id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0410063 | Vincenzo Pallotta | Sebastian Moeller, Jan Krebber, Alexander Raake, Paula Smeele, Martin
Rajman, Mirek Melichar, Vincenzo Pallotta, Gianna Tsakou, Basilis Kladis,
Anestis Vovos, Jettie Hoonhout, Dietmar Schuchardt, Nikos Fakotakis, Todor
Ganchev, Ilyas Potamitis | INSPIRE: Evaluation of a Smart-Home System for Infotainment Management
and Device Control | 4 pages | Procedings of the LREC 2004 international conference, 26-28 May
2004, Lisbon, Portugal. Pages 1603-1606 | null | null | cs.HC cs.CL | null | This paper gives an overview of the assessment and evaluation methods which
have been used to determine the quality of the INSPIRE smart home system. The
system allows different home appliances to be controlled via speech, and
consists of speech and speaker recognition, speech understanding, dialogue
management, and speech output components. The performance of these components
is first assessed individually, and then the entire system is evaluated in an
interaction experiment with test users. Initial results of the assessment and
evaluation are given, in particular with respect to the transmission channel
impact on speech and speaker recognition, and the assessment of speech output
for different system metaphors.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 02:17:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moeller",
"Sebastian",
""
],
[
"Krebber",
"Jan",
""
],
[
"Raake",
"Alexander",
""
],
[
"Smeele",
"Paula",
""
],
[
"Rajman",
"Martin",
""
],
[
"Melichar",
"Mirek",
""
],
[
"Pallotta",
"Vincenzo",
""
],
[
"Tsakou",
"Gianna",
""
],
[
"Kladis",
"Basilis",
""
],
[
"Vovos",
"Anestis",
""
],
[
"Hoonhout",
"Jettie",
""
],
[
"Schuchardt",
"Dietmar",
""
],
[
"Fakotakis",
"Nikos",
""
],
[
"Ganchev",
"Todor",
""
],
[
"Potamitis",
"Ilyas",
""
]
]
|
cs/0410064 | Joze Balic | J. Balic | Intelligent Computer Numerical Control unit for machine tools | 7 pages, 4 figures, 17 references | Neural-Network-Based Numerical Control for Milling Machine,
Journal of Intelligent and Robotic System, Volume 40, Issue 4, Aug 2004;
Pages: 343-358 (extended version) | null | null | cs.CE | null | The paper describes a new CNC control unit for machining centres with
learning ability and automatic intelligent generating of NC programs on the
bases of a neural network, which is built-in into a CNC unit as special device.
The device performs intelligent and completely automatically the NC part
programs only on the bases of 2D, 2,5D or 3D computer model of prismatic part.
Intervention of the operator is not needed. The neural network for milling,
drilling, reaming, threading and operations alike has learned to generate NC
programs in the learning module, which is a part of intelligent CAD/CAM system.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 15:55:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Balic",
"J.",
""
]
]
|
cs/0410066 | Xiaoqin Ma | Xiaoqin Ma and Gene Cooperman | Fast Query Processing by Distributing an Index over CPU Caches | New version published at IEEE Cluster Computing 2005 | null | null | null | cs.DC cs.PF | null | Data intensive applications on clusters often require requests quickly be
sent to the node managing the desired data. In many applications, one must look
through a sorted tree structure to determine the responsible node for accessing
or storing the data.
Examples include object tracking in sensor networks, packet routing over the
internet, request processing in publish-subscribe middleware, and query
processing in database systems. When the tree structure is larger than the CPU
cache, the standard implementation potentially incurs many cache misses for
each lookup; one cache miss at each successive level of the tree. As the
CPU-RAM gap grows, this performance degradation will only become worse in the
future.
We propose a solution that takes advantage of the growing speed of local area
networks for clusters. We split the sorted tree structure among the nodes of
the cluster. We assume that the structure will fit inside the aggregation of
the CPU caches of the entire cluster. We then send a word over the network (as
part of a larger packet containing other words) in order to examine the tree
structure in another node's CPU cache. We show that this is often faster than
the standard solution, which locally incurs multiple cache misses while
accessing each successive level of the tree.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 2004 22:23:17 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Oct 2005 15:42:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ma",
"Xiaoqin",
""
],
[
"Cooperman",
"Gene",
""
]
]
|
cs/0410067 | Richard Troy III | Richard M. Troy III | Computational Unification: a Vision for Connecting Researchers | Three page white-paper which was written for the December 2002 AGU
meeting in San Francisco, CA. Also note that the author is Chief Scientist of
Science Tools and developed a working system capable of implementing the
ideas expressed in this abstract in 1997 | null | null | null | cs.DC cs.CY | null | The extent to which the benefits of science can be fully realized depends
critically upon the quality of the connection between researchers themselves
and between researchers and members of the public. We believe that it is now
possible to improve these connections on a community-wide and even world-wide
basis through the use of an appropriate information management system. In this
paper we explore the concepts and challenges, and propose an architecture for
the implementation of such a system.
"One of the greatest visions for science is a computational unification in
which every researcher can interact with all other researchers through use of
their own research system."
"These features not only enable research collaboration on a scale never
previously envisaged, they also enable sharing and dissemination of scientific
knowledge to the public at large with a sophistication unparalleled in
history."
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 18:21:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Troy",
"Richard M.",
"III"
]
]
|
cs/0410068 | Zhuowei Li | Zhuowei Li and Amitabha Das | Analyzing and Improving Performance of a Class of Anomaly-based
Intrusion Detectors | Submit to journal for publication | null | null | cais-tr-2004-001 | cs.CR cs.AI | null | Anomaly-based intrusion detection (AID) techniques are useful for detecting
novel intrusions into computing resources. One of the most successful AID
detectors proposed to date is stide, which is based on analysis of system call
sequences. In this paper, we present a detailed formal framework to analyze,
understand and improve the performance of stide and similar AID techniques.
Several important properties of stide-like detectors are established through
formal proofs, and validated by carefully conducted experiments using test
datasets. Finally, the framework is utilized to design two applications to
improve the cost and performance of stide-like detectors which are based on
sequence analysis. The first application reduces the cost of developing AID
detectors by identifying the critical sections in the training dataset, and the
second application identifies the intrusion context in the intrusive dataset,
that helps to fine-tune the detectors. Such fine-tuning in turn helps to
improve detection rate and reduce false alarm rate, thereby increasing the
effectiveness and efficiency of the intrusion detectors.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 02:57:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Zhuowei",
""
],
[
"Das",
"Amitabha",
""
]
]
|
cs/0410069 | Thomas Petermann | Jacomo Corbo and Thomas Petermann | Selfish peering and routing in the Internet | Contribution to the Proceedings of the Complex Systems Summer School
2004, organized by the Santa Fe Institute (6 pages comprising 4 figures) | null | null | null | cs.GT cond-mat.stat-mech cs.NI | null | The Internet is a loose amalgamation of independent service providers acting
in their own self-interest. We examine the implications of this economic
reality on peering relationships. Specifically, we consider how the incentives
of the providers might determine where they choose to interconnect with each
other. We consider a game where two selfish network providers must establish
peering points between their respective network graphs, given knowledge of
traffic conditions and a nearest-exit routing policy for out-going traffic, as
well as costs based on congestion and peering connectivity. We focus on the
pairwise stability equilibrium concept and use a stochastic procedure to solve
for the stochastically pairwise stable configurations. Stochastically stable
networks are selected for their robustness to deviations in strategy and are
therefore posited as the more likely networks to emerge in a dynamic setting.
We note a paucity of stochastically stable peering configurations under
asymmetric conditions, particularly to unequal interdomain traffic flow, with
adverse effects on system-wide efficiency. Under bilateral flow conditions, we
find that as the cost associated with the establishment of peering links
approaches zero, the variance in the number of peering links of stochastically
pairwise stable equilibria increases dramatically.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 10:14:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Corbo",
"Jacomo",
""
],
[
"Petermann",
"Thomas",
""
]
]
|
cs/0410070 | Giovanni Gasparri | Giovanni Gasparri | Using image partitions in 4th Dimension | 4 pages, 3 figures | null | null | null | cs.DB | null | I have plotted an image by using mathematical functions in the Database "4th
Dimension". I'm going to show an alternative method to: detect which sector has
been clicked; highlight it and combine it with other sectors already
highlighted; store the graph information in an efficient way; load and splat
image layers to reconstruct the stored graph.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 17:00:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gasparri",
"Giovanni",
""
]
]
|
cs/0410071 | Patrick C. McGuire | Patrick C. McGuire, Jens Ormo, Enrique Diaz-Martinez, Jose Antonio
Rodriguez-Manfredi, Javier Gomez-Elvira, Helge Ritter, Markus Oesker, Joerg
Ontrup, (Centro de Astrobiologia, Madrid; University of Bielefeld) | The Cyborg Astrobiologist: First Field Experience | 29 pages, 10 figures (in press) | Int.J.Astrobiol. 3 (2004) 189-207 | 10.1017/S147355040500220X | null | cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO cs.SE q-bio.NC | null | We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist and
field-astrobiologist. The Cyborg Astrobiologist platform has thus far been used
for testing and development of these algorithms and systems: robotic
acquisition of quasi-mosaics of images, real-time image segmentation, and
real-time determination of interesting points in the image mosaics. The
hardware and software systems function reliably, and the computer-vision
algorithms are adequate for the first field tests. In addition to the
proof-of-concept aspect of these field tests, the main result of these field
tests is the enumeration of those issues that we can improve in the future,
including: first, detection and accounting for shadows caused by 3D jagged
edges in the outcrop; second, reincorporation of more sophisticated
texture-analysis algorithms into the system; third, creation of hardware and
software capabilities to control the camera's zoom lens in an intelligent
manner; and fourth, development of algorithms for interpretation of complex
geological scenery. Nonetheless, despite these technical inadequacies, this
Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer
and its computer-vision algorithms, has demonstrated its ability of finding
genuinely interesting points in real-time in the geological scenery, and then
gathering more information about these interest points in an automated manner.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 09:14:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Ritter",
"Helge",
""
],
[
"Oesker",
"Markus",
""
],
[
"Ontrup",
"Joerg",
""
]
]
|
cs/0410072 | Igor Potapov | Alexei Lisitsa, Igor Potapov | Temporal logic with predicate abstraction | 14 pages, 4 figures | null | null | null | cs.LO cs.CL | null | A predicate linear temporal logic LTL_{\lambda,=} without quantifiers but
with predicate abstraction mechanism and equality is considered. The models of
LTL_{\lambda,=} can be naturally seen as the systems of pebbles (flexible
constants) moving over the elements of some (possibly infinite) domain. This
allows to use LTL_{\lambda,=} for the specification of dynamic systems using
some resources, such as processes using memory locations, mobile agents
occupying some sites, etc. On the other hand we show that LTL_{\lambda,=} is
not recursively axiomatizable and, therefore, fully automated verification of
LTL_{\lambda,=} specifications is not, in general, possible.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 17:21:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lisitsa",
"Alexei",
""
],
[
"Potapov",
"Igor",
""
]
]
|
cs/0410073 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | On Spatial Conjunction as Second-Order Logic | 16 pages | null | null | MIT CSAIL 970 | cs.LO cs.PL cs.SE | null | Spatial conjunction is a powerful construct for reasoning about dynamically
allocated data structures, as well as concurrent, distributed and mobile
computation. While researchers have identified many uses of spatial
conjunction, its precise expressive power compared to traditional logical
constructs was not previously known. In this paper we establish the expressive
power of spatial conjunction. We construct an embedding from first-order logic
with spatial conjunction into second-order logic, and more surprisingly, an
embedding from full second order logic into first-order logic with spatial
conjunction. These embeddings show that the satisfiability of formulas in
first-order logic with spatial conjunction is equivalent to the satisfiability
of formulas in second-order logic. These results explain the great expressive
power of spatial conjunction and can be used to show that adding unrestricted
spatial conjunction to a decidable logic leads to an undecidable logic. As one
example, we show that adding unrestricted spatial conjunction to two-variable
logic leads to undecidability. On the side of decidability, the embedding into
second-order logic immediately implies the decidability of first-order logic
with a form of spatial conjunction over trees. The embedding into spatial
conjunction also has useful consequences: because a restricted form of spatial
conjunction in two-variable logic preserves decidability, we obtain that a
correspondingly restricted form of second-order quantification in two-variable
logic is decidable. The resulting language generalizes the first-order theory
of boolean algebra over sets and is useful in reasoning about the contents of
data structures in object-oriented languages.
| [
{
"version": "v1",
"created": "Thu, 28 Oct 2004 15:00:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
]
|
cs/0410075 | Serban E. Vlad | Serban E. Vlad | Some first thoughts on the stability of the asynchronous systems | 12 pages, conference | The 12-th Conference on Applied and Industrial Mathematics CAIM
2004, University of Pitesti, October 15-17, 2004 | null | null | cs.GL | null | The (non-initialized, non-deterministic) asynchronous systems (in the
input-output sense) are multi-valued functions from m-dimensional signals to
sets of n-dimensional signals, the concept being inspired by the modeling of
the asynchronous circuits. Our purpose is to state the problem of the their
stability.
| [
{
"version": "v1",
"created": "Fri, 29 Oct 2004 12:08:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
]
|
cs/0411001 | Worytkiewicz Krzysztof | Krzysztof Worytkiewicz | Synchronization from a Categorical Perspective | null | null | null | null | cs.PL cs.DM | null | We introduce a notion of synchronization for higher-dimensional automata,
based on coskeletons of cubical sets. Categorification transports this notion
to the setting of categorical transition systems. We apply the results to study
the semantics of an imperative programming language with message-passing.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 2004 16:00:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Worytkiewicz",
"Krzysztof",
""
]
]
|
cs/0411002 | Alex Vinokur | Alex Vinokur | Fibonacci-Like Polynomials Produced by m-ary Huffman Codes for
Absolutely Ordered Sequences | 10 pages, 2 tables | null | null | null | cs.DM math.NT | null | Fibonacci-like polynomials produced by m-ary Huffman codes for absolutely
ordered sequences have been described.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 2004 17:03:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
]
|
cs/0411004 | Gianluca Argentini | Gianluca Argentini | Computational Aspects of a Numerical Model for Combustion Flow | 9 pages, 4 figures; Talk at Workshop 2004 on Science and Applications
of Advanced Computing Paradigms, Centre of Excellence MIUR (prof. Gianfranco
Bilardi), Universita' di Padova, Department of Information Engineering,
October 28-29, 2004 | null | null | null | cs.NA physics.comp-ph | null | A computational method for numeric resolution of a PDEs system, based on a
Finite Differences schema integrated by interpolations of partial results, and
an estimate of the error of its solution respect to the normal FD solution.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2004 11:37:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
|
cs/0411005 | Manoj Kumar | Sunder Lal and Manoj Kumar | A Directed Threshold - Signature Scheme | 10 Pages, No figures | null | null | null | cs.CR | null | Directed signature is the solution of such problems when the signed message
contains information sensitive to the signature receiver. Generally, in many
application of directed signature, the signer is generally a single person. But
when the message is on behalf of an organization, a valid sensitive message may
require the approval of several people. Threshold signature schemes are used to
solve these problems. This paper presents a threshold directed signature
scheme.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2004 13:42:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
|
cs/0411007 | Benoit Masson | Julien Cervelle (IGM), Enrico Formenti (I3S), Benoit Masson (I3S) | Basic properties for sand automata | submitted to STACS 2005 | null | null | null | cs.CC | null | We prove several results about the relations between injectivity and
surjectivity for sand automata. Moreover, we begin the exploration of the
dynamical behavior of sand automata proving that the property of nilpotency is
undecidable. We believe that the proof technique used for this last result
might reveal useful for many other results in this context.
| [
{
"version": "v1",
"created": "Thu, 4 Nov 2004 12:33:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cervelle",
"Julien",
"",
"IGM"
],
[
"Formenti",
"Enrico",
"",
"I3S"
],
[
"Masson",
"Benoit",
"",
"I3S"
]
]
|
cs/0411009 | Serban Vlad E. | Serban E. Vlad | The equations of the ideal latches | 16 pages, 18 figures, conference | The 12-th Conference on Applied and Industrial Mathematics CAIM
2004, University of Pitesti, October 15-17, 2004 | null | null | cs.GL | null | The latches are simple circuits with feedback from the digital electrical
engineering. We have included in our work the C element of Muller, the RS
latch, the clocked RS latch, the D latch and also circuits containing two
interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the
JK flip-flop, the T flip-flop. The purpose of this study is to model with
equations the previous circuits, considered to be ideal, i.e. non-inertial. The
technique of analysis is the pseudoboolean differential calculus.
| [
{
"version": "v1",
"created": "Fri, 5 Nov 2004 12:38:05 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2004 07:17:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
]
|
cs/0411010 | Ricardo Corin | Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter Hartel | A Trace Logic for Local Security Properties | New version | null | null | null | cs.CR | null | We propose a new simple \emph{trace} logic that can be used to specify
\emph{local security properties}, i.e. security properties that refer to a
single participant of the protocol specification. Our technique allows a
protocol designer to provide a formal specification of the desired security
properties, and integrate it naturally into the design process of cryptographic
protocols. Furthermore, the logic can be used for formal verification. We
illustrate the utility of our technique by exposing new attacks on the well
studied protocol TMN.
| [
{
"version": "v1",
"created": "Fri, 5 Nov 2004 14:39:03 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Nov 2004 17:36:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Corin",
"Ricardo",
""
],
[
"Durante",
"Antonio",
""
],
[
"Etalle",
"Sandro",
""
],
[
"Hartel",
"Pieter",
""
]
]
|
cs/0411013 | Timur Friedman | Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella | Efficient Algorithms for Large-Scale Topology Discovery | 23 pages | null | null | null | cs.NI | null | There is a growing interest in discovery of internet topology at the
interface level. A new generation of highly distributed measurement systems is
currently being deployed. Unfortunately, the research community has not
examined the problem of how to perform such measurements efficiently and in a
network-friendly manner. In this paper we make two contributions toward that
end. First, we show that standard topology discovery methods (e.g., skitter)
are quite inefficient, repeatedly probing the same interfaces. This is a
concern, because when scaled up, such methods will generate so much traffic
that they will begin to resemble DDoS attacks. We measure two kinds of
redundancy in probing (intra- and inter-monitor) and show that both kinds are
important. We show that straightforward approaches to addressing these two
kinds of redundancy must take opposite tacks, and are thus fundamentally in
conflict. Our second contribution is to propose and evaluate Doubletree, an
algorithm that reduces both types of redundancy simultaneously on routers and
end systems. The key ideas are to exploit the tree-like structure of routes to
and from a single point in order to guide when to stop probing, and to probe
each path by starting near its midpoint. Our results show that Doubletree can
reduce both types of measurement load on the network dramatically, while
permitting discovery of nearly the same set of nodes and links. We then show
how to enable efficient communication between monitors through the use of Bloom
filters.
| [
{
"version": "v1",
"created": "Sun, 7 Nov 2004 21:39:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Donnet",
"Benoit",
""
],
[
"Raoult",
"Philippe",
""
],
[
"Friedman",
"Timur",
""
],
[
"Crovella",
"Mark",
""
]
]
|
cs/0411015 | Ziny Flikop | Ziny Flikop | Bounded Input Bounded Predefined Control Bounded Output | 8 pages, 6 figures | null | null | null | cs.AI | null | The paper is an attempt to generalize a methodology, which is similar to the
bounded-input bounded-output method currently widely used for the system
stability studies. The presented earlier methodology allows decomposition of
input space into bounded subspaces and defining for each subspace its bounding
surface. It also defines a corresponding predefined control, which maps any
point of a bounded input into a desired bounded output subspace. This
methodology was improved by providing a mechanism for the fast defining a
bounded surface. This paper presents enhanced bounded-input
bounded-predefined-control bounded-output approach, which provides adaptability
feature to the control and allows transferring of a controlled system along a
suboptimal trajectory.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 01:52:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Flikop",
"Ziny",
""
]
]
|
cs/0411017 | Srikant Sharma | Srikant Sharma | Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective | null | null | null | null | cs.NI | null | Wireless LANs have achieved a tremendous amount of growth in recent years.
Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN
technology can be cited as the most prominent technology today. Despite being
widely deployed, 802.11b cannot be termed as a well matured technology.
Although 802.11b is adequate for basic connectivity and packet switching, It is
evident that there is ample scope for its improvement in areas like quality of
service, fairness, performance, security, etc. In this survey report, we
identify and argue that the Medium Access Controller for 802.11b networks is
the prime area for these improvements. To enunciate our claims we highlight
some of the quality of service, fairness, and performance issues related to
802.11b MAC. We also describe and analyze some of the current research aimed at
addressing these issues. We then propose a novel scheme called the Intelligent
Collision Avoidance, seeking to enhance the MAC to address some of the
performance issues in 802.11b and similar networks.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 19:32:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sharma",
"Srikant",
""
]
]
|
cs/0411018 | Vedran Kordic | Pedro U. Lima & Luis M. M. Custodio | Artificial Intelligence and Systems Theory: Applied to Cooperative
Robots | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 September 2004, pp.141-148 | null | null | cs.RO cs.AI | null | This paper describes an approach to the design of a population of cooperative
robots based on concepts borrowed from Systems Theory and Artificial
Intelligence. The research has been developed under the SocRob project, carried
out by the Intelligent Systems Laboratory at the Institute for Systems and
Robotics - Instituto Superior Tecnico (ISR/IST) in Lisbon. The acronym of the
project stands both for "Society of Robots" and "Soccer Robots", the case study
where we are testing our population of robots. Designing soccer robots is a
very challenging problem, where the robots must act not only to shoot a ball
towards the goal, but also to detect and avoid static (walls, stopped robots)
and dynamic (moving robots) obstacles. Furthermore, they must cooperate to
defeat an opposing team. Our past and current research in soccer robotics
includes cooperative sensor fusion for world modeling, object recognition and
tracking, robot navigation, multi-robot distributed task planning and
coordination, including cooperative reinforcement learning in cooperative and
adversarial environments, and behavior-based architectures for real time task
execution of cooperating robot teams.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:41:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lima",
"Pedro U.",
""
],
[
"Custodio",
"Luis M. M.",
""
]
]
|
cs/0411020 | Vedran Kordic | A. Albagul and Wahyudi | Dynamic Modelling and Adaptive Traction Control for Mobile Robots | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 3, September 2004, pp.149-154 | null | null | cs.RO | null | Mobile robots have received a great deal of research in recent years. A
significant amount of research has been published in many aspects related to
mobile robots. Most of the research is devoted to design and develop some
control techniques for robot motion and path planning. A large number of
researchers have used kinematic models to develop motion control strategy for
mobile robots. Their argument and assumption that these models are valid if the
robot has low speed, low acceleration and light load. However, dynamic
modelling of mobile robots is very important as they are designed to travel at
higher speed and perform heavy duty work. This paper presents and discusses a
new approach to develop a dynamic model and control strategy for wheeled mobile
robot which I modelled as a rigid body that roles on two wheels and a castor.
The motion control strategy consists of two levels. The first level is dealing
with the dynamic of the system and denoted as Low level controller. The second
level is developed to take care of path planning and trajectory generation.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:44:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Albagul",
"A.",
""
],
[
"Wahyudi",
"",
""
]
]
|
cs/0411021 | Vedran Kordic | Luo Ronghua & Hong Bingrong | Coevolution Based Adaptive Monte Carlo Localization (CEAMCL) | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 3, September 2004, pp. 183-190 | null | null | cs.RO | null | An adaptive Monte Carlo localization algorithm based on coevolution mechanism
of ecological species is proposed. Samples are clustered into species, each of
which represents a hypothesis of the robots pose. Since the coevolution between
the species ensures that the multiple distinct hypotheses can be tracked
stably, the problem of premature convergence when using MCL in highly symmetric
environments can be solved. And the sample size can be adjusted adaptively over
time according to the uncertainty of the robots pose by using the population
growth model. In addition, by using the crossover and mutation operators in
evolutionary computation, intra-species evolution can drive the samples move
towards the regions where the desired posterior density is large. So a small
size of samples can represent the desired density well enough to make precise
localization. The new algorithm is termed coevolution based adaptive Monte
Carlo localization (CEAMCL). Experiments have been carried out to prove the
efficiency of the new localization algorithm.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:45:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ronghua",
"Luo",
""
],
[
"Bingrong",
"Hong",
""
]
]
|
cs/0411022 | Vedran Kordic | Richard Szabo | Topological Navigation of Simulated Robots using Occupancy Grid | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.201-206 | null | null | cs.RO cs.AI | null | Formerly I presented a metric navigation method in the Webots mobile robot
simulator. The navigating Khepera-like robot builds an occupancy grid of the
environment and explores the square-shaped room around with a value iteration
algorithm. Now I created a topological navigation procedure based on the
occupancy grid process. The extension by a skeletonization algorithm results a
graph of important places and the connecting routes among them. I also show the
significant time profit gained during the process.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:22:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szabo",
"Richard",
""
]
]
|
cs/0411023 | Vedran Kordic | Changda Wang, Xianyi Chen, Xibin Zhao & Shiguang Ju | Design and Implementation of a General Decision-making Model in RoboCup
Simulation | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.207-112 | null | null | cs.RO | null | The study of the collaboration, coordination and negotiation among different
agents in a multi-agent system (MAS) has always been the most challenging yet
popular in the research of distributed artificial intelligence. In this paper,
we will suggest for RoboCup simulation, a typical MAS, a general
decision-making model, rather than define a different algorithm for each tactic
(e.g. ball handling, pass, shoot and interception, etc.) in soccer games as
most RoboCup simulation teams did. The general decision-making model is based
on two critical factors in soccer games: the vertical distance to the goal line
and the visual angle for the goalpost. We have used these two parameters to
formalize the defensive and offensive decisions in RoboCup simulation and the
results mentioned above had been applied in NOVAURO, original name is UJDB, a
RoboCup simulation team of Jiangsu University, whose decision-making model,
compared with that of Tsinghua University, the world champion team in 2001, is
a universal model and easier to be implemented.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:24:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Changda",
""
],
[
"Chen",
"Xianyi",
""
],
[
"Zhao",
"Xibin",
""
],
[
"Ju",
"Shiguang",
""
]
]
|
cs/0411024 | Vedran Kordic | Alex Ellery | Space Robotics Part 2: Space-based Manipulators | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.213-216 | null | null | cs.RO | null | In this second of three short papers, I introduce some of the basic concepts
of space robotics with an emphasis on some specific challenging areas of
research that are peculiar to the application of robotics to space
infrastructure development. The style of these short papers is pedagogical and
the concepts in this paper are developed from fundamental manipulator robotics.
This second paper considers the application of space manipulators to on-orbit
servicing (OOS), an application which has considerable commercial application.
I provide some background to the notion of robotic on-orbit servicing and
explore how manipulator control algorithms may be modified to accommodate space
manipulators which operate in the micro-gravity of space.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:28:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ellery",
"Alex",
""
]
]
|
cs/0411025 | Vedran Kordic | Yoseph Bar-Cohen | Bionic Humans Using EAP as Artificial Muscles Reality and Challenges | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.217-222 | null | null | cs.RO cs.AI | null | For many years, the idea of a human with bionic muscles immediately conjures
up science fiction images of a TV series superhuman character that was
implanted with bionic muscles and portrayed with strength and speed far
superior to any normal human. As fantastic as this idea may seem, recent
developments in electroactive polymers (EAP) may one day make such bionics
possible. Polymers that exhibit large displacement in response to stimulation
that is other than electrical signal were known for many years. Initially, EAP
received relatively little attention due to their limited actuation capability.
However, in the recent years, the view of the EAP materials has changed due to
the introduction of effective new materials that significantly surpassed the
capability of the widely used piezoelectric polymer, PVDF. As this technology
continues to evolve, novel mechanisms that are biologically inspired are
expected to emerge. EAP materials can potentially provide actuation with
lifelike response and more flexible configurations. While further improvements
in performance and robustness are still needed, there already have been several
reported successes. In recognition of the need for cooperation in this
multidisciplinary field, the author initiated and organized a series of
international forums that are leading to a growing number of research and
development projects and to great advances in the field. In 1999, he challenged
the worldwide science and engineering community of EAP experts to develop a
robotic arm that is actuated by artificial muscles to win a wrestling match
against a human opponent. In this paper, the field of EAP as artificial muscles
will be reviewed covering the state of the art, the challenges and the vision
for the progress in future years.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:32:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bar-Cohen",
"Yoseph",
""
]
]
|
cs/0411026 | Boris Tylevich | Boris Mark Tylevich (Moscow Institute of Physics and Technology,
Moscow, Russia) | A Search Relevancy Tuning Method Using Expert Results Content Evaluation | 10 pages, 2 figures | null | null | null | cs.IR | null | The article presents an online relevancy tuning method using explicit user
feedback. The author developed and tested a method of words' weights
modification based on search result evaluation by user. User decides whether
the result is useful or not after inspecting the full result content. The
experiment proved that the constantly accumulated words weights base leads to
better search quality in a specified data domain. The author also suggested
future improvements of the method.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:49:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tylevich",
"Boris Mark",
"",
"Moscow Institute of Physics and Technology,\n Moscow, Russia"
]
]
|
cs/0411027 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN) | Extremal Properties of Three Dimensional Sensor Networks with
Applications | null | IEEE Transactions on Mobile Computing Vol 3 (2004) pages 246--257 | null | null | cs.DS cs.DC cs.DM | null | In this paper, we analyze various critical transmitting/sensing ranges for
connectivity and coverage in three-dimensional sensor networks. As in other
large-scale complex systems, many global parameters of sensor networks undergo
phase transitions: For a given property of the network, there is a critical
threshold, corresponding to the minimum amount of the communication effort or
power expenditure by individual nodes, above (resp. below) which the property
exists with high (resp. a low) probability. For sensor networks, properties of
interest include simple and multiple degrees of connectivity/coverage. First,
we investigate the network topology according to the region of deployment, the
number of deployed sensors and their transmitting/sensing ranges. More
specifically, we consider the following problems: Assume that $n$ nodes, each
capable of sensing events within a radius of $r$, are randomly and uniformly
distributed in a 3-dimensional region $\mathcal{R}$ of volume $V$, how large
must the sensing range be to ensure a given degree of coverage of the region to
monitor? For a given transmission range, what is the minimum (resp. maximum)
degree of the network? What is then the typical hop-diameter of the underlying
network? Next, we show how these results affect algorithmic aspects of the
network by designing specific distributed protocols for sensor networks.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 09:10:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
]
|
cs/0411028 | Ignatios Souvatzis | Ignatios Souvatzis | A machine-independent port of the SR language run-time system to the
NetBSD operating system | presented at 3rd European BSD Conference, Karlsruhe, Germany, 2004
Oct. 29-31; 4 pages | Juergen Egeling (Ed.): Proceedings of the 3rd European BSD
Conference, Karlsruhe, Germany 2004, p.181 | null | null | cs.DC cs.PL | null | SR (synchronizing resources) is a PASCAL - style language enhanced with
constructs for concurrent programming developed at the University of Arizona in
the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of
Multithreaded, Parallel, and Distributed Programming) is its successor,
providing the same language primitives with a different syntax. The run-time
system (in theory, identical) of both languages provides the illusion of a
multiprocessor machine on a single single- or multi- CPU Unix-like system or a
(local area) network of Unix-like machines. Chair V of the Computer Science
Department of the University of Bonn is operating a laboratory for a practical
course in parallel programming consisting of computing nodes running
NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and
MPD for this, too. As the original language distributions are only targeted at
a few commercial Unix systems, some porting effort is needed, outlined in the
SR porting guide. The integrated POSIX threads support of NetBSD-2.0 should
allow us to use library primitives provided for NetBSD's phtread system to
implement the primitives needed by the SR run-time system, thus implementing 13
target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC,
Sparc, 32-bit Intel and 64 bit AMD CPUs.
This paper describes work in progress.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 12:39:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Souvatzis",
"Ignatios",
""
]
]
|
cs/0411029 | Virgile Mogbil | Christophe Fouquere and Virgile Mogbil | Modules and Logic Programming | null | null | null | null | cs.LO | null | We study conditions for a concurrent construction of proof-nets in the
framework developed by Andreoli in recent papers. We define specific
correctness criteria for that purpose. We first study closed modules (i.e.
validity of the execution of a logic program), then extend the criterion to
open modules (i.e. validity during the execution) distinguishing criteria for
acyclicity and connectability in order to allow incremental verification.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 14:01:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fouquere",
"Christophe",
""
],
[
"Mogbil",
"Virgile",
""
]
]
|
cs/0411030 | Paolo D'Arco | Pina Bergamo, Paolo D'Arco, Alfredo De Santis, and Ljupco Kocarev | Security of public key cryptosystems based on Chebyshev Polynomials | Submitted for publication | null | null | null | cs.CR | null | Chebyshev polynomials have been recently proposed for designing public-key
systems. Indeed, they enjoy some nice chaotic properties, which seem to be
suitable for use in Cryptography. Moreover, they satisfy a semi-group property,
which makes possible implementing a trapdoor mechanism. In this paper we study
a public key cryptosystem based on such polynomials, which provides both
encryption and digital signature. The cryptosystem works on real numbers and is
quite efficient. Unfortunately, from our analysis it comes up that it is not
secure. We describe an attack which permits to recover the corresponding
plaintext from a given ciphertext. The same attack can be applied to produce
forgeries if the cryptosystem is used for signing messages. Then, we point out
that also other primitives, a Diffie-Hellman like key agreement scheme and an
authentication scheme, designed along the same lines of the cryptosystem, are
not secure due to the aforementioned attack. We close the paper by discussing
the issues and the possibilities of constructing public key cryptosystems on
real numbers.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 15:29:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bergamo",
"Pina",
""
],
[
"D'Arco",
"Paolo",
""
],
[
"De Santis",
"Alfredo",
""
],
[
"Kocarev",
"Ljupco",
""
]
]
|
cs/0411032 | Riccardo Pucella | Riccardo Pucella | Logic Column 10: Specifying Confidentiality | 12 pages | SIGACT News, 35(4), pp. 72-83, 2004 | null | null | cs.LO | null | This article illustrates the use of a logical specification language to
capture various forms of confidentiality properties used in the security
literature.
| [
{
"version": "v1",
"created": "Thu, 11 Nov 2004 19:09:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0411033 | Mircea Alexandru Popescu Moscu | Mircea Alexandru Popescu Moscu | On Invariance and Convergence in Time Complexity theory | null | null | null | null | cs.CC | null | This article introduces three invariance principles under which P is
different from NP. In the second part a theorem of convergence is proven. This
theorem states that for any language L there exists an infinite sequence of
languages from O(n) that converges to L.
| [
{
"version": "v1",
"created": "Thu, 11 Nov 2004 21:32:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moscu",
"Mircea Alexandru Popescu",
""
]
]
|
cs/0411035 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A FP-Tree Based Approach for Mining All Strongly Correlated Pairs
without Candidate Generation | null | null | null | TR-04-06 | cs.DB cs.AI | null | Given a user-specified minimum correlation threshold and a transaction
database, the problem of mining all-strong correlated pairs is to find all item
pairs with Pearson's correlation coefficients above the threshold . Despite the
use of upper bound based pruning technique in the Taper algorithm [1], when the
number of items and transactions are very large, candidate pair generation and
test is still costly. To avoid the costly test of a large number of candidate
pairs, in this paper, we propose an efficient algorithm, called Tcp, based on
the well-known FP-tree data structure, for mining the complete set of
all-strong correlated item pairs. Our experimental results on both synthetic
and real world datasets show that, Tcp's performance is significantly better
than that of the previously developed Taper algorithm over practical ranges of
correlation threshold specifications.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 12:02:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0411037 | Tetsushi Matsui | Tetsushi Matsui | A Note on Bulk Quantum Turing Machine | 8 pages | null | null | null | cs.CC | null | Recently, among experiments for realization of quantum computers, NMR quantum
computers have achieved the most impressive succession. There is a model of the
NMR quantum computation,namely Atsumi and Nishino's bulk quantum Turing
Machine. It assumes, however, an unnatural assumption with quantum mechanics.
We, then, define a more natural and quantum mechanically realizable modified
bulk quantum Turing Machine, and show its computational ability by comparing
complexity classes with quantum Turing Machine's counter part.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 18:56:15 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Nov 2004 01:01:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Matsui",
"Tetsushi",
""
]
]
|
cs/0411038 | Shajee Mohan B. S. | B.S. Shajeemohan | Impact of IT on Higher education Through Continuing Education | null | null | null | null | cs.CY | null | Information Technology is emerging to be the technology of 21st century. The
paradigm shift from industrial society to information society had already
become a reality! It is indeed high time to think about integrating IT in all
facets of education -- may it be in secondary level, or be it in reskilling the
employed ones. This paper discusses various issues in incorporating IT in
various levels of education, and the need to think about a task force to
counter the so-called slow down and recession in IT industry. The opportunities
for aspiring IT professionals were also discussed. The importance of reskilling
as a continuing education programme to make the people aware of the changing
trends in IT was also discussed.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 2004 09:45:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shajeemohan",
"B. S.",
""
]
]
|
cs/0411039 | Ioan Raicu | Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally | Using Wireless Sensor Networks to Narrow the Gap between Low-Level
Information and Context-Awareness | Published at ISCA 17th International Conference on Computers and
Their Applications, CATA 2002, April 2002, San Francisco, California, USA. 6
pages | null | null | null | cs.NI | null | Wireless sensor networks are finally becoming a reality. In this paper, we
present a scalable architecture for using wireless sensor networks in
combination with wireless Ethernet networks to provide a complete end-to-end
solution to narrow the gap between the low-level information and context
awareness. We developed and implemented a complete proximity detector in order
to give a wearable computer, such as a PDA, location context. Since location is
only one element of contextawareness, we pursued utilizing photo sensors and
temperature sensors in learning as much as possible about the environment. We
used the TinyOS RF Motes as our test bed WSN (Wireless Sensor Network), 802.11
compatible hardware as our wireless Ethernet network, and conventional PCs and
wired 802.3 networks to build the upper levels of the architecture.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:52:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Richter",
"Owen",
""
],
[
"Schwiebert",
"Loren",
""
],
[
"Zeadally",
"Sherali",
""
]
]
|
cs/0411040 | Ioan Raicu | Ioan Raicu | Efficient Even Distribution of Power Consumption in Wireless Sensor
Networks | Published at ISCA 18th International Conference on Computers and
Their Applications, CATA 2003, March 2003, Honolulu, Hawaii, USA. 4 pages | null | null | null | cs.NI | null | One of the limitations of wireless sensor nodes is their inherent limited
energy resource. Besides maximizing the lifetime of the sensor node, it is
preferable to distribute the energy dissipated throughout the wireless sensor
network in order to minimize maintenance and maximize overall system
performance. We investigate a new routing algorithm that uses diffusion in
order to achieve relatively even power dissipation throughout a wireless sensor
network by making good local decisions. We leverage from concepts of
peer-to-peer networks in which the system acts completely decentralized and all
nodes in the network are equal peers. Our algorithm utilizes the node load,
power levels, and spatial information in order to make the optimal routing
decision. According to our preliminary experimental results, our proposed
algorithm performs well according to its goals.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:55:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
]
]
|
cs/0411041 | Sabu Thampu m | Sabu .M Thampi, K. Chandra Sekaran | Content Based Image Retrieval with Mobile Agents and Steganography | 6 pages, 10 figures | null | null | null | cs.CR | null | In this paper we present an image retrieval system based on Gabor texture
features, steganography, and mobile agents.. By employing the information
hiding technique, the image attributes can be hidden in an image without
degrading the image quality. Thus the image retrieval process becomes simple.
Java based mobile agents manage the query phase of the system. Based on the
simulation results, the proposed system not only shows the efficiency in hiding
the attributes but also provides other advantages such as: (1) fast
transmission of the retrieval image to the receiver, (2) searching made easy.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 2004 08:53:15 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jun 2006 08:48:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thampi",
"Sabu . M",
""
],
[
"Sekaran",
"K. Chandra",
""
]
]
|
cs/0411042 | Ioan Raicu | Ioan Raicu | An Empirical Analysis of Internet Protocol Version 6 (IPv6) | Master Thesis, May 2002, Computer Science Department, Wayne State
University, Detroit, Michigan, USA, 146 pages | null | null | null | cs.NI cs.PF | null | Although the current Internet Protocol known as IPv4 has served its purpose
for over 20 years, its days are numbered. With IPv6 reaching a mature enough
level, there is a need to evaluate the performance benefits or drawbacks that
the new IPv6 protocol will have in comparison to the well established IPv4
protocol. Theoretically, the overhead between the two different protocols
should be directly proportional to the difference in the packet's header size,
however according to our findings, the empirical performance difference between
IPv4 and IPv6, especially when the transition mechanisms are taken into
consideration, is much larger than anticipated. We first examine the
performance of each protocol independently. We then examined two transition
mechanisms which perform the encapsulation at various points in the network:
host-to-host and router-to-router (tunneling). Our experiments were conducted
using two dual stack (IPv4/IPv6) routers using end nodes running both Windows
2000 and Solaris 8.0 in order to compare two different IPv6 implementations
side by side. Our tests were written in C++ and utilized metrics such as
latency, throughput, CPU utilization, socket creation time, socket connection
time, web server simulation, and a video client/server application for TCP/UDP
in IPv4/IPv6 under both Windows 2000 and Solaris 8.0. Our empirical evaluation
proved that IPv6 is not yet a mature enough technology and that it is still
years away from having consistent and good enough implementations, as the
performance of IPv6 in many cases proved to be significantly worse than IPv4.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:31:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
]
]
|
cs/0411043 | Ioan Raicu | Ioan Raicu, Loren Schwiebert, Scott Fowler, Sandeep K.S. Gupta | e3D: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks | Accepted for publication at IEEE ISSNIP 2004 (The International
Conference on Intelligent Sensors, Sensor Networks and Information
Processing), Melbourne, Australia, December 2004. 6 pages | null | null | null | cs.NI | null | One of the limitations of wireless sensor nodes is their inherent limited
energy resource. Besides maximizing the lifetime of the sensor node, it is
preferable to distribute the energy dissipated throughout the wireless sensor
network in order to minimize maintenance and maximize overall system
performance. Any communication protocol that involves synchronization of peer
nodes incurs some overhead for setting up the communication. We introduce a new
algorithm, e3D (energy-efficient Distributed Dynamic Diffusion routing
algorithm), and compare it to two other algorithms, namely directed, and random
clustering communication. We take into account the setup costs and analyze the
energy-efficiency and the useful lifetime of the system. In order to better
understand the characteristics of each algorithm and how well e3D really
performs, we also compare e3D with its optimum counterpart and an optimum
clustering algorithm. The benefit of introducing these ideal algorithms is to
show the upper bound on performance at the cost of an astronomical prohibitive
synchronization costs. We compare the algorithms in terms of system lifetime,
power dissipation distribution, cost of synchronization, and simplicity of the
algorithm. Our simulation results show that e3D performs comparable to its
optimal counterpart while having significantly less overhead.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:40:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Schwiebert",
"Loren",
""
],
[
"Fowler",
"Scott",
""
],
[
"Gupta",
"Sandeep K. S.",
""
]
]
|
cs/0411044 | Ioan Raicu | Ioan Raicu | Routing Algorithms for Wireless Sensor Networks | Poster at Grace Hopper Celebration of Women in Computing 2002,
GHC2002, October 2002, British Columbia, Canada | null | null | null | cs.NI | null | Our contribution in this paper is e3D, a diffusion based routing protocol
that prolongs the system lifetime, evenly distributes the power dissipation
throughout the network, and incurs minimal overhead for synchronizing
communication. We compare e3D with other algorithms in terms of system
lifetime, power dissipation distribution, cost of synchronization, and
simplicity of the algorithm.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:42:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
]
]
|
cs/0411045 | Catalin Dumitrescu | Catalin Dumitrescu, Ian Foster | Usage Policy-based CPU Sharing in VOs | null | null | null | null | cs.DC | null | Resource sharing within Grid collaborations usually implies specific sharing
mechanisms at participating sites. Challenging policy issues can arise within
virtual organizations (VOs) that integrate participants and resources spanning
multiple physical institutions. Resource owners may wish to grant to one or
more VOs the right to use certain resources subject to local policy and service
level agreements, and each VO may then wish to use those resources subject to
VO policy. Thus, we must address the question of what usage policies (UPs)
should be considered for resource sharing in VOs. As a first step in addressing
this question, we develop and evaluate different UP scenarios within a
specialized context that mimics scientific Grids within which the resources to
be shared are computers. We also present a UP architecture and define roles and
functions for scheduling resources in such grid environments while satisfying
resource owner policies.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:48:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dumitrescu",
"Catalin",
""
],
[
"Foster",
"Ian",
""
]
]
|
cs/0411046 | Jesse Bridgewater | Jesse S. A. Bridgewater, P. Oscar Boykin and Vwani P. Roychowdhury | Balanced Overlay Networks (BON): Decentralized Load Balancing via
Self-Organized Random Networks | 13 pages, 12 figures. Draft submitted to IEEE TPDS | null | null | null | cs.DC | null | We present a novel framework, called balanced overlay networks (BON), that
provides scalable, decentralized load balancing for distributed computing using
large-scale pools of heterogeneous computers. Fundamentally, BON encodes the
information about each node's available computational resources in the
structure of the links connecting the nodes in the network. This distributed
encoding is self-organized, with each node managing its in-degree and local
connectivity via random-walk sampling. Assignment of incoming jobs to nodes
with the most free resources is also accomplished by sampling the nodes via
short random walks. Extensive simulations show that the resulting highly
dynamic and self-organized graph structure can efficiently balance
computational load throughout large-scale networks. These simulations cover a
wide spectrum of cases, including significant heterogeneity in available
computing resources and high burstiness in incoming load. We provide analytical
results that prove BON's scalability for truly large-scale networks: in
particular we show that under certain ideal conditions, the network structure
converges to Erdos-Renyi (ER) random graphs; our simulation results, however,
show that the algorithm does much better, and the structures seem to approach
the ideal case of d-regular random graphs. We also make a connection between
highly-loaded BONs and the well-known ball-bin randomized load balancing
framework.
| [
{
"version": "v1",
"created": "Mon, 15 Nov 2004 20:05:00 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 09:43:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bridgewater",
"Jesse S. A.",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
]
|
cs/0411050 | Darran Nathan | Darran Nathan, Ralf Clemens | Utilizing Reconfigurable Hardware Processors via Grid Services | 3 pages, 8 figures | null | null | null | cs.DC cs.AR | null | Computational grids typically consist of nodes utilizing ordinary processors
such as the Intel Pentium. Field Programmable Gate Arrays (FPGAs) are able to
perform certain compute-intensive tasks very well due to their inherent
parallel architecture, often resulting in orders of magnitude speedups. This
paper explores how FPGAs can be transparently exposed for remote use via grid
services, by integrating the Proteus Software Platform with the Globus Toolkit
3.0.
| [
{
"version": "v1",
"created": "Tue, 16 Nov 2004 01:49:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
],
[
"Clemens",
"Ralf",
""
]
]
|
cs/0411051 | Timur Friedman | Jeremie Leguay and Matthieu Latapy and Timur Friedman and Kave
Salamatian | Describing and Simulating Internet Routes | 13 pages | null | null | null | cs.NI | null | This paper introduces relevant statistics for the description of routes in
the internet, seen as a graph at the interface level. Based on the observed
properties, we propose and evaluate methods for generating artificial routes
suitable for simulation purposes. The work in this paper is based upon a study
of over seven million route traces produced by CAIDA's skitter infrastructure.
| [
{
"version": "v1",
"created": "Tue, 16 Nov 2004 03:43:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leguay",
"Jeremie",
""
],
[
"Latapy",
"Matthieu",
""
],
[
"Friedman",
"Timur",
""
],
[
"Salamatian",
"Kave",
""
]
]
|
cs/0411052 | Olivier Mazet | H. Soula, G. Beslon, O. Mazet | Spontaneous Dynamics of Asymmetric Random Recurrent Spiking Neural
Networks | 28 pages, 7 figures | null | null | null | cs.NE math.PR | null | We study in this paper the effect of an unique initial stimulation on random
recurrent networks of leaky integrate and fire neurons. Indeed given a
stochastic connectivity this so-called spontaneous mode exhibits various non
trivial dynamics. This study brings forward a mathematical formalism that
allows us to examine the variability of the afterward dynamics according to the
parameters of the weight distribution. Provided independence hypothesis (e.g.
in the case of very large networks) we are able to compute the average number
of neurons that fire at a given time -- the spiking activity. In accordance
with numerical simulations, we prove that this spiking activity reaches a
steady-state, we characterize this steady-state and explore the transients.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 10:04:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Soula",
"H.",
""
],
[
"Beslon",
"G.",
""
],
[
"Mazet",
"O.",
""
]
]
|
cs/0411053 | Didier Donsez | Areski Flissi (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F
Lifl) | Vers un environnement multi personnalites pour la configuration et le
deploiement d'applications a base de composants logiciels | null | DECOR04 (2004) 3-14 | null | null | cs.NI | null | The multiplication of architecture description languages, component models
and platforms implies a serious dilemma for component based software
architects. On the one hand, they have to choose a language to describe
concrete configurations which will be automatically deployed on execution
platforms. On the other hand, they wish to capitalize their software
architectures independently of any description languages or platforms. To solve
this problem, we propose a multi personalities environment for the
configuration and the deployment of component based applications. This
environment is composed of a core capturing a canonical model of configuration
and deployment, and a set of personalities tailored to languages and platforms.
This paper details the architecture of such an environment and describes the
personalities for the CORBA and Fractal component models.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:08:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Flissi",
"Areski",
"",
"JACQUARD Ur-F Lifl"
],
[
"Merle",
"Philippe",
"",
"JACQUARD Ur-F\n Lifl"
]
]
|
cs/0411054 | Didier Donsez | Francois Exertier | J2EE Deployment: The JOnAS Case Study | null | DECOR04 (2004) 27-36 | null | null | cs.NI | null | La specification J2EE (Java 2 platform Enterprise Edition) definit une
architecture de serveur d'application Java. Jusqu'a J2EE 1.3, seuls les aspects
de deploiement concernant le developpeur d'applications etaient adresses. Avec
J2EE 1.4, les interfaces et les etapes de deploiement ont ete plus precisement
specifiees dans la specification "J2EE Deployment". JOnAS (Java Open
Application Server) est une plate-forme J2EE developpee au sein du consortium
ObjectWeb. Les aspects deploiement sont en cours de developpement. Cet article
decrit les concepts lies au deploiement dans J2EE, ainsi que les problematiques
levees lors de leur mise en oeuvre pour JOnAS. Il n'a pas pour but de presenter
un travail abouti, mais illustre le deploiement par un cas concret et ebauche
une liste de besoins non encore satisfaits dans le domaine.
-----
The J2EE (Java 2 platform Enterprise Edition) specification defines an
architecture for Java Application Servers. Until J2EE 1.3, the deployment
aspect was addressed from the developer point of view only. Since J2EE 1.4,
deployment APIs and steps have been more precisely specified within the "J2EE
Deployment Specification". JOnAS (Java Open Application Server) is a J2EE
platform implementation by ObjectWeb. The deployment aspects are under
development. This article describes the J2EE Deployment concepts, and the
issues raised when implementing deployment features within JOnAS. It does not
provide a complete solution, but illustrates deployment through a concrete
example and initiates a list of non fulfilled requirements.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:26:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Exertier",
"Francois",
""
]
]
|
cs/0411055 | Didier Donsez | Laurent Charles, Manuel Vacelet, Mohamed Chaari, Miguel Santana | SDS : Une infrastructure d'installation de logiciels libres pour des
organisations multi-sites | null | DECOR04 (2004) 37-48 | null | null | cs.NI | null | Les developpements logiciels sur les systemes UNIX font de plus en plus appel
aux logiciels libres. Nous proposons une solution de deploiement et de controle
de ces logiciels libres au sein d'une grande organisation. Nous nous attachons
particulierement a resoudre les problemes lies au deploiement multi-sites ainsi
qu'a la gestion de configuration de ces deploiements. L'originalite de notre
approche repose sur sa capacite a etre mise en oeuvre et controlee par les
utilisateurs plutot que par les administrateurs, sans necessiter d'expertise
particuliere, et par les possibilites de deploiement dans des environnements
heterogenes.
-----
Free and open source software is more and more used for software developments
on UNIX systems. We are proposing a solution to control the deployment of free
software in the context of a large corporation, focusing on multi-site
deployment and configuration management. The originality of our approach rests
on its ability to be implemented and controlled by users rather than
administrators, without requiring any particular expertise, and on its facility
to be deployed in heterogeneous environments.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:27:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Charles",
"Laurent",
""
],
[
"Vacelet",
"Manuel",
""
],
[
"Chaari",
"Mohamed",
""
],
[
"Santana",
"Miguel",
""
]
]
|
cs/0411056 | Didier Donsez | Marcel Cremene, Michel Riveill, Christian Martel, Calin Loghin, Costin
Miron | Adaptation dynamique de services | null | DECOR04 (2004) 53-64 | null | null | cs.NI | null | This paper proposes a software architecture for dynamical service adaptation.
The services are constituted by reusable software components. The adaptation's
goal is to optimize the service function of their execution context. For a
first step, the context will take into account just the user needs but other
elements will be added. A particular feature in our proposition is the profiles
that are used not only to describe the context's elements but also the
components itself. An Adapter analyzes the compatibility between all these
profiles and detects the points where the profiles are not compatibles. The
same Adapter search and apply the possible adaptation solutions: component
customization, insertion, extraction or replacement.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:31:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cremene",
"Marcel",
""
],
[
"Riveill",
"Michel",
""
],
[
"Martel",
"Christian",
""
],
[
"Loghin",
"Calin",
""
],
[
"Miron",
"Costin",
""
]
]
|
cs/0411057 | Didier Donsez | Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm Hasselbring | Runtime Reconfiguration of J2EE Applications | null | DECOR04 (2004) 77-84 | null | null | cs.NI | null | Runtime reconfiguration considered as "applying required changes to a running
system" plays an important role for providing high availability not only of
safety- and mission-critical systems, but also for commercial web-applications
offering professional services. Hereby, the main concerns are maintaining the
consistency of the running system during reconfiguration and minimizing its
down-time caused by the reconfiguration. This paper focuses on the platform
independent subsystem that realises deployment and redeployment of J2EE modules
based on the new J2EE Deployment API as a part of the implementation of our
proposed system architecture enabling runtime reconfiguration of
component-based systems. Our "controlled runtime redeployment" comprises an
extension of hot deployment and dynamic reloading, complemented by allowing for
structural change
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:34:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Matevska-Meyer",
"Jasminka",
""
],
[
"Olliges",
"Sascha",
""
],
[
"Hasselbring",
"Wilhelm",
""
]
]
|
cs/0411058 | Didier Donsez | Jose L. Ruiz, Juan C. Duenas, Fernando Usero, Cristina Diaz | Deployment in dynamic environments | null | DECOR04 (2004) 85-98 | null | null | cs.NI | null | Information and communication technologies are moving towards a new stage
where applications will be dynamically deployed, uninstalled, updated and
(re)configured. Several approaches have been followed with the goal of creating
a fully automated and context-aware deployment system. Ideally, this system
should be capable of handling the dynamics of this new situation, without
losing sight of other factors, such as performance, security, availability or
scalability. We will take some of the technologies that follow the principles
of Service Oriented Architectures, SOA, as a paradigm of dynamic environments.
SOA promote the breaking down of applications into sets of loosely coupled
elements, called services. Services can be dynamically bound, deployed,
reconfigured, uninstalled and updated. First of all, we will try to offer a
broad view on the specific deployment issues that arise in these environments.
Later on, we will present our approach to the problem. One of the essential
points that has to be tackled to develop an automated deployment engine will be
to have enough information to carry out tasks without human intervention. In
the article we will focus on the format and contents of deployment descriptors.
Additionally, we will go into the details of the deployment framework for OSGi
enabled gateways that has been developed by our research group. Finally we will
give some concluding remarks and some ideas for future work
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:34:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ruiz",
"Jose L.",
""
],
[
"Duenas",
"Juan C.",
""
],
[
"Usero",
"Fernando",
""
],
[
"Diaz",
"Cristina",
""
]
]
|
cs/0411059 | Didier Donsez | Frederic Briclet (JACQUARD Ur-F Lifl), Christophe Contreras (JACQUARD
Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl) | OpenCCM : une infrastructure a composants pour le deploiement
d'applications a base de composants CORBA | null | DECOR04 (2004) 101-112 | null | null | cs.NI | null | Deployment of software components for building distributed applications
consists of the coordination of a set of basic tasks like uploading component
binaries to the execution sites, loading them in memory, instantiating
components, interconnecting their ports, setting their business and technical
attributes. The automation of the deployment process then requires the presence
of a software infrastructure distributed itself on the different execution
sites. This paper presents the characteristics of such an infrastructure for
the deployment of CORBA component-based applications. This latter is designed
and implemented in the context of our OpenCCM platform, an open source
implementation of the CORBA Component Model. The main characteristic lays on
the fact that this infrastructure is itself designed as a set of CORBA
component assemblies. This allows its dynamic assembly during its deployment
over the execution sites
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:35:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Briclet",
"Frederic",
"",
"JACQUARD Ur-F Lifl"
],
[
"Contreras",
"Christophe",
"",
"JACQUARD\n Ur-F Lifl"
],
[
"Merle",
"Philippe",
"",
"JACQUARD Ur-F Lifl"
]
]
|
cs/0411060 | Didier Donsez | Stephane Frenot (ARES UR-RA) | Gestion du deploiement de composants sur reseau P2P | null | DECOR04 (2004) 113-124 | null | null | cs.NI | null | The deployment of component-based applications relies on a centralized
directory to store the components. This paper describes an approach to
distribute software components to be deployed on a set of peers of a peer to
peer network in order to exploit some associated characteristics (load
balancing, fault-tolerance, self-organisation). The proposed architecture is
situated in the context of OSGI application deployment management. The software
components (bundles) are distributed among a set of nodes participating in the
execution of services. When a node wants to install a component which is not
deployed locally, the component is looked for and installed using a p2p
network.
-----
Le deploiement d'applications a composants repose sur une approche d'annuaire
centralise de stockage des composants. Cet article decrit une approche pour
distribuer les composants logiciels a deployer sur un ensemble de noeuds d'un
reseau pair-a-pair afin de pouvoir exploiter certaines caracteristiques
associees (equilibrage de charge, tolerance de panne, auto-organisation).
L'architecture proposee entre dans le cadre de la gestion du deploiement
d'applications sur le modele OSGi. Les composants logiciels (ou bundles) sont
repartis a travers un ensemble de noeuds participant a l'execution de services.
Lorsqu'un noeud veut installer un composant et si celui-ci n'est pas encore
deploye localement, il est recherche et installe en utilisant un reseau p2p
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:36:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Frenot",
"Stephane",
"",
"ARES UR-RA"
]
]
|
cs/0411061 | Didier Donsez | Noelle Merle (LSR - IMAG) | Un meta-modele pour l'automatisation du deploiement d'applications
logicielles | null | DECOR04 (2004) 125-132 | null | null | cs.NI | null | Le deploiement est maintenant considere comme une activite a part entiere du
cycle de vie du logiciel. Les grandes entreprises souhaitent pouvoir
automatiser cette etape tout en prenant en compte les caracteristiques de
chaque machine cible. Pour repondre a ces besoins, nous avons defini un
environnement de deploiement : ORYA (Open enviRonment to deploY Applications).
Cet environnement utilise un meta-modele de deploiement, decrit dans ce papier.
Notre approche utilise aussi les technologies des federations et des procedes,
fournissant un environnement flexible et extensible pour l'utilisateur.
-----
The deployment is now a full activity of the software lifecycle. Large
enterprises want to automate this step, taking into account characteristics of
each target machine. To satisfy these needs, we have defined an environment for
the deployment phase: ORYA (Open enviRonment to deploY Applications). This
environment uses a deployment metamodel, described in this paper. Our approach
is based also on federation and process federations, providing a flexible and
extensible environment to the user
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:41:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Merle",
"Noelle",
"",
"LSR - IMAG"
]
]
|
cs/0411062 | Didier Donsez | Didier Donsez (LSR - IMAG), Humberto Cervantes (LSR - IMAG), Mikael
Desertot (LSR - IMAG) | FROGi : Deploiement de composants Fractal sur OSGi | null | DECOR04 (2004) 147-158 | null | null | cs.NI | null | Cet article presente FROGi, une proposition visant a introduire le modele a
composants Fractal a l'interieur de la plateforme de services OSGi. La
motivation derriere ce travail est double. D'un cote, FROGi offre aux
developpeurs de services OSGi un modele a composants extensibles qui facilite
le developpement des bundles ; ces derniers restent toutefois compatibles avec
les bundles "patrimoniaux". D'un autre cote, FROGi beneficie de
l'infrastructure de deploiement que represente OSGi et qui facilite la
realisation du conditionnement et du deploiement de composants Fractal. Dans
FROGi, une application Fractal est conditionnee sous la forme d'un ou plusieurs
bundles et elle peut etre deployee de facon partielle et les activites de
deploiement peuvent avoir lieu de facon continue.
-- This paper presents FROGi, a proposal to introduce the Fractal component
model into the OSGi services platform. There are two motivations for this work.
The first one is to offer a flexible component model to the OSGi developers to
simplify bundle development. Bundles developed with FROGi are nevertheless
compatible with standard bundles. The second motivation is to leverage OSGi's
deployment capabilities to package and deploy Fractal components. In FROGi, a
Fractal application is packaged and delivered as a set of OSGi bundles; such an
application supports partial deployment and additionally, deployment activities
can occur continuously.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:43:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Donsez",
"Didier",
"",
"LSR - IMAG"
],
[
"Cervantes",
"Humberto",
"",
"LSR - IMAG"
],
[
"Desertot",
"Mikael",
"",
"LSR - IMAG"
]
]
|
cs/0411063 | Christiane Lechner | Christiane Lechner, Dana Alic, Sascha Husa | From Tensor Equations to Numerical Code -- Computer Algebra Tools for
Numerical Relativity | LaTeX llncs style, 9 pages, 1 figure, to appaer in the proceedings of
"SYNASC 2004 - 6th International Symposium on Symbolic and Numeric Algorithms
for Scientific Computing", Timisoara, Romania, September 26-30 2004 | null | null | AEI-2004-108 | cs.SC | null | In this paper we present our recent work in developing a computer-algebra
tool for systems of partial differential equations (PDEs), termed "Kranc". Our
work is motivated by the problem of finding solutions of the Einstein equations
through numerical simulations. Kranc consists of Mathematica based
computer-algebra packages, that facilitate the task of dealing with symbolic
tensorial calculations and realize the conversion of systems of partial
differential evolution equations into parallelized C or Fortran code.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 14:30:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lechner",
"Christiane",
""
],
[
"Alic",
"Dana",
""
],
[
"Husa",
"Sascha",
""
]
]
|
cs/0411064 | Daniel A. Spielman | Michael Elkin, Yuval Emek, Daniel A. Spielman and Shang-Hua Teng | Lower-Stretch Spanning Trees | null | null | null | null | cs.DS cs.DM | null | We prove that every weighted graph contains a spanning tree subgraph of
average stretch O((log n log log n)^2). Moreover, we show how to construct such
a tree in time O(m log^2 n).
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 22:07:46 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jan 2005 21:06:44 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Feb 2005 21:17:11 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Mar 2005 21:52:20 GMT"
},
{
"version": "v5",
"created": "Fri, 13 May 2005 17:20:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Elkin",
"Michael",
""
],
[
"Emek",
"Yuval",
""
],
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
|
cs/0411066 | Alex Wiesmaier | V. Karatsiolis, M. Lippert and A. Wiesmaier | Using LDAP Directories for Management of PKI Processes | 9 pages, 1 figure | In Proceedings of Public Key Infrastructure: First European PKI
Workshop: Research and Applications, EuroPKI 2004, volume 3093 of Lecture
Notes in Computer Science, pages 126-134, June 2004 | null | null | cs.CR | null | We present a framework for extending the functionality of LDAP servers from
their typical use as a public directory in public key infrastructures. In this
framework the LDAP servers are used for administrating infrastructure
processes. One application of this framework is a method for providing
proof-of-possession, especially in the case of encryption keys. Another one is
the secure delivery of software personal security environments.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 19:00:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Wiesmaier",
"A.",
""
]
]
|
cs/0411068 | Alex Wiesmaier | V. Karatsiolis, M. Lippert, A. Wiesmaier | Planning for Directory Services in Public Key Infrastructures | 12 pages; 1 figure; accepted at QSIG2005 (see
http://www-sec.uni-regensburg.de/sicherheit2005/index.shtml); camera ready
version | Proceedings of "Sicherheit 2005"; April 2005 | null | null | cs.CR | null | In this paper we provide a guide for public key infrastructure designers and
administrators when planning for directory services. We concentrate on the LDAP
directories and how they can be used to successfully publish PKI information.
We analyse their available mechanisms and propose a best practice guide for use
in PKI. We then take a look into the German Signature Act and Ordinance and
discuss their part as far as directories concerning. Finally, we translate
those to the LDAP directories practices.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 19:40:59 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jan 2005 17:07:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Wiesmaier",
"A.",
""
]
]
|
cs/0411070 | Pradipta De Pradipta De | Pradipta De | Data Path Processing in Fast Programmable Routers | ECSL Technical Report #127, Stony Brook University | null | null | null | cs.NI | null | Internet is growing at a fast pace. The link speeds are surging toward 40
Gbps with the emergence of faster link technologies. New applications are
coming up which require intelligent processing at the intermediate routers.
Switches and routers are becoming the bottlenecks in fast communication. On one
hand faster links deliver more packets every second and on the other hand
intelligent processing consumes more CPU cycles at the router. The conflicting
goals of providing faster but computationally expensive processing call for new
approaches in designing routers.
This survey takes a look at the core functionalities, like packet
classification, buffer memory management, switch scheduling and output link
scheduling performed by a router in its data path processing and discusses the
algorithms that aim to reduce the performance bound for these operations. An
important requirement for the routers is to provide Quality of Service
guarantees. We propose an algorithm to guarantee QoS in Input Queued Routers.
The hardware solution to speed up router operation was Application Specific
Integrated Circuits (ASICs). But the inherent inflexibility of the method is a
demerit as network standards and application requirements are constantly
evolving, which seek a faster turnaround time to keep up with the changes. The
promise of Network Processors (NP) is the flexibility of general-purpose
processors together with the speed of ASICs. We will study the architectural
choices for the design of Network Processors and focus on some of the
commercially available NPs. There is a plethora of NP vendors in the market.
The discussion on the NP benchmarks sets the normalizing platform to evaluate
these NPs.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 23:19:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"De",
"Pradipta",
""
]
]
|
cs/0411074 | Daniel Gayo Avello | Daniel Gayo-Avello | Building Chinese Lexicons from Scratch by Unsupervised Short Document
Self-Segmentation | 9 pages 3 figures 2 tables | null | null | null | cs.CL cs.IR | null | Chinese text segmentation is a well-known and difficult problem. On one side,
there is not a simple notion of "word" in Chinese language making really hard
to implement rule-based systems to segment written texts, thus lexicons and
statistical information are usually employed to achieve such a task. On the
other side, any piece of Chinese text usually includes segments present neither
in the lexicons nor in the training data. Even worse, such unseen sequences can
be segmented into a number of totally unrelated words making later processing
phases difficult. For instance, using a lexicon-based system the sequence
???(Baluozuo, Barroso, current president-designate of the European Commission)
can be segmented into ?(ba, to hope, to wish) and ??(luozuo, an undefined word)
changing completely the meaning of the sentence. A new and extremely simple
algorithm specially suited to work over short Chinese documents is introduced.
This new algorithm performs text "self-segmentation" producing results
comparable to those achieved by native speakers without using either lexicons
or any statistical information beyond the obtained from the input text.
Furthermore, it is really robust for finding new "words", especially proper
nouns, and it is well suited to build lexicons from scratch. Some preliminary
results are provided in addition to examples of its employment.
| [
{
"version": "v1",
"created": "Sat, 20 Nov 2004 00:22:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gayo-Avello",
"Daniel",
""
]
]
|
cs/0411075 | Darran Nathan | Andreas Weisensee, Darran Nathan | A Self-Reconfigurable Computing Platform Hardware Architecture | 5 pages, 6 figures | null | null | null | cs.AR cs.DC | null | Field Programmable Gate Arrays (FPGAs) have recently been increasingly used
for highly-parallel processing of compute intensive tasks. This paper
introduces an FPGA hardware platform architecture that is PC-based, allows for
fast reconfiguration over the PCI bus, and retains a simple physical hardware
design. The design considerations are first discussed, then the resulting
system architecture designed is illustrated. Finally, experimental results on
the FPGA resources utilized for this design are presented.
| [
{
"version": "v1",
"created": "Sat, 20 Nov 2004 06:31:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Weisensee",
"Andreas",
""
],
[
"Nathan",
"Darran",
""
]
]
|
cs/0411077 | David S. H. Rosenthal | David S. H. Rosenthal, Thomas Lipkis, Thomas Robertson, Seth Morabito | Transparent Format Migration of Preserved Web Content | 6 pages, 2 figures | null | null | null | cs.DL | null | The LOCKSS digital preservation system collects content by crawling the web
and preserves it in the format supplied by the publisher. Eventually, browsers
will no longer understand that format. A process called format migration
converts it to a newer format that the browsers do understand. The LOCKSS
program has designed and tested an initial implementation of format migration
for Web content that is transparent to readers, building on the content
negotiation capabilities of HTTP.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 00:35:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
],
[
"Lipkis",
"Thomas",
""
],
[
"Robertson",
"Thomas",
""
],
[
"Morabito",
"Seth",
""
]
]
|
cs/0411078 | David S. H. Rosenthal | David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, T.J. Giuli,
Mary Baker | Notes On The Design Of An Internet Adversary | null | Second Annual Adaptive and Resilient Computing Security Workshop,
Santa Fe, 2003 | null | null | cs.DL | null | The design of the defenses Internet systems can deploy against attack,
especially adaptive and resilient defenses, must start from a realistic model
of the threat. This requires an assessment of the capabilities of the
adversary. The design typically evolves through a process of simulating both
the system and the adversary. This requires the design and implementation of a
simulated adversary based on the capability assessment. Consensus on the
capabilities of a suitable adversary is not evident. Part of the recent
redesign of the protocol used by peers in the LOCKSS digital preservation
system included a conservative assessment of the adversary's capabilities. We
present our assessment and the implications we drew from it as a step towards a
reusable adversary specification.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 00:22:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Roussopoulos",
"Mema",
""
],
[
"Giuli",
"T. J.",
""
],
[
"Baker",
"Mary",
""
]
]
|
cs/0411079 | Srikant Sharma | Srikant Sharma and Kartik Gopalan and Ningning Zhu and Gang Peng and
Pradipta De and Tzi-cker Chiueh | Supporting Bandwidth Guarantee and Mobility for Real-Time Applications
on Wireless LANs | This paper integrates the QoS scheme published in MMCN 2002 with a
low latency mobility scheme that appeared in IEEE JSAC May 2004. This paper
deals with both the issues with a fresh perspective of new networking
technologies and standards such as 802.11e | null | null | null | cs.NI | null | The proliferation of IEEE 802.11-based wireless LANs opens up avenues for
creation of several tetherless and mobility oriented services. Most of these
services, like voice over WLAN, media streaming etc., generate delay and
bandwidth sensitive traffic. These traffic flows require undisrupted network
connectivity with some QoS guarantees. Unfortunately, there is no adequate
support built into these wireless LANs towards QoS provisioning. Further, the
network layer handoff latency incurred by mobile nodes in these wireless LANs
is too high for real-time applications to function properly. In this paper, we
describe a QoS mechanism, called Rether, to effectively support bandwidth
guarantee on wireless LANs. Rether is designed to support the current wireless
LAN technologies like 802.11b and 802.11a with a specific capability of being
tailored for QoS oriented technology like 802.11e. We also describe a
low-latency handoff mechanism which expedites network level handoff to provide
real-time applications with an added advantage of seamless mobility.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 18:10:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sharma",
"Srikant",
""
],
[
"Gopalan",
"Kartik",
""
],
[
"Zhu",
"Ningning",
""
],
[
"Peng",
"Gang",
""
],
[
"De",
"Pradipta",
""
],
[
"Chiueh",
"Tzi-cker",
""
]
]
|
cs/0411080 | Valmir Barbosa | C. A. G. Assis, E. S. T. Fernandes, V. C. Barbosa | Modeling the input history of programs for improved instruction-memory
performance | null | Computer Journal 49 (2006), 744-761 | 10.1093/comjnl/bxl044 | ES-662/04 | cs.OS | null | When a program is loaded into memory for execution, the relative position of
its basic blocks is crucial, since loading basic blocks that are unlikely to be
executed first places them high in the instruction-memory hierarchy only to be
dislodged as the execution goes on. In this paper we study the use of Bayesian
networks as models of the input history of a program. The main point is the
creation of a probabilistic model that persists as the program is run on
different inputs and at each new input refines its own parameters in order to
reflect the program's input history more accurately. As the model is thus
tuned, it causes basic blocks to be reordered so that, upon arrival of the next
input for execution, loading the basic blocks into memory automatically takes
into account the input history of the program. We report on extensive
experiments, whose results demonstrate the efficacy of the overall approach in
progressively lowering the execution times of a program on identical inputs
placed randomly in a sequence of varied inputs. We provide results on selected
SPEC CINT2000 programs and also evaluate our approach as compared to the gcc
level-3 optimization and to Pettis-Hansen reordering.
| [
{
"version": "v1",
"created": "Tue, 23 Nov 2004 16:52:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Assis",
"C. A. G.",
""
],
[
"Fernandes",
"E. S. T.",
""
],
[
"Barbosa",
"V. C.",
""
]
]
|
cs/0411081 | Didier Donsez | Assia Hachichi (REGAL Ur-R Lip6), Cyril Martin (REGAL Ur-R Lip6), Gael
Thomas (REGAL Ur-R Lip6), Simon Patarin (REGAL Ur-R Lip6), Bertil Folliot
(REGAL Ur-R Lip6) | Reconfigurations dynamiques de services dans un intergiciel a composants
CORBA CCM | null | DECOR04 (2004) 159-170 | null | null | cs.NI | null | Today, component oriented middlewares are used to design, develop and deploy
easily distributed applications, by ensuring the heterogeneity,
interoperability, and reuse of the software modules, and the separation between
the business code encapsulated in the components and the system code managed by
the containers. Several standards answer this definition such as: CCM (CORBA
Component Model), EJB (Enterprise Java Beans) and .Net. However these standards
offer a limited and fixed number of system services, removing any possibility
to add system services or to reconfigure dynamically the middleware. Our works
propose mechanisms to add and to adapt dynamically the system services, based
on a reconfiguration language which is dynamically adaptable to the need of the
reconfiguration, and on a tool of dynamic reconfiguration, a prototype was
achieved for the OpenCCM platform, that is an implementation of the CCM
specification. This work was partially financed by the european project
IST-COACH (2001-34445).
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 10:26:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hachichi",
"Assia",
"",
"REGAL Ur-R Lip6"
],
[
"Martin",
"Cyril",
"",
"REGAL Ur-R Lip6"
],
[
"Thomas",
"Gael",
"",
"REGAL Ur-R Lip6"
],
[
"Patarin",
"Simon",
"",
"REGAL Ur-R Lip6"
],
[
"Folliot",
"Bertil",
"",
"REGAL Ur-R Lip6"
]
]
|
cs/0411082 | Didier Donsez | Jakub Kornas (SARDES Ur-Ra Imag), Matthieu Leclercq (SARDES Ur-Ra
Imag), Vivien Quema (SARDES Ur-Ra Imag), Jean-Bernard Stefani (SARDES Ur-Ra
Imag) | Support pour la reconfiguration d'implantation dans les applications a
composants Java | null | DECOR04 (2004) 171-184 | null | null | cs.NI | null | Nowadays, numerous component models are used for various purposes: to build
applications, middleware or even operating systems. Those models commonly
support structure reconfiguration, that is modification of application's
architecture at runtime. On the other hand, very few allow implementation
reconfiguration, that is runtime modification of the code of components
building the application. In this article we present the work we performed on
JULIA, a Java-based implementation of the FRACTAL component model, in order for
it to support implementation reconfigurations. We show how we overcame the
limitations of Java class loading mechanism to allow runtime modifications of
components' implementation and interfaces. We also describe the integration of
our solution with the JULIA ADL.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 10:27:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kornas",
"Jakub",
"",
"SARDES Ur-Ra Imag"
],
[
"Leclercq",
"Matthieu",
"",
"SARDES Ur-Ra\n Imag"
],
[
"Quema",
"Vivien",
"",
"SARDES Ur-Ra Imag"
],
[
"Stefani",
"Jean-Bernard",
"",
"SARDES Ur-Ra\n Imag"
]
]
|
cs/0411090 | Valmir Barbosa | A. O. Stauffer, V. C. Barbosa | Local heuristics and the emergence of spanning subgraphs in complex
networks | null | Theoretical Computer Science 355 (2006), 80-95 | 10.1016/j.tcs.2005.12.007 | ES-663/04 | cs.NI | null | We study the use of local heuristics to determine spanning subgraphs for use
in the dissemination of information in complex networks. We introduce two
different heuristics and analyze their behavior in giving rise to spanning
subgraphs that perform well in terms of allowing every node of the network to
be reached, of requiring relatively few messages and small node bandwidth for
information dissemination, and also of stretching paths with respect to the
underlying network only modestly. We contribute a detailed mathematical
analysis of one of the heuristics and provide extensive simulation results on
random graphs for both of them. These results indicate that, within certain
limits, spanning subgraphs are indeed expected to emerge that perform well in
respect to all requirements. We also discuss the spanning subgraphs' inherent
resilience to failures and adaptability to topological changes.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 09:04:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stauffer",
"A. O.",
""
],
[
"Barbosa",
"V. C.",
""
]
]
|
cs/0411091 | H. M. Gladney | H.M. Gladney | Principles for Digital Preservation | 7 pages with 2b figures | null | null | null | cs.DL | null | The immense investments in creating and disseminating digitally represented
information have not been accompanied by commensurate effort to ensure the
longevity of information of permanent interest. Asserted difficulties with
long-term digital preservation prove to be largely underestimation of what
technology can provide. We show how to clarify prominent misunderstandings and
sketch a 'Trustworthy Digital Object (TDO)' method that solves all the
published technical challenges.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 20:54:43 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Dec 2004 00:32:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gladney",
"H. M.",
""
]
]
|
cs/0411092 | H. M. Gladney | H.M. Gladney, R.A. Lorie | Trustworthy 100-Year Digital Objects: Durable Encoding for When It's Too
Late to Ask | null | null | null | null | cs.DL | null | How can an author store digital information so that it will be reliably
useful, even years later when he is no longer available to answer questions?
Methods that might work are not good enough; what is preserved today should be
reliably useful whenever someone wants it. Prior proposals fail because they
confound saved data with irrelevant details of today's information
technology--details that are difficult to define, extract, and save completely
and accurately.
We use a virtual machine to represent and eventually to render any data
whatsoever. We focus on a case of intermediate difficulty--an executable
procedure--and identify a variant for every other data type. This solution
might be more elaborate than needed to render some text, image, audio, or video
data. Simple data can be preserved as representations using well-known
standards. We sketch practical methods for files ranging from simple structures
to those containing computer programs, treating simple cases here and deferring
complex cases for future work. Enough of the complete solution is known to
enable practical aggressive preservation programs today.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 21:26:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gladney",
"H. M.",
""
],
[
"Lorie",
"R. A.",
""
]
]
|
cs/0411093 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), Loys Thimonier (LARIA) | Forbidden Subgraphs in Connected Graphs | null | null | null | null | cs.DS cs.DM math.CO | null | Given a set $\xi=\{H_1,H_2,...\}$ of connected non acyclic graphs, a
$\xi$-free graph is one which does not contain any member of $% \xi$ as copy.
