id
stringlengths
9
16
title
stringlengths
4
278
categories
stringlengths
5
104
abstract
stringlengths
6
4.09k
0901.2698
On integral probability metrics, \phi-divergences and binary classification
cs.IT math.IT
A class of distance measures on probabilities -- the integral probability metrics (IPMs) -- is addressed: these include the Wasserstein distance, Dudley metric, and Maximum Mean Discrepancy. IPMs have thus far mostly been used in more abstract settings, for instance as theoretical tools in mass transportation problem...
0901.2764
Dirty Paper Coding for Fading Channels with Partial Transmitter Side Information
cs.IT math.IT
The problem of Dirty Paper Coding (DPC) over the Fading Dirty Paper Channel (FDPC) Y = H(X + S)+Z, a more general version of Costa's channel, is studied for the case in which there is partial and perfect knowledge of the fading process H at the transmitter (CSIT) and the receiver (CSIR), respectively. A key step in t...
0901.2768
FRFD MIMO Systems: Precoded V-BLAST with Limited Feedback Versus Non-orthogonal STBC MIMO
cs.IT math.IT
Full-rate (FR) and full-diversity (FD) are attractive features in MIMO systems. We refer to systems which achieve both FR and FD simultaneously as FRFD systems. Non-orthogonal STBCs can achieve FRFD without feedback, but their ML decoding complexities are high. V-BLAST without precoding achieves FR but not FD. FRFD c...
0901.2804
The Secrecy Capacity for a 3-Receiver Broadcast Channel with Degraded Message Sets
cs.IT math.IT
This paper has been withdrawn by the author due to some errors.
0901.2838
Analytical Solution of Covariance Evolution for Regular LDPC Codes
cs.IT math.IT
The covariance evolution is a system of differential equations with respect to the covariance of the number of edges connecting to the nodes of each residual degree. Solving the covariance evolution, we can derive distributions of the number of check nodes of residual degree 1, which helps us to estimate the block er...
0901.2850
On finitely recursive programs
cs.AI cs.LO
Disjunctive finitary programs are a class of logic programs admitting function symbols and hence infinite domains. They have very good computational properties, for example ground queries are decidable while in the general case the stable model semantics is highly undecidable. In this paper we prove that a larger cla...
0901.2864
An extension of the order bound for AG codes
math.NT cs.IT math.AG math.IT
The most successful method to obtain lower bounds for the minimum distance of an algebraic geometric code is the order bound, which generalizes the Feng-Rao bound. We provide a significant extension of the bound that improves the order bounds by Beelen and by Duursma and Park. We include an exhaustive numerical compa...
0901.2903
Entropy Measures vs. Algorithmic Information
cs.IT cs.CC math.IT
Algorithmic entropy and Shannon entropy are two conceptually different information measures, as the former is based on size of programs and the later in probability distributions. However, it is known that, for any recursive probability distribution, the expected value of algorithmic entropy equals its Shannon entrop...
0901.2911
Gibbs Free Energy Analysis of a Quantum Analog of the Classical Binary Symmetric Channel
physics.gen-ph cond-mat.stat-mech cs.IT math.IT
The Gibbs free energy properties of a quantum {\it send, receive} communications system are studied. The communications model resembles the classical Ising model of spins on a lattice in that the joint state of the quantum system is the product of sender and receiver states. However, the system differs from the class...
0901.2912
Weighted $\ell_1$ Minimization for Sparse Recovery with Prior Information
cs.IT math.IT
In this paper we study the compressed sensing problem of recovering a sparse signal from a system of underdetermined linear equations when we have prior information about the probability of each entry of the unknown signal being nonzero. In particular, we focus on a model where the entries of the unknown vector fall ...
0901.2922
Scheduling in Multi-hop Wireless Networks with Priorities
cs.IT math.IT
In this paper we consider prioritized maximal scheduling in multi-hop wireless networks, where the scheduler chooses a maximal independent set greedily according to a sequence specified by certain priorities. We show that if the probability distributions of the priorities are properly chosen, we can achieve the optim...
0901.2924
Universal Complex Structures in Written Language
physics.soc-ph cs.CL
Quantitative linguistics has provided us with a number of empirical laws that characterise the evolution of languages and competition amongst them. In terms of language usage, one of the most influential results is Zipf's law of word frequencies. Zipf's law appears to be universal, and may not even be unique to human...
