id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0410063
Vincenzo Pallotta
Sebastian Moeller, Jan Krebber, Alexander Raake, Paula Smeele, Martin Rajman, Mirek Melichar, Vincenzo Pallotta, Gianna Tsakou, Basilis Kladis, Anestis Vovos, Jettie Hoonhout, Dietmar Schuchardt, Nikos Fakotakis, Todor Ganchev, Ilyas Potamitis
INSPIRE: Evaluation of a Smart-Home System for Infotainment Management and Device Control
4 pages
Procedings of the LREC 2004 international conference, 26-28 May 2004, Lisbon, Portugal. Pages 1603-1606
null
null
cs.HC cs.CL
null
This paper gives an overview of the assessment and evaluation methods which have been used to determine the quality of the INSPIRE smart home system. The system allows different home appliances to be controlled via speech, and consists of speech and speaker recognition, speech understanding, dialogue management, and speech output components. The performance of these components is first assessed individually, and then the entire system is evaluated in an interaction experiment with test users. Initial results of the assessment and evaluation are given, in particular with respect to the transmission channel impact on speech and speaker recognition, and the assessment of speech output for different system metaphors.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 02:17:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Moeller", "Sebastian", "" ], [ "Krebber", "Jan", "" ], [ "Raake", "Alexander", "" ], [ "Smeele", "Paula", "" ], [ "Rajman", "Martin", "" ], [ "Melichar", "Mirek", "" ], [ "Pallotta", "Vincenzo", "" ], [ "Tsakou", "Gianna", "" ], [ "Kladis", "Basilis", "" ], [ "Vovos", "Anestis", "" ], [ "Hoonhout", "Jettie", "" ], [ "Schuchardt", "Dietmar", "" ], [ "Fakotakis", "Nikos", "" ], [ "Ganchev", "Todor", "" ], [ "Potamitis", "Ilyas", "" ] ]
cs/0410064
Joze Balic
J. Balic
Intelligent Computer Numerical Control unit for machine tools
7 pages, 4 figures, 17 references
Neural-Network-Based Numerical Control for Milling Machine, Journal of Intelligent and Robotic System, Volume 40, Issue 4, Aug 2004; Pages: 343-358 (extended version)
null
null
cs.CE
null
The paper describes a new CNC control unit for machining centres with learning ability and automatic intelligent generating of NC programs on the bases of a neural network, which is built-in into a CNC unit as special device. The device performs intelligent and completely automatically the NC part programs only on the bases of 2D, 2,5D or 3D computer model of prismatic part. Intervention of the operator is not needed. The neural network for milling, drilling, reaming, threading and operations alike has learned to generate NC programs in the learning module, which is a part of intelligent CAD/CAM system.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 15:55:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Balic", "J.", "" ] ]
cs/0410066
Xiaoqin Ma
Xiaoqin Ma and Gene Cooperman
Fast Query Processing by Distributing an Index over CPU Caches
New version published at IEEE Cluster Computing 2005
null
null
null
cs.DC cs.PF
null
Data intensive applications on clusters often require requests quickly be sent to the node managing the desired data. In many applications, one must look through a sorted tree structure to determine the responsible node for accessing or storing the data. Examples include object tracking in sensor networks, packet routing over the internet, request processing in publish-subscribe middleware, and query processing in database systems. When the tree structure is larger than the CPU cache, the standard implementation potentially incurs many cache misses for each lookup; one cache miss at each successive level of the tree. As the CPU-RAM gap grows, this performance degradation will only become worse in the future. We propose a solution that takes advantage of the growing speed of local area networks for clusters. We split the sorted tree structure among the nodes of the cluster. We assume that the structure will fit inside the aggregation of the CPU caches of the entire cluster. We then send a word over the network (as part of a larger packet containing other words) in order to examine the tree structure in another node's CPU cache. We show that this is often faster than the standard solution, which locally incurs multiple cache misses while accessing each successive level of the tree.
[ { "version": "v1", "created": "Mon, 25 Oct 2004 22:23:17 GMT" }, { "version": "v2", "created": "Tue, 11 Oct 2005 15:42:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Xiaoqin", "" ], [ "Cooperman", "Gene", "" ] ]
cs/0410067
Richard Troy III
Richard M. Troy III
Computational Unification: a Vision for Connecting Researchers
Three page white-paper which was written for the December 2002 AGU meeting in San Francisco, CA. Also note that the author is Chief Scientist of Science Tools and developed a working system capable of implementing the ideas expressed in this abstract in 1997
null
null
null
cs.DC cs.CY
null
The extent to which the benefits of science can be fully realized depends critically upon the quality of the connection between researchers themselves and between researchers and members of the public. We believe that it is now possible to improve these connections on a community-wide and even world-wide basis through the use of an appropriate information management system. In this paper we explore the concepts and challenges, and propose an architecture for the implementation of such a system. "One of the greatest visions for science is a computational unification in which every researcher can interact with all other researchers through use of their own research system." "These features not only enable research collaboration on a scale never previously envisaged, they also enable sharing and dissemination of scientific knowledge to the public at large with a sophistication unparalleled in history."
[ { "version": "v1", "created": "Tue, 26 Oct 2004 18:21:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Troy", "Richard M.", "III" ] ]
cs/0410068
Zhuowei Li
Zhuowei Li and Amitabha Das
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
Submit to journal for publication
null
null
cais-tr-2004-001
cs.CR cs.AI
null
Anomaly-based intrusion detection (AID) techniques are useful for detecting novel intrusions into computing resources. One of the most successful AID detectors proposed to date is stide, which is based on analysis of system call sequences. In this paper, we present a detailed formal framework to analyze, understand and improve the performance of stide and similar AID techniques. Several important properties of stide-like detectors are established through formal proofs, and validated by carefully conducted experiments using test datasets. Finally, the framework is utilized to design two applications to improve the cost and performance of stide-like detectors which are based on sequence analysis. The first application reduces the cost of developing AID detectors by identifying the critical sections in the training dataset, and the second application identifies the intrusion context in the intrusive dataset, that helps to fine-tune the detectors. Such fine-tuning in turn helps to improve detection rate and reduce false alarm rate, thereby increasing the effectiveness and efficiency of the intrusion detectors.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 02:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Zhuowei", "" ], [ "Das", "Amitabha", "" ] ]
cs/0410069
Thomas Petermann
Jacomo Corbo and Thomas Petermann
Selfish peering and routing in the Internet
Contribution to the Proceedings of the Complex Systems Summer School 2004, organized by the Santa Fe Institute (6 pages comprising 4 figures)
null
null
null
cs.GT cond-mat.stat-mech cs.NI
null
The Internet is a loose amalgamation of independent service providers acting in their own self-interest. We examine the implications of this economic reality on peering relationships. Specifically, we consider how the incentives of the providers might determine where they choose to interconnect with each other. We consider a game where two selfish network providers must establish peering points between their respective network graphs, given knowledge of traffic conditions and a nearest-exit routing policy for out-going traffic, as well as costs based on congestion and peering connectivity. We focus on the pairwise stability equilibrium concept and use a stochastic procedure to solve for the stochastically pairwise stable configurations. Stochastically stable networks are selected for their robustness to deviations in strategy and are therefore posited as the more likely networks to emerge in a dynamic setting. We note a paucity of stochastically stable peering configurations under asymmetric conditions, particularly to unequal interdomain traffic flow, with adverse effects on system-wide efficiency. Under bilateral flow conditions, we find that as the cost associated with the establishment of peering links approaches zero, the variance in the number of peering links of stochastically pairwise stable equilibria increases dramatically.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 10:14:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Corbo", "Jacomo", "" ], [ "Petermann", "Thomas", "" ] ]
cs/0410070
Giovanni Gasparri
Giovanni Gasparri
Using image partitions in 4th Dimension
4 pages, 3 figures
null
null
null
cs.DB
null
I have plotted an image by using mathematical functions in the Database "4th Dimension". I'm going to show an alternative method to: detect which sector has been clicked; highlight it and combine it with other sectors already highlighted; store the graph information in an efficient way; load and splat image layers to reconstruct the stored graph.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 17:00:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Gasparri", "Giovanni", "" ] ]
cs/0410071
Patrick C. McGuire
Patrick C. McGuire, Jens Ormo, Enrique Diaz-Martinez, Jose Antonio Rodriguez-Manfredi, Javier Gomez-Elvira, Helge Ritter, Markus Oesker, Joerg Ontrup, (Centro de Astrobiologia, Madrid; University of Bielefeld)
The Cyborg Astrobiologist: First Field Experience
29 pages, 10 figures (in press)
Int.J.Astrobiol. 3 (2004) 189-207
10.1017/S147355040500220X
null
cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO cs.SE q-bio.NC
null
We present results from the first geological field tests of the `Cyborg Astrobiologist', which is a wearable computer and video camcorder system that we are using to test and train a computer-vision system towards having some of the autonomous decision-making capabilities of a field-geologist and field-astrobiologist. The Cyborg Astrobiologist platform has thus far been used for testing and development of these algorithms and systems: robotic acquisition of quasi-mosaics of images, real-time image segmentation, and real-time determination of interesting points in the image mosaics. The hardware and software systems function reliably, and the computer-vision algorithms are adequate for the first field tests. In addition to the proof-of-concept aspect of these field tests, the main result of these field tests is the enumeration of those issues that we can improve in the future, including: first, detection and accounting for shadows caused by 3D jagged edges in the outcrop; second, reincorporation of more sophisticated texture-analysis algorithms into the system; third, creation of hardware and software capabilities to control the camera's zoom lens in an intelligent manner; and fourth, development of algorithms for interpretation of complex geological scenery. Nonetheless, despite these technical inadequacies, this Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer and its computer-vision algorithms, has demonstrated its ability of finding genuinely interesting points in real-time in the geological scenery, and then gathering more information about these interest points in an automated manner.
[ { "version": "v1", "created": "Wed, 27 Oct 2004 09:14:01 GMT" } ]
2007-05-23T00:00:00
[ [ "McGuire", "Patrick C.", "" ], [ "Ormo", "Jens", "" ], [ "Diaz-Martinez", "Enrique", "" ], [ "Rodriguez-Manfredi", "Jose Antonio", "" ], [ "Gomez-Elvira", "Javier", "" ], [ "Ritter", "Helge", "" ], [ "Oesker", "Markus", "" ], [ "Ontrup", "Joerg", "" ] ]
cs/0410072
Igor Potapov
Alexei Lisitsa, Igor Potapov
Temporal logic with predicate abstraction
14 pages, 4 figures
null
null
null
cs.LO cs.CL
null
A predicate linear temporal logic LTL_{\lambda,=} without quantifiers but with predicate abstraction mechanism and equality is considered. The models of LTL_{\lambda,=} can be naturally seen as the systems of pebbles (flexible constants) moving over the elements of some (possibly infinite) domain. This allows to use LTL_{\lambda,=} for the specification of dynamic systems using some resources, such as processes using memory locations, mobile agents occupying some sites, etc. On the other hand we show that LTL_{\lambda,=} is not recursively axiomatizable and, therefore, fully automated verification of LTL_{\lambda,=} specifications is not, in general, possible.
[ { "version": "v1", "created": "Wed, 27 Oct 2004 17:21:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Lisitsa", "Alexei", "" ], [ "Potapov", "Igor", "" ] ]
cs/0410073
Viktor Kuncak
Viktor Kuncak, Martin Rinard
On Spatial Conjunction as Second-Order Logic
16 pages
null
null
MIT CSAIL 970
cs.LO cs.PL cs.SE
null
Spatial conjunction is a powerful construct for reasoning about dynamically allocated data structures, as well as concurrent, distributed and mobile computation. While researchers have identified many uses of spatial conjunction, its precise expressive power compared to traditional logical constructs was not previously known. In this paper we establish the expressive power of spatial conjunction. We construct an embedding from first-order logic with spatial conjunction into second-order logic, and more surprisingly, an embedding from full second order logic into first-order logic with spatial conjunction. These embeddings show that the satisfiability of formulas in first-order logic with spatial conjunction is equivalent to the satisfiability of formulas in second-order logic. These results explain the great expressive power of spatial conjunction and can be used to show that adding unrestricted spatial conjunction to a decidable logic leads to an undecidable logic. As one example, we show that adding unrestricted spatial conjunction to two-variable logic leads to undecidability. On the side of decidability, the embedding into second-order logic immediately implies the decidability of first-order logic with a form of spatial conjunction over trees. The embedding into spatial conjunction also has useful consequences: because a restricted form of spatial conjunction in two-variable logic preserves decidability, we obtain that a correspondingly restricted form of second-order quantification in two-variable logic is decidable. The resulting language generalizes the first-order theory of boolean algebra over sets and is useful in reasoning about the contents of data structures in object-oriented languages.
[ { "version": "v1", "created": "Thu, 28 Oct 2004 15:00:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuncak", "Viktor", "" ], [ "Rinard", "Martin", "" ] ]
cs/0410075
Serban E. Vlad
Serban E. Vlad
Some first thoughts on the stability of the asynchronous systems
12 pages, conference
The 12-th Conference on Applied and Industrial Mathematics CAIM 2004, University of Pitesti, October 15-17, 2004
null
null
cs.GL
null
The (non-initialized, non-deterministic) asynchronous systems (in the input-output sense) are multi-valued functions from m-dimensional signals to sets of n-dimensional signals, the concept being inspired by the modeling of the asynchronous circuits. Our purpose is to state the problem of the their stability.
