id stringlengths 9 16 | title stringlengths 4 278 | categories stringlengths 5 104 | abstract stringlengths 6 4.09k |
|---|---|---|---|
0901.2698 | On integral probability metrics, \phi-divergences and binary
classification | cs.IT math.IT | A class of distance measures on probabilities -- the integral probability
metrics (IPMs) -- is addressed: these include the Wasserstein distance, Dudley
metric, and Maximum Mean Discrepancy. IPMs have thus far mostly been used in
more abstract settings, for instance as theoretical tools in mass
transportation problem... |
0901.2764 | Dirty Paper Coding for Fading Channels with Partial Transmitter Side
Information | cs.IT math.IT | The problem of Dirty Paper Coding (DPC) over the Fading Dirty Paper Channel
(FDPC) Y = H(X + S)+Z, a more general version of Costa's channel, is studied
for the case in which there is partial and perfect knowledge of the fading
process H at the transmitter (CSIT) and the receiver (CSIR), respectively. A
key step in t... |
0901.2768 | FRFD MIMO Systems: Precoded V-BLAST with Limited Feedback Versus
Non-orthogonal STBC MIMO | cs.IT math.IT | Full-rate (FR) and full-diversity (FD) are attractive features in MIMO
systems. We refer to systems which achieve both FR and FD simultaneously as
FRFD systems. Non-orthogonal STBCs can achieve FRFD without feedback, but their
ML decoding complexities are high. V-BLAST without precoding achieves FR but
not FD. FRFD c... |
0901.2804 | The Secrecy Capacity for a 3-Receiver Broadcast Channel with Degraded
Message Sets | cs.IT math.IT | This paper has been withdrawn by the author due to some errors.
|
0901.2838 | Analytical Solution of Covariance Evolution for Regular LDPC Codes | cs.IT math.IT | The covariance evolution is a system of differential equations with respect
to the covariance of the number of edges connecting to the nodes of each
residual degree. Solving the covariance evolution, we can derive distributions
of the number of check nodes of residual degree 1, which helps us to estimate
the block er... |
0901.2850 | On finitely recursive programs | cs.AI cs.LO | Disjunctive finitary programs are a class of logic programs admitting
function symbols and hence infinite domains. They have very good computational
properties, for example ground queries are decidable while in the general case
the stable model semantics is highly undecidable. In this paper we prove that a
larger cla... |
0901.2864 | An extension of the order bound for AG codes | math.NT cs.IT math.AG math.IT | The most successful method to obtain lower bounds for the minimum distance of
an algebraic geometric code is the order bound, which generalizes the Feng-Rao
bound. We provide a significant extension of the bound that improves the order
bounds by Beelen and by Duursma and Park. We include an exhaustive numerical
compa... |
0901.2903 | Entropy Measures vs. Algorithmic Information | cs.IT cs.CC math.IT | Algorithmic entropy and Shannon entropy are two conceptually different
information measures, as the former is based on size of programs and the later
in probability distributions. However, it is known that, for any recursive
probability distribution, the expected value of algorithmic entropy equals its
Shannon entrop... |
0901.2911 | Gibbs Free Energy Analysis of a Quantum Analog of the Classical Binary
Symmetric Channel | physics.gen-ph cond-mat.stat-mech cs.IT math.IT | The Gibbs free energy properties of a quantum {\it send, receive}
communications system are studied. The communications model resembles the
classical Ising model of spins on a lattice in that the joint state of the
quantum system is the product of sender and receiver states. However, the
system differs from the class... |
0901.2912 | Weighted $\ell_1$ Minimization for Sparse Recovery with Prior
Information | cs.IT math.IT | In this paper we study the compressed sensing problem of recovering a sparse
signal from a system of underdetermined linear equations when we have prior
information about the probability of each entry of the unknown signal being
nonzero. In particular, we focus on a model where the entries of the unknown
vector fall ... |
0901.2922 | Scheduling in Multi-hop Wireless Networks with Priorities | cs.IT math.IT | In this paper we consider prioritized maximal scheduling in multi-hop
wireless networks, where the scheduler chooses a maximal independent set
greedily according to a sequence specified by certain priorities. We show that
if the probability distributions of the priorities are properly chosen, we can
achieve the optim... |
0901.2924 | Universal Complex Structures in Written Language | physics.soc-ph cs.CL | Quantitative linguistics has provided us with a number of empirical laws that
characterise the evolution of languages and competition amongst them. In terms
of language usage, one of the most influential results is Zipf's law of word
frequencies. Zipf's law appears to be universal, and may not even be unique to
human... |
0901.2934 | Noisy DPC and Application to a Cognitive Channel | cs.IT math.IT | In this paper, we first consider a channel that is contaminated by two
independent Gaussian noises $S ~ N(0,Q)$ and $Z_0 ~ N(0,N_0)$. The capacity of
this channel is computed when independent noisy versions of $S$ are known to
the transmitter and/or receiver. It is shown that the channel capacity is
greater then the ... |
0901.2954 | An Upper Limit of AC Huffman Code Length in JPEG Compression | cs.IT cs.CC cs.CE cs.CV math.IT | A strategy for computing upper code-length limits of AC Huffman codes for an
8x8 block in JPEG Baseline coding is developed. The method is based on a
geometric interpretation of the DCT, and the calculated limits are as close as
14% to the maximum code-lengths. The proposed strategy can be adapted to other
transform ... |
0901.3017 | Statistical analysis of the Indus script using $n$-grams | cs.CL | The Indus script is one of the major undeciphered scripts of the ancient
world. The small size of the corpus, the absence of bilingual texts, and the
lack of definite knowledge of the underlying language has frustrated efforts at
decipherment since the discovery of the remains of the Indus civilisation.
