Accepted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2007.894237
null
cs.IT math.IT
null
This paper presents new low-complexity lattice-decoding algorithms for noncoherent block detection of QAM and PAM signals over complex-valued fading channels. The algorithms are optimal in terms of the generalized likelihood ratio test (GLRT). The computational complexity is polynomial in the block length; making GLR...
[ { "version": "v1", "created": "Thu, 12 Apr 2007 04:30:35 GMT" } ]
2009-11-13T00:00:00
[ [ "Ryan", "Daniel J.", "" ], [ "Collings", "Iain B.", "" ], [ "Clarkson", "I. Vaughan L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1571
Philippe Gambette
Philippe Gambette (LIAFA), St\'ephane Vialette (LRI)
On restrictions of balanced 2-interval graphs
null
Dans Lecture Notes In Computer Science - 33rd International Workshop on Graph-Theoretic Concepts in Computer Science (WG'07), Dornburg : Allemagne (2007)
10.1007/978-3-540-74839-7_6
null
cs.DM q-bio.QM
null
The class of 2-interval graphs has been introduced for modelling scheduling and allocation problems, and more recently for specific bioinformatic problems. Some of those applications imply restrictions on the 2-interval graphs, and justify the introduction of a hierarchy of subclasses of 2-interval graphs that genera...
[ { "version": "v1", "created": "Thu, 12 Apr 2007 12:23:13 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2007 12:41:14 GMT" } ]
2008-02-04T00:00:00
[ [ "Gambette", "Philippe", "", "LIAFA" ], [ "Vialette", "Stéphane", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", ...
0704.1675
Kristina Lerman
Anon Plangprasopchok and Kristina Lerman
Exploiting Social Annotation for Automatic Resource Discovery
6 pages, submitted to AAAI07 workshop on Information Integration on the Web
null
null
null
cs.AI cs.CY cs.DL
null
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them in the application. Manual resource discovery is a slow process, requiring the user to sift through results obtained via keyword-based sear...
[ { "version": "v1", "created": "Thu, 12 Apr 2007 23:24:19 GMT" } ]
2016-09-08T00:00:00
[ [ "Plangprasopchok", "Anon", "" ], [ "Lerman", "Kristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (al...
0704.1676
Kristina Lerman
Kristina Lerman, Anon Plangprasopchok and Chio Wong
Personalizing Image Search Results on Flickr
12 pages, submitted to AAAI07 workshop on Intelligent Information Personalization
null
null
null
cs.IR cs.AI cs.CY cs.DL cs.HC
null
The social media site Flickr allows users to upload their photos, annotate them with tags, submit them to groups, and also to form social networks by adding other users as contacts. Flickr offers multiple ways of browsing or searching it. One option is tag search, which returns all images tagged with a specific keywo...
[ { "version": "v1", "created": "Thu, 12 Apr 2007 23:31:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Plangprasopchok", "Anon", "" ], [ "Wong", "Chio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "c...
0704.1678
Shanghua Teng
Xi Chen, Xiaotie Deng, Shang-Hua Teng
Settling the Complexity of Computing Two-Player Nash Equilibria
53 pages 2 figures
null
null
null
cs.GT cs.CC
null
We settle a long-standing open question in algorithmic game theory. We prove that Bimatrix, the problem of finding a Nash equilibrium in a two-player game, is complete for the complexity class PPAD Polynomial Parity Argument, Directed version) introduced by Papadimitriou in 1991. This is the first of a series of re...
[ { "version": "v1", "created": "Thu, 12 Apr 2007 23:54:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Deng", "Xiaotie", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may o...
0704.1694
Sergey Yekhanin
Kiran S. Kedlaya, Sergey Yekhanin
Locally Decodable Codes From Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers
18 pages
null
null
null
cs.CC math.NT
null
A k-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only k bits of the codeword C(x), even after some constant fraction of codeword bits has been corrupted. The major goal of LDC related researc...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 04:18:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kedlaya", "Kiran S.", "" ], [ "Yekhanin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity...
0704.1707
Linda Buisman
Linda Buisman and Rajeev Gor\'e
A Cut-free Sequent Calculus for Bi-Intuitionistic Logic: Extended Version
null
null
null
null
cs.LO
null
