id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
math/0701801
Frederic Dambreville
Frederic Dambreville (DGA/CTA/DT/GIP)
Deterministic modal Bayesian Logic: derive the Bayesian inference within the modal logic T
Second revision of: Definition of a Deterministic Bayesian Logic
null
null
null
math.LO cs.LO math.PR
null
In this paper a conditional logic is defined and studied. This conditional logic, DmBL, is constructed as a deterministic counterpart to the Bayesian conditional. The logic is unrestricted, so that any logical operations are allowed. A notion of logical independence is also defined within the logic itself. This logic is shown to be non-trivial and is not reduced to classical propositions. A model is constructed for the logic. Completeness results are proved. It is shown that any unconditioned probability can be extended to the whole logic DmBL. The Bayesian conditional is then recovered from the probabilistic DmBL. At last, it is shown why DmBL is compliant with Lewis' triviality.
[ { "version": "v1", "created": "Sun, 28 Jan 2007 08:57:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/CTA/DT/GIP" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/0701904
Jason Teutsch
Jason Teutsch
Noncomputable Spectral Sets
PhD thesis, 101 pages
null
null
null
math.LO cs.LO
null
It is possible to enumerate all computer programs. In particular, for every partial computable function, there is a shortest program which computes that function. f-MIN is the set of indices for shortest programs. In 1972, Meyer showed that f-MIN is Turing equivalent to 0'', the halting set with halting set oracle. This paper generalizes the notion of shortest programs, and we use various measures from computability theory to describe the complexity of the resulting "spectral sets." We show that under certain Godel numberings, the spectral sets are exactly the canonical sets 0', 0'', 0''', ... up to Turing equivalence. This is probably not true in general, however we show that spectral sets always contain some useful information. We show that immunity, or "thinness" is a useful characteristic for distinguishing between spectral sets. In the final chapter, we construct a set which neither contains nor is disjoint from any infinite arithmetic set, yet it is 0-majorized and contains a natural spectral set. Thus a pathological set becomes a bit more friendly. Finally, a number of interesting open problems are left for the inspired reader.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 02:38:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Teutsch", "Jason", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0702109
Mathilde Bouvel
Mathilde Bouvel (LIAFA), Dominique Rossin (LIAFA), Stephane Vialette (LRI)
Longest Common Separable Pattern between Permutations
15 pages
Combinatorial Pattern Matching (CPM) 2007 (2007) 00
null
null
math.CO cs.CC
null
In this article, we study the problem of finding the longest common separable pattern between several permutations. We give a polynomial-time algorithm when the number of input permutations is fixed and show that the problem is NP-hard for an arbitrary number of input permutations even if these permutations are separable. On the other hand, we show that the NP-hard problem of finding the longest common pattern between two permutations cannot be approximated better than within a ratio of $sqrt{Opt}$ (where $Opt$ is the size of an optimal solution) when taking common patterns belonging to pattern-avoiding classes of permutations.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 16:30:35 GMT" } ]
2007-06-13T00:00:00
[ [ "Bouvel", "Mathilde", "", "LIAFA" ], [ "Rossin", "Dominique", "", "LIAFA" ], [ "Vialette", "Stephane", "", "LRI" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0702116
Kevin Chu
Kevin T. Chu
A Direct Matrix Method for Computing Analytical Jacobians of Discretized Nonlinear Integro-differential Equations
29 pages, 5 figures, educational
null
10.1016/j.jcp.2009.04.031
null
math.NA cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this pedagogical article, we present a simple direct matrix method for analytically computing the Jacobian of nonlinear algebraic equations that arise from the discretization of nonlinear integro-differential equations. The method is based on a formulation of the discretized equations in vector form using only matrix-vector products and component-wise operations. By applying simple matrix-based differentiation rules, the matrix form of the analytical Jacobian can be calculated with little more difficulty than that required when computing derivatives in single-variable calculus. After describing the direct matrix method, we present numerical experiments demonstrating the computational performance of the method, discuss its connection to the Newton-Kantorovich method, and apply it to illustrative 1D and 2D example problems. MATLAB code is provided to demonstrate the low code complexity required by the method.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 19:03:57 GMT" }, { "version": "v2", "created": "Wed, 10 Dec 2008 21:33:47 GMT" } ]
2009-05-26T00:00:00
[ [ "Chu", "Kevin T.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
math/0702129
Audrey Lee
Audrey Lee and Ileana Streinu
Pebble Game Algorithms and Sparse Graphs
20 pages, abstract presented at EuroComb '05
null
null
UMass Amherst Computer Science Department TR 07-02
math.CO cs.CG
null
A multi-graph $G$ on $n$ vertices is $(k,\ell)$-sparse if every subset of $n'\leq n$ vertices spans at most $kn'- \ell$ edges. $G$ is {\em tight} if, in addition, it has exactly $kn - \ell$ edges. For integer values $k$ and $\ell \in [0, 2k)$, we characterize the $(k,\ell)$-sparse graphs via a family of simple, elegant and efficient algorithms called the $(k,\ell)$-pebble games.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 01:18:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Audrey", "" ], [ "Streinu", "Ileana", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
math/0702239
David Bremner
David Bremner, Mathieu Dutour Sikiric, Achill Schuermann
Polyhedral representation conversion up to symmetries
25 pages, 9 figures; second version with some minor corrections, esp. to Section 7
CRM Proceedings & Lecture Notes 48, AMS, 2009, pp. 45-71
null
null
math.MG cs.CG
null
We give a short survey on computational techniques which can be used to solve the representation conversion problem for polyhedra up to symmetries. We in particular discuss decomposition methods, which reduce the problem to a number of lower dimensional subproblems. These methods have been successfully used by different authors in special contexts. Moreover, we sketch an incremental method, which is a generalization of Fourier-Motzkin elimination, and we give some ideas how symmetry can be exploited using pivots.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 01:33:42 GMT" }, { "version": "v2", "created": "Thu, 13 Sep 2007 06:32:58 GMT" } ]
2011-10-20T00:00:00
[ [ "Bremner", "David", "" ], [ "Sikiric", "Mathieu Dutour", "" ], [ "Schuermann", "Achill", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
math/0702301
Martin Wainwright
Martin J. Wainwright
Information-theoretic limits on sparsity recovery in the high-dimensional and noisy setting
Appeared as Technical Report 725, Department of Statistics, UC Berkeley January 2007
null
null
null
math.ST cs.IT math.IT stat.TH
null
The problem of recovering the sparsity pattern of a fixed but unknown vector $\beta^* \in \real^p based on a set of $n$ noisy observations arises in a variety of settings, including subset selection in regression, graphical model selection, signal denoising, compressive sensing, and constructive approximation. Of interest are conditions on the model dimension $p$, the sparsity index $s$ (number of non-zero entries in $\beta^*$), and the number of observations $n$ that are necessary and/or sufficient to ensure asymptotically perfect recovery of the sparsity pattern. This paper focuses on the information-theoretic limits of sparsity recovery: in particular, for a noisy linear observation model based on measurement vectors drawn from the standard Gaussian ensemble, we derive both a set of sufficient conditions for asymptotically perfect recovery using the optimal decoder, as well as a set of necessary conditions that any decoder, regardless of its computational complexity, must satisfy for perfect recovery. This analysis of optimal decoding limits complements our previous work (ARXIV: math.ST/0605740) on sharp thresholds for sparsity recovery using the Lasso ($\ell_1$-constrained quadratic programming) with Gaussian measurement ensembles.
[ { "version": "v1", "created": "Sun, 11 Feb 2007 08:06:44 GMT" }, { "version": "v2", "created": "Tue, 20 Feb 2007 06:47:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0702325
Oskar Sandberg
Oskar Sandberg
Neighbor selection and hitting probability in small-world graphs
Published in at http://dx.doi.org/10.1214/07-AAP499 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2008, Vol. 18, No. 5, 1771-1793
10.1214/07-AAP499
IMS-AAP-AAP499
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Small-world graphs, which combine randomized and structured elements, are seen as prevalent in nature. Jon Kleinberg showed that in some graphs of this type it is possible to route, or navigate, between vertices in few steps even with very little knowledge of the graph itself. In an attempt to understand how such graphs arise we introduce a different criterion for graphs to be navigable in this sense, relating the neighbor selection of a vertex to the hitting probability of routed walks. In several models starting from both discrete and continuous settings, this can be shown to lead to graphs with the desired properties. It also leads directly to an evolutionary model for the creation of similar graphs by the stepwise rewiring of the edges, and we conjecture, supported by simulations, that these too are navigable.
[ { "version": "v1", "created": "Mon, 12 Feb 2007 12:16:35 GMT" }, { "version": "v2", "created": "Wed, 12 Nov 2008 13:51:53 GMT" } ]
2008-11-18T00:00:00
[ [ "Sandberg", "Oskar", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0702334
Olivier Finkel
Olivier Finkel (LIP)
An Example of Pi^0_3-complete Infinitary Rational Relation
null
null
null
null
math.LO cs.CC cs.LO
null
We give in this paper an example of infinitary rational relation, accepted by a 2-tape B\"{u}chi automaton, which is Pi^0_3-complete in the Borel hierarchy. Moreover the example of infinitary rational relation given in this paper has a very simple structure and can be easily described by its sections.
[ { "version": "v1", "created": "Mon, 12 Feb 2007 16:11:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Finkel", "Olivier", "", "LIP" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0702744
Mark Jerrum
Martin Dyer, Leslie Ann Goldberg, Mark Jerrum
Matrix norms and rapid mixing for spin systems
Published in at http://dx.doi.org/10.1214/08-AAP532 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2009, Vol. 19, No. 1, 71-107
10.1214/08-AAP532
IMS-AAP-AAP532
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a systematic development of the application of matrix norms to rapid mixing in spin systems. We show that rapid mixing of both random update Glauber dynamics and systematic scan Glauber dynamics occurs if any matrix norm of the associated dependency matrix is less than 1. We give improved analysis for the case in which the diagonal of the dependency matrix is $\mathbf{0}$ (as in heat bath dynamics). We apply the matrix norm methods to random update and systematic scan Glauber dynamics for coloring various classes of graphs. We give a general method for estimating a norm of a symmetric nonregular matrix. This leads to improved mixing times for any class of graphs which is hereditary and sufficiently sparse including several classes of degree-bounded graphs such as nonregular graphs, trees, planar graphs and graphs with given tree-width and genus.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 13:25:16 GMT" }, { "version": "v2", "created": "Fri, 4 Apr 2008 12:50:19 GMT" }, { "version": "v3", "created": "Fri, 27 Feb 2009 10:33:04 GMT" } ]
2009-03-06T00:00:00
[ [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0702804
Marcus Hutter
Marcus Hutter
The Loss Rank Principle for Model Selection
16 pages
Proc. 20th Annual Conf. on Learning Theory (COLT 2007) pages 589-603
10.1007/978-3-540-72927-3_42
null
math.ST cs.LG stat.ME stat.ML stat.TH
null
We introduce a new principle for model selection in regression and classification. Many regression models are controlled by some smoothness or flexibility or complexity parameter c, e.g. the number of neighbors to be averaged over in k nearest neighbor (kNN) regression or the polynomial degree in regression with polynomials. Let f_D^c be the (best) regressor of complexity c on data D. A more flexible regressor can fit more data D' well than a more rigid one. If something (here small loss) is easy to achieve it's typically worth less. We define the loss rank of f_D^c as the number of other (fictitious) data D' that are fitted better by f_D'^c than D is fitted by f_D^c. We suggest selecting the model complexity c that has minimal loss rank (LoRP). Unlike most penalized maximum likelihood variants (AIC,BIC,MDL), LoRP only depends on the regression function and loss function. It works without a stochastic noise model, and is directly applicable to any non-parametric regressor, like kNN. In this paper we formalize, discuss, and motivate LoRP, study it for specific regression problems, in particular linear ones, and compare it to other model selection schemes.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 03:31:34 GMT" } ]
2007-06-25T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0702866
Marie Cottrell
Patrick Letr\'emy (SAMOS, CES), Marie Cottrell (SAMOS, CES), Eric Esposito (RDD GDF), Val\'erie Laffite (RDD GDF), Sally Showk (RDD GDF)
Consumer Profile Identification and Allocation
Accepted in the IWANN 07 conference San Sebastian, June 2007)
null
null
null
math.ST cs.NE stat.TH
null
We propose an easy-to-use methodology to allocate one of the groups which have been previously built from a complete learning data base, to new individuals. The learning data base contains continuous and categorical variables for each individual. The groups (clusters) are built by using only the continuous variables and described with the help of the categorical ones. For the new individuals, only the categorical variables are available, and it is necessary to define a model which computes the probabilities to belong to each of the clusters, by using only the categorical variables. Then this model provides a decision rule to assign the new individuals and gives an efficient tool to decision-makers. This tool is shown to be very efficient for customers allocation in consumer clusters for marketing purposes, for example.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 08:02:35 GMT" }, { "version": "v2", "created": "Tue, 3 Apr 2007 07:09:41 GMT" } ]
2016-08-14T00:00:00
[ [ "Letrémy", "Patrick", "", "SAMOS, CES" ], [ "Cottrell", "Marie", "", "SAMOS, CES" ], [ "Esposito", "Eric", "", "RDD GDF" ], [ "Laffite", "Valérie", "", "RDD GDF" ], [ "Showk", "Sally", "", "RDD GDF" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0703019
Ralph P. Russo
Ralph P. Russo, Nariankadu D. Shyamalkumar
Reading policies for joins: An asymptotic analysis
Published at http://dx.doi.org/10.1214/105051606000000646 in the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2007, Vol. 17, No. 1, 230-264
10.1214/105051606000000646
IMS-AAP-AAP404
math.PR cs.DB
null
Suppose that $m_n$ observations are made from the distribution $\mathbf {R}$ and $n-m_n$ from the distribution $\mathbf {S}$. Associate with each pair, $x$ from $\mathbf {R}$ and $y$ from $\mathbf {S}$, a nonnegative score $\phi(x,y)$. An optimal reading policy is one that yields a sequence $m_n$ that maximizes $\mathbb{E}(M(n))$, the expected sum of the $(n-m_n)m_n$ observed scores, uniformly in $n$. The alternating policy, which switches between the two sources, is the optimal nonadaptive policy. In contrast, the greedy policy, which chooses its source to maximize the expected gain on the next step, is shown to be the optimal policy. Asymptotics are provided for the case where the $\mathbf {R}$ and $\mathbf {S}$ distributions are discrete and $\phi(x,y)=1 or 0$ according as $x=y$ or not (i.e., the observations match). Specifically, an invariance result is proved which guarantees that for a wide class of policies, including the alternating and the greedy, the variable M(n) obeys the same CLT and LIL. A more delicate analysis of the sequence $\mathbb{E}(M(n))$ and the sample paths of M(n), for both alternating and greedy, reveals the slender sense in which the latter policy is asymptotically superior to the former, as well as a sense of equivalence of the two and robustness of the former.