Define the excess of a graph as the difference between its number of edges and
its number of vertices. Let ${\gr{W}}_{k,\xi}$ be theexponential generating
function (EGF for brief) of connected $\xi$-free graphs of excess equal to $k$
($k \geq 1$). For each fixed $\xi$, a fundamental differential recurrence
satisfied by the EGFs ${\gr{W}}_{k,\xi}$ is derived. We give methods on how to
solve this nonlinear recurrence for the first few values of $k$ by means of
graph surgery. We also show that for any finite collection $\xi$ of non-acyclic
graphs, the EGFs ${\gr{W}}_{k,\xi}$ are always rational functions of the
generating function, $T$, of Cayley's rooted (non-planar) labelled trees. From
this, we prove that almost all connected graphs with $n$ nodes and $n+k$ edges
are $\xi$-free, whenever $k=o(n^{1/3})$ and $|\xi| < \infty$ by means of
Wright's inequalities and saddle point method. Limiting distributions are
derived for sparse connected $\xi$-free components that are present when a
random graph on $n$ nodes has approximately $\frac{n}{2}$ edges. In particular,
the probability distribution that it consists of trees, unicyclic components,
$...$, $(q+1)$-cyclic components all $\xi$-free is derived. Similar results are
also obtained for multigraphs, which are graphs where self-loops and
multiple-edges are allowed.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 09:32:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Thimonier",
"Loys",
"",
"LARIA"
]
]
|
cs/0411094 | Radhakrishnan Srinivasan | Radhakrishnan Srinivasan, H. P. Raghunandan | On the existence of truly autonomic computing systems and the link with
quantum computing | 13 pages (two-column, single-spaced), 2 figures. Section 4 and
Appendix B (with a figure in each) added. Improved explanations given for the
NAFL model of (hyper-) computation (Sec. 6) and for the failure of
relativistic locality in NAFL (Appendix B) | null | null | null | cs.LO math.LO quant-ph | null | A theoretical model of truly autonomic computing systems (ACS), with
infinitely many constraints, is proposed. An argument similar to Turing's for
the unsolvability of the halting problem, which is permitted in classical
logic, shows that such systems cannot exist. Turing's argument fails in the
recently proposed non-Aristotelian finitary logic (NAFL), which permits the
existence of ACS. NAFL also justifies quantum superposition and entanglement,
which are essential ingredients of quantum algorithms, and resolves the
Einstein-Podolsky-Rosen (EPR) paradox in favour of quantum mechanics and
non-locality. NAFL requires that the autonomic manager (AM) must be
conceptually and architecturally distinct from the managed element, in order
for the ACS to exist as a non-self-referential entity. Such a scenario is
possible if the AM uses quantum algorithms and is protected from all problems
by (unbreakable) quantum encryption, while the managed element remains
classical. NAFL supports such a link between autonomic and quantum computing,
with the AM existing as a metamathematical entity. NAFL also allows quantum
algorithms to access truly random elements and thereby supports non-standard
models of quantum (hyper-) computation that permit infinite parallelism.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 13:16:55 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Feb 2005 11:41:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Srinivasan",
"Radhakrishnan",
""
],
[
"Raghunandan",
"H. P.",
""
]
]
|
cs/0411095 | Christian Lavault | Christian Lavault (LIPN) | Embeddings into the Pancake Interconnection Network | Article paru en 2002 dans Parallel Processing Letters | Parallel Processing Letters 12, 3-4 (2002) 297-310 | null | null | cs.DC cs.DM cs.DS | null | Owing to its nice properties, the pancake is one of the Cayley graphs that
were proposed as alternatives to the hypercube for interconnecting processors
in parallel computers. In this paper, we present embeddings of rings, grids and
hypercubes into the pancake with constant dilation and congestion. We also
extend the results to similar efficient embeddings into the star graph.
| [
{
"version": "v1",
"created": "Fri, 26 Nov 2004 20:13:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
]
]
|
cs/0411096 | Nathan LaBelle Mr. | Nathan LaBelle, Eugene Wallingford | Inter-Package Dependency Networks in Open-Source Software | 6 Pages, 1 Figure, Submitted to J. Theoretical Comp. Science | null | null | null | cs.SE | null | This research analyzes complex networks in open-source software at the
inter-package level, where package dependencies often span across projects and
between development groups. We review complex networks identified at ``lower''
levels of abstraction, and then formulate a description of interacting software
components at the package level, a relatively ``high'' level of abstraction. By
mining open-source software repositories from two sources, we empirically show
that the coupling of modules at this granularity creates a small-world and
scale-free network in both instances.
| [
{
"version": "v1",
"created": "Mon, 29 Nov 2004 03:38:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"LaBelle",
"Nathan",
""
],
[
"Wallingford",
"Eugene",
""
]
]
|
cs/0411099 | Andreas Maurer | Andreas Maurer | A Note on the PAC Bayesian Theorem | 9 pages | null | null | null | cs.LG cs.AI | null | We prove general exponential moment inequalities for averages of [0,1]-valued
iid random variables and use them to tighten the PAC Bayesian Theorem. The
logarithmic dependence on the sample count in the enumerator of the PAC
Bayesian bound is halved.
| [
{
"version": "v1",
"created": "Tue, 30 Nov 2004 08:36:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Maurer",
"Andreas",
""
]
]
|
cs/0411100 | Ruggero Lanotte Dr | Ruggero Lanotte (Dipartimento di Scienze della Cultura, Politiche e
dell'Informazione), Daniele Beauquier (LACL, Dept. of Informatics) | A Decidable Probability Logic for Timed Probabilistic Systems | null | null | null | null | cs.LO | null | In this paper we extend the predicate logic introduced in [Beauquier et al.
2002] in order to deal with Semi-Markov Processes. We prove that with respect
to qualitative probabilistic properties, model checking is decidable for this
logic applied to Semi-Markov Processes. Furthermore we apply our logic to
Probabilistic Timed Automata considering classical and urgent semantics, and
considering also predicates on clock. We prove that results on Semi Markov
Processes hold also for Probabilistic Timed Automata for both the two semantics
considered. Moreover, we prove that results for Markov Processes shown in
[Beauquier et al. 2002] are extensible to Probabilistic Timed Automata where
urgent semantics is considered.
| [
{
"version": "v1",
"created": "Tue, 30 Nov 2004 10:42:35 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Mar 2006 17:37:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lanotte",
"Ruggero",
"",
"Dipartimento di Scienze della Cultura, Politiche e\n dell'Informazione"
],
[
"Beauquier",
"Daniele",
"",
"LACL, Dept. of Informatics"
]
]
|
cs/0412001 | Francesca Leinardi | Serge Rouveyrol (IMAG), Yves Chiaramella (IMAG), Francesca Leinardi
(IMAG), Joanna Janik (IMAG), Bruno Marmol (INRIA-RA), Carole Silvy
(INRIA-RA), Catherine Allauzun (INRIA-RA) | EURYDICE : A platform for unified access to documents | redige le 14 octobre 2001 | null | null | null | cs.DL | null | In this paper we present Eurydice, a platform dedicated to provide a unified
gateway to documents. Its basic functionalities about collecting documents have
been designed based on a long experience about the management of scientific
documentation among large and demanding academic communities such as IMAG and
INRIA. Besides the basic problem of accessing documents - which was of course
the original and main motivation of the project - a great effort has been
dedicated to the development of management functionalities which could help
institutions to control, analyse the current situation about the use of the
documentation, and finally to set a better ground for a documentation policy.
Finally a great emphasis - and corresponding technical investment - has been
put on the protection of property and reproduction rights both from the users'
intitution side and from the editors' side.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 13:14:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rouveyrol",
"Serge",
"",
"IMAG"
],
[
"Chiaramella",
"Yves",
"",
"IMAG"
],
[
"Leinardi",
"Francesca",
"",
"IMAG"
],
[
"Janik",
"Joanna",
"",
"IMAG"
],
[
"Marmol",
"Bruno",
"",
"INRIA-RA"
],
[
"Silvy",
"Carole",
"",
"INRIA-RA"
],
[
"Allauzun",
"Catherine",
"",
"INRIA-RA"
]
]
|
cs/0412002 | Mark Levene | Jose Borges and Mark Levene | Ranking Pages by Topology and Popularity within Web Sites | 15 pages, 6 figures | null | null | null | cs.AI cs.IR | null | We compare two link analysis ranking methods of web pages in a site. The
first, called Site Rank, is an adaptation of PageRank to the granularity of a
web site and the second, called Popularity Rank, is based on the frequencies of
user clicks on the outlinks in a page that are captured by navigation sessions
of users through the web site. We ran experiments on artificially created web
sites of different sizes and on two real data sets, employing the relative
entropy to compare the distributions of the two ranking methods. For the real
data sets we also employ a nonparametric measure, called Spearman's footrule,
which we use to compare the top-ten web pages ranked by the two methods. Our
main result is that the distributions of the Popularity Rank and Site Rank are
surprisingly close to each other, implying that the topology of a web site is
very instrumental in guiding users through the site. Thus, in practice, the
Site Rank provides a reasonable first order approximation of the aggregate
behaviour of users within a web site given by the Popularity Rank.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 13:22:47 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Dec 2004 09:10:55 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Dec 2004 10:03:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Borges",
"Jose",
""
],
[
"Levene",
"Mark",
""
]
]
|
cs/0412003 | Joanna Janik | Florence Duchene (TIMC - IMAG), Catherine Garbay (TIMC - IMAG),
Vincent Rialle (TIMC - IMAG, SIIM) | Mining Heterogeneous Multivariate Time-Series for Learning Meaningful
Patterns: Application to Home Health Telecare | null | null | null | null | cs.LG | null | For the last years, time-series mining has become a challenging issue for
researchers. An important application lies in most monitoring purposes, which
require analyzing large sets of time-series for learning usual patterns. Any
deviation from this learned profile is then considered as an unexpected
situation. Moreover, complex applications may involve the temporal study of
several heterogeneous parameters. In that paper, we propose a method for mining
heterogeneous multivariate time-series for learning meaningful patterns. The
proposed approach allows for mixed time-series -- containing both pattern and
non-pattern data -- such as for imprecise matches, outliers, stretching and
global translating of patterns instances in time. We present the early results
of our approach in the context of monitoring the health status of a person at
home. The purpose is to build a behavioral profile of a person by analyzing the
time variations of several quantitative or qualitative parameters recorded
through a provision of sensors installed in the home.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 16:32:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Duchene",
"Florence",
"",
"TIMC - IMAG"
],
[
"Garbay",
"Catherine",
"",
"TIMC - IMAG"
],
[
"Rialle",
"Vincent",
"",
"TIMC - IMAG, SIIM"
]
]
|
cs/0412004 | Lloyd Allison | L. Allison | Finding Approximate Palindromes in Strings Quickly and Simply | 4 pages, 3 figures, code of the simple algorithm will soon be placed
at http://www.csse.monash.edu.au/~lloyd/tildeProgLang/Java2/Palindromes/ | null | null | 2004/162 | cs.DS | null | Described are two algorithms to find long approximate palindromes in a
string, for example a DNA sequence. A simple algorithm requires O(n)-space and
almost always runs in $O(k.n)$-time where n is the length of the string and k
is the number of ``errors'' allowed in the palindrome. Its worst-case
time-complexity is $O(n^2)$ but this does not occur with real biological
sequences. A more complex algorithm guarantees $O(k.n)$ worst-case time
complexity.
| [
{
"version": "v1",
"created": "Wed, 1 Dec 2004 17:08:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Allison",
"L.",
""
]
]
|
cs/0412005 | Bernard Parisse | Bernard Parisse (IF), Morgane Vaughan (IF) | Jordan Normal and Rational Normal Form Algorithms | null | null | null | null | cs.SC | null | In this paper, we present a determinist Jordan normal form algorithms based
on the Fadeev formula: \[(\lambda \cdot I-A) \cdot B(\lambda)=P(\lambda) \cdot
I\] where $B(\lambda)$ is $(\lambda \cdot I-A)$'s comatrix and $P(\lambda)$ is
$A$'s characteristic polynomial. This rational Jordan normal form algorithm
differs from usual algorithms since it is not based on the Frobenius/Smith
normal form but rather on the idea already remarked in Gantmacher that the
non-zero column vectors of $B(\lambda_0)$ are eigenvectors of $A$ associated to
$\lambda_0$ for any root $\lambda_0$ of the characteristical polynomial. The
complexity of the algorithm is $O(n^4)$ field operations if we know the
factorization of the characteristic polynomial (or $O(n^5 \ln(n))$ operations
for a matrix of integers of fixed size). This algorithm has been implemented
using the Maple and Giac/Xcas computer algebra systems.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 09:39:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Parisse",
"Bernard",
"",
"IF"
],
[
"Vaughan",
"Morgane",
"",
"IF"
]
]
|
cs/0412006 | Sidi Mohamed Sedjelmaci | Sidi Mohamed Sedjelmaci (LIPN) | The Accelerated Euclidean Algorithm | null | Proceedings of the EACA, (2004) 283-287 | null | null | cs.DS | null | We present a new GCD algorithm of two integers or polynomials. The algorithm
is iterative and its time complexity is still $O(n \\log^2 n ~ log \\log n)$
for $n$-bit inputs.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 15:01:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sedjelmaci",
"Sidi Mohamed",
"",
"LIPN"
]
]
|
cs/0412008 | Manor Mendel | Robert Krauthgamer, James R. Lee, Manor Mendel, Assaf Naor | Measured descent: A new embedding method for finite metrics | 17 pages. No figures. Appeared in FOCS '04. To appeaer in Geometric &
Functional Analysis. This version fixes a subtle error in Section 2.2 | Geom. Funct. Anal. 15(4):839-858, 2005 | 10.1007/s00039-005-0527-6 | null | cs.DS math.MG | null | We devise a new embedding technique, which we call measured descent, based on
decomposing a metric space locally, at varying speeds, according to the density
of some probability measure. This provides a refined and unified framework for
the two primary methods of constructing Frechet embeddings for finite metrics,
due to [Bourgain, 1985] and [Rao, 1999]. We prove that any n-point metric space
(X,d) embeds in Hilbert space with distortion O(sqrt{alpha_X log n}), where
alpha_X is a geometric estimate on the decomposability of X. As an immediate
corollary, we obtain an O(sqrt{(log lambda_X) \log n}) distortion embedding,
where \lambda_X is the doubling constant of X. Since \lambda_X\le n, this
result recovers Bourgain's theorem, but when the metric X is, in a sense,
``low-dimensional,'' improved bounds are achieved.