Bi-intuitionistic logic is the extension of intuitionistic logic with a connective dual to implication. Bi-intuitionistic logic was introduced by Rauszer as a Hilbert calculus with algebraic and Kripke semantics. But her subsequent ``cut-free'' sequent calculus for BiInt has recently been shown by Uustalu to fail cut...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 07:29:31 GMT" }, { "version": "v2", "created": "Tue, 17 Apr 2007 03:11:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Buisman", "Linda", "" ], [ "Goré", "Rajeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly...
0704.1709
Marie Cottrell
Marie Cottrell (SAMOS, Matisse), Smail Ibbou (SAMOS, Matisse), Patrick Letr\'emy (SAMOS, Matisse)
Traitement Des Donnees Manquantes Au Moyen De L'Algorithme De Kohonen
null
Actes de la dixi\`eme conf\'erence ACSEG 2003 (Nantes) (2003) 201-217
null
null
stat.AP cs.NE
null
Nous montrons comment il est possible d'utiliser l'algorithme d'auto organisation de Kohonen pour traiter des donn\'ees avec valeurs manquantes et estimer ces derni\`eres. Apr\`es un rappel m\'ethodologique, nous illustrons notre propos \`a partir de trois applications \`a des donn\'ees r\'eelles. ----- We show h...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 07:33:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Cottrell", "Marie", "", "SAMOS, Matisse" ], [ "Ibbou", "Smail", "", "SAMOS, Matisse" ], [ "Letrémy", "Patrick", "", "SAMOS, Matisse" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.NE", "description":...
0704.1748
Frank Schweitzer
Markus M. Geipel
Self-Organization applied to Dynamic Network Layout
Text revision and figures improved in v.2. See http://www.sg.ethz.ch for more info and examples
International Journal of Modern Physics C vol. 18, no. 10 (2007), pp. 1537-1549
10.1142/S0129183107011558
null
physics.comp-ph cs.DS nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As networks and their structure have become a major field of research, a strong demand for network visualization has emerged. We address this challenge by formalizing the well established spring layout in terms of dynamic equations. We thus open up the design space for new algorithms. Drawing from the knowledge of sy...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 16:45:28 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 13:21:55 GMT" }, { "version": "v3", "created": "Sun, 7 Sep 2008 12:46:19 GMT" }, { "version": "v4", "created": "Mon, 24 Nov 2008 18:35:59 GMT" }, { "ve...
2009-11-13T00:00:00
[ [ "Geipel", "Markus M.", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly ...
0704.1751
Olivier Rioul
Olivier Rioul
Information Theoretic Proofs of Entropy Power Inequalities
submitted for publication in the IEEE Transactions on Information Theory, revised version
null
10.1109/TIT.2010.2090193
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While most useful information theoretic inequalities can be deduced from the basic properties of entropy or mutual information, up to now Shannon's entropy power inequality (EPI) is an exception: Existing information theoretic proofs of the EPI hinge on representations of differential entropy using either Fisher info...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 12:42:07 GMT" }, { "version": "v2", "created": "Tue, 24 Aug 2010 10:41:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Rioul", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1756
Jose M. Martin-Garcia
Jose M. Martin-Garcia, Renato Portugal, Leon R. U. Manssur
The Invar Tensor Package
Accepted in Computer Physics Communications. Package can be downloaded from http://metric.iem.csic.es/Martin-Garcia/xAct/Invar/ (Mathematica version) or http://www.lncc.br/~portugal/Invar.html (Maple version)
Comp. Phys. Commun. 177 (2007) 640-648
10.1016/j.cpc.2007.05.015
null
cs.SC gr-qc hep-th
null
The Invar package is introduced, a fast manipulator of generic scalar polynomial expressions formed from the Riemann tensor of a four-dimensional metric-compatible connection. The package can maximally simplify any polynomial containing tensor products of up to seven Riemann tensors within seconds. It has been implem...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 13:03:59 GMT" } ]
2015-05-13T00:00:00
[ [ "Martin-Garcia", "Jose M.", "" ], [ "Portugal", "Renato", "" ], [ "Manssur", "Leon R. U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, in...
0704.1768
Enrique ter Horst A
Henryk Gzyl, German Molina, Enrique ter Horst
Assessment and Propagation of Input Uncertainty in Tree-based Option Pricing Models
39 pages, 21 figures
null
null
null
cs.CE cs.GT
null