0901.2934
Noisy DPC and Application to a Cognitive Channel
cs.IT math.IT
In this paper, we first consider a channel that is contaminated by two independent Gaussian noises $S ~ N(0,Q)$ and $Z_0 ~ N(0,N_0)$. The capacity of this channel is computed when independent noisy versions of $S$ are known to the transmitter and/or receiver. It is shown that the channel capacity is greater then the ...
0901.2954
An Upper Limit of AC Huffman Code Length in JPEG Compression
cs.IT cs.CC cs.CE cs.CV math.IT
A strategy for computing upper code-length limits of AC Huffman codes for an 8x8 block in JPEG Baseline coding is developed. The method is based on a geometric interpretation of the DCT, and the calculated limits are as close as 14% to the maximum code-lengths. The proposed strategy can be adapted to other transform ...
0901.3017
Statistical analysis of the Indus script using $n$-grams
cs.CL
The Indus script is one of the major undeciphered scripts of the ancient world. The small size of the corpus, the absence of bilingual texts, and the lack of definite knowledge of the underlying language has frustrated efforts at decipherment since the discovery of the remains of the Indus civilisation. Recently, som...
0901.3056
Factorization of Joint Probability Mass Functions into Parity Check Interactions
cs.IT cs.DM math.IT math.PR
We show that any joint probability mass function (PMF) can be expressed as a product of parity check factors and factors of degree one with the help of some auxiliary variables, if the alphabet size is appropriate for defining a parity check equation. In other words, marginalization of a joint PMF is equivalent to a ...
0901.3130
Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff
cs.IT math.IT
Secrecy capacity of a multiple-antenna wiretap channel is studied in the low signal-to-noise ratio (SNR) regime. Expressions for the first and second derivatives of the secrecy capacity with respect to SNR at SNR = 0 are derived. Transmission strategies required to achieve these derivatives are identified. In particu...
0901.3132
Low-SNR Analysis of Interference Channels under Secrecy Constraints
cs.IT math.IT
In this paper, we study the secrecy rates over weak Gaussian interference channels for different transmission schemes. We focus on the low-SNR regime and obtain the minimum bit energy E_b/N_0_min values, and the wideband slope regions for both TDMA and multiplexed transmission schemes. We show that secrecy constraint...
0901.3134
Energy Efficiency of Fixed-Rate Wireless Transmissions under Queueing Constraints and Channel Uncertainty
cs.IT math.IT
Energy efficiency of fixed-rate transmissions is studied in the presence of queueing constraints and channel uncertainty. It is assumed that neither the transmitter nor the receiver has channel side information prior to transmission. The channel coefficients are estimated at the receiver via minimum mean-square-error...
0901.3150
Matrix Completion from a Few Entries
cs.LG stat.ML
Let M be a random (alpha n) x n matrix of rank r<<n, and assume that a uniformly random subset E of its entries is observed. We describe an efficient algorithm that reconstructs M from |E| = O(rn) observed entries with relative root mean square error RMSE <= C(rn/|E|)^0.5 . Further, if r=O(1), M can be reconstructed ...
0901.3170
On linear balancing sets
cs.IT cs.DM math.IT
Let n be an even positive integer and F be the field \GF(2). A word in F^n is called balanced if its Hamming weight is n/2. A subset C \subseteq F^n$ is called a balancing set if for every word y \in F^n there is a word x \in C such that y + x is balanced. It is shown that most linear subspaces of F^n of dimension sl...
0901.3192
End-to-End Outage Minimization in OFDM Based Linear Relay Networks
cs.IT math.IT
Multi-hop relaying is an economically efficient architecture for coverage extension and throughput enhancement in future wireless networks. OFDM, on the other hand, is a spectrally efficient physical layer modulation technique for broadband transmission. As a natural consequence of combining OFDM with multi-hop relay...
0901.3196
Statistical Performance Analysis of MDL Source Enumeration in Array Processing
cs.IT math.IT
In this correspondence, we focus on the performance analysis of the widely-used minimum description length (MDL) source enumeration technique in array processing. Unfortunately, available theoretical analysis exhibit deviation from the simulation results. We present an accurate and insightful performance analysis for...