[ { "version": "v1", "created": "Thu, 1 Mar 2007 09:02:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Russo", "Ralph P.", "" ], [ "Shyamalkumar", "Nariankadu D.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
math/0703241
Pierre Guillon
Julien Cervelle (IGM), Enrico Formenti (I3S), Pierre Guillon (IGM)
Sofic Trace of a Cellular Automaton
10 pages + 6 for included proofs
null
null
null
math.DS cs.CC cs.DM
null
The trace subshift of a cellular automaton is the subshift of all possible columns that may appear in a space-time diagram, ie the infinite sequence of states of a particular cell of a configuration; in the language of symbolic dynamics one says that it is a factor system. In this paper we study conditions for a sofic subshift to be the trace of a cellular automaton.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 20:48:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Cervelle", "Julien", "", "IGM" ], [ "Formenti", "Enrico", "", "I3S" ], [ "Guillon", "Pierre", "", "IGM" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0703436
Daniel Perrucci
G. Jeronimo, D. Perrucci, J. Sabia
A parametric representation of totally mixed Nash equilibria
29 pages, submitted
null
null
null
math.AG cs.GT
null
We compute a parametric description of the totally mixed Nash equilibria of a generic game in normal form with pre-fixed structure. Using this representation, we show conditions under which a game has the maximum possible number of this kind of equilibria. Then, we present a symbolic procedure that allows us to describe and estimate the number of isolated totally mixed Nash equilibria of an arbitrary game. Under certain assumptions, the algorithm computes the exact number of these equilibria.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 20:46:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Jeronimo", "G.", "" ], [ "Perrucci", "D.", "" ], [ "Sabia", "J.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
math/0703575
Shmuel Onn
Shmuel Onn
Convex Discrete Optimization
null
Encyclopedia of Optimization 2009: 513-550
null
null
math.OC cs.CC cs.DM math.CO
null
We develop an algorithmic theory of convex optimization over discrete sets. Using a combination of algebraic and geometric tools we are able to provide polynomial time algorithms for solving broad classes of convex combinatorial optimization problems and convex integer programming problems in variable dimension. We discuss some of the many applications of this theory including to quadratic programming, matroids, bin packing and cutting-stock problems, vector partitioning and clustering, multiway transportation problems, and privacy and confidential statistical data disclosure. Highlights of our work include a strongly polynomial time algorithm for convex and linear combinatorial optimization over any family presented by a membership oracle when the underlying polytope has few edge-directions; a new theory of so-termed n-fold integer programming, yielding polynomial time solution of important and natural classes of convex and linear integer programming problems in variable dimension; and a complete complexity classification of high dimensional transportation problems, with practical applications to fundamental problems in privacy and confidential statistical data disclosure.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 08:47:46 GMT" } ]
2009-01-24T00:00:00
[ [ "Onn", "Shmuel", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0703656
Vladimir Shpilrain
Vladimir Shpilrain and Gabriel Zapata
Using decision problems in public key cryptography
12 pages
null
null
null
math.GR cs.CR
null
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property P and the information that there are objects with the property P, find at least one particular object with the property P. So far, no cryptographic protocol based on a search problem in a non-commutative (semi)group has been recognized as secure enough to be a viable alternative to established protocols (such as RSA) based on commutative (semi)groups, although most of these protocols are more efficient than RSA is. In this paper, we suggest to use decision problems from combinatorial group theory as the core of a public key establishment protocol or a public key cryptosystem. By using a popular decision problem, the word problem, we design a cryptosystem with the following features: (1) Bob transmits to Alice an encrypted binary sequence which Alice decrypts correctly with probability "very close" to 1; (2) the adversary, Eve, who is granted arbitrarily high (but fixed) computational speed, cannot positively identify (at least, in theory), by using a "brute force attack", the "1" or "0" bits in Bob's binary sequence. In other words: no matter what computational speed we grant Eve at the outset, there is no guarantee that her "brute force attack" program will give a conclusive answer (or an answer which is correct with overwhelming probability) about any bit in Bob's sequence.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 01:28:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Shpilrain", "Vladimir", "" ], [ "Zapata", "Gabriel", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0703713
Craig Antonio Pastro
J. R. B. Cockett and Craig Pastro
The logic of message passing
51 pages
Science of Computer Programming 74 no.8 (2009) 498-533
null
null
math.CT cs.LO
null
Message passing is a key ingredient of concurrent programming. The purpose of this paper is to describe the equivalence between the proof theory, the categorical semantics, and term calculus of message passing. In order to achieve this we introduce the categorical notion of a linear actegory and the related polycategorical notion of a poly-actegory. Not surprisingly the notation used for the term calculus borrows heavily from the (synchronous) pi-calculus. The cut elimination procedure for the system provides an operational semantics.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 21:17:42 GMT" }, { "version": "v2", "created": "Mon, 26 Mar 2007 22:39:49 GMT" }, { "version": "v3", "created": "Wed, 14 Nov 2007 12:29:31 GMT" } ]
2010-03-03T00:00:00
[ [ "Cockett", "J. R. B.", "" ], [ "Pastro", "Craig", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0703865
George Bell
George I. Bell
Solving Triangular Peg Solitaire
23 pages, 14 figures; published version including comments by John Beasley
Journal of Integer Sequences, Vol. 11 (2008), Article 08.4.8
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the one-person game of peg solitaire on a triangular board of arbitrary size. The basic game begins from a full board with one peg missing and finishes with one peg at a specified board location. We develop necessary and sufficient conditions for this game to be solvable. For all solvable problems, we give an explicit solution algorithm. On the 15-hole board, we compare three simple solution strategies. We then consider the problem of finding solutions that minimize the number of moves (where a move is one or more consecutive jumps by the same peg), and find the shortest solution to the basic game on all triangular boards with up to 55 holes (10 holes on a side).
[ { "version": "v1", "created": "Thu, 29 Mar 2007 19:33:13 GMT" }, { "version": "v2", "created": "Thu, 5 Apr 2007 19:10:01 GMT" }, { "version": "v3", "created": "Mon, 25 Jun 2007 14:43:36 GMT" }, { "version": "v4", "created": "Wed, 1 Aug 2007 14:55:34 GMT" }, { "version": "v5", "created": "Tue, 18 Nov 2008 04:43:28 GMT" }, { "version": "v6", "created": "Sat, 17 Jan 2009 17:16:04 GMT" } ]
2009-01-17T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0703902
Constantinos Daskalakis
Constantinos Daskalakis, Alexandros G. Dimakis, Elchanan Mossel
Connectivity and equilibrium in random games
Published in at http://dx.doi.org/10.1214/10-AAP715 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2011, Vol. 21, No. 3, 987-1016
10.1214/10-AAP715
IMS-AAP-AAP715
math.PR cs.GT math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study how the structure of the interaction graph of a game affects the existence of pure Nash equilibria. In particular, for a fixed interaction graph, we are interested in whether there are pure Nash equilibria arising when random utility tables are assigned to the players. We provide conditions for the structure of the graph under which equilibria are likely to exist and complementary conditions which make the existence of equilibria highly unlikely. Our results have immediate implications for many deterministic graphs and generalize known results for random games on the complete graph. In particular, our results imply that the probability that bounded degree graphs have pure Nash equilibria is exponentially small in the size of the graph and yield a simple algorithm that finds small nonexistence certificates for a large family of graphs. Then we show that in any strongly connected graph of n vertices with expansion $(1+\Omega(1))\log_2(n)$ the distribution of the number of equilibria approaches the Poisson distribution with parameter 1, asymptotically as $n \to +\infty$.
[ { "version": "v1", "created": "Thu, 29 Mar 2007 22:47:45 GMT" }, { "version": "v2", "created": "Fri, 27 Apr 2007 17:33:11 GMT" }, { "version": "v3", "created": "Tue, 5 Jun 2007 23:01:02 GMT" }, { "version": "v4", "created": "Tue, 15 Feb 2011 01:53:46 GMT" }, { "version": "v5", "created": "Mon, 12 Nov 2012 06:25:27 GMT" } ]
2012-11-13T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Mossel", "Elchanan", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0703921
Louis Theran
Ileana Streinu and Louis Theran
Sparse Hypergraphs and Pebble Game Algorithms
null
null
null
null
math.CO cs.DS
null
A hypergraph $G=(V,E)$ is $(k,\ell)$-sparse if no subset $V'\subset V$ spans more than $k|V'|-\ell$ hyperedges. We characterize $(k,\ell)$-sparse hypergraphs in terms of graph theoretic, matroidal and algorithmic properties. We extend several well-known theorems of Haas, Lov{\'{a}}sz, Nash-Williams, Tutte, and White and Whiteley, linking arboricity of graphs to certain counts on the number of edges. We also address the problem of finding lower-dimensional representations of sparse hypergraphs, and identify a critical behaviour in terms of the sparsity parameters $k$ and $\ell$. Our constructions extend the pebble games of Lee and Streinu from graphs to hypergraphs.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 14:14:58 GMT" } ]
2007-06-13T00:00:00
[ [ "Streinu", "Ileana", "" ], [ "Theran", "Louis", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0703927
Christine Cheng
V. Arvind, Christine T. Cheng, Nikhil R. Devanur
On Computing the Distinguishing Numbers of Planar Graphs and Beyond: a Counting Approach
27 pages
null
null
null
math.CO cs.DS
null
A vertex k-labeling of graph G is distinguishing if the only automorphism that preserves the labels of G is the identity map. The distinguishing number of G, D(G), is the smallest integer k for which G has a distinguishing k-labeling. In this paper, we apply the principle of inclusion-exclusion and develop recursive formulas to count the number of inequivalent distinguishing k-labelings of a graph. Along the way, we prove that the distinguishing number of a planar graph can be computed in time polynomial in the size of the graph.}
[ { "version": "v1", "created": "Fri, 30 Mar 2007 16:50:09 GMT" } ]
2007-06-13T00:00:00
[ [ "Arvind", "V.", "" ], [ "Cheng", "Christine T.", "" ], [ "Devanur", "Nikhil R.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/9310227
null
A. R. Calderbank, A. Roger Hammons Jr., P. Vijay Kumar, N. J. A. Sloane, Patrick Sol\'e
A linear construction for certain Kerdock and Preparata codes
5 pages
Bull. Amer. Math. Soc. (N.S.) 29 (1993) 218-222
null
Bulletin migration 11/99
math.CO cs.IT math.IT
null
The Nordstrom-Robinson, Kerdock, and (slightly modified) Pre\- parata codes are shown to be linear over $\ZZ_4$, the integers $\bmod~4$. The Kerdock and Preparata codes are duals over $\ZZ_4$, and the Nordstrom-Robinson code is self-dual. All these codes are just extended cyclic codes over $\ZZ_4$. This provides a simple definition for these codes and explains why their Hamming weight distributions are dual to each other. First- and second-order Reed-Muller codes are also linear codes over $\ZZ_4$, but Hamming codes in general are not, nor is the Golay code.
[ { "version": "v1", "created": "Fri, 1 Oct 1993 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Calderbank", "A. R.", "" ], [ "Hammons", "A. Roger", "Jr." ], [ "Kumar", "P. Vijay", "" ], [ "Sloane", "N. J. A.", "" ], [ "Solé", "Patrick", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/9409219
null
Isaac Saias
Proving probabilistic correctness statements: the case of Rabin's algorithm for mutual exclusion
12 pages
null
null
LACES 68Q-94-14
math.CO cs.CC
null
The correctness of most randomized distributed algorithms is expressed by a statement of the form ``some predicate of the executions holds with high probability, regardless of the order in which actions are scheduled''. In this paper, we present a general methodology to prove correctness statements of such randomized algorithms. Specifically, we show how to prove such statements by a series of refinements, which terminate in a statement independent of the schedule. To demonstrate the subtlety of the issues involved in this type of analysis, we focus on Rabin's randomized distributed algorithm for mutual exclusion [Rabin 82]. Surprisingly, it turns out that the algorithm does not maintain one of the requirements of the problem under a certain schedule. In particular, we give a schedule under which a set of processes can suffer lockout for arbitrary long periods.
