id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0408048 | John Funge PhD | John David Funge | Journal of New Democratic Methods: An Introduction | 8 pages, 1 figure | null | null | null | cs.CY cs.LG | null | This paper describes a new breed of academic journals that use statistical
machine learning techniques to make them more democratic. In particular, not
only can anyone submit an article, but anyone can also become a reviewer.
Machine learning is used to decide which reviewers accurately represent the
views of the journal's readers and thus deserve to have their opinions carry
more weight. The paper concentrates on describing a specific experimental
prototype of a democratic journal called the Journal of New Democratic Methods
(JNDM). The paper also mentions the wider implications that machine learning
and the techniques used in the JNDM may have for representative democracy in
general.
| [
{
"version": "v1",
"created": "Sat, 21 Aug 2004 16:57:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Funge",
"John David",
""
]
]
|
cs/0408049 | Stephen Luttrell | Stephen Luttrell | Using Stochastic Encoders to Discover Structure in Data | 18 pages, 9 figures. Full version of a short paper that was published
in the Digest of the 5th IMA International Conference on Mathematics in
Signal Processing, 18-20 December 2000, Warwick University, UK | null | null | null | cs.NE cs.CV | null | In this paper a stochastic generalisation of the standard Linde-Buzo-Gray
(LBG) approach to vector quantiser (VQ) design is presented, in which the
encoder is implemented as the sampling of a vector of code indices from a
probability distribution derived from the input vector, and the decoder is
implemented as a superposition of reconstruction vectors. This stochastic VQ
(SVQ) is optimised using a minimum mean Euclidean reconstruction distortion
criterion, as in the LBG case. Numerical simulations are used to demonstrate
how this leads to self-organisation of the SVQ, where different stochastically
sampled code indices become associated with different input subspaces.
| [
{
"version": "v1",
"created": "Sat, 21 Aug 2004 19:40:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
]
|
cs/0408050 | Stephen Luttrell | Stephen Luttrell | Invariant Stochastic Encoders | 16 pages, 12 figures. Full version of a short paper that was
published in the Digest of the 5th IMA International Conference on
Mathematics in Signal Processing, 18-20 December 2000, Warwick University, UK | null | null | null | cs.NE cs.CV | null | The theory of stochastic vector quantisers (SVQ) has been extended to allow
the quantiser to develop invariances, so that only "large" degrees of freedom
in the input vector are represented in the code. This has been applied to the
problem of encoding data vectors which are a superposition of a "large" jammer
and a "small" signal, so that only the jammer is represented in the code. This
allows the jammer to be subtracted from the total input vector (i.e. the jammer
is nulled), leaving a residual that contains only the underlying signal. The
main advantage of this approach to jammer nulling is that little prior
knowledge of the jammer is assumed, because these properties are automatically
discovered by the SVQ as it is trained on examples of input vectors.
| [
{
"version": "v1",
"created": "Sat, 21 Aug 2004 23:06:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
]
|
cs/0408051 | Zhimao Guo Mr. | Zhimao Guo, Min Li, Xiaoling Wang, Aoying Zhou | Scalable XSLT Evaluation | It appeared on the international conference of APWeb 04. And it
includes 10 pages | In Proc. of APWeb, 2004 | null | null | cs.DB | null | XSLT is an increasingly popular language for processing XML data. It is
widely supported by application platform software. However, little optimization
effort has been made inside the current XSLT processing engines. Evaluating a
very simple XSLT program on a large XML document with a simple schema may
result in extensive usage of memory. In this paper, we present a novel notion
of \emph{Streaming Processing Model} (\emph{SPM}) to evaluate a subset of XSLT
programs on XML documents, especially large ones. With SPM, an XSLT processor
can transform an XML source document to other formats without extra memory
buffers required. Therefore, our approach can not only tackle large source
documents, but also produce large results. We demonstrate with a performance
study the advantages of the SPM approach. Experimental results clearly confirm
that SPM improves XSLT evaluation typically 2 to 10 times better than the
existing approaches. Moreover, the SPM approach also features high scalability.
| [
{
"version": "v1",
"created": "Sun, 22 Aug 2004 03:19:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guo",
"Zhimao",
""
],
[
"Li",
"Min",
""
],
[
"Wang",
"Xiaoling",
""
],
[
"Zhou",
"Aoying",
""
]
]
|
cs/0408052 | Daniel Yacob | Daniel Yacob | Application of the Double Metaphone Algorithm to Amharic Orthography | International Conference of Ethiopian Studies XV, 13 pages | null | null | null | cs.CL | null | The Metaphone algorithm applies the phonetic encoding of orthographic
sequences to simplify words prior to comparison. While Metaphone has been
highly successful for the English language, for which it was designed, it may
not be applied directly to Ethiopian languages. The paper details how the
principles of Metaphone can be applied to Ethiopic script and uses Amharic as a
case study. Match results improve as specific considerations are made for
Amharic writing practices. Results are shown to improve further when common
errors from Amharic input methods are considered.
| [
{
"version": "v1",
"created": "Sun, 22 Aug 2004 19:32:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yacob",
"Daniel",
""
]
]
|
cs/0408053 | Santos B. Yuste | Santos B. Yuste | Weighted average finite difference methods for fractional diffusion
equations | Communication presented at the FDA'04 Workshop (with some minor
corrections and updates) | null | null | null | cs.NA cond-mat.stat-mech physics.comp-ph | null | Weighted averaged finite difference methods for solving fractional diffusion
equations are discussed and different formulae of the discretization of the
Riemann-Liouville derivative are considered. The stability analysis of the
different numerical schemes is carried out by means of a procedure close to the
well-known von Neumann method of ordinary diffusion equations. The stability
bounds are easily found and checked in some representative examples.
| [
{
"version": "v1",
"created": "Mon, 23 Aug 2004 12:00:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yuste",
"Santos B.",
""
]
]
|
cs/0408054 | Peter Keller-Marxer | Stephan Heuscher, Stephan Jaermann, Peter Keller-Marxer, Frank Moehle
(Swiss Federal Archives) | Providing Authentic Long-term Archival Access to Complex Relational Data | 18 pages with 4 figures (color). Submitted to: European Space Agency
Symposium "Ensuring Long-Term Preservation and Adding Value to Scientific and
Technical Data", 5 - 7 October 2004, Frascati, Italy | Proceedings PV-2004: Ensuring the Long-Term Preservation and
Adding Value to the Scientific and Technical Data, 5-7 October 2004,
ESA/ESRIN, Frascati, Italy, (ESA WPP-232), Noordwijk: European Space Agency,
2004, pp. 241\^A?"261. | null | ESA WPP-232, pp. 241 -261 | cs.DL cs.DB | null | We discuss long-term preservation of and access to relational databases. The
focus is on national archives and science data archives which have to ingest
and integrate data from a broad spectrum of vendor-specific relational database
management systems (RDBMS). Furthermore, we present our solution SIARD which
analyzes and extracts data and data logic from almost any RDBMS. It enables, to
a reasonable level of authenticity, complete detachment of databases from their
vendor-specific environment. The user can add archival descriptive metadata
according to a customizable schema. A SIARD database archive integrates data,
data logic, technical metadata, and archival descriptive information in one
archival information package, independent of any specific software and
hardware, based upon plain text files and the standardized languages SQL and
XML. For usage purposes, a SIARD archive can be reloaded into any current or
future RDBMS which supports standard SQL. In addition, SIARD contains a client
that enables 'on demand' reload of archives into a target RDBMS, and multi-user
remote access for querying and browsing the data together with its technical
and descriptive metadata in one graphical user interface.
| [
{
"version": "v1",
"created": "Tue, 24 Aug 2004 07:01:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heuscher",
"Stephan",
"",
"Swiss Federal Archives"
],
[
"Jaermann",
"Stephan",
"",
"Swiss Federal Archives"
],
[
"Keller-Marxer",
"Peter",
"",
"Swiss Federal Archives"
],
[
"Moehle",
"Frank",
"",
"Swiss Federal Archives"
]
]
|
cs/0408056 | Marco Alberti | Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, Michela
Milano | A CHR-based Implementation of Known Arc-Consistency | 22 pages, 2 figures, 1 table To appear in Theory and Practice of
Logic Programming (TPLP) | null | null | null | cs.LO cs.AI | null | In classical CLP(FD) systems, domains of variables are completely known at
the beginning of the constraint propagation process. However, in systems
interacting with an external environment, acquiring the whole domains of
variables before the beginning of constraint propagation may cause waste of
computation time, or even obsolescence of the acquired data at the time of use.
For such cases, the Interactive Constraint Satisfaction Problem (ICSP) model
has been proposed as an extension of the CSP model, to make it possible to
start constraint propagation even when domains are not fully known, performing
acquisition of domain elements only when necessary, and without the need for
restarting the propagation after every acquisition.
In this paper, we show how a solver for the two sorted CLP language, defined
in previous work, to express ICSPs, has been implemented in the Constraint
Handling Rules (CHR) language, a declarative language particularly suitable for
high level implementation of constraint solvers.
| [
{
"version": "v1",
"created": "Tue, 24 Aug 2004 10:15:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Alberti",
"Marco",
""
],
[
"Gavanelli",
"Marco",
""
],
[
"Lamma",
"Evelina",
""
],
[
"Mello",
"Paola",
""
],
[
"Milano",
"Michela",
""
]
]
|
cs/0408057 | Vincenzo Pallotta | Afzal Ballim and Vincenzo Pallotta | The role of robust semantic analysis in spoken language dialogue systems | 6 pages | Proceedings of the 3rd International Workshop on Human-Computer
Conversation, July 3-5, 2000, Bellagio, Italy | null | null | cs.CL cs.AI cs.HC | null | In this paper we summarized a framework for designing grammar-based procedure
for the automatic extraction of the semantic content from spoken queries.
Starting with a case study and following an approach which combines the notions
of fuzziness and robustness in sentence parsing, we showed we built practical
domain-dependent rules which can be applied whenever it is possible to
superimpose a sentence-level semantic structure to a text without relying on a
previous deep syntactical analysis. This kind of procedure can be also
profitably used as a pre-processing tool in order to cut out part of the
sentence which have been recognized to have no relevance in the understanding
process. In the case of particular dialogue applications where there is no need
to build a complex semantic structure (e.g. word spotting or excerpting) the
presented methodology may represent an efficient alternative solution to a
sequential composition of deep linguistic analysis modules. Even if the query
generation problem may not seem a critical application it should be held in
mind that the sentence processing must be done on-line. Having this kind of
constraints we cannot design our system without caring for efficiency and thus
provide an immediate response. Another critical issue is related to whole
robustness of the system. In our case study we tried to make experiences on how
it is possible to deal with an unreliable and noisy input without asking the
user for any repetition or clarification. This may correspond to a similar
problem one may have when processing text coming from informal writing such as
e-mails, news and in many cases Web pages where it is often the case to have
irrelevant surrounding information.
| [
{
"version": "v1",
"created": "Wed, 25 Aug 2004 19:37:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Pallotta",
"Vincenzo",
""
]
]
|
cs/0408058 | Patrik O. Hoyer | Patrik O. Hoyer | Non-negative matrix factorization with sparseness constraints | null | null | null | null | cs.LG cs.NE | null | Non-negative matrix factorization (NMF) is a recently developed technique for
finding parts-based, linear representations of non-negative data. Although it
has successfully been applied in several applications, it does not always
result in parts-based representations. In this paper, we show how explicitly
incorporating the notion of `sparseness' improves the found decompositions.
Additionally, we provide complete MATLAB code both for standard NMF and for our
extension. Our hope is that this will further the application of these methods
to solving novel data-analysis problems.
| [
{
"version": "v1",
"created": "Wed, 25 Aug 2004 20:25:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hoyer",
"Patrik O.",
""
]
]
|
cs/0408059 | Aristides Vagelatos | Ch. Tsalidis (1), G. Orphanos (1), A. Iordanidou (2), A. Vagelatos (3)
((1) Neurosoft S.A. (2) Patra's University, (3) RACTI) | Proofing Tools Technology at Neurosoft S.A. | Workshop on International Proofing Tools and Language Technologies
July 1-2, 2004, Patras, Greece | null | null | CTI T.R.: 2004.06.01 | cs.CL | null | The aim of this paper is to present the R&D activities carried out at
Neurosoft S.A. regarding the development of proofing tools for Modern Greek.