0901.3197
A Low Density Lattice Decoder via Non-Parametric Belief Propagation
cs.IT math.IT
The recent work of Sommer, Feder and Shalvi presented a new family of codes called low density lattice codes (LDLC) that can be decoded efficiently and approach the capacity of the AWGN channel. A linear time iterative decoding scheme which is based on a message-passing formulation on a factor graph is given. In th...
0901.3202
Model-Consistent Sparse Estimation through the Bootstrap
cs.LG stat.ML
We consider the least-square linear regression problem with regularization by the $\ell^1$-norm, a problem usually referred to as the Lasso. In this paper, we first present a detailed asymptotic analysis of model consistency of the Lasso in low-dimensional settings. For various decays of the regularization parameter,...
0901.3291
Approaching the linguistic complexity
cs.CL physics.data-an
We analyze the rank-frequency distributions of words in selected English and Polish texts. We compare scaling properties of these distributions in both languages. We also study a few small corpora of Polish literary texts and find that for a corpus consisting of texts written by different authors the basic scaling re...
0901.3314
Sending a Bi-Variate Gaussian over a Gaussian MAC
cs.IT math.IT
We study the power versus distortion trade-off for the distributed transmission of a memoryless bi-variate Gaussian source over a two-to-one average-power limited Gaussian multiple-access channel. In this problem, each of two separate transmitters observes a different component of a memoryless bi-variate Gaussian sou...
0901.3403
Distributed Compressive Sensing
cs.IT math.IT
Compressive sensing is a signal acquisition framework based on the revelation that a small collection of linear projections of a sparse signal contains enough information for stable recovery. In this paper we introduce a new theory for distributed compressive sensing (DCS) that enables new distributed coding algorith...
0901.3408
Limits of Deterministic Compressed Sensing Considering Arbitrary Orthonormal Basis for Sparsity
cs.IT math.IT
It is previously shown that proper random linear samples of a finite discrete signal (vector) which has a sparse representation in an orthonormal basis make it possible (with probability 1) to recover the original signal. Moreover, the choice of the linear samples does not depend on the sparsity domain. In this paper...
0901.3467
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding
cs.IT math.IT
This paper presents new FEC codes for the erasure channel, LDPC-Band, that have been designed so as to optimize a hybrid iterative-Maximum Likelihood (ML) decoding. Indeed, these codes feature simultaneously a sparse parity check matrix, which allows an efficient use of iterative LDPC decoding, and a generator matrix...
0901.3475
Efficient decoding algorithm using triangularity of $\mbf{R}$ matrix of QR-decomposition
cs.IT math.IT
An efficient decoding algorithm named `divided decoder' is proposed in this paper. Divided decoding can be combined with any decoder using QR-decomposition and offers different pairs of performance and complexity. Divided decoding provides various combinations of two or more different searching algorithms. Hence it m...
0901.3574
Automating Access Control Logics in Simple Type Theory with LEO-II
cs.LO cs.AI
Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory (which is also known as higher-order logic) and we...
0901.3580
Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case
cs.IT math.IT
We characterize the symmetric capacity to within 1.7075 bits/s/Hz for the two-user Gaussian interference channel with feedback. The result makes use of a deterministic model to provide insights into the Gaussian channel. We derive a new outer bound to show that a proposed achievable scheme can achieve the symmetric c...
0901.3585
Resource Adaptive Agents in Interactive Theorem Proving
cs.LO cs.AI
We introduce a resource adaptive agent mechanism which supports the user in interactive theorem proving. The mechanism uses a two layered architecture of agent societies to suggest appropriate commands together with possible command argument instantiations. Experiments with this approach show that its effectiveness c...
0901.3590
On the Dual Formulation of Boosting Algorithms
cs.LG cs.CV
We study boosting algorithms from a new perspective. We show that the Lagrange dual problems of AdaBoost, LogitBoost and soft-margin LPBoost with generalized hinge loss are all entropy maximization problems. By looking at the dual problems of these boosting algorithms, we show that the success of boosting algorithms ...
0901.3596
Joint source-channel with side information coding error exponents
cs.IT math.IT
In this paper, we study the upper and the lower bounds on the joint source-channel coding error exponent with decoder side-information. The results in the paper are non-trivial extensions of the Csiszar's classical paper [5]. Unlike the joint source-channel coding result in [5], it is not obvious whether the lower bo...
0901.3608
A remark on higher order RUE-resolution with EXTRUE
cs.AI cs.LO
We show that a prominent counterexample for the completeness of first order RUE-resolution does not apply to the higher order RUE-resolution approach EXTRUE.
0901.3630
Decay of Correlations in Low Density Parity Check Codes: Low Noise Regime
cs.IT math.IT
Consider transmission over a binary additive white gaussian noise channel using a fixed low-density parity check code. We consider the posterior measure over the code bits and the corresponding correlation between two codebits, averaged over the noise realizations. We show that for low enough noise variance this aver...
0901.3751
Sorting improves word-aligned bitmap indexes
cs.DB
Bitmap indexes must be compressed to reduce input/output costs and minimize CPU usage. To accelerate logical operations (AND, OR, XOR) over bitmaps, we use techniques based on run-length encoding (RLE), such as Word-Aligned Hybrid (WAH) compression. These techniques are sensitive to the order of the rows: a simple le...
0901.3762
Enhancing the capabilities of LIGO time-frequency plane searches through clustering
gr-qc astro-ph.IM cs.CV physics.data-an
One class of gravitational wave signals LIGO is searching for consists of short duration bursts of unknown waveforms. Potential sources include core collapse supernovae, gamma ray burst progenitors, and mergers of binary black holes or neutron stars. We present a density-based clustering algorithm to improve the perf...
0901.3769
Deceptiveness and Neutrality - the ND family of fitness landscapes
cs.AI
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists in many real-world applications, and performances of metaheuristics, it is useful to design landscapes which make it possible to tune preci...
0901.3795
On a random number of disorders
math.PR cs.IT math.IT math.ST stat.TH
We register a random sequence which has the following properties: it has three segments being the homogeneous Markov processes. Each segment has his own one step transition probability law and the length of the segment is unknown and random. It means that at two random successive moments (they can be equal also and e...
0901.3809
Interference channel capacity region for randomized fixed-composition codes
cs.IT math.IT
The randomized fixe-composition with optimal decoding error exponents are studied \cite{Raul_ISIT,Raul_journal} for the finite alphabet interference channel (IFC) with two transmitter-receiver pairs. In this paper we investigate the capacity region of the randomized fixed-composition coding scheme. A complete charact...
0901.3820
On the rate distortion function of Bernoulli Gaussian sequences
cs.IT math.IT
In this paper, we study the rate distortion function of the i.i.d sequence of multiplications of a Bernoulli $p$ random variable and a gaussian random variable $\sim N(0,1)$. We use a new technique in the derivation of the lower bound in which we establish the duality between channel coding and lossy source coding in...
0901.3839
Remembering what we like: Toward an agent-based model of Web traffic
cs.HC cs.CY cs.IR cs.MA physics.soc-ph
Analysis of aggregate Web traffic has shown that PageRank is a poor model of how people actually navigate the Web. Using the empirical traffic patterns generated by a thousand users over the course of two months, we characterize the properties of Web traffic that cannot be reproduced by Markovian models, in which des...
0901.3880
Capacity Scaling of Single-source Wireless Networks: Effect of Multiple Antennas
cs.IT math.IT
We consider a wireless network in which a single source node located at the center of a unit area having $m$ antennas transmits messages to $n$ randomly located destination nodes in the same area having a single antenna each. To achieve the sum-rate proportional to $m$ by transmit beamforming, channel state informati...
0901.3910
Simulation of mitochondrial metabolism using multi-agents system
q-bio.SC cs.MA q-bio.QM
Metabolic pathways describe chains of enzymatic reactions. Their modelling is a key point to understand living systems. An enzymatic reaction is an interaction between one or several metabolites (substrates) and an enzyme (simple protein or enzymatic complex build of several subunits). In our Mitochondria in Silico P...
0901.3923
Model-Based Event Detection in Wireless Sensor Networks
cs.NI cs.CV
In this paper we present an application of techniques from statistical signal processing to the problem of event detection in wireless sensor networks used for environmental monitoring. The proposed approach uses the well-established Principal Component Analysis (PCA) technique to build a compact model of the observe...
0901.3939
Effectively Searching Maps in Web Documents
cs.DL cs.IR
Maps are an important source of information in archaeology and other sciences. Users want to search for historical maps to determine recorded history of the political geography of regions at different eras, to find out where exactly archaeological artifacts were discovered, etc. Currently, they have to use a generic ...