[ { "version": "v1", "created": "Fri, 29 Oct 2004 12:08:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0411001
Worytkiewicz Krzysztof
Krzysztof Worytkiewicz
Synchronization from a Categorical Perspective
null
null
null
null
cs.PL cs.DM
null
We introduce a notion of synchronization for higher-dimensional automata, based on coskeletons of cubical sets. Categorification transports this notion to the setting of categorical transition systems. We apply the results to study the semantics of an imperative programming language with message-passing.
[ { "version": "v1", "created": "Mon, 1 Nov 2004 16:00:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Worytkiewicz", "Krzysztof", "" ] ]
cs/0411002
Alex Vinokur
Alex Vinokur
Fibonacci-Like Polynomials Produced by m-ary Huffman Codes for Absolutely Ordered Sequences
10 pages, 2 tables
null
null
null
cs.DM math.NT
null
Fibonacci-like polynomials produced by m-ary Huffman codes for absolutely ordered sequences have been described.
[ { "version": "v1", "created": "Mon, 1 Nov 2004 17:03:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Vinokur", "Alex", "" ] ]
cs/0411004
Gianluca Argentini
Gianluca Argentini
Computational Aspects of a Numerical Model for Combustion Flow
9 pages, 4 figures; Talk at Workshop 2004 on Science and Applications of Advanced Computing Paradigms, Centre of Excellence MIUR (prof. Gianfranco Bilardi), Universita' di Padova, Department of Information Engineering, October 28-29, 2004
null
null
null
cs.NA physics.comp-ph
null
A computational method for numeric resolution of a PDEs system, based on a Finite Differences schema integrated by interpolations of partial results, and an estimate of the error of its solution respect to the normal FD solution.
[ { "version": "v1", "created": "Tue, 2 Nov 2004 11:37:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0411005
Manoj Kumar
Sunder Lal and Manoj Kumar
A Directed Threshold - Signature Scheme
10 Pages, No figures
null
null
null
cs.CR
null
Directed signature is the solution of such problems when the signed message contains information sensitive to the signature receiver. Generally, in many application of directed signature, the signer is generally a single person. But when the message is on behalf of an organization, a valid sensitive message may require the approval of several people. Threshold signature schemes are used to solve these problems. This paper presents a threshold directed signature scheme.
[ { "version": "v1", "created": "Tue, 2 Nov 2004 13:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "" ], [ "Kumar", "Manoj", "" ] ]
cs/0411007
Benoit Masson
Julien Cervelle (IGM), Enrico Formenti (I3S), Benoit Masson (I3S)
Basic properties for sand automata
submitted to STACS 2005
null
null
null
cs.CC
null
We prove several results about the relations between injectivity and surjectivity for sand automata. Moreover, we begin the exploration of the dynamical behavior of sand automata proving that the property of nilpotency is undecidable. We believe that the proof technique used for this last result might reveal useful for many other results in this context.
[ { "version": "v1", "created": "Thu, 4 Nov 2004 12:33:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Cervelle", "Julien", "", "IGM" ], [ "Formenti", "Enrico", "", "I3S" ], [ "Masson", "Benoit", "", "I3S" ] ]
cs/0411009
Serban Vlad E.
Serban E. Vlad
The equations of the ideal latches
16 pages, 18 figures, conference
The 12-th Conference on Applied and Industrial Mathematics CAIM 2004, University of Pitesti, October 15-17, 2004
null
null
cs.GL
null
The latches are simple circuits with feedback from the digital electrical engineering. We have included in our work the C element of Muller, the RS latch, the clocked RS latch, the D latch and also circuits containing two interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the JK flip-flop, the T flip-flop. The purpose of this study is to model with equations the previous circuits, considered to be ideal, i.e. non-inertial. The technique of analysis is the pseudoboolean differential calculus.
[ { "version": "v1", "created": "Fri, 5 Nov 2004 12:38:05 GMT" }, { "version": "v2", "created": "Mon, 8 Nov 2004 07:17:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0411010
Ricardo Corin
Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter Hartel
A Trace Logic for Local Security Properties
New version
null
null
null
cs.CR
null
We propose a new simple \emph{trace} logic that can be used to specify \emph{local security properties}, i.e. security properties that refer to a single participant of the protocol specification. Our technique allows a protocol designer to provide a formal specification of the desired security properties, and integrate it naturally into the design process of cryptographic protocols. Furthermore, the logic can be used for formal verification. We illustrate the utility of our technique by exposing new attacks on the well studied protocol TMN.
[ { "version": "v1", "created": "Fri, 5 Nov 2004 14:39:03 GMT" }, { "version": "v2", "created": "Tue, 30 Nov 2004 17:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Corin", "Ricardo", "" ], [ "Durante", "Antonio", "" ], [ "Etalle", "Sandro", "" ], [ "Hartel", "Pieter", "" ] ]
cs/0411013
Timur Friedman
Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella
Efficient Algorithms for Large-Scale Topology Discovery
23 pages
null
null
null
cs.NI
null
There is a growing interest in discovery of internet topology at the interface level. A new generation of highly distributed measurement systems is currently being deployed. Unfortunately, the research community has not examined the problem of how to perform such measurements efficiently and in a network-friendly manner. In this paper we make two contributions toward that end. First, we show that standard topology discovery methods (e.g., skitter) are quite inefficient, repeatedly probing the same interfaces. This is a concern, because when scaled up, such methods will generate so much traffic that they will begin to resemble DDoS attacks. We measure two kinds of redundancy in probing (intra- and inter-monitor) and show that both kinds are important. We show that straightforward approaches to addressing these two kinds of redundancy must take opposite tacks, and are thus fundamentally in conflict. Our second contribution is to propose and evaluate Doubletree, an algorithm that reduces both types of redundancy simultaneously on routers and end systems. The key ideas are to exploit the tree-like structure of routes to and from a single point in order to guide when to stop probing, and to probe each path by starting near its midpoint. Our results show that Doubletree can reduce both types of measurement load on the network dramatically, while permitting discovery of nearly the same set of nodes and links. We then show how to enable efficient communication between monitors through the use of Bloom filters.
[ { "version": "v1", "created": "Sun, 7 Nov 2004 21:39:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Raoult", "Philippe", "" ], [ "Friedman", "Timur", "" ], [ "Crovella", "Mark", "" ] ]
cs/0411015
Ziny Flikop
Ziny Flikop
Bounded Input Bounded Predefined Control Bounded Output
8 pages, 6 figures
null
null
null
cs.AI
null
The paper is an attempt to generalize a methodology, which is similar to the bounded-input bounded-output method currently widely used for the system stability studies. The presented earlier methodology allows decomposition of input space into bounded subspaces and defining for each subspace its bounding surface. It also defines a corresponding predefined control, which maps any point of a bounded input into a desired bounded output subspace. This methodology was improved by providing a mechanism for the fast defining a bounded surface. This paper presents enhanced bounded-input bounded-predefined-control bounded-output approach, which provides adaptability feature to the control and allows transferring of a controlled system along a suboptimal trajectory.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 01:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Flikop", "Ziny", "" ] ]
cs/0411017
Srikant Sharma
Srikant Sharma
Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective
null
null
null
null
cs.NI
null
Wireless LANs have achieved a tremendous amount of growth in recent years. Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN technology can be cited as the most prominent technology today. Despite being widely deployed, 802.11b cannot be termed as a well matured technology. Although 802.11b is adequate for basic connectivity and packet switching, It is evident that there is ample scope for its improvement in areas like quality of service, fairness, performance, security, etc. In this survey report, we identify and argue that the Medium Access Controller for 802.11b networks is the prime area for these improvements. To enunciate our claims we highlight some of the quality of service, fairness, and performance issues related to 802.11b MAC. We also describe and analyze some of the current research aimed at addressing these issues. We then propose a novel scheme called the Intelligent Collision Avoidance, seeking to enhance the MAC to address some of the performance issues in 802.11b and similar networks.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 19:32:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharma", "Srikant", "" ] ]
cs/0411018
Vedran Kordic
Pedro U. Lima & Luis M. M. Custodio
Artificial Intelligence and Systems Theory: Applied to Cooperative Robots
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 September 2004, pp.141-148
null
null
cs.RO cs.AI
null
This paper describes an approach to the design of a population of cooperative robots based on concepts borrowed from Systems Theory and Artificial Intelligence. The research has been developed under the SocRob project, carried out by the Intelligent Systems Laboratory at the Institute for Systems and Robotics - Instituto Superior Tecnico (ISR/IST) in Lisbon. The acronym of the project stands both for "Society of Robots" and "Soccer Robots", the case study where we are testing our population of robots. Designing soccer robots is a very challenging problem, where the robots must act not only to shoot a ball towards the goal, but also to detect and avoid static (walls, stopped robots) and dynamic (moving robots) obstacles. Furthermore, they must cooperate to defeat an opposing team. Our past and current research in soccer robotics includes cooperative sensor fusion for world modeling, object recognition and tracking, robot navigation, multi-robot distributed task planning and coordination, including cooperative reinforcement learning in cooperative and adversarial environments, and behavior-based architectures for real time task execution of cooperating robot teams.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:41:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Lima", "Pedro U.", "" ], [ "Custodio", "Luis M. M.", "" ] ]
cs/0411020
Vedran Kordic
A. Albagul and Wahyudi
Dynamic Modelling and Adaptive Traction Control for Mobile Robots
null
International Journal of Advanced Robotic Systems, Volume 1, Number 3, September 2004, pp.149-154
null
null
cs.RO
null
Mobile robots have received a great deal of research in recent years. A significant amount of research has been published in many aspects related to mobile robots. Most of the research is devoted to design and develop some control techniques for robot motion and path planning. A large number of researchers have used kinematic models to develop motion control strategy for mobile robots. Their argument and assumption that these models are valid if the robot has low speed, low acceleration and light load. However, dynamic modelling of mobile robots is very important as they are designed to travel at higher speed and perform heavy duty work. This paper presents and discusses a new approach to develop a dynamic model and control strategy for wheeled mobile robot which I modelled as a rigid body that roles on two wheels and a castor. The motion control strategy consists of two levels. The first level is dealing with the dynamic of the system and denoted as Low level controller. The second level is developed to take care of path planning and trajectory generation.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:44:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Albagul", "A.", "" ], [ "Wahyudi", "", "" ] ]
cs/0411021
Vedran Kordic
Luo Ronghua & Hong Bingrong
Coevolution Based Adaptive Monte Carlo Localization (CEAMCL)
null
International Journal of Advanced Robotic Systems, Volume 1, Number 3, September 2004, pp. 183-190
null
null
cs.RO
null
An adaptive Monte Carlo localization algorithm based on coevolution mechanism of ecological species is proposed. Samples are clustered into species, each of which represents a hypothesis of the robots pose. Since the coevolution between the species ensures that the multiple distinct hypotheses can be tracked stably, the problem of premature convergence when using MCL in highly symmetric environments can be solved. And the sample size can be adjusted adaptively over time according to the uncertainty of the robots pose by using the population growth model. In addition, by using the crossover and mutation operators in evolutionary computation, intra-species evolution can drive the samples move towards the regions where the desired posterior density is large. So a small size of samples can represent the desired density well enough to make precise localization. The new algorithm is termed coevolution based adaptive Monte Carlo localization (CEAMCL). Experiments have been carried out to prove the efficiency of the new localization algorithm.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:45:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ronghua", "Luo", "" ], [ "Bingrong", "Hong", "" ] ]
cs/0411022
Vedran Kordic
Richard Szabo
Topological Navigation of Simulated Robots using Occupancy Grid
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.201-206
null
null
cs.RO cs.AI
null
Formerly I presented a metric navigation method in the Webots mobile robot simulator. The navigating Khepera-like robot builds an occupancy grid of the environment and explores the square-shaped room around with a value iteration algorithm. Now I created a topological navigation procedure based on the occupancy grid process. The extension by a skeletonization algorithm results a graph of important places and the connecting routes among them. I also show the significant time profit gained during the process.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:22:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Szabo", "Richard", "" ] ]
cs/0411023
Vedran Kordic
Changda Wang, Xianyi Chen, Xibin Zhao & Shiguang Ju
Design and Implementation of a General Decision-making Model in RoboCup Simulation
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.207-112
null
null
cs.RO
null
The study of the collaboration, coordination and negotiation among different agents in a multi-agent system (MAS) has always been the most challenging yet popular in the research of distributed artificial intelligence. In this paper, we will suggest for RoboCup simulation, a typical MAS, a general decision-making model, rather than define a different algorithm for each tactic (e.g. ball handling, pass, shoot and interception, etc.) in soccer games as most RoboCup simulation teams did. The general decision-making model is based on two critical factors in soccer games: the vertical distance to the goal line and the visual angle for the goalpost. We have used these two parameters to formalize the defensive and offensive decisions in RoboCup simulation and the results mentioned above had been applied in NOVAURO, original name is UJDB, a RoboCup simulation team of Jiangsu University, whose decision-making model, compared with that of Tsinghua University, the world champion team in 2001, is a universal model and easier to be implemented.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:24:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Changda", "" ], [ "Chen", "Xianyi", "" ], [ "Zhao", "Xibin", "" ], [ "Ju", "Shiguang", "" ] ]
cs/0411024
Vedran Kordic
Alex Ellery
Space Robotics Part 2: Space-based Manipulators
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.213-216
null
null
cs.RO
null
In this second of three short papers, I introduce some of the basic concepts of space robotics with an emphasis on some specific challenging areas of research that are peculiar to the application of robotics to space infrastructure development. The style of these short papers is pedagogical and the concepts in this paper are developed from fundamental manipulator robotics. This second paper considers the application of space manipulators to on-orbit servicing (OOS), an application which has considerable commercial application. I provide some background to the notion of robotic on-orbit servicing and explore how manipulator control algorithms may be modified to accommodate space manipulators which operate in the micro-gravity of space.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Ellery", "Alex", "" ] ]
cs/0411025
Vedran Kordic
Yoseph Bar-Cohen
Bionic Humans Using EAP as Artificial Muscles Reality and Challenges
null
International Journal of Advanced Robotic Systems, ISSN 1729-8806, Volume 1, Number 3 (2004), pp.217-222
null
null
cs.RO cs.AI
null
For many years, the idea of a human with bionic muscles immediately conjures up science fiction images of a TV series superhuman character that was implanted with bionic muscles and portrayed with strength and speed far superior to any normal human. As fantastic as this idea may seem, recent developments in electroactive polymers (EAP) may one day make such bionics possible. Polymers that exhibit large displacement in response to stimulation that is other than electrical signal were known for many years. Initially, EAP received relatively little attention due to their limited actuation capability. However, in the recent years, the view of the EAP materials has changed due to the introduction of effective new materials that significantly surpassed the capability of the widely used piezoelectric polymer, PVDF. As this technology continues to evolve, novel mechanisms that are biologically inspired are expected to emerge. EAP materials can potentially provide actuation with lifelike response and more flexible configurations. While further improvements in performance and robustness are still needed, there already have been several reported successes. In recognition of the need for cooperation in this multidisciplinary field, the author initiated and organized a series of international forums that are leading to a growing number of research and development projects and to great advances in the field. In 1999, he challenged the worldwide science and engineering community of EAP experts to develop a robotic arm that is actuated by artificial muscles to win a wrestling match against a human opponent. In this paper, the field of EAP as artificial muscles will be reviewed covering the state of the art, the challenges and the vision for the progress in future years.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:32:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Bar-Cohen", "Yoseph", "" ] ]
cs/0411026
Boris Tylevich
Boris Mark Tylevich (Moscow Institute of Physics and Technology, Moscow, Russia)
A Search Relevancy Tuning Method Using Expert Results Content Evaluation
10 pages, 2 figures
null
null
null
cs.IR
null
The article presents an online relevancy tuning method using explicit user feedback. The author developed and tested a method of words' weights modification based on search result evaluation by user. User decides whether the result is useful or not after inspecting the full result content. The experiment proved that the constantly accumulated words weights base leads to better search quality in a specified data domain. The author also suggested future improvements of the method.
[ { "version": "v1", "created": "Mon, 8 Nov 2004 20:49:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Tylevich", "Boris Mark", "", "Moscow Institute of Physics and Technology,\n Moscow, Russia" ] ]
cs/0411027
Vlady Ravelomanana
Vlady Ravelomanana (LIPN)
Extremal Properties of Three Dimensional Sensor Networks with Applications
null
IEEE Transactions on Mobile Computing Vol 3 (2004) pages 246--257
null
null
cs.DS cs.DC cs.DM
null
In this paper, we analyze various critical transmitting/sensing ranges for connectivity and coverage in three-dimensional sensor networks. As in other large-scale complex systems, many global parameters of sensor networks undergo phase transitions: For a given property of the network, there is a critical threshold, corresponding to the minimum amount of the communication effort or power expenditure by individual nodes, above (resp. below) which the property exists with high (resp. a low) probability. For sensor networks, properties of interest include simple and multiple degrees of connectivity/coverage. First, we investigate the network topology according to the region of deployment, the number of deployed sensors and their transmitting/sensing ranges. More specifically, we consider the following problems: Assume that $n$ nodes, each capable of sensing events within a radius of $r$, are randomly and uniformly distributed in a 3-dimensional region $\mathcal{R}$ of volume $V$, how large must the sensing range be to ensure a given degree of coverage of the region to monitor? For a given transmission range, what is the minimum (resp. maximum) degree of the network? What is then the typical hop-diameter of the underlying network? Next, we show how these results affect algorithmic aspects of the network by designing specific distributed protocols for sensor networks.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 09:10:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0411028
Ignatios Souvatzis
Ignatios Souvatzis
A machine-independent port of the SR language run-time system to the NetBSD operating system
presented at 3rd European BSD Conference, Karlsruhe, Germany, 2004 Oct. 29-31; 4 pages
Juergen Egeling (Ed.): Proceedings of the 3rd European BSD Conference, Karlsruhe, Germany 2004, p.181
null
null
cs.DC cs.PL
null
SR (synchronizing resources) is a PASCAL - style language enhanced with constructs for concurrent programming developed at the University of Arizona in the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of Multithreaded, Parallel, and Distributed Programming) is its successor, providing the same language primitives with a different syntax. The run-time system (in theory, identical) of both languages provides the illusion of a multiprocessor machine on a single single- or multi- CPU Unix-like system or a (local area) network of Unix-like machines. Chair V of the Computer Science Department of the University of Bonn is operating a laboratory for a practical course in parallel programming consisting of computing nodes running NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and MPD for this, too. As the original language distributions are only targeted at a few commercial Unix systems, some porting effort is needed, outlined in the SR porting guide. The integrated POSIX threads support of NetBSD-2.0 should allow us to use library primitives provided for NetBSD's phtread system to implement the primitives needed by the SR run-time system, thus implementing 13 target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC, Sparc, 32-bit Intel and 64 bit AMD CPUs. This paper describes work in progress.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 12:39:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Souvatzis", "Ignatios", "" ] ]
cs/0411029
Virgile Mogbil
Christophe Fouquere and Virgile Mogbil
Modules and Logic Programming
null
null
null
null
cs.LO
null
We study conditions for a concurrent construction of proof-nets in the framework developed by Andreoli in recent papers. We define specific correctness criteria for that purpose. We first study closed modules (i.e. validity of the execution of a logic program), then extend the criterion to open modules (i.e. validity during the execution) distinguishing criteria for acyclicity and connectability in order to allow incremental verification.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 14:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Fouquere", "Christophe", "" ], [ "Mogbil", "Virgile", "" ] ]
cs/0411030
Paolo D'Arco
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, and Ljupco Kocarev
Security of public key cryptosystems based on Chebyshev Polynomials
Submitted for publication
null
null
null
cs.CR
null
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries if the cryptosystem is used for signing messages. Then, we point out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem, are not secure due to the aforementioned attack. We close the paper by discussing the issues and the possibilities of constructing public key cryptosystems on real numbers.
[ { "version": "v1", "created": "Wed, 10 Nov 2004 15:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Bergamo", "Pina", "" ], [ "D'Arco", "Paolo", "" ], [ "De Santis", "Alfredo", "" ], [ "Kocarev", "Ljupco", "" ] ]
cs/0411032
Riccardo Pucella
Riccardo Pucella
Logic Column 10: Specifying Confidentiality
12 pages
SIGACT News, 35(4), pp. 72-83, 2004
null
null
cs.LO
null
This article illustrates the use of a logical specification language to capture various forms of confidentiality properties used in the security literature.
[ { "version": "v1", "created": "Thu, 11 Nov 2004 19:09:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0411033
Mircea Alexandru Popescu Moscu
Mircea Alexandru Popescu Moscu
On Invariance and Convergence in Time Complexity theory
null
null
null
null
cs.CC
null
This article introduces three invariance principles under which P is different from NP. In the second part a theorem of convergence is proven. This theorem states that for any language L there exists an infinite sequence of languages from O(n) that converges to L.
[ { "version": "v1", "created": "Thu, 11 Nov 2004 21:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Moscu", "Mircea Alexandru Popescu", "" ] ]
cs/0411035
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A FP-Tree Based Approach for Mining All Strongly Correlated Pairs without Candidate Generation
null
null
null
TR-04-06
cs.DB cs.AI
null
Given a user-specified minimum correlation threshold and a transaction database, the problem of mining all-strong correlated pairs is to find all item pairs with Pearson's correlation coefficients above the threshold . Despite the use of upper bound based pruning technique in the Taper algorithm [1], when the number of items and transactions are very large, candidate pair generation and test is still costly. To avoid the costly test of a large number of candidate pairs, in this paper, we propose an efficient algorithm, called Tcp, based on the well-known FP-tree data structure, for mining the complete set of all-strong correlated item pairs. Our experimental results on both synthetic and real world datasets show that, Tcp's performance is significantly better than that of the previously developed Taper algorithm over practical ranges of correlation threshold specifications.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 12:02:17 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0411037
Tetsushi Matsui
Tetsushi Matsui
A Note on Bulk Quantum Turing Machine
8 pages
null
null
null
cs.CC
null
Recently, among experiments for realization of quantum computers, NMR quantum computers have achieved the most impressive succession. There is a model of the NMR quantum computation,namely Atsumi and Nishino's bulk quantum Turing Machine. It assumes, however, an unnatural assumption with quantum mechanics. We, then, define a more natural and quantum mechanically realizable modified bulk quantum Turing Machine, and show its computational ability by comparing complexity classes with quantum Turing Machine's counter part.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 18:56:15 GMT" }, { "version": "v2", "created": "Sat, 13 Nov 2004 01:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Matsui", "Tetsushi", "" ] ]
cs/0411038
Shajee Mohan B. S.
B.S. Shajeemohan
Impact of IT on Higher education Through Continuing Education
null
null
null
null
cs.CY
null
Information Technology is emerging to be the technology of 21st century. The paradigm shift from industrial society to information society had already become a reality! It is indeed high time to think about integrating IT in all facets of education -- may it be in secondary level, or be it in reskilling the employed ones. This paper discusses various issues in incorporating IT in various levels of education, and the need to think about a task force to counter the so-called slow down and recession in IT industry. The opportunities for aspiring IT professionals were also discussed. The importance of reskilling as a continuing education programme to make the people aware of the changing trends in IT was also discussed.
[ { "version": "v1", "created": "Mon, 15 Nov 2004 09:45:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Shajeemohan", "B. S.", "" ] ]
cs/0411039
Ioan Raicu
Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally
Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness
Published at ISCA 17th International Conference on Computers and Their Applications, CATA 2002, April 2002, San Francisco, California, USA. 6 pages
null
null
null
cs.NI
null
Wireless sensor networks are finally becoming a reality. In this paper, we present a scalable architecture for using wireless sensor networks in combination with wireless Ethernet networks to provide a complete end-to-end solution to narrow the gap between the low-level information and context awareness. We developed and implemented a complete proximity detector in order to give a wearable computer, such as a PDA, location context. Since location is only one element of contextawareness, we pursued utilizing photo sensors and temperature sensors in learning as much as possible about the environment. We used the TinyOS RF Motes as our test bed WSN (Wireless Sensor Network), 802.11 compatible hardware as our wireless Ethernet network, and conventional PCs and wired 802.3 networks to build the upper levels of the architecture.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:52:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ], [ "Richter", "Owen", "" ], [ "Schwiebert", "Loren", "" ], [ "Zeadally", "Sherali", "" ] ]
cs/0411040
Ioan Raicu
Ioan Raicu
Efficient Even Distribution of Power Consumption in Wireless Sensor Networks
Published at ISCA 18th International Conference on Computers and Their Applications, CATA 2003, March 2003, Honolulu, Hawaii, USA. 4 pages
null
null
null
cs.NI
null
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. We investigate a new routing algorithm that uses diffusion in order to achieve relatively even power dissipation throughout a wireless sensor network by making good local decisions. We leverage from concepts of peer-to-peer networks in which the system acts completely decentralized and all nodes in the network are equal peers. Our algorithm utilizes the node load, power levels, and spatial information in order to make the optimal routing decision. According to our preliminary experimental results, our proposed algorithm performs well according to its goals.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:55:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ] ]
cs/0411041
Sabu Thampu m
Sabu .M Thampi, K. Chandra Sekaran
Content Based Image Retrieval with Mobile Agents and Steganography
6 pages, 10 figures
null
null
null
cs.CR
null
In this paper we present an image retrieval system based on Gabor texture features, steganography, and mobile agents.. By employing the information hiding technique, the image attributes can be hidden in an image without degrading the image quality. Thus the image retrieval process becomes simple. Java based mobile agents manage the query phase of the system. Based on the simulation results, the proposed system not only shows the efficiency in hiding the attributes but also provides other advantages such as: (1) fast transmission of the retrieval image to the receiver, (2) searching made easy.