[ { "version": "v1", "created": "Mon, 19 Sep 1994 00:00:00 GMT" } ]
2008-11-23T00:00:00
[ [ "Saias", "Isaac", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9409220
null
Michel Goemans, Nancy Lynch, Isaac Saias
Number of faults a system can withstand without repairs
10 pages
null
null
LACES 68Q-94-15
math.CO cs.CC
null
We consider the following scheduling problem. A system is composed of $n$ processors drawn from a pool of $N$. The processors can become faulty while in operation and faulty processors never recover. A report is issued whenever a fault occurs. This report states only the existence of a fault, but does not indicate its location. Based on this report, the scheduler can reconfigure the system and choose another set of $n$ processors. The system operates satisfactorily as long as at most $f$ of the $n$ selected processors are faulty. We exhibit a scheduling strategy allowing the system to operate satisfactorily until approximately $(N/n)f$ faults are reported in the worst case. Our precise bound is tight.
[ { "version": "v1", "created": "Mon, 19 Sep 1994 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Goemans", "Michel", "" ], [ "Lynch", "Nancy", "" ], [ "Saias", "Isaac", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9409221
null
Nancy Lynch, Isaac Saias, Roberto Segala
Proving time bounds for randomized distributed algorithms
19 pages
null
null
LACES 68Q-94-16
math.CO cs.CC
null
A method of analyzing time bounds for randomized distributed algorithms is presented, in the context of a new and general framework for describing and reasoning about randomized algorithms. The method consists of proving auxiliary statements of the form U (t)->(p) U', which means that whenever the algorithm begins in a state in set U, with probability p, it will reach a state in set U' within time t. The power of the method is illustrated by its use in proving a constant upper bound on the expected time for some process to reach its critical region, in Lehmann and Rabin's Dining Philosophers algorithm.
[ { "version": "v1", "created": "Mon, 19 Sep 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Lynch", "Nancy", "" ], [ "Saias", "Isaac", "" ], [ "Segala", "Roberto", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9409223
null
Avrim Blum, Prasad Chalasani, Don Coppersmith, Bill Pulleyblank, Prabhakar Raghavan, Madhu Sudan
On the minimum latency problem
9 pages
null
null
LACES 68Q-94-18
math.CO cs.CC
null
We are given a set of points $p_1,\ldots , p_n$ and a symmetric distance matrix $(d_{ij})$ giving the distance between $p_i$ and $p_j$. We wish to construct a tour that minimizes $\sum_{i=1}^n \ell(i)$, where $\ell(i)$ is the {\em latency} of $p_i$, defined to be the distance traveled before first visiting $p_i$. This problem is also known in the literature as the {\em deliveryman problem} or the {\em traveling repairman problem}. It arises in a number of applications including disk-head scheduling, and turns out to be surprisingly different from the traveling salesman problem in character. We give exact and approximate solutions to a number of cases, including a constant-factor approximation algorithm whenever the distance matrix satisfies the triangle inequality.
[ { "version": "v1", "created": "Wed, 21 Sep 1994 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Blum", "Avrim", "" ], [ "Chalasani", "Prasad", "" ], [ "Coppersmith", "Don", "" ], [ "Pulleyblank", "Bill", "" ], [ "Raghavan", "Prabhakar", "" ], [ "Sudan", "Madhu", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9409224
null
Avrim Blum, Prasad Chalasani
An on-line algorithm for improving performance in navigation
10 pages
null
null
LACES 68Q-94-19
math.CO cs.CC
null
Recent papers have shown optimally-competitive on-line strategies for a robot traveling from a point $s$ to a point $t$ in certain unknown geometric environments. We consider the question: Having gained some partial information about the scene on its first trip from $s$ to $t$, can the robot improve its performance on subsequent trips it might make? This is a type of on-line problem where a strategy must exploit {\em partial information \/} about the future (e.g., about obstacles that lie ahead). For scenes with axis-parallel rectangular obstacles where the Euclidean distance between $s$ and $t$ is $n$, we present a deterministic algorithm whose {\em average\/} trip length after $k$ trips, $k \leq n$, is $O(\rootnbyk)$ times the length of the shortest $s$-$t$ path in the scene. We also show that this is the best a deterministic strategy can do. This algorithm can be thought of as performing an optimal tradeoff between search effort and the goodness of the path found. We improve this algorithm so that for {\em every\/} $i \leq n$, the robot's $i$th trip length is $O(\rootnbyi)$ times the shortest $s$-$t$ path length. A key idea of the paper is that a {\em tree\/} structure can be defined in the scene, where the nodes are portions of certain obstacles and the edges are ``short'' paths from a node to its children. The core of our algorithms is an on-line strategy for traversing this tree optimally.
[ { "version": "v1", "created": "Wed, 21 Sep 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Blum", "Avrim", "" ], [ "Chalasani", "Prasad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9409225
null
Madhav V. Marathe, Harry B. Hunt III, S. S. Ravi
The complexity of approximating PSPACE-Complete problems for hierarchical specifications
41 pages
null
null
LACES 68Q-94-21
math.CO cs.CC
null
We extend the concept of polynomial time approximation algorithms to apply to problems for hierarchically specified graphs, many of which are PSPACE-complete. Assuming P != PSPACE, the existence or nonexistence of such efficient approximation algorithms is characterized, for several standard graph theoretic and combinatorial problems. We present polynomial time approximation algorithms for several standard PSPACE-hard problems considered in the literature. In contrast, we show that unless P = PSPACE, there is no polynomial time epsilon-approximation for any epsilon>0, for several other problems, when the instances are specified hierarchically. We present polynomial time approximation algorithms for the following problems when the graphs are specified hierarchically: {minimum vertex cover}, {maximum 3SAT}, {weighted max cut}, {minimum maximal matching}, {bounded degree maximum independent set} In contrast, we show that unless P = PSPACE, there is no polynomial time epsilon-approximation for any epsilon>0, for the following problems when the instances are specified hierarchically: {the number of true gates in a monotone acyclic circuit when all input values are specified} and {the optimal value of the objective function of a linear program} It is also shown that unless P = PSPACE, a performance guarantee of less than 2 cannot be obtained in polynomial time for the following problems when the instances are specified hierarchically: {high degree subgraph}, {k-vertex connected subgraph}, and {k-edge connected subgraph}
[ { "version": "v1", "created": "Wed, 21 Sep 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Marathe", "Madhav V.", "" ], [ "Hunt", "Harry B.", "III" ], [ "Ravi", "S. S.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9409226
null
Madhav V. Marathe, H. Breu, Harry B. Hunt III, S. S. Ravi, Daniel J. Rosenkrantz
Geometry based heuristics for unit disk graphs
19 pages
null
null
LACES 68Q-94-22
math.CO cs.CC
null
Unit disk graphs are intersection graphs of circles of unit radius in the plane. We present simple and provably good heuristics for a number of classical NP-hard optimization problems on unit disk graphs. The problems considered include maximum independent set, minimum vertex cover, minimum coloring and minimum dominating set. We also present an on-line coloring heuristic which achieves a competitive ratio of 6 for unit disk graphs. Our heuristics do not need a geometric representation of unit disk graphs. Geometric representations are used only in establishing the performance guarantees of the heuristics. Several of our approximation algorithms can be extended to intersection graphs of circles of arbitrary radii in the plane, intersection graphs of regular polygons, and to intersection graphs of higher dimensional regular objects.
[ { "version": "v1", "created": "Wed, 21 Sep 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Marathe", "Madhav V.", "" ], [ "Breu", "H.", "" ], [ "Hunt", "Harry B.", "III" ], [ "Ravi", "S. S.", "" ], [ "Rosenkrantz", "Daniel J.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9410208
null
Herbert Edelsbrunner, Ernst M\"ucke
Three-dimensional alpha shapes
32 pages
null
null
LACES 52B-94-25
math.CO cs.CC math.MG
null
Frequently, data in scientific computing is in its abstract form a finite point set in space, and it is sometimes useful or required to compute what one might call the ``shape'' of the set. For that purpose, this paper introduces the formal notion of the family of $\alpha$-shapes of a finite point set in $\Real^3$. Each shape is a well-defined polytope, derived from the Delaunay triangulation of the point set, with a parameter $\alpha \in \Real$ controlling the desired level of detail. An algorithm is presented that constructs the entire family of shapes for a given set of size $n$ in time $O(n^2)$, worst case. A robust implementation of the algorithm is discussed and several applications in the area of scientific computing are mentioned.
[ { "version": "v1", "created": "Wed, 12 Oct 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Edelsbrunner", "Herbert", "" ], [ "Mücke", "Ernst", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
math/9410209
null
Herbert Edelsbrunner, Ernst M\"ucke
Simulation of simplicity: a technique to cope with degenerate cases in geometric algorithms
38 pages
null
null
LACES 68Q-94-24
math.CO cs.CC
null
This paper describes a general-purpose programming technique, called the Simulation of Simplicity, which can be used to cope with degenerate input data for geometric algorithms. It relieves the programmer from the task to provide a consistent treatment for every single special case that can occur. The programs that use the technique tend to be considerably smaller and more robust than those that do not use it. We believe that this technique will become a standard tool in writing geometric software.
[ { "version": "v1", "created": "Wed, 12 Oct 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Edelsbrunner", "Herbert", "" ], [ "Mücke", "Ernst", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9411219
Emanuel Knill
Emanuel Knill
Lower bounds for identifying subset members with subset queries
9 pages
null
null
LACES 68Q-94-23
math.CO cs.CC
null
An instance of a group testing problem is a set of objects $\cO$ and an unknown subset $P$ of $\cO$. The task is to determine $P$ by using queries of the type ``does $P$ intersect $Q$'', where $Q$ is a subset of $\cO$. This problem occurs in areas such as fault detection, multiaccess communications, optimal search, blood testing and chromosome mapping. Consider the two stage algorithm for solving a group testing problem. In the first stage a predetermined set of queries are asked in parallel and in the second stage, $P$ is determined by testing individual objects. Let $n=\cardof{\cO}$. Suppose that $P$ is generated by independently adding each $x\in \cO$ to $P$ with probability $p/n$. Let $q_1$ ($q_2$) be the number of queries asked in the first (second) stage of this algorithm. We show that if $q_1=o(\log(n)\log(n)/\log\log(n))$, then $\Exp(q_2) = n^{1-o(1)}$, while there exist algorithms with $q_1 = O(\log(n)\log(n)/\log\log(n))$ and $\Exp(q_2) = o(1)$. The proof involves a relaxation technique which can be used with arbitrary distributions. The best previously known bound is $q_1+\Exp(q_2) = \Omega(p\log(n))$. For general group testing algorithms, our results imply that if the average number of queries over the course of $n^\gamma$ ($\gamma>0$) independent experiments is $O(n^{1-\epsilon})$, then with high probability $\Omega(\log(n)\log(n)/\log\log(n))$ non-singleton subsets are queried. This settles a conjecture of Bill Bruno and David Torney and has important consequences for the use of group testing in screening DNA libraries and other applications where it is more cost effective to use non-adaptive algorithms and/or too expensive to prepare a subset $Q$ for its first test.
[ { "version": "v1", "created": "Thu, 3 Nov 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Knill", "Emanuel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9411222
null
Michael J. Dinneen
The complexity of broadcasting in bounded-degree networks
6 pages
null
null
LACES 68Q-94-31
math.CO cs.CC
null
Broadcasting concerns the dissemination of a message originating at one node of a network to all other nodes. This task is accomplished by placing a series of calls over the communication lines of the network between neighboring nodes, where each call requires a unit of time and a call can involve only two nodes. We show that for bounded-degree networks determining the minimum broadcast time from an originating node remains NP-complete.
[ { "version": "v1", "created": "Fri, 18 Nov 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Dinneen", "Michael J.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9411235
Shelah Office
Yuri Gurevich, Neil Immerman, Saharon Shelah
McColm conjecture
null
Symposium on Logic in Computer Science (1994), 10--19
null
Shelah [GISh:525]
math.LO cs.LO
null
Gregory McColm conjectured that positive elementary inductions are bounded in a class K of finite structures if every (FO + LFP) formula is equivalent to a first-order formula in K. Here (FO + LFP) is the extension of first-order logic with the least fixed point operator. We disprove the conjecture. Our main results are two model-theoretic constructions, one deterministic and the other randomized, each of which refutes McColm's conjecture.
[ { "version": "v1", "created": "Tue, 15 Nov 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Immerman", "Neil", "" ], [ "Shelah", "Saharon", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/9411236
Shelah Office
Yuri Gurevich, Saharon Shelah
On finite rigid structures
null
J. Symbolic Logic 61 (1996), 549--562
null
Shelah [GuSh:526]
math.LO cs.LO
null
The main result of this paper is a probabilistic construction of finite rigid structures. It yields a finitely axiomatizable class of finite rigid structures where no L^omega_{infty, omega} formula with counting quantifiers defines a linear order.