Our embeddings are volume-respecting for subsets of arbitrary size. One
consequence is the existence of (k, O(log n)) volume-respecting embeddings for
all 1 \leq k \leq n, which is the best possible, and answers positively a
question posed by U. Feige. Our techniques are also used to answer positively a
question of Y. Rabinovich, showing that any weighted n-point planar graph
embeds in l_\infty^{O(log n)} with O(1) distortion. The O(log n) bound on the
dimension is optimal, and improves upon the previously known bound of O((log
n)^2).
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 17:06:41 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Aug 2005 06:56:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Krauthgamer",
"Robert",
""
],
[
"Lee",
"James R.",
""
],
[
"Mendel",
"Manor",
""
],
[
"Naor",
"Assaf",
""
]
]
|
cs/0412010 | Jeremie Guiochet | Jeremie Guiochet (LAAS), Gilles Motet, Claude Baron, Guy Boy | Toward a Human-Centered Uml for Risk Analysis | null | Proc. of the 18th IFIP World Computer Congress (WCC), Human Error,
Safety and Systems Development (HESSD04) (2004) 177-191 | null | null | cs.OH | null | Safety is now a major concern in many complex systems such as medical robots.
A way to control the complexity of such systems is to manage risk. The first
and important step of this activity is risk analysis. During risk analysis, two
main studies concerning human factors must be integrated: task analysis and
human error analysis. This multidisciplinary analysis often leads to a work
sharing between several stakeholders who use their own languages and
techniques. This often produces consistency errors and understanding
difficulties between them. Hence, this paper proposes to treat the risk
analysis on the common expression language UML (Unified Modeling Language) and
to handle human factors concepts for task analysis and human error analysis
based on the features of this language. The approach is applied to the
development of a medical robot for teleechography.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2004 21:32:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guiochet",
"Jeremie",
"",
"LAAS"
],
[
"Motet",
"Gilles",
""
],
[
"Baron",
"Claude",
""
],
[
"Boy",
"Guy",
""
]
]
|
cs/0412011 | Archil Avaliani | Archil Avaliani | Successful E-Business Systems - Paypal | 6 pages, Accepted at IADIS Conference, Lisbon. But because nobody was
able to present this research paper, it didn't publish in proceedings.
Extended version was written at International University under supervision of
Prof.Keiichi Nakata. Keywords: PayPal, Payment Systems, E-business, Money
Transactions, PayPal Analyses | null | null | null | cs.OH | null | PayPal is an account-based system that allows anyone with an email address to
send and receive online payment s. This service is easy to use for customers.
Members can instantaneously send money to anyone. Recipients are informed by
email that they have received a payment. PayPal is also available to people in
38 countries. This paper starts with introduction to the company and its
services. The information about the history and the current company situation
are covered. Later some interesting and different technical issues are
discussed. The Paper ends with analysis of the company and several future
recommendations.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 02:33:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Avaliani",
"Archil",
""
]
]
|
cs/0412012 | Joanna Janik | Catherine Oriat (LSR - IMAG) | Jartege: a Tool for Random Generation of Unit Tests for Java Classes | null | null | null | RR-1069-I | cs.PL | null | This report presents Jartege, a tool which allows random generation of unit
tests for Java classes specified in JML. JML (Java Modeling Language) is a
specification language for Java which allows one to write invariants for
classes, and pre- and postconditions for operations. As in the JML-JUnit tool,
we use JML specifications on the one hand to eliminate irrelevant test cases,
and on the other hand as a test oracle. Jartege randomly generates test cases,
which consist of a sequence of constructor and method calls for the classes
under test. The random aspect of the tool can be parameterized by associating
weights to classes and operations, and by controlling the number of instances
which are created for each class under test. The practical use of Jartege is
illustrated by a small case study.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 12:19:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oriat",
"Catherine",
"",
"LSR - IMAG"
]
]
|
cs/0412013 | Jean-Christophe Dubacq | Jean-Christophe Dubacq (LIPN, GREYC), Veronique Terrier (GREYC) | Signals for Cellular Automata in dimension 2 or higher | null | LATIN 2002: Theoretical Informatics (2002) 451-464 | null | null | cs.CC cs.DC cs.DM math.CO | null | We investigate how increasing the dimension of the array can help to draw
signals on cellular automata.We show the existence of a gap of constructible
signals in any dimension. We exhibit two cellular automata in dimension 2 to
show that increasing the dimension allows to reduce the number of states
required for some constructions.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 16:35:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dubacq",
"Jean-Christophe",
"",
"LIPN, GREYC"
],
[
"Terrier",
"Veronique",
"",
"GREYC"
]
]
|
cs/0412014 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN) | Randomized Initialization of a Wireless Multihop Network | null | null | null | null | cs.DC cs.DM | null | Address autoconfiguration is an important mechanism required to set the IP
address of a node automatically in a wireless network. The address
autoconfiguration, also known as initialization or naming, consists to give a
unique identifier ranging from 1 to $n$ for a set of $n$ indistinguishable
nodes. We consider a wireless network where $n$ nodes (processors) are randomly
thrown in a square $X$, uniformly and independently. We assume that the network
is synchronous and two nodes are able to communicate if they are within
distance at most of $r$ of each other ($r$ is the transmitting/receiving
range). The model of this paper concerns nodes without the collision detection
ability: if two or more neighbors of a processor $u$ transmit concurrently at
the same time, then $u$ would not receive either messages. We suppose also that
nodes know neither the topology of the network nor the number of nodes in the
network. Moreover, they start indistinguishable, anonymous and unnamed. Under
this extremal scenario, we design and analyze a fully distributed protocol to
achieve the initialization task for a wireless multihop network of $n$ nodes
uniformly scattered in a square $X$. We show how the transmitting range of the
deployed stations can affect the typical characteristics such as the degrees
and the diameter of the network. By allowing the nodes to transmit at a range
$r= \sqrt{\frac{(1+\ell) \ln{n} \SIZE}{\pi n}}$ (slightly greater than the one
required to have a connected network), we show how to design a randomized
protocol running in expected time $O(n^{3/2} \log^2{n})$ in order to assign a
unique number ranging from 1 to $n$ to each of the $n$ participating nodes.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 16:39:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
]
|
cs/0412015 | Detlef Prescher | Detlef Prescher | A Tutorial on the Expectation-Maximization Algorithm Including
Maximum-Likelihood Estimation and EM Training of Probabilistic Context-Free
Grammars | Presented at the 15th European Summer School in Logic, Language and
Information (ESSLLI 2003). Example 5 extended (and partially corrected) | null | null | null | cs.CL | null | The paper gives a brief review of the expectation-maximization algorithm
(Dempster 1977) in the comprehensible framework of discrete mathematics. In
Section 2, two prominent estimation methods, the relative-frequency estimation
and the maximum-likelihood estimation are presented. Section 3 is dedicated to
the expectation-maximization algorithm and a simpler variant, the generalized
expectation-maximization algorithm. In Section 4, two loaded dice are rolled. A
more interesting example is presented in Section 5: The estimation of
probabilistic context-free grammars.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 17:10:17 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Mar 2005 14:05:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Prescher",
"Detlef",
""
]
]
|
cs/0412016 | Detlef Prescher | Detlef Prescher | Inside-Outside Estimation Meets Dynamic EM | 4 pages, some typos corrected | Proceedings of IWPT 2001 | null | null | cs.CL | null | We briefly review the inside-outside and EM algorithm for probabilistic
context-free grammars. As a result, we formally prove that inside-outside
estimation is a dynamic-programming variant of EM. This is interesting in its
own right, but even more when considered in a theoretical context since the
well-known convergence behavior of inside-outside estimation has been confirmed
by many experiments but apparently has never been formally proved. However,
being a version of EM, inside-outside estimation also inherits the good
convergence behavior of EM. Therefore, the as yet imperfect line of
argumentation can be transformed into a coherent proof.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 18:10:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Prescher",
"Detlef",
""
]
]
|
cs/0412018 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | Modeling Complex Higher Order Patterns | 11 pages | null | null | Tr-04-11 | cs.DB cs.AI | null | The goal of this paper is to show that generalizing the notion of frequent
patterns can be useful in extending association analysis to more complex higher
order patterns. To that end, we describe a general framework for modeling a
complex pattern based on evaluating the interestingness of its sub-patterns. A
key goal of any framework is to allow people to more easily express, explore,
and communicate ideas, and hence, we illustrate how our framework can be used
to describe a variety of commonly used patterns, such as frequent patterns,
frequent closed patterns, indirect association patterns, hub patterns and
authority patterns. To further illustrate the usefulness of the framework, we
also present two new kinds of patterns that derived from the framework: clique
pattern and bi-clique pattern and illustrate their practical use.
| [
{
"version": "v1",
"created": "Sat, 4 Dec 2004 12:28:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0412019 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A Link Clustering Based Approach for Clustering Categorical Data | 10 pages | A poster paper in Proc. of WAIM 2004 | null | null | cs.DL cs.AI | null | Categorical data clustering (CDC) and link clustering (LC) have been
considered as separate research and application areas. The main focus of this
paper is to investigate the commonalities between these two problems and the
uses of these commonalities for the creation of new clustering algorithms for
categorical data based on cross-fertilization between the two disjoint research
fields. More precisely, we formally transform the CDC problem into an LC
problem, and apply LC approach for clustering categorical data. Experimental
results on real datasets show that LC based clustering method is competitive
with existing CDC algorithms with respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Sat, 4 Dec 2004 12:41:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0412020 | Paul Rogers | Paul Rogers and Nael Abu-Ghazaleh | Towards Reliable Network Wide Broadcast in Mobile Ad Hoc Networks | 12 pages, 22 figures | null | null | Tech Report: tr-cs-02-04 | cs.NI | null | Network-Wide Broadcast (NWB) is a common operation in Mobile Ad hoc Networks
(MANETs) used by routing protocols to discover routes and in group
communication operations. NWB is commonly performed via flooding, which has
been shown to be expensive in dense MANETs because of its high redundancy.
Several efforts have targeted reducing the redundancy of floods. In this work,
we target another problem that can substantially impact the success of NWBs:
since MAC level broadcasts are unreliable, it is possible for critical
rebroadcasts to be lost, leading to a significant drop in the node coverage.
This is especially true under heavy load and in sparse topologies. We show that
the techniques that target reducing the overhead of flooding, reduce its
inherent redundancy and harm its reliability. In addition, we show that static
approaches are more vulnerable to this problem. We then present a selective
rebroadcast approach to improve the robustness of NWBs. We show that our
approach leads to considerable improvement in NWB coverage relative to a
recently proposed solution to this problem, with a small increase in overhead.
The proposed approaches do not require proactive neighbor discovery and are
therefore resilient to mobility. Finally, the solution can be added to
virtually all NWB approaches to improve their reliability.
| [
{
"version": "v1",
"created": "Sat, 4 Dec 2004 18:30:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rogers",
"Paul",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
]
|
cs/0412021 | Chiu Wo Choi | Chiu Wo Choi, Warwick Harvey, Jimmy Ho-Man Lee, Peter J. Stuckey | Finite Domain Bounds Consistency Revisited | 12 pages | null | null | null | cs.AI cs.LO | null | A widely adopted approach to solving constraint satisfaction problems
combines systematic tree search with constraint propagation for pruning the
search space. Constraint propagation is performed by propagators implementing a
certain notion of consistency. Bounds consistency is the method of choice for
building propagators for arithmetic constraints and several global constraints
in the finite integer domain. However, there has been some confusion in the
definition of bounds consistency. In this paper we clarify the differences and
similarities among the three commonly used notions of bounds consistency.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 08:04:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Choi",
"Chiu Wo",
""
],
[
"Harvey",
"Warwick",
""
],
[
"Lee",
"Jimmy Ho-Man",
""
],
[
"Stuckey",
"Peter J.",
""
]
]
|
cs/0412022 | Petrus H. Potgieter | Petrus H. Potgieter | Zeno machines and hypercomputation | 11 pages. First submitted in December 2004, substantially revised in
July and in November 2005. To appear in Theoretical Computer Science | null | null | null | cs.CC | null | This paper reviews the Church-Turing Thesis (or rather, theses) with
reference to their origin and application and considers some models of
"hypercomputation", concentrating on perhaps the most straight-forward option:
Zeno machines (Turing machines with accelerating clock). The halting problem is
briefly discussed in a general context and the suggestion that it is an
inevitable companion of any reasonable computational model is emphasised. It is
hinted that claims to have "broken the Turing barrier" could be toned down and
that the important and well-founded role of Turing computability in the
mathematical sciences stands unchallenged.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 12:18:05 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jul 2005 10:20:30 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Jan 2006 08:08:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Potgieter",
"Petrus H.",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.