id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0412023 | Praveen Boinee | P. Boinee, F. Barbarino, A. De Angelis | Multidimensional data classification with artificial neural networks | 8 pages, 4 figures, Submitted to EURASIP Journal on Applied Signal
Processing, 2004 | null | null | null | cs.NE cs.AI | null | Multi-dimensional data classification is an important and challenging problem
in many astro-particle experiments. Neural networks have proