id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
math/0701801 | Frederic Dambreville | Frederic Dambreville (DGA/CTA/DT/GIP) | Deterministic modal Bayesian Logic: derive the Bayesian inference within
the modal logic T | Second revision of: Definition of a Deterministic Bayesian Logic | null | null | null | math.LO cs.LO math.PR | null | In this paper a conditional logic is defined and studied. This conditional
logic, DmBL, is constructed as a deterministic counterpart to the Bayesian
conditional. The logic is unrestricted, so that any logical operations are
allowed. A notion of logical independence is also defined within the logic
itself. This logic is shown to be non-trivial and is not reduced to classical
propositions. A model is constructed for the logic. Completeness results are
proved. It is shown that any unconditioned probability can be extended to the
whole logic DmBL. The Bayesian conditional is then recovered from the
probabilistic DmBL. At last, it is shown why DmBL is compliant with Lewis'
triviality.
| [
{
"version": "v1",
"created": "Sun, 28 Jan 2007 08:57:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/CTA/DT/GIP"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0701904 | Jason Teutsch | Jason Teutsch | Noncomputable Spectral Sets | PhD thesis, 101 pages | null | null | null | math.LO cs.LO | null | It is possible to enumerate all computer programs. In particular, for every
partial computable function, there is a shortest program which computes that
function. f-MIN is the set of indices for shortest programs. In 1972, Meyer
showed that f-MIN is Turing equivalent to 0'', the halting set with halting set
oracle.
This paper generalizes the notion of shortest programs, and we use various
measures from computability theory to describe the complexity of the resulting
"spectral sets." We show that under certain Godel numberings, the spectral sets
are exactly the canonical sets 0', 0'', 0''', ... up to Turing equivalence.
This is probably not true in general, however we show that spectral sets always
contain some useful information. We show that immunity, or "thinness" is a
useful characteristic for distinguishing between spectral sets.
In the final chapter, we construct a set which neither contains nor is
disjoint from any infinite arithmetic set, yet it is 0-majorized and contains a
natural spectral set. Thus a pathological set becomes a bit more friendly.
Finally, a number of interesting open problems are left for the inspired
reader.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 02:38:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Teutsch",
"Jason",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0702109 | Mathilde Bouvel | Mathilde Bouvel (LIAFA), Dominique Rossin (LIAFA), Stephane Vialette
(LRI) | Longest Common Separable Pattern between Permutations | 15 pages | Combinatorial Pattern Matching (CPM) 2007 (2007) 00 | null | null | math.CO cs.CC | null | In this article, we study the problem of finding the longest common separable
pattern between several permutations. We give a polynomial-time algorithm when
the number of input permutations is fixed and show that the problem is NP-hard
for an arbitrary number of input permutations even if these permutations are
separable. On the other hand, we show that the NP-hard problem of finding the
longest common pattern between two permutations cannot be approximated better
than within a ratio of $sqrt{Opt}$ (where $Opt$ is the size of an optimal
solution) when taking common patterns belonging to pattern-avoiding classes of
permutations.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 16:30:35 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Bouvel",
"Mathilde",
"",
"LIAFA"
],
[
"Rossin",
"Dominique",
"",
"LIAFA"
],
[
"Vialette",
"Stephane",
"",
"LRI"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0702116 | Kevin Chu | Kevin T. Chu | A Direct Matrix Method for Computing Analytical Jacobians of Discretized
Nonlinear Integro-differential Equations | 29 pages, 5 figures, educational | null | 10.1016/j.jcp.2009.04.031 | null | math.NA cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this pedagogical article, we present a simple direct matrix method for
analytically computing the Jacobian of nonlinear algebraic equations that arise
from the discretization of nonlinear integro-differential equations. The method
is based on a formulation of the discretized equations in vector form using
only matrix-vector products and component-wise operations. By applying simple
matrix-based differentiation rules, the matrix form of the analytical Jacobian
can be calculated with little more difficulty than that required when computing
derivatives in single-variable calculus. After describing the direct matrix
method, we present numerical experiments demonstrating the computational
performance of the method, discuss its connection to the Newton-Kantorovich
method, and apply it to illustrative 1D and 2D example problems. MATLAB code is
provided to demonstrate the low code complexity required by the method.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 19:03:57 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Dec 2008 21:33:47 GMT"
}
] | 2009-05-26T00:00:00 | [
[
"Chu",
"Kevin T.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
math/0702129 | Audrey Lee | Audrey Lee and Ileana Streinu | Pebble Game Algorithms and Sparse Graphs | 20 pages, abstract presented at EuroComb '05 | null | null | UMass Amherst Computer Science Department TR 07-02 | math.CO cs.CG | null | A multi-graph $G$ on $n$ vertices is $(k,\ell)$-sparse if every subset of
$n'\leq n$ vertices spans at most $kn'- \ell$ edges. $G$ is {\em tight} if, in
addition, it has exactly $kn - \ell$ edges. For integer values $k$ and $\ell
\in [0, 2k)$, we characterize the $(k,\ell)$-sparse graphs via a family of
simple, elegant and efficient algorithms called the $(k,\ell)$-pebble games.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 01:18:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Audrey",
""
],
[
"Streinu",
"Ileana",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0702239 | David Bremner | David Bremner, Mathieu Dutour Sikiric, Achill Schuermann | Polyhedral representation conversion up to symmetries | 25 pages, 9 figures; second version with some minor corrections, esp.
to Section 7 | CRM Proceedings & Lecture Notes 48, AMS, 2009, pp. 45-71 | null | null | math.MG cs.CG | null | We give a short survey on computational techniques which can be used to solve
the representation conversion problem for polyhedra up to symmetries. We in
particular discuss decomposition methods, which reduce the problem to a number
of lower dimensional subproblems. These methods have been successfully used by
different authors in special contexts. Moreover, we sketch an incremental
method, which is a generalization of Fourier-Motzkin elimination, and we give
some ideas how symmetry can be exploited using pivots.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 01:33:42 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Sep 2007 06:32:58 GMT"
}
] | 2011-10-20T00:00:00 | [
[
"Bremner",
"David",
""
],
[
"Sikiric",
"Mathieu Dutour",
""
],
[
"Schuermann",
"Achill",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0702301 | Martin Wainwright | Martin J. Wainwright | Information-theoretic limits on sparsity recovery in the
high-dimensional and noisy setting | Appeared as Technical Report 725, Department of Statistics, UC
Berkeley January 2007 | null | null | null | math.ST cs.IT math.IT stat.TH | null | The problem of recovering the sparsity pattern of a fixed but unknown vector
$\beta^* \in \real^p based on a set of $n$ noisy observations arises in a
variety of settings, including subset selection in regression, graphical model
selection, signal denoising, compressive sensing, and constructive
approximation. Of interest are conditions on the model dimension $p$, the
sparsity index $s$ (number of non-zero entries in $\beta^*$), and the number of
observations $n$ that are necessary and/or sufficient to ensure asymptotically
perfect recovery of the sparsity pattern. This paper focuses on the
information-theoretic limits of sparsity recovery: in particular, for a noisy
linear observation model based on measurement vectors drawn from the standard
Gaussian ensemble, we derive both a set of sufficient conditions for
asymptotically perfect recovery using the optimal decoder, as well as a set of
necessary conditions that any decoder, regardless of its computational
complexity, must satisfy for perfect recovery. This analysis of optimal
decoding limits complements our previous work (ARXIV: math.ST/0605740) on sharp
thresholds for sparsity recovery using the Lasso ($\ell_1$-constrained
quadratic programming) with Gaussian measurement ensembles.
| [
{
"version": "v1",
"created": "Sun, 11 Feb 2007 08:06:44 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Feb 2007 06:47:11 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0702325 | Oskar Sandberg | Oskar Sandberg | Neighbor selection and hitting probability in small-world graphs | Published in at http://dx.doi.org/10.1214/07-AAP499 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2008, Vol. 18, No. 5, 1771-1793 | 10.1214/07-AAP499 | IMS-AAP-AAP499 | math.PR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Small-world graphs, which combine randomized and structured elements, are
seen as prevalent in nature. Jon Kleinberg showed that in some graphs of this
type it is possible to route, or navigate, between vertices in few steps even
with very little knowledge of the graph itself. In an attempt to understand how
such graphs arise we introduce a different criterion for graphs to be navigable
in this sense, relating the neighbor selection of a vertex to the hitting
probability of routed walks. In several models starting from both discrete and
continuous settings, this can be shown to lead to graphs with the desired
properties. It also leads directly to an evolutionary model for the creation of
similar graphs by the stepwise rewiring of the edges, and we conjecture,
supported by simulations, that these too are navigable.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2007 12:16:35 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Nov 2008 13:51:53 GMT"
}
] | 2008-11-18T00:00:00 | [
[
"Sandberg",
"Oskar",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0702334 | Olivier Finkel | Olivier Finkel (LIP) | An Example of Pi^0_3-complete Infinitary Rational Relation | null | null | null | null | math.LO cs.CC cs.LO | null | We give in this paper an example of infinitary rational relation, accepted by
a 2-tape B\"{u}chi automaton, which is Pi^0_3-complete in the Borel hierarchy.
Moreover the example of infinitary rational relation given in this paper has a
very simple structure and can be easily described by its sections.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2007 16:11:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"LIP"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0702744 | Mark Jerrum | Martin Dyer, Leslie Ann Goldberg, Mark Jerrum | Matrix norms and rapid mixing for spin systems | Published in at http://dx.doi.org/10.1214/08-AAP532 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2009, Vol. 19, No. 1, 71-107 | 10.1214/08-AAP532 | IMS-AAP-AAP532 | math.PR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a systematic development of the application of matrix norms to rapid
mixing in spin systems. We show that rapid mixing of both random update Glauber
dynamics and systematic scan Glauber dynamics occurs if any matrix norm of the
associated dependency matrix is less than 1. We give improved analysis for the
case in which the diagonal of the dependency matrix is $\mathbf{0}$ (as in heat
bath dynamics). We apply the matrix norm methods to random update and
systematic scan Glauber dynamics for coloring various classes of graphs. We
give a general method for estimating a norm of a symmetric nonregular matrix.
This leads to improved mixing times for any class of graphs which is hereditary
and sufficiently sparse including several classes of degree-bounded graphs such
as nonregular graphs, trees, planar graphs and graphs with given tree-width and
genus.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2007 13:25:16 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Apr 2008 12:50:19 GMT"
},
{
"version": "v3",
"created": "Fri, 27 Feb 2009 10:33:04 GMT"
}
] | 2009-03-06T00:00:00 | [
[
"Dyer",
"Martin",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0702804 | Marcus Hutter | Marcus Hutter | The Loss Rank Principle for Model Selection | 16 pages | Proc. 20th Annual Conf. on Learning Theory (COLT 2007) pages
589-603 | 10.1007/978-3-540-72927-3_42 | null | math.ST cs.LG stat.ME stat.ML stat.TH | null | We introduce a new principle for model selection in regression and
classification. Many regression models are controlled by some smoothness or
flexibility or complexity parameter c, e.g. the number of neighbors to be
averaged over in k nearest neighbor (kNN) regression or the polynomial degree
in regression with polynomials. Let f_D^c be the (best) regressor of complexity
c on data D. A more flexible regressor can fit more data D' well than a more
rigid one. If something (here small loss) is easy to achieve it's typically
worth less. We define the loss rank of f_D^c as the number of other
(fictitious) data D' that are fitted better by f_D'^c than D is fitted by
f_D^c. We suggest selecting the model complexity c that has minimal loss rank
(LoRP). Unlike most penalized maximum likelihood variants (AIC,BIC,MDL), LoRP
only depends on the regression function and loss function. It works without a
stochastic noise model, and is directly applicable to any non-parametric
regressor, like kNN. In this paper we formalize, discuss, and motivate LoRP,
study it for specific regression problems, in particular linear ones, and
compare it to other model selection schemes.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 03:31:34 GMT"
}
] | 2007-06-25T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0702866 | Marie Cottrell | Patrick Letr\'emy (SAMOS, CES), Marie Cottrell (SAMOS, CES), Eric
Esposito (RDD GDF), Val\'erie Laffite (RDD GDF), Sally Showk (RDD GDF) | Consumer Profile Identification and Allocation | Accepted in the IWANN 07 conference San Sebastian, June 2007) | null | null | null | math.ST cs.NE stat.TH | null | We propose an easy-to-use methodology to allocate one of the groups which
have been previously built from a complete learning data base, to new
individuals. The learning data base contains continuous and categorical
variables for each individual. The groups (clusters) are built by using only
the continuous variables and described with the help of the categorical ones.
For the new individuals, only the categorical variables are available, and it
is necessary to define a model which computes the probabilities to belong to
each of the clusters, by using only the categorical variables. Then this model
provides a decision rule to assign the new individuals and gives an efficient
tool to decision-makers. This tool is shown to be very efficient for customers
allocation in consumer clusters for marketing purposes, for example.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 08:02:35 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 07:09:41 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Letrémy",
"Patrick",
"",
"SAMOS, CES"
],
[
"Cottrell",
"Marie",
"",
"SAMOS, CES"
],
[
"Esposito",
"Eric",
"",
"RDD GDF"
],
[
"Laffite",
"Valérie",
"",
"RDD GDF"
],
[
"Showk",
"Sally",
"",
"RDD GDF"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0703019 | Ralph P. Russo | Ralph P. Russo, Nariankadu D. Shyamalkumar | Reading policies for joins: An asymptotic analysis | Published at http://dx.doi.org/10.1214/105051606000000646 in the
Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute
of Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2007, Vol. 17, No. 1, 230-264 | 10.1214/105051606000000646 | IMS-AAP-AAP404 | math.PR cs.DB | null | Suppose that $m_n$ observations are made from the distribution $\mathbf {R}$
and $n-m_n$ from the distribution $\mathbf {S}$. Associate with each pair, $x$
from $\mathbf {R}$ and $y$ from $\mathbf {S}$, a nonnegative score $\phi(x,y)$.
An optimal reading policy is one that yields a sequence $m_n$ that maximizes
$\mathbb{E}(M(n))$, the expected sum of the $(n-m_n)m_n$ observed scores,
uniformly in $n$. The alternating policy, which switches between the two
sources, is the optimal nonadaptive policy. In contrast, the greedy policy,
which chooses its source to maximize the expected gain on the next step, is
shown to be the optimal policy. Asymptotics are provided for the case where the
$\mathbf {R}$ and $\mathbf {S}$ distributions are discrete and $\phi(x,y)=1 or
0$ according as $x=y$ or not (i.e., the observations match). Specifically, an
invariance result is proved which guarantees that for a wide class of policies,
including the alternating and the greedy, the variable M(n) obeys the same CLT
and LIL. A more delicate analysis of the sequence $\mathbb{E}(M(n))$ and the
sample paths of M(n), for both alternating and greedy, reveals the slender
sense in which the latter policy is asymptotically superior to the former, as
well as a sense of equivalence of the two and robustness of the former.
| [
{
"version": "v1",
"created": "Thu, 1 Mar 2007 09:02:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Russo",
"Ralph P.",
""
],
[
"Shyamalkumar",
"Nariankadu D.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
math/0703241 | Pierre Guillon | Julien Cervelle (IGM), Enrico Formenti (I3S), Pierre Guillon (IGM) | Sofic Trace of a Cellular Automaton | 10 pages + 6 for included proofs | null | null | null | math.DS cs.CC cs.DM | null | The trace subshift of a cellular automaton is the subshift of all possible
columns that may appear in a space-time diagram, ie the infinite sequence of
states of a particular cell of a configuration; in the language of symbolic
dynamics one says that it is a factor system. In this paper we study conditions
for a sofic subshift to be the trace of a cellular automaton.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 20:48:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cervelle",
"Julien",
"",
"IGM"
],
[
"Formenti",
"Enrico",
"",
"I3S"
],
[
"Guillon",
"Pierre",
"",
"IGM"
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0703436 | Daniel Perrucci | G. Jeronimo, D. Perrucci, J. Sabia | A parametric representation of totally mixed Nash equilibria | 29 pages, submitted | null | null | null | math.AG cs.GT | null | We compute a parametric description of the totally mixed Nash equilibria of a
generic game in normal form with pre-fixed structure. Using this
representation, we show conditions under which a game has the maximum possible
number of this kind of equilibria. Then, we present a symbolic procedure that
allows us to describe and estimate the number of isolated totally mixed Nash
equilibria of an arbitrary game. Under certain assumptions, the algorithm
computes the exact number of these equilibria.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 20:46:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jeronimo",
"G.",
""
],
[
"Perrucci",
"D.",
""
],
[
"Sabia",
"J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
math/0703575 | Shmuel Onn | Shmuel Onn | Convex Discrete Optimization | null | Encyclopedia of Optimization 2009: 513-550 | null | null | math.OC cs.CC cs.DM math.CO | null | We develop an algorithmic theory of convex optimization over discrete sets.
Using a combination of algebraic and geometric tools we are able to provide
polynomial time algorithms for solving broad classes of convex combinatorial
optimization problems and convex integer programming problems in variable
dimension. We discuss some of the many applications of this theory including to
quadratic programming, matroids, bin packing and cutting-stock problems, vector
partitioning and clustering, multiway transportation problems, and privacy and
confidential statistical data disclosure. Highlights of our work include a
strongly polynomial time algorithm for convex and linear combinatorial
optimization over any family presented by a membership oracle when the
underlying polytope has few edge-directions; a new theory of so-termed n-fold
integer programming, yielding polynomial time solution of important and natural
classes of convex and linear integer programming problems in variable
dimension; and a complete complexity classification of high dimensional
transportation problems, with practical applications to fundamental problems in
privacy and confidential statistical data disclosure.
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 08:47:46 GMT"
}
] | 2009-01-24T00:00:00 | [
[
"Onn",
"Shmuel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0703656 | Vladimir Shpilrain | Vladimir Shpilrain and Gabriel Zapata | Using decision problems in public key cryptography | 12 pages | null | null | null | math.GR cs.CR | null | There are several public key establishment protocols as well as complete
public key cryptosystems based on allegedly hard problems from combinatorial
(semi)group theory known by now. Most of these problems are search problems,
i.e., they are of the following nature: given a property P and the information
that there are objects with the property P, find at least one particular object
with the property P. So far, no cryptographic protocol based on a search
problem in a non-commutative (semi)group has been recognized as secure enough
to be a viable alternative to established protocols (such as RSA) based on
commutative (semi)groups, although most of these protocols are more efficient
than RSA is.
In this paper, we suggest to use decision problems from combinatorial group
theory as the core of a public key establishment protocol or a public key
cryptosystem. By using a popular decision problem, the word problem, we design
a cryptosystem with the following features: (1) Bob transmits to Alice an
encrypted binary sequence which Alice decrypts correctly with probability "very
close" to 1; (2) the adversary, Eve, who is granted arbitrarily high (but
fixed) computational speed, cannot positively identify (at least, in theory),
by using a "brute force attack", the "1" or "0" bits in Bob's binary sequence.
In other words: no matter what computational speed we grant Eve at the outset,
there is no guarantee that her "brute force attack" program will give a
conclusive answer (or an answer which is correct with overwhelming probability)
about any bit in Bob's sequence.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 01:28:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
],
[
"Zapata",
"Gabriel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0703713 | Craig Antonio Pastro | J. R. B. Cockett and Craig Pastro | The logic of message passing | 51 pages | Science of Computer Programming 74 no.8 (2009) 498-533 | null | null | math.CT cs.LO | null | Message passing is a key ingredient of concurrent programming. The purpose of
this paper is to describe the equivalence between the proof theory, the
categorical semantics, and term calculus of message passing. In order to
achieve this we introduce the categorical notion of a linear actegory and the
related polycategorical notion of a poly-actegory. Not surprisingly the
notation used for the term calculus borrows heavily from the (synchronous)
pi-calculus. The cut elimination procedure for the system provides an
operational semantics.
| [
{
"version": "v1",
"created": "Fri, 23 Mar 2007 21:17:42 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 22:39:49 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Nov 2007 12:29:31 GMT"
}
] | 2010-03-03T00:00:00 | [
[
"Cockett",
"J. R. B.",
""
],
[
"Pastro",
"Craig",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0703865 | George Bell | George I. Bell | Solving Triangular Peg Solitaire | 23 pages, 14 figures; published version including comments by John
Beasley | Journal of Integer Sequences, Vol. 11 (2008), Article 08.4.8 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the one-person game of peg solitaire on a triangular board of
arbitrary size. The basic game begins from a full board with one peg missing
and finishes with one peg at a specified board location. We develop necessary
and sufficient conditions for this game to be solvable. For all solvable
problems, we give an explicit solution algorithm. On the 15-hole board, we
compare three simple solution strategies. We then consider the problem of
finding solutions that minimize the number of moves (where a move is one or
more consecutive jumps by the same peg), and find the shortest solution to the
basic game on all triangular boards with up to 55 holes (10 holes on a side).
| [
{
"version": "v1",
"created": "Thu, 29 Mar 2007 19:33:13 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Apr 2007 19:10:01 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Jun 2007 14:43:36 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Aug 2007 14:55:34 GMT"
},
{
"version": "v5",
"created": "Tue, 18 Nov 2008 04:43:28 GMT"
},
{
"version": "v6",
"created": "Sat, 17 Jan 2009 17:16:04 GMT"
}
] | 2009-01-17T00:00:00 | [
[
"Bell",
"George I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0703902 | Constantinos Daskalakis | Constantinos Daskalakis, Alexandros G. Dimakis, Elchanan Mossel | Connectivity and equilibrium in random games | Published in at http://dx.doi.org/10.1214/10-AAP715 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2011, Vol. 21, No. 3, 987-1016 | 10.1214/10-AAP715 | IMS-AAP-AAP715 | math.PR cs.GT math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study how the structure of the interaction graph of a game affects the
existence of pure Nash equilibria. In particular, for a fixed interaction
graph, we are interested in whether there are pure Nash equilibria arising when
random utility tables are assigned to the players. We provide conditions for
the structure of the graph under which equilibria are likely to exist and
complementary conditions which make the existence of equilibria highly
unlikely. Our results have immediate implications for many deterministic graphs
and generalize known results for random games on the complete graph. In
particular, our results imply that the probability that bounded degree graphs
have pure Nash equilibria is exponentially small in the size of the graph and
yield a simple algorithm that finds small nonexistence certificates for a large
family of graphs. Then we show that in any strongly connected graph of n
vertices with expansion $(1+\Omega(1))\log_2(n)$ the distribution of the number
of equilibria approaches the Poisson distribution with parameter 1,
asymptotically as $n \to +\infty$.
| [
{
"version": "v1",
"created": "Thu, 29 Mar 2007 22:47:45 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Apr 2007 17:33:11 GMT"
},
{
"version": "v3",
"created": "Tue, 5 Jun 2007 23:01:02 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Feb 2011 01:53:46 GMT"
},
{
"version": "v5",
"created": "Mon, 12 Nov 2012 06:25:27 GMT"
}
] | 2012-11-13T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Mossel",
"Elchanan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0703921 | Louis Theran | Ileana Streinu and Louis Theran | Sparse Hypergraphs and Pebble Game Algorithms | null | null | null | null | math.CO cs.DS | null | A hypergraph $G=(V,E)$ is $(k,\ell)$-sparse if no subset $V'\subset V$ spans
more than $k|V'|-\ell$ hyperedges. We characterize $(k,\ell)$-sparse
hypergraphs in terms of graph theoretic, matroidal and algorithmic properties.
We extend several well-known theorems of Haas, Lov{\'{a}}sz, Nash-Williams,
Tutte, and White and Whiteley, linking arboricity of graphs to certain counts
on the number of edges. We also address the problem of finding
lower-dimensional representations of sparse hypergraphs, and identify a
critical behaviour in terms of the sparsity parameters $k$ and $\ell$. Our
constructions extend the pebble games of Lee and Streinu from graphs to
hypergraphs.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 14:14:58 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Streinu",
"Ileana",
""
],
[
"Theran",
"Louis",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0703927 | Christine Cheng | V. Arvind, Christine T. Cheng, Nikhil R. Devanur | On Computing the Distinguishing Numbers of Planar Graphs and Beyond: a
Counting Approach | 27 pages | null | null | null | math.CO cs.DS | null | A vertex k-labeling of graph G is distinguishing if the only automorphism
that preserves the labels of G is the identity map. The distinguishing number
of G, D(G), is the smallest integer k for which G has a distinguishing
k-labeling. In this paper, we apply the principle of inclusion-exclusion and
develop recursive formulas to count the number of inequivalent distinguishing
k-labelings of a graph. Along the way, we prove that the distinguishing number
of a planar graph can be computed in time polynomial in the size of the graph.}
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 16:50:09 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Arvind",
"V.",
""
],
[
"Cheng",
"Christine T.",
""
],
[
"Devanur",
"Nikhil R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/9310227 | null | A. R. Calderbank, A. Roger Hammons Jr., P. Vijay Kumar, N. J. A.
Sloane, Patrick Sol\'e | A linear construction for certain Kerdock and Preparata codes | 5 pages | Bull. Amer. Math. Soc. (N.S.) 29 (1993) 218-222 | null | Bulletin migration 11/99 | math.CO cs.IT math.IT | null | The Nordstrom-Robinson, Kerdock, and (slightly modified) Pre\- parata codes
are shown to be linear over $\ZZ_4$, the integers $\bmod~4$. The Kerdock and
Preparata codes are duals over $\ZZ_4$, and the Nordstrom-Robinson code is
self-dual. All these codes are just extended cyclic codes over $\ZZ_4$. This
provides a simple definition for these codes and explains why their Hamming
weight distributions are dual to each other. First- and second-order
Reed-Muller codes are also linear codes over $\ZZ_4$, but Hamming codes in
general are not, nor is the Golay code.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1993 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Calderbank",
"A. R.",
""
],
[
"Hammons",
"A. Roger",
"Jr."