[ { "version": "v1", "created": "Mon, 15 Nov 2004 08:53:15 GMT" }, { "version": "v2", "created": "Mon, 19 Jun 2006 08:48:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Thampi", "Sabu . M", "" ], [ "Sekaran", "K. Chandra", "" ] ]
cs/0411042
Ioan Raicu
Ioan Raicu
An Empirical Analysis of Internet Protocol Version 6 (IPv6)
Master Thesis, May 2002, Computer Science Department, Wayne State University, Detroit, Michigan, USA, 146 pages
null
null
null
cs.NI cs.PF
null
Although the current Internet Protocol known as IPv4 has served its purpose for over 20 years, its days are numbered. With IPv6 reaching a mature enough level, there is a need to evaluate the performance benefits or drawbacks that the new IPv6 protocol will have in comparison to the well established IPv4 protocol. Theoretically, the overhead between the two different protocols should be directly proportional to the difference in the packet's header size, however according to our findings, the empirical performance difference between IPv4 and IPv6, especially when the transition mechanisms are taken into consideration, is much larger than anticipated. We first examine the performance of each protocol independently. We then examined two transition mechanisms which perform the encapsulation at various points in the network: host-to-host and router-to-router (tunneling). Our experiments were conducted using two dual stack (IPv4/IPv6) routers using end nodes running both Windows 2000 and Solaris 8.0 in order to compare two different IPv6 implementations side by side. Our tests were written in C++ and utilized metrics such as latency, throughput, CPU utilization, socket creation time, socket connection time, web server simulation, and a video client/server application for TCP/UDP in IPv4/IPv6 under both Windows 2000 and Solaris 8.0. Our empirical evaluation proved that IPv6 is not yet a mature enough technology and that it is still years away from having consistent and good enough implementations, as the performance of IPv6 in many cases proved to be significantly worse than IPv4.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:31:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ] ]
cs/0411043
Ioan Raicu
Ioan Raicu, Loren Schwiebert, Scott Fowler, Sandeep K.S. Gupta
e3D: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks
Accepted for publication at IEEE ISSNIP 2004 (The International Conference on Intelligent Sensors, Sensor Networks and Information Processing), Melbourne, Australia, December 2004. 6 pages
null
null
null
cs.NI
null
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. Any communication protocol that involves synchronization of peer nodes incurs some overhead for setting up the communication. We introduce a new algorithm, e3D (energy-efficient Distributed Dynamic Diffusion routing algorithm), and compare it to two other algorithms, namely directed, and random clustering communication. We take into account the setup costs and analyze the energy-efficiency and the useful lifetime of the system. In order to better understand the characteristics of each algorithm and how well e3D really performs, we also compare e3D with its optimum counterpart and an optimum clustering algorithm. The benefit of introducing these ideal algorithms is to show the upper bound on performance at the cost of an astronomical prohibitive synchronization costs. We compare the algorithms in terms of system lifetime, power dissipation distribution, cost of synchronization, and simplicity of the algorithm. Our simulation results show that e3D performs comparable to its optimal counterpart while having significantly less overhead.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:40:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ], [ "Schwiebert", "Loren", "" ], [ "Fowler", "Scott", "" ], [ "Gupta", "Sandeep K. S.", "" ] ]
cs/0411044
Ioan Raicu
Ioan Raicu
Routing Algorithms for Wireless Sensor Networks
Poster at Grace Hopper Celebration of Women in Computing 2002, GHC2002, October 2002, British Columbia, Canada
null
null
null
cs.NI
null
Our contribution in this paper is e3D, a diffusion based routing protocol that prolongs the system lifetime, evenly distributes the power dissipation throughout the network, and incurs minimal overhead for synchronizing communication. We compare e3D with other algorithms in terms of system lifetime, power dissipation distribution, cost of synchronization, and simplicity of the algorithm.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:42:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Raicu", "Ioan", "" ] ]
cs/0411045
Catalin Dumitrescu
Catalin Dumitrescu, Ian Foster
Usage Policy-based CPU Sharing in VOs
null
null
null
null
cs.DC
null
Resource sharing within Grid collaborations usually implies specific sharing mechanisms at participating sites. Challenging policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Resource owners may wish to grant to one or more VOs the right to use certain resources subject to local policy and service level agreements, and each VO may then wish to use those resources subject to VO policy. Thus, we must address the question of what usage policies (UPs) should be considered for resource sharing in VOs. As a first step in addressing this question, we develop and evaluate different UP scenarios within a specialized context that mimics scientific Grids within which the resources to be shared are computers. We also present a UP architecture and define roles and functions for scheduling resources in such grid environments while satisfying resource owner policies.
[ { "version": "v1", "created": "Fri, 12 Nov 2004 22:48:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Dumitrescu", "Catalin", "" ], [ "Foster", "Ian", "" ] ]
cs/0411046
Jesse Bridgewater
Jesse S. A. Bridgewater, P. Oscar Boykin and Vwani P. Roychowdhury
Balanced Overlay Networks (BON): Decentralized Load Balancing via Self-Organized Random Networks
13 pages, 12 figures. Draft submitted to IEEE TPDS
null
null
null
cs.DC
null
We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node's available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-organized, with each node managing its in-degree and local connectivity via random-walk sampling. Assignment of incoming jobs to nodes with the most free resources is also accomplished by sampling the nodes via short random walks. Extensive simulations show that the resulting highly dynamic and self-organized graph structure can efficiently balance computational load throughout large-scale networks. These simulations cover a wide spectrum of cases, including significant heterogeneity in available computing resources and high burstiness in incoming load. We provide analytical results that prove BON's scalability for truly large-scale networks: in particular we show that under certain ideal conditions, the network structure converges to Erdos-Renyi (ER) random graphs; our simulation results, however, show that the algorithm does much better, and the structures seem to approach the ideal case of d-regular random graphs. We also make a connection between highly-loaded BONs and the well-known ball-bin randomized load balancing framework.
[ { "version": "v1", "created": "Mon, 15 Nov 2004 20:05:00 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 09:43:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Bridgewater", "Jesse S. A.", "" ], [ "Boykin", "P. Oscar", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
cs/0411050
Darran Nathan
Darran Nathan, Ralf Clemens
Utilizing Reconfigurable Hardware Processors via Grid Services
3 pages, 8 figures
null
null
null
cs.DC cs.AR
null
Computational grids typically consist of nodes utilizing ordinary processors such as the Intel Pentium. Field Programmable Gate Arrays (FPGAs) are able to perform certain compute-intensive tasks very well due to their inherent parallel architecture, often resulting in orders of magnitude speedups. This paper explores how FPGAs can be transparently exposed for remote use via grid services, by integrating the Proteus Software Platform with the Globus Toolkit 3.0.
[ { "version": "v1", "created": "Tue, 16 Nov 2004 01:49:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Nathan", "Darran", "" ], [ "Clemens", "Ralf", "" ] ]
cs/0411051
Timur Friedman
Jeremie Leguay and Matthieu Latapy and Timur Friedman and Kave Salamatian
Describing and Simulating Internet Routes
13 pages
null
null
null
cs.NI
null
This paper introduces relevant statistics for the description of routes in the internet, seen as a graph at the interface level. Based on the observed properties, we propose and evaluate methods for generating artificial routes suitable for simulation purposes. The work in this paper is based upon a study of over seven million route traces produced by CAIDA's skitter infrastructure.
[ { "version": "v1", "created": "Tue, 16 Nov 2004 03:43:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Leguay", "Jeremie", "" ], [ "Latapy", "Matthieu", "" ], [ "Friedman", "Timur", "" ], [ "Salamatian", "Kave", "" ] ]
cs/0411052
Olivier Mazet
H. Soula, G. Beslon, O. Mazet
Spontaneous Dynamics of Asymmetric Random Recurrent Spiking Neural Networks
28 pages, 7 figures
null
null
null
cs.NE math.PR
null
We study in this paper the effect of an unique initial stimulation on random recurrent networks of leaky integrate and fire neurons. Indeed given a stochastic connectivity this so-called spontaneous mode exhibits various non trivial dynamics. This study brings forward a mathematical formalism that allows us to examine the variability of the afterward dynamics according to the parameters of the weight distribution. Provided independence hypothesis (e.g. in the case of very large networks) we are able to compute the average number of neurons that fire at a given time -- the spiking activity. In accordance with numerical simulations, we prove that this spiking activity reaches a steady-state, we characterize this steady-state and explore the transients.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 10:04:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Soula", "H.", "" ], [ "Beslon", "G.", "" ], [ "Mazet", "O.", "" ] ]
cs/0411053
Didier Donsez
Areski Flissi (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl)
Vers un environnement multi personnalites pour la configuration et le deploiement d'applications a base de composants logiciels
null
DECOR04 (2004) 3-14
null
null
cs.NI
null
The multiplication of architecture description languages, component models and platforms implies a serious dilemma for component based software architects. On the one hand, they have to choose a language to describe concrete configurations which will be automatically deployed on execution platforms. On the other hand, they wish to capitalize their software architectures independently of any description languages or platforms. To solve this problem, we propose a multi personalities environment for the configuration and the deployment of component based applications. This environment is composed of a core capturing a canonical model of configuration and deployment, and a set of personalities tailored to languages and platforms. This paper details the architecture of such an environment and describes the personalities for the CORBA and Fractal component models.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:08:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Flissi", "Areski", "", "JACQUARD Ur-F Lifl" ], [ "Merle", "Philippe", "", "JACQUARD Ur-F\n Lifl" ] ]
cs/0411054
Didier Donsez
Francois Exertier
J2EE Deployment: The JOnAS Case Study
null
DECOR04 (2004) 27-36
null
null
cs.NI
null
La specification J2EE (Java 2 platform Enterprise Edition) definit une architecture de serveur d'application Java. Jusqu'a J2EE 1.3, seuls les aspects de deploiement concernant le developpeur d'applications etaient adresses. Avec J2EE 1.4, les interfaces et les etapes de deploiement ont ete plus precisement specifiees dans la specification "J2EE Deployment". JOnAS (Java Open Application Server) est une plate-forme J2EE developpee au sein du consortium ObjectWeb. Les aspects deploiement sont en cours de developpement. Cet article decrit les concepts lies au deploiement dans J2EE, ainsi que les problematiques levees lors de leur mise en oeuvre pour JOnAS. Il n'a pas pour but de presenter un travail abouti, mais illustre le deploiement par un cas concret et ebauche une liste de besoins non encore satisfaits dans le domaine. ----- The J2EE (Java 2 platform Enterprise Edition) specification defines an architecture for Java Application Servers. Until J2EE 1.3, the deployment aspect was addressed from the developer point of view only. Since J2EE 1.4, deployment APIs and steps have been more precisely specified within the "J2EE Deployment Specification". JOnAS (Java Open Application Server) is a J2EE platform implementation by ObjectWeb. The deployment aspects are under development. This article describes the J2EE Deployment concepts, and the issues raised when implementing deployment features within JOnAS. It does not provide a complete solution, but illustrates deployment through a concrete example and initiates a list of non fulfilled requirements.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:26:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Exertier", "Francois", "" ] ]
cs/0411055
Didier Donsez
Laurent Charles, Manuel Vacelet, Mohamed Chaari, Miguel Santana
SDS : Une infrastructure d'installation de logiciels libres pour des organisations multi-sites
null
DECOR04 (2004) 37-48
null
null
cs.NI
null
Les developpements logiciels sur les systemes UNIX font de plus en plus appel aux logiciels libres. Nous proposons une solution de deploiement et de controle de ces logiciels libres au sein d'une grande organisation. Nous nous attachons particulierement a resoudre les problemes lies au deploiement multi-sites ainsi qu'a la gestion de configuration de ces deploiements. L'originalite de notre approche repose sur sa capacite a etre mise en oeuvre et controlee par les utilisateurs plutot que par les administrateurs, sans necessiter d'expertise particuliere, et par les possibilites de deploiement dans des environnements heterogenes. ----- Free and open source software is more and more used for software developments on UNIX systems. We are proposing a solution to control the deployment of free software in the context of a large corporation, focusing on multi-site deployment and configuration management. The originality of our approach rests on its ability to be implemented and controlled by users rather than administrators, without requiring any particular expertise, and on its facility to be deployed in heterogeneous environments.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:27:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Charles", "Laurent", "" ], [ "Vacelet", "Manuel", "" ], [ "Chaari", "Mohamed", "" ], [ "Santana", "Miguel", "" ] ]
cs/0411056
Didier Donsez
Marcel Cremene, Michel Riveill, Christian Martel, Calin Loghin, Costin Miron
Adaptation dynamique de services
null
DECOR04 (2004) 53-64
null
null
cs.NI
null