Recently, som... |
0901.3056 | Factorization of Joint Probability Mass Functions into Parity Check
Interactions | cs.IT cs.DM math.IT math.PR | We show that any joint probability mass function (PMF) can be expressed as a
product of parity check factors and factors of degree one with the help of some
auxiliary variables, if the alphabet size is appropriate for defining a parity
check equation. In other words, marginalization of a joint PMF is equivalent to
a ... |
0901.3130 | Secure Communication in the Low-SNR Regime: A Characterization of the
Energy-Secrecy Tradeoff | cs.IT math.IT | Secrecy capacity of a multiple-antenna wiretap channel is studied in the low
signal-to-noise ratio (SNR) regime. Expressions for the first and second
derivatives of the secrecy capacity with respect to SNR at SNR = 0 are derived.
Transmission strategies required to achieve these derivatives are identified.
In particu... |
0901.3132 | Low-SNR Analysis of Interference Channels under Secrecy Constraints | cs.IT math.IT | In this paper, we study the secrecy rates over weak Gaussian interference
channels for different transmission schemes. We focus on the low-SNR regime and
obtain the minimum bit energy E_b/N_0_min values, and the wideband slope
regions for both TDMA and multiplexed transmission schemes. We show that
secrecy constraint... |
0901.3134 | Energy Efficiency of Fixed-Rate Wireless Transmissions under Queueing
Constraints and Channel Uncertainty | cs.IT math.IT | Energy efficiency of fixed-rate transmissions is studied in the presence of
queueing constraints and channel uncertainty. It is assumed that neither the
transmitter nor the receiver has channel side information prior to
transmission. The channel coefficients are estimated at the receiver via
minimum mean-square-error... |
0901.3150 | Matrix Completion from a Few Entries | cs.LG stat.ML | Let M be a random (alpha n) x n matrix of rank r<<n, and assume that a
uniformly random subset E of its entries is observed. We describe an efficient
algorithm that reconstructs M from |E| = O(rn) observed entries with relative
root mean square error RMSE <= C(rn/|E|)^0.5 . Further, if r=O(1), M can be
reconstructed ... |
0901.3170 | On linear balancing sets | cs.IT cs.DM math.IT | Let n be an even positive integer and F be the field \GF(2). A word in F^n is
called balanced if its Hamming weight is n/2. A subset C \subseteq F^n$ is
called a balancing set if for every word y \in F^n there is a word x \in C such
that y + x is balanced. It is shown that most linear subspaces of F^n of
dimension sl... |
0901.3192 | End-to-End Outage Minimization in OFDM Based Linear Relay Networks | cs.IT math.IT | Multi-hop relaying is an economically efficient architecture for coverage
extension and throughput enhancement in future wireless networks. OFDM, on the
other hand, is a spectrally efficient physical layer modulation technique for
broadband transmission. As a natural consequence of combining OFDM with
multi-hop relay... |
0901.3196 | Statistical Performance Analysis of MDL Source Enumeration in Array
Processing | cs.IT math.IT | In this correspondence, we focus on the performance analysis of the
widely-used minimum description length (MDL) source enumeration technique in
array processing. Unfortunately, available theoretical analysis exhibit
deviation from the simulation results. We present an accurate and insightful
performance analysis for... |
0901.3197 | A Low Density Lattice Decoder via Non-Parametric Belief Propagation | cs.IT math.IT | The recent work of Sommer, Feder and Shalvi presented a new family of codes
called low density lattice codes (LDLC) that can be decoded efficiently and
approach the capacity of the AWGN channel. A linear time iterative decoding
scheme which is based on a message-passing formulation on a factor graph is
given.
In th... |
0901.3202 | Model-Consistent Sparse Estimation through the Bootstrap | cs.LG stat.ML | We consider the least-square linear regression problem with regularization by
the $\ell^1$-norm, a problem usually referred to as the Lasso. In this paper,
we first present a detailed asymptotic analysis of model consistency of the
Lasso in low-dimensional settings. For various decays of the regularization
parameter,... |
0901.3291 | Approaching the linguistic complexity | cs.CL physics.data-an | We analyze the rank-frequency distributions of words in selected English and
Polish texts. We compare scaling properties of these distributions in both
languages. We also study a few small corpora of Polish literary texts and find
that for a corpus consisting of texts written by different authors the basic
scaling re... |
0901.3314 | Sending a Bi-Variate Gaussian over a Gaussian MAC | cs.IT math.IT | We study the power versus distortion trade-off for the distributed
transmission of a memoryless bi-variate Gaussian source over a two-to-one
average-power limited Gaussian multiple-access channel. In this problem, each
of two separate transmitters observes a different component of a memoryless
bi-variate Gaussian sou... |
0901.3403 | Distributed Compressive Sensing | cs.IT math.IT | Compressive sensing is a signal acquisition framework based on the revelation
that a small collection of linear projections of a sparse signal contains
enough information for stable recovery. In this paper we introduce a new theory
for distributed compressive sensing (DCS) that enables new distributed coding
algorith... |
0901.3408 | Limits of Deterministic Compressed Sensing Considering Arbitrary
Orthonormal Basis for Sparsity | cs.IT math.IT | It is previously shown that proper random linear samples of a finite discrete
signal (vector) which has a sparse representation in an orthonormal basis make
it possible (with probability 1) to recover the original signal. Moreover, the
choice of the linear samples does not depend on the sparsity domain. In this
paper... |
0901.3467 | Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding | cs.IT math.IT | This paper presents new FEC codes for the erasure channel, LDPC-Band, that
have been designed so as to optimize a hybrid iterative-Maximum Likelihood (ML)
decoding. Indeed, these codes feature simultaneously a sparse parity check
matrix, which allows an efficient use of iterative LDPC decoding, and a
generator matrix... |
0901.3475 | Efficient decoding algorithm using triangularity of $\mbf{R}$ matrix of
QR-decomposition | cs.IT math.IT | An efficient decoding algorithm named `divided decoder' is proposed in this
paper. Divided decoding can be combined with any decoder using QR-decomposition
and offers different pairs of performance and complexity. Divided decoding
provides various combinations of two or more different searching algorithms.
Hence it m... |
0901.3574 | Automating Access Control Logics in Simple Type Theory with LEO-II | cs.LO cs.AI | Garg and Abadi recently proved that prominent access control logics can be
translated in a sound and complete way into modal logic S4. We have previously
outlined how normal multimodal logics, including monomodal logics K and S4, can
be embedded in simple type theory (which is also known as higher-order logic)
and we... |
0901.3580 | Feedback Capacity of the Gaussian Interference Channel to Within 1.7075
Bits: the Symmetric Case | cs.IT math.IT | We characterize the symmetric capacity to within 1.7075 bits/s/Hz for the
two-user Gaussian interference channel with feedback. The result makes use of a
deterministic model to provide insights into the Gaussian channel. We derive a
new outer bound to show that a proposed achievable scheme can achieve the
symmetric c... |
0901.3585 | Resource Adaptive Agents in Interactive Theorem Proving | cs.LO cs.AI | We introduce a resource adaptive agent mechanism which supports the user in
interactive theorem proving. The mechanism uses a two layered architecture of
agent societies to suggest appropriate commands together with possible command
argument instantiations. Experiments with this approach show that its
effectiveness c... |
0901.3590 | On the Dual Formulation of Boosting Algorithms | cs.LG cs.CV | We study boosting algorithms from a new perspective. We show that the
Lagrange dual problems of AdaBoost, LogitBoost and soft-margin LPBoost with
generalized hinge loss are all entropy maximization problems. By looking at the
dual problems of these boosting algorithms, we show that the success of
boosting algorithms ... |
0901.3596 | Joint source-channel with side information coding error exponents | cs.IT math.IT | In this paper, we study the upper and the lower bounds on the joint
source-channel coding error exponent with decoder side-information. The results
in the paper are non-trivial extensions of the Csiszar's classical paper [5].