0901.3948
OFDM Channel Estimation Based on Adaptive Thresholding for Sparse Signal Detection
cs.IT math.IT
Wireless OFDM channels can be approximated by a time varying filter with sparse time domain taps. Recent achievements in sparse signal processing such as compressed sensing have facilitated the use of sparsity in estimation, which improves the performance significantly. The problem of these sparse-based methods is th...
0901.3950
Efficient Sampling of Sparse Wideband Analog Signals
cs.IT math.IT
Periodic nonuniform sampling is a known method to sample spectrally sparse signals below the Nyquist rate. This strategy relies on the implicit assumption that the individual samplers are exposed to the entire frequency range. This assumption becomes impractical for wideband sparse signals. The current paper proposes...
0901.3984
Stop the Chase
cs.DB
The chase procedure, an algorithm proposed 25+ years ago to fix constraint violations in database instances, has been successfully applied in a variety of contexts, such as query optimization, data exchange, and data integration. Its practicability, however, is limited by the fact that - for an arbitrary set of const...
0901.3987
Improved Delay Estimates for a Queueing Model for Random Linear Coding for Unicast
cs.IT math.IT
Consider a lossy communication channel for unicast with zero-delay feedback. For this communication scenario, a simple retransmission scheme is optimum with respect to delay. An alternative approach is to use random linear coding in automatic repeat-request (ARQ) mode. We extend the work of Shrader and Ephremides, by...
0901.3990
Du corpus au dictionnaire
cs.CL cs.IR
In this article, we propose an automatic process to build multi-lingual lexico-semantic resources. The goal of these resources is to browse semantically textual information contained in texts of different languages. This method uses a mathematical model called Atlas s\'emantiques in order to represent the different s...
0901.4004
Mining for adverse drug events with formal concept analysis
cs.AI
The pharmacovigilance databases consist of several case reports involving drugs and adverse events (AEs). Some methods are applied consistently to highlight all signals, i.e. all statistically significant associations between a drug and an AE. These methods are appropriate for verification of more complex relationshi...
0901.4012
Cross-situational and supervised learning in the emergence of communication
cs.LG
Scenarios for the emergence or bootstrap of a lexicon involve the repeated interaction between at least two agents who must reach a consensus on how to name N objects using H words. Here we consider minimal models of two types of learning algorithms: cross-situational learning, in which the individuals determine the ...
0901.4068
On the Sum Capacity of A Class of Cyclically Symmetric Deterministic Interference Channels
cs.IT math.IT
Certain deterministic interference channels have been shown to accurately model Gaussian interference channels in the asymptotic low-noise regime. Motivated by this correspondence, we investigate a K user-pair, cyclically symmetric, deterministic interference channel in which each receiver experiences interference on...
0901.4129
Quasi-Cyclic LDPC Codes: Influence of Proto- and Tanner-Graph Structure on Minimum Hamming Distance Upper Bounds
cs.IT cs.DM math.IT
Quasi-cyclic (QC) low-density parity-check (LDPC) codes are an important instance of proto-graph-based LDPC codes. In this paper we present upper bounds on the minimum Hamming distance of QC LDPC codes and study how these upper bounds depend on graph structure parameters (like variable degrees, check node degrees, gi...
0901.4134
Distributed Lossy Averaging
cs.IT math.IT
An information theoretic formulation of the distributed averaging problem previously studied in computer science and control is presented. We assume a network with m nodes each observing a WGN source. The nodes communicate and perform local processing with the goal of computing the average of the sources to within a ...
0901.4137
Practical Robust Estimators for the Imprecise Dirichlet Model
math.ST cs.LG stat.ML stat.TH
Walley's Imprecise Dirichlet Model (IDM) for categorical i.i.d. data extends the classical Dirichlet model to a set of priors. It overcomes several fundamental problems which other approaches to uncertainty suffer from. Yet, to be useful in practice, one needs efficient ways for computing the imprecise=robust sets or...
0901.4147
Determination of Minimal Sets of Control Places for Safe Petri Nets
cs.IT math.IT
Our objective is to design a controlled system with a simple method for discrete event systems based on Petri nets. It is possible to construct the Petri net model of a system and the specification separately. By synchronous composition of both models, the desired functioning closed loop model is deduced. Often uncon...
0901.4180
Google distance between words
cs.CL
Cilibrasi and Vitanyi have demonstrated that it is possible to extract the meaning of words from the world-wide web. To achieve this, they rely on the number of webpages that are found through a Google search containing a given word and they associate the page count to the probability that the word appears on a webpa...