],
[
"Kumar",
"P. Vijay",
""
],
[
"Sloane",
"N. J. A.",
""
],
[
"Solé",
"Patrick",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/9409219 | null | Isaac Saias | Proving probabilistic correctness statements: the case of Rabin's
algorithm for mutual exclusion | 12 pages | null | null | LACES 68Q-94-14 | math.CO cs.CC | null | The correctness of most randomized distributed algorithms is expressed by a
statement of the form ``some predicate of the executions holds with high
probability, regardless of the order in which actions are scheduled''. In this
paper, we present a general methodology to prove correctness statements of such
randomized algorithms. Specifically, we show how to prove such statements by a
series of refinements, which terminate in a statement independent of the
schedule. To demonstrate the subtlety of the issues involved in this type of
analysis, we focus on Rabin's randomized distributed algorithm for mutual
exclusion [Rabin 82]. Surprisingly, it turns out that the algorithm does not
maintain one of the requirements of the problem under a certain schedule. In
particular, we give a schedule under which a set of processes can suffer
lockout for arbitrary long periods.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 1994 00:00:00 GMT"
}
] | 2008-11-23T00:00:00 | [
[
"Saias",
"Isaac",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9409220 | null | Michel Goemans, Nancy Lynch, Isaac Saias | Number of faults a system can withstand without repairs | 10 pages | null | null | LACES 68Q-94-15 | math.CO cs.CC | null | We consider the following scheduling problem. A system is composed of $n$
processors drawn from a pool of $N$. The processors can become faulty while in
operation and faulty processors never recover. A report is issued whenever a
fault occurs. This report states only the existence of a fault, but does not
indicate its location. Based on this report, the scheduler can reconfigure the
system and choose another set of $n$ processors. The system operates
satisfactorily as long as at most $f$ of the $n$ selected processors are
faulty. We exhibit a scheduling strategy allowing the system to operate
satisfactorily until approximately $(N/n)f$ faults are reported in the worst
case. Our precise bound is tight.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 1994 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Goemans",
"Michel",
""
],
[
"Lynch",
"Nancy",
""
],
[
"Saias",
"Isaac",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9409221 | null | Nancy Lynch, Isaac Saias, Roberto Segala | Proving time bounds for randomized distributed algorithms | 19 pages | null | null | LACES 68Q-94-16 | math.CO cs.CC | null | A method of analyzing time bounds for randomized distributed algorithms is
presented, in the context of a new and general framework for describing and
reasoning about randomized algorithms. The method consists of proving auxiliary
statements of the form U (t)->(p) U', which means that whenever the algorithm
begins in a state in set U, with probability p, it will reach a state in set U'
within time t. The power of the method is illustrated by its use in proving a
constant upper bound on the expected time for some process to reach its
critical region, in Lehmann and Rabin's Dining Philosophers algorithm.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Lynch",
"Nancy",
""
],
[
"Saias",
"Isaac",
""
],
[
"Segala",
"Roberto",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9409223 | null | Avrim Blum, Prasad Chalasani, Don Coppersmith, Bill Pulleyblank,
Prabhakar Raghavan, Madhu Sudan | On the minimum latency problem | 9 pages | null | null | LACES 68Q-94-18 | math.CO cs.CC | null | We are given a set of points $p_1,\ldots , p_n$ and a symmetric distance
matrix $(d_{ij})$ giving the distance between $p_i$ and $p_j$. We wish to
construct a tour that minimizes $\sum_{i=1}^n \ell(i)$, where $\ell(i)$ is the
{\em latency} of $p_i$, defined to be the distance traveled before first
visiting $p_i$. This problem is also known in the literature as the {\em
deliveryman problem} or the {\em traveling repairman problem}. It arises in a
number of applications including disk-head scheduling, and turns out to be
surprisingly different from the traveling salesman problem in character. We
give exact and approximate solutions to a number of cases, including a
constant-factor approximation algorithm whenever the distance matrix satisfies
the triangle inequality.
| [
{
"version": "v1",
"created": "Wed, 21 Sep 1994 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Blum",
"Avrim",
""
],
[
"Chalasani",
"Prasad",
""
],
[
"Coppersmith",
"Don",
""
],
[
"Pulleyblank",
"Bill",
""
],
[
"Raghavan",
"Prabhakar",
""
],
[
"Sudan",
"Madhu",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9409224 | null | Avrim Blum, Prasad Chalasani | An on-line algorithm for improving performance in navigation | 10 pages | null | null | LACES 68Q-94-19 | math.CO cs.CC | null | Recent papers have shown optimally-competitive on-line strategies for a robot
traveling from a point $s$ to a point $t$ in certain unknown geometric
environments. We consider the question: Having gained some partial information
about the scene on its first trip from $s$ to $t$, can the robot improve its
performance on subsequent trips it might make? This is a type of on-line
problem where a strategy must exploit {\em partial information \/} about the
future (e.g., about obstacles that lie ahead). For scenes with axis-parallel
rectangular obstacles where the Euclidean distance between $s$ and $t$ is $n$,
we present a deterministic algorithm whose {\em average\/} trip length after
$k$ trips, $k \leq n$, is $O(\rootnbyk)$ times the length of the shortest
$s$-$t$ path in the scene. We also show that this is the best a deterministic
strategy can do. This algorithm can be thought of as performing an optimal
tradeoff between search effort and the goodness of the path found. We improve
this algorithm so that for {\em every\/} $i \leq n$, the robot's $i$th trip
length is $O(\rootnbyi)$ times the shortest $s$-$t$ path length. A key idea of
the paper is that a {\em tree\/} structure can be defined in the scene, where
the nodes are portions of certain obstacles and the edges are ``short'' paths
from a node to its children. The core of our algorithms is an on-line strategy
for traversing this tree optimally.
| [
{
"version": "v1",
"created": "Wed, 21 Sep 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Blum",
"Avrim",
""
],
[
"Chalasani",
"Prasad",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9409225 | null | Madhav V. Marathe, Harry B. Hunt III, S. S. Ravi | The complexity of approximating PSPACE-Complete problems for
hierarchical specifications | 41 pages | null | null | LACES 68Q-94-21 | math.CO cs.CC | null | We extend the concept of polynomial time approximation algorithms to apply to
problems for hierarchically specified graphs, many of which are
PSPACE-complete. Assuming P != PSPACE, the existence or nonexistence of such
efficient approximation algorithms is characterized, for several standard graph
theoretic and combinatorial problems. We present polynomial time approximation
algorithms for several standard PSPACE-hard problems considered in the
literature. In contrast, we show that unless P = PSPACE, there is no polynomial
time epsilon-approximation for any epsilon>0, for several other problems, when
the instances are specified hierarchically. We present polynomial time
approximation algorithms for the following problems when the graphs are
specified hierarchically: {minimum vertex cover}, {maximum 3SAT}, {weighted max
cut}, {minimum maximal matching}, {bounded degree maximum independent set}
In contrast, we show that unless P = PSPACE, there is no polynomial time
epsilon-approximation for any epsilon>0, for the following problems when the
instances are specified hierarchically: {the number of true gates in a monotone
acyclic circuit when all input values are specified} and {the optimal value of
the objective function of a linear program} It is also shown that unless P =
PSPACE, a performance guarantee of less than 2 cannot be obtained in polynomial
time for the following problems when the instances are specified
hierarchically: {high degree subgraph}, {k-vertex connected subgraph}, and
{k-edge connected subgraph}
| [
{
"version": "v1",
"created": "Wed, 21 Sep 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Marathe",
"Madhav V.",
""
],
[
"Hunt",
"Harry B.",
"III"
],
[
"Ravi",
"S. S.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9409226 | null | Madhav V. Marathe, H. Breu, Harry B. Hunt III, S. S. Ravi, Daniel J.
Rosenkrantz | Geometry based heuristics for unit disk graphs | 19 pages | null | null | LACES 68Q-94-22 | math.CO cs.CC | null | Unit disk graphs are intersection graphs of circles of unit radius in the
plane. We present simple and provably good heuristics for a number of classical
NP-hard optimization problems on unit disk graphs. The problems considered
include maximum independent set, minimum vertex cover, minimum coloring and
minimum dominating set. We also present an on-line coloring heuristic which
achieves a competitive ratio of 6 for unit disk graphs. Our heuristics do not
need a geometric representation of unit disk graphs. Geometric representations
are used only in establishing the performance guarantees of the heuristics.
Several of our approximation algorithms can be extended to intersection graphs
of circles of arbitrary radii in the plane, intersection graphs of regular
polygons, and to intersection graphs of higher dimensional regular objects.
| [
{
"version": "v1",
"created": "Wed, 21 Sep 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Marathe",
"Madhav V.",
""
],
[
"Breu",
"H.",
""
],
[
"Hunt",
"Harry B.",
"III"
],
[
"Ravi",
"S. S.",
""
],
[
"Rosenkrantz",
"Daniel J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9410208 | null | Herbert Edelsbrunner, Ernst M\"ucke | Three-dimensional alpha shapes | 32 pages | null | null | LACES 52B-94-25 | math.CO cs.CC math.MG | null | Frequently, data in scientific computing is in its abstract form a finite
point set in space, and it is sometimes useful or required to compute what one
might call the ``shape'' of the set. For that purpose, this paper introduces
the formal notion of the family of $\alpha$-shapes of a finite point set in
$\Real^3$. Each shape is a well-defined polytope, derived from the Delaunay
triangulation of the point set, with a parameter $\alpha \in \Real$ controlling
the desired level of detail. An algorithm is presented that constructs the
entire family of shapes for a given set of size $n$ in time $O(n^2)$, worst
case. A robust implementation of the algorithm is discussed and several
applications in the area of scientific computing are mentioned.
| [
{
"version": "v1",
"created": "Wed, 12 Oct 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Edelsbrunner",
"Herbert",
""
],
[
"Mücke",
"Ernst",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/9410209 | null | Herbert Edelsbrunner, Ernst M\"ucke | Simulation of simplicity: a technique to cope with degenerate cases in
geometric algorithms | 38 pages | null | null | LACES 68Q-94-24 | math.CO cs.CC | null | This paper describes a general-purpose programming technique, called the
Simulation of Simplicity, which can be used to cope with degenerate input data
for geometric algorithms. It relieves the programmer from the task to provide a
consistent treatment for every single special case that can occur. The programs
that use the technique tend to be considerably smaller and more robust than
those that do not use it. We believe that this technique will become a standard
tool in writing geometric software.
| [
{
"version": "v1",
"created": "Wed, 12 Oct 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Edelsbrunner",
"Herbert",
""
],
[
"Mücke",
"Ernst",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9411219 | Emanuel Knill | Emanuel Knill | Lower bounds for identifying subset members with subset queries | 9 pages | null | null | LACES 68Q-94-23 | math.CO cs.CC | null | An instance of a group testing problem is a set of objects $\cO$ and an
unknown subset $P$ of $\cO$. The task is to determine $P$ by using queries of
the type ``does $P$ intersect $Q$'', where $Q$ is a subset of $\cO$. This
problem occurs in areas such as fault detection, multiaccess communications,
optimal search, blood testing and chromosome mapping. Consider the two stage
algorithm for solving a group testing problem. In the first stage a
predetermined set of queries are asked in parallel and in the second stage, $P$
is determined by testing individual objects. Let $n=\cardof{\cO}$. Suppose that
$P$ is generated by independently adding each $x\in \cO$ to $P$ with
probability $p/n$. Let $q_1$ ($q_2$) be the number of queries asked in the
first (second) stage of this algorithm. We show that if
$q_1=o(\log(n)\log(n)/\log\log(n))$, then $\Exp(q_2) = n^{1-o(1)}$, while there
exist algorithms with $q_1 = O(\log(n)\log(n)/\log\log(n))$ and $\Exp(q_2) =
o(1)$. The proof involves a relaxation technique which can be used with
arbitrary distributions. The best previously known bound is $q_1+\Exp(q_2) =
\Omega(p\log(n))$. For general group testing algorithms, our results imply that
if the average number of queries over the course of $n^\gamma$ ($\gamma>0$)
independent experiments is $O(n^{1-\epsilon})$, then with high probability
$\Omega(\log(n)\log(n)/\log\log(n))$ non-singleton subsets are queried. This
settles a conjecture of Bill Bruno and David Torney and has important
consequences for the use of group testing in screening DNA libraries and other
applications where it is more cost effective to use non-adaptive algorithms
and/or too expensive to prepare a subset $Q$ for its first test.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Knill",
"Emanuel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9411222 | null | Michael J. Dinneen | The complexity of broadcasting in bounded-degree networks | 6 pages | null | null | LACES 68Q-94-31 | math.CO cs.CC | null | Broadcasting concerns the dissemination of a message originating at one node
of a network to all other nodes. This task is accomplished by placing a series
of calls over the communication lines of the network between neighboring nodes,
where each call requires a unit of time and a call can involve only two nodes.