Unlike the joint source-channel coding result in [5], it is not obvious whether
the lower bo... |
0901.3608 | A remark on higher order RUE-resolution with EXTRUE | cs.AI cs.LO | We show that a prominent counterexample for the completeness of first order
RUE-resolution does not apply to the higher order RUE-resolution approach
EXTRUE.
|
0901.3630 | Decay of Correlations in Low Density Parity Check Codes: Low Noise
Regime | cs.IT math.IT | Consider transmission over a binary additive white gaussian noise channel
using a fixed low-density parity check code. We consider the posterior measure
over the code bits and the corresponding correlation between two codebits,
averaged over the noise realizations. We show that for low enough noise
variance this aver... |
0901.3751 | Sorting improves word-aligned bitmap indexes | cs.DB | Bitmap indexes must be compressed to reduce input/output costs and minimize
CPU usage. To accelerate logical operations (AND, OR, XOR) over bitmaps, we use
techniques based on run-length encoding (RLE), such as Word-Aligned Hybrid
(WAH) compression. These techniques are sensitive to the order of the rows: a
simple le... |
0901.3762 | Enhancing the capabilities of LIGO time-frequency plane searches through
clustering | gr-qc astro-ph.IM cs.CV physics.data-an | One class of gravitational wave signals LIGO is searching for consists of
short duration bursts of unknown waveforms. Potential sources include core
collapse supernovae, gamma ray burst progenitors, and mergers of binary black
holes or neutron stars. We present a density-based clustering algorithm to
improve the perf... |
0901.3769 | Deceptiveness and Neutrality - the ND family of fitness landscapes | cs.AI | When a considerable number of mutations have no effects on fitness values,
the fitness landscape is said neutral. In order to study the interplay between
neutrality, which exists in many real-world applications, and performances of
metaheuristics, it is useful to design landscapes which make it possible to
tune preci... |
0901.3795 | On a random number of disorders | math.PR cs.IT math.IT math.ST stat.TH | We register a random sequence which has the following properties: it has
three segments being the homogeneous Markov processes. Each segment has his own
one step transition probability law and the length of the segment is unknown
and random. It means that at two random successive moments (they can be equal
also and e... |
0901.3809 | Interference channel capacity region for randomized fixed-composition
codes | cs.IT math.IT | The randomized fixe-composition with optimal decoding error exponents are
studied \cite{Raul_ISIT,Raul_journal} for the finite alphabet interference
channel (IFC) with two transmitter-receiver pairs. In this paper we investigate
the capacity region of the randomized fixed-composition coding scheme. A
complete charact... |
0901.3820 | On the rate distortion function of Bernoulli Gaussian sequences | cs.IT math.IT | In this paper, we study the rate distortion function of the i.i.d sequence of
multiplications of a Bernoulli $p$ random variable and a gaussian random
variable $\sim N(0,1)$. We use a new technique in the derivation of the lower
bound in which we establish the duality between channel coding and lossy source
coding in... |
0901.3839 | Remembering what we like: Toward an agent-based model of Web traffic | cs.HC cs.CY cs.IR cs.MA physics.soc-ph | Analysis of aggregate Web traffic has shown that PageRank is a poor model of
how people actually navigate the Web. Using the empirical traffic patterns
generated by a thousand users over the course of two months, we characterize
the properties of Web traffic that cannot be reproduced by Markovian models, in
which des... |
0901.3880 | Capacity Scaling of Single-source Wireless Networks: Effect of Multiple
Antennas | cs.IT math.IT | We consider a wireless network in which a single source node located at the
center of a unit area having $m$ antennas transmits messages to $n$ randomly
located destination nodes in the same area having a single antenna each. To
achieve the sum-rate proportional to $m$ by transmit beamforming, channel state
informati... |
0901.3910 | Simulation of mitochondrial metabolism using multi-agents system | q-bio.SC cs.MA q-bio.QM | Metabolic pathways describe chains of enzymatic reactions. Their modelling is
a key point to understand living systems. An enzymatic reaction is an
interaction between one or several metabolites (substrates) and an enzyme
(simple protein or enzymatic complex build of several subunits). In our
Mitochondria in Silico P... |
0901.3923 | Model-Based Event Detection in Wireless Sensor Networks | cs.NI cs.CV | In this paper we present an application of techniques from statistical signal
processing to the problem of event detection in wireless sensor networks used
for environmental monitoring. The proposed approach uses the well-established
Principal Component Analysis (PCA) technique to build a compact model of the
observe... |
0901.3939 | Effectively Searching Maps in Web Documents | cs.DL cs.IR | Maps are an important source of information in archaeology and other
sciences. Users want to search for historical maps to determine recorded
history of the political geography of regions at different eras, to find out
where exactly archaeological artifacts were discovered, etc. Currently, they
have to use a generic ... |
0901.3948 | OFDM Channel Estimation Based on Adaptive Thresholding for Sparse Signal
Detection | cs.IT math.IT | Wireless OFDM channels can be approximated by a time varying filter with
sparse time domain taps. Recent achievements in sparse signal processing such
as compressed sensing have facilitated the use of sparsity in estimation, which
improves the performance significantly. The problem of these sparse-based
methods is th... |
0901.3950 | Efficient Sampling of Sparse Wideband Analog Signals | cs.IT math.IT | Periodic nonuniform sampling is a known method to sample spectrally sparse
signals below the Nyquist rate. This strategy relies on the implicit assumption
that the individual samplers are exposed to the entire frequency range. This
assumption becomes impractical for wideband sparse signals. The current paper
proposes... |
0901.3984 | Stop the Chase | cs.DB | The chase procedure, an algorithm proposed 25+ years ago to fix constraint
violations in database instances, has been successfully applied in a variety of
contexts, such as query optimization, data exchange, and data integration. Its
practicability, however, is limited by the fact that - for an arbitrary set of
const... |
0901.3987 | Improved Delay Estimates for a Queueing Model for Random Linear Coding
for Unicast | cs.IT math.IT | Consider a lossy communication channel for unicast with zero-delay feedback.