Firstly, we focus on infrastructure issues that we faced during our initial
steps. Subsequently, we describe the most important insights of three proofing
tools developed by Neurosoft, i.e. the spelling checker, the hyphenator and the
thesaurus, outlining their efficiencies and inefficiencies. Finally, we discuss
some improvement ideas and give our future directions.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 10:50:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tsalidis",
"Ch.",
"",
"Neurosoft S.A"
],
[
"Orphanos",
"G.",
"",
"Neurosoft S.A"
],
[
"Iordanidou",
"A.",
"",
"Patra's University"
],
[
"Vagelatos",
"A.",
"",
"RACTI"
]
]
|
cs/0408060 | Docteur Francois Trouilleux | Gabriel G. Bes (GRIL), Lionel Lamadon (GRIL), Francois Trouilleux
(GRIL) | Verbal chunk extraction in French using limited resources | null | null | null | null | cs.CL | null | A way of extracting French verbal chunks, inflected and infinitive, is
explored and tested on effective corpus. Declarative morphological and local
grammar rules specifying chunks and some simple contextual structures are used,
relying on limited lexical information and some simple heuristic/statistic
properties obtained from restricted corpora. The specific goals, the
architecture and the formalism of the system, the linguistic information on
which it relies and the obtained results on effective corpus are presented.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 12:44:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bes",
"Gabriel G.",
"",
"GRIL"
],
[
"Lamadon",
"Lionel",
"",
"GRIL"
],
[
"Trouilleux",
"Francois",
"",
"GRIL"
]
]
|
cs/0408061 | Aristides Vagelatos | Ch. Tsalidis (1), A. Vagelatos (2) and G. Orphanos (1) ((1) Neurosoft
S.A. (2) RACTI) | An electronic dictionary as a basis for NLP tools: The Greek case | Traitement Automatique des Langues Naturelles (TALN) 2004, Fez,
Morocco | null | null | CTI T.R.: 2004.04.03 | cs.CL | null | The existence of a Dictionary in electronic form for Modern Greek (MG) is
mandatory if one is to process MG at the morphological and syntactic levels
since MG is a highly inflectional language with marked stress and a spelling
system with many characteristics carried over from Ancient Greek. Moreover,
such a tool becomes necessary if one is to create efficient and sophisticated
NLP applications with substantial linguistic backing and coverage. The present
paper will focus on the deployment of such an electronic dictionary for Modern
Greek, which was built in two phases: first it was constructed to be the basis
for a spelling correction schema and then it was reconstructed in order to
become the platform for the deployment of a wider spectrum of NLP tools.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 13:17:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tsalidis",
"Ch.",
""
],
[
"Vagelatos",
"A.",
""
],
[
"Orphanos",
"G.",
""
]
]
|
cs/0408065 | Somdeb Lahiri | Somdeb Lahiri | The Core of Directed Network Problems with Quotas | 6 pages, 0 figures, source file: MS Word; definitions of the feasible
allocations have been strengthened; examples provided; network obtained by
the procedure can be decentralized | null | null | null | cs.GT | null | This paper proves the existence of non-empty cores for directed network
problems with quotas and for those combinatorial allocation problems which
permit only exclusive allocations.
| [
{
"version": "v1",
"created": "Sat, 28 Aug 2004 10:12:17 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Sep 2004 11:18:12 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Sep 2004 11:05:37 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Sep 2004 09:37:08 GMT"
},
{
"version": "v5",
"created": "Wed, 8 Sep 2004 12:15:49 GMT"
},
{
"version": "v6",
"created": "Sat, 11 Sep 2004 10:06:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lahiri",
"Somdeb",
""
]
]
|
cs/0408067 | Eric Schmutz | Jennie C. Hansen, Eric Schmutz | The Expected Size of the Rule k Dominating Set | null | null | null | null | cs.DM | null | Rule k is a localized approximation algorithm that finds a small connected
dominating set in a graph. We estimate the expected size of the Rule k
dominating set for the model of random unit disk graphs constructed from n
random points in an s_n by s_n square region of the plane.
| [
{
"version": "v1",
"created": "Tue, 31 Aug 2004 14:03:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hansen",
"Jennie C.",
""
],
[
"Schmutz",
"Eric",
""
]
]
|
cs/0408068 | Eric Schmutz | Jennie C. Hansen, Eric Schmutz, Li Sheng | Probabilistic Analysis of Rule 2 | null | null | null | null | cs.DM | null | Li and Wu proposed Rule 2, a localized approximation algorithm that attempts
to find a small connected dominating set in a graph. Here we study the
asymptotic performance of Rule 2 on random unit disk graphs formed from n
random points in an s_n by s_n square region of the plane. If s_n is below the
threshold for connectivity, then Rule 2 produces a dominating set whose
expected size is O(n/(loglog n)^{3/2}). We conjecture that this bound is not
optimal.
| [
{
"version": "v1",
"created": "Tue, 31 Aug 2004 16:02:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hansen",
"Jennie C.",
""
],
[
"Schmutz",
"Eric",
""
],
[
"Sheng",
"Li",
""
]
]
|
cs/0408069 | Pascal Hitzler | Sebastian Bader, Pascal Hitzler, Steffen Hoelldobler | The Integration of Connectionism and First-Order Knowledge
Representation and Reasoning as a Challenge for Artificial Intelligence | In Proceedings of INFORMATION'2004, Tokyo, Japan, to appear. 12 pages | null | null | null | cs.AI cs.LO cs.NE | null | Intelligent systems based on first-order logic on the one hand, and on
artificial neural networks (also called connectionist systems) on the other,
differ substantially. It would be very desirable to combine the robust neural
networking machinery with symbolic knowledge representation and reasoning
paradigms like logic programming in such a way that the strengths of either
paradigm will be retained. Current state-of-the-art research, however, fails by
far to achieve this ultimate goal. As one of the main obstacles to be overcome
we perceive the question how symbolic knowledge can be encoded by means of
connectionist systems: Satisfactory answers to this will naturally lead the way
to knowledge extraction algorithms and to integrated neural-symbolic systems.
| [
{
"version": "v1",
"created": "Tue, 31 Aug 2004 16:16:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bader",
"Sebastian",
""
],
[
"Hitzler",
"Pascal",
""
],
[
"Hoelldobler",
"Steffen",
""
]
]
|
cs/0409002 | Pascal Hitzler | Pascal Hitzler | Default reasoning over domains and concept hierarchies | Short version appeared in Proceedings of the 27th German conference
on Artificial Intelligence, KI'2004, Ulm, Germany, September 2004, Lecture
Notes in Artificial Intelligence | null | null | null | cs.AI cs.LO | null | W.C. Rounds and G.-Q. Zhang (2001) have proposed to study a form of
disjunctive logic programming generalized to algebraic domains. This system
allows reasoning with information which is hierarchically structured and forms
a (suitable) domain. We extend this framework to include reasoning with default
negation, giving rise to a new nonmonotonic reasoning framework on hierarchical
knowledge which encompasses answer set programming with extended disjunctive
logic programs. We also show that the hierarchically structured knowledge on
which programming in this paradigm can be done, arises very naturally from
formal concept analysis. Together, we obtain a default reasoning paradigm for
conceptual knowledge which is in accordance with mainstream developments in
nonmonotonic reasoning.
| [
{
"version": "v1",
"created": "Wed, 1 Sep 2004 19:22:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hitzler",
"Pascal",
""
]
]
|
cs/0409003 | Karthik Narayanaswami | Parth Bhawalkar, Victor Bigio, Adam Davis, Karthik Narayanaswami, Femi
Olumoko | ScheduleNanny: Using GPS to Learn the User's Significant Locations,
Travel Times and Schedule | 7 pages, 10 figures. Adaptive & Ubiquitous Computing | null | null | null | cs.AI cs.CV cs.HC | null | As computing technology becomes more pervasive, personal devices such as the
PDA, cell-phone, and notebook should use context to determine how to act.
Location is one form of context that can be used in many ways. We present a
multiple-device system that collects and clusters GPS data into significant
locations. These locations are then used to determine travel times and a
probabilistic model of the user's schedule, which is used to intelligently
alert the user. We evaluate our system and suggest how it should be integrated
with a variety of applications.
| [
{
"version": "v1",
"created": "Thu, 2 Sep 2004 15:28:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bhawalkar",
"Parth",
""
],
[
"Bigio",
"Victor",
""
],
[
"Davis",
"Adam",
""
],
[
"Narayanaswami",
"Karthik",
""
],
[
"Olumoko",
"Femi",
""
]
]
|
cs/0409004 | Manoj Kumar | Manoj Kumar | The Password Change Phase is Still Insecure | 10 Pages, This work is related to the remote user authentication
scheme with smart cards | null | null | null | cs.CR | null | In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user
authentication scheme using smart cards to solve the security problems of Chien
et al.'s scheme. Recently, Hsu and Yoon et al. pointed out the security
weaknesses of the Ku and Chen's scheme Furthermore, Yoon et al. also proposed a
new efficient remote user authentication scheme using smart cards. Yoon et al.
also modified the password change phase of Ku and Chen's scheme. This paper
analyzes that password change phase of Yoon et al's modified scheme is still
insecure.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 2004 11:51:44 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Sep 2004 01:43:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
|
cs/0409005 | Adam Slagell | Adam J. Slagell and William Yurcik | Sharing Computer Network Logs for Security and Privacy: A Motivation for
New Methodologies of Anonymization | 17 pages, 1 figure | null | null | null | cs.CR | null | Logs are one of the most fundamental resources to any security professional.
It is widely recognized by the government and industry that it is both
beneficial and desirable to share logs for the purpose of security research.
However, the sharing is not happening or not to the degree or magnitude that is
desired. Organizations are reluctant to share logs because of the risk of
exposing sensitive information to potential attackers. We believe this
reluctance remains high because current anonymization techniques are weak and
one-size-fits-all--or better put, one size tries to fit all. We must develop
standards and make anonymization available at varying levels, striking a
balance between privacy and utility. Organizations have different needs and
trust other organizations to different degrees. They must be able to map
multiple anonymization levels with defined risks to the trust levels they share
with (would-be) receivers. It is not until there are industry standards for
multiple levels of anonymization that we will be able to move forward and
achieve the goal of widespread sharing of logs for security researchers.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 2004 20:21:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Slagell",
"Adam J.",
""
],
[
"Yurcik",
"William",
""
]
]
|
cs/0409006 | Dumitru Vulcanov | Dumitru N. Vulcanov, Valentina D. Vulcanov (The West University of
Timisoara, Romania) | Maple+GrTensorII libraries for cosmology | LaTeX LLNCS style, 8 pages, accepted for SYNASC 2004 - 6th
International Symposium on Symbolic and Numeric Algorithms for Scientific
Computing, Timisoara, Romania, September 26-30 2004 | null | null | null | cs.SC gr-qc | null | The article mainly presents some results in using MAPLE platform for computer
algebra and GrTensorII package in doing calculations for theoretical and
numerical cosmology
| [
{
"version": "v1",
"created": "Sat, 4 Sep 2004 12:52:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vulcanov",
"Dumitru N.",
"",
"The West University of\n Timisoara, Romania"
],
[
"Vulcanov",
"Valentina D.",
"",
"The West University of\n Timisoara, Romania"
]
]
|
cs/0409007 | Florentin Smarandache | Jean Dezert, Florentin Smarandache, Milan Daniel | The Generalized Pignistic Transformation | 8 pages, 3 graphs, many tables. The Seventh International Conference
on Information Fusion, Stockholm, Sweden, 28 June - 1 July 2004 | Proceedings of the Seventh International Conference on Information
Fusion, International Society for Information Fusion, Stockholm, Sweden,
384-391, 2004 | null | null | cs.AI | null | This paper presents in detail the generalized pignistic transformation (GPT)
succinctly developed in the Dezert-Smarandache Theory (DSmT) framework as a
tool for decision process. The GPT allows to provide a subjective probability
measure from any generalized basic belief assignment given by any corpus of
evidence. We mainly focus our presentation on the 3D case and provide the
complete result obtained by the GPT and its validation drawn from the
probability theory.
