Search results for "General Computer Science"

showing 10 items of 895 documents

Gaussianizing the Earth: Multidimensional Information Measures for Earth Data Analysis

2021

Information theory is an excellent framework for analyzing Earth system data because it allows us to characterize uncertainty and redundancy, and is universally interpretable. However, accurately estimating information content is challenging because spatio-temporal data is high-dimensional, heterogeneous and has non-linear characteristics. In this paper, we apply multivariate Gaussianization for probability density estimation which is robust to dimensionality, comes with statistical guarantees, and is easy to apply. In addition, this methodology allows us to estimate information-theoretic measures to characterize multivariate densities: information, entropy, total correlation, and mutual in…

FOS: Computer and information sciencesMultivariate statisticsGeneral Computer ScienceComputer scienceMachine Learning (stat.ML)Mutual informationInformation theorycomputer.software_genreStatistics - ApplicationsEarth system scienceRedundancy (information theory)13. Climate actionStatistics - Machine LearningGeneral Earth and Planetary SciencesEntropy (information theory)Applications (stat.AP)Total correlationData miningElectrical and Electronic EngineeringInstrumentationcomputerCurse of dimensionality
researchProduct

Classical automata on promise problems

2015

Promise problems were mainly studied in quantum automata theory. Here we focus on state complexity of classical automata for promise problems. First, it was known that there is a family of unary promise problems solvable by quantum automata by using a single qubit, but the number of states required by corresponding one-way deterministic automata cannot be bounded by a constant. For this family, we show that even two-way nondeterminism does not help to save a single state. By comparing this with the corresponding state complexity of alternating machines, we then get a tight exponential gap between two-way nondeterministic and one-way alternating automata solving unary promise problems. Secon…

FOS: Computer and information sciencesNested wordTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESUnary operationGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)nondeterministic automataComputer Science - Formal Languages and Automata Theoryω-automatonComputational Complexity (cs.CC)Theoretical Computer ScienceContinuous spatial automatonQuantum finite automataDiscrete Mathematics and Combinatoricsalternating automatapromise problemsMathematicsprobabilistic automataNonlinear Sciences::Cellular Automata and Lattice GasesMobile automatonNondeterministic algorithmAlgebra[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]Computer Science - Computational ComplexityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESAutomata theorydescriptional complexityComputer Science::Formal Languages and Automata Theory
researchProduct

Whom to befriend to influence people

2020

Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person $v$ in the network has a certain threshold $t(v)$ for {\em activation}, i.e adoption of the product or idea. If $v$ has at least $t(v)$ activated neighbors, then $v$ will also become activated. If Alice wants to activate the entire social network, whom should she befriend? More generally, we study the problem of finding the minimum number of links that a set of external influencers should form to people in the network, in order to activate the entire social network. This {\em Minimum Links} Problem has applications in viral marketing and the study of epidemics. Its solution can be…

FOS: Computer and information sciencesPhysics - Physics and SocietyGeneral Computer ScienceFOS: Physical sciencesPhysics and Society (physics.soc-ph)0102 computer and information sciences02 engineering and technology01 natural sciencesSocial networksGraphTheoretical Computer ScienceCombinatoricsComputer Science - Data Structures and AlgorithmsGreedy algorithmFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsData Structures and Algorithms (cs.DS)Greedy algorithmTime complexityNP-completeMathematicsSocial and Information Networks (cs.SI)Social networkDiscrete mathematicsBinary treeDegree (graph theory)Computer Science (all)Order (ring theory)Computer Science - Social and Information NetworksJoin (topology)Influence maximizationGreedy algorithms010201 computation theory & mathematicsGraphs; Greedy algorithms; Influence maximization; NP-complete; Social networksProduct (mathematics)020201 artificial intelligence & image processingCombinatorics (math.CO)Constant (mathematics)GraphsTheoretical Computer Science
researchProduct

On prefix normal words and prefix normal forms

2016

A $1$-prefix normal word is a binary word with the property that no factor has more $1$s than the prefix of the same length; a $0$-prefix normal word is defined analogously. These words arise in the context of indexed binary jumbled pattern matching, where the aim is to decide whether a word has a factor with a given number of $1$s and $0$s (a given Parikh vector). Each binary word has an associated set of Parikh vectors of the factors of the word. Using prefix normal words, we provide a characterization of the equivalence class of binary words having the same set of Parikh vectors of their factors. We prove that the language of prefix normal words is not context-free and is strictly contai…