[ { "version": "v1", "created": "Tue, 15 Nov 1994 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Shelah", "Saharon", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/9504213
null
Jonathan Berry, Mark Goldberg
Path optimization and near-greedy analysis for graph partitioning: an empirical study
null
null
null
LACES 68Q-95-25
math.CO cs.CC
null
This paper presents the results of an experimental study of graph partitioning. We describe a new heuristic technique, path optimization, and its application to two variations of graph partitioning: the max_cut problem and the min_quotient_cut problem. We present the results of computational comparisons between this technique and the Kernighan-Lin algorithm, the simulated annealing algorithm, the FLOW-lagorithm the multilevel algorithm, and teh recent 0.878-approximation algorithm. The experiments were conducted on two classes of graphs that have become standard for such tests: random and random geometric. They show that for both classes of inputs and both variations of the problem, the new heuristic is competitive with the other algorithms and holds an advantage for min_quotient_cut when applied to very large, sparse geometric graphs. In the last part of the paper, we describe an approach to analyzing graph partitioning algorithms from the statistical point of view. Every partitioning of a graph is viewed as a result achieved by a "near gready" partitioning algorithm. The experiments show that for "good" partitionings, the number of non-greedy steps needed to obtain them is quite small; moreover, it is "statistically" smaller for better partitionings. This led us to conjecture that there exists an "optimal" distribution of the non-greedy steps that characterize the classes of graphs that we studied.
[ { "version": "v1", "created": "Thu, 13 Apr 1995 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Berry", "Jonathan", "" ], [ "Goldberg", "Mark", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9508218
Emanuel Knill
Emanuel Knill
An analysis of Bennett's pebble game
15 pages
null
null
LACES 68Q-95-31
math.CO cs.CC
null
Bennett's pebble game was introduced to obtain better time/space tradeoffs in the simulation of standard Turing machines by reversible ones. So far only upper bounds for the tradeoff based on the pebble game have been published. Here we give a recursion for the time optimal solution of the pebble game given a space bound. We analyze the recursion to obtain an explicit asymptotic expression for the best time-space product.
[ { "version": "v1", "created": "Tue, 8 Aug 1995 00:00:00 GMT" } ]
2016-09-06T00:00:00
[ [ "Knill", "Emanuel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/9508219
null
David B. Jaffe
New results on binary linear codes
null
null
null
LACES 94B-95-32
math.CO cs.IT math.IT
null
This research announcement describes in very rough terms methods and a computer language under development, which can be used to prove the nonexistence of binary linear codes. Over a hundred new results have been obtained by the author. For example, there is no [29,11,10] code. The proof of this is roughly outlined.
[ { "version": "v1", "created": "Mon, 14 Aug 1995 00:00:00 GMT" } ]
2007-07-16T00:00:00
[ [ "Jaffe", "David B.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/9610221
null
J. Maurice Rojas
Extensions and Corrections for: ``A Convex Geometric Approach to Counting the Roots of a Polynomial System''
null
null
null
MSRI 1996-075
math.AG cs.DS
null
This brief note corrects some errors in the paper quoted in the title, highlights a combinatorial result which may have been overlooked, and points to further improvements in recent literature.
[ { "version": "v1", "created": "Thu, 31 Oct 1996 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/9702221
null
J. Maurice Rojas
Some New Applications of Toric Geometry
null
null
null
MSRI 1997-016
math.AG cs.DS
null
This paper reexamines univariate reduction from a toric geometric point of view. We begin by constructing a binomial variant of the $u$-resultant and then retailor the generalized characteristic polynomial to fully exploit sparsity in the monomial structure of any given polynomial system. We thus obtain a fast new algorithm for univariate reduction and a better understanding of the underlying projections. As a corollary, we show that a refinement of Hilbert's Tenth Problem is decidable within single-exponential time. We also show how certain multisymmetric functions of the roots of polynomial systems can be calculated with sparse resultants.
[ { "version": "v1", "created": "Sat, 8 Feb 1997 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/9702222
null
J. Maurice Rojas
Toric Generalized Characteristic Polynomials
null
null
null
MSRI 1997-017
math.AG cs.DS
null
We illustrate an efficient new method for handling polynomial systems with degenerate solution sets. In particular, a corollary of our techniques is a new algorithm to find an isolated point in every excess component of the zero set (over an algebraically closed field) of any $n$ by $n$ system of polynomial equations. Since we use the sparse resultant, we thus obtain complexity bounds (for converting any input polynomial system into a multilinear factorization problem) which are close to cubic in the degree of the underlying variety -- significantly better than previous bounds which were pseudo-polynomial in the classical B\'ezout bound. By carefully taking into account the underlying toric geometry, we are also able to improve the reliability of certain sparse resultant based algorithms for polynomial system solving.
[ { "version": "v1", "created": "Sat, 8 Feb 1997 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/9704218
Alexander Barvinok
Alexander Barvinok
A simple polynomial time algorithm to approximate the permanent within a simply exponential factor
null
null
null
MSRI 1997-031, formerly math.LA/9704218
math.RA cs.DS
null
We present a simple randomized polynomial time algorithm to approximate the mixed discriminant of $n$ positive semidefinite $n \times n$ matrices within a factor $2^{O(n)}$. Consequently, the algorithm allows us to approximate in randomized polynomial time the permanent of a given $n \times n$ non-negative matrix within a factor $2^{O(n)}$. When applied to approximating the permanent, the algorithm turns out to be a simple modification of the well-known Godsil-Gutman estimator.
[ { "version": "v1", "created": "Wed, 9 Apr 1997 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Barvinok", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/9705225
Shelah Office
Andreas Blass, Yuri Gurevich, Saharon Shelah
Choiceless polynomial time
null
null
null
Shelah [BGSh:533]
math.LO cs.LO
null
Turing machines define polynomial time (PTime) on strings but cannot deal with structures like graphs directly, and there is no known, easily computable string encoding of isomorphism classes of structures. Is there a computation model whose machines do not distinguish between isomorphic structures and compute exactly PTime properties? This question can be recast as follows: Does there exist a logic that captures polynomial time (without presuming the presence of a linear order)? Earlier, one of us conjectured the negative answer. The problem motivated a quest for stronger and stronger PTime logics. All these logics avoid arbitrary choice. Here we attempt to capture the choiceless fragment of PTime. Our computation model is a version of abstract state machines (formerly called evolving algebras). The idea is to replace arbitrary choice with parallel execution. The resulting logic is more expressive than other PTime logics in the literature. A more difficult theorem shows that the logic does not capture all PTime.
[ { "version": "v1", "created": "Thu, 15 May 1997 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Blass", "Andreas", "" ], [ "Gurevich", "Yuri", "" ], [ "Shelah", "Saharon", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/9801152
Shelah Office
John T. Baldwin, Saharon Shelah
On the classifiability of cellular automata
null
null
null
Shelah [BlSh:623]
math.LO cs.NE
null
Based on computer simulations Wolfram presented in several papers conjectured classifications of cellular automata into 4 types. He distinguishes the 4 classes of cellular automata by the evolution of the pattern generated by applying a cellular automaton to a finite input. Wolfram's qualitative classification is based on the examination of a large number of simulations. In addition to this classification based on the rate of growth, he conjectured a similar classification according to the eventual pattern. We consider here one formalization of his rate of growth suggestion. After completing our major results (based only on Wolfram's work), we investigated other contributions to the area and we report the relation of some of them to our discoveries.
[ { "version": "v1", "created": "Thu, 15 Jan 1998 00:00:00 GMT" } ]
2016-09-07T00:00:00
[ [ "Baldwin", "John T.", "" ], [ "Shelah", "Saharon", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
math/9807179
Shelah Office
Saharon Shelah
Polynomial time logic: Inability to express
null
null
null
Shelah [Sh:634]
math.LO cs.LO
null
Here we deal with the logic of [GuSh 533], which tries to capture polynomial time (for finite models). There it is proved that the logic cannot say much on models with equality only. Here we prove that it cannot say much on models for which we expect it cannot say much, like random enough graphs. This is the result of having a general criterion.
[ { "version": "v1", "created": "Wed, 15 Jul 1998 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Shelah", "Saharon", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/9809009
J. Maurice Rojas
J. Maurice Rojas
Uncomputably Large Integral Points on Algebraic Plane Curves?
null
null
null
null
math.NT cs.CC cs.SC math.AG math.LO
null
We show that the decidability of an amplification of Hilbert's Tenth Problem in three variables implies the existence of uncomputably large integral points on certain algebraic curves. We obtain this as a corollary of a new positive complexity result: the Diophantine prefixes EAE and EEAE are generically decidable. This means, taking the former prefix as an example, that we give a precise geometric classification of those polynomials f in Z[v,x,y] for which the question... ``Does there exists a v in N such that for all x in N, there exists a y in N with f(v,x,y)=0?'' ...may be undecidable, and we show that this set of polynomials is quite small in a rigourous sense. (The decidability of EAE was previously an open question.) The analogous result for the prefix EEAE is even stronger. We thus obtain a connection between the decidability of certain Diophantine problems, height bounds for points on curves, and the geometry of certain complex surfaces and 3-folds.
[ { "version": "v1", "created": "Wed, 2 Sep 1998 08:54:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
math/9809071
J. Maurice Rojas
J. Maurice Rojas
Solving Degenerate Sparse Polynomial Systems Faster
This is the final journal version of math.AG/9702222 (``Toric Generalized Characteristic Polynomials''). This final version is a major revision with several new theorems, examples, and references. The prior results are also significantly improved
null
null
null
math.AG cs.CC cs.NA math.NA
null
Consider a system F of n polynomial equations in n unknowns, over an algebraically closed field of arbitrary characteristic. We present a fast method to find a point in every irreducible component of the zero set Z of F. Our techniques allow us to sharpen and lower prior complexity bounds for this problem by fully taking into account the monomial term structure. As a corollary of our development we also obtain new explicit formulae for the exact number of isolated roots of F and the intersection multiplicity of the positive-dimensional part of Z. Finally, we present a combinatorial construction of non-degenerate polynomial systems, with specified monomial term structure and maximally many isolated roots, which may be of independent interest.
[ { "version": "v1", "created": "Mon, 14 Sep 1998 07:46:19 GMT" }, { "version": "v2", "created": "Tue, 15 Sep 1998 03:05:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
math/9809201
Shelah Office
Saharon Shelah
On quantification with a finite universe
null
null
null
Shelah [Sh:639]
math.LO cs.CC cs.LO
null
We consider a finite universe U (more exactly - a family U of them) and second order quantifiers Q_K, where for each U this means quantifying over a family of n(K)-place relations closed under permuting U. We define some natural orders and shed some light on the classification problem of those quantifiers.
[ { "version": "v1", "created": "Tue, 15 Sep 1998 00:00:00 GMT" } ]
2016-09-07T00:00:00
[ [ "Shelah", "Saharon", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/9810022
Todd Veldhuizen
Todd L. Veldhuizen and Dennis Gannon
Active Libraries: Rethinking the roles of compilers and libraries
16 pages, 1998 SIAM Workshop on Object Oriented Methods for Inter-operable Scientific and Engineering Computing
null
null
formerly math.SC/9810022
math.NA cs.PL
null
We describe Active Libraries, which take an active role in compilation. Unlike traditional libraries which are passive collections of functions and objects, Active Libraries may generate components, specialize algorithms, optimize code, configure and tune themselves for a target machine, and describe themselves to tools (such as profilers and debuggers) in an intelligible way. Several such libraries are described, as are implementation technologies.
[ { "version": "v1", "created": "Mon, 5 Oct 1998 15:27:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ], [ "Gannon", "Dennis", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
math/9901074
Denis V. Juriev
Denis V. Juriev
Differential interactive games: The short-term predictions
two minor remarks are added
null
null
null
math.HO cs.HC
null
Procedures of the short-term predictions for processes in general 2-person differential interactive games are proposed. Their effectiveness is discussed.
[ { "version": "v1", "created": "Tue, 19 Jan 1999 07:58:55 GMT" }, { "version": "v2", "created": "Wed, 20 Jan 1999 16:40:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Juriev", "Denis V.", "" ] ]
[ { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
math/9902043
Paul Vitanyi
Tao Jiang (UCR), Ming Li (UCSB), Paul Vitanyi (CWI and U Amsterdam)
The Average-Case Area of Heilbronn-Type Triangles
13 pages, LaTeX, 1 figure,Popular treatment in D. Mackenzie, On a roll, {\em New Scientist}, November 6, 1999, 44--48
T. Jiang, M. Li, and P. Vitanyi, The average-case area of Heilbronn-type triangles, Random Structures and Algorithms, 20:2(2002), 206-219
null
null
math.CO cs.CG cs.DM math.LO math.MG math.PR
null
From among $ {n \choose 3}$ triangles with vertices chosen from $n$ points in the unit square, let $T$ be the one with the smallest area, and let $A$ be the area of $T$. Heilbronn's triangle problem asks for the maximum value assumed by $A$ over all choices of $n$ points. We consider the average-case: If the $n$ points are chosen independently and at random (with a uniform distribution), then there exist positive constants $c$ and $C$ such that $c/n^3 < \mu_n < C/n^3$ for all large enough values of $n$, where $\mu_n$ is the expectation of $A$. Moreover, $c/n^3 < A < C/n^3$, with probability close to one. Our proof uses the incompressibility method based on Kolmogorov complexity; it actually determines the area of the smallest triangle for an arrangement in ``general position.''