| [
{
"version": "v1",
"created": "Mon, 6 Sep 2004 17:47:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dezert",
"Jean",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Daniel",
"Milan",
""
]
]
|
cs/0409008 | Hendrik Feddes | Lea Cyrus and Hendrik Feddes | A Model for Fine-Grained Alignment of Multilingual Texts | 8 pages, 4 figures | Proc. COLING 2004 Workshop on Multilingual Linguistic Resources
(MLR2004), Geneva, August 28, 2004, pp. 15-22 | null | null | cs.CL | null | While alignment of texts on the sentential level is often seen as being too
coarse, and word alignment as being too fine-grained, bi- or multilingual texts
which are aligned on a level in-between are a useful resource for many
purposes. Starting from a number of examples of non-literal translations, which
tend to make alignment difficult, we describe an alignment model which copes
with these cases by explicitly coding them. The model is based on
predicate-argument structures and thus covers the middle ground between
sentence and word alignment. The model is currently used in a recently
initiated project of a parallel English-German treebank (FuSe), which can in
principle be extended with additional languages.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 2004 13:46:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cyrus",
"Lea",
""
],
[
"Feddes",
"Hendrik",
""
]
]
|
cs/0409009 | Dirk Beyer | Dirk Beyer (University of California, Berkeley), Andreas Noack
(Brandenburg University of Technology) | CrocoPat 2.1 Introduction and Reference Manual | 19 pages + cover, 2 eps figures, uses llncs.cls and
cs_techrpt_cover.sty, for downloading the source code, binaries, and RML
examples, see http://www.software-systemtechnik.de/CrocoPat/ | null | null | UCB//CSD-04-1338 | cs.PL cs.DM cs.DS cs.SE | null | CrocoPat is an efficient, powerful and easy-to-use tool for manipulating
relations of arbitrary arity, including directed graphs. This manual provides
an introduction to and a reference for CrocoPat and its programming language
RML. It includes several application examples, in particular from the analysis
of structural models of software systems.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 2004 09:44:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Beyer",
"Dirk",
"",
"University of California, Berkeley"
],
[
"Noack",
"Andreas",
"",
"Brandenburg University of Technology"
]
]
|
cs/0409012 | Elchanan Mossel | Eliza N. Maneva and Elchanan Mossel and Martin J. Wainwright | A New Look at Survey Propagation and its Generalizations | v2:typoes and reference corrections; v3: expanded exposition | null | null | null | cs.CC | null | This paper provides a new conceptual perspective on survey propagation, which
is an iterative algorithm recently introduced by the statistical physics
community that is very effective in solving random k-SAT problems even with
densities close to the satisfiability threshold. We first describe how any SAT
formula can be associated with a novel family of Markov random fields (MRFs),
parameterized by a real number \rho \in [0,1]. We then show that applying
belief propagation--a well-known ``message-passing'' technique for estimating
marginal probabilities--to this family of MRFs recovers a known family of
algorithms, ranging from pure survey propagation at one extreme (\rho = 1) to
standard belief propagation on the uniform distribution over SAT assignments at
the other extreme (\rho = 0). Configurations in these MRFs have a natural
interpretation as partial satisfiability assignments, on which a partial order
can be defined. We isolate cores as minimal elements in this partial ordering,
which are also fixed points of survey propagation and the only assignments with
positive probability in the MRF for \rho=1. Our experimental results for k=3
suggest that solutions of random formulas typically do not possess non-trivial
cores. This makes it necessary to study the structure of the space of partial
assignments for \rho<1 and investigate the role of assignments that are very
close to being cores. To that end, we investigate the associated lattice
structure, and prove a weight-preserving identity that shows how any MRF with
\rho>0 can be viewed as a ``smoothed'' version of the uniform distribution over
satisfying assignments (\rho=0). Finally, we isolate properties of Gibbs
sampling and message-passing algorithms that are typical for an ensemble of
k-SAT problems.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 01:27:14 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Oct 2004 02:19:00 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Oct 2005 04:36:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Maneva",
"Eliza N.",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Wainwright",
"Martin J.",
""
]
]
|
cs/0409013 | Ching-Chi Lin | Ching-Chi Lin, Gerard J. Chang, Gen-Huey Chen | Locally connected spanning trees on graphs | 14 pages, 3 figures | null | null | null | cs.DS cs.DM | null | A locally connected spanning tree of a graph $G$ is a spanning tree $T$ of
$G$ such that the set of all neighbors of $v$ in $T$ induces a connected
subgraph of $G$ for every $v\in V(G)$. The purpose of this paper is to give
linear-time algorithms for finding locally connected spanning trees on strongly
chordal graphs and proper circular-arc graphs, respectively.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 09:08:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lin",
"Ching-Chi",
""
],
[
"Chang",
"Gerard J.",
""
],
[
"Chen",
"Gen-Huey",
""
]
]
|
cs/0409014 | Manoj Kumar | Sunder lal and Manoj Kumar | A Digital Signature with Threshold Generation and Verification | 10 Pages | null | null | null | cs.CR | null | This paper proposes a signature scheme where the signatures are generated by
the cooperation of a number of people from a given group of senders and the
signatures are verified by a certain number of people from the group of
recipients. Shamir's threshold scheme and Schnorr's signature scheme are used
to realize the proposed scheme.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 11:55:58 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Sep 2004 12:29:23 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2004 12:21:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
|
cs/0409015 | Stephen Cook | Stephen Cook and Neil Thapen | The strength of replacement in weak arithmetic | null | null | null | null | cs.LO cs.CC | null | The replacement (or collection or choice) axiom scheme asserts bounded
quantifier exchange. We prove the independence of this scheme from various weak
theories of arithmetic, sometimes under a complexity assumption.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 2004 16:18:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cook",
"Stephen",
""
],
[
"Thapen",
"Neil",
""
]
]
|
cs/0409016 | Vitaly Lugovsky | V. S. Lugovsky | Using a hierarchy of Domain Specific Languages in complex software
systems design | 8 pages, 1 figure | null | null | null | cs.PL cs.DS cs.SE | null | A new design methodology is introduced, with some examples on building Domain
Specific Languages hierarchy on top of Scheme.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 01:44:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lugovsky",
"V. S.",
""
]
]
|
cs/0409017 | Jianyang Zeng | Jianyang Zeng, Wen-Jing Hsu and Jiangdian Wang | Near Optimal Routing for Small-World Networks with Augmented Local
Awareness | 16 pages, 1 table and 3 figures. Experimental results are added | null | null | null | cs.DM cs.DC cs.DS | null | In order to investigate the routing aspects of small-world networks,
Kleinberg proposes a network model based on a $d$-dimensional lattice with
long-range links chosen at random according to the $d$-harmonic distribution.
Kleinberg shows that the greedy routing algorithm by using only local
information performs in $O(\log^2 n)$ expected number of hops, where $n$
denotes the number of nodes in the network. Martel and Nguyen have found that
the expected diameter of Kleinberg's small-world networks is $\Theta(\log n)$.
Thus a question arises naturally: Can we improve the routing algorithms to
match the diameter of the networks while keeping the amount of information
stored on each node as small as possible? We extend Kleinberg's model and add
three augmented local links for each node: two of which are connected to nodes
chosen randomly and uniformly within $\log^2 n$ Mahattan distance, and the
third one is connected to a node chosen randomly and uniformly within $\log n$
Mahattan distance. We show that if each node is aware of $O(\log n)$ number of
neighbors via the augmented local links, there exist both non-oblivious and
oblivious algorithms that can route messages between any pair of nodes in
$O(\log n \log \log n)$ expected number of hops, which is a near optimal
routing complexity and outperforms the other related results for routing in
Kleinberg's small-world networks. Our schemes keep only $O(\log^2 n)$ bits of
routing information on each node, thus they are scalable with the network size.
Besides adding new light to the studies of social networks, our results may
also find applications in the design of large-scale distributed networks, such
as peer-to-peer systems, in the same spirit of Symphony.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 03:41:48 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Feb 2005 06:37:37 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Nov 2005 19:08:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zeng",
"Jianyang",
""
],
[
"Hsu",
"Wen-Jing",
""
],
[
"Wang",
"Jiangdian",
""
]
]
|
cs/0409018 | Adam Slagell | Adam J Slagell and Rafael Bonilla | PKI Scalability Issues | 23 pages, 2 figures | null | null | null | cs.CR | null | This report surveys different PKI technologies such as PKIX and SPKI and the
issues of PKI that affect scalability. Much focus is spent on certificate
revocation methodologies and status verification systems such as CRLs,
Delta-CRLs, CRS, Certificate Revocation Trees, Windowed Certificate Revocation,
OCSP, SCVP and DVCS.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 08:30:04 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Nov 2005 00:52:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Slagell",
"Adam J",
""
],
[
"Bonilla",
"Rafael",
""
]
]
|
cs/0409019 | Fabrizio Angiulli | Fabrizio Angiulli, Gianluigi Greco and Luigi Palopoli | Outlier Detection by Logic Programming | null | null | null | null | cs.AI cs.LO | null | The development of effective knowledge discovery techniques has become in the
recent few years a very active research area due to the important impact it has
in several relevant application areas. One interesting task thereof is that of
singling out anomalous individuals from a given population, e.g., to detect
rare events in time-series analysis settings, or to identify objects whose
behavior is deviant w.r.t. a codified standard set of "social" rules. Such
exceptional individuals are usually referred to as outliers in the literature.
Recently, outlier detection has also emerged as a relevant KR&R problem. In
this paper, we formally state the concept of outliers by generalizing in
several respects an approach recently proposed in the context of default logic,
for instance, by having outliers not being restricted to single individuals
but, rather, in the more general case, to correspond to entire (sub)theories.
We do that within the context of logic programming and, mainly through
examples, we discuss its potential practical impact in applications. The
formalization we propose is a novel one and helps in shedding some light on the
real nature of outliers. Moreover, as a major contribution of this work, we
illustrate the exploitation of minimality criteria in outlier detection. The
computational complexity of outlier detection problems arising in this novel
setting is thoroughly investigated and accounted for in the paper as well.
Finally, we also propose a rewriting algorithm that transforms any outlier
detection problem into an equivalent inference problem under the stable model
semantics, thereby making outlier computation effective and realizable on top
of any stable model solver.
| [
{
"version": "v1",
"created": "Thu, 9 Sep 2004 14:20:02 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Oct 2005 14:54:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Angiulli",
"Fabrizio",
""
],
[
"Greco",
"Gianluigi",
""
],
[
"Palopoli",
"Luigi",
""
]
]
|
cs/0409020 | Haibin Wang | Haibin Wang, Yuanchun He, Rajshekhar Sunderraman | A Generalized Disjunctive Paraconsistent Data Model for Negative and
Disjunctive Information | 12 pages | null | null | null | cs.DB | null | This paper presents a generalization of the disjunctive paraconsistent
relational data model in which disjunctive positive and negative information
can be represented explicitly and manipulated. There are situations where the
closed world assumption to infer negative facts is not valid or undesirable and
there is a need to represent and reason with negation explicitly. We consider
explicit disjunctive negation in the context of disjunctive databases as there
is an interesting interplay between these two types of information. Generalized
disjunctive paraconsistent relation is introduced as the main structure in this
model. The relational algebra is appropriately generalized to work on
generalized disjunctive paraconsistent relations and their correctness is
established.
| [
{
"version": "v1",
"created": "Sat, 11 Sep 2004 11:02:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"He",
"Yuanchun",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
]
|
cs/0409021 | Vita Hinze-Hoare | Vita Hinze-Hoare | Should Cyberspace Chat Rooms be closed to protect Children? | null | null | null | null | cs.CY | null | The explosion of people networking in cyberspace, disseminating terabytes of
information, is being promoted through the use of broadband, bluetooth
technology, and wireless mobile computing facilities. New communities within
such venues as virtual chat rooms discussion groups, newsgroups etc are being
created daily and even hourly. This is raising issues of cyberethics concerning
privacy,security, crime, human needs, e-business, e-healthcare, e-government
and intellectual property among others that need to be evaluated and reflected
upon. With this new freedom come new moral and ethical responsibilities, which
raise questions as to whether anything can be published or whether there should
be restrictions. This paper addresses one specific area, that has come into the
public eye, the closure by Microsoft of all of its free chat rooms.
| [
{
"version": "v1",
"created": "Sat, 11 Sep 2004 19:23:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0409022 | Ian Frommer | Ian Frommer, Eric Harder, Brian Hunt, Ryan Lance, Edward Ott and James
Yorke | Two Models for the Study of Congested Internet Connections | 10 pages, 9 figures, extended version of CCN '04 Paper | null | null | null | cs.NI | null | In this paper, we introduce two deterministic models aimed at capturing the
dynamics of congested Internet connections. The first model is a
continuous-time model that combines a system of differential equations with a
sudden change in one of the state variables. The second model is a
discrete-time model with a time step that arises naturally from the system.