FOS: Computer and information sciencesPrefix codePrefix normal wordPre-necklaceDiscrete Mathematics (cs.DM)General Computer ScienceFormal Languages and Automata Theory (cs.FL)Binary numberComputer Science - Formal Languages and Automata TheoryContext (language use)Binary languageLyndon words0102 computer and information sciences02 engineering and technologyPrefix grammarprefix normal formsKraft's inequalityCharacterization (mathematics)Lyndon word01 natural sciencesPrefix normal formenumerationTheoretical Computer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsMathematicsDiscrete mathematicsprefix normal words prefix normal forms binary languages binary jumbled pattern matching pre-necklaces Lyndon words enumerationbinary jumbled pattern matchingSettore INF/01 - InformaticaComputer Science (all)pre-necklacesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)prefix normal wordsPrefix010201 computation theory & mathematics020201 artificial intelligence & image processingCombinatorics (math.CO)binary languagesComputer Science::Formal Languages and Automata TheoryWord (group theory)Computer Science - Discrete MathematicsTheoretical Computer Science
researchProduct

Primitive sets of words

2020

Given a (finite or infinite) subset $X$ of the free monoid $A^*$ over a finite alphabet $A$, the rank of $X$ is the minimal cardinality of a set $F$ such that $X \subseteq F^*$. We say that a submonoid $M$ generated by $k$ elements of $A^*$ is {\em $k$-maximal} if there does not exist another submonoid generated by at most $k$ words containing $M$. We call a set $X \subseteq A^*$ {\em primitive} if it is the basis of a $|X|$-maximal submonoid. This definition encompasses the notion of primitive word -- in fact, $\{w\}$ is a primitive set if and only if $w$ is a primitive word. By definition, for any set $X$, there exists a primitive set $Y$ such that $X \subseteq Y^*$. We therefore call $Y$…

FOS: Computer and information sciencesPrimitive setDiscrete Mathematics (cs.DM)General Computer ScienceFormal Languages and Automata Theory (cs.FL)Pseudo-repetitionComputer Science - Formal Languages and Automata Theory0102 computer and information sciences02 engineering and technology01 natural sciencesTheoretical Computer ScienceCombinatoricsCardinalityFree monoidBi-rootFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsRank (graph theory)Primitive root modulo nMathematicsHidden repetitionSettore INF/01 - InformaticaIntersection (set theory)k-maximal monoidFunction (mathematics)Basis (universal algebra)010201 computation theory & mathematics020201 artificial intelligence & image processingCombinatorics (math.CO)Computer Science::Formal Languages and Automata TheoryWord (group theory)Computer Science - Discrete Mathematics
researchProduct

Application of LEAN Principles to Improve Business Processes: a Case Study in a Latvian IT Company

2020

The research deals with application of the LEAN principles to business processes of a typical IT company. The paper discusses LEAN principles amplifying advantages and shortcomings of their application. The authors suggest use of the LEAN principles as a tool to identify improvement potential for IT company's business processes and work-flow efficiency. During a case study the implementation of LEAN principles has been exemplified in business processes of a particular Latvian IT company. The obtained results and conclusions can be used for meaningful and successful application of LEAN principles and methods in projects of other IT companies.

FOS: Computer and information sciencesProcess managementGeneral Computer ScienceBusiness processLatvianDatabases (cs.DB)language.human_languageSoftware Engineering (cs.SE)Computer Science - Software EngineeringComputer Science - Computers and SocietyComputer Science - DatabasesComputers and Society (cs.CY)languageBusinessBaltic Journal of Modern Computing
researchProduct

Superlinear advantage for exact quantum algorithms

2012

A quantum algorithm is exact if, on any input data, it outputs the correct answer with certainty (probability 1). A key question is: how big is the advantage of exact quantum algorithms over their classical counterparts: deterministic algorithms. For total Boolean functions in the query model, the biggest known gap was just a factor of 2: PARITY of N inputs bits requires $N$ queries classically but can be computed with N/2 queries by an exact quantum algorithm. We present the first example of a Boolean function f(x_1, ..., x_N) for which exact quantum algorithms have superlinear advantage over the deterministic algorithms. Any deterministic algorithm that computes our function must use N qu…