This paper aims to provide a practical example on the assessment and propagation of input uncertainty for option pricing when using tree-based methods. Input uncertainty is propagated into output uncertainty, reflecting that option prices are as unknown as the inputs they are based on. Option pricing formulas are too...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 14:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Gzyl", "Henryk", "" ], [ "Molina", "German", "" ], [ "ter Horst", "Enrique", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that e...
0704.1783
Francesco Santini
Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini
Unicast and Multicast Qos Routing with Soft Constraint Logic Programming
45 pages
null
null
null
cs.LO cs.AI cs.NI
null
We present a formal model to represent and solve the unicast/multicast routing problem in networks with Quality of Service (QoS) requirements. To attain this, first we translate the network adapting it to a weighted graph (unicast) or and-or graph (multicast), where the weight on a connector corresponds to the multid...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 15:53:44 GMT" }, { "version": "v2", "created": "Sun, 29 Apr 2007 15:40:10 GMT" }, { "version": "v3", "created": "Mon, 21 Apr 2008 17:25:06 GMT" } ]
2009-09-29T00:00:00
[ [ "Bistarelli", "Stefano", "" ], [ "Montanari", "Ugo", "" ], [ "Rossi", "Francesca", "" ], [ "Santini", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly...
0704.1818
Martin Wainwright
Martin J. Wainwright, Emin Martinian
Low-density graph codes that are optimal for source/channel coding and binning
Appeared as technical report 730, Dept. of Statistics, UC Berkeley. Portions previously published in conference form (DCC 2006; ISIT 2006)
null
null
Technical report 730
cs.IT math.IT
null
We describe and analyze the joint source/channel coding properties of a class of sparse graphical codes based on compounding a low-density generator matrix (LDGM) code with a low-density parity check (LDPC) code. Our first pair of theorems establish that there exist codes from this ensemble, with all degrees remainin...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 20:33:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Wainwright", "Martin J.", "" ], [ "Martinian", "Emin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1827
Gerald Krafft
Gerald Krafft
Transaction-Oriented Simulation In Ad Hoc Grids
101 pages (plus 131 appendix), 23 figures, 11 tables, MSc thesis for degree in Advanced Computer Science at the Westminster University, London
null
null
null
cs.DC
null
This paper analyses the possibilities of performing parallel transaction-oriented simulations with a special focus on the space-parallel approach and discrete event simulation synchronisation algorithms that are suitable for transaction-oriented simulation and the target environment of Ad Hoc Grids. To demonstrate th...
[ { "version": "v1", "created": "Fri, 6 Apr 2007 15:59:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Krafft", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel,...
0704.1829
Kamil Kloch
Stefan Felsner, Kamil Kloch, Grzegorz Matecki, and Piotr Micek
On-line Chain Partitions of Up-growing Semi-orders
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On-line chain partition is a two-player game between Spoiler and Algorithm. Spoiler presents a partially ordered set, point by point. Algorithm assigns incoming points (immediately and irrevocably) to the chains which constitute a chain partition of the order. The value of the game for orders of width $w$ is a minimu...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 22:41:21 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2007 21:51:26 GMT" }, { "version": "v3", "created": "Sat, 19 Feb 2011 21:18:10 GMT" } ]
2011-02-22T00:00:00
[ [ "Felsner", "Stefan", "" ], [ "Kloch", "Kamil", "" ], [ "Matecki", "Grzegorz", "" ], [ "Micek", "Piotr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0704.1833
Inanc Inan
Inanc Inan, Feyza Keceli, Ender Ayanoglu
Analysis of the 802.11e Enhanced Distributed Channel Access Function
null
null
null
null
cs.NI
null
The IEEE 802.11e standard revises the Medium Access Control (MAC) layer of the former IEEE 802.11 standard for Quality-of-Service (QoS) provision in the Wireless Local Area Networks (WLANs). The Enhanced Distributed Channel Access (EDCA) function of 802.11e defines multiple Access Categories (AC) with AC-specific Con...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 22:40:05 GMT" }, { "version": "v2", "created": "Fri, 26 Oct 2007 05:59:08 GMT" }, { "version": "v3", "created": "Fri, 28 Mar 2008 05:21:34 GMT" } ]
2008-03-28T00:00:00
[ [ "Inan", "Inanc", "" ], [ "Keceli", "Feyza", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet...