Results from these models show good agreement with the well-known ns network
simulator, better than the results of a previous, similar model. This is due in
large part to the use of the sudden change to reflect the impact of lost data
packets. We also discuss the potential use of this model in network traffic
state estimation.
| [
{
"version": "v1",
"created": "Mon, 13 Sep 2004 17:49:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Frommer",
"Ian",
""
],
[
"Harder",
"Eric",
""
],
[
"Hunt",
"Brian",
""
],
[
"Lance",
"Ryan",
""
],
[
"Ott",
"Edward",
""
],
[
"Yorke",
"James",
""
]
]
|
cs/0409023 | Brendan Lucier | Brendan Lucier | Proximity Inversion Functions on the Non-Negative Integers | 20 pages, Latex; v2: Introduction expanded, Proof of main theorem
rewritten for clarity, formatting changed | null | null | null | cs.DM | null | We consider functions mapping non-negative integers to non-negative real
numbers such that a and a+n are mapped to values at least 1/n apart. In this
paper we use a novel method to construct such a function. We conjecture that
the supremum of the generated function is optimal and pose some unsolved
problems.
| [
{
"version": "v1",
"created": "Mon, 13 Sep 2004 03:12:33 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Oct 2004 23:11:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lucier",
"Brendan",
""
]
]
|
cs/0409028 | Andreas U. Schmidt | Andreas U. Schmidt | Incentive Systems in Multi-Level Markets for Virtual Goods | 18 pages, 5 figures; graphics with reduced resolution. Full
resolution available on author's homepage. Accepted contribution to the
Workshop 'Virtual Goods' at the Conference AXMEDIS 2005, 30. November - 2.
December, Florence, Italy | null | null | null | cs.GT cs.CY | null | As an alternative to rigid DRM measures, ways of marketing virtual goods
through multi-level or networked marketing have raised some interest. This
report is a first approach to multi-level markets for virtual goods from the
viewpoint of theoretical economy. A generic, kinematic model for the monetary
flow in multi-level markets, which quantitatively describes the incentives that
buyers receive through resales revenues, is devised. Building on it, the
competition of goods is examined in a dynamical, utility-theoretic model
enabling, in particular, a treatment of the free-rider problem. The most
important implications for the design of multi-level market mechanisms for
virtual goods, or multi-level incentive management systems, are outlined.
| [
{
"version": "v1",
"created": "Tue, 14 Sep 2004 12:03:23 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 15:17:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schmidt",
"Andreas U.",
""
]
]
|
cs/0409030 | Christophe Rigotti | Slim Abdennadher and Christophe Rigotti | Automatic Generation of CHR Constraint Solvers | to be published in Theory and Practice of Logic Programming, 16
pages, 2 figures | null | null | null | cs.LO cs.PL | null | In this paper, we present a framework for automatic generation of CHR solvers
given the logical specification of the constraints. This approach takes
advantage of the power of tabled resolution for constraint logic programming,
in order to check the validity of the rules. Compared to previous works where
different methods for automatic generation of constraint solvers have been
proposed, our approach enables the generation of more expressive rules (even
recursive and splitting rules) that can be used directly as CHR solvers.
| [
{
"version": "v1",
"created": "Tue, 14 Sep 2004 20:55:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abdennadher",
"Slim",
""
],
[
"Rigotti",
"Christophe",
""
]
]
|
cs/0409031 | Patrick C. McGuire | Patrick C. McGuire, Javier Gomez-Elvira, Jose Antonio
Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Jens Ormo, Enrique
Diaz-Martinez, Helge Ritter, Markus Oesker, Robert Haschke and Joerg Ontrup | Field Geology with a Wearable Computer: First Results of the Cyborg
Astrobiologist System | 7 pages, 6 figures. Submitted to ICRA'2005 (Int'l Conf. on Robotics &
Automation, IEEE), April 18-22, 2005, Barcelona, Spain | null | null | null | cs.CV astro-ph cs.RO | null | We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist. The Cyborg
Astrobiologist platform has thus far been used for testing and development of
these algorithms and systems: robotic acquisition of quasi-mosaics of images,
real-time image segmentation, and real-time determination of interesting points
in the image mosaics. The hardware and software systems function reliably, and
the computer-vision algorithms are adequate for the first field tests. In
addition to the proof-of-concept aspect of these field tests, the main result
of these field tests is the enumeration of those issues that we can improve in
the future, including: dealing with structural shadow and microtexture, and
also, controlling the camera's zoom lens in an intelligent manner. Nonetheless,
despite these and other technical inadequacies, this Cyborg Astrobiologist
system, consisting of a camera-equipped wearable-computer and its
computer-vision algorithms, has demonstrated its ability of finding genuinely
interesting points in real-time in the geological scenery, and then gathering
more information about these interest points in an automated manner.
| [
{
"version": "v1",
"created": "Wed, 15 Sep 2004 15:38:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Sebastian-Martinez",
"Eduardo",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Ritter",
"Helge",
""
],
[
"Oesker",
"Markus",
""
],
[
"Haschke",
"Robert",
""
],
[
"Ontrup",
"Joerg",
""
]
]
|
cs/0409032 | Alice Kolakowska | A. Kolakowska and M. A. Novotny | Desynchronization and Speedup in an Asynchronous Conservative Parallel
Update Protocol | Invited chapter in "Progress in Computer Science Research", Nova
Science Publishers; 34 pages, 12 figures, 32 references | Ch.6 in "Artificial Inteligence and Computer Science" ed by S.
Shannon, pp.151-176 (2005 Nova Science Piblishers, Inc., New York) ISBN
1-59454-411-5 | null | null | cs.DC cond-mat.mtrl-sci physics.comp-ph | null | In a state-update protocol for a system of $L$ asynchronous parallel
processes that communicate only with nearest neighbors, global
desynchronization in operation times can be deduced from kinetic roughening of
the corresponding virtual-time horizon (VTH). The utilization of the parallel
processing environment can be deduced by analyzing the microscopic structure of
the VTH. We give an overview of how the methods of non-equilibrium surface
growth (physics of complex systems) can be applied to uncover some properties
of state update algorithms used in distributed parallel discrete-event
simulations (PDES). In particular, we focus on the asynchronous conservative
PDES algorithm in a ring communication topology. The time evolution of its VTH
is simulated numerically as asynchronous cellular automaton whose update rule
corresponds to the update rule followed by this algorithm. We give theoretical
estimates of the performance as a function of $L$ and the load per processor,
i.e., approximate formulas for the mean speedup and for the desynchronization.
It is established that, for a given simulation size, there is a theoretical
upper bound for the desynchronization and a theoretical non-zero lower bound
for the utilization. The new approach to performance studies, outlined in this
chapter, is particularly useful in the search for the design of a
new-generation of algorithms that would efficiently carry out an autonomous or
tunable synchronization.
| [
{
"version": "v1",
"created": "Thu, 16 Sep 2004 06:40:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kolakowska",
"A.",
""
],
[
"Novotny",
"M. A.",
""
]
]
|
cs/0409034 | Adam Slagell | Paul Stanton | Securing Data in Storage: A Review of Current Research | 22 pages, 4 figures, 3 tables | null | null | null | cs.OS cs.CR | null | Protecting data from malicious computer users continues to grow in
importance. Whether preventing unauthorized access to personal photographs,
ensuring compliance with federal regulations, or ensuring the integrity of
corporate secrets, all applications require increased security to protect data
from talented intruders. Specifically, as more and more files are preserved on
disk the requirement to provide secure storage has increased in importance.
This paper presents a survey of techniques for securely storing data, including
theoretical approaches, prototype systems, and existing systems currently
available. Due to the wide variety of potential solutions available and the
variety of techniques to arrive at a particular solution, it is important to
review the entire field prior to selecting an implementation that satisfies
particular requirements. This paper provides an overview of the prominent
characteristics of several systems to provide a foundation for making an
informed decision. Initially, the paper establishes a set of criteria for
evaluating a storage solution based on confidentiality, integrity,
availability, and performance. Then, using these criteria, the paper explains
the relevant characteristics of select storage systems and provides a
comparison of the major differences.
| [
{
"version": "v1",
"created": "Fri, 17 Sep 2004 21:51:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stanton",
"Paul",
""
]
]
|
cs/0409035 | David P. Chassin | Ning Lu, Z. Todd Taylor, David P. Chassin, Ross T. Guttromson, R.
Scott Studham | Parallel Computing Environments and Methods for Power Distribution
System Simulation | 7 pages, 4 figures, 6 tables, submitted to HICSS-38 | null | null | null | cs.DC cs.CE cs.MA cs.PF | null | The development of cost-effective highperformance parallel computing on
multi-processor supercomputers makes it attractive to port excessively time
consuming simulation software from personal computers (PC) to super computes.
The power distribution system simulator (PDSS) takes a bottom-up approach and
simulates load at the appliance level, where detailed thermal models for
appliances are used. This approach works well for a small power distribution
system consisting of a few thousand appliances. When the number of appliances
increases, the simulation uses up the PC memory and its runtime increases to a
point where the approach is no longer feasible to model a practical large power
distribution system. This paper presents an effort made to port a PC-based
power distribution system simulator to a 128-processor shared-memory
supercomputer. The paper offers an overview of the parallel computing
environment and a description of the modification made to the PDSS model. The
performance of the PDSS running on a standalone PC and on the supercomputer is
compared. Future research direction of utilizing parallel computing in the
power distribution system simulation is also addressed.
| [
{
"version": "v1",
"created": "Sat, 18 Sep 2004 17:09:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lu",
"Ning",
""
],
[
"Taylor",
"Z. Todd",
""
],
[
"Chassin",
"David P.",
""
],
[
"Guttromson",
"Ross T.",
""
],
[
"Studham",
"R. Scott",
""
]
]
|
cs/0409036 | Manoj Kumar | Sunder Lal and Manoj Kumar | A Directed Signature Scheme and its Applications | 9 Pages, No figures. Presented in the National Conference on
Information Security, New Delhi- India, Jan-2003 | null | null | null | cs.CR | null | This paper presents a directed signature scheme with the property that the
signature can be verified only with the help of signer or signature receiver.
We also propose its applications to share verification of signatures and to
threshold cryptosystems.
| [
{
"version": "v1",
"created": "Sun, 19 Sep 2004 03:12:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
|
cs/0409037 | Mark Dumay | Mark Dumay | Business Processes: The Theoretical Impact of Process Thinking on
Information Systems Development | 22 pages | null | null | null | cs.OH | null | This paper investigates two aspects of process thinking that affect the
success rate of IT projects. These two aspects are the changes in the structure
of organizations and the epistemology of Information Systems Development.
Firstly, the conception of business processes within the management of
organizations increases the structural complexity of Information Systems,
because existing systems have to be integrated into a coherent cross-functional
architecture. Secondly, process thinking leads to a particular view of
organizations that ultimately has a negative effect on the support of
Information Systems. As an illustration of process thinking, the Business
Process Reengineering movement adheres to a technocratic management perspective
of organizations. Particularly this conception of organization views people as
mechanisms to realize certain organizational goals. As a result of this view
stakeholders are confronted with the implemented systems, rather than consulted
about the scope and functionality of those systems. Therefore, both aspects of
process thinking have a negative impact on the success of IT projects. The
problem of structural complexity is an area that is addressed by Enterprise
Application Integration, and mainly requires technical solutions. However, the
problems associated with the conception of organization require a different,
markedly non-technical, perspective. Several directions are discussed to
overcome some limitations of process thinking, but these directions are merely
small pointers. If truly effective and useful Information Systems are to be
acquired, IT practitioners and scientists require a completely different
mindset.
| [
{
"version": "v1",
"created": "Sun, 19 Sep 2004 09:56:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dumay",
"Mark",
""
]
]
|
cs/0409040 | Florentin Smarandache | Florentin Smarandache | Unification of Fusion Theories | 14 pages | Presented at NATO Advanced Study Institute, Albena, Bulgaria,
16-27 May 2005. International Journal of Applied Mathematics & Statistics,
Vol. 2, 1-14, 2004. | null | null | cs.AI | null | Since no fusion theory neither rule fully satisfy all needed applications,
the author proposes a Unification of Fusion Theories and a combination of
fusion rules in solving problems/applications. For each particular application,
one selects the most appropriate model, rule(s), and algorithm of
implementation. We are working in the unification of the fusion theories and
rules, which looks like a cooking recipe, better we'd say like a logical chart
for a computer programmer, but we don't see another method to comprise/unify
all things. The unification scenario presented herein, which is now in an
incipient form, should periodically be updated incorporating new discoveries
from the fusion and engineering research.
| [
{
"version": "v1",
"created": "Thu, 23 Sep 2004 02:02:44 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Sep 2004 13:50:15 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Oct 2004 17:01:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
]
]
|
cs/0409041 | Vita Hinze-Hoare | Vita Hinze-Hoare | Four Principles Fundamental to Design Practice for Human Centred Systems | null | null | null | null | cs.HC | null | A Survey of the principal literature on Human Centred Design reveals the four
most referenced principles. These are discussed with reference to the
application of a particular website, and a user survey is constructed based
upon the four principles.
| [
{
"version": "v1",
"created": "Thu, 23 Sep 2004 19:08:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0409042 | Harry Fiti\'e | Harry Fiti\'e | A new architecture for making highly scalable applications | 13 pages, 7 figures, 5 tables | null | null | null | cs.HC cs.CL | null | An application is a logical image of the world on a computer. A scalable
application is an application that allows one to update that logical image at
run time. To put it in operational terms: an application is scalable if a
client can change between time T1 and time T2 - the logic of the application as
expressed by language L;
- the structure and volume of the stored knowledge;
- the user interface of the application; while clients working with the
application at time T1 will work with the changed application at time T2
without performing any special action between T1 and T2. In order to realize
such a scalable application a new architecture has been developed that fully
orbits around language. In order to verify the soundness of that architecture a
program has been build. Both architecture and program are called CommunSENS.