For this communication scenario, a simple retransmission scheme is optimum with
respect to delay. An alternative approach is to use random linear coding in
automatic repeat-request (ARQ) mode. We extend the work of Shrader and
Ephremides, by... |
0901.3990 | Du corpus au dictionnaire | cs.CL cs.IR | In this article, we propose an automatic process to build multi-lingual
lexico-semantic resources. The goal of these resources is to browse
semantically textual information contained in texts of different languages.
This method uses a mathematical model called Atlas s\'emantiques in order to
represent the different s... |
0901.4004 | Mining for adverse drug events with formal concept analysis | cs.AI | The pharmacovigilance databases consist of several case reports involving
drugs and adverse events (AEs). Some methods are applied consistently to
highlight all signals, i.e. all statistically significant associations between
a drug and an AE. These methods are appropriate for verification of more
complex relationshi... |
0901.4012 | Cross-situational and supervised learning in the emergence of
communication | cs.LG | Scenarios for the emergence or bootstrap of a lexicon involve the repeated
interaction between at least two agents who must reach a consensus on how to
name N objects using H words. Here we consider minimal models of two types of
learning algorithms: cross-situational learning, in which the individuals
determine the ... |
0901.4068 | On the Sum Capacity of A Class of Cyclically Symmetric Deterministic
Interference Channels | cs.IT math.IT | Certain deterministic interference channels have been shown to accurately
model Gaussian interference channels in the asymptotic low-noise regime.
Motivated by this correspondence, we investigate a K user-pair, cyclically
symmetric, deterministic interference channel in which each receiver
experiences interference on... |
0901.4129 | Quasi-Cyclic LDPC Codes: Influence of Proto- and Tanner-Graph Structure
on Minimum Hamming Distance Upper Bounds | cs.IT cs.DM math.IT | Quasi-cyclic (QC) low-density parity-check (LDPC) codes are an important
instance of proto-graph-based LDPC codes. In this paper we present upper bounds
on the minimum Hamming distance of QC LDPC codes and study how these upper
bounds depend on graph structure parameters (like variable degrees, check node
degrees, gi... |
0901.4134 | Distributed Lossy Averaging | cs.IT math.IT | An information theoretic formulation of the distributed averaging problem
previously studied in computer science and control is presented. We assume a
network with m nodes each observing a WGN source. The nodes communicate and
perform local processing with the goal of computing the average of the sources
to within a ... |
0901.4137 | Practical Robust Estimators for the Imprecise Dirichlet Model | math.ST cs.LG stat.ML stat.TH | Walley's Imprecise Dirichlet Model (IDM) for categorical i.i.d. data extends
the classical Dirichlet model to a set of priors. It overcomes several
fundamental problems which other approaches to uncertainty suffer from. Yet, to
be useful in practice, one needs efficient ways for computing the
imprecise=robust sets or... |
0901.4147 | Determination of Minimal Sets of Control Places for Safe Petri Nets | cs.IT math.IT | Our objective is to design a controlled system with a simple method for
discrete event systems based on Petri nets. It is possible to construct the
Petri net model of a system and the specification separately. By synchronous
composition of both models, the desired functioning closed loop model is
deduced. Often uncon... |
0901.4180 | Google distance between words | cs.CL | Cilibrasi and Vitanyi have demonstrated that it is possible to extract the
meaning of words from the world-wide web. To achieve this, they rely on the
number of webpages that are found through a Google search containing a given
word and they associate the page count to the probability that the word appears
on a webpa... |
0901.4192 | Fixing Convergence of Gaussian Belief Propagation | cs.IT cs.LG math.IT stat.CO | Gaussian belief propagation (GaBP) is an iterative message-passing algorithm
for inference in Gaussian graphical models. It is known that when GaBP
converges it converges to the correct MAP estimate of the Gaussian random
vector and simple sufficient conditions for its convergence have been
established. In this paper... |