0704.1838
Inanc Inan
Inanc Inan, Feyza Keceli, Ender Ayanoglu
Performance Analysis of the IEEE 802.11e Enhanced Distributed Coordination Function using Cycle Time Approach
null
null
null
null
cs.OH
null
The recently ratified IEEE 802.11e standard defines the Enhanced Distributed Channel Access (EDCA) function for Quality-of-Service (QoS) provisioning in the Wireless Local Area Networks (WLANs). The EDCA uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and slotted Binary Exponential Backoff (BEB)...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 23:01:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Inan", "Inanc", "" ], [ "Keceli", "Feyza", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0704.1842
Inanc Inan
Feyza Keceli, Inanc Inan, Ender Ayanoglu
Fairness Provision in the IEEE 802.11e Infrastructure Basic Service Set
null
null
null
null
cs.OH
null
Most of the deployed IEEE 802.11e Wireless Local Area Networks (WLANs) use infrastructure Basic Service Set (BSS) in which an Access Point (AP) serves as a gateway between wired and wireless domains. We present the unfairness problem between the uplink and the downlink flows of any Access Category (AC) in the 802.11e...
[ { "version": "v1", "created": "Fri, 13 Apr 2007 23:11:27 GMT" }, { "version": "v2", "created": "Thu, 13 Sep 2007 15:08:17 GMT" } ]
2007-09-13T00:00:00
[ [ "Keceli", "Feyza", "" ], [ "Inan", "Inanc", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0704.1873
Yi Cao
Yi Cao and Biao Chen
An Achievable Rate Region for Interference Channels with Conferencing
5 pages, 2 figures, accepted by ISIT'07
null
null
null
cs.IT math.IT
null
In this paper, we propose an achievable rate region for discrete memoryless interference channels with conferencing at the transmitter side. We employ superposition block Markov encoding, combined with simultaneous superposition coding, dirty paper coding, and random binning to obtain the achievable rate region. We s...
[ { "version": "v1", "created": "Sat, 14 Apr 2007 15:42:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Cao", "Yi", "" ], [ "Chen", "Biao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.1886
Pedro Resende
S\'ergio Marcelino and Pedro Resende
An algebraic generalization of Kripke structures
39 pages
Math. Proc. Cambridge Philos. Soc. 145 (2008) 549-577
10.1017/S0305004108001667
null
math.LO cs.LO math.RA
null
The Kripke semantics of classical propositional normal modal logic is made algebraic via an embedding of Kripke structures into the larger class of pointed stably supported quantales. This algebraic semantics subsumes the traditional algebraic semantics based on lattices with unary operators, and it suggests natural ...
[ { "version": "v1", "created": "Sat, 14 Apr 2007 19:59:18 GMT" } ]
2009-11-13T00:00:00
[ [ "Marcelino", "Sérgio", "" ], [ "Resende", "Pedro", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory...
0704.1925
Yuanning Yu
Yuanning Yu, Athina P. Petropulu and H. Vincent Poor
Blind Identification of Distributed Antenna Systems with Multiple Carrier Frequency Offsets
To appear in the Proceedings of the 8th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki, Finland, June 17-20, 2007
null
null
null
cs.IT math.IT
null
In spatially distributed multiuser antenna systems, the received signal contains multiple carrier-frequency offsets (CFOs) arising from mismatch between the oscillators of transmitters and receivers. This results in a time-varying rotation of the data constellation, which needs to be compensated at the receiver befor...
[ { "version": "v1", "created": "Sun, 15 Apr 2007 23:58:08 GMT" } ]
2007-07-13T00:00:00
[ [ "Yu", "Yuanning", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math....
0704.2010
Juliana Bernardes
Juliana S Bernardes, Alberto Davila, Vitor Santos Costa, Gerson Zaverucha
A study of structural properties on profiles HMMs
6 pages, 7 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation: Profile hidden Markov Models (pHMMs) are a popular and very useful tool in the detection of the remote homologue protein families. Unfortunately, their performance is not always satisfactory when proteins are in the 'twilight zone'. We present HMMER-STRUCT, a model construction algorithm and tool that tri...
[ { "version": "v1", "created": "Mon, 16 Apr 2007 13:10:35 GMT" }, { "version": "v2", "created": "Thu, 11 Dec 2008 18:47:26 GMT" } ]
2008-12-11T00:00:00
[ [ "Bernardes", "Juliana S", "" ], [ "Davila", "Alberto", "" ], [ "Costa", "Vitor Santos", "" ], [ "Zaverucha", "Gerson", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (al...
0704.2014