[ { "version": "v1", "created": "Fri, 5 Feb 1999 12:37:45 GMT" }, { "version": "v2", "created": "Wed, 28 Apr 1999 16:24:00 GMT" }, { "version": "v3", "created": "Wed, 19 Apr 2000 13:35:21 GMT" }, { "version": "v4", "created": "Mon, 15 Oct 2001 17:36:12 GMT" }, { "version": "v5", "created": "Mon, 10 Nov 2003 14:45:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tao", "", "UCR" ], [ "Li", "Ming", "", "UCSB" ], [ "Vitanyi", "Paul", "", "CWI and U Amsterdam" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/9902151
Philippe Gaucher
Philippe Gaucher
Homotopy invariants of higher dimensional categories and concurrency in computer science
54 pages, 1 eps figure, LaTeX2e ; v2 construction of negative and positive Hurewicz morphisms added, corrected reference ; v3 reorganized paper for a better understanding ; v4 final version to appear in Mathematical Structure in Computer Science ; v5 last minute correction (very minor changes)
Mathematical Structure in Computer Science 10 (2000), no. 4, p.481-524
10.1017/S0960129500003182
null
math.CT cs.OH math.AT
null
The strict globular $\omega$-categories formalize the execution paths of a parallel automaton and the homotopies between them. One associates to such (and any) $\omega$-category $\C$ three homology theories. The first one is called the globular homology. It contains the oriented loops of $\C$. The two other ones are called the negative (resp. positive) corner homology. They contain in a certain manner the branching areas of execution paths or negative corners (resp. the merging areas of execution paths or positive corners) of $\C$. Two natural linear maps called the negative (resp. the positive) Hurewicz morphism from the globular homology to the negative (resp. positive) corner homology are constructed. We explain the reason why these constructions allow to reinterprete some geometric problems coming from computer science.
[ { "version": "v1", "created": "Fri, 26 Feb 1999 10:06:27 GMT" }, { "version": "v2", "created": "Thu, 4 Mar 1999 12:34:34 GMT" }, { "version": "v3", "created": "Sat, 14 Aug 1999 10:25:38 GMT" }, { "version": "v4", "created": "Wed, 29 Dec 1999 16:38:14 GMT" }, { "version": "v5", "created": "Sun, 27 Feb 2000 18:35:19 GMT" } ]
2021-08-24T00:00:00
[ [ "Gaucher", "Philippe", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
math/9905046
Joachim Rosenthal
Heide Gluesing-Luerssen, Joachim Rosenthal and Paul Weiner
Duality between Multidimensional Convolutional Codes and Systems
16 pages LaTeX
null
null
null
math.OC cs.IT math.AC math.AG math.IT
null
Multidimensional convolutional codes generalize (one dimensional) convolutional codes and they correspond under a natural duality to multidimensional systems widely studied in the systems literature.
[ { "version": "v1", "created": "Fri, 7 May 1999 19:56:54 GMT" } ]
2007-07-16T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Rosenthal", "Joachim", "" ], [ "Weiner", "Paul", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/9905155
Peter Brinkmann
Peter Brinkmann
An Implementation of the Bestvina-Handel Algorithm for Surface Homeomorphisms
13 pages, 5 figures
Experimental Mathematics 9:2, 2000, 235-240
null
null
math.GR cs.MS math.GT
null
Bestvina and Handel have found an effective algorithm that determines whether a given homeomorphism of an orientable, possibly punctured surface is pseudo-Anosov. We present a software package in Java that realizes this algorithm for surfaces with one puncture. Moreover, the package allows the user to define homeomorphisms in terms of Dehn twists, and in the pseudo-Anosov case it generates images of train tracks in the sense of Bestvina-Handel.
[ { "version": "v1", "created": "Tue, 25 May 1999 20:13:09 GMT" }, { "version": "v2", "created": "Wed, 26 May 1999 00:19:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmann", "Peter", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" } ]
math/9905165
Denis V. Juriev
Denis V. Juriev
Perception games, the image understanding and interpretational geometry
9 pages, AMSTEX
null
null
null
math.HO cs.CV
null
The interactive game theoretical approach to the description of perception processes is proposed. The subject is treated formally in terms of a new class of the verbalizable interactive games which are called the perception games. An application of the previously elaborated formalism of dialogues and verbalizable interactive games to the visual perception allows to combine the linguistic (such as formal grammars), psycholinguistic and (interactive) game theoretical methods for analysis of the image understanding by a human that may be also useful for the elaboration of computer vision systems. By the way the interactive game theoretical aspects of interpretational geometries are clarified.
[ { "version": "v1", "created": "Wed, 26 May 1999 13:19:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Juriev", "Denis V.", "" ] ]
[ { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
math/9909163
Maxim Skriganov
M. M. Skriganov
Coding Theory and Uniform Distributions
41 pages, AMS TEX
null
null
null
math.CO cs.IT math.IT math.NT
null
In the present paper we introduce and study finite point subsets of a special kind, called optimum distributions, in the n-dimensional unit cube. Such distributions are closely related with known (delta,s,n)-nets of low discrepancy. It turns out that optimum distributions have a rich combinatorial structure. Namely, we show that optimum distributions can be characterized completely as maximum distance separable codes with respect to a non-Hamming metric. Weight spectra of such codes can be evaluated precisely. We also consider linear codes and distributions and study their general properties including the duality with respect to a suitable inner product. The corresponding generalized MacWilliams identities for weight enumerators are briefly discussed. Broad classes of linear maximum distance separable codes and linear optimum distributions are explicitely constructed in the paper by the Hermite interpolations over finite fields.
[ { "version": "v1", "created": "Tue, 28 Sep 1999 08:33:05 GMT" } ]
2007-07-16T00:00:00
[ [ "Skriganov", "M. M.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
math/9910062
Ioannis Kontoyiannis
Ioannis Kontoyiannis
Efficient sphere-covering and converse measure concentration via generalized coding theorems
29 pages. See also http://www.stat.purdue.edu/~yiannis/
null
null
null
math.PR cs.IT math.FA math.IT
null
Suppose A is a finite set equipped with a probability measure P and let M be a ``mass'' function on A. We give a probabilistic characterization of the most efficient way in which A^n can be almost-covered using spheres of a fixed radius. An almost-covering is a subset C_n of A^n, such that the union of the spheres centered at the points of C_n has probability close to one with respect to the product measure P^n. An efficient covering is one with small mass M^n(C_n); n is typically large. With different choices for M and the geometry on A our results give various corollaries as special cases, including Shannon's data compression theorem, a version of Stein's lemma (in hypothesis testing), and a new converse to some measure concentration inequalities on discrete spaces. Under mild conditions, we generalize our results to abstract spaces and non-product measures.
[ { "version": "v1", "created": "Tue, 12 Oct 1999 20:28:46 GMT" }, { "version": "v2", "created": "Wed, 27 Sep 2000 18:48:32 GMT" } ]
2007-07-16T00:00:00
[ [ "Kontoyiannis", "Ioannis", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/9910149
Jose Ignacio Farran
J. I. Farran
Rational points, genus and asymptotic behaviour in reduced algebraic curves over finite fields
8 pages
null
null
AGT-34
math.AG cs.IT math.IT math.NT
null
The number A(q) shows the asymptotic behaviour of the quotient of the number of rational points over the genus of non-singular absolutely irreducible curves over a finite field Fq. Research on bounds for A(q) is closely connected with the so-called asymptotic main problem in Coding Theory. In this paper, we study some generalizations of this number for non-irreducible curves, their connection with A(q) and its application in Coding Theory.
[ { "version": "v1", "created": "Wed, 27 Oct 1999 14:57:20 GMT" } ]
2007-07-16T00:00:00
[ [ "Farran", "J. I.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
math/9910151
Jose Ignacio Farran
J. I. Farran
Decoding Algebraic Geometry codes by a key equation
11 pages, submitted to "Finite Fields and their Applications"
null
null
AGT-63
math.AG cs.IT math.IT math.NA
null
A new effective decoding algorithm is presented for arbitrary algebraic-geometric codes on the basis of solving a generalized key equation with the majority coset scheme of Duursma. It is an improvement of Ehrhard's algorithm, since the method corrects up to the half of the Goppa distance with complexity order O(n**2.81), and with no further assumption on the degree of the divisor G.
[ { "version": "v1", "created": "Wed, 27 Oct 1999 15:39:48 GMT" } ]
2007-07-16T00:00:00
[ [ "Farran", "J. I.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
math/9910155
Jose Ignacio Farran
A. Campillo and J. I. Farran
Computing Weierstrass semigroups and the Feng-Rao distance from singular plane models
22 pages, to appear in "Finite Fields and their Applications"
null
null
AGT-58
math.AG cs.IT math.IT math.NA
null
We present an algorithm to compute the Weierstrass semigroup at a point P together with functions for each value in the semigroup, provided P is the only branch at infinity of a singular plane model for the curve. As a byproduct, the method also provides us with a basis for the spaces L(mP) and the computation of the Feng-Rao distance for the corresponding array of geometric Goppa codes. A general computation of the Feng-Rao distance is also obtained. Everything can be applied to the decoding problem by using the majority scheme of Feng and Rao.
[ { "version": "v1", "created": "Thu, 28 Oct 1999 09:27:47 GMT" } ]
2007-07-16T00:00:00
[ [ "Campillo", "A.", "" ], [ "Farran", "J. I.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
math/9910175
Alexander Barg
A. Ashikhmin, A. Barg, S. Litsyn
Polynomial method in coding and information theory
11 pages
null
null
null
math.CO cs.IT math.IT
null
Polynomial, or Delsarte's, method in coding theory accounts for a variety of structural results on, and bounds on the size of, extremal configurations (codes and designs) in various metric spaces. In recent works of the authors the applicability of the method was extended to cover a wider range of problems in coding and information theory. In this paper we present a general framework for the method which includes previous results as particular cases. We explain how this generalization leads to new asymptotic bounds on the performance of codes in binary-input memoryless channels and the Gaussian channel, which improve the results of Shannon et al. of 1959-67, and to a number of other results in combinatorial coding theory.
[ { "version": "v1", "created": "Sun, 31 Oct 1999 00:03:37 GMT" } ]
2007-07-16T00:00:00
[ [ "Ashikhmin", "A.", "" ], [ "Barg", "A.", "" ], [ "Litsyn", "S.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/9910185
David Eppstein
Michael B. Dillencourt and David Eppstein and Daniel S. Hirschberg
Geometric Thickness of Complete Graphs
11 pages, 3 figures. A preliminary version of this paper appeared in the Sixth Symposium on Graph Drawing, GD '98, (Montr\'eal, Canada, August 1998), Springer-Verlag Lecture Notes in Computer Science 1547, 102--110
J. Graph Algorithms & Applications 4(3):5-17, 2000
null
null
math.CO cs.DM
null
We define the geometric thickness of a graph to be the smallest number of layers such that we can draw the graph in the plane with straight-line edges and assign each edge to a layer so that no two edges on the same layer cross. The geometric thickness lies between two previously studied quantities, the (graph-theoretical) thickness and the book thickness. We investigate the geometric thickness of the family of complete graphs, K_n. We show that the geometric thickness of K_n lies between ceiling((n/5.646) + 0.342) and ceiling(n/4), and we give exact values of the geometric thickness of K_n for n <= 12 and n in {15,16}. We also consider the geometric thickness of the family of complete bipartite graphs. In particular, we show that, unlike the case of complete graphs, there are complete bipartite graphs with arbitrarily large numbers of vertices for which the geometric thickness coincides with the standard graph-theoretical thickness.
[ { "version": "v1", "created": "Mon, 1 Nov 1999 22:39:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Dillencourt", "Michael B.", "" ], [ "Eppstein", "David", "" ], [ "Hirschberg", "Daniel S.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/9911025
Jose Ignacio Farran
A. Campillo, J. I. Farran and C. Munuera
On the parameters of Algebraic Geometry codes related to Arf semigroups
12 pages
null
null
AGT-83
math.NT cs.IT math.AG math.IT
null
In this paper we compute the order (or Feng-Rao) bound on the minimum distance of one-point algebraic geometry codes, when the Weierstrass semigroup at the point Q is an Arf semigroup. The results developed to that purpose also provide the dimension of the improved geometric Goppa codes related to those.
[ { "version": "v1", "created": "Thu, 4 Nov 1999 15:57:56 GMT" } ]
2007-07-16T00:00:00
[ [ "Campillo", "A.", "" ], [ "Farran", "J. I.", "" ], [ "Munuera", "C.", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/9912059
Philippe Gaucher
Philippe Gaucher
Combinatorics of branchings in higher dimensional automata
Final version, see http://www.tac.mta.ca/tac/volumes/8/n12/abstract.html
Theory and Applications of Categories, Vol. 8, 2001, No. 12, pp 324-376
null
null
math.CT cs.OH math.AT
null
We explore the combinatorial properties of the branching areas of execution paths in higher dimensional automata. Mathematically, this means that we investigate the combinatorics of the negative corner (or branching) homology of a globular $\omega$-category and the combinatorics of a new homology theory called the reduced branching homology. The latter is the homology of the quotient of the branching complex by the sub-complex generated by its thin elements. Conjecturally it coincides with the non reduced theory for higher dimensional automata, that is $\omega$-categories freely generated by precubical sets. As application, we calculate the branching homology of some $\omega$-categories and we give some invariance results for the reduced branching homology. We only treat the branching side. The merging side, that is the case of merging areas of execution paths is similar and can be easily deduced from the branching side.