0901.4205 | On the small weight codewords of the functional codes C_2(Q), Q a
non-singular quadric | math.AG cs.IT math.IT | We study the small weight codewords of the functional code C_2(Q), with Q a
non-singular quadric of PG(N,q). We prove that the small weight codewords
correspond to the intersections of Q with the singular quadrics of PG(N,q)
consisting of two hyperplanes. We also calculate the number of codewords having
these small w... |
0901.4224 | Geospatial semantics: beyond ontologies, towards an enactive approach | cs.AI cs.DB | Current approaches to semantics in the geospatial domain are mainly based on
ontologies, but ontologies, since continue to build entirely on the symbolic
methodology, suffers from the classical problems, e.g. the symbol grounding
problem, affecting representational theories. We claim for an enactive approach
to seman... |
0901.4267 | LR-aided MMSE lattice decoding is DMT optimal for all approximately
universal codes | cs.IT math.IT | Currently for the nt x nr MIMO channel, any explicitly constructed space-time
(ST) designs that achieve optimality with respect to the diversity multiplexing
tradeoff (DMT) are known to do so only when decoded using maximum likelihood
(ML) decoding, which may incur prohibitive decoding complexity. In this paper
we pr... |
0901.4272 | Dynamic Control of a Flow-Rack Automated Storage and Retrieval System | cs.IT math.IT | In this paper we propose a control scheme based on coloured Petri net (CPN)
for a flow-rack automated storage and retrieval system. The AS/RS is modelled
using Coloured Petri nets, the developed model has been used to capture and
provide the rack state. We introduce in the control system an optimization
module as a d... |
0901.4275 | Informative Sensing | cs.IT math.IT | Compressed sensing is a recent set of mathematical results showing that
sparse signals can be exactly reconstructed from a small number of linear
measurements. Interestingly, for ideal sparse signals with no measurement
noise, random measurements allow perfect reconstruction while measurements
based on principal comp... |
0901.4375 | Extracting Spooky-activation-at-a-distance from Considerations of
Entanglement | physics.data-an cs.CL quant-ph | Following an early claim by Nelson & McEvoy \cite{Nelson:McEvoy:2007}
suggesting that word associations can display `spooky action at a distance
behaviour', a serious investigation of the potentially quantum nature of such
associations is currently underway. This paper presents a simple quantum model
of a word associ... |
0901.4379 | Ergodic Interference Alignment | cs.IT math.IT | This paper develops a new communication strategy, ergodic interference
alignment, for the K-user interference channel with time-varying fading. At any
particular time, each receiver will see a superposition of the transmitted
signals plus noise. The standard approach to such a scenario results in each
transmitter-rec... |
0901.4420 | Some Generalizations of the Capacity Theorem for AWGN Channels | cs.IT math.IT | The channel capacity theorem for additive white Gaussian noise channel
(AWGN), widely known as the Shannon-Hartley Law, expresses the information
capacity of a channel bandlimited in the conventional Fourier domain in terms
of the signal-to-noise ratio in it. In this letter generalized versions of the
Shannon-Hartley... |
0901.4466 | Physarum boats: If plasmodium sailed it would never leave a port | cs.RO q-bio.CB | Plasmodium of \emph{Physarum polycephalum} is a single huge (visible by naked
eye) cell with myriad of nuclei. The plasmodium is a promising substrate for
non-classical, nature-inspired, computing devices. It is capable for
approximation of shortest path, computation of planar proximity graphs and
plane tessellations... |
0901.4467 | Efficient LDPC Codes over GF(q) for Lossy Data Compression | cs.IT math.IT | In this paper we consider the lossy compression of a binary symmetric source.
We present a scheme that provides a low complexity lossy compressor with near
optimal empirical performance. The proposed scheme is based on b-reduced
ultra-sparse LDPC codes over GF(q). Encoding is performed by the Reinforced
Belief Propag... |
0901.4551 | Robust Key Agreement Schemes | cs.IT math.IT | This paper considers a key agreement problem in which two parties aim to
agree on a key by exchanging messages in the presence of adversarial tampering.