The main purpose of this paper is: - to list the relevant elements of the
architecture; - to give a visual presentation of how the program and its image
of the world look like; - to give a visual presentation of how the image can be
updated. Some relevant philosophical and practical backgrounds are included in
the appendixes.
| [
{
"version": "v1",
"created": "Thu, 23 Sep 2004 19:29:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fitié",
"Harry",
""
]
]
|
cs/0409043 | Luca Trevisan | Luca Trevisan | Inapproximability of Combinatorial Optimization Problems | null | null | null | null | cs.CC | null | We survey results on the hardness of approximating combinatorial optimization
problems.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 02:13:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trevisan",
"Luca",
""
]
]
|
cs/0409045 | Amar Isli | Amar Isli | Augmenting ALC(D) (atemporal) roles and (aspatial) concrete domain with
temporal roles and a spatial concrete domain -first results | in Proceedings of the ECAI Workshop on Spatial and Temporal
Reasoning, pp. 123-127, Valencia, Spain, 2004 | null | null | null | cs.AI cs.LO | null | We consider the well-known family ALC(D) of description logics with a
concrete domain, and provide first results on a framework obtained by
augmenting ALC(D) atemporal roles and aspatial concrete domain with temporal
roles and a spatial concrete domain.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 14:56:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
]
|
cs/0409046 | Amar Isli | Amar Isli | A TCSP-like decidable constraint language generalising existing cardinal
direction relations | in Proceedings of the ECAI Workshop on Spatial and Temporal
Reasoning, pp. 135-139, Valencia, Spain, 2004 | null | null | null | cs.AI cs.LO | null | We define a quantitative constraint language subsuming two calculi well-known
in QSR (Qualitative Spatial Reasoning): Frank's cone-shaped and
projection-based calculi of cardinal direction relations. We show how to solve
a CSP (Constraint Satisfaction Problem) expressed in the language.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 15:12:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
]
|
cs/0409049 | Manoj Kumar | Sunder lal and Manoj Kumar | A Directed -Threshold Multi-Signature Scheme | 12 pages, no figures | null | null | null | cs.CR | null | In this paper, we propose a Directed Threshold Multi-Signature Scheme. In
this threshold signature scheme, any malicious set of signers cannot
impersonate any other set of signers to forge the signatures. In case of
forgery, it is possible to trace the signing set. This threshold signature
scheme is applicable when the message is sensitive to the signature receiver;
and the signatures are generated by the cooperation of a number of people from
a given group of senders.
| [
{
"version": "v1",
"created": "Sat, 25 Sep 2004 12:53:47 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Oct 2004 14:55:42 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2004 12:31:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
|
cs/0409050 | Manoj Kumar | Sunder Lal and Manoj Kumar | Some Applications of Directed Signature Scheme | 12 pages, no figures, this paper provides some application of
directed signature scheme | null | null | null | cs.CR | null | Directed signature scheme is applicable when the signed message contains
information sensitive to the receiver, because only receiver can directly
verify the signature and that he/she can prove its validity to any third party,
whenever necessary. This paper presents two applications of directed signature
scheme. (i) Directed –Delegated Signature Scheme. This scheme combines
the idea of proxy signatures with directed signature scheme. (ii) Allocation of
registration number. This scheme proposes a registration scheme in which the
registration number cannot be forged and misused.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 13:18:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
|
cs/0409051 | Tereza Tu\v{s}arov\'a | Tereza Tusarova | Quantum Complexity Classes | Master thesis from 2003. Comparing to the original version, here I
corrected some typos and formal errors. I am now writing a short extract from
this thesis | null | null | IR-TI-001 | cs.CC quant-ph | null | In our thesis, we try to shed more light onto the complexity of quantum
complexity classes by refining the related part of the hierarchy. First, we
review the basic concepts of quantum computing in general. Then, inspired by
BQP, we define new complexity classes. They are placed between BPP and PSPACE.
We show that they incorporate the current important quantum algorithms.
Furthermore, the importance of the unitarity constraint given by quantum
mechanics is revealed. Without this requirement, we naturally arrive at the
class AWPP, which was up to now thought to be just an artificially defined
class. We hope that some of our newly defined classes could find their use in
proving results about BQP.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 19:28:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tusarova",
"Tereza",
""
]
]
|
cs/0409052 | Aletta Nyl\'en | Parosh Aziz Abdulla and Aletta Nylen | Better Quasi-Ordered Transition Systems | 30 pages, 6 figures | null | null | null | cs.LO | null | Many existing algorithms for model checking of infinite-state systems operate
on constraints which are used to represent (potentially infinite) sets of
states. A general powerful technique which can be employed for proving
termination of these algorithms is that of well quasi-orderings. Several
methodologies have been proposed for derivation of new well quasi-ordered
constraint systems. However, many of these constraint systems suffer from a
"constraint explosion problem", as the number of the generated constraints
grows exponentially with the size of the problem. In this paper, we demonstrate
that a refinement of the theory of well quasi-orderings, called the theory of
better quasi-orderings, is more appropriate for symbolic model checking, since
it allows inventing constraint systems which are both well quasi-ordered and
compact. As a main application, we introduce existential zones, a constraint
system for verification of systems with unboundedly many clocks and use our
methodology to prove that existential zones are better quasi-ordered. We show
how to use existential zones in verification of timed Petri nets and present
some experimental results. Also, we apply our methodology to derive new
constraint systems for verification of broadcast protocols, lossy channel
systems, and integral relational automata. The new constraint systems are
exponentially more succinct than existing ones, and their well quasi-ordering
cannot be shown by previous methods in the literature.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 21:54:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abdulla",
"Parosh Aziz",
""
],
[
"Nylen",
"Aletta",
""
]
]
|
cs/0409055 | Jonathan Bowen | Alpay Beler, Ann Borda, Jonathan P. Bowen, Silvia Filippini-Fantoni | The Building of Online Communities: An approach for learning
organizations, with a particular focus on the museum sector | (15 pages, 1 figure) | In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2004
London Conference Proceedings, University College London, The Institute of
Archaeology, UK, 26-30 July 2004, pages 2.1-2.15 | null | null | cs.CY cs.DL | null | This paper considers the move toward and potential of building online
communities, with a particular focus on the museum sector. For instance, the
increase in the use of `personalized' toolkits that are becoming an integral
part of the online presence for learning organizations, like museums, can
provide a basis for creating and sustaining communities. A set of case studies
further illustrates working examples of the ways in which personalization and
specific tools are developing collaborative spaces, community channels and
group interactions.
| [
{
"version": "v1",
"created": "Tue, 28 Sep 2004 18:10:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Beler",
"Alpay",
""
],
[
"Borda",
"Ann",
""
],
[
"Bowen",
"Jonathan P.",
""
],
[
"Filippini-Fantoni",
"Silvia",
""
]
]
|
cs/0409056 | Gianluca Argentini | Gianluca Argentini | Using sparse matrices and splines-based interpolation in computational
fluid dynamics simulations | Talk at SIMAI (Societa' Italiana di Matematica Applicata e
Industriale) 2004 Congress, Venice, San Servolo Island, September 20-24, 2004 | null | null | null | cs.NA cs.CE physics.comp-ph | null | In this relation I present a technique of construction and fast evaluation of
a family of cubic polynomials for analytic smoothing and graphical rendering of
particles trajectories for flows in a generic geometry. The principal result of
the work was implementation and test of a method for interpolating 3D points by
regular parametric curves and their fast and efficient evaluation for a good
resolution of rendering. For the purpose a parallel environment using a
multiprocessor cluster architecture has been used. This work has been developed
for the Research and Development Department of my company for planning advanced
customized models of industrial burners.
| [
{
"version": "v1",
"created": "Wed, 29 Sep 2004 10:34:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
|
cs/0409057 | Manor Mendel | Sariel Har-Peled, Manor Mendel | Fast Construction of Nets in Low Dimensional Metrics, and Their
Applications | 41 pages. Extensive clean-up of minor English errors | SIAM J. Comput. 35(5):1148-1184, 2006 | 10.1137/S0097539704446281 | null | cs.DS cs.CG | null | We present a near linear time algorithm for constructing hierarchical nets in
finite metric spaces with constant doubling dimension. This data-structure is
then applied to obtain improved algorithms for the following problems:
Approximate nearest neighbor search, well-separated pair decomposition, compact
representation scheme, doubling measure, and computation of the (approximate)
Lipschitz constant of a function. In all cases, the running (preprocessing)
time is near-linear and the space being used is linear.
| [
{
"version": "v1",
"created": "Wed, 29 Sep 2004 17:44:15 GMT"
},
{
"version": "v2",
"created": "Fri, 6 May 2005 21:18:00 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Aug 2005 05:03:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Har-Peled",
"Sariel",
""
],
[
"Mendel",
"Manor",
""
]
]
|
cs/0409058 | Lillian Lee | Bo Pang and Lillian Lee | A Sentimental Education: Sentiment Analysis Using Subjectivity
Summarization Based on Minimum Cuts | Data available at
http://www.cs.cornell.edu/people/pabo/movie-review-data/ | Proceedings of the 42nd ACL, pp. 271--278, 2004 | null | null | cs.CL | null | Sentiment analysis seeks to identify the viewpoint(s) underlying a text span;
an example application is classifying a movie review as "thumbs up" or "thumbs
down". To determine this sentiment polarity, we propose a novel
machine-learning method that applies text-categorization techniques to just the
subjective portions of the document. Extracting these portions can be
implemented using efficient techniques for finding minimum cuts in graphs; this
greatly facilitates incorporation of cross-sentence contextual constraints.
| [
{
"version": "v1",
"created": "Wed, 29 Sep 2004 20:34:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
]
]
|
cs/0409059 | Vita Hinze-Hoare | Vita Hinze-Hoare | From Digital Television to Internet? | null | null | null | null | cs.MM cs.CY | null | This paper provides a general technical overview of the Multimedia Home
Platform (MHP) specifications. MHP is a generic interface between digital
applications and user machines, whether they happen to be set top boxes,
digital TV sets or Multimedia PC's. MHP extends the DVB open standards.
Addressed are MHP architexture, System core and MHP Profiles.
| [
{
"version": "v1",
"created": "Thu, 30 Sep 2004 19:08:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
]
|
cs/0410001 | Chriatian Jensen | C. S. Jensen, H. Lahrmann, S. Pakalnis, and J. Runge | The Infati Data | null | null | null | TR-79 | cs.DB | null | The ability to perform meaningful empirical studies is of essence in research
in spatio-temporal query processing. Such studies are often necessary to gain
detailed insight into the functional and performance characteristics of
proposals for new query processing techniques.
We present a collection of spatio-temporal data, collected during an
intelligent speed adaptation project, termed INFATI, in which some two dozen
cars equipped with GPS receivers and logging equipment took part. We describe
how the data was collected and how it was "modified" to afford the drivers some
degree of anonymity.
We also present the road network in which the cars were moving during data
collection.
The GPS data is publicly available for non-commercial purposes. It is our
hope that this resource will help the spatio-temporal research community in its
efforts to develop new and better query processing techniques.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 2004 16:55:38 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Oct 2004 12:01:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jensen",
"C. S.",
""
],
[
"Lahrmann",
"H.",
""
],
[
"Pakalnis",
"S.",
""
],
[
"Runge",
"J.",
""
]
]
|
cs/0410004 | Andras Lorincz | I. Szita and A. Lorincz | Applying Policy Iteration for Training Recurrent Neural Networks | Supplementary material. 17 papes, 1 figure | null | null | null | cs.AI cs.LG cs.NE | null | Recurrent neural networks are often used for learning time-series data. Based
on a few assumptions we model this learning task as a minimization problem of a
nonlinear least-squares cost function. The special structure of the cost
function allows us to build a connection to reinforcement learning. We exploit
this connection and derive a convergent, policy iteration-based algorithm.
Furthermore, we argue that RNN training can be fit naturally into the
reinforcement learning framework.
| [
{
"version": "v1",
"created": "Sat, 2 Oct 2004 07:19:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szita",
"I.",
""
],
[
"Lorincz",
"A.",
""
]
]
|
cs/0410006 | Mark Dumay | Mark Dumay | Demo or Practice: Critical Analysis of the Language/Action Perspective | 23 pages | null | null | null | cs.OH | null | Despite offering several promising concepts, the Language/Action Perspective
(LAP) is still not in the mainstream of Information Systems Development (ISD).