[ { "version": "v1", "created": "Wed, 8 Dec 1999 13:15:11 GMT" }, { "version": "v2", "created": "Tue, 14 Dec 1999 14:05:25 GMT" }, { "version": "v3", "created": "Fri, 25 Feb 2000 15:11:34 GMT" }, { "version": "v4", "created": "Thu, 5 Jul 2001 13:40:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Gaucher", "Philippe", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
nlin/0001057
Theodore C. Belding
Theodore C. Belding
Numerical Replication of Computer Simulations: Some Pitfalls and How To Avoid Them
January 25 2000 draft, submitted to GECCO 2000, 6 pages
null
null
null
nlin.AO cs.NE
null
A computer simulation, such as a genetic algorithm, that uses IEEE standard floating-point arithmetic may not produce exactly the same results in two different runs, even if it is rerun on the same computer with the same input and random number seeds. Researchers should not simply assume that the results from one run replicate those from another but should verify this by actually comparing the data. However, researchers who are aware of this pitfall can reliably replicate simulations, in practice. This paper discusses the problem and suggests solutions.
[ { "version": "v1", "created": "Wed, 26 Jan 2000 03:08:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Belding", "Theodore C.", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
nlin/0002040
Kai Nagel
Kai Nagel, Marcus Rickert, Patrice M. Simon, Martin Pieck
The dynamics of iterated transportation simulations
24 pages, 7 figures
null
null
null
nlin.AO cs.CE
null
Iterating between a router and a traffic micro-simulation is an increasibly accepted method for doing traffic assignment. This paper, after pointing out that the analytical theory of simulation-based assignment to-date is insufficient for some practical cases, presents results of simulation studies from a real world study. Specifically, we look into the issues of uniqueness, variability, and robustness and validation. Regarding uniqueness, despite some cautionary notes from a theoretical point of view, we find no indication of ``meta-stable'' states for the iterations. Variability however is considerable. By variability we mean the variation of the simulation of a given plan set by just changing the random seed. We show then results from three different micro-simulations under the same iteration scenario in order to test for the robustness of the results under different implementations. We find the results encouraging, also when comparing to reality and with a traditional assignment result. Keywords: dynamic traffic assignment (DTA); traffic micro-simulation; TRANSIMS; large-scale simulations; urban planning
[ { "version": "v1", "created": "Wed, 23 Feb 2000 01:42:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Nagel", "Kai", "" ], [ "Rickert", "Marcus", "" ], [ "Simon", "Patrice M.", "" ], [ "Pieck", "Martin", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
nlin/0004007
Gregory J. Chaitin
G.J. Chaitin (IBM Research)
A Century of Controvery Over the Foundations of Mathematics II
16 pages in html using Symbol font for Greek letters
null
null
null
nlin.CD cs.CC math.HO
null
Transcript of G.J. Chaitin's 2 March 2000 Carnegie Mellon University School of Computer Science Distinguished Lecture. The notion of randomness is taken from physics and applied to pure mathematics in order to shed light on the incompleteness phenomenon discovered by K. Godel.
[ { "version": "v1", "created": "Tue, 4 Apr 2000 19:44:58 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2000 15:11:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Chaitin", "G. J.", "", "IBM Research" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" } ]
nlin/0006025
Cosma Rohilla Shalizi
Cosma Rohilla Shalizi and James P. Crutchfield (Santa Fe Institute)
Information Bottlenecks, Causal States, and Statistical Relevance Bases: How to Represent Relevant Information in Memoryless Transduction
3 pages, no figures, submitted to PRE as a "brief report". Revision: added an acknowledgements section originally omitted by a LaTeX bug
Advances in Complex Systems, vol. 5, pp. 91--95 (2002)
10.1142/S0219525902000481
null
nlin.AO cond-mat.dis-nn cs.LG physics.data-an
null
Discovering relevant, but possibly hidden, variables is a key step in constructing useful and predictive theories about the natural world. This brief note explains the connections between three approaches to this problem: the recently introduced information-bottleneck method, the computational mechanics approach to inferring optimal models, and Salmon's statistical relevance basis.
[ { "version": "v1", "created": "Fri, 16 Jun 2000 17:01:39 GMT" } ]
2022-02-17T00:00:00
[ [ "Shalizi", "Cosma Rohilla", "", "Santa Fe Institute" ], [ "Crutchfield", "James P.", "", "Santa Fe Institute" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
nlin/0102026
Chau Hoi Fung
K. M. Lee, Hao Xu and H. F. Chau
Parity Problem With A Cellular Automaton Solution
Revtex, 4 pages, final version accepted by Phys.Rev.E
null
10.1103/PhysRevE.64.026702
null
nlin.CG cond-mat.stat-mech cs.CC nlin.AO
null
The parity of a bit string of length $N$ is a global quantity that can be efficiently compute using a global counter in ${O} (N)$ time. But is it possible to find the parity using cellular automata with a set of local rule tables without using any global counter? Here, we report a way to solve this problem using a number of $r=1$ binary, uniform, parallel and deterministic cellular automata applied in succession for a total of ${O} (N^2)$ time.
[ { "version": "v1", "created": "Wed, 21 Feb 2001 09:16:50 GMT" }, { "version": "v2", "created": "Thu, 3 May 2001 13:46:59 GMT" } ]
2009-11-07T00:00:00
[ [ "Lee", "K. M.", "" ], [ "Xu", "Hao", "" ], [ "Chau", "H. F.", "" ] ]
[ { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
nlin/0103057
Chau Hoi Fung
H. F. Chau, H. Xu, K. M. Lee, L. W. Siu and K. K. Yan
Finding The Sign Of A Function Value By Binary Cellular Automaton
Revtex, uses amsfonts, 10 pages
null
10.1142/S0129183102003929
null
nlin.CG cond-mat cs.CC
null
Given a continuous function $f(x)$, suppose that the sign of $f$ only has finitely many discontinuous points in the interval $[0,1]$. We show how to use a sequence of one dimensional deterministic binary cellular automata to determine the sign of $f(\rho)$ where $\rho$ is the (number) density of 1s in an arbitrarily given bit string of finite length provided that $f$ satisfies certain technical conditions.
[ { "version": "v1", "created": "Fri, 30 Mar 2001 10:33:26 GMT" } ]
2009-11-07T00:00:00
[ [ "Chau", "H. F.", "" ], [ "Xu", "H.", "" ], [ "Lee", "K. M.", "" ], [ "Siu", "L. W.", "" ], [ "Yan", "K. K.", "" ] ]
[ { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, null, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
nlin/0109001
Carlos Gershenson
Carlos Gershenson
Complex Philosophy
null
null
null
null
nlin.AO cs.CC
null
We present several philosophical ideas emerging from the studies of complex systems. We make a brief introduction to the basic concepts of complex systems, for then defining "abstraction levels". These are useful for representing regularities in nature. We define absolute being (observer independent, infinite) and relative being (observer dependent, finite), and notice the differences between them. We draw issues on relative causality and absolute causality among abstraction levels. We also make reflections on determinism. We reject the search for any absolute truth (because of their infinity), and promote the idea that all comprehensible truths are relative, since they were created in finite contexts. This leads us to suggest to search the less-incompleteness of ideas and contexts instead of their truths.
[ { "version": "v1", "created": "Sat, 1 Sep 2001 10:50:22 GMT" }, { "version": "v2", "created": "Mon, 12 Nov 2001 19:13:41 GMT" }, { "version": "v3", "created": "Fri, 31 May 2002 20:57:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
nlin/0109019
Eugeni Balkovsky
Eugene Balkovsky, Boris I. Shraiman
Olfactory search at high Reynolds number
6 pages, 4 figures
null
10.1073/pnas.192393499
null
nlin.CD cs.RO nlin.AO physics.bio-ph
null
Locating the source of odor in a turbulent environment - a common behavior for living organisms - is non-trivial because of the random nature of mixing. Here we analyze the statistical physics aspects of the problem and propose an efficient strategy for olfactory search which can work in turbulent plumes. The algorithm combines the maximum likelihood inference of the source position with an active search. Our approach provides the theoretical basis for the design of olfactory robots and the quantitative tools for the analysis of the observed olfactory search behavior of living creatures (e.g. odor modulated optomotor anemotaxis of moth)
[ { "version": "v1", "created": "Tue, 18 Sep 2001 20:29:24 GMT" } ]
2009-11-07T00:00:00
[ [ "Balkovsky", "Eugene", "" ], [ "Shraiman", "Boris I.", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" } ]
nlin/0202038
Marc Toussaint
Marc Toussaint
On model selection and the disability of neural networks to decompose tasks
LaTeX, 7 pages, 3 figures
Proceedings of the International Joint Conference on Neural Networks (IJCNN 2002), 245-250.
null
null
nlin.AO cond-mat.dis-nn cs.NE
null
A neural network with fixed topology can be regarded as a parametrization of functions, which decides on the correlations between functional variations when parameters are adapted. We propose an analysis, based on a differential geometry point of view, that allows to calculate these correlations. In practise, this describes how one response is unlearned while another is trained. Concerning conventional feed-forward neural networks we find that they generically introduce strong correlations, are predisposed to forgetting, and inappropriate for task decomposition. Perspectives to solve these problems are discussed.
[ { "version": "v1", "created": "Tue, 19 Feb 2002 12:39:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Toussaint", "Marc", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
nlin/0202039
Marc Toussaint
Marc Toussaint
A neural model for multi-expert architectures
LaTeX, 8 pages, 5 figures
Proceedings of the International Joint Conference on Neural Networks (IJCNN 2002), 2755-2760.
null
null
nlin.AO cond-mat.dis-nn cs.NE
null
We present a generalization of conventional artificial neural networks that allows for a functional equivalence to multi-expert systems. The new model provides an architectural freedom going beyond existing multi-expert models and an integrative formalism to compare and combine various techniques of learning. (We consider gradient, EM, reinforcement, and unsupervised learning.) Its uniform representation aims at a simple genetic encoding and evolutionary structure optimization of multi-expert systems. This paper contains a detailed description of the model and learning rules, empirically validates its functionality, and discusses future perspectives.
[ { "version": "v1", "created": "Tue, 19 Feb 2002 13:11:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Toussaint", "Marc", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
nlin/0204038
Marc Toussaint
Marc Toussaint and Christian Igel
Neutrality: A Necessity for Self-Adaptation
6 pages, 3 figures, LaTeX
Proceedings of the Congress on Evolutionary Computation (CEC 2002), 1354-1359.
null
null
nlin.AO cs.NE q-bio
null
Self-adaptation is used in all main paradigms of evolutionary computation to increase efficiency. We claim that the basis of self-adaptation is the use of neutrality. In the absence of external control neutrality allows a variation of the search distribution without the risk of fitness loss.
[ { "version": "v1", "created": "Tue, 16 Apr 2002 12:58:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Toussaint", "Marc", "" ], [ "Igel", "Christian", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, null ]
nlin/0207032
Chau Hoi Fung
Hao Xu, K. M. Lee and H. F. Chau
Modulo Three Problem With A Cellular Automaton Solution
10 pages in revtex 4.0, using amsfonts
null
10.1142/S0129183103004450
null
nlin.CG cs.CC
null
An important global property of a bit string is the number of ones in it. It has been found that the parity (odd or even) of this number can be found by a sequence of deterministic, translational invariant cellular automata with parallel update in succession for a total of O(N^2) time. In this paper, we discover a way to check if this number is divisible by three using the same kind of cellular automata in O(N^3) time. We also speculate that the method described here could be generalized to check if it is divisible by four and other positive integers.
[ { "version": "v1", "created": "Thu, 18 Jul 2002 09:17:04 GMT" } ]
2009-11-07T00:00:00
[ [ "Xu", "Hao", "" ], [ "Lee", "K. M.", "" ], [ "Chau", "H. F.", "" ] ]
[ { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
nlin/0210041
Marcel Ausloos
Marcel Ausloos (Univ. de Liege), Paulette Clippe (Univ. de Liege) and Andrzej Pekalski (University of Wroclaw)
Simple Model for the Dynamics of Correlations in the Evolution of Economic Entities Under Varying Economic Conditions
Presented at Bali IEC02 symposium, Aug. 2002; submitted to Physica A ; 8 pages, 5 figures
Physica A 324 (2003) 330-337
10.1016/S0378-4371(02)01844-7
null
nlin.AO cond-mat.stat-mech cs.CE physics.soc-ph
null
From some observations on economic behaviors, in particular changing economic conditions with time and space, we develop a very simple model for the evolution of economic entities within a geographical type of framework. We raise a few questions and attempt to investigate whether some of them can be tackled by our model. Several cases of interest are reported. It is found that the model even in its simple forms can lead to a large variety of situations, including: delocalization and cycles, but also pre-chaotic behavior.
[ { "version": "v1", "created": "Fri, 18 Oct 2002 11:35:49 GMT" } ]
2012-08-31T00:00:00
[ [ "Ausloos", "Marcel", "", "Univ. de Liege" ], [ "Clippe", "Paulette", "", "Univ. de Liege" ], [ "Pekalski", "Andrzej", "", "University of Wroclaw" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
nlin/0211010
Roland Rothenstein
R. Rothenstein and K. Pawelzik
Evolution and anti-evolution in a minimal stock market model
13 pages, 5 figures
Physica A 326, 534-543(2003)
10.1016/S0378-4371(03)00396-0
null
nlin.AO cond-mat.stat-mech cs.MA q-fin.TR
null
We present a novel microscopic stock market model consisting of a large number of random agents modeling traders in a market. Each agent is characterized by a set of parameters that serve to make iterated predictions of two successive returns. The future price is determined according to the offer and the demand of all agents. The system evolves by redistributing the capital among the agents in each trading cycle. Without noise the dynamics of this system is nearly regular and thereby fails to reproduce the stochastic return fluctuations observed in real markets. However, when in each cycle a small amount of noise is introduced we find the typical features of real financial time series like fat-tails of the return distribution and large temporal correlations in the volatility without significant correlations in the price returns. Introducing the noise by an evolutionary process leads to different scalings of the return distributions that depend on the definition of fitness. Because our realistic model has only very few parameters, and the results appear to be robust with respect to the noise level and the number of agents we expect that our framework may serve as new paradigm for modeling self generated return fluctuations in markets.