The aim of the adversary is to disrupt the key agreement process, but there are
no secrecy constraints (i.e. we do not insist that the key is kept secret from
the ad... |
0901.4571 | Everyone is a Curator: Human-Assisted Preservation for ORE Aggregations | cs.DL cs.IR | The Open Archives Initiative (OAI) has recently created the Object Reuse and
Exchange (ORE) project that defines Resource Maps (ReMs) for describing
aggregations of web resources. These aggregations are susceptible to many of
the same preservation challenges that face other web resources. In this paper,
we investigat... |
0901.4591 | Network Coding-Based Protection Strategy Against Node Failures | cs.IT cs.CR cs.NI math.IT | The enormous increase in the usage of communication networks has made
protection against node and link failures essential in the deployment of
reliable networks. To prevent loss of data due to node failures, a network
protection strategy is proposed that aims to withstand such failures.
Particularly, a protection str... |
0901.4612 | Network Coding Capacity: A Functional Dependence Bound | cs.IT math.IT | Explicit characterization and computation of the multi-source network coding
capacity region (or even bounds) is long standing open problem. In fact,
finding the capacity region requires determination of the set of all entropic
vectors $\Gamma^{*}$, which is known to be an extremely hard problem. On the
other hand, c... |
0901.4648 | On The Positive Definiteness of Polarity Coincidence Correlation
Coefficient Matrix | cs.IT math.IT | Polarity coincidence correlator (PCC), when used to estimate the covariance
matrix on an element-by-element basis, may not yield a positive semi-definite
(PSD) estimate. Devlin et al. [1], claimed that element-wise PCC is not
guaranteed to be PSD in dimensions p>3 for real signals. However, no
justification or proof ... |
0901.4694 | Limit on the Addressability of Fault-Tolerant Nanowire Decoders | cs.AR cs.DM cs.IT math.IT | Although prone to fabrication error, the nanowire crossbar is a promising
candidate component for next generation nanometer-scale circuits. In the
nanowire crossbar architecture, nanowires are addressed by controlling voltages
on the mesowires. For area efficiency, we are interested in the maximum number
of nanowires... |
0901.4723 | On Algorithms Based on Joint Estimation of Currents and Contrast in
Microwave Tomography | math.NA cs.IT math.IT | This paper deals with improvements to the contrast source inversion method
which is widely used in microwave tomography. First, the method is reviewed and
weaknesses of both the criterion form and the optimization strategy are
underlined. Then, two new algorithms are proposed. Both of them are based on
the same crite... |
0901.4761 | A Knowledge Discovery Framework for Learning Task Models from User
Interactions in Intelligent Tutoring Systems | cs.AI | Domain experts should provide relevant domain knowledge to an Intelligent
Tutoring System (ITS) so that it can guide a learner during problemsolving
learning activities. However, for many ill-defined domains, the domain
knowledge is hard to define explicitly. In previous works, we showed how
sequential pattern mining... |
0901.4784 | On the Entropy of Written Spanish | cs.CL cs.IT math.IT | This paper reports on results on the entropy of the Spanish language. They
are based on an analysis of natural language for n-word symbols (n = 1 to 18),
trigrams, digrams, and characters. The results obtained in this work are based
on the analysis of twelve different literary works in Spanish, as well as a
279917 wo... |
0901.4830 | On the Relationship Between the Multi-antenna Secrecy Communications and
Cognitive Radio Communications | cs.IT math.IT | This paper studies the capacity of the multi-antenna or multiple-input
multiple-output (MIMO) secrecy channels with multiple eavesdroppers having
single/multiple antennas. It is known that the MIMO secrecy capacity is
achievable with the optimal transmit covariance matrix that maximizes the
minimum difference between... |
0901.4876 | Non-Confluent NLC Graph Grammar Inference by Compressing Disjoint
Subgraphs | cs.LG cs.DM | Grammar inference deals with determining (preferable simple) models/grammars
consistent with a set of observations. There is a large body of research on
grammar inference within the theory of formal languages. However, there is
surprisingly little known on grammar inference for graph grammars. In this
paper we take a... |
0901.4898 | Effective Delay Control in Online Network Coding | cs.IT math.IT | Motivated by streaming applications with stringent delay constraints, we
consider the design of online network coding algorithms with timely delivery
guarantees. Assuming that the sender is providing the same data to multiple
receivers over independent packet erasure channels, we focus on the case of
perfect feedback... |
0901.4934 | A historical perspective on developing foundations iInfo(TM) information
systems: iConsult(TM) and iEntertain(TM) apps using iDescribers(TM)
information integration for iOrgs(TM) information systems | cs.DC cs.DB cs.LO | Technology now at hand can integrate all kinds of digital information for
individuals, groups, and organizations so their information usefully links
together. iInfo(TM) information integration works by making connections
including examples like the following:
- A statistical connection between "being in a traffic j... |
0901.4953 | A Keygraph Classification Framework for Real-Time Object Detection | cs.CV | In this paper, we propose a new approach for keypoint-based object detection.