Since at present there is only a limited understanding of LAP theory and
practice, it remains unclear whether the lack of LAP's impact is due to
shortcomings in LAP theory itself. One classic problem within ISD is the
dichotomy between social perspectives and technical perspectives. LAP claims it
offers a solution to this problem. This paper investigates this claim as a
means to review LAP theory. To provide a structure to a critical analysis of
DEMO - an example methodology that belongs to the LAP research community - this
paper utilizes a paradigmatic framework. This framework is augmented by the
opinion of several DEMO practitioners by means of an expert discussion. With
use of a comparative evaluation of LAP theory and DEMO theory, the implication
of DEMO's reflection upon LAP is determined. The paper concludes by outlining
an agenda for further research if LAP is to improve its footprint in the field.
| [
{
"version": "v1",
"created": "Sun, 3 Oct 2004 20:03:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dumay",
"Mark",
""
]
]
|
cs/0410007 | Ignatios Souvatzis | Ignatios Souvatzis | A Shared Write-protected Root Filesystem for a Group of Networked
Clients | Presented at the 2nd European BSD Conference, 2002, Amsterdam, The
Netherlands; v2: reformatted to help citation browser | Proceedings of the 2nd European BSD Conference, 2002, Amsterdam,
The Netherlands | null | null | cs.OS cs.DC | null | A method to boot a cluster of diskless network clients from a single
write-protected NFS root file system is shown. The problems encountered when
first implementing the setup and their solution are discussed. Finally, the
setup is briefly compared to using a kernel-embedded root file system.
| [
{
"version": "v1",
"created": "Mon, 4 Oct 2004 14:49:00 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Jan 2005 19:07:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Souvatzis",
"Ignatios",
""
]
]
|
cs/0410009 | Aaron Harwood | Scott Douglas and Aaron Harwood | Diffusive Load Balancing of Loosely-Synchronous Parallel Programs over
Peer-to-Peer Networks | 14 pages with 10 figures | null | null | null | cs.DC | null | The use of under-utilized Internet resources is widely recognized as a viable
form of high performance computing. Sustained processing power of roughly 40T
FLOPS using 4 million volunteered Internet hosts has been reported for
embarrassingly parallel problems. At the same time, peer-to-peer (P2P) file
sharing networks, with more than 50 million participants, have demonstrated the
capacity for scale in distributed systems. This paper contributes a study of
load balancing techniques for a general class of loosely-synchronous parallel
algorithms when executed over a P2P network. We show that decentralized,
diffusive load balancing can be effective at balancing load and is facilitated
by the dynamic properties of P2P. While a moderate degree of dynamicity can
benefit load balancing, significant dynamicity hinders the parallel program
performance due to the need for increased load migration. To the best of our
knowledge this study provides new insight into the performance of
loosely-synchronous parallel programs over the Internet.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 08:23:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Douglas",
"Scott",
""
],
[
"Harwood",
"Aaron",
""
]
]
|
cs/0410010 | Amit K. Awasthi | Amit K. Awasthi and Sunder Lal | A New Proxy Ring Signature Scheme | RMS 2004, Agra, INDIA | Proceeding of RMS 2004, Page 29 | null | null | cs.CR math.RA | null | The concept of ring signature was introduced by Rivest, Shamir and Tauman.
This signature is considered to be a simplified group signature from which
identity of signer is ambiguous although verifier knows the group to which
signer belong. In this paper we introduce a new proxy ring signature scheme.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 18:58:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K.",
""
],
[
"Lal",
"Sunder",
""
]
]
|
cs/0410011 | Amit K. Awasthi | Amit K Awasthi | Comment on A dynamic ID-based Remote User Authentication Scheme | 3 pages. Available at : http://gfcr.org | Transaction on Cryptology, Vol. 01, Issue 02, Page 15-17, Sep 2004 | null | null | cs.CR | null | Since 1981, when Lamport introduced the remote user authentication scheme
using table, a plenty of schemes had been proposed with tables or without table
using. Recently Das et al. proposed a dynamic id-based remote user
authentication scheme. They claimed that their scheme is secure against
ID-theft, and can resist the reply attacks, forgery attacks, insider attacks an
so on. In this paper we show that Das et al's scheme is completly insecure and
using of this scheme is like an open server access without password.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 21:54:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K",
""
]
]
|
cs/0410015 | Andras Lorincz | Z. Szabo and A. Lorincz | L1 regularization is better than L2 for learning and predicting chaotic
systems | 13 pages, 4 figures | null | null | null | cs.LG cs.AI | null | Emergent behaviors are in the focus of recent research interest. It is then
of considerable importance to investigate what optimizations suit the learning
and prediction of chaotic systems, the putative candidates for emergence. We
have compared L1 and L2 regularizations on predicting chaotic time series using
linear recurrent neural networks. The internal representation and the weights
of the networks were optimized in a unifying framework. Computational tests on
different problems indicate considerable advantages for the L1 regularization:
It had considerably better learning time and better interpolating capabilities.
We shall argue that optimization viewed as a maximum likelihood estimation
justifies our results, because L1 regularization fits heavy-tailed
distributions -- an apparently general feature of emergent systems -- better.
| [
{
"version": "v1",
"created": "Thu, 7 Oct 2004 10:57:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szabo",
"Z.",
""
],
[
"Lorincz",
"A.",
""
]
]
|
cs/0410016 | Pedro Andrade | Antonio Amorim, Jaime Villate and Pedro Andrade | HEP@Home - A distributed computing system based on BOINC | 4 pages, 4 Postscript figures, uses CHEP2004.cls, submitted to
CHEP2004 | null | null | null | cs.DC | null | Project SETI@HOME has proven to be one of the biggest successes of
distributed computing during the last years. With a quite simple approach SETI
manages to process large volumes of data using a vast amount of distributed
computer power.
To extend the generic usage of this kind of distributed computing tools,
BOINC is being developed. In this paper we propose HEP@HOME, a BOINC version
tailored to the specific requirements of the High Energy Physics (HEP)
community.
The HEP@HOME will be able to process large amounts of data using virtually
unlimited computing power, as BOINC does, and it should be able to work
according to HEP specifications. In HEP the amounts of data to be analyzed or
reconstructed are of central importance. Therefore, one of the design
principles of this tool is to avoid data transfer. This will allow scientists
to run their analysis applications and taking advantage of a large number of
CPUs. This tool also satisfies other important requirements in HEP, namely,
security, fault-tolerance and monitoring.
| [
{
"version": "v1",
"created": "Thu, 7 Oct 2004 12:42:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Amorim",
"Antonio",
""
],
[
"Villate",
"Jaime",
""
],
[
"Andrade",
"Pedro",
""
]
]
|
cs/0410018 | Russell Martin | Petra Berenbrink, Leslie Ann Goldberg, Paul Goldberg, Russell Martin | Utilitarian resource assignment | 19 pages | null | null | null | cs.GT math.GM | null | This paper studies a resource allocation problem introduced by Koutsoupias
and Papadimitriou. The scenario is modelled as a multiple-player game in which
each player selects one of a finite number of known resources. The cost to the
player is the total weight of all players who choose that resource, multiplied
by the ``delay'' of that resource. Recent papers have studied the Nash
equilibria and social optima of this game in terms of the $L_\infty$ cost
metric, in which the social cost is taken to be the maximum cost to any player.
We study the $L_1$ variant of this game, in which the social cost is taken to
be the sum of the costs to the individual players, rather than the maximum of
these costs. We give bounds on the size of the coordination ratio, which is the
ratio between the social cost incurred by selfish behavior and the optimal
social cost; we also study the algorithmic problem of finding optimal
(lowest-cost) assignments and Nash Equilibria. Additionally, we obtain bounds
on the ratio between alternative Nash equilibria for some special cases of the
problem.
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 13:06:55 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Mar 2005 18:19:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul",
""
],
[
"Martin",
"Russell",
""
]
]
|
cs/0410020 | Stephen Luttrell | Stephen Luttrell | Adaptive Cluster Expansion (ACE): A Hierarchical Bayesian Network | 35 pages, 20 figures | null | null | null | cs.NE cs.CV | null | Using the maximum entropy method, we derive the "adaptive cluster expansion"
(ACE), which can be trained to estimate probability density functions in high
dimensional spaces. The main advantage of ACE over other Bayesian networks is
its ability to capture high order statistics after short training times, which
it achieves by making use of a hierarchical vector quantisation of the input
data. We derive a scheme for representing the state of an ACE network as a
"probability image", which allows us to identify statistically anomalous
regions in an otherwise statistically homogeneous image, for instance. Finally,
we present some probability images that we obtained after training ACE on some
Brodatz texture images - these demonstrate the ability of ACE to detect subtle
textural anomalies.
| [
{
"version": "v1",
"created": "Sun, 10 Oct 2004 18:30:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
]
|
cs/0410021 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Stanislaw P. Radziszowski,
Rahul Tripathi | Complexity Results in Graph Reconstruction | null | null | null | URCS-TR-2004-852 | cs.CC cs.DM | null | We investigate the relative complexity of the graph isomorphism problem (GI)
and problems related to the reconstruction of a graph from its vertex-deleted
or edge-deleted subgraphs (in particular, deck checking (DC) and legitimate
deck (LD) problems). We show that these problems are closely related for all
amounts $c \geq 1$ of deletion:
1) $GI \equiv^{l}_{iso} VDC_{c}$, $GI \equiv^{l}_{iso} EDC_{c}$, $GI
\leq^{l}_{m} LVD_c$, and $GI \equiv^{p}_{iso} LED_c$.
2) For all $k \geq 2$, $GI \equiv^{p}_{iso} k-VDC_c$ and $GI \equiv^{p}_{iso}
k-EDC_c$.
3) For all $k \geq 2$, $GI \leq^{l}_{m} k-LVD_c$.
4)$GI \equiv^{p}_{iso} 2-LVC_c$.
5) For all $k \geq 2$, $GI \equiv^{p}_{iso} k-LED_c$.
For many of these results, even the $c = 1$ case was not previously known.
Similar to the definition of reconstruction numbers $vrn_{\exists}(G)$ [HP85]
and $ern_{\exists}(G)$ (see page 120 of [LS03]), we introduce two new graph
parameters, $vrn_{\forall}(G)$ and $ern_{\forall}(G)$, and give an example of a
family $\{G_n\}_{n \geq 4}$ of graphs on $n$ vertices for which
$vrn_{\exists}(G_n) < vrn_{\forall}(G_n)$. For every $k \geq 2$ and $n \geq 1$,
we show that there exists a collection of $k$ graphs on $(2^{k-1}+1)n+k$
vertices with $2^{n}$ 1-vertex-preimages, i.e., one has families of graph
collections whose number of 1-vertex-preimages is huge relative to the size of
the graphs involved.