We show that for bounded-degree networks determining the minimum broadcast time
from an originating node remains NP-complete.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Dinneen",
"Michael J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9411235 | Shelah Office | Yuri Gurevich, Neil Immerman, Saharon Shelah | McColm conjecture | null | Symposium on Logic in Computer Science (1994), 10--19 | null | Shelah [GISh:525] | math.LO cs.LO | null | Gregory McColm conjectured that positive elementary inductions are bounded in
a class K of finite structures if every (FO + LFP) formula is equivalent to a
first-order formula in K. Here (FO + LFP) is the extension of first-order logic
with the least fixed point operator. We disprove the conjecture. Our main
results are two model-theoretic constructions, one deterministic and the other
randomized, each of which refutes McColm's conjecture.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Gurevich",
"Yuri",
""
],
[
"Immerman",
"Neil",
""
],
[
"Shelah",
"Saharon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/9411236 | Shelah Office | Yuri Gurevich, Saharon Shelah | On finite rigid structures | null | J. Symbolic Logic 61 (1996), 549--562 | null | Shelah [GuSh:526] | math.LO cs.LO | null | The main result of this paper is a probabilistic construction of finite rigid
structures. It yields a finitely axiomatizable class of finite rigid structures
where no L^omega_{infty, omega} formula with counting quantifiers defines a
linear order.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 1994 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Gurevich",
"Yuri",
""
],
[
"Shelah",
"Saharon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/9504213 | null | Jonathan Berry, Mark Goldberg | Path optimization and near-greedy analysis for graph partitioning: an
empirical study | null | null | null | LACES 68Q-95-25 | math.CO cs.CC | null | This paper presents the results of an experimental study of graph
partitioning. We describe a new heuristic technique, path optimization, and its
application to two variations of graph partitioning: the max_cut problem and
the min_quotient_cut problem. We present the results of computational
comparisons between this technique and the Kernighan-Lin algorithm, the
simulated annealing algorithm, the FLOW-lagorithm the multilevel algorithm, and
teh recent 0.878-approximation algorithm. The experiments were conducted on two
classes of graphs that have become standard for such tests: random and random
geometric. They show that for both classes of inputs and both variations of the
problem, the new heuristic is competitive with the other algorithms and holds
an advantage for min_quotient_cut when applied to very large, sparse geometric
graphs. In the last part of the paper, we describe an approach to analyzing
graph partitioning algorithms from the statistical point of view. Every
partitioning of a graph is viewed as a result achieved by a "near gready"
partitioning algorithm. The experiments show that for "good" partitionings, the
number of non-greedy steps needed to obtain them is quite small; moreover, it
is "statistically" smaller for better partitionings. This led us to conjecture
that there exists an "optimal" distribution of the non-greedy steps that
characterize the classes of graphs that we studied.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 1995 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Berry",
"Jonathan",
""
],
[
"Goldberg",
"Mark",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9508218 | Emanuel Knill | Emanuel Knill | An analysis of Bennett's pebble game | 15 pages | null | null | LACES 68Q-95-31 | math.CO cs.CC | null | Bennett's pebble game was introduced to obtain better time/space tradeoffs in
the simulation of standard Turing machines by reversible ones. So far only
upper bounds for the tradeoff based on the pebble game have been published.
Here we give a recursion for the time optimal solution of the pebble game given
a space bound. We analyze the recursion to obtain an explicit asymptotic
expression for the best time-space product.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 1995 00:00:00 GMT"
}
] | 2016-09-06T00:00:00 | [
[
"Knill",
"Emanuel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/9508219 | null | David B. Jaffe | New results on binary linear codes | null | null | null | LACES 94B-95-32 | math.CO cs.IT math.IT | null | This research announcement describes in very rough terms methods and a
computer language under development, which can be used to prove the
nonexistence of binary linear codes. Over a hundred new results have been
obtained by the author. For example, there is no [29,11,10] code. The proof of
this is roughly outlined.
| [
{
"version": "v1",
"created": "Mon, 14 Aug 1995 00:00:00 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Jaffe",
"David B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/9610221 | null | J. Maurice Rojas | Extensions and Corrections for: ``A Convex Geometric Approach to
Counting the Roots of a Polynomial System'' | null | null | null | MSRI 1996-075 | math.AG cs.DS | null | This brief note corrects some errors in the paper quoted in the title,
highlights a combinatorial result which may have been overlooked, and points to
further improvements in recent literature.
| [
{
"version": "v1",
"created": "Thu, 31 Oct 1996 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/9702221 | null | J. Maurice Rojas | Some New Applications of Toric Geometry | null | null | null | MSRI 1997-016 | math.AG cs.DS | null | This paper reexamines univariate reduction from a toric geometric point of
view. We begin by constructing a binomial variant of the $u$-resultant and then
retailor the generalized characteristic polynomial to fully exploit sparsity in
the monomial structure of any given polynomial system. We thus obtain a fast
new algorithm for univariate reduction and a better understanding of the
underlying projections. As a corollary, we show that a refinement of Hilbert's
Tenth Problem is decidable within single-exponential time. We also show how
certain multisymmetric functions of the roots of polynomial systems can be
calculated with sparse resultants.
| [
{
"version": "v1",
"created": "Sat, 8 Feb 1997 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/9702222 | null | J. Maurice Rojas | Toric Generalized Characteristic Polynomials | null | null | null | MSRI 1997-017 | math.AG cs.DS | null | We illustrate an efficient new method for handling polynomial systems with
degenerate solution sets. In particular, a corollary of our techniques is a new
algorithm to find an isolated point in every excess component of the zero set
(over an algebraically closed field) of any $n$ by $n$ system of polynomial
equations. Since we use the sparse resultant, we thus obtain complexity bounds
(for converting any input polynomial system into a multilinear factorization
problem) which are close to cubic in the degree of the underlying variety --
significantly better than previous bounds which were pseudo-polynomial in the
classical B\'ezout bound. By carefully taking into account the underlying toric
geometry, we are also able to improve the reliability of certain sparse
resultant based algorithms for polynomial system solving.
| [
{
"version": "v1",
"created": "Sat, 8 Feb 1997 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/9704218 | Alexander Barvinok | Alexander Barvinok | A simple polynomial time algorithm to approximate the permanent within a
simply exponential factor | null | null | null | MSRI 1997-031, formerly math.LA/9704218 | math.RA cs.DS | null | We present a simple randomized polynomial time algorithm to approximate the
mixed discriminant of $n$ positive semidefinite $n \times n$ matrices within a
factor $2^{O(n)}$. Consequently, the algorithm allows us to approximate in
randomized polynomial time the permanent of a given $n \times n$ non-negative
matrix within a factor $2^{O(n)}$. When applied to approximating the permanent,
the algorithm turns out to be a simple modification of the well-known
Godsil-Gutman estimator.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 1997 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 | [
[
"Barvinok",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/9705225 | Shelah Office | Andreas Blass, Yuri Gurevich, Saharon Shelah | Choiceless polynomial time | null | null | null | Shelah [BGSh:533] | math.LO cs.LO | null | Turing machines define polynomial time (PTime) on strings but cannot deal
with structures like graphs directly, and there is no known, easily computable
string encoding of isomorphism classes of structures. Is there a computation
model whose machines do not distinguish between isomorphic structures and
compute exactly PTime properties? This question can be recast as follows: Does
there exist a logic that captures polynomial time (without presuming the
presence of a linear order)? Earlier, one of us conjectured the negative
answer. The problem motivated a quest for stronger and stronger PTime logics.
All these logics avoid arbitrary choice. Here we attempt to capture the
choiceless fragment of PTime. Our computation model is a version of abstract
state machines (formerly called evolving algebras). The idea is to replace
arbitrary choice with parallel execution. The resulting logic is more
expressive than other PTime logics in the literature. A more difficult theorem
shows that the logic does not capture all PTime.
| [
{
"version": "v1",
"created": "Thu, 15 May 1997 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 | [
[
"Blass",
"Andreas",
""
],
[
"Gurevich",
"Yuri",
""
],
[
"Shelah",
"Saharon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/9801152 | Shelah Office | John T. Baldwin, Saharon Shelah | On the classifiability of cellular automata | null | null | null | Shelah [BlSh:623] | math.LO cs.NE | null | Based on computer simulations Wolfram presented in several papers conjectured
classifications of cellular automata into 4 types. He distinguishes the 4
classes of cellular automata by the evolution of the pattern generated by
applying a cellular automaton to a finite input. Wolfram's qualitative
classification is based on the examination of a large number of simulations. In
addition to this classification based on the rate of growth, he conjectured a
similar classification according to the eventual pattern. We consider here one
formalization of his rate of growth suggestion. After completing our major
results (based only on Wolfram's work), we investigated other contributions to
the area and we report the relation of some of them to our discoveries.
| [
{
"version": "v1",
"created": "Thu, 15 Jan 1998 00:00:00 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Baldwin",
"John T.",
""
],
[
"Shelah",
"Saharon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
math/9807179 | Shelah Office | Saharon Shelah | Polynomial time logic: Inability to express | null | null | null | Shelah [Sh:634] | math.LO cs.LO | null | Here we deal with the logic of [GuSh 533], which tries to capture polynomial
time (for finite models). There it is proved that the logic cannot say much on
models with equality only. Here we prove that it cannot say much on models for
which we expect it cannot say much, like random enough graphs. This is the
result of having a general criterion.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 1998 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Shelah",
"Saharon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/9809009 | J. Maurice Rojas | J. Maurice Rojas | Uncomputably Large Integral Points on Algebraic Plane Curves? | null | null | null | null | math.NT cs.CC cs.SC math.AG math.LO | null | We show that the decidability of an amplification of Hilbert's Tenth Problem
in three variables implies the existence of uncomputably large integral points
on certain algebraic curves. We obtain this as a corollary of a new positive
complexity result: the Diophantine prefixes EAE and EEAE are generically
decidable. This means, taking the former prefix as an example, that we give a
precise geometric classification of those polynomials f in Z[v,x,y] for which
the question...
``Does there exists a v in N such that for all x in N, there exists a y in N
with f(v,x,y)=0?''
...may be undecidable, and we show that this set of polynomials is quite
small in a rigourous sense. (The decidability of EAE was previously an open
question.) The analogous result for the prefix EEAE is even stronger. We thus
obtain a connection between the decidability of certain Diophantine problems,
height bounds for points on curves, and the geometry of certain complex
surfaces and 3-folds.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 08:54:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
math/9809071 | J. Maurice Rojas | J. Maurice Rojas | Solving Degenerate Sparse Polynomial Systems Faster | This is the final journal version of math.AG/9702222 (``Toric
Generalized Characteristic Polynomials''). This final version is a major
revision with several new theorems, examples, and references. The prior
results are also significantly improved | null | null | null | math.AG cs.CC cs.NA math.NA | null | Consider a system F of n polynomial equations in n unknowns, over an
algebraically closed field of arbitrary characteristic. We present a fast
method to find a point in every irreducible component of the zero set Z of F.
Our techniques allow us to sharpen and lower prior complexity bounds for this
problem by fully taking into account the monomial term structure. As a
corollary of our development we also obtain new explicit formulae for the exact
number of isolated roots of F and the intersection multiplicity of the
positive-dimensional part of Z. Finally, we present a combinatorial
construction of non-degenerate polynomial systems, with specified monomial term
structure and maximally many isolated roots, which may be of independent
interest.
| [
{
"version": "v1",
"created": "Mon, 14 Sep 1998 07:46:19 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Sep 1998 03:05:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/9809201 | Shelah Office | Saharon Shelah | On quantification with a finite universe | null | null | null | Shelah [Sh:639] | math.LO cs.CC cs.LO | null | We consider a finite universe U (more exactly - a family U of them) and
second order quantifiers Q_K, where for each U this means quantifying over a
family of n(K)-place relations closed under permuting U. We define some natural
orders and shed some light on the classification problem of those quantifiers.
| [
{
"version": "v1",
"created": "Tue, 15 Sep 1998 00:00:00 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Shelah",
"Saharon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/9810022 | Todd Veldhuizen | Todd L. Veldhuizen and Dennis Gannon | Active Libraries: Rethinking the roles of compilers and libraries | 16 pages, 1998 SIAM Workshop on Object Oriented Methods for
Inter-operable Scientific and Engineering Computing | null | null | formerly math.SC/9810022 | math.NA cs.PL | null | We describe Active Libraries, which take an active role in compilation.
Unlike traditional libraries which are passive collections of functions and
objects, Active Libraries may generate components, specialize algorithms,
optimize code, configure and tune themselves for a target machine, and describe
themselves to tools (such as profilers and debuggers) in an intelligible way.