FOS: Computer and information sciencesQuantum sortGeneral Computer ScienceDeterministic algorithmGeneral MathematicsFOS: Physical sciences0102 computer and information sciencesQuantum capacityComputational Complexity (cs.CC)01 natural sciences010305 fluids & plasmasCombinatorics0103 physical sciencesQuantum phase estimation algorithmQuantum informationBoolean function010306 general physicsComputer Science::DatabasesQuantum computerMathematicsDiscrete mathematicsQuantum PhysicsFunction (mathematics)Computer Science - Computational Complexity010201 computation theory & mathematicsQuantum Fourier transformNo-teleportation theoremQuantum algorithmQuantum Physics (quant-ph)Proceedings of the forty-fifth annual ACM symposium on Theory of Computing
researchProduct

Minimal forbidden factors of circular words

2017

Minimal forbidden factors are a useful tool for investigating properties of words and languages. Two factorial languages are distinct if and only if they have different (antifactorial) sets of minimal forbidden factors. There exist algorithms for computing the minimal forbidden factors of a word, as well as of a regular factorial language. Conversely, Crochemore et al. [IPL, 1998] gave an algorithm that, given the trie recognizing a finite antifactorial language $M$, computes a DFA recognizing the language whose set of minimal forbidden factors is $M$. In the same paper, they showed that the obtained DFA is minimal if the input trie recognizes the minimal forbidden factors of a single word.…

FOS: Computer and information sciencesSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDiscrete Mathematics (cs.DM)Finite automatonSettore INF/01 - InformaticaFormal Languages and Automata Theory (cs.FL)Factor automatonComputer Science - Formal Languages and Automata TheoryComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Circular wordFibonacci wordMinimal forbidden factorTheoretical Computer ScienceComputer Science::Formal Languages and Automata TheoryComputer Science - Discrete Mathematics
researchProduct

Acoustic Scene Classification with Squeeze-Excitation Residual Networks

2020

Acoustic scene classification (ASC) is a problem related to the field of machine listening whose objective is to classify/tag an audio clip in a predefined label describing a scene location (e. g. park, airport, etc.). Many state-of-the-art solutions to ASC incorporate data augmentation techniques and model ensembles. However, considerable improvements can also be achieved only by modifying the architecture of convolutional neural networks (CNNs). In this work we propose two novel squeeze-excitation blocks to improve the accuracy of a CNN-based ASC framework based on residual learning. The main idea of squeeze-excitation blocks is to learn spatial and channel-wise feature maps independently…

FOS: Computer and information sciencesSound (cs.SD)Computer Science - Machine LearningGeneral Computer ScienceCalibration (statistics)Computer scienceResidualConvolutional neural networkField (computer science)Computer Science - SoundMachine Learning (cs.LG)030507 speech-language pathology & audiology03 medical and health sciencesAudio and Speech Processing (eess.AS)Acoustic scene classificationFeature (machine learning)FOS: Electrical engineering electronic engineering information engineeringGeneral Materials ScienceBlock (data storage)Artificial neural networkbusiness.industrypattern recognitionGeneral Engineeringdeep learningPattern recognitionmachine listeningsqueeze-excitationArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineering0305 other medical sciencebusinesslcsh:TK1-9971Electrical Engineering and Systems Science - Audio and Speech Processing
researchProduct

Forrelation

2014

We achieve essentially the largest possible separation between quantum and classical query complexities. We do so using a property-testing problem called Forrelation, where one needs to decide whether one Boolean function is highly correlated with the Fourier transform of a second function. This problem can be solved using 1 quantum query, yet we show that any randomized algorithm needs Ω(√(N)log(N)) queries (improving an Ω(N[superscript 1/4]) lower bound of Aaronson). Conversely, we show that this 1 versus Ω(√(N)) separation is optimal: indeed, any t-query quantum algorithm whatsoever can be simulated by an O(N[superscript 1-1/2t])-query randomized algorithm. Thus, resolving an open questi…

FOS: Computer and information sciencesTheoretical computer scienceGeneral Computer ScienceComputational complexity theoryComputer scienceGeneralizationGeneral MathematicsSeparation (aeronautics)FOS: Physical sciences0102 computer and information sciencesComputational Complexity (cs.CC)01 natural sciencesUpper and lower boundsCombinatorics0103 physical sciences010306 general physicsBoolean functionQuantumComputer Science::DatabasesQuantum computerMathematicsDiscrete mathematicsQuantum PhysicsFunction (mathematics)Randomized algorithmComputer Science - Computational Complexity010201 computation theory & mathematicsQuantum algorithmQuantum Physics (quant-ph)Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
researchProduct