This paper proposes a software architecture for dynamical service adaptation. The services are constituted by reusable software components. The adaptation's goal is to optimize the service function of their execution context. For a first step, the context will take into account just the user needs but other elements will be added. A particular feature in our proposition is the profiles that are used not only to describe the context's elements but also the components itself. An Adapter analyzes the compatibility between all these profiles and detects the points where the profiles are not compatibles. The same Adapter search and apply the possible adaptation solutions: component customization, insertion, extraction or replacement.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:31:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Cremene", "Marcel", "" ], [ "Riveill", "Michel", "" ], [ "Martel", "Christian", "" ], [ "Loghin", "Calin", "" ], [ "Miron", "Costin", "" ] ]
cs/0411057
Didier Donsez
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm Hasselbring
Runtime Reconfiguration of J2EE Applications
null
DECOR04 (2004) 77-84
null
null
cs.NI
null
Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mission-critical systems, but also for commercial web-applications offering professional services. Hereby, the main concerns are maintaining the consistency of the running system during reconfiguration and minimizing its down-time caused by the reconfiguration. This paper focuses on the platform independent subsystem that realises deployment and redeployment of J2EE modules based on the new J2EE Deployment API as a part of the implementation of our proposed system architecture enabling runtime reconfiguration of component-based systems. Our "controlled runtime redeployment" comprises an extension of hot deployment and dynamic reloading, complemented by allowing for structural change
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:34:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Matevska-Meyer", "Jasminka", "" ], [ "Olliges", "Sascha", "" ], [ "Hasselbring", "Wilhelm", "" ] ]
cs/0411058
Didier Donsez
Jose L. Ruiz, Juan C. Duenas, Fernando Usero, Cristina Diaz
Deployment in dynamic environments
null
DECOR04 (2004) 85-98
null
null
cs.NI
null
Information and communication technologies are moving towards a new stage where applications will be dynamically deployed, uninstalled, updated and (re)configured. Several approaches have been followed with the goal of creating a fully automated and context-aware deployment system. Ideally, this system should be capable of handling the dynamics of this new situation, without losing sight of other factors, such as performance, security, availability or scalability. We will take some of the technologies that follow the principles of Service Oriented Architectures, SOA, as a paradigm of dynamic environments. SOA promote the breaking down of applications into sets of loosely coupled elements, called services. Services can be dynamically bound, deployed, reconfigured, uninstalled and updated. First of all, we will try to offer a broad view on the specific deployment issues that arise in these environments. Later on, we will present our approach to the problem. One of the essential points that has to be tackled to develop an automated deployment engine will be to have enough information to carry out tasks without human intervention. In the article we will focus on the format and contents of deployment descriptors. Additionally, we will go into the details of the deployment framework for OSGi enabled gateways that has been developed by our research group. Finally we will give some concluding remarks and some ideas for future work
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:34:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Ruiz", "Jose L.", "" ], [ "Duenas", "Juan C.", "" ], [ "Usero", "Fernando", "" ], [ "Diaz", "Cristina", "" ] ]
cs/0411059
Didier Donsez
Frederic Briclet (JACQUARD Ur-F Lifl), Christophe Contreras (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl)
OpenCCM : une infrastructure a composants pour le deploiement d'applications a base de composants CORBA
null
DECOR04 (2004) 101-112
null
null
cs.NI
null
Deployment of software components for building distributed applications consists of the coordination of a set of basic tasks like uploading component binaries to the execution sites, loading them in memory, instantiating components, interconnecting their ports, setting their business and technical attributes. The automation of the deployment process then requires the presence of a software infrastructure distributed itself on the different execution sites. This paper presents the characteristics of such an infrastructure for the deployment of CORBA component-based applications. This latter is designed and implemented in the context of our OpenCCM platform, an open source implementation of the CORBA Component Model. The main characteristic lays on the fact that this infrastructure is itself designed as a set of CORBA component assemblies. This allows its dynamic assembly during its deployment over the execution sites
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Briclet", "Frederic", "", "JACQUARD Ur-F Lifl" ], [ "Contreras", "Christophe", "", "JACQUARD\n Ur-F Lifl" ], [ "Merle", "Philippe", "", "JACQUARD Ur-F Lifl" ] ]
cs/0411060
Didier Donsez
Stephane Frenot (ARES UR-RA)
Gestion du deploiement de composants sur reseau P2P
null
DECOR04 (2004) 113-124
null
null
cs.NI
null
The deployment of component-based applications relies on a centralized directory to store the components. This paper describes an approach to distribute software components to be deployed on a set of peers of a peer to peer network in order to exploit some associated characteristics (load balancing, fault-tolerance, self-organisation). The proposed architecture is situated in the context of OSGI application deployment management. The software components (bundles) are distributed among a set of nodes participating in the execution of services. When a node wants to install a component which is not deployed locally, the component is looked for and installed using a p2p network. ----- Le deploiement d'applications a composants repose sur une approche d'annuaire centralise de stockage des composants. Cet article decrit une approche pour distribuer les composants logiciels a deployer sur un ensemble de noeuds d'un reseau pair-a-pair afin de pouvoir exploiter certaines caracteristiques associees (equilibrage de charge, tolerance de panne, auto-organisation). L'architecture proposee entre dans le cadre de la gestion du deploiement d'applications sur le modele OSGi. Les composants logiciels (ou bundles) sont repartis a travers un ensemble de noeuds participant a l'execution de services. Lorsqu'un noeud veut installer un composant et si celui-ci n'est pas encore deploye localement, il est recherche et installe en utilisant un reseau p2p
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:36:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Frenot", "Stephane", "", "ARES UR-RA" ] ]
cs/0411061
Didier Donsez
Noelle Merle (LSR - IMAG)
Un meta-modele pour l'automatisation du deploiement d'applications logicielles
null
DECOR04 (2004) 125-132
null
null
cs.NI
null
Le deploiement est maintenant considere comme une activite a part entiere du cycle de vie du logiciel. Les grandes entreprises souhaitent pouvoir automatiser cette etape tout en prenant en compte les caracteristiques de chaque machine cible. Pour repondre a ces besoins, nous avons defini un environnement de deploiement : ORYA (Open enviRonment to deploY Applications). Cet environnement utilise un meta-modele de deploiement, decrit dans ce papier. Notre approche utilise aussi les technologies des federations et des procedes, fournissant un environnement flexible et extensible pour l'utilisateur. ----- The deployment is now a full activity of the software lifecycle. Large enterprises want to automate this step, taking into account characteristics of each target machine. To satisfy these needs, we have defined an environment for the deployment phase: ORYA (Open enviRonment to deploY Applications). This environment uses a deployment metamodel, described in this paper. Our approach is based also on federation and process federations, providing a flexible and extensible environment to the user
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:41:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Merle", "Noelle", "", "LSR - IMAG" ] ]
cs/0411062
Didier Donsez
Didier Donsez (LSR - IMAG), Humberto Cervantes (LSR - IMAG), Mikael Desertot (LSR - IMAG)
FROGi : Deploiement de composants Fractal sur OSGi
null
DECOR04 (2004) 147-158
null
null
cs.NI
null
Cet article presente FROGi, une proposition visant a introduire le modele a composants Fractal a l'interieur de la plateforme de services OSGi. La motivation derriere ce travail est double. D'un cote, FROGi offre aux developpeurs de services OSGi un modele a composants extensibles qui facilite le developpement des bundles ; ces derniers restent toutefois compatibles avec les bundles "patrimoniaux". D'un autre cote, FROGi beneficie de l'infrastructure de deploiement que represente OSGi et qui facilite la realisation du conditionnement et du deploiement de composants Fractal. Dans FROGi, une application Fractal est conditionnee sous la forme d'un ou plusieurs bundles et elle peut etre deployee de facon partielle et les activites de deploiement peuvent avoir lieu de facon continue. -- This paper presents FROGi, a proposal to introduce the Fractal component model into the OSGi services platform. There are two motivations for this work. The first one is to offer a flexible component model to the OSGi developers to simplify bundle development. Bundles developed with FROGi are nevertheless compatible with standard bundles. The second motivation is to leverage OSGi's deployment capabilities to package and deploy Fractal components. In FROGi, a Fractal application is packaged and delivered as a set of OSGi bundles; such an application supports partial deployment and additionally, deployment activities can occur continuously.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 13:43:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Donsez", "Didier", "", "LSR - IMAG" ], [ "Cervantes", "Humberto", "", "LSR - IMAG" ], [ "Desertot", "Mikael", "", "LSR - IMAG" ] ]
cs/0411063
Christiane Lechner
Christiane Lechner, Dana Alic, Sascha Husa
From Tensor Equations to Numerical Code -- Computer Algebra Tools for Numerical Relativity
LaTeX llncs style, 9 pages, 1 figure, to appaer in the proceedings of "SYNASC 2004 - 6th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", Timisoara, Romania, September 26-30 2004
null
null
AEI-2004-108
cs.SC
null
In this paper we present our recent work in developing a computer-algebra tool for systems of partial differential equations (PDEs), termed "Kranc". Our work is motivated by the problem of finding solutions of the Einstein equations through numerical simulations. Kranc consists of Mathematica based computer-algebra packages, that facilitate the task of dealing with symbolic tensorial calculations and realize the conversion of systems of partial differential evolution equations into parallelized C or Fortran code.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 14:30:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Lechner", "Christiane", "" ], [ "Alic", "Dana", "" ], [ "Husa", "Sascha", "" ] ]
cs/0411064
Daniel A. Spielman
Michael Elkin, Yuval Emek, Daniel A. Spielman and Shang-Hua Teng
Lower-Stretch Spanning Trees
null
null
null
null
cs.DS cs.DM
null
We prove that every weighted graph contains a spanning tree subgraph of average stretch O((log n log log n)^2). Moreover, we show how to construct such a tree in time O(m log^2 n).
[ { "version": "v1", "created": "Wed, 17 Nov 2004 22:07:46 GMT" }, { "version": "v2", "created": "Wed, 5 Jan 2005 21:06:44 GMT" }, { "version": "v3", "created": "Mon, 14 Feb 2005 21:17:11 GMT" }, { "version": "v4", "created": "Mon, 21 Mar 2005 21:52:20 GMT" }, { "version": "v5", "created": "Fri, 13 May 2005 17:20:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Elkin", "Michael", "" ], [ "Emek", "Yuval", "" ], [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0411066
Alex Wiesmaier
V. Karatsiolis, M. Lippert and A. Wiesmaier
Using LDAP Directories for Management of PKI Processes
9 pages, 1 figure
In Proceedings of Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004, volume 3093 of Lecture Notes in Computer Science, pages 126-134, June 2004
null
null
cs.CR
null
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP servers are used for administrating infrastructure processes. One application of this framework is a method for providing proof-of-possession, especially in the case of encryption keys. Another one is the secure delivery of software personal security environments.
[ { "version": "v1", "created": "Thu, 18 Nov 2004 19:00:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Wiesmaier", "A.", "" ] ]
cs/0411068
Alex Wiesmaier
V. Karatsiolis, M. Lippert, A. Wiesmaier
Planning for Directory Services in Public Key Infrastructures
12 pages; 1 figure; accepted at QSIG2005 (see http://www-sec.uni-regensburg.de/sicherheit2005/index.shtml); camera ready version
Proceedings of "Sicherheit 2005"; April 2005
null
null
cs.CR
null
In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discuss their part as far as directories concerning. Finally, we translate those to the LDAP directories practices.
[ { "version": "v1", "created": "Thu, 18 Nov 2004 19:40:59 GMT" }, { "version": "v2", "created": "Thu, 13 Jan 2005 17:07:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Wiesmaier", "A.", "" ] ]
cs/0411070
Pradipta De Pradipta De
Pradipta De
Data Path Processing in Fast Programmable Routers
ECSL Technical Report #127, Stony Brook University
null
null
null
cs.NI
null
Internet is growing at a fast pace. The link speeds are surging toward 40 Gbps with the emergence of faster link technologies. New applications are coming up which require intelligent processing at the intermediate routers. Switches and routers are becoming the bottlenecks in fast communication. On one hand faster links deliver more packets every second and on the other hand intelligent processing consumes more CPU cycles at the router. The conflicting goals of providing faster but computationally expensive processing call for new approaches in designing routers. This survey takes a look at the core functionalities, like packet classification, buffer memory management, switch scheduling and output link scheduling performed by a router in its data path processing and discusses the algorithms that aim to reduce the performance bound for these operations. An important requirement for the routers is to provide Quality of Service guarantees. We propose an algorithm to guarantee QoS in Input Queued Routers. The hardware solution to speed up router operation was Application Specific Integrated Circuits (ASICs). But the inherent inflexibility of the method is a demerit as network standards and application requirements are constantly evolving, which seek a faster turnaround time to keep up with the changes. The promise of Network Processors (NP) is the flexibility of general-purpose processors together with the speed of ASICs. We will study the architectural choices for the design of Network Processors and focus on some of the commercially available NPs. There is a plethora of NP vendors in the market. The discussion on the NP benchmarks sets the normalizing platform to evaluate these NPs.