Several such libraries are described, as are implementation technologies.
| [
{
"version": "v1",
"created": "Mon, 5 Oct 1998 15:27:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Veldhuizen",
"Todd L.",
""
],
[
"Gannon",
"Dennis",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
math/9901074 | Denis V. Juriev | Denis V. Juriev | Differential interactive games: The short-term predictions | two minor remarks are added | null | null | null | math.HO cs.HC | null | Procedures of the short-term predictions for processes in general 2-person
differential interactive games are proposed. Their effectiveness is discussed.
| [
{
"version": "v1",
"created": "Tue, 19 Jan 1999 07:58:55 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jan 1999 16:40:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Juriev",
"Denis V.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
math/9902043 | Paul Vitanyi | Tao Jiang (UCR), Ming Li (UCSB), Paul Vitanyi (CWI and U Amsterdam) | The Average-Case Area of Heilbronn-Type Triangles | 13 pages, LaTeX, 1 figure,Popular treatment in D. Mackenzie, On a
roll, {\em New Scientist}, November 6, 1999, 44--48 | T. Jiang, M. Li, and P. Vitanyi, The average-case area of
Heilbronn-type triangles, Random Structures and Algorithms, 20:2(2002),
206-219 | null | null | math.CO cs.CG cs.DM math.LO math.MG math.PR | null | From among $ {n \choose 3}$ triangles with vertices chosen from $n$ points in
the unit square, let $T$ be the one with the smallest area, and let $A$ be the
area of $T$. Heilbronn's triangle problem asks for the maximum value assumed by
$A$ over all choices of $n$ points. We consider the average-case: If the $n$
points are chosen independently and at random (with a uniform distribution),
then there exist positive constants $c$ and $C$ such that $c/n^3 < \mu_n <
C/n^3$ for all large enough values of $n$, where $\mu_n$ is the expectation of
$A$. Moreover, $c/n^3 < A < C/n^3$, with probability close to one. Our proof
uses the incompressibility method based on Kolmogorov complexity; it actually
determines the area of the smallest triangle for an arrangement in ``general
position.''
| [
{
"version": "v1",
"created": "Fri, 5 Feb 1999 12:37:45 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Apr 1999 16:24:00 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Apr 2000 13:35:21 GMT"
},
{
"version": "v4",
"created": "Mon, 15 Oct 2001 17:36:12 GMT"
},
{
"version": "v5",
"created": "Mon, 10 Nov 2003 14:45:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jiang",
"Tao",
"",
"UCR"
],
[
"Li",
"Ming",
"",
"UCSB"
],
[
"Vitanyi",
"Paul",
"",
"CWI and U Amsterdam"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/9902151 | Philippe Gaucher | Philippe Gaucher | Homotopy invariants of higher dimensional categories and concurrency in
computer science | 54 pages, 1 eps figure, LaTeX2e ; v2 construction of negative and
positive Hurewicz morphisms added, corrected reference ; v3 reorganized paper
for a better understanding ; v4 final version to appear in Mathematical
Structure in Computer Science ; v5 last minute correction (very minor
changes) | Mathematical Structure in Computer Science 10 (2000), no. 4,
p.481-524 | 10.1017/S0960129500003182 | null | math.CT cs.OH math.AT | null | The strict globular $\omega$-categories formalize the execution paths of a
parallel automaton and the homotopies between them. One associates to such (and
any) $\omega$-category $\C$ three homology theories. The first one is called
the globular homology. It contains the oriented loops of $\C$. The two other
ones are called the negative (resp. positive) corner homology. They contain in
a certain manner the branching areas of execution paths or negative corners
(resp. the merging areas of execution paths or positive corners) of $\C$. Two
natural linear maps called the negative (resp. the positive) Hurewicz morphism
from the globular homology to the negative (resp. positive) corner homology are
constructed. We explain the reason why these constructions allow to
reinterprete some geometric problems coming from computer science.
| [
{
"version": "v1",
"created": "Fri, 26 Feb 1999 10:06:27 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Mar 1999 12:34:34 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Aug 1999 10:25:38 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Dec 1999 16:38:14 GMT"
},
{
"version": "v5",
"created": "Sun, 27 Feb 2000 18:35:19 GMT"
}
] | 2021-08-24T00:00:00 | [
[
"Gaucher",
"Philippe",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
math/9905046 | Joachim Rosenthal | Heide Gluesing-Luerssen, Joachim Rosenthal and Paul Weiner | Duality between Multidimensional Convolutional Codes and Systems | 16 pages LaTeX | null | null | null | math.OC cs.IT math.AC math.AG math.IT | null | Multidimensional convolutional codes generalize (one dimensional)
convolutional codes and they correspond under a natural duality to
multidimensional systems widely studied in the systems literature.
| [
{
"version": "v1",
"created": "Fri, 7 May 1999 19:56:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Rosenthal",
"Joachim",
""
],
[
"Weiner",
"Paul",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/9905155 | Peter Brinkmann | Peter Brinkmann | An Implementation of the Bestvina-Handel Algorithm for Surface
Homeomorphisms | 13 pages, 5 figures | Experimental Mathematics 9:2, 2000, 235-240 | null | null | math.GR cs.MS math.GT | null | Bestvina and Handel have found an effective algorithm that determines whether
a given homeomorphism of an orientable, possibly punctured surface is
pseudo-Anosov. We present a software package in Java that realizes this
algorithm for surfaces with one puncture. Moreover, the package allows the user
to define homeomorphisms in terms of Dehn twists, and in the pseudo-Anosov case
it generates images of train tracks in the sense of Bestvina-Handel.
| [
{
"version": "v1",
"created": "Tue, 25 May 1999 20:13:09 GMT"
},
{
"version": "v2",
"created": "Wed, 26 May 1999 00:19:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brinkmann",
"Peter",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
] |
math/9905165 | Denis V. Juriev | Denis V. Juriev | Perception games, the image understanding and interpretational geometry | 9 pages, AMSTEX | null | null | null | math.HO cs.CV | null | The interactive game theoretical approach to the description of perception
processes is proposed. The subject is treated formally in terms of a new class
of the verbalizable interactive games which are called the perception games. An
application of the previously elaborated formalism of dialogues and
verbalizable interactive games to the visual perception allows to combine the
linguistic (such as formal grammars), psycholinguistic and (interactive) game
theoretical methods for analysis of the image understanding by a human that may
be also useful for the elaboration of computer vision systems. By the way the
interactive game theoretical aspects of interpretational geometries are
clarified.
| [
{
"version": "v1",
"created": "Wed, 26 May 1999 13:19:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Juriev",
"Denis V.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
math/9909163 | Maxim Skriganov | M. M. Skriganov | Coding Theory and Uniform Distributions | 41 pages, AMS TEX | null | null | null | math.CO cs.IT math.IT math.NT | null | In the present paper we introduce and study finite point subsets of a special
kind, called optimum distributions, in the n-dimensional unit cube. Such
distributions are closely related with known (delta,s,n)-nets of low
discrepancy. It turns out that optimum distributions have a rich combinatorial
structure. Namely, we show that optimum distributions can be characterized
completely as maximum distance separable codes with respect to a non-Hamming
metric. Weight spectra of such codes can be evaluated precisely. We also
consider linear codes and distributions and study their general properties
including the duality with respect to a suitable inner product. The
corresponding generalized MacWilliams identities for weight enumerators are
briefly discussed. Broad classes of linear maximum distance separable codes and
linear optimum distributions are explicitely constructed in the paper by the
Hermite interpolations over finite fields.
| [
{
"version": "v1",
"created": "Tue, 28 Sep 1999 08:33:05 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Skriganov",
"M. M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
math/9910062 | Ioannis Kontoyiannis | Ioannis Kontoyiannis | Efficient sphere-covering and converse measure concentration via
generalized coding theorems | 29 pages. See also http://www.stat.purdue.edu/~yiannis/ | null | null | null | math.PR cs.IT math.FA math.IT | null | Suppose A is a finite set equipped with a probability measure P and let M be
a ``mass'' function on A. We give a probabilistic characterization of the most
efficient way in which A^n can be almost-covered using spheres of a fixed
radius. An almost-covering is a subset C_n of A^n, such that the union of the
spheres centered at the points of C_n has probability close to one with respect
to the product measure P^n. An efficient covering is one with small mass
M^n(C_n); n is typically large. With different choices for M and the geometry
on A our results give various corollaries as special cases, including Shannon's
data compression theorem, a version of Stein's lemma (in hypothesis testing),
and a new converse to some measure concentration inequalities on discrete
spaces. Under mild conditions, we generalize our results to abstract spaces and
non-product measures.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 1999 20:28:46 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2000 18:48:32 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Kontoyiannis",
"Ioannis",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/9910149 | Jose Ignacio Farran | J. I. Farran | Rational points, genus and asymptotic behaviour in reduced algebraic
curves over finite fields | 8 pages | null | null | AGT-34 | math.AG cs.IT math.IT math.NT | null | The number A(q) shows the asymptotic behaviour of the quotient of the number
of rational points over the genus of non-singular absolutely irreducible curves
over a finite field Fq. Research on bounds for A(q) is closely connected with
the so-called asymptotic main problem in Coding Theory. In this paper, we study
some generalizations of this number for non-irreducible curves, their
connection with A(q) and its application in Coding Theory.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 1999 14:57:20 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Farran",
"J. I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
math/9910151 | Jose Ignacio Farran | J. I. Farran | Decoding Algebraic Geometry codes by a key equation | 11 pages, submitted to "Finite Fields and their Applications" | null | null | AGT-63 | math.AG cs.IT math.IT math.NA | null | A new effective decoding algorithm is presented for arbitrary
algebraic-geometric codes on the basis of solving a generalized key equation
with the majority coset scheme of Duursma. It is an improvement of Ehrhard's
algorithm, since the method corrects up to the half of the Goppa distance with
complexity order O(n**2.81), and with no further assumption on the degree of
the divisor G.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 1999 15:39:48 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Farran",
"J. I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/9910155 | Jose Ignacio Farran | A. Campillo and J. I. Farran | Computing Weierstrass semigroups and the Feng-Rao distance from singular
plane models | 22 pages, to appear in "Finite Fields and their Applications" | null | null | AGT-58 | math.AG cs.IT math.IT math.NA | null | We present an algorithm to compute the Weierstrass semigroup at a point P
together with functions for each value in the semigroup, provided P is the only
branch at infinity of a singular plane model for the curve. As a byproduct, the
method also provides us with a basis for the spaces L(mP) and the computation
of the Feng-Rao distance for the corresponding array of geometric Goppa codes.
A general computation of the Feng-Rao distance is also obtained. Everything can
be applied to the decoding problem by using the majority scheme of Feng and
Rao.
| [
{
"version": "v1",
"created": "Thu, 28 Oct 1999 09:27:47 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Campillo",
"A.",
""
],
[
"Farran",
"J. I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/9910175 | Alexander Barg | A. Ashikhmin, A. Barg, S. Litsyn | Polynomial method in coding and information theory | 11 pages | null | null | null | math.CO cs.IT math.IT | null | Polynomial, or Delsarte's, method in coding theory accounts for a variety of
structural results on, and bounds on the size of, extremal configurations
(codes and designs) in various metric spaces. In recent works of the authors
the applicability of the method was extended to cover a wider range of problems
in coding and information theory. In this paper we present a general framework
for the method which includes previous results as particular cases. We explain
how this generalization leads to new asymptotic bounds on the performance of
codes in binary-input memoryless channels and the Gaussian channel, which
improve the results of Shannon et al. of 1959-67, and to a number of other
results in combinatorial coding theory.
| [
{
"version": "v1",
"created": "Sun, 31 Oct 1999 00:03:37 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Ashikhmin",
"A.",
""
],
[
"Barg",
"A.",
""
],
[
"Litsyn",
"S.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/9910185 | David Eppstein | Michael B. Dillencourt and David Eppstein and Daniel S. Hirschberg | Geometric Thickness of Complete Graphs | 11 pages, 3 figures. A preliminary version of this paper appeared in
the Sixth Symposium on Graph Drawing, GD '98, (Montr\'eal, Canada, August
1998), Springer-Verlag Lecture Notes in Computer Science 1547, 102--110 | J. Graph Algorithms & Applications 4(3):5-17, 2000 | null | null | math.CO cs.DM | null | We define the geometric thickness of a graph to be the smallest number of
layers such that we can draw the graph in the plane with straight-line edges
and assign each edge to a layer so that no two edges on the same layer cross.
The geometric thickness lies between two previously studied quantities, the
(graph-theoretical) thickness and the book thickness. We investigate the
geometric thickness of the family of complete graphs, K_n. We show that the
geometric thickness of K_n lies between ceiling((n/5.646) + 0.342) and
ceiling(n/4), and we give exact values of the geometric thickness of K_n for n
<= 12 and n in {15,16}. We also consider the geometric thickness of the family
of complete bipartite graphs. In particular, we show that, unlike the case of
complete graphs, there are complete bipartite graphs with arbitrarily large
numbers of vertices for which the geometric thickness coincides with the
standard graph-theoretical thickness.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 1999 22:39:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dillencourt",
"Michael B.",
""
],
[
"Eppstein",
"David",
""
],
[
"Hirschberg",
"Daniel S.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/9911025 | Jose Ignacio Farran | A. Campillo, J. I. Farran and C. Munuera | On the parameters of Algebraic Geometry codes related to Arf semigroups | 12 pages | null | null | AGT-83 | math.NT cs.IT math.AG math.IT | null | In this paper we compute the order (or Feng-Rao) bound on the minimum
distance of one-point algebraic geometry codes, when the Weierstrass semigroup
at the point Q is an Arf semigroup. The results developed to that purpose also
provide the dimension of the improved geometric Goppa codes related to those.
| [
{
"version": "v1",
"created": "Thu, 4 Nov 1999 15:57:56 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Campillo",
"A.",
""
],
[
"Farran",
"J. I.",
""
],
[
"Munuera",
"C.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/9912059 | Philippe Gaucher | Philippe Gaucher | Combinatorics of branchings in higher dimensional automata | Final version, see
http://www.tac.mta.ca/tac/volumes/8/n12/abstract.html | Theory and Applications of Categories, Vol. 8, 2001, No. 12, pp
324-376 | null | null | math.CT cs.OH math.AT | null | We explore the combinatorial properties of the branching areas of execution
paths in higher dimensional automata. Mathematically, this means that we
investigate the combinatorics of the negative corner (or branching) homology of
a globular $\omega$-category and the combinatorics of a new homology theory
called the reduced branching homology. The latter is the homology of the
quotient of the branching complex by the sub-complex generated by its thin
elements. Conjecturally it coincides with the non reduced theory for higher
dimensional automata, that is $\omega$-categories freely generated by
precubical sets. As application, we calculate the branching homology of some
$\omega$-categories and we give some invariance results for the reduced
branching homology. We only treat the branching side. The merging side, that is
the case of merging areas of execution paths is similar and can be easily
deduced from the branching side.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 1999 13:15:11 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Dec 1999 14:05:25 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Feb 2000 15:11:34 GMT"
},
{
"version": "v4",
"created": "Thu, 5 Jul 2001 13:40:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gaucher",
"Philippe",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
nlin/0001057 | Theodore C. Belding | Theodore C. Belding | Numerical Replication of Computer Simulations: Some Pitfalls and How To
Avoid Them | January 25 2000 draft, submitted to GECCO 2000, 6 pages | null | null | null | nlin.AO cs.NE | null | A computer simulation, such as a genetic algorithm, that uses IEEE standard
floating-point arithmetic may not produce exactly the same results in two
different runs, even if it is rerun on the same computer with the same input
and random number seeds. Researchers should not simply assume that the results
from one run replicate those from another but should verify this by actually
comparing the data. However, researchers who are aware of this pitfall can
reliably replicate simulations, in practice. This paper discusses the problem
and suggests solutions.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2000 03:08:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Belding",
"Theodore C.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
nlin/0002040 | Kai Nagel | Kai Nagel, Marcus Rickert, Patrice M. Simon, Martin Pieck | The dynamics of iterated transportation simulations | 24 pages, 7 figures | null | null | null | nlin.AO cs.CE | null | Iterating between a router and a traffic micro-simulation is an increasibly
accepted method for doing traffic assignment. This paper, after pointing out
that the analytical theory of simulation-based assignment to-date is
insufficient for some practical cases, presents results of simulation studies
from a real world study. Specifically, we look into the issues of uniqueness,
variability, and robustness and validation. Regarding uniqueness, despite some
cautionary notes from a theoretical point of view, we find no indication of
``meta-stable'' states for the iterations. Variability however is considerable.