Leandro R\^ego
Joseph Y. Halpern, Leandro C. R\^ego
Extensive Games with Possibly Unaware Players
45 pages, 3 figures, a preliminary version was presented at AAMAS06
null
null
null
cs.GT cs.MA
null
Standard game theory assumes that the structure of the game is common knowledge among players. We relax this assumption by considering extensive games where agents may be unaware of the complete structure of the game. In particular, they may not be aware of moves that they and other agents can make. We show how such ...
[ { "version": "v1", "created": "Mon, 16 Apr 2007 13:58:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Rêgo", "Leandro C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may o...
0704.2017
Giacomo Bacci
G. Bacci, M. Luise, H.V. Poor
Large System Analysis of Game-Theoretic Power Control in UWB Wireless Networks with Rake Receivers
To appear in the Proceedings of the 8th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki, Finland, June 17-20, 2007
null
10.1109/SPAWC.2007.4401311
null
cs.IT cs.GT math.IT
null
This paper studies the performance of partial-Rake (PRake) receivers in impulse-radio ultrawideband wireless networks when an energy-efficient power control scheme is adopted. Due to the large bandwidth of the system, the multipath channel is assumed to be frequency-selective. By using noncooperative game-theoretic m...
[ { "version": "v1", "created": "Mon, 16 Apr 2007 13:44:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Bacci", "G.", "" ], [ "Luise", "M.", "" ], [ "Poor", "H. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "...
0704.2083
Hassan Satori
H. Satori, M. Harti and N. Chenfour
Introduction to Arabic Speech Recognition Using CMUSphinx System
4 pages, 3 figures and 2 tables, was in Information and Communication Technologies International Symposium proceeding ICTIS07 Fes (2007)
null
null
null
cs.CL cs.AI
null
In this paper Arabic was investigated from the speech recognition problem point of view. We propose a novel approach to build an Arabic Automated Speech Recognition System (ASR). This system is based on the open source CMU Sphinx-4, from the Carnegie Mellon University. CMU Sphinx is a large-vocabulary; speaker-indepe...
[ { "version": "v1", "created": "Tue, 17 Apr 2007 01:04:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Satori", "H.", "" ], [ "Harti", "M.", "" ], [ "Chenfour", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadl...
0704.2092
Jinsong Tan
Jinsong Tan
A Note on the Inapproximability of Correlation Clustering
null
Information Processing Letters, 108: 331-335, 2008
null
null
cs.LG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider inapproximability of the correlation clustering problem defined as follows: Given a graph $G = (V,E)$ where each edge is labeled either "+" (similar) or "-" (dissimilar), correlation clustering seeks to partition the vertices into clusters so that the number of pairs correctly (resp. incorrectly) classifi...
[ { "version": "v1", "created": "Tue, 17 Apr 2007 03:52:41 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2009 03:22:02 GMT" } ]
2009-03-23T00:00:00
[ [ "Tan", "Jinsong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary catego...
End of preview. Expand in Data Studio

Dataset Card for Dataset Name

This dataset card aims to be a base template for new datasets. It has been generated using this raw template.

Dataset Details

last_update: 2024-03-19

Dataset Description

Dataset Sources [optional]

  • Repository: [More Information Needed]
  • Paper [optional]: [More Information Needed]
  • Demo [optional]: [More Information Needed]

Kaggle arvix filter by Computer Science

Uses

Direct Use

[More Information Needed]

Out-of-Scope Use

[More Information Needed]

Dataset Structure

[More Information Needed]

Dataset Creation

Curation Rationale

[More Information Needed]

Source Data

Data Collection and Processing

[More Information Needed]

Who are the source data producers?

[More Information Needed]

Annotations [optional]

Annotation process

[More Information Needed]

Who are the annotators?

[More Information Needed]

Personal and Sensitive Information

[More Information Needed]

Bias, Risks, and Limitations

[More Information Needed]

Recommendations

Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.

Citation [optional]

BibTeX:

[More Information Needed]

APA:

[More Information Needed]

Glossary [optional]

[More Information Needed]

More Information [optional]

[More Information Needed]

Dataset Card Authors [optional]

[More Information Needed]

Dataset Card Contact

[More Information Needed]

Downloads last month
11