[ { "version": "v1", "created": "Thu, 18 Nov 2004 23:19:44 GMT" } ]
2007-05-23T00:00:00
[ [ "De", "Pradipta", "" ] ]
cs/0411074
Daniel Gayo Avello
Daniel Gayo-Avello
Building Chinese Lexicons from Scratch by Unsupervised Short Document Self-Segmentation
9 pages 3 figures 2 tables
null
null
null
cs.CL cs.IR
null
Chinese text segmentation is a well-known and difficult problem. On one side, there is not a simple notion of "word" in Chinese language making really hard to implement rule-based systems to segment written texts, thus lexicons and statistical information are usually employed to achieve such a task. On the other side, any piece of Chinese text usually includes segments present neither in the lexicons nor in the training data. Even worse, such unseen sequences can be segmented into a number of totally unrelated words making later processing phases difficult. For instance, using a lexicon-based system the sequence ???(Baluozuo, Barroso, current president-designate of the European Commission) can be segmented into ?(ba, to hope, to wish) and ??(luozuo, an undefined word) changing completely the meaning of the sentence. A new and extremely simple algorithm specially suited to work over short Chinese documents is introduced. This new algorithm performs text "self-segmentation" producing results comparable to those achieved by native speakers without using either lexicons or any statistical information beyond the obtained from the input text. Furthermore, it is really robust for finding new "words", especially proper nouns, and it is well suited to build lexicons from scratch. Some preliminary results are provided in addition to examples of its employment.
[ { "version": "v1", "created": "Sat, 20 Nov 2004 00:22:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayo-Avello", "Daniel", "" ] ]
cs/0411075
Darran Nathan
Andreas Weisensee, Darran Nathan
A Self-Reconfigurable Computing Platform Hardware Architecture
5 pages, 6 figures
null
null
null
cs.AR cs.DC
null
Field Programmable Gate Arrays (FPGAs) have recently been increasingly used for highly-parallel processing of compute intensive tasks. This paper introduces an FPGA hardware platform architecture that is PC-based, allows for fast reconfiguration over the PCI bus, and retains a simple physical hardware design. The design considerations are first discussed, then the resulting system architecture designed is illustrated. Finally, experimental results on the FPGA resources utilized for this design are presented.
[ { "version": "v1", "created": "Sat, 20 Nov 2004 06:31:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Weisensee", "Andreas", "" ], [ "Nathan", "Darran", "" ] ]
cs/0411077
David S. H. Rosenthal
David S. H. Rosenthal, Thomas Lipkis, Thomas Robertson, Seth Morabito
Transparent Format Migration of Preserved Web Content
6 pages, 2 figures
null
null
null
cs.DL
null
The LOCKSS digital preservation system collects content by crawling the web and preserves it in the format supplied by the publisher. Eventually, browsers will no longer understand that format. A process called format migration converts it to a newer format that the browsers do understand. The LOCKSS program has designed and tested an initial implementation of format migration for Web content that is transparent to readers, building on the content negotiation capabilities of HTTP.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 00:35:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ], [ "Lipkis", "Thomas", "" ], [ "Robertson", "Thomas", "" ], [ "Morabito", "Seth", "" ] ]
cs/0411078
David S. H. Rosenthal
David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, T.J. Giuli, Mary Baker
Notes On The Design Of An Internet Adversary
null
Second Annual Adaptive and Resilient Computing Security Workshop, Santa Fe, 2003
null
null
cs.DL
null
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary based on the capability assessment. Consensus on the capabilities of a suitable adversary is not evident. Part of the recent redesign of the protocol used by peers in the LOCKSS digital preservation system included a conservative assessment of the adversary's capabilities. We present our assessment and the implications we drew from it as a step towards a reusable adversary specification.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 00:22:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ], [ "Maniatis", "Petros", "" ], [ "Roussopoulos", "Mema", "" ], [ "Giuli", "T. J.", "" ], [ "Baker", "Mary", "" ] ]
cs/0411079
Srikant Sharma
Srikant Sharma and Kartik Gopalan and Ningning Zhu and Gang Peng and Pradipta De and Tzi-cker Chiueh
Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs
This paper integrates the QoS scheme published in MMCN 2002 with a low latency mobility scheme that appeared in IEEE JSAC May 2004. This paper deals with both the issues with a fresh perspective of new networking technologies and standards such as 802.11e
null
null
null
cs.NI
null
The proliferation of IEEE 802.11-based wireless LANs opens up avenues for creation of several tetherless and mobility oriented services. Most of these services, like voice over WLAN, media streaming etc., generate delay and bandwidth sensitive traffic. These traffic flows require undisrupted network connectivity with some QoS guarantees. Unfortunately, there is no adequate support built into these wireless LANs towards QoS provisioning. Further, the network layer handoff latency incurred by mobile nodes in these wireless LANs is too high for real-time applications to function properly. In this paper, we describe a QoS mechanism, called Rether, to effectively support bandwidth guarantee on wireless LANs. Rether is designed to support the current wireless LAN technologies like 802.11b and 802.11a with a specific capability of being tailored for QoS oriented technology like 802.11e. We also describe a low-latency handoff mechanism which expedites network level handoff to provide real-time applications with an added advantage of seamless mobility.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 18:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharma", "Srikant", "" ], [ "Gopalan", "Kartik", "" ], [ "Zhu", "Ningning", "" ], [ "Peng", "Gang", "" ], [ "De", "Pradipta", "" ], [ "Chiueh", "Tzi-cker", "" ] ]
cs/0411080
Valmir Barbosa
C. A. G. Assis, E. S. T. Fernandes, V. C. Barbosa
Modeling the input history of programs for improved instruction-memory performance
null
Computer Journal 49 (2006), 744-761
10.1093/comjnl/bxl044
ES-662/04
cs.OS
null
When a program is loaded into memory for execution, the relative position of its basic blocks is crucial, since loading basic blocks that are unlikely to be executed first places them high in the instruction-memory hierarchy only to be dislodged as the execution goes on. In this paper we study the use of Bayesian networks as models of the input history of a program. The main point is the creation of a probabilistic model that persists as the program is run on different inputs and at each new input refines its own parameters in order to reflect the program's input history more accurately. As the model is thus tuned, it causes basic blocks to be reordered so that, upon arrival of the next input for execution, loading the basic blocks into memory automatically takes into account the input history of the program. We report on extensive experiments, whose results demonstrate the efficacy of the overall approach in progressively lowering the execution times of a program on identical inputs placed randomly in a sequence of varied inputs. We provide results on selected SPEC CINT2000 programs and also evaluate our approach as compared to the gcc level-3 optimization and to Pettis-Hansen reordering.
[ { "version": "v1", "created": "Tue, 23 Nov 2004 16:52:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Assis", "C. A. G.", "" ], [ "Fernandes", "E. S. T.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0411081
Didier Donsez
Assia Hachichi (REGAL Ur-R Lip6), Cyril Martin (REGAL Ur-R Lip6), Gael Thomas (REGAL Ur-R Lip6), Simon Patarin (REGAL Ur-R Lip6), Bertil Folliot (REGAL Ur-R Lip6)
Reconfigurations dynamiques de services dans un intergiciel a composants CORBA CCM
null
DECOR04 (2004) 159-170
null
null
cs.NI
null
Today, component oriented middlewares are used to design, develop and deploy easily distributed applications, by ensuring the heterogeneity, interoperability, and reuse of the software modules, and the separation between the business code encapsulated in the components and the system code managed by the containers. Several standards answer this definition such as: CCM (CORBA Component Model), EJB (Enterprise Java Beans) and .Net. However these standards offer a limited and fixed number of system services, removing any possibility to add system services or to reconfigure dynamically the middleware. Our works propose mechanisms to add and to adapt dynamically the system services, based on a reconfiguration language which is dynamically adaptable to the need of the reconfiguration, and on a tool of dynamic reconfiguration, a prototype was achieved for the OpenCCM platform, that is an implementation of the CCM specification. This work was partially financed by the european project IST-COACH (2001-34445).
[ { "version": "v1", "created": "Wed, 24 Nov 2004 10:26:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hachichi", "Assia", "", "REGAL Ur-R Lip6" ], [ "Martin", "Cyril", "", "REGAL Ur-R Lip6" ], [ "Thomas", "Gael", "", "REGAL Ur-R Lip6" ], [ "Patarin", "Simon", "", "REGAL Ur-R Lip6" ], [ "Folliot", "Bertil", "", "REGAL Ur-R Lip6" ] ]
cs/0411082
Didier Donsez
Jakub Kornas (SARDES Ur-Ra Imag), Matthieu Leclercq (SARDES Ur-Ra Imag), Vivien Quema (SARDES Ur-Ra Imag), Jean-Bernard Stefani (SARDES Ur-Ra Imag)
Support pour la reconfiguration d'implantation dans les applications a composants Java
null
DECOR04 (2004) 171-184
null
null
cs.NI
null
Nowadays, numerous component models are used for various purposes: to build applications, middleware or even operating systems. Those models commonly support structure reconfiguration, that is modification of application's architecture at runtime. On the other hand, very few allow implementation reconfiguration, that is runtime modification of the code of components building the application. In this article we present the work we performed on JULIA, a Java-based implementation of the FRACTAL component model, in order for it to support implementation reconfigurations. We show how we overcame the limitations of Java class loading mechanism to allow runtime modifications of components' implementation and interfaces. We also describe the integration of our solution with the JULIA ADL.
[ { "version": "v1", "created": "Wed, 24 Nov 2004 10:27:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Kornas", "Jakub", "", "SARDES Ur-Ra Imag" ], [ "Leclercq", "Matthieu", "", "SARDES Ur-Ra\n Imag" ], [ "Quema", "Vivien", "", "SARDES Ur-Ra Imag" ], [ "Stefani", "Jean-Bernard", "", "SARDES Ur-Ra\n Imag" ] ]
cs/0411090
Valmir Barbosa
A. O. Stauffer, V. C. Barbosa
Local heuristics and the emergence of spanning subgraphs in complex networks
null
Theoretical Computer Science 355 (2006), 80-95
10.1016/j.tcs.2005.12.007
ES-663/04
cs.NI
null
We study the use of local heuristics to determine spanning subgraphs for use in the dissemination of information in complex networks. We introduce two different heuristics and analyze their behavior in giving rise to spanning subgraphs that perform well in terms of allowing every node of the network to be reached, of requiring relatively few messages and small node bandwidth for information dissemination, and also of stretching paths with respect to the underlying network only modestly. We contribute a detailed mathematical analysis of one of the heuristics and provide extensive simulation results on random graphs for both of them. These results indicate that, within certain limits, spanning subgraphs are indeed expected to emerge that perform well in respect to all requirements. We also discuss the spanning subgraphs' inherent resilience to failures and adaptability to topological changes.
[ { "version": "v1", "created": "Thu, 25 Nov 2004 09:04:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Stauffer", "A. O.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0411091
H. M. Gladney
H.M. Gladney
Principles for Digital Preservation
7 pages with 2b figures
null
null
null
cs.DL
null
The immense investments in creating and disseminating digitally represented information have not been accompanied by commensurate effort to ensure the longevity of information of permanent interest. Asserted difficulties with long-term digital preservation prove to be largely underestimation of what technology can provide. We show how to clarify prominent misunderstandings and sketch a 'Trustworthy Digital Object (TDO)' method that solves all the published technical challenges.
[ { "version": "v1", "created": "Wed, 24 Nov 2004 20:54:43 GMT" }, { "version": "v2", "created": "Sun, 19 Dec 2004 00:32:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Gladney", "H. M.", "" ] ]
cs/0411092
H. M. Gladney
H.M. Gladney, R.A. Lorie
Trustworthy 100-Year Digital Objects: Durable Encoding for When It's Too Late to Ask
null
null
null
null
cs.DL
null
How can an author store digital information so that it will be reliably useful, even years later when he is no longer available to answer questions? Methods that might work are not good enough; what is preserved today should be reliably useful whenever someone wants it. Prior proposals fail because they confound saved data with irrelevant details of today's information technology--details that are difficult to define, extract, and save completely and accurately. We use a virtual machine to represent and eventually to render any data whatsoever. We focus on a case of intermediate difficulty--an executable procedure--and identify a variant for every other data type. This solution might be more elaborate than needed to render some text, image, audio, or video data. Simple data can be preserved as representations using well-known standards. We sketch practical methods for files ranging from simple structures to those containing computer programs, treating simple cases here and deferring complex cases for future work. Enough of the complete solution is known to enable practical aggressive preservation programs today.
[ { "version": "v1", "created": "Wed, 24 Nov 2004 21:26:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Gladney", "H. M.", "" ], [ "Lorie", "R. A.", "" ] ]
cs/0411093
Vlady Ravelomanana
Vlady Ravelomanana (LIPN), Loys Thimonier (LARIA)
Forbidden Subgraphs in Connected Graphs
null
null
null
null
cs.DS cs.DM math.CO
null
Given a set $\xi=\{H_1,H_2,...\}$ of connected non acyclic graphs, a $\xi$-free graph is one which does not contain any member of $% \xi$ as copy. Define the excess of a graph as the difference between its number of edges and its number of vertices. Let ${\gr{W}}_{k,\xi}$ be theexponential generating function (EGF for brief) of connected $\xi$-free graphs of excess equal to $k$ ($k \geq 1$). For each fixed $\xi$, a fundamental differential recurrence satisfied by the EGFs ${\gr{W}}_{k,\xi}$ is derived. We give methods on how to solve this nonlinear recurrence for the first few values of $k$ by means of graph surgery. We also show that for any finite collection $\xi$ of non-acyclic graphs, the EGFs ${\gr{W}}_{k,\xi}$ are always rational functions of the generating function, $T$, of Cayley's rooted (non-planar) labelled trees. From this, we prove that almost all connected graphs with $n$ nodes and $n+k$ edges are $\xi$-free, whenever $k=o(n^{1/3})$ and $|\xi| < \infty$ by means of Wright's inequalities and saddle point method. Limiting distributions are derived for sparse connected $\xi$-free components that are present when a random graph on $n$ nodes has approximately $\frac{n}{2}$ edges. In particular, the probability distribution that it consists of trees, unicyclic components, $...$, $(q+1)$-cyclic components all $\xi$-free is derived. Similar results are also obtained for multigraphs, which are graphs where self-loops and multiple-edges are allowed.