[ { "version": "v1", "created": "Thu, 7 Nov 2002 23:15:48 GMT" }, { "version": "v2", "created": "Wed, 7 May 2003 15:09:30 GMT" } ]
2009-11-07T00:00:00
[ [ "Rothenstein", "R.", "" ], [ "Pawelzik", "K.", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Quantitative Finance", "code": "q-fin.TR", "description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making", "span": "(Trading and Market Microstructure)" } ]
nlin/0211013
Fariel Shafee
Fariel Shafee
A Spin Glass Model of Human Logic Systems
null
null
null
null
nlin.AO cond-mat.dis-nn cs.MA
null
In this paper, we discuss different models for human logic systems and describe a game with nature. G\"odel`s incompleteness theorem is taken into account to construct a model of logical networks based on axioms obtained by symmetry breaking. These classical logic networks are then coupled using rules that depend on whether two networks contain axioms or anti-axioms. The social lattice of axiom based logic networks is then placed with the environment network in a game including entropy as a cost factor. The classical logical networks are then replaced with ``preference axioms'' to the role of fuzzy logic.
[ { "version": "v1", "created": "Fri, 8 Nov 2002 16:40:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Shafee", "Fariel", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
nlin/0211024
Hugo Fort Quijano
H. Fort
Exploring the cooperative regimes in a model of agents without memory or "tags": indirect reciprocity vs. selfish incentives
11 pages, 5 figures
Physica A326 (2003) 286-298
10.1016/S0378-4371(03)00263-2
null
nlin.AO cond-mat cs.CE hep-lat nlin.CG physics.soc-ph
null
The self-organization in cooperative regimes in a simple mean-field version of a model based on "selfish" agents which play the Prisoner's Dilemma (PD) game is studied. The agents have no memory and use strategies not based on direct reciprocity nor 'tags'. Two variables are assigned to each agent $i$ at time $t$, measuring its capital $C(i;t)$ and its probability of cooperation $p(i;t)$. At each time step $t$ a pair of agents interact by playing the PD game. These 2 agents update their probability of cooperation $p(i)$ as follows: they compare the profits they made in this interaction $\delta C(i;t)$ with an estimator $\epsilon(i;t)$ and, if $\delta C(i;t) \ge \epsilon(i;t)$, agent $i$ increases its $p(i;t)$ while if $\delta C(i;t) < \epsilon(i;t)$ the agent decreases $p(i;t)$. The 4!=24 different cases produced by permuting the four Prisoner's Dilemma canonical payoffs 3, 0, 1, and 5 - corresponding,respectively, to $R$ (reward), $S$ (sucker's payoff), $T$ (temptation to defect) and $P$ (punishment) - are analyzed. It turns out that for all these 24 possibilities, after a transient,the system self-organizes into a stationary state with average equilibrium probability of cooperation $\bar{p}_\infty$ = constant $ > 0$.Depending on the payoff matrix, there are different equilibrium states characterized by their average probability of cooperation and average equilibrium per-capita-income ($\bar{p}_\infty,\bar{\delta C}_\infty$).
[ { "version": "v1", "created": "Fri, 15 Nov 2002 17:48:45 GMT" } ]
2009-11-07T00:00:00
[ [ "Fort", "H.", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, null, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "hep-lat", "description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.", "span": "(High Energy Physics - Lattice)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
nlin/0212001
Kohtaro Tadaki
Kohtaro Tadaki
A Generalization of Chaitin's Halting Probability \Omega and Halting Self-Similar Sets
29 pages, LaTeX2e, AMSLaTeX1.2, \usepackage{a4wide}, no figures
Hokkaido Mathematical Journal, Vol. 31, No. 1, February 2002, 219-253
10.14492/hokmj/1350911778
null
nlin.CD cs.CC
null
We generalize the concept of randomness in an infinite binary sequence in order to characterize the degree of randomness by a real number D>0. Chaitin's halting probability \Omega is generalized to \Omega^D whose degree of randomness is precisely D. On the basis of this generalization, we consider the degree of randomness of each point in Euclidean space through its base-two expansion. It is then shown that the maximum value of such a degree of randomness provides the Hausdorff dimension of a self-similar set that is computable in a certain sense. The class of such self-similar sets includes familiar fractal sets such as the Cantor set, von Koch curve, and Sierpinski gasket. Knowledge of the property of \Omega^D allows us to show that the self-similar subset of [0,1] defined by the halting set of a universal algorithm has a Hausdorff dimension of one.
[ { "version": "v1", "created": "Mon, 2 Dec 2002 06:54:47 GMT" } ]
2019-09-04T00:00:00
[ [ "Tadaki", "Kohtaro", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
nlin/0212030
Marc Toussaint
Marc Toussaint
The structure of evolutionary exploration: On crossover, buildings blocks and Estimation-Of-Distribution Algorithms
11 pages, 2 figures, draft
null
null
null
nlin.AO cs.NE q-bio
null
The notion of building blocks can be related to the structure of the offspring probability distribution: loci of which variability is strongly correlated constitute a building block. We call this correlated exploration. With this background we analyze the structure of the offspring probability distribution, or exploration distribution, for a GA with mutation only, a crossover GA, and an Estimation-Of-Distribution Algorithm (EDA). The results allow a precise characterization of the structure of the crossover exploration distribution. Essentially, the crossover operator destroys mutual information between loci by transforming it into entropy; it does the inverse of correlated exploration. In contrast, the objective of EDAs is to model the mutual information between loci in the fitness distribution and thereby they induce correlated exploration.
[ { "version": "v1", "created": "Wed, 11 Dec 2002 19:28:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Toussaint", "Marc", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, null ]
nlin/0303016
Paul Vitanyi
Paul Vitanyi (CWI and University of Amsterdam)
Algorithmic Chaos
7 pages LaTeX
null
null
null
nlin.CD cs.CC math.DS
null
Many physical theories like chaos theory are fundamentally concerned with the conceptual tension between determinism and randomness. Kolmogorov complexity can express randomness in determinism and gives an approach to formulate chaotic behavior.
[ { "version": "v1", "created": "Fri, 7 Mar 2003 18:37:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitanyi", "Paul", "", "CWI and University of Amsterdam" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" } ]
nlin/0303020
Carlos Gershenson
Carlos Gershenson and Francis Heylighen
When Can we Call a System Self-organizing?
8 pages, 1 figure
In Banzhaf, W, T. Christaller, P. Dittrich, J. T. Kim, and J. Ziegler, Advances in Artificial Life, 7th European Conference, ECAL 2003, Dortmund, Germany, pp. 606-614. LNAI 2801. Springer.
null
null
nlin.AO cond-mat.dis-nn cond-mat.stat-mech cs.CC
null
We do not attempt to provide yet another definition of selforganization, but explore the conditions under which we can model a system as self-organizing. These involve the dynamics of entropy, and the purpose, aspects, and description level chosen by an observer. We show how, changing the level or "graining" of description, the same system can appear selforganizing or self-disorganizing. We discuss ontological issues we face when studying self-organizing systems, and analyse when designing and controlling artificial self-organizing systems is useful. We conclude that self-organization is a way of observing systems, not an absolute class of systems.
[ { "version": "v1", "created": "Mon, 10 Mar 2003 18:24:04 GMT" }, { "version": "v2", "created": "Wed, 11 Jun 2003 19:48:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ], [ "Heylighen", "Francis", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
nlin/0303021
Carlos Gershenson
Carlos Gershenson, Jan Broekaert, and Diederik Aerts
Contextual Random Boolean Networks
10 pages, 5 figures
In Banzhaf, W, T. Christaller, P. Dittrich, J. T. Kim, and J. Ziegler, Advances in Artificial Life, 7th European Conference, ECAL 2003, Dortmund, Germany, pp. 615-624. LNAI 2801. Springer.
null
null
nlin.AO cond-mat.dis-nn cs.CC nlin.CG
null
We propose the use of Deterministic Generalized Asynchronous Random Boolean Networks [Gershenson, 2002] as models of contextual deterministic discrete dynamical systems. We show that changes in the context have drastic effects on the global properties of the same networks, namely the average number of attractors and the average percentage of states in attractors. We introduce the situation where we lack knowledge on the context as a more realistic model for contextual dynamical systems. We notice that this makes the network non-deterministic in a specific way, namely introducing a non-Kolmogorovian quantum-like structure for the modelling of the network [Aerts, 1986]. In this case, for example, a state of the network has the potentiality (probability) of collapsing into different attractors, depending on the specific form of lack of knowledge on the context.
[ { "version": "v1", "created": "Mon, 10 Mar 2003 18:42:57 GMT" }, { "version": "v2", "created": "Wed, 11 Jun 2003 20:05:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ], [ "Broekaert", "Jan", "" ], [ "Aerts", "Diederik", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" } ]
nlin/0304006
Pontus Svenson
Pontus Svenson and Hedvig Sidenbladh
Determining possible avenues of approach using ANTS
8 pages, 12 figures. Accepted for 6th Int. Conf. Information Fusion, Cairns 2003
Proc 6th Int Conf Information Fusion, Cairns, p 1110 (2003)
null
null
nlin.AO cs.AI
null
Threat assessment is an important part of level 3 data fusion. Here we study a subproblem of this, worst-case risk assessment. Inspired by agent-based models used for simulation of trail formation for urban planning, we use ant colony optimization (ANTS) to determine possible avenues of approach for the enemy, given a situation picture. One way of determining such avenues would be to calculate the ``potential field'' caused by placing sources at possible goals for the enemy. This requires postulating a functional form for the potential, and also takes long time. Here we instead seek a method for quickly obtaining an effective potential. ANTS, which has previously been used to obtain approximate solutions to various optimization problems, is well suited for this. The output of our method describes possible avenues of approach for the enemy, i.e, areas where we should be prepared for attack. (The algorithm can also be run ``reversed'' to instead get areas of opportunity for our forces to exploit.) Using real geographical data, we found that our method gives a fast and reliable way of determining such avenues. Our method can be used in a computer-based command and control system to replace the first step of human intelligence analysis.
[ { "version": "v1", "created": "Fri, 4 Apr 2003 15:25:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Svenson", "Pontus", "" ], [ "Sidenbladh", "Hedvig", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
nlin/0306055
Andreas U. Schnmidt
Andreas U. Schmidt
A Model for Prejudiced Learning in Noisy Environments
21 pages, 11 figures; reduced graphics to slash size, full version on Author's homepage. Minor revisions in text and references, identical to version to be published in Applied Mathematics and Computation
Applied Mathematics and Computation, vol. 168, no. 1 (2005) 354-379
10.1016/j.amc.2004.09.003
null
nlin.AO cs.LG
null
Based on the heuristics that maintaining presumptions can be beneficial in uncertain environments, we propose a set of basic axioms for learning systems to incorporate the concept of prejudice. The simplest, memoryless model of a deterministic learning rule obeying the axioms is constructed, and shown to be equivalent to the logistic map. The system's performance is analysed in an environment in which it is subject to external randomness, weighing learning defectiveness against stability gained. The corresponding random dynamical system with inhomogeneous, additive noise is studied, and shown to exhibit the phenomena of noise induced stability and stochastic bifurcations. The overall results allow for the interpretation that prejudice in uncertain environments entails a considerable portion of stubbornness as a secondary phenomenon.
[ { "version": "v1", "created": "Thu, 26 Jun 2003 10:12:58 GMT" }, { "version": "v2", "created": "Tue, 14 Sep 2004 10:31:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidt", "Andreas U.", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
nlin/0309033
Joseph Wakeling
Paolo Laureti, Peter Ruch, Joseph Wakeling and Yi-Cheng Zhang
The Interactive Minority Game: a Web-based investigation of human market interactions
11 pages, 1 table, 5 figures. This replacement contains a few small corrections made during publication
Physica A 331 (2004) 651-659
10.1016/j.physa.2003.07.002
null
nlin.AO cond-mat.stat-mech cs.HC physics.soc-ph
null
The unprecedented access offered by the World Wide Web brings with it the potential to gather huge amounts of data on human activities. Here we exploit this by using a toy model of financial markets, the Minority Game (MG), to investigate human speculative trading behaviour and information capacity. Hundreds of individuals have played a total of tens of thousands of game turns against computer-controlled agents in the Web-based_Interactive Minority Game_. The analytical understanding of the MG permits fine-tuning of the market situations encountered, allowing for investigation of human behaviour in a variety of controlled environments. In particular, our results indicate a transition in players' decision-making, as the markets become more difficult, between deductive behaviour making use of short-term trends in the market, and highly repetitive behaviour that ignores entirely the market history, yet outperforms random decision-making. PACS: 02.50.Le; 89.65.Gh; 89.70.+c Keywords: Decision theory and game theory; Economics and financial markets; Information theory
[ { "version": "v1", "created": "Tue, 9 Sep 2003 17:25:11 GMT" }, { "version": "v2", "created": "Wed, 5 Nov 2003 17:48:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Laureti", "Paolo", "" ], [ "Ruch", "Peter", "" ], [ "Wakeling", "Joseph", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
nlin/0309039
Carlos Gershenson
Carlos Gershenson
Self-organizing Traffic Control: First Results
10 pages, 3 figures
null
null
null
nlin.AO cs.MA
null
We developed a virtual laboratory for traffic control where agents use different strategies in order to self-organize on the road. We present our first results where we compare the performance and behaviour promoted by environmental constrains and five different simple strategies: three inspired in flocking behaviour, one selfish, and one inspired in the minority game. Experiments are presented for comparing the strategies. Different issues are discussed, such as the important role of environmental constrains and the emergence of traffic lanes.
