Search results for "Theoretical Computer Science"

showing 10 items of 1151 documents

On the problem of visualizing point distributions in high dimensional spaces

1995

Abstract Exploring dynamical systems with the aid of computer graphics requires that the relevant structures can be seen and be noticed. This poses special problems if the system is multidimensional, and it has to be decided which kind of projection serves the purpose. I propose using the mathematical frame of categories and functors to describe the process of visualization. This allows detecting and analyzing possible sources of misinterpretation in a formal way. The distribution of distances of embedded electroencephalographic data from a fixed reference point is used as an example for discussing some aspects of the visualization process. The multidimensional p-norms are an example of a p…

Theoretical computer scienceDynamical systems theoryFrame (networking)General EngineeringStructure (category theory)Computer Graphics and Computer-Aided DesignVisualizationHuman-Computer InteractionComputer graphicsProjection (mathematics)GraphicsDynamical system (definition)AlgorithmMathematicsComputers & Graphics
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

Text Compression Using Antidictionaries

1999

International audience; We give a new text compression scheme based on Forbidden Words ("antidictionary"). We prove that our algorithms attain the entropy for balanced binary sources. They run in linear time. Moreover, one of the main advantages of this approach is that it produces very fast decompressors. A second advantage is a synchronization property that is helpful to search compressed data and allows parallel compression. Our algorithms can also be presented as "compilers" that create compressors dedicated to any previously fixed source. The techniques used in this paper are from Information Theory and Finite Automata.

Theoretical computer scienceFinite-state machineComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010102 general mathematicsforbidden wordData_CODINGANDINFORMATIONTHEORY0102 computer and information sciencesInformation theory01 natural sciencesfinite automatonParallel compressionpattern matching010201 computation theory & mathematicsEntropy (information theory)Pattern matching0101 mathematicsTime complexityAlgorithmdata compressioninformation theoryData compression
researchProduct

Asymmetric Comparison and Querying of Biological Networks

2011

Comparing and querying the protein-protein interaction (PPI) networks of different organisms is important to infer knowledge about conservation across species. Known methods that perform these tasks operate symmetrically, i.e., they do not assign a distinct role to the input PPI networks. However, in most cases, the input networks are indeed distinguishable on the basis of how the corresponding organism is biologically well characterized. In this paper a new idea is developed, that is, to exploit differences in the characterization of organisms at hand in order to devise methods for comparing their PPI networks. We use the PPI network (called Master) of the best characterized organism as a …

Theoretical computer scienceFinite-state machineMatching (graph theory)Computer scienceApplied MathematicsFingerprint (computing)Process (computing)Computational BiologyViterbi algorithmModels BiologicalAutomatonBioinformatics network analysissymbols.namesakeSequence Analysis ProteinLinearizationProtein Interaction MappingGeneticssymbolsProtein Interaction Domains and MotifsSequence AlignmentAlgorithmsBiological networkBiotechnologyIEEE/ACM Transactions on Computational Biology and Bioinformatics
researchProduct

Shrinking language models by robust approximation

2002

We study the problem of reducing the size of a language model while preserving recognition performance (accuracy and speed). A successful approach has been to represent language models by weighted finite-state automata (WFAs). Analogues of classical automata determinization and minimization algorithms then provide a general method to produce smaller but equivalent WFAs. We extend this approach by introducing the notion of approximate determinization. We provide an algorithm that, when applied to language models for the North American Business task, achieves 25-35% size reduction compared to previous techniques, with negligible effects on recognition time and accuracy.