Traditional keypoint-based methods consist in classifying individual points and
using pose estimation to discard misclassifications. Since a single point
carries no relational features, such methods inherently restrict the usage of
structur... |
0901.4963 | How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent | cs.AI | In this paper we propose the CTS (Concious Tutoring System) technology, a
biologically plausible cognitive agent based on human brain functions.This
agent is capable of learning and remembering events and any related information
such as corresponding procedures, stimuli and their emotional valences. Our
proposed epis... |
0902.0026 | Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals | cs.IT math.IT | Wideband analog signals push contemporary analog-to-digital conversion
systems to their performance limits. In many applications, however, sampling at
the Nyquist rate is inefficient because the signals of interest contain only a
small number of significant frequencies relative to the bandlimit, although the
location... |
0902.0043 | Cut-Simulation and Impredicativity | cs.LO cs.AI | We investigate cut-elimination and cut-simulation in impredicative
(higher-order) logics. We illustrate that adding simple axioms such as Leibniz
equations to a calculus for an impredicative logic -- in our case a sequent
calculus for classical type theory -- is like adding cut. The phenomenon
equally applies to prom... |
0902.0058 | The second weight of generalized Reed-Muller codes in most cases | cs.IT math.IT | The second weight of the Generalized Reed-Muller code of order $d$ over the
finite field with $q$ elements is now known for $d <q$ and $d>(n-1)(q-1)$. In
this paper, we determine the second weight for the other values of $d$ which
are not multiple of $q-1$ plus 1. For the special case $d=a(q-1)+1$ we give an
estimate... |
0902.0133 | New Algorithms and Lower Bounds for Sequential-Access Data Compression | cs.IT math.IT | This thesis concerns sequential-access data compression, i.e., by algorithms
that read the input one or more times from beginning to end. In one chapter we
consider adaptive prefix coding, for which we must read the input character by
character, outputting each character's self-delimiting codeword before reading
the ... |
0902.0189 | The Ergodic Capacity of The MIMO Wire-Tap Channel | cs.IT math.IT | This paper has been withdrawn to provide a more rigorous proof of the
converse of Theorem 1 and Lemma 1 as well.
|
0902.0221 | Over-enhancement Reduction in Local Histogram Equalization using its
Degrees of Freedom | cs.CV cs.MM | A well-known issue of local (adaptive) histogram equalization (LHE) is
over-enhancement (i.e., generation of spurious details) in homogenous areas of
the image. In this paper, we show that the LHE problem has many solutions due
to the ambiguity in ranking pixels with the same intensity. The LHE solution
space can be ... |
0902.0271 | Asymmetric numeral systems | cs.IT cs.CR math.GM math.IT | In this paper will be presented new approach to entropy coding: family of
generalizations of standard numeral systems which are optimal for encoding
sequence of equiprobable symbols, into asymmetric numeral systems - optimal for
freely chosen probability distributions of symbols. It has some similarities to
Range Cod... |
0902.0320 | Planar Graphical Models which are Easy | cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.IT math-ph math.IT math.MP | We describe a rich family of binary variables statistical mechanics models on
a given planar graph which are equivalent to Gaussian Grassmann Graphical
models (free fermions) defined on the same graph. Calculation of the partition
function (weighted counting) for such a model is easy (of polynomial
complexity) as red... |
0902.0337 | Stability and Delay of Zero-Forcing SDMA with Limited Feedback | cs.IT math.IT | This paper addresses the stability and queueing delay of Space Division
Multiple Access (SDMA) systems with bursty traffic, where zero-forcing
beamforming enables simultaneous transmission to multiple mobiles. Computing
beamforming vectors relies on quantized channel state information (CSI)
feedback (limited feedback... |
0902.0354 | Optimum Power and Rate Allocation for Coded V-BLAST | cs.IT math.IT | An analytical framework for minimizing the outage probability of a coded
spatial multiplexing system while keeping the rate close to the capacity is
developed. Based on this framework, specific strategies of optimum power and
rate allocation for the coded V-BLAST architecture are obtained and its
performance is analy... |
0902.0392 | Tree Exploration for Bayesian RL Exploration | stat.ML cs.LG | Research in reinforcement learning has produced algorithms for optimal
decision making under uncertainty that fall within two main types. The first
employs a Bayesian framework, where optimality improves with increased
computational time. This is because the resulting planning task takes the form
of a dynamic program... |
0902.0417 | Decoding Network Codes by Message Passing | cs.IT math.IT | In this paper, we show how to construct a factor graph from a network code.
This provides a systematic framework for decoding using message passing
algorithms. The proposed message passing decoder exploits knowledge of the
underlying communications network topology to simplify decoding. For uniquely
decodeable linear... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.