[ { "version": "v1", "created": "Thu, 25 Nov 2004 09:32:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Thimonier", "Loys", "", "LARIA" ] ]
cs/0411094
Radhakrishnan Srinivasan
Radhakrishnan Srinivasan, H. P. Raghunandan
On the existence of truly autonomic computing systems and the link with quantum computing
13 pages (two-column, single-spaced), 2 figures. Section 4 and Appendix B (with a figure in each) added. Improved explanations given for the NAFL model of (hyper-) computation (Sec. 6) and for the failure of relativistic locality in NAFL (Appendix B)
null
null
null
cs.LO math.LO quant-ph
null
A theoretical model of truly autonomic computing systems (ACS), with infinitely many constraints, is proposed. An argument similar to Turing's for the unsolvability of the halting problem, which is permitted in classical logic, shows that such systems cannot exist. Turing's argument fails in the recently proposed non-Aristotelian finitary logic (NAFL), which permits the existence of ACS. NAFL also justifies quantum superposition and entanglement, which are essential ingredients of quantum algorithms, and resolves the Einstein-Podolsky-Rosen (EPR) paradox in favour of quantum mechanics and non-locality. NAFL requires that the autonomic manager (AM) must be conceptually and architecturally distinct from the managed element, in order for the ACS to exist as a non-self-referential entity. Such a scenario is possible if the AM uses quantum algorithms and is protected from all problems by (unbreakable) quantum encryption, while the managed element remains classical. NAFL supports such a link between autonomic and quantum computing, with the AM existing as a metamathematical entity. NAFL also allows quantum algorithms to access truly random elements and thereby supports non-standard models of quantum (hyper-) computation that permit infinite parallelism.
[ { "version": "v1", "created": "Thu, 25 Nov 2004 13:16:55 GMT" }, { "version": "v2", "created": "Wed, 23 Feb 2005 11:41:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Srinivasan", "Radhakrishnan", "" ], [ "Raghunandan", "H. P.", "" ] ]
cs/0411095
Christian Lavault
Christian Lavault (LIPN)
Embeddings into the Pancake Interconnection Network
Article paru en 2002 dans Parallel Processing Letters
Parallel Processing Letters 12, 3-4 (2002) 297-310
null
null
cs.DC cs.DM cs.DS
null
Owing to its nice properties, the pancake is one of the Cayley graphs that were proposed as alternatives to the hypercube for interconnecting processors in parallel computers. In this paper, we present embeddings of rings, grids and hypercubes into the pancake with constant dilation and congestion. We also extend the results to similar efficient embeddings into the star graph.
[ { "version": "v1", "created": "Fri, 26 Nov 2004 20:13:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ] ]
cs/0411096
Nathan LaBelle Mr.
Nathan LaBelle, Eugene Wallingford
Inter-Package Dependency Networks in Open-Source Software
6 Pages, 1 Figure, Submitted to J. Theoretical Comp. Science
null
null
null
cs.SE
null
This research analyzes complex networks in open-source software at the inter-package level, where package dependencies often span across projects and between development groups. We review complex networks identified at ``lower'' levels of abstraction, and then formulate a description of interacting software components at the package level, a relatively ``high'' level of abstraction. By mining open-source software repositories from two sources, we empirically show that the coupling of modules at this granularity creates a small-world and scale-free network in both instances.
[ { "version": "v1", "created": "Mon, 29 Nov 2004 03:38:48 GMT" } ]
2007-05-23T00:00:00
[ [ "LaBelle", "Nathan", "" ], [ "Wallingford", "Eugene", "" ] ]
cs/0411099
Andreas Maurer
Andreas Maurer
A Note on the PAC Bayesian Theorem
9 pages
null
null
null
cs.LG cs.AI
null
We prove general exponential moment inequalities for averages of [0,1]-valued iid random variables and use them to tighten the PAC Bayesian Theorem. The logarithmic dependence on the sample count in the enumerator of the PAC Bayesian bound is halved.
[ { "version": "v1", "created": "Tue, 30 Nov 2004 08:36:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Maurer", "Andreas", "" ] ]
cs/0411100
Ruggero Lanotte Dr
Ruggero Lanotte (Dipartimento di Scienze della Cultura, Politiche e dell'Informazione), Daniele Beauquier (LACL, Dept. of Informatics)
A Decidable Probability Logic for Timed Probabilistic Systems
null
null
null
null
cs.LO
null
In this paper we extend the predicate logic introduced in [Beauquier et al. 2002] in order to deal with Semi-Markov Processes. We prove that with respect to qualitative probabilistic properties, model checking is decidable for this logic applied to Semi-Markov Processes. Furthermore we apply our logic to Probabilistic Timed Automata considering classical and urgent semantics, and considering also predicates on clock. We prove that results on Semi Markov Processes hold also for Probabilistic Timed Automata for both the two semantics considered. Moreover, we prove that results for Markov Processes shown in [Beauquier et al. 2002] are extensible to Probabilistic Timed Automata where urgent semantics is considered.
[ { "version": "v1", "created": "Tue, 30 Nov 2004 10:42:35 GMT" }, { "version": "v2", "created": "Wed, 29 Mar 2006 17:37:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lanotte", "Ruggero", "", "Dipartimento di Scienze della Cultura, Politiche e\n dell'Informazione" ], [ "Beauquier", "Daniele", "", "LACL, Dept. of Informatics" ] ]
cs/0412001
Francesca Leinardi
Serge Rouveyrol (IMAG), Yves Chiaramella (IMAG), Francesca Leinardi (IMAG), Joanna Janik (IMAG), Bruno Marmol (INRIA-RA), Carole Silvy (INRIA-RA), Catherine Allauzun (INRIA-RA)
EURYDICE : A platform for unified access to documents
redige le 14 octobre 2001
null
null
null
cs.DL
null
In this paper we present Eurydice, a platform dedicated to provide a unified gateway to documents. Its basic functionalities about collecting documents have been designed based on a long experience about the management of scientific documentation among large and demanding academic communities such as IMAG and INRIA. Besides the basic problem of accessing documents - which was of course the original and main motivation of the project - a great effort has been dedicated to the development of management functionalities which could help institutions to control, analyse the current situation about the use of the documentation, and finally to set a better ground for a documentation policy. Finally a great emphasis - and corresponding technical investment - has been put on the protection of property and reproduction rights both from the users' intitution side and from the editors' side.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 13:14:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Rouveyrol", "Serge", "", "IMAG" ], [ "Chiaramella", "Yves", "", "IMAG" ], [ "Leinardi", "Francesca", "", "IMAG" ], [ "Janik", "Joanna", "", "IMAG" ], [ "Marmol", "Bruno", "", "INRIA-RA" ], [ "Silvy", "Carole", "", "INRIA-RA" ], [ "Allauzun", "Catherine", "", "INRIA-RA" ] ]
cs/0412002
Mark Levene
Jose Borges and Mark Levene
Ranking Pages by Topology and Popularity within Web Sites
15 pages, 6 figures
null
null
null
cs.AI cs.IR
null
We compare two link analysis ranking methods of web pages in a site. The first, called Site Rank, is an adaptation of PageRank to the granularity of a web site and the second, called Popularity Rank, is based on the frequencies of user clicks on the outlinks in a page that are captured by navigation sessions of users through the web site. We ran experiments on artificially created web sites of different sizes and on two real data sets, employing the relative entropy to compare the distributions of the two ranking methods. For the real data sets we also employ a nonparametric measure, called Spearman's footrule, which we use to compare the top-ten web pages ranked by the two methods. Our main result is that the distributions of the Popularity Rank and Site Rank are surprisingly close to each other, implying that the topology of a web site is very instrumental in guiding users through the site. Thus, in practice, the Site Rank provides a reasonable first order approximation of the aggregate behaviour of users within a web site given by the Popularity Rank.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 13:22:47 GMT" }, { "version": "v2", "created": "Wed, 8 Dec 2004 09:10:55 GMT" }, { "version": "v3", "created": "Thu, 9 Dec 2004 10:03:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Borges", "Jose", "" ], [ "Levene", "Mark", "" ] ]
cs/0412003
Joanna Janik
Florence Duchene (TIMC - IMAG), Catherine Garbay (TIMC - IMAG), Vincent Rialle (TIMC - IMAG, SIIM)
Mining Heterogeneous Multivariate Time-Series for Learning Meaningful Patterns: Application to Home Health Telecare
null
null
null
null
cs.LG
null
For the last years, time-series mining has become a challenging issue for researchers. An important application lies in most monitoring purposes, which require analyzing large sets of time-series for learning usual patterns. Any deviation from this learned profile is then considered as an unexpected situation. Moreover, complex applications may involve the temporal study of several heterogeneous parameters. In that paper, we propose a method for mining heterogeneous multivariate time-series for learning meaningful patterns. The proposed approach allows for mixed time-series -- containing both pattern and non-pattern data -- such as for imprecise matches, outliers, stretching and global translating of patterns instances in time. We present the early results of our approach in the context of monitoring the health status of a person at home. The purpose is to build a behavioral profile of a person by analyzing the time variations of several quantitative or qualitative parameters recorded through a provision of sensors installed in the home.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 16:32:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Duchene", "Florence", "", "TIMC - IMAG" ], [ "Garbay", "Catherine", "", "TIMC - IMAG" ], [ "Rialle", "Vincent", "", "TIMC - IMAG, SIIM" ] ]
cs/0412004
Lloyd Allison
L. Allison
Finding Approximate Palindromes in Strings Quickly and Simply
4 pages, 3 figures, code of the simple algorithm will soon be placed at http://www.csse.monash.edu.au/~lloyd/tildeProgLang/Java2/Palindromes/
null
null
2004/162
cs.DS
null
Described are two algorithms to find long approximate palindromes in a string, for example a DNA sequence. A simple algorithm requires O(n)-space and almost always runs in $O(k.n)$-time where n is the length of the string and k is the number of ``errors'' allowed in the palindrome. Its worst-case time-complexity is $O(n^2)$ but this does not occur with real biological sequences. A more complex algorithm guarantees $O(k.n)$ worst-case time complexity.
[ { "version": "v1", "created": "Wed, 1 Dec 2004 17:08:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Allison", "L.", "" ] ]
cs/0412005
Bernard Parisse
Bernard Parisse (IF), Morgane Vaughan (IF)
Jordan Normal and Rational Normal Form Algorithms
null
null
null
null
cs.SC
null
In this paper, we present a determinist Jordan normal form algorithms based on the Fadeev formula: \[(\lambda \cdot I-A) \cdot B(\lambda)=P(\lambda) \cdot I\] where $B(\lambda)$ is $(\lambda \cdot I-A)$'s comatrix and $P(\lambda)$ is $A$'s characteristic polynomial. This rational Jordan normal form algorithm differs from usual algorithms since it is not based on the Frobenius/Smith normal form but rather on the idea already remarked in Gantmacher that the non-zero column vectors of $B(\lambda_0)$ are eigenvectors of $A$ associated to $\lambda_0$ for any root $\lambda_0$ of the characteristical polynomial. The complexity of the algorithm is $O(n^4)$ field operations if we know the factorization of the characteristic polynomial (or $O(n^5 \ln(n))$ operations for a matrix of integers of fixed size). This algorithm has been implemented using the Maple and Giac/Xcas computer algebra systems.
[ { "version": "v1", "created": "Thu, 2 Dec 2004 09:39:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Parisse", "Bernard", "", "IF" ], [ "Vaughan", "Morgane", "", "IF" ] ]
cs/0412006
Sidi Mohamed Sedjelmaci
Sidi Mohamed Sedjelmaci (LIPN)
The Accelerated Euclidean Algorithm
null
Proceedings of the EACA, (2004) 283-287
null
null
cs.DS
null
We present a new GCD algorithm of two integers or polynomials. The algorithm is iterative and its time complexity is still $O(n \\log^2 n ~ log \\log n)$ for $n$-bit inputs.