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 00:57:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Radziszowski",
"Stanislaw P.",
""
],
[
"Tripathi",
"Rahul",
""
]
]
|
cs/0410022 | Paul Piwek | P. Piwek, B. Krenn, M. Schroeder, M. Grice, S. Baumann and H. Pirker | RRL: A Rich Representation Language for the Description of Agent
Behaviour in NECA | 7 pages, 4 figures | In Proceedings of the AAMAS-02 Workshop ``Embodied conversational
agents - let's specify and evaluate them!'', July 16 2002, Bologna, Italy. | null | null | cs.MM cs.MA | null | In this paper, we describe the Rich Representation Language (RRL) which is
used in the NECA system. The NECA system generates interactions between two or
more animated characters. The RRL is an XML compliant framework for
representing the information that is exchanged at the interfaces between the
various NECA system modules. The full XML Schemas for the RRL are available at
http://www.ai.univie.ac.at/NECA/RRL
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 12:34:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Piwek",
"P.",
""
],
[
"Krenn",
"B.",
""
],
[
"Schroeder",
"M.",
""
],
[
"Grice",
"M.",
""
],
[
"Baumann",
"S.",
""
],
[
"Pirker",
"H.",
""
]
]
|
cs/0410023 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Harald Hempel | All Superlinear Inverse Schemes are coNP-Hard | Conf. version was in MFCS 2004 | null | null | URCS-TR-2004-841 | cs.CC cs.CR | null | How hard is it to invert NP-problems? We show that all superlinearly
certified inverses of NP problems are coNP-hard. To do so, we develop a novel
proof technique that builds diagonalizations against certificates directly into
a circuit.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 02:38:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
]
|
cs/0410024 | Alex Wiesmaier | A. Wiesmaier (1), M. Lippert (1), V. Karatsiolis (1) ((1) TU
Darmstadt) | The Key Authority - Secure Key Management in Hierarchical Public Key
Infrastructures | 5 pages, 2 figures | in Proceedings of the International Conference on Security and
Management. CSREA Press, June 2004, pp. 89-93 | null | null | cs.CR | null | We model a private key`s life cycle as a finite state machine. The states are
the key`s phases of life and the transition functions describe tasks to be done
with the key. Based on this we define and describe the key authority, a trust
center module, which potentiates the easy enforcement of secure management of
private keys in hierarchical public key infrastructures. This is done by
assembling all trust center tasks concerning the crucial handling of private
keys within one centralized module. As this module resides under full control
of the trust center`s carrier it can easily be protected by well-known
organizational and technical measures.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 12:28:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wiesmaier",
"A.",
""
],
[
"Lippert",
"M.",
""
],
[
"Karatsiolis",
"V.",
""
]
]
|
cs/0410025 | Alex Wiesmaier | A. Wiesmaier, M. Fischer, M. Lippert, J. Buchmann | Outflanking and securely using the PIN/TAN-System | 7 pages; 2 figures; IEEE style; final version | Proceedings of the 2005 International Conference on Security and
Management (SAM'05); June 2005 | null | null | cs.CR | null | The PIN/TAN-system is an authentication and authorization scheme used in
e-business. Like other similar schemes it is successfully attacked by
criminals. After shortly classifying the various kinds of attacks we accomplish
malicious code attacks on real World Wide Web transaction systems. In doing so
we find that it is really easy to outflank these systems. This is even
supported by the users' behavior. We give a few simple behavior rules to
improve this situation. But their impact is limited. Also the providers support
the attacks by having implementation flaws in their installations. Finally we
show that the PIN/TAN-system is not suitable for usage in highly secure
applications.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 13:47:33 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jan 2005 23:05:48 GMT"
},
{
"version": "v3",
"created": "Thu, 26 May 2005 13:41:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wiesmaier",
"A.",
""
],
[
"Fischer",
"M.",
""
],
[
"Lippert",
"M.",
""
],
[
"Buchmann",
"J.",
""
]
]
|
cs/0410026 | Eric Neilsen Jr. | Eric H. Neilsen Jr, James Simone | Lattice QCD Data and Metadata Archives at Fermilab and the International
Lattice Data Grid | Proceedings for CHEP 2004 presentation | null | null | null | cs.DC hep-lat | null | The lattice gauge theory community produces large volumes of data. Because
the data produced by completed computations form the basis for future work, the
maintenance of archives of existing data and metadata describing the
provenance, generation parameters, and derived characteristics of that data is
essential not only as a reference, but also as a basis for future work.
Development of these archives according to uniform standards both in the data
and metadata formats provided and in the software interfaces to the component
services could greatly simplify collaborations between institutions and enable
the dissemination of meaningful results.
This paper describes the progress made in the development of a set of such
archives at the Fermilab lattice QCD facility. We are coordinating the
development of the interfaces to these facilities and the formats of the data
and metadata they provide with the efforts of the international lattice data
grid (ILDG) metadata and middleware working groups, whose goals are to develop
standard formats for lattice QCD data and metadata and a uniform interface to
archive facilities that store them. Services under development include those
commonly associate with data grids: a service registry, a metadata database, a
replica catalog, and an interface to a mass storage system. All services
provide GSI authenticated web service interfaces following modern standards,
including WSDL and SOAP, and accept and provide data and metadata following
recent XML based formats proposed by the ILDG metadata working group.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 15:34:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Neilsen",
"Eric H.",
"Jr"
],
[
"Simone",
"James",
""
]
]
|
cs/0410027 | Paul M. Aoki | Chen Yu, Paul M. Aoki, Allison Woodruff | Detecting User Engagement in Everyday Conversations | 4 pages (A4), 1 figure (EPS) | Proc. 8th Int'l Conf. on Spoken Language Processing (ICSLP) (Vol.
2), Jeju Island, Republic of Korea, Oct. 2004, 1329-1332. ISCA. | null | null | cs.SD cs.CL cs.HC | null | This paper presents a novel application of speech emotion recognition:
estimation of the level of conversational engagement between users of a voice
communication system. We begin by using machine learning techniques, such as
the support vector machine (SVM), to classify users' emotions as expressed in
individual utterances. However, this alone fails to model the temporal and
interactive aspects of conversational engagement. We therefore propose the use
of a multilevel structure based on coupled hidden Markov models (HMM) to
estimate engagement levels in continuous natural speech. The first level is
comprised of SVM-based classifiers that recognize emotional states, which could
be (e.g.) discrete emotion types or arousal/valence levels. A high-level HMM
then uses these emotional states as input, estimating users' engagement in
conversation by decoding the internal states of the HMM. We report experimental
results obtained by applying our algorithms to the LDC Emotional Prosody and
CallFriend speech corpora.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 2004 02:28:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yu",
"Chen",
""
],
[
"Aoki",
"Paul M.",
""
],
[
"Woodruff",
"Allison",
""
]
]
|
cs/0410031 | Yongzhi Cao | Yongzhi Cao and Mingsheng Ying | Similarity-Based Supervisory Control of Discrete Event Systems | 22 pages, 5 figures | A short version has been published in the IEEE Transactions on
Automatic Control, 51(2), pp. 325-330, February 2006. | null | null | cs.DM | null | Due to the appearance of uncontrollable events in discrete event systems, one
may wish to replace the behavior leading to the uncontrollability of
pre-specified language by some quite similar one. To capture this similarity,
we introduce metric to traditional supervisory control theory and generalize
the concept of original controllability to $\ld$-controllability, where $\ld$
indicates the similarity degree of two languages. A necessary and sufficient
condition for a language to be $\ld$-controllable is provided. We then examine
some properties of $\ld$-controllable languages and present an approach to
optimizing a realization.
| [
{
"version": "v1",
"created": "Thu, 14 Oct 2004 07:28:33 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Mar 2005 14:13:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cao",
"Yongzhi",
""
],
[
"Ying",
"Mingsheng",
""
]
]
|
cs/0410035 | Lane A. Hemaspaandra | Lane A. Hemaspaandra, Proshanto Mukherji, and Till Tantau | Overhead-Free Computation, DCFLs, and CFLs | null | null | null | URCS-TR-2004-844 | cs.CC | null | We study Turing machines that are allowed absolutely no space overhead. The
only work space the machines have, beyond the fixed amount of memory implicit
in their finite-state control, is that which they can create by cannibalizing
the input bits' own space. This model more closely reflects the fixed-sized
memory of real computers than does the standard complexity-theoretic model of
linear space.
Though some context-sensitive languages cannot be accepted by such machines,
we show that all context-free languages can be accepted nondeterministically in
polynomial time with absolutely no space overhead, and that all deterministic
context-free languages can be accepted deterministically in polynomial time
with absolutely no space overhead.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2004 18:18:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Mukherji",
"Proshanto",
""
],
[
"Tantau",
"Till",
""
]
]
|
cs/0410036 | Stephen Luttrell | Stephen Luttrell | Self-Organised Factorial Encoding of a Toroidal Manifold | 46 pages, 11 figures, corrected equation 39 | null | null | null | cs.LG cs.CV | null | It is shown analytically how a neural network can be used optimally to encode
input data that is derived from a toroidal manifold. The case of a 2-layer
network is considered, where the output is assumed to be a set of discrete
neural firing events. The network objective function measures the average
Euclidean error that occurs when the network attempts to reconstruct its input
from its output. This optimisation problem is solved analytically for a
toroidal input manifold, and two types of solution are obtained: a joint
encoder in which the network acts as a soft vector quantiser, and a factorial
encoder in which the network acts as a pair of soft vector quantisers (one for
each of the circular subspaces of the torus). The factorial encoder is favoured
for small network sizes when the number of observed firing events is large.
Such self-organised factorial encoding may be used to restrict the size of
network that is required to perform a given encoding task, and will decompose
an input manifold into its constituent submanifolds.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2004 20:25:24 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Sep 2005 17:48:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
]
|
cs/0410037 | Mark Burgin | Mark Burgin | Hardware-Oriented Group Solutions for Hard Problems | null | null | null | null | cs.CC | null | Group and individual solutions are considered for hard problems such as
satisfiability problem. Time-space trade-off in a structured active memory
provides means to achieve lower time complexity for solutions of these
problems.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2004 23:12:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
]
]
|
cs/0410038 | Floris Geerts | Floris Geerts | Frequent Knot Discovery | 7 pages, 2 figures, recreational data mining | null | null | null | cs.DB | null | We explore the possibility of applying the framework of frequent pattern
mining to a class of continuous objects appearing in nature, namely knots. We
introduce the frequent knot mining problem and present a solution. The key
observation is that a database consisting of knots can be transformed into a
transactional database. This observation is based on the Prime Decomposition
Theorem of knots.
| [
{
"version": "v1",
"created": "Sat, 16 Oct 2004 13:14:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Geerts",
"Floris",
""
]
]
|
cs/0410039 | Sara Cohen | Sara Cohen and Yehoshua Sagiv | Generating All Maximal Induced Subgraphs for Hereditary,
Connected-Hereditary and Rooted-Hereditary Properties | null | null | null | null | cs.DS cs.DM | null | The problem of computing all maximal induced subgraphs of a graph G that have
a graph property P, also called the maximal P-subgraphs problem, is considered.
This problem is studied for hereditary, connected-hereditary and
rooted-hereditary graph properties. The maximal P-subgraphs problem is reduced
to restricted versions of this problem by providing algorithms that solve the
general problem, assuming that an algorithm for a restricted version is given.
The complexity of the algorithms are analyzed in terms of total polynomial
time, incremental polynomial time and the complexity class P-enumerable. The
general results presented allow simple proofs that the maximal P-subgraphs
problem can be solved efficiently (in terms of the input and output) for many
different properties.
| [
{
"version": "v1",
"created": "Sun, 17 Oct 2004 20:30:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cohen",
"Sara",
""
],
[
"Sagiv",
"Yehoshua",
""
]
]
|
cs/0410042 | Patrick C. McGuire | H. Ritter, J.J. Steil, C. Noelker, F. Roethling, P.C. McGuire | Neural Architectures for Robot Intelligence | 37 pages, 17 figures | Reviews in the Neurosciences, vol. 14, no. 1-2, pp. 121-143 (2003) | null | null | cs.RO cs.CV cs.HC cs.LG cs.NE q-bio.NC | null | We argue that the direct experimental approaches to elucidate the
architecture of higher brains may benefit from insights gained from exploring
the possibilities and limits of artificial control architectures for robot
systems. We present some of our recent work that has been motivated by that
view and that is centered around the study of various aspects of hand actions
since these are intimately linked with many higher cognitive abilities. As
examples, we report on the development of a modular system for the recognition
of continuous hand postures based on neural nets, the use of vision and tactile
sensing for guiding prehensile movements of a multifingered hand, and the
recognition and use of hand gestures for robot teaching.
Regarding the issue of learning, we propose to view real-world learning from
the perspective of data mining and to focus more strongly on the imitation of
observed actions instead of purely reinforcement-based exploration. As a
concrete example of such an effort we report on the status of an ongoing
project in our lab in which a robot equipped with an attention system with a
neurally inspired architecture is taught actions by using hand gestures in
conjunction with speech commands. We point out some of the lessons learnt from
this system, and discuss how systems of this kind can contribute to the study
of issues at the junction between natural and artificial cognitive systems.
| [
{
"version": "v1",
"created": "Mon, 18 Oct 2004 10:50:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ritter",
"H.",
""
],
[
"Steil",
"J. J.",
""
],
[
"Noelker",
"C.",
""
],
[
"Roethling",
"F.",
""
],
[
"McGuire",
"P. C.",
""
]
]
|
cs/0410047 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | Simple Distributed Weighted Matchings | null | null | null | null | cs.DC cs.DM | null | Wattenhofer [WW04] derive a complicated distributed algorithm to compute a
weighted matching of an arbitrary weighted graph, that is at most a factor 5
away from the maximum weighted matching of that graph. We show that a variant
of the obvious sequential greedy algorithm [Pre99], that computes a weighted
matching at most a factor 2 away from the maximum, is easily distributed. This
yields the best known distributed approximation algorithm for this problem so
far.
| [
{
"version": "v1",
"created": "Tue, 19 Oct 2004 09:00:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
]
|
cs/0410049 | Joseph Y. Halpern | Joseph Y. Halpern | Intransitivity and Vagueness | A preliminary version of this paper appears in Principles of
Knowledge Representation and Reasoning: Proceedings of the Ninth
International Conference (KR 2004) | null | null | null | cs.AI | null | There are many examples in the literature that suggest that
indistinguishability is intransitive, despite the fact that the
indistinguishability relation is typically taken to be an equivalence relation
(and thus transitive). It is shown that if the uncertainty perception and the
question of when an agent reports that two things are indistinguishable are
both carefully modeled, the problems disappear, and indistinguishability can
indeed be taken to be an equivalence relation. Moreover, this model also
suggests a logic of vagueness that seems to solve many of the problems related
to vagueness discussed in the philosophical literature. In particular, it is
shown here how the logic can handle the sorites paradox.
| [
{
"version": "v1",
"created": "Tue, 19 Oct 2004 17:31:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
]
|
cs/0410050 | Joseph Y. Halpern | Joseph Y. Halpern | Sleeping Beauty Reconsidered: Conditioning and Reflection in
Asynchronous Systems | A preliminary version of this paper appears in Principles of
Knowledge Representation and Reasoning: Proceedings of the Ninth
International Conference (KR 2004). This version will appear in Oxford
Studies in Epistemology | null | null | null | cs.AI | null | A careful analysis of conditioning in the Sleeping Beauty problem is done,
using the formal model for reasoning about knowledge and probability developed
by Halpern and Tuttle. While the Sleeping Beauty problem has been viewed as
revealing problems with conditioning in the presence of imperfect recall, the
analysis done here reveals that the problems are not so much due to imperfect
recall as to asynchrony. The implications of this analysis for van Fraassen's
Reflection Principle and Savage's Sure-Thing Principle are considered.
| [
{
"version": "v1",
"created": "Tue, 19 Oct 2004 17:31:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
]
|
cs/0410051 | Alex Vinokur | Alex Vinokur | Turing Machine with Faults, Failures and Recovery | 8 pages; C++ Simulator has been developed | null | null | null | cs.LO | null | A Turing machine with faults, failures and recovery (TMF) is described. TMF
is (weakly) non-deterministic Turing machine consisting of five semi-infinite
tapes (Master Tape, Synchro Tape, Backup Tape, Backup Synchro Tape, User Tape)
and four controlling components (Program, Daemon, Apparatus, User).
Computational process consists of three phases (Program Phase, Failure Phase,
Repair Phase). C++ Simulator of a Turing machine with faults, failures and
recovery has been developed.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 12:43:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
]
|
cs/0410052 | Joseph O'Rourke | Julie Glass, Stefan Langerman, Joseph O'Rourke, Jack Snoeyink,
Jianyuan K. Zhong | A 2-chain can interlock with a k-chain | 10 pages, 6 figures | null | null | null | cs.CG cs.DM | null | One of the open problems posed in [3] is: what is the minimal number k such
that an open, flexible k-chain can interlock with a flexible 2-chain? In this
paper, we establish the assumption behind this problem, that there is indeed
some k that achieves interlocking. We prove that a flexible 2-chain can
interlock with a flexible, open 16-chain.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 00:55:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Glass",
"Julie",
""
],
[
"Langerman",
"Stefan",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Snoeyink",
"Jack",
""
],
[
"Zhong",
"Jianyuan K.",
""
]
]
|
cs/0410053 | Haibin Wang | Haibin Wang, Hao Tian, Rajshekhar Sunderraman | An Extended Generalized Disjunctive Paraconsistent Data Model for
Disjunctive Information | 10 pages | null | null | null | cs.DB | null | This paper presents an extension of generalized disjunctive paraconsistent
relational data model in which pure disjunctive positive and negative
information as well as mixed disjunctive positive and negative information can
be represented explicitly and manipulated. We consider explicit mixed
disjunctive information in the context of disjunctive databases as there is an
interesting interplay between these two types of information. Extended
generalized disjunctive paraconsistent relation is introduced as the main
structure in this model. The relational algebra is appropriately generalized to
work on extended generalized disjunctive paraconsistent relations and their
correctness is established.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 08:50:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Tian",
"Hao",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
]
|
cs/0410054 | Haibin Wang | Rajshekhar Sunderraman, Haibin Wang | Paraconsistent Intuitionistic Fuzzy Relational Data Model | 19 pages, 1 figure | null | null | null | cs.DB | null | In this paper, we present a generalization of the relational data model based
on paraconsistent intuitionistic fuzzy sets. Our data model is capable of
manipulating incomplete as well as inconsistent information. Fuzzy relation or
intuitionistic fuzzy relation can only handle incomplete information.
Associated with each relation are two membership functions one is called
truth-membership function $T$ which keeps track of the extent to which we
believe the tuple is in the relation, another is called false-membership
function which keeps track of the extent to which we believe that it is not in
the relation. A paraconsistent intuitionistic fuzzy relation is inconsistent if
there exists one tuple $a$ such that $T(a) + F(a) > 1$. In order to handle
inconsistent situation, we propose an operator called split to transform
inconsistent paraconsistent intuitionistic fuzzy relations into
pseudo-consistent paraconsistent intuitionistic fuzzy relations and do the
set-theoretic and relation-theoretic operations on them and finally use another
operator called combine to transform the result back to paraconsistent
intuitionistic fuzzy relation. For this model, we define algebraic operators
that are generalisations of the usual operators such as union, selection, join
on fuzzy relations. Our data model can underlie any database and knowledge-base
management system that deals with incomplete and inconsistent information.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 11:40:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sunderraman",
"Rajshekhar",
""
],
[
"Wang",
"Haibin",
""
]
]
|
cs/0410055 | Michiel Hazewinkel | Michiel Hazewinkel | Mathematical knowledge management is needed | Keynote speech at the November, 2003 MKM meeting ar Herriott-Watt,
Edinburg, UK. Nine pages, one figure | null | null | null | cs.IR | null | In this lecture I discuss some aspects of MKM, Mathematical Knowledge
Management, with particuar emphasis on information storage and information
retrieval.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 2004 15:51:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hazewinkel",
"Michiel",
""
]
]
|
cs/0410056 | Haibin Wang | Haibin Wang, Florentin Smarandache, Yanqing Zhang, Rajshekhar
Sunderraman | Interval Neutrosophic Logics: Theory and Applications | 18 pages, 4 figures | null | null | null | cs.LO | null | In this paper, we present the interval neutrosophic logics which generalizes
the fuzzy logic, paraconsistent logic, intuitionistic fuzzy logic and many
other non-classical and non-standard logics. We will give the formal definition
of interval neutrosophic propositional calculus and interval neutrosophic
predicate calculus. Then we give one application of interval neutrosophic
logics to do approximate reasoning.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 2004 20:24:28 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Nov 2004 20:18:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Zhang",
"Yanqing",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
]
|
cs/0410057 | M. V. Panduranga Rao | M. V. Panduranga Rao | Generalized Counters and Reversal Complexity | 9 pages, no figures; Layout and content changed to some extent;
Conference version | pp.318-326, Proceedings of TAMC 2006, Beijing, China, Springer
LNCS, 3959 | null | null | cs.CC | null | We generalize the definition of a counter and counter reversal complexity and
investigate the power of generalized deterministic counter automata in terms of
language recognition.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 19:36:07 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jun 2006 19:37:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rao",
"M. V. Panduranga",
""
]
]
|
cs/0410058 | Vincenzo Pallotta | Vincenzo Pallotta, Afzal Ballim | Robust Dialogue Understanding in HERALD | 6 pages | Proceedings of RANLP 2001 - EuroConference on Recent Advances in
Natural Language Processing, September 5-7, 2001, Tzigov-Chark, Bulgaria | null | null | cs.CL cs.AI cs.HC cs.MA cs.SE | null | We tackle the problem of robust dialogue processing from the perspective of
language engineering. We propose an agent-oriented architecture that allows us
a flexible way of composing robust processors. Our approach is based on
Shoham's Agent Oriented Programming (AOP) paradigm. We will show how the AOP
agent model can be enriched with special features and components that allow us
to deal with classical problems of dialogue understanding.
| [
{
"version": "v1",
"created": "Fri, 22 Oct 2004 23:41:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pallotta",
"Vincenzo",
""
],
[
"Ballim",
"Afzal",
""
]
]
|
cs/0410059 | Vincenzo Pallotta | Afzal Ballim, Nastaran Fatemi, Hatem Ghorbel, Vincenzo Pallotta | A knowledge-based approach to semi-automatic annotation of multimedia
documents via user adaptation | 4 pages | First EAGLES/ISLE Workshop on Meta-Descriptions and Annotation
Schemas for Multimodal/Multimedia Language Resources (LREC 2000
Pre-Conference Workshop), 29-30 May 2000, Athens, Greece | null | null | cs.DL cs.CL cs.IR | null | Current approaches to the annotation process focus on annotation schemas,
languages for annotation, or are very application driven. In this paper it is
proposed that a more flexible architecture for annotation requires a knowledge
component to allow for flexible search and navigation of the annotated
material. In particular, it is claimed that a general approach must take into
account the needs, competencies, and goals of the producers, annotators, and
consumers of the annotated material. We propose that a user-model based
approach is, therefore, necessary.
| [
{
"version": "v1",
"created": "Sat, 23 Oct 2004 00:06:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Fatemi",
"Nastaran",
""
],
[
"Ghorbel",
"Hatem",
""
],
[
"Pallotta",
"Vincenzo",
""
]
]
|
cs/0410060 | Vincenzo Pallotta | Afzal Ballim, Vincenzo Pallotta | Semantic filtering by inference on domain knowledge in spoken dialogue
systems | 6 pages | Proceedings of the LREC 2000 Workshop "From spoken dialogue to
full natural interactive dialogue. Theory, empirical analysis and
evaluation", May 29th, 2000 Athen, Greece | null | null | cs.CL cs.AI cs.HC cs.IR | null | General natural dialogue processing requires large amounts of domain
knowledge as well as linguistic knowledge in order to ensure acceptable
coverage and understanding. There are several ways of integrating lexical
resources (e.g. dictionaries, thesauri) and knowledge bases or ontologies at
different levels of dialogue processing. We concentrate in this paper on how to
exploit domain knowledge for filtering interpretation hypotheses generated by a
robust semantic parser. We use domain knowledge to semantically constrain the
hypothesis space. Moreover, adding an inference mechanism allows us to complete
the interpretation when information is not explicitly available. Further, we
discuss briefly how this can be generalized towards a predictive natural
interactive system.
| [
{
"version": "v1",
"created": "Sat, 23 Oct 2004 00:20:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Pallotta",
"Vincenzo",
""
]
]
|
cs/0410061 | Vincenzo Pallotta | Vincenzo Pallotta, Hatem Ghorbel, Patrick Ruch, Giovanni Coray | An argumentative annotation schema for meeting discussions | 4 pages | Procedings of the LREC 2004 international conference, 26-28 May
2004, Lisbon, Portugal. Pages 1003-1006 | null | null | cs.CL cs.DL cs.IR | null | In this article, we are interested in the annotation of transcriptions of
human-human dialogue taken from meeting records. We first propose a meeting
content model where conversational acts are interpreted with respect to their
argumentative force and their role in building the argumentative structure of
the meeting discussion. Argumentation in dialogue describes the way
participants take part in the discussion and argue their standpoints. Then, we
propose an annotation scheme based on such an argumentative dialogue model as
well as the evaluation of its adequacy. The obtained higher-level semantic
annotations are exploited in the conceptual indexing of the information
contained in meeting discussions.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 01:38:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pallotta",
"Vincenzo",
""
],
[
"Ghorbel",
"Hatem",
""
],
[
"Ruch",
"Patrick",
""
],
[
"Coray",
"Giovanni",
""
]
]
|
cs/0410062 | Vincenzo Pallotta | Lonneke van der Plas, Vincenzo Pallotta, Martin Rajman, Hatem Ghorbel | Automatic Keyword Extraction from Spoken Text. A Comparison of two
Lexical Resources: the EDR and WordNet | 4 pages | Procedings of the LREC 2004 international conference, 26-28 May
2004, Lisbon, Portugal. Pages 2205-2208 | null | null | cs.CL cs.DL cs.IR | null | Lexical resources such as WordNet and the EDR electronic dictionary have been
used in several NLP tasks. Probably, partly due to the fact that the EDR is not
freely available, WordNet has been used far more often than the EDR. We have
used both resources on the same task in order to make a comparison possible.
The task is automatic assignment of keywords to multi-party dialogue episodes
(i.e. thematically coherent stretches of spoken text). We show that the use of
lexical resources in such a task results in slightly higher performances than
the use of a purely statistically based method.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 01:50:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van der Plas",
"Lonneke",
""
],
[
"Pallotta",
"Vincenzo",
""
],
[
"Rajman",
"Martin",
""
],
[
"Ghorbel",
"Hatem",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.