By variability we mean the variation of the simulation of a given plan set by
just changing the random seed. We show then results from three different
micro-simulations under the same iteration scenario in order to test for the
robustness of the results under different implementations. We find the results
encouraging, also when comparing to reality and with a traditional assignment
result.
Keywords: dynamic traffic assignment (DTA); traffic micro-simulation;
TRANSIMS; large-scale simulations; urban planning
| [
{
"version": "v1",
"created": "Wed, 23 Feb 2000 01:42:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nagel",
"Kai",
""
],
[
"Rickert",
"Marcus",
""
],
[
"Simon",
"Patrice M.",
""
],
[
"Pieck",
"Martin",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
nlin/0004007 | Gregory J. Chaitin | G.J. Chaitin (IBM Research) | A Century of Controvery Over the Foundations of Mathematics II | 16 pages in html using Symbol font for Greek letters | null | null | null | nlin.CD cs.CC math.HO | null | Transcript of G.J. Chaitin's 2 March 2000 Carnegie Mellon University School
of Computer Science Distinguished Lecture. The notion of randomness is taken
from physics and applied to pure mathematics in order to shed light on the
incompleteness phenomenon discovered by K. Godel.
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2000 19:44:58 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2000 15:11:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chaitin",
"G. J.",
"",
"IBM Research"
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
}
] |
nlin/0006025 | Cosma Rohilla Shalizi | Cosma Rohilla Shalizi and James P. Crutchfield (Santa Fe Institute) | Information Bottlenecks, Causal States, and Statistical Relevance Bases:
How to Represent Relevant Information in Memoryless Transduction | 3 pages, no figures, submitted to PRE as a "brief report". Revision:
added an acknowledgements section originally omitted by a LaTeX bug | Advances in Complex Systems, vol. 5, pp. 91--95 (2002) | 10.1142/S0219525902000481 | null | nlin.AO cond-mat.dis-nn cs.LG physics.data-an | null | Discovering relevant, but possibly hidden, variables is a key step in
constructing useful and predictive theories about the natural world. This brief
note explains the connections between three approaches to this problem: the
recently introduced information-bottleneck method, the computational mechanics
approach to inferring optimal models, and Salmon's statistical relevance basis.
| [
{
"version": "v1",
"created": "Fri, 16 Jun 2000 17:01:39 GMT"
}
] | 2022-02-17T00:00:00 | [
[
"Shalizi",
"Cosma Rohilla",
"",
"Santa Fe Institute"
],
[
"Crutchfield",
"James P.",
"",
"Santa Fe Institute"
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
nlin/0102026 | Chau Hoi Fung | K. M. Lee, Hao Xu and H. F. Chau | Parity Problem With A Cellular Automaton Solution | Revtex, 4 pages, final version accepted by Phys.Rev.E | null | 10.1103/PhysRevE.64.026702 | null | nlin.CG cond-mat.stat-mech cs.CC nlin.AO | null | The parity of a bit string of length $N$ is a global quantity that can be
efficiently compute using a global counter in ${O} (N)$ time. But is it
possible to find the parity using cellular automata with a set of local rule
tables without using any global counter? Here, we report a way to solve this
problem using a number of $r=1$ binary, uniform, parallel and deterministic
cellular automata applied in succession for a total of ${O} (N^2)$ time.
| [
{
"version": "v1",
"created": "Wed, 21 Feb 2001 09:16:50 GMT"
},
{
"version": "v2",
"created": "Thu, 3 May 2001 13:46:59 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Lee",
"K. M.",
""
],
[
"Xu",
"Hao",
""
],
[
"Chau",
"H. F.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
nlin/0103057 | Chau Hoi Fung | H. F. Chau, H. Xu, K. M. Lee, L. W. Siu and K. K. Yan | Finding The Sign Of A Function Value By Binary Cellular Automaton | Revtex, uses amsfonts, 10 pages | null | 10.1142/S0129183102003929 | null | nlin.CG cond-mat cs.CC | null | Given a continuous function $f(x)$, suppose that the sign of $f$ only has
finitely many discontinuous points in the interval $[0,1]$. We show how to use
a sequence of one dimensional deterministic binary cellular automata to
determine the sign of $f(\rho)$ where $\rho$ is the (number) density of 1s in
an arbitrarily given bit string of finite length provided that $f$ satisfies
certain technical conditions.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2001 10:33:26 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Chau",
"H. F.",
""
],
[
"Xu",
"H.",
""
],
[
"Lee",
"K. M.",
""
],
[
"Siu",
"L. W.",
""
],
[
"Yan",
"K. K.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
null,
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
nlin/0109001 | Carlos Gershenson | Carlos Gershenson | Complex Philosophy | null | null | null | null | nlin.AO cs.CC | null | We present several philosophical ideas emerging from the studies of complex
systems. We make a brief introduction to the basic concepts of complex systems,
for then defining "abstraction levels". These are useful for representing
regularities in nature. We define absolute being (observer independent,
infinite) and relative being (observer dependent, finite), and notice the
differences between them. We draw issues on relative causality and absolute
causality among abstraction levels. We also make reflections on determinism. We
reject the search for any absolute truth (because of their infinity), and
promote the idea that all comprehensible truths are relative, since they were
created in finite contexts. This leads us to suggest to search the
less-incompleteness of ideas and contexts instead of their truths.
| [
{
"version": "v1",
"created": "Sat, 1 Sep 2001 10:50:22 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Nov 2001 19:13:41 GMT"
},
{
"version": "v3",
"created": "Fri, 31 May 2002 20:57:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
nlin/0109019 | Eugeni Balkovsky | Eugene Balkovsky, Boris I. Shraiman | Olfactory search at high Reynolds number | 6 pages, 4 figures | null | 10.1073/pnas.192393499 | null | nlin.CD cs.RO nlin.AO physics.bio-ph | null | Locating the source of odor in a turbulent environment - a common behavior
for living organisms - is non-trivial because of the random nature of mixing.
Here we analyze the statistical physics aspects of the problem and propose an
efficient strategy for olfactory search which can work in turbulent plumes. The
algorithm combines the maximum likelihood inference of the source position with
an active search. Our approach provides the theoretical basis for the design of
olfactory robots and the quantitative tools for the analysis of the observed
olfactory search behavior of living creatures (e.g. odor modulated optomotor
anemotaxis of moth)
| [
{
"version": "v1",
"created": "Tue, 18 Sep 2001 20:29:24 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Balkovsky",
"Eugene",
""
],
[
"Shraiman",
"Boris I.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
}
] |
nlin/0202038 | Marc Toussaint | Marc Toussaint | On model selection and the disability of neural networks to decompose
tasks | LaTeX, 7 pages, 3 figures | Proceedings of the International Joint Conference on Neural
Networks (IJCNN 2002), 245-250. | null | null | nlin.AO cond-mat.dis-nn cs.NE | null | A neural network with fixed topology can be regarded as a parametrization of
functions, which decides on the correlations between functional variations when
parameters are adapted. We propose an analysis, based on a differential
geometry point of view, that allows to calculate these correlations. In
practise, this describes how one response is unlearned while another is
trained. Concerning conventional feed-forward neural networks we find that they
generically introduce strong correlations, are predisposed to forgetting, and
inappropriate for task decomposition. Perspectives to solve these problems are
discussed.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2002 12:39:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toussaint",
"Marc",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
nlin/0202039 | Marc Toussaint | Marc Toussaint | A neural model for multi-expert architectures | LaTeX, 8 pages, 5 figures | Proceedings of the International Joint Conference on Neural
Networks (IJCNN 2002), 2755-2760. | null | null | nlin.AO cond-mat.dis-nn cs.NE | null | We present a generalization of conventional artificial neural networks that
allows for a functional equivalence to multi-expert systems. The new model
provides an architectural freedom going beyond existing multi-expert models and
an integrative formalism to compare and combine various techniques of learning.
(We consider gradient, EM, reinforcement, and unsupervised learning.) Its
uniform representation aims at a simple genetic encoding and evolutionary
structure optimization of multi-expert systems. This paper contains a detailed
description of the model and learning rules, empirically validates its
functionality, and discusses future perspectives.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2002 13:11:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toussaint",
"Marc",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
nlin/0204038 | Marc Toussaint | Marc Toussaint and Christian Igel | Neutrality: A Necessity for Self-Adaptation | 6 pages, 3 figures, LaTeX | Proceedings of the Congress on Evolutionary Computation (CEC
2002), 1354-1359. | null | null | nlin.AO cs.NE q-bio | null | Self-adaptation is used in all main paradigms of evolutionary computation to
increase efficiency. We claim that the basis of self-adaptation is the use of
neutrality. In the absence of external control neutrality allows a variation of
the search distribution without the risk of fitness loss.
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2002 12:58:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toussaint",
"Marc",
""
],
[
"Igel",
"Christian",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
null
] |
nlin/0207032 | Chau Hoi Fung | Hao Xu, K. M. Lee and H. F. Chau | Modulo Three Problem With A Cellular Automaton Solution | 10 pages in revtex 4.0, using amsfonts | null | 10.1142/S0129183103004450 | null | nlin.CG cs.CC | null | An important global property of a bit string is the number of ones in it. It
has been found that the parity (odd or even) of this number can be found by a
sequence of deterministic, translational invariant cellular automata with
parallel update in succession for a total of O(N^2) time. In this paper, we
discover a way to check if this number is divisible by three using the same
kind of cellular automata in O(N^3) time. We also speculate that the method
described here could be generalized to check if it is divisible by four and
other positive integers.
| [
{
"version": "v1",
"created": "Thu, 18 Jul 2002 09:17:04 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Xu",
"Hao",
""
],
[
"Lee",
"K. M.",
""
],
[
"Chau",
"H. F.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
nlin/0210041 | Marcel Ausloos | Marcel Ausloos (Univ. de Liege), Paulette Clippe (Univ. de Liege) and
Andrzej Pekalski (University of Wroclaw) | Simple Model for the Dynamics of Correlations in the Evolution of
Economic Entities Under Varying Economic Conditions | Presented at Bali IEC02 symposium, Aug. 2002; submitted to Physica A
; 8 pages, 5 figures | Physica A 324 (2003) 330-337 | 10.1016/S0378-4371(02)01844-7 | null | nlin.AO cond-mat.stat-mech cs.CE physics.soc-ph | null | From some observations on economic behaviors, in particular changing economic
conditions with time and space, we develop a very simple model for the
evolution of economic entities within a geographical type of framework. We
raise a few questions and attempt to investigate whether some of them can be
tackled by our model. Several cases of interest are reported. It is found that
the model even in its simple forms can lead to a large variety of situations,
including: delocalization and cycles, but also pre-chaotic behavior.
| [
{
"version": "v1",
"created": "Fri, 18 Oct 2002 11:35:49 GMT"
}
] | 2012-08-31T00:00:00 | [
[
"Ausloos",
"Marcel",
"",
"Univ. de Liege"
],
[
"Clippe",
"Paulette",
"",
"Univ. de Liege"
],
[
"Pekalski",
"Andrzej",
"",
"University of Wroclaw"
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
nlin/0211010 | Roland Rothenstein | R. Rothenstein and K. Pawelzik | Evolution and anti-evolution in a minimal stock market model | 13 pages, 5 figures | Physica A 326, 534-543(2003) | 10.1016/S0378-4371(03)00396-0 | null | nlin.AO cond-mat.stat-mech cs.MA q-fin.TR | null | We present a novel microscopic stock market model consisting of a large
number of random agents modeling traders in a market. Each agent is
characterized by a set of parameters that serve to make iterated predictions of
two successive returns. The future price is determined according to the offer
and the demand of all agents. The system evolves by redistributing the capital
among the agents in each trading cycle. Without noise the dynamics of this
system is nearly regular and thereby fails to reproduce the stochastic return
fluctuations observed in real markets. However, when in each cycle a small
amount of noise is introduced we find the typical features of real financial
time series like fat-tails of the return distribution and large temporal
correlations in the volatility without significant correlations in the price
returns. Introducing the noise by an evolutionary process leads to different
scalings of the return distributions that depend on the definition of fitness.