0901.4192
Fixing Convergence of Gaussian Belief Propagation
cs.IT cs.LG math.IT stat.CO
Gaussian belief propagation (GaBP) is an iterative message-passing algorithm for inference in Gaussian graphical models. It is known that when GaBP converges it converges to the correct MAP estimate of the Gaussian random vector and simple sufficient conditions for its convergence have been established. In this paper...
0901.4205
On the small weight codewords of the functional codes C_2(Q), Q a non-singular quadric
math.AG cs.IT math.IT
We study the small weight codewords of the functional code C_2(Q), with Q a non-singular quadric of PG(N,q). We prove that the small weight codewords correspond to the intersections of Q with the singular quadrics of PG(N,q) consisting of two hyperplanes. We also calculate the number of codewords having these small w...
0901.4224
Geospatial semantics: beyond ontologies, towards an enactive approach
cs.AI cs.DB
Current approaches to semantics in the geospatial domain are mainly based on ontologies, but ontologies, since continue to build entirely on the symbolic methodology, suffers from the classical problems, e.g. the symbol grounding problem, affecting representational theories. We claim for an enactive approach to seman...
0901.4267
LR-aided MMSE lattice decoding is DMT optimal for all approximately universal codes
cs.IT math.IT
Currently for the nt x nr MIMO channel, any explicitly constructed space-time (ST) designs that achieve optimality with respect to the diversity multiplexing tradeoff (DMT) are known to do so only when decoded using maximum likelihood (ML) decoding, which may incur prohibitive decoding complexity. In this paper we pr...
0901.4272
Dynamic Control of a Flow-Rack Automated Storage and Retrieval System
cs.IT math.IT
In this paper we propose a control scheme based on coloured Petri net (CPN) for a flow-rack automated storage and retrieval system. The AS/RS is modelled using Coloured Petri nets, the developed model has been used to capture and provide the rack state. We introduce in the control system an optimization module as a d...
0901.4275
Informative Sensing
cs.IT math.IT
Compressed sensing is a recent set of mathematical results showing that sparse signals can be exactly reconstructed from a small number of linear measurements. Interestingly, for ideal sparse signals with no measurement noise, random measurements allow perfect reconstruction while measurements based on principal comp...
0901.4375
Extracting Spooky-activation-at-a-distance from Considerations of Entanglement
physics.data-an cs.CL quant-ph
Following an early claim by Nelson & McEvoy \cite{Nelson:McEvoy:2007} suggesting that word associations can display `spooky action at a distance behaviour', a serious investigation of the potentially quantum nature of such associations is currently underway. This paper presents a simple quantum model of a word associ...
0901.4379
Ergodic Interference Alignment
cs.IT math.IT
This paper develops a new communication strategy, ergodic interference alignment, for the K-user interference channel with time-varying fading. At any particular time, each receiver will see a superposition of the transmitted signals plus noise. The standard approach to such a scenario results in each transmitter-rec...
0901.4420
Some Generalizations of the Capacity Theorem for AWGN Channels
cs.IT math.IT
The channel capacity theorem for additive white Gaussian noise channel (AWGN), widely known as the Shannon-Hartley Law, expresses the information capacity of a channel bandlimited in the conventional Fourier domain in terms of the signal-to-noise ratio in it. In this letter generalized versions of the Shannon-Hartley...
0901.4466
Physarum boats: If plasmodium sailed it would never leave a port
cs.RO q-bio.CB
Plasmodium of \emph{Physarum polycephalum} is a single huge (visible by naked eye) cell with myriad of nuclei. The plasmodium is a promising substrate for non-classical, nature-inspired, computing devices. It is capable for approximation of shortest path, computation of planar proximity graphs and plane tessellations...
0901.4467
Efficient LDPC Codes over GF(q) for Lossy Data Compression
cs.IT math.IT
In this paper we consider the lossy compression of a binary symmetric source. We present a scheme that provides a low complexity lossy compressor with near optimal empirical performance. The proposed scheme is based on b-reduced ultra-sparse LDPC codes over GF(q). Encoding is performed by the Reinforced Belief Propag...
0901.4551
Robust Key Agreement Schemes
cs.IT math.IT
This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the key is kept secret from the ad...
