13
13

Jun 30, 2018
06/18

by
Yixuan Xie; Jinhong Yuan; Qifu; Sun

texts

#
eye 13

#
favorite 0

#
comment 0

We propose two types, namely Type-I and Type-II, quantum stabilizer codes using quadratic residue sets of prime modulus given by the form $p=4n\pm1$. The proposed Type-I stabilizer codes are of cyclic structure and code length $N=p$. They are constructed based on multi-weight circulant matrix generated from idempotent polynomial, which is obtained from a quadratic residue set. The proposed Type-II stabilizer codes are of quasi-cyclic (QC) structure and code length $N=pk$, where $k$ is the size...

Topics: Mathematics, Computing Research Repository, Information Theory

Source: http://arxiv.org/abs/1407.8249

8
8.0

Jun 30, 2018
06/18

by
Richard Baraniuk; Simon Foucart; Deanna Needell; Yaniv Plan; Mary Wootters

texts

#
eye 8

#
favorite 0

#
comment 0

Binary measurements arise naturally in a variety of statistical and engineering applications. They may be inherent to the problem---e.g., in determining the relationship between genetics and the presence or absence of a disease---or they may be a result of extreme quantization. In one-bit compressed sensing it has recently been shown that the number of one-bit measurements required for signal estimation mirrors that of unquantized compressed sensing. Indeed, $s$-sparse signals in $\mathbb{R}^n$...

Topics: Mathematics, Computing Research Repository, Information Theory, Statistics Theory, Statistics

Source: http://arxiv.org/abs/1407.8246

6
6.0

Jun 30, 2018
06/18

by
Akitoshi Kawamura; Yusuke Kobayashi

texts

#
eye 6

#
favorite 0

#
comment 0

Suppose we want to patrol a fence (line segment) using k mobile agents with given speeds v_1, ..., v_k so that every point on the fence is visited by an agent at least once in every unit time period. Czyzowicz et al. conjectured that the maximum length of the fence that can be patrolled is (v_1 + ... + v_k)/2, which is achieved by the simple strategy where each agent i moves back and forth in a segment of length v_i/2. We disprove this conjecture by a counterexample involving k = 6 agents. We...

Topics: Multiagent Systems, Computing Research Repository, Computational Geometry, Robotics

Source: http://arxiv.org/abs/1407.8194

8
8.0

Jun 30, 2018
06/18

by
Yuan Zhu; Siyun Tang

texts

#
eye 8

#
favorite 0

#
comment 0

In this paper, a new algebraic soft-decision decoding algorithm for Reed-Solomon code is presented. It is based on rational interpolation and the interpolation points are constructed by Berlekamp-Messay algorithm. Unlike the traditional K{\"o}tter-Vardy algorithm, new algorithm needs interpolation for two smaller multiplicity matrixes, due to the corresponding factorization algorithm for re-constructing codewords.

Topics: Mathematics, Computing Research Repository, Information Theory

Source: http://arxiv.org/abs/1407.8069

7
7.0

Jun 30, 2018
06/18

by
Alejandro Edera; Yanela Strappa; Facundo Bromberg

texts

#
eye 7

#
favorite 0

#
comment 0

Markov networks are models for compactly representing complex probability distributions. They are composed by a structure and a set of numerical weights. The structure qualitatively describes independences in the distribution, which can be exploited to factorize the distribution into a set of compact functions. A key application for learning structures from data is to automatically discover knowledge. In practice, structure learning algorithms focused on "knowledge discovery" present...

Topics: Computing Research Repository, Data Structures and Algorithms, Learning

Source: http://arxiv.org/abs/1407.8088