Theoretical computer scienceFinite-state machineNested wordComputer scienceQuantum finite automataAutomata theoryLanguage modelAlgorithmNatural languageAutomatonProceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181)
researchProduct

Algorithmic Analysis of Programs with Well Quasi-ordered Domains

2000

AbstractOver the past few years increasing research effort has been directed towards the automatic verification of infinite-state systems. This paper is concerned with identifying general mathematical structures which can serve as sufficient conditions for achieving decidability. We present decidability results for a class of systems (called well-structured systems) which consist of a finite control part operating on an infinite data domain. The results assume that the data domain is equipped with a preorder which is a well quasi-ordering, such that the transition relation is “monotonic” (a simulation) with respect to the preorder. We show that the following properties are decidable for wel…

Theoretical computer scienceFinite-state machineReachability problemData domainPreorderPetri netComputer Science ApplicationsTheoretical Computer ScienceDecidabilityComputational Theory and MathematicsReachabilityMathematical structureComputer Science::Formal Languages and Automata TheoryInformation SystemsMathematicsInformation and Computation
researchProduct

Quantum Computers and Quantum Automata

2000

Quantum computation is a most challenging project involving research both by physicists and computer scientists. The principles of quantum computation differ from the principles of classical computation very much. When quantum computers become available, the public-key cryptography will change radically. It is no exaggeration to assert that building a quantum computer means building a universal code-breaking machine. Quantum finite automata are expected to appear much sooner. They do not generalize deterministic finite automata. Their capabilities are incomparable.

Theoretical computer scienceFinite-state machinebusiness.industryComputationTheoryofComputation_GENERALCryptographyQuantum circuitDeterministic finite automatonRegular languageComputerSystemsOrganization_MISCELLANEOUSQuantum finite automatabusinessMathematicsQuantum computer
researchProduct

Analog Multiple Description Joint Source-Channel Coding Based on Lattice Scaling

2015

Joint source-channel coding schemes based on analog mappings for point-to-point channels have recently gained attention for their simplicity and low delay. In this paper, these schemes are extended either to scenarios with or without side information at the decoders to transmit multiple descriptions of a Gaussian source over independent parallel channels. They are based on a lattice scaling approach together with bandwidth reduction analog mappings adapted for this multiple description scenario. The rationale behind lattice scaling is to improve performance through bandwidth expansion. Another important contribution of this paper is the proof of the separation theorem for the communication …

Theoretical computer scienceGaussianBandwidth (signal processing)Data_CODINGANDINFORMATIONTHEORYTopologysymbols.namesakeAdditive white Gaussian noiseBandwidth expansionSignal ProcessingsymbolsMutual fund separation theoremElectrical and Electronic EngineeringScalingDecoding methodsComputer Science::Information TheoryMathematicsCoding (social sciences)IEEE Transactions on Signal Processing
researchProduct

Extracting string motif bases for quorum higher than two

2012

Bases of generators of motifs consisting of strings in which some positions can be occupied by a don’t care provide a useful conceptual tool for their description and a way to reduce the time and space involved in the discovery process. In the last few years, a few algorithms have been proposed for the extraction of a basis, building in large part on combinatorial properties of strings and their autocorrelations. Currently, the most efficient techniques for binary alphabets and quorum q = 2 require time quadratic in the length of the host string. The present paper explores properties of motif bases for quorum q ≥ 2, both with binary and general alphabets, by also showing that important resu…

Theoretical computer scienceGeneral Computer ScienceBasis (linear algebra)Computational complexity theorySpacetimeString (computer science)Binary numberTheoretical Computer ScienceBusiness process discoverySet (abstract data type)Quadratic equationpattern discovery string motif basisComputer Science(all)MathematicsTheoretical Computer Science
researchProduct

Communication complexity in a 3-computer model

1996

It is proved that the probabilistic communication complexity of the identity function in a 3-computer model isO(√n).

Theoretical computer scienceGeneral Computer ScienceComputer scienceApplied MathematicsDivergence-from-randomness modelProbabilistic logicComputer Science ApplicationsProbabilistic CTLWorst-case complexityIdentity functionProbabilistic analysis of algorithmsPhysics::Chemical PhysicsCommunication complexityDecision tree modelAlgorithmica
researchProduct