0901.4571
Everyone is a Curator: Human-Assisted Preservation for ORE Aggregations
cs.DL cs.IR
The Open Archives Initiative (OAI) has recently created the Object Reuse and Exchange (ORE) project that defines Resource Maps (ReMs) for describing aggregations of web resources. These aggregations are susceptible to many of the same preservation challenges that face other web resources. In this paper, we investigat...
0901.4591
Network Coding-Based Protection Strategy Against Node Failures
cs.IT cs.CR cs.NI math.IT
The enormous increase in the usage of communication networks has made protection against node and link failures essential in the deployment of reliable networks. To prevent loss of data due to node failures, a network protection strategy is proposed that aims to withstand such failures. Particularly, a protection str...
0901.4612
Network Coding Capacity: A Functional Dependence Bound
cs.IT math.IT
Explicit characterization and computation of the multi-source network coding capacity region (or even bounds) is long standing open problem. In fact, finding the capacity region requires determination of the set of all entropic vectors $\Gamma^{*}$, which is known to be an extremely hard problem. On the other hand, c...
0901.4648
On The Positive Definiteness of Polarity Coincidence Correlation Coefficient Matrix
cs.IT math.IT
Polarity coincidence correlator (PCC), when used to estimate the covariance matrix on an element-by-element basis, may not yield a positive semi-definite (PSD) estimate. Devlin et al. [1], claimed that element-wise PCC is not guaranteed to be PSD in dimensions p>3 for real signals. However, no justification or proof ...
0901.4694
Limit on the Addressability of Fault-Tolerant Nanowire Decoders
cs.AR cs.DM cs.IT math.IT
Although prone to fabrication error, the nanowire crossbar is a promising candidate component for next generation nanometer-scale circuits. In the nanowire crossbar architecture, nanowires are addressed by controlling voltages on the mesowires. For area efficiency, we are interested in the maximum number of nanowires...
0901.4723
On Algorithms Based on Joint Estimation of Currents and Contrast in Microwave Tomography
math.NA cs.IT math.IT
This paper deals with improvements to the contrast source inversion method which is widely used in microwave tomography. First, the method is reviewed and weaknesses of both the criterion form and the optimization strategy are underlined. Then, two new algorithms are proposed. Both of them are based on the same crite...
0901.4761
A Knowledge Discovery Framework for Learning Task Models from User Interactions in Intelligent Tutoring Systems
cs.AI
Domain experts should provide relevant domain knowledge to an Intelligent Tutoring System (ITS) so that it can guide a learner during problemsolving learning activities. However, for many ill-defined domains, the domain knowledge is hard to define explicitly. In previous works, we showed how sequential pattern mining...
0901.4784
On the Entropy of Written Spanish
cs.CL cs.IT math.IT
This paper reports on results on the entropy of the Spanish language. They are based on an analysis of natural language for n-word symbols (n = 1 to 18), trigrams, digrams, and characters. The results obtained in this work are based on the analysis of twelve different literary works in Spanish, as well as a 279917 wo...
0901.4830
On the Relationship Between the Multi-antenna Secrecy Communications and Cognitive Radio Communications
cs.IT math.IT
This paper studies the capacity of the multi-antenna or multiple-input multiple-output (MIMO) secrecy channels with multiple eavesdroppers having single/multiple antennas. It is known that the MIMO secrecy capacity is achievable with the optimal transmit covariance matrix that maximizes the minimum difference between...
0901.4876
Non-Confluent NLC Graph Grammar Inference by Compressing Disjoint Subgraphs
cs.LG cs.DM
Grammar inference deals with determining (preferable simple) models/grammars consistent with a set of observations. There is a large body of research on grammar inference within the theory of formal languages. However, there is surprisingly little known on grammar inference for graph grammars. In this paper we take a...
0901.4898
Effective Delay Control in Online Network Coding
cs.IT math.IT
Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that the sender is providing the same data to multiple receivers over independent packet erasure channels, we focus on the case of perfect feedback...
0901.4934
A historical perspective on developing foundations iInfo(TM) information systems: iConsult(TM) and iEntertain(TM) apps using iDescribers(TM) information integration for iOrgs(TM) information systems
cs.DC cs.DB cs.LO
Technology now at hand can integrate all kinds of digital information for individuals, groups, and organizations so their information usefully links together. iInfo(TM) information integration works by making connections including examples like the following: - A statistical connection between "being in a traffic j...