Because our realistic model has only very few parameters, and the results
appear to be robust with respect to the noise level and the number of agents we
expect that our framework may serve as new paradigm for modeling self generated
return fluctuations in markets.
| [
{
"version": "v1",
"created": "Thu, 7 Nov 2002 23:15:48 GMT"
},
{
"version": "v2",
"created": "Wed, 7 May 2003 15:09:30 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Rothenstein",
"R.",
""
],
[
"Pawelzik",
"K.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.TR",
"description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making",
"span": "(Trading and Market Microstructure)"
}
] |
nlin/0211013 | Fariel Shafee | Fariel Shafee | A Spin Glass Model of Human Logic Systems | null | null | null | null | nlin.AO cond-mat.dis-nn cs.MA | null | In this paper, we discuss different models for human logic systems and
describe a game with nature. G\"odel`s incompleteness theorem is taken into
account to construct a model of logical networks based on axioms obtained by
symmetry breaking. These classical logic networks are then coupled using rules
that depend on whether two networks contain axioms or anti-axioms. The social
lattice of axiom based logic networks is then placed with the environment
network in a game including entropy as a cost factor. The classical logical
networks are then replaced with ``preference axioms'' to the role of fuzzy
logic.
| [
{
"version": "v1",
"created": "Fri, 8 Nov 2002 16:40:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shafee",
"Fariel",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
nlin/0211024 | Hugo Fort Quijano | H. Fort | Exploring the cooperative regimes in a model of agents without memory or
"tags": indirect reciprocity vs. selfish incentives | 11 pages, 5 figures | Physica A326 (2003) 286-298 | 10.1016/S0378-4371(03)00263-2 | null | nlin.AO cond-mat cs.CE hep-lat nlin.CG physics.soc-ph | null | The self-organization in cooperative regimes in a simple mean-field version
of a model based on "selfish" agents which play the Prisoner's Dilemma (PD)
game is studied. The agents have no memory and use strategies not based on
direct reciprocity nor 'tags'. Two variables are assigned to each agent $i$ at
time $t$, measuring its capital $C(i;t)$ and its probability of cooperation
$p(i;t)$. At each time step $t$ a pair of agents interact by playing the PD
game. These 2 agents update their probability of cooperation $p(i)$ as follows:
they compare the profits they made in this interaction $\delta C(i;t)$ with an
estimator $\epsilon(i;t)$ and, if $\delta C(i;t) \ge \epsilon(i;t)$, agent $i$
increases its $p(i;t)$ while if $\delta C(i;t) < \epsilon(i;t)$ the agent
decreases $p(i;t)$. The 4!=24 different cases produced by permuting the four
Prisoner's Dilemma canonical payoffs 3, 0, 1, and 5 -
corresponding,respectively, to $R$ (reward), $S$ (sucker's payoff), $T$
(temptation to defect) and $P$ (punishment) - are analyzed. It turns out that
for all these 24 possibilities, after a transient,the system self-organizes
into a stationary state with average equilibrium probability of cooperation
$\bar{p}_\infty$ = constant $ > 0$.Depending on the payoff matrix, there are
different equilibrium states characterized by their average probability of
cooperation and average equilibrium per-capita-income
($\bar{p}_\infty,\bar{\delta C}_\infty$).
| [
{
"version": "v1",
"created": "Fri, 15 Nov 2002 17:48:45 GMT"
}
] | 2009-11-07T00:00:00 | [
[
"Fort",
"H.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
null,
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "hep-lat",
"description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.",
"span": "(High Energy Physics - Lattice)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
nlin/0212001 | Kohtaro Tadaki | Kohtaro Tadaki | A Generalization of Chaitin's Halting Probability \Omega and Halting
Self-Similar Sets | 29 pages, LaTeX2e, AMSLaTeX1.2, \usepackage{a4wide}, no figures | Hokkaido Mathematical Journal, Vol. 31, No. 1, February 2002,
219-253 | 10.14492/hokmj/1350911778 | null | nlin.CD cs.CC | null | We generalize the concept of randomness in an infinite binary sequence in
order to characterize the degree of randomness by a real number D>0. Chaitin's
halting probability \Omega is generalized to \Omega^D whose degree of
randomness is precisely D. On the basis of this generalization, we consider the
degree of randomness of each point in Euclidean space through its base-two
expansion. It is then shown that the maximum value of such a degree of
randomness provides the Hausdorff dimension of a self-similar set that is
computable in a certain sense. The class of such self-similar sets includes
familiar fractal sets such as the Cantor set, von Koch curve, and Sierpinski
gasket. Knowledge of the property of \Omega^D allows us to show that the
self-similar subset of [0,1] defined by the halting set of a universal
algorithm has a Hausdorff dimension of one.
| [
{
"version": "v1",
"created": "Mon, 2 Dec 2002 06:54:47 GMT"
}
] | 2019-09-04T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
nlin/0212030 | Marc Toussaint | Marc Toussaint | The structure of evolutionary exploration: On crossover, buildings
blocks and Estimation-Of-Distribution Algorithms | 11 pages, 2 figures, draft | null | null | null | nlin.AO cs.NE q-bio | null | The notion of building blocks can be related to the structure of the
offspring probability distribution: loci of which variability is strongly
correlated constitute a building block. We call this correlated exploration.
With this background we analyze the structure of the offspring probability
distribution, or exploration distribution, for a GA with mutation only, a
crossover GA, and an Estimation-Of-Distribution Algorithm (EDA). The results
allow a precise characterization of the structure of the crossover exploration
distribution. Essentially, the crossover operator destroys mutual information
between loci by transforming it into entropy; it does the inverse of correlated
exploration. In contrast, the objective of EDAs is to model the mutual
information between loci in the fitness distribution and thereby they induce
correlated exploration.
| [
{
"version": "v1",
"created": "Wed, 11 Dec 2002 19:28:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toussaint",
"Marc",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
null
] |
nlin/0303016 | Paul Vitanyi | Paul Vitanyi (CWI and University of Amsterdam) | Algorithmic Chaos | 7 pages LaTeX | null | null | null | nlin.CD cs.CC math.DS | null | Many physical theories like chaos theory are fundamentally concerned with the
conceptual tension between determinism and randomness. Kolmogorov complexity
can express randomness in determinism and gives an approach to formulate
chaotic behavior.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2003 18:37:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
nlin/0303020 | Carlos Gershenson | Carlos Gershenson and Francis Heylighen | When Can we Call a System Self-organizing? | 8 pages, 1 figure | In Banzhaf, W, T. Christaller, P. Dittrich, J. T. Kim, and J.
Ziegler, Advances in Artificial Life, 7th European Conference, ECAL 2003,
Dortmund, Germany, pp. 606-614. LNAI 2801. Springer. | null | null | nlin.AO cond-mat.dis-nn cond-mat.stat-mech cs.CC | null | We do not attempt to provide yet another definition of selforganization, but
explore the conditions under which we can model a system as self-organizing.
These involve the dynamics of entropy, and the purpose, aspects, and
description level chosen by an observer. We show how, changing the level or
"graining" of description, the same system can appear selforganizing or
self-disorganizing. We discuss ontological issues we face when studying
self-organizing systems, and analyse when designing and controlling artificial
self-organizing systems is useful. We conclude that self-organization is a way
of observing systems, not an absolute class of systems.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2003 18:24:04 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jun 2003 19:48:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
],
[
"Heylighen",
"Francis",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
nlin/0303021 | Carlos Gershenson | Carlos Gershenson, Jan Broekaert, and Diederik Aerts | Contextual Random Boolean Networks | 10 pages, 5 figures | In Banzhaf, W, T. Christaller, P. Dittrich, J. T. Kim, and J.
Ziegler, Advances in Artificial Life, 7th European Conference, ECAL 2003,
Dortmund, Germany, pp. 615-624. LNAI 2801. Springer. | null | null | nlin.AO cond-mat.dis-nn cs.CC nlin.CG | null | We propose the use of Deterministic Generalized Asynchronous Random Boolean
Networks [Gershenson, 2002] as models of contextual deterministic discrete
dynamical systems. We show that changes in the context have drastic effects on
the global properties of the same networks, namely the average number of
attractors and the average percentage of states in attractors. We introduce the
situation where we lack knowledge on the context as a more realistic model for
contextual dynamical systems. We notice that this makes the network
non-deterministic in a specific way, namely introducing a non-Kolmogorovian
quantum-like structure for the modelling of the network [Aerts, 1986]. In this
case, for example, a state of the network has the potentiality (probability) of
collapsing into different attractors, depending on the specific form of lack of
knowledge on the context.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2003 18:42:57 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jun 2003 20:05:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
],
[
"Broekaert",
"Jan",
""
],
[
"Aerts",
"Diederik",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
] |
nlin/0304006 | Pontus Svenson | Pontus Svenson and Hedvig Sidenbladh | Determining possible avenues of approach using ANTS | 8 pages, 12 figures. Accepted for 6th Int. Conf. Information Fusion,
Cairns 2003 | Proc 6th Int Conf Information Fusion, Cairns, p 1110 (2003) | null | null | nlin.AO cs.AI | null | Threat assessment is an important part of level 3 data fusion. Here we study
a subproblem of this, worst-case risk assessment. Inspired by agent-based
models used for simulation of trail formation for urban planning, we use ant
colony optimization (ANTS) to determine possible avenues of approach for the
enemy, given a situation picture.
One way of determining such avenues would be to calculate the ``potential
field'' caused by placing sources at possible goals for the enemy. This
requires postulating a functional form for the potential, and also takes long
time. Here we instead seek a method for quickly obtaining an effective
potential. ANTS, which has previously been used to obtain approximate solutions
to various optimization problems, is well suited for this. The output of our
method describes possible avenues of approach for the enemy, i.e, areas where
we should be prepared for attack. (The algorithm can also be run ``reversed''
to instead get areas of opportunity for our forces to exploit.)
Using real geographical data, we found that our method gives a fast and
reliable way of determining such avenues. Our method can be used in a
computer-based command and control system to replace the first step of human
intelligence analysis.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2003 15:25:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Svenson",
"Pontus",
""
],
[
"Sidenbladh",
"Hedvig",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
nlin/0306055 | Andreas U. Schnmidt | Andreas U. Schmidt | A Model for Prejudiced Learning in Noisy Environments | 21 pages, 11 figures; reduced graphics to slash size, full version on
Author's homepage. Minor revisions in text and references, identical to
version to be published in Applied Mathematics and Computation | Applied Mathematics and Computation, vol. 168, no. 1 (2005)
354-379 | 10.1016/j.amc.2004.09.003 | null | nlin.AO cs.LG | null | Based on the heuristics that maintaining presumptions can be beneficial in
uncertain environments, we propose a set of basic axioms for learning systems
to incorporate the concept of prejudice. The simplest, memoryless model of a
deterministic learning rule obeying the axioms is constructed, and shown to be
equivalent to the logistic map. The system's performance is analysed in an
environment in which it is subject to external randomness, weighing learning
defectiveness against stability gained. The corresponding random dynamical
system with inhomogeneous, additive noise is studied, and shown to exhibit the
phenomena of noise induced stability and stochastic bifurcations. The overall
results allow for the interpretation that prejudice in uncertain environments
entails a considerable portion of stubbornness as a secondary phenomenon.
| [
{
"version": "v1",
"created": "Thu, 26 Jun 2003 10:12:58 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Sep 2004 10:31:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Andreas U.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
nlin/0309033 | Joseph Wakeling | Paolo Laureti, Peter Ruch, Joseph Wakeling and Yi-Cheng Zhang | The Interactive Minority Game: a Web-based investigation of human market
interactions | 11 pages, 1 table, 5 figures. This replacement contains a few small
corrections made during publication | Physica A 331 (2004) 651-659 | 10.1016/j.physa.2003.07.002 | null | nlin.AO cond-mat.stat-mech cs.HC physics.soc-ph | null | The unprecedented access offered by the World Wide Web brings with it the
potential to gather huge amounts of data on human activities. Here we exploit
this by using a toy model of financial markets, the Minority Game (MG), to
investigate human speculative trading behaviour and information capacity.
Hundreds of individuals have played a total of tens of thousands of game turns
against computer-controlled agents in the Web-based_Interactive Minority Game_.
The analytical understanding of the MG permits fine-tuning of the market
situations encountered, allowing for investigation of human behaviour in a
variety of controlled environments. In particular, our results indicate a
transition in players' decision-making, as the markets become more difficult,
between deductive behaviour making use of short-term trends in the market, and
highly repetitive behaviour that ignores entirely the market history, yet
outperforms random decision-making.