[ { "version": "v1", "created": "Fri, 12 Sep 2003 20:39:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
nlin/0311008
Carlos Gershenson
Carlos Gershenson
Phase Transitions in Random Boolean Networks with Different Updating Schemes
More info and better images at http://homepages.vub.ac.be/~cgershen/rbn
null
null
null
nlin.AO cond-mat.stat-mech cs.CC nlin.CG q-bio.QM
null
In this paper we study the phase transitions of different types of Random Boolean networks. These differ in their updating scheme: synchronous, semi-synchronous, or asynchronous, and deterministic or non-deterministic. It has been shown that the statistical properties of Random Boolean networks change considerable according to the updating scheme. We study with computer simulations sensitivity to initial conditions as a measure of order/chaos. We find that independently of their updating scheme, all network types have very similar phase transitions, namely when the average number of connections of nodes is between one and three. This critical value depends more on the size of the network than on the updating scheme.
[ { "version": "v1", "created": "Wed, 5 Nov 2003 19:09:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
nlin/0312056
Ricardo Lopez-Ruiz
Ricardo Lopez-Ruiz
Shannon information, LMC complexity and Renyi entropies: a straightforward approach
11 pages, 0 figures
null
null
null
nlin.AO cond-mat.stat-mech cs.IT math.IT nlin.CD physics.comp-ph q-bio.QM
null
The LMC complexity, an indicator of complexity based on a probabilistic description, is revisited. A straightforward approach allows us to establish the time evolution of this indicator in a near-equilibrium situation and gives us a new insight for interpreting the LMC complexity for a general non equilibrium system. Its relationship with the Renyi entropies is also explained. One of the advantages of this indicator is that its calculation does not require a considerable computational effort in many cases of physical and biological interest.
[ { "version": "v1", "created": "Mon, 22 Dec 2003 17:30:42 GMT" } ]
2016-09-08T00:00:00
[ [ "Lopez-Ruiz", "Ricardo", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
nlin/0402006
Carlos Gershenson
Carlos Gershenson
Updating Schemes in Random Boolean Networks: Do They Really Matter?
To be Published in Artificial Life IX. 6 pages, 7 figures. More info and better images at http://homepages.vub.ac.be/~cgershen/rbn
In Pollack, J., M. Bedau, P. Husbands, T. Ikegami, and R. A. Watson (eds.) Artificial Life IX, Proceedings of the Ninth International Conference on the Simulation and Synthesis of Living Systems. pp. 238-243. MIT Press. 2004
null
null
nlin.AO cond-mat.other cs.CC nlin.CG q-bio.MN q-bio.OT q-bio.QM
null
In this paper we try to end the debate concerning the suitability of different updating schemes in random Boolean networks (RBNs). We quantify for the first time loose attractors in asyncrhonous RBNs, which allows us to analyze the complexity reduction related to different updating schemes. We also report that all updating schemes yield very similar critical stability values, meaning that the "edge of chaos" does not depend much on the updating scheme. After discussion, we conclude that synchonous RBNs are justifiable theoretical models of biological networks.
[ { "version": "v1", "created": "Thu, 5 Feb 2004 15:08:26 GMT" }, { "version": "v2", "created": "Fri, 6 Feb 2004 14:41:25 GMT" }, { "version": "v3", "created": "Fri, 30 Apr 2004 14:06:25 GMT" } ]
2011-11-10T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.OT", "description": "Work in quantitative biology that does not fit into the other q-bio classifications", "span": "(Other Quantitative Biology)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
nlin/0402046
Venkat Venkatasubramanian
Venkat Venkatasubramanian, Santhoji Katare, Priyan R. Patkar, and Fangping Mu
Spontaneous Emergence of Complex Optimal Networks through Evolutionary Adaptation
In press, Computers and Chemical Engg., 2004, 21 pages, 12 figures, 1 table
null
null
null
nlin.AO cond-mat.stat-mech cs.MA nlin.CG q-bio.QM
null
An important feature of many complex systems, both natural and artificial, is the structure and organization of their interaction networks with interesting properties. Here we present a theory of self-organization by evolutionary adaptation in which we show how the structure and organization of a network is related to the survival, or in general the performance, objectives of the system. We propose that a complex system optimizes its network structure in order to maximize its overall survival fitness which is composed of short-term and long-term survival components. These in turn depend on three critical measures of the network, namely, efficiency, robustness and cost, and the environmental selection pressure. Using a graph theoretical case study, we show that when efficiency is paramount the "Star" topology emerges and when robustness is important the "Circle" topology is found. When efficiency and robustness requirements are both important to varying degrees, other classes of networks such as the "Hub" emerge. Our assumptions and results are consistent with observations across a wide variety of applications.
[ { "version": "v1", "created": "Tue, 24 Feb 2004 23:56:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkatasubramanian", "Venkat", "" ], [ "Katare", "Santhoji", "" ], [ "Patkar", "Priyan R.", "" ], [ "Mu", "Fangping", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
nlin/0404004
Carlos Gershenson
Carlos Gershenson and Francis Heylighen (Vrije Universiteit Brussel)
Protocol Requirements for Self-organizing Artifacts: Towards an Ambient Intelligence
To be presented at 5th International Conference on Complex Systems
Minai, A., Braha, D., and Bar-Yam, Y., editors, Unifying Themes in Complex Systems, volume V, pages 136-143. Springer, Berlin Heidelberg, 2011
10.1007/978-3-642-17635-7_17
VUB AI Lab Memo 04-04
nlin.AO cs.AI
null
We discuss which properties common-use artifacts should have to collaborate without human intervention. We conceive how devices, such as mobile phones, PDAs, and home appliances, could be seamlessly integrated to provide an "ambient intelligence" that responds to the user's desires without requiring explicit programming or commands. While the hardware and software technology to build such systems already exists, as yet there is no standard protocol that can learn new meanings. We propose the first steps in the development of such a protocol, which would need to be adaptive, extensible, and open to the community, while promoting self-organization. We argue that devices, interacting through "game-like" moves, can learn to agree about how to communicate, with whom to cooperate, and how to delegate and coordinate specialized tasks. Thus, they may evolve a distributed cognition or collective intelligence capable of tackling complex tasks.
[ { "version": "v1", "created": "Thu, 1 Apr 2004 16:14:54 GMT" }, { "version": "v2", "created": "Fri, 30 Apr 2004 13:59:03 GMT" } ]
2013-04-05T00:00:00
[ [ "Gershenson", "Carlos", "", "Vrije Universiteit Brussel" ], [ "Heylighen", "Francis", "", "Vrije Universiteit Brussel" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
nlin/0404032
David Wolpert
David H. Wolpert
Metrics for more than two points at once
8 pages
null
null
null
nlin.AO cond-mat.other cs.LG math.GM
null
The conventional definition of a topological metric over a space specifies properties that must be obeyed by any measure of "how separated" two points in that space are. Here it is shown how to extend that definition, and in particular the triangle inequality, to concern arbitrary numbers of points. Such a measure of how separated the points within a collection are can be bootstrapped, to measure "how separated" from each other are two (or more) collections. The measure presented here also allows fractional membership of an element in a collection. This means it directly concerns measures of ``how spread out" a probability distribution over a space is. When such a measure is bootstrapped to compare two collections, it allows us to measure how separated two probability distributions are, or more generally, how separated a distribution of distributions is.
[ { "version": "v1", "created": "Fri, 16 Apr 2004 02:31:43 GMT" } ]
2007-10-15T00:00:00
[ [ "Wolpert", "David H.", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
nlin/0405038
Shujun Li Dr.
Shujun Li
When Chaos Meets Computers
7 pages, 5 figures
null
null
null
nlin.CD cs.NA
null
This paper focuses on an interesting phenomenon when chaos meets computers. It is found that digital computers are absolutely incapable of showing true long-time dynamics of some chaotic systems, including the tent map, the Bernoulli shift map and their analogues, even in a high-precision floating-point arithmetic. Although the results cannot directly generalized to most chaotic systems, the risk of using digital computers to numerically study continuous dynamical systems is shown clearly. As a result, we reach the old saying that "it is impossible to do everything with computers only".
[ { "version": "v1", "created": "Fri, 14 May 2004 12:21:10 GMT" }, { "version": "v2", "created": "Fri, 11 Jun 2004 14:05:43 GMT" }, { "version": "v3", "created": "Mon, 12 Dec 2005 16:45:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
nlin/0407032
Bobby Eka Gunara
F.P. Zen, B.E. Gunara, W. Hidayat, Z.A. Thalib, H. Zainuddin, J. Aminuddin
Application of Artificial Neural Network in Jitter Analysis of Dispersion-Managed Communication System
9 pages, 5 figures
null
null
null
nlin.PS cs.AI cs.NA
null
Artificial Neural Network (ANN) is used as numerical methode in solving modified Nonlinear Schroedinger (NLS) equation with Dispersion Managed System (DMS) for jitter analysis. We take the optical axis z and the time t as input, and then some relevant values such as the change of position and the center frequency of the pulse, and further the mean square time of incoming pulse which are needed for jitter analysis. It shows that ANN yields numerical solutions which are adaptive with respect to the numerical errors and also verifies the previous numerical results using conventional numerical method. Our result indicates that DMS can minimize the timing jitter induced by some amplifiers.
[ { "version": "v1", "created": "Wed, 14 Jul 2004 03:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Zen", "F. P.", "" ], [ "Gunara", "B. E.", "" ], [ "Hidayat", "W.", "" ], [ "Thalib", "Z. A.", "" ], [ "Zainuddin", "H.", "" ], [ "Aminuddin", "J.", "" ] ]
[ { "class": "Physics", "code": "nlin.PS", "description": "Pattern formation, coherent structures, solitons", "span": "(Pattern Formation and Solitons)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
nlin/0407052
Shujun Li Dr.
Shujun Li, Gonzalo \'Alvarez, Guanrong Chen and Xuanqin Mou
Breaking a chaos-noise-based secure communication scheme
RevTeX4, 11 pages, 15 figures
Chaos, vol. 15, no. 1, art. no. 013703, March 2005
10.1063/1.1856711
null
nlin.CD cs.CR
null
This paper studies the security of a secure communication scheme based on two discrete-time intermittently-chaotic systems synchronized via a common random driving signal. Some security defects of the scheme are revealed: 1) the key space can be remarkably reduced; 2) the decryption is insensitive to the mismatch of the secret key; 3) the key-generation process is insecure against known/chosen-plaintext attacks. The first two defects mean that the scheme is not secure enough against brute-force attacks, and the third one means that an attacker can easily break the cryptosystem by approximately estimating the secret key once he has a chance to access a fragment of the generated keystream. Yet it remains to be clarified if intermittent chaos could be used for designing secure chaotic cryptosystems.
[ { "version": "v1", "created": "Fri, 23 Jul 2004 20:57:06 GMT" }, { "version": "v2", "created": "Thu, 23 Dec 2004 09:49:20 GMT" }, { "version": "v3", "created": "Wed, 26 Jan 2005 08:57:11 GMT" }, { "version": "v4", "created": "Tue, 13 Sep 2005 11:09:00 GMT" } ]
2016-08-16T00:00:00
[ [ "Li", "Shujun", "" ], [ "Álvarez", "Gonzalo", "" ], [ "Chen", "Guanrong", "" ], [ "Mou", "Xuanqin", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
nlin/0407062
Sergey Yu. Vernov
S. Yu. Vernov (Skobeltsyn Institute of Nuclear Physics of Moscow State University)
Construction of Single-valued Solutions for Nonintegrable Systems with the Help of the Painleve Test
The proceedings of the International Conference "Computer Algebra in Scientific Computing" (CASC 2004, Jule 12 - 19, 2004, St. Petersburg, Russia), eds. V.G. Ganzha, E.W. Mayr, E.V. Vorozhtsov, Technische Universitat, Munchen, Garching, Germany, 2004, pp. 457-465
null
null
null
nlin.SI astro-ph.SR cs.MS math-ph math.DS math.MP
null
The Painleve test is very useful to construct not only the Laurent-series solutions but also the elliptic and trigonometric ones. Such single-valued functions are solutions of some polynomial first order differential equations. To find the elliptic solutions we transform an initial nonlinear differential equation in a nonlinear algebraic system in parameters of the Laurent-series solutions of the initial equation. The number of unknowns in the obtained nonlinear system does not depend on number of arbitrary coefficients of the used first order equation. In this paper we describe the corresponding algorithm, which has been realized in REDUCE and Maple.
[ { "version": "v1", "created": "Tue, 27 Jul 2004 12:51:53 GMT" } ]
2012-11-06T00:00:00
[ [ "Vernov", "S. Yu.", "", "Skobeltsyn Institute of Nuclear Physics of Moscow State\n University" ] ]
[ { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" }, { "class": "Physics", "code": "astro-ph.SR", "description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems", "span": "(Solar and Stellar Astrophysics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]