0901.4953
A Keygraph Classification Framework for Real-Time Object Detection
cs.CV
In this paper, we propose a new approach for keypoint-based object detection. Traditional keypoint-based methods consist in classifying individual points and using pose estimation to discard misclassifications. Since a single point carries no relational features, such methods inherently restrict the usage of structur...
0901.4963
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
cs.AI
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning and remembering events and any related information such as corresponding procedures, stimuli and their emotional valences. Our proposed epis...
0902.0026
Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals
cs.IT math.IT
Wideband analog signals push contemporary analog-to-digital conversion systems to their performance limits. In many applications, however, sampling at the Nyquist rate is inefficient because the signals of interest contain only a small number of significant frequencies relative to the bandlimit, although the location...
0902.0043
Cut-Simulation and Impredicativity
cs.LO cs.AI
We investigate cut-elimination and cut-simulation in impredicative (higher-order) logics. We illustrate that adding simple axioms such as Leibniz equations to a calculus for an impredicative logic -- in our case a sequent calculus for classical type theory -- is like adding cut. The phenomenon equally applies to prom...
0902.0058
The second weight of generalized Reed-Muller codes in most cases
cs.IT math.IT
The second weight of the Generalized Reed-Muller code of order $d$ over the finite field with $q$ elements is now known for $d <q$ and $d>(n-1)(q-1)$. In this paper, we determine the second weight for the other values of $d$ which are not multiple of $q-1$ plus 1. For the special case $d=a(q-1)+1$ we give an estimate...
0902.0133
New Algorithms and Lower Bounds for Sequential-Access Data Compression
cs.IT math.IT
This thesis concerns sequential-access data compression, i.e., by algorithms that read the input one or more times from beginning to end. In one chapter we consider adaptive prefix coding, for which we must read the input character by character, outputting each character's self-delimiting codeword before reading the ...
0902.0189
The Ergodic Capacity of The MIMO Wire-Tap Channel
cs.IT math.IT
This paper has been withdrawn to provide a more rigorous proof of the converse of Theorem 1 and Lemma 1 as well.
0902.0221
Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom
cs.CV cs.MM
A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement (i.e., generation of spurious details) in homogenous areas of the image. In this paper, we show that the LHE problem has many solutions due to the ambiguity in ranking pixels with the same intensity. The LHE solution space can be ...
0902.0271
Asymmetric numeral systems
cs.IT cs.CR math.GM math.IT
In this paper will be presented new approach to entropy coding: family of generalizations of standard numeral systems which are optimal for encoding sequence of equiprobable symbols, into asymmetric numeral systems - optimal for freely chosen probability distributions of symbols. It has some similarities to Range Cod...
0902.0320
Planar Graphical Models which are Easy
cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.IT math-ph math.IT math.MP
We describe a rich family of binary variables statistical mechanics models on a given planar graph which are equivalent to Gaussian Grassmann Graphical models (free fermions) defined on the same graph. Calculation of the partition function (weighted counting) for such a model is easy (of polynomial complexity) as red...
0902.0337
Stability and Delay of Zero-Forcing SDMA with Limited Feedback
cs.IT math.IT
This paper addresses the stability and queueing delay of Space Division Multiple Access (SDMA) systems with bursty traffic, where zero-forcing beamforming enables simultaneous transmission to multiple mobiles. Computing beamforming vectors relies on quantized channel state information (CSI) feedback (limited feedback...
0902.0354
Optimum Power and Rate Allocation for Coded V-BLAST
cs.IT math.IT
An analytical framework for minimizing the outage probability of a coded spatial multiplexing system while keeping the rate close to the capacity is developed. Based on this framework, specific strategies of optimum power and rate allocation for the coded V-BLAST architecture are obtained and its performance is analy...
0902.0392
Tree Exploration for Bayesian RL Exploration
stat.ML cs.LG
Research in reinforcement learning has produced algorithms for optimal decision making under uncertainty that fall within two main types. The first employs a Bayesian framework, where optimality improves with increased computational time. This is because the resulting planning task takes the form of a dynamic program...
0902.0417
Decoding Network Codes by Message Passing
cs.IT math.IT
In this paper, we show how to construct a factor graph from a network code. This provides a systematic framework for decoding using message passing algorithms. The proposed message passing decoder exploits knowledge of the underlying communications network topology to simplify decoding. For uniquely decodeable linear...