PACS: 02.50.Le; 89.65.Gh; 89.70.+c
Keywords: Decision theory and game theory; Economics and financial markets;
Information theory
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2003 17:25:11 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Nov 2003 17:48:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laureti",
"Paolo",
""
],
[
"Ruch",
"Peter",
""
],
[
"Wakeling",
"Joseph",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
nlin/0309039 | Carlos Gershenson | Carlos Gershenson | Self-organizing Traffic Control: First Results | 10 pages, 3 figures | null | null | null | nlin.AO cs.MA | null | We developed a virtual laboratory for traffic control where agents use
different strategies in order to self-organize on the road. We present our
first results where we compare the performance and behaviour promoted by
environmental constrains and five different simple strategies: three inspired
in flocking behaviour, one selfish, and one inspired in the minority game.
Experiments are presented for comparing the strategies. Different issues are
discussed, such as the important role of environmental constrains and the
emergence of traffic lanes.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2003 20:39:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
nlin/0311008 | Carlos Gershenson | Carlos Gershenson | Phase Transitions in Random Boolean Networks with Different Updating
Schemes | More info and better images at
http://homepages.vub.ac.be/~cgershen/rbn | null | null | null | nlin.AO cond-mat.stat-mech cs.CC nlin.CG q-bio.QM | null | In this paper we study the phase transitions of different types of Random
Boolean networks. These differ in their updating scheme: synchronous,
semi-synchronous, or asynchronous, and deterministic or non-deterministic. It
has been shown that the statistical properties of Random Boolean networks
change considerable according to the updating scheme. We study with computer
simulations sensitivity to initial conditions as a measure of order/chaos. We
find that independently of their updating scheme, all network types have very
similar phase transitions, namely when the average number of connections of
nodes is between one and three. This critical value depends more on the size of
the network than on the updating scheme.
| [
{
"version": "v1",
"created": "Wed, 5 Nov 2003 19:09:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
nlin/0312056 | Ricardo Lopez-Ruiz | Ricardo Lopez-Ruiz | Shannon information, LMC complexity and Renyi entropies: a
straightforward approach | 11 pages, 0 figures | null | null | null | nlin.AO cond-mat.stat-mech cs.IT math.IT nlin.CD physics.comp-ph q-bio.QM | null | The LMC complexity, an indicator of complexity based on a probabilistic
description, is revisited. A straightforward approach allows us to establish
the time evolution of this indicator in a near-equilibrium situation and gives
us a new insight for interpreting the LMC complexity for a general non
equilibrium system. Its relationship with the Renyi entropies is also
explained. One of the advantages of this indicator is that its calculation does
not require a considerable computational effort in many cases of physical and
biological interest.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2003 17:30:42 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Lopez-Ruiz",
"Ricardo",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
nlin/0402006 | Carlos Gershenson | Carlos Gershenson | Updating Schemes in Random Boolean Networks: Do They Really Matter? | To be Published in Artificial Life IX. 6 pages, 7 figures. More info
and better images at http://homepages.vub.ac.be/~cgershen/rbn | In Pollack, J., M. Bedau, P. Husbands, T. Ikegami, and R. A.
Watson (eds.) Artificial Life IX, Proceedings of the Ninth International
Conference on the Simulation and Synthesis of Living Systems. pp. 238-243.
MIT Press. 2004 | null | null | nlin.AO cond-mat.other cs.CC nlin.CG q-bio.MN q-bio.OT q-bio.QM | null | In this paper we try to end the debate concerning the suitability of
different updating schemes in random Boolean networks (RBNs). We quantify for
the first time loose attractors in asyncrhonous RBNs, which allows us to
analyze the complexity reduction related to different updating schemes. We also
report that all updating schemes yield very similar critical stability values,
meaning that the "edge of chaos" does not depend much on the updating scheme.
After discussion, we conclude that synchonous RBNs are justifiable theoretical
models of biological networks.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2004 15:08:26 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Feb 2004 14:41:25 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Apr 2004 14:06:25 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
nlin/0402046 | Venkat Venkatasubramanian | Venkat Venkatasubramanian, Santhoji Katare, Priyan R. Patkar, and
Fangping Mu | Spontaneous Emergence of Complex Optimal Networks through Evolutionary
Adaptation | In press, Computers and Chemical Engg., 2004, 21 pages, 12 figures, 1
table | null | null | null | nlin.AO cond-mat.stat-mech cs.MA nlin.CG q-bio.QM | null | An important feature of many complex systems, both natural and artificial, is
the structure and organization of their interaction networks with interesting
properties. Here we present a theory of self-organization by evolutionary
adaptation in which we show how the structure and organization of a network is
related to the survival, or in general the performance, objectives of the
system. We propose that a complex system optimizes its network structure in
order to maximize its overall survival fitness which is composed of short-term
and long-term survival components. These in turn depend on three critical
measures of the network, namely, efficiency, robustness and cost, and the
environmental selection pressure. Using a graph theoretical case study, we show
that when efficiency is paramount the "Star" topology emerges and when
robustness is important the "Circle" topology is found. When efficiency and
robustness requirements are both important to varying degrees, other classes of
networks such as the "Hub" emerge. Our assumptions and results are consistent
with observations across a wide variety of applications.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2004 23:56:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkatasubramanian",
"Venkat",
""
],
[
"Katare",
"Santhoji",
""
],
[
"Patkar",
"Priyan R.",
""
],
[
"Mu",
"Fangping",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
nlin/0404004 | Carlos Gershenson | Carlos Gershenson and Francis Heylighen (Vrije Universiteit Brussel) | Protocol Requirements for Self-organizing Artifacts: Towards an Ambient
Intelligence | To be presented at 5th International Conference on Complex Systems | Minai, A., Braha, D., and Bar-Yam, Y., editors, Unifying Themes in
Complex Systems, volume V, pages 136-143. Springer, Berlin Heidelberg, 2011 | 10.1007/978-3-642-17635-7_17 | VUB AI Lab Memo 04-04 | nlin.AO cs.AI | null | We discuss which properties common-use artifacts should have to collaborate
without human intervention. We conceive how devices, such as mobile phones,
PDAs, and home appliances, could be seamlessly integrated to provide an
"ambient intelligence" that responds to the user's desires without requiring
explicit programming or commands. While the hardware and software technology to
build such systems already exists, as yet there is no standard protocol that
can learn new meanings. We propose the first steps in the development of such a
protocol, which would need to be adaptive, extensible, and open to the
community, while promoting self-organization. We argue that devices,
interacting through "game-like" moves, can learn to agree about how to
communicate, with whom to cooperate, and how to delegate and coordinate
specialized tasks. Thus, they may evolve a distributed cognition or collective
intelligence capable of tackling complex tasks.
| [
{
"version": "v1",
"created": "Thu, 1 Apr 2004 16:14:54 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Apr 2004 13:59:03 GMT"
}
] | 2013-04-05T00:00:00 | [
[
"Gershenson",
"Carlos",
"",
"Vrije Universiteit Brussel"
],
[
"Heylighen",
"Francis",
"",
"Vrije Universiteit Brussel"
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
nlin/0404032 | David Wolpert | David H. Wolpert | Metrics for more than two points at once | 8 pages | null | null | null | nlin.AO cond-mat.other cs.LG math.GM | null | The conventional definition of a topological metric over a space specifies
properties that must be obeyed by any measure of "how separated" two points in
that space are. Here it is shown how to extend that definition, and in
particular the triangle inequality, to concern arbitrary numbers of points.
Such a measure of how separated the points within a collection are can be
bootstrapped, to measure "how separated" from each other are two (or more)
collections. The measure presented here also allows fractional membership of an
element in a collection. This means it directly concerns measures of ``how
spread out" a probability distribution over a space is. When such a measure is
bootstrapped to compare two collections, it allows us to measure how separated
two probability distributions are, or more generally, how separated a
distribution of distributions is.
| [
{
"version": "v1",
"created": "Fri, 16 Apr 2004 02:31:43 GMT"
}
] | 2007-10-15T00:00:00 | [
[
"Wolpert",
"David H.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
nlin/0405038 | Shujun Li Dr. | Shujun Li | When Chaos Meets Computers | 7 pages, 5 figures | null | null | null | nlin.CD cs.NA | null | This paper focuses on an interesting phenomenon when chaos meets computers.
It is found that digital computers are absolutely incapable of showing true
long-time dynamics of some chaotic systems, including the tent map, the
Bernoulli shift map and their analogues, even in a high-precision
floating-point arithmetic. Although the results cannot directly generalized to
most chaotic systems, the risk of using digital computers to numerically study
continuous dynamical systems is shown clearly. As a result, we reach the old
saying that "it is impossible to do everything with computers only".
| [
{
"version": "v1",
"created": "Fri, 14 May 2004 12:21:10 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jun 2004 14:05:43 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Dec 2005 16:45:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
nlin/0407032 | Bobby Eka Gunara | F.P. Zen, B.E. Gunara, W. Hidayat, Z.A. Thalib, H. Zainuddin, J.
Aminuddin | Application of Artificial Neural Network in Jitter Analysis of
Dispersion-Managed Communication System | 9 pages, 5 figures | null | null | null | nlin.PS cs.AI cs.NA | null | Artificial Neural Network (ANN) is used as numerical methode in solving
modified Nonlinear Schroedinger (NLS) equation with Dispersion Managed System
(DMS) for jitter analysis. We take the optical axis z and the time t as input,
and then some relevant values such as the change of position and the center
frequency of the pulse, and further the mean square time of incoming pulse
which are needed for jitter analysis. It shows that ANN yields numerical
solutions which are adaptive with respect to the numerical errors and also
verifies the previous numerical results using conventional numerical method.
Our result indicates that DMS can minimize the timing jitter induced by some
amplifiers.
| [
{
"version": "v1",
"created": "Wed, 14 Jul 2004 03:04:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zen",
"F. P.",
""
],
[
"Gunara",
"B. E.",
""
],
[
"Hidayat",
"W.",
""
],
[
"Thalib",
"Z. A.",
""
],
[
"Zainuddin",
"H.",
""
],
[
"Aminuddin",
"J.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.PS",
"description": "Pattern formation, coherent structures, solitons",
"span": "(Pattern Formation and Solitons)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
nlin/0407052 | Shujun Li Dr. | Shujun Li, Gonzalo \'Alvarez, Guanrong Chen and Xuanqin Mou | Breaking a chaos-noise-based secure communication scheme | RevTeX4, 11 pages, 15 figures | Chaos, vol. 15, no. 1, art. no. 013703, March 2005 | 10.1063/1.1856711 | null | nlin.CD cs.CR | null | This paper studies the security of a secure communication scheme based on two
discrete-time intermittently-chaotic systems synchronized via a common random
driving signal. Some security defects of the scheme are revealed: 1) the key
space can be remarkably reduced; 2) the decryption is insensitive to the
mismatch of the secret key; 3) the key-generation process is insecure against
known/chosen-plaintext attacks. The first two defects mean that the scheme is
not secure enough against brute-force attacks, and the third one means that an
attacker can easily break the cryptosystem by approximately estimating the
secret key once he has a chance to access a fragment of the generated
keystream. Yet it remains to be clarified if intermittent chaos could be used
for designing secure chaotic cryptosystems.
| [
{
"version": "v1",
"created": "Fri, 23 Jul 2004 20:57:06 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Dec 2004 09:49:20 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Jan 2005 08:57:11 GMT"
},
{
"version": "v4",
"created": "Tue, 13 Sep 2005 11:09:00 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Álvarez",
"Gonzalo",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Mou",
"Xuanqin",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
nlin/0407062 | Sergey Yu. Vernov | S. Yu. Vernov (Skobeltsyn Institute of Nuclear Physics of Moscow State
University) | Construction of Single-valued Solutions for Nonintegrable Systems with
the Help of the Painleve Test | The proceedings of the International Conference "Computer Algebra in
Scientific Computing" (CASC 2004, Jule 12 - 19, 2004, St. Petersburg,
Russia), eds. V.G. Ganzha, E.W. Mayr, E.V. Vorozhtsov, Technische
Universitat, Munchen, Garching, Germany, 2004, pp. 457-465 | null | null | null | nlin.SI astro-ph.SR cs.MS math-ph math.DS math.MP | null | The Painleve test is very useful to construct not only the Laurent-series
solutions but also the elliptic and trigonometric ones. Such single-valued
functions are solutions of some polynomial first order differential equations.
To find the elliptic solutions we transform an initial nonlinear differential
equation in a nonlinear algebraic system in parameters of the Laurent-series
solutions of the initial equation. The number of unknowns in the obtained
nonlinear system does not depend on number of arbitrary coefficients of the
used first order equation. In this paper we describe the corresponding
algorithm, which has been realized in REDUCE and Maple.
| [
{
"version": "v1",
"created": "Tue, 27 Jul 2004 12:51:53 GMT"
}
] | 2012-11-06T00:00:00 | [
[
"Vernov",
"S. Yu.",
"",
"Skobeltsyn Institute of Nuclear Physics of Moscow State\n University"
]
] | [
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
},
{
"class": "Physics",
"code": "astro-ph.SR",
"description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems",
"span": "(Solar and Stellar Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
Subsets and Splits