[ { "version": "v1", "created": "Thu, 2 Dec 2004 15:01:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Sedjelmaci", "Sidi Mohamed", "", "LIPN" ] ]
cs/0412008
Manor Mendel
Robert Krauthgamer, James R. Lee, Manor Mendel, Assaf Naor
Measured descent: A new embedding method for finite metrics
17 pages. No figures. Appeared in FOCS '04. To appeaer in Geometric & Functional Analysis. This version fixes a subtle error in Section 2.2
Geom. Funct. Anal. 15(4):839-858, 2005
10.1007/s00039-005-0527-6
null
cs.DS math.MG
null
We devise a new embedding technique, which we call measured descent, based on decomposing a metric space locally, at varying speeds, according to the density of some probability measure. This provides a refined and unified framework for the two primary methods of constructing Frechet embeddings for finite metrics, due to [Bourgain, 1985] and [Rao, 1999]. We prove that any n-point metric space (X,d) embeds in Hilbert space with distortion O(sqrt{alpha_X log n}), where alpha_X is a geometric estimate on the decomposability of X. As an immediate corollary, we obtain an O(sqrt{(log lambda_X) \log n}) distortion embedding, where \lambda_X is the doubling constant of X. Since \lambda_X\le n, this result recovers Bourgain's theorem, but when the metric X is, in a sense, ``low-dimensional,'' improved bounds are achieved. Our embeddings are volume-respecting for subsets of arbitrary size. One consequence is the existence of (k, O(log n)) volume-respecting embeddings for all 1 \leq k \leq n, which is the best possible, and answers positively a question posed by U. Feige. Our techniques are also used to answer positively a question of Y. Rabinovich, showing that any weighted n-point planar graph embeds in l_\infty^{O(log n)} with O(1) distortion. The O(log n) bound on the dimension is optimal, and improves upon the previously known bound of O((log n)^2).
[ { "version": "v1", "created": "Thu, 2 Dec 2004 17:06:41 GMT" }, { "version": "v2", "created": "Thu, 18 Aug 2005 06:56:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Krauthgamer", "Robert", "" ], [ "Lee", "James R.", "" ], [ "Mendel", "Manor", "" ], [ "Naor", "Assaf", "" ] ]
cs/0412010
Jeremie Guiochet
Jeremie Guiochet (LAAS), Gilles Motet, Claude Baron, Guy Boy
Toward a Human-Centered Uml for Risk Analysis
null
Proc. of the 18th IFIP World Computer Congress (WCC), Human Error, Safety and Systems Development (HESSD04) (2004) 177-191
null
null
cs.OH
null
Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of this activity is risk analysis. During risk analysis, two main studies concerning human factors must be integrated: task analysis and human error analysis. This multidisciplinary analysis often leads to a work sharing between several stakeholders who use their own languages and techniques. This often produces consistency errors and understanding difficulties between them. Hence, this paper proposes to treat the risk analysis on the common expression language UML (Unified Modeling Language) and to handle human factors concepts for task analysis and human error analysis based on the features of this language. The approach is applied to the development of a medical robot for teleechography.
[ { "version": "v1", "created": "Thu, 2 Dec 2004 21:32:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiochet", "Jeremie", "", "LAAS" ], [ "Motet", "Gilles", "" ], [ "Baron", "Claude", "" ], [ "Boy", "Guy", "" ] ]
cs/0412011
Archil Avaliani
Archil Avaliani
Successful E-Business Systems - Paypal
6 pages, Accepted at IADIS Conference, Lisbon. But because nobody was able to present this research paper, it didn't publish in proceedings. Extended version was written at International University under supervision of Prof.Keiichi Nakata. Keywords: PayPal, Payment Systems, E-business, Money Transactions, PayPal Analyses
null
null
null
cs.OH
null
PayPal is an account-based system that allows anyone with an email address to send and receive online payment s. This service is easy to use for customers. Members can instantaneously send money to anyone. Recipients are informed by email that they have received a payment. PayPal is also available to people in 38 countries. This paper starts with introduction to the company and its services. The information about the history and the current company situation are covered. Later some interesting and different technical issues are discussed. The Paper ends with analysis of the company and several future recommendations.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 02:33:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Avaliani", "Archil", "" ] ]
cs/0412012
Joanna Janik
Catherine Oriat (LSR - IMAG)
Jartege: a Tool for Random Generation of Unit Tests for Java Classes
null
null
null
RR-1069-I
cs.PL
null
This report presents Jartege, a tool which allows random generation of unit tests for Java classes specified in JML. JML (Java Modeling Language) is a specification language for Java which allows one to write invariants for classes, and pre- and postconditions for operations. As in the JML-JUnit tool, we use JML specifications on the one hand to eliminate irrelevant test cases, and on the other hand as a test oracle. Jartege randomly generates test cases, which consist of a sequence of constructor and method calls for the classes under test. The random aspect of the tool can be parameterized by associating weights to classes and operations, and by controlling the number of instances which are created for each class under test. The practical use of Jartege is illustrated by a small case study.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 12:19:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Oriat", "Catherine", "", "LSR - IMAG" ] ]
cs/0412013
Jean-Christophe Dubacq
Jean-Christophe Dubacq (LIPN, GREYC), Veronique Terrier (GREYC)
Signals for Cellular Automata in dimension 2 or higher
null
LATIN 2002: Theoretical Informatics (2002) 451-464
null
null
cs.CC cs.DC cs.DM math.CO
null
We investigate how increasing the dimension of the array can help to draw signals on cellular automata.We show the existence of a gap of constructible signals in any dimension. We exhibit two cellular automata in dimension 2 to show that increasing the dimension allows to reduce the number of states required for some constructions.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 16:35:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Dubacq", "Jean-Christophe", "", "LIPN, GREYC" ], [ "Terrier", "Veronique", "", "GREYC" ] ]
cs/0412014
Vlady Ravelomanana
Vlady Ravelomanana (LIPN)
Randomized Initialization of a Wireless Multihop Network
null
null
null
null
cs.DC cs.DM
null
Address autoconfiguration is an important mechanism required to set the IP address of a node automatically in a wireless network. The address autoconfiguration, also known as initialization or naming, consists to give a unique identifier ranging from 1 to $n$ for a set of $n$ indistinguishable nodes. We consider a wireless network where $n$ nodes (processors) are randomly thrown in a square $X$, uniformly and independently. We assume that the network is synchronous and two nodes are able to communicate if they are within distance at most of $r$ of each other ($r$ is the transmitting/receiving range). The model of this paper concerns nodes without the collision detection ability: if two or more neighbors of a processor $u$ transmit concurrently at the same time, then $u$ would not receive either messages. We suppose also that nodes know neither the topology of the network nor the number of nodes in the network. Moreover, they start indistinguishable, anonymous and unnamed. Under this extremal scenario, we design and analyze a fully distributed protocol to achieve the initialization task for a wireless multihop network of $n$ nodes uniformly scattered in a square $X$. We show how the transmitting range of the deployed stations can affect the typical characteristics such as the degrees and the diameter of the network. By allowing the nodes to transmit at a range $r= \sqrt{\frac{(1+\ell) \ln{n} \SIZE}{\pi n}}$ (slightly greater than the one required to have a connected network), we show how to design a randomized protocol running in expected time $O(n^{3/2} \log^2{n})$ in order to assign a unique number ranging from 1 to $n$ to each of the $n$ participating nodes.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 16:39:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
cs/0412015
Detlef Prescher
Detlef Prescher
A Tutorial on the Expectation-Maximization Algorithm Including Maximum-Likelihood Estimation and EM Training of Probabilistic Context-Free Grammars
Presented at the 15th European Summer School in Logic, Language and Information (ESSLLI 2003). Example 5 extended (and partially corrected)
null
null
null
cs.CL
null
The paper gives a brief review of the expectation-maximization algorithm (Dempster 1977) in the comprehensible framework of discrete mathematics. In Section 2, two prominent estimation methods, the relative-frequency estimation and the maximum-likelihood estimation are presented. Section 3 is dedicated to the expectation-maximization algorithm and a simpler variant, the generalized expectation-maximization algorithm. In Section 4, two loaded dice are rolled. A more interesting example is presented in Section 5: The estimation of probabilistic context-free grammars.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 17:10:17 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2005 14:05:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Prescher", "Detlef", "" ] ]
cs/0412016
Detlef Prescher
Detlef Prescher
Inside-Outside Estimation Meets Dynamic EM
4 pages, some typos corrected
Proceedings of IWPT 2001
null
null
cs.CL
null
We briefly review the inside-outside and EM algorithm for probabilistic context-free grammars. As a result, we formally prove that inside-outside estimation is a dynamic-programming variant of EM. This is interesting in its own right, but even more when considered in a theoretical context since the well-known convergence behavior of inside-outside estimation has been confirmed by many experiments but apparently has never been formally proved. However, being a version of EM, inside-outside estimation also inherits the good convergence behavior of EM. Therefore, the as yet imperfect line of argumentation can be transformed into a coherent proof.
[ { "version": "v1", "created": "Fri, 3 Dec 2004 18:10:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Prescher", "Detlef", "" ] ]
cs/0412018
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
Modeling Complex Higher Order Patterns
11 pages
null
null
Tr-04-11
cs.DB cs.AI
null
The goal of this paper is to show that generalizing the notion of frequent patterns can be useful in extending association analysis to more complex higher order patterns. To that end, we describe a general framework for modeling a complex pattern based on evaluating the interestingness of its sub-patterns. A key goal of any framework is to allow people to more easily express, explore, and communicate ideas, and hence, we illustrate how our framework can be used to describe a variety of commonly used patterns, such as frequent patterns, frequent closed patterns, indirect association patterns, hub patterns and authority patterns. To further illustrate the usefulness of the framework, we also present two new kinds of patterns that derived from the framework: clique pattern and bi-clique pattern and illustrate their practical use.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 12:28:29 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0412019
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A Link Clustering Based Approach for Clustering Categorical Data
10 pages
A poster paper in Proc. of WAIM 2004
null
null
cs.DL cs.AI
null
Categorical data clustering (CDC) and link clustering (LC) have been considered as separate research and application areas. The main focus of this paper is to investigate the commonalities between these two problems and the uses of these commonalities for the creation of new clustering algorithms for categorical data based on cross-fertilization between the two disjoint research fields. More precisely, we formally transform the CDC problem into an LC problem, and apply LC approach for clustering categorical data. Experimental results on real datasets show that LC based clustering method is competitive with existing CDC algorithms with respect to clustering accuracy.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 12:41:08 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0412020
Paul Rogers
Paul Rogers and Nael Abu-Ghazaleh
Towards Reliable Network Wide Broadcast in Mobile Ad Hoc Networks
12 pages, 22 figures
null
null
Tech Report: tr-cs-02-04
cs.NI
null
Network-Wide Broadcast (NWB) is a common operation in Mobile Ad hoc Networks (MANETs) used by routing protocols to discover routes and in group communication operations. NWB is commonly performed via flooding, which has been shown to be expensive in dense MANETs because of its high redundancy. Several efforts have targeted reducing the redundancy of floods. In this work, we target another problem that can substantially impact the success of NWBs: since MAC level broadcasts are unreliable, it is possible for critical rebroadcasts to be lost, leading to a significant drop in the node coverage. This is especially true under heavy load and in sparse topologies. We show that the techniques that target reducing the overhead of flooding, reduce its inherent redundancy and harm its reliability. In addition, we show that static approaches are more vulnerable to this problem. We then present a selective rebroadcast approach to improve the robustness of NWBs. We show that our approach leads to considerable improvement in NWB coverage relative to a recently proposed solution to this problem, with a small increase in overhead. The proposed approaches do not require proactive neighbor discovery and are therefore resilient to mobility. Finally, the solution can be added to virtually all NWB approaches to improve their reliability.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 18:30:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Rogers", "Paul", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0412021
Chiu Wo Choi
Chiu Wo Choi, Warwick Harvey, Jimmy Ho-Man Lee, Peter J. Stuckey
Finite Domain Bounds Consistency Revisited
12 pages
null
null
null
cs.AI cs.LO
null
A widely adopted approach to solving constraint satisfaction problems combines systematic tree search with constraint propagation for pruning the search space. Constraint propagation is performed by propagators implementing a certain notion of consistency. Bounds consistency is the method of choice for building propagators for arithmetic constraints and several global constraints in the finite integer domain. However, there has been some confusion in the definition of bounds consistency. In this paper we clarify the differences and similarities among the three commonly used notions of bounds consistency.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 08:04:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Chiu Wo", "" ], [ "Harvey", "Warwick", "" ], [ "Lee", "Jimmy Ho-Man", "" ], [ "Stuckey", "Peter J.", "" ] ]
cs/0412022
Petrus H. Potgieter
Petrus H. Potgieter
Zeno machines and hypercomputation
11 pages. First submitted in December 2004, substantially revised in July and in November 2005. To appear in Theoretical Computer Science
null
null
null
cs.CC
null
This paper reviews the Church-Turing Thesis (or rather, theses) with reference to their origin and application and considers some models of "hypercomputation", concentrating on perhaps the most straight-forward option: Zeno machines (Turing machines with accelerating clock). The halting problem is briefly discussed in a general context and the suggestion that it is an inevitable companion of any reasonable computational model is emphasised. It is hinted that claims to have "broken the Turing barrier" could be toned down and that the important and well-founded role of Turing computability in the mathematical sciences stands unchallenged.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 12:18:05 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2005 10:20:30 GMT" }, { "version": "v3", "created": "Wed, 11 Jan 2006 08:08:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Potgieter", "Petrus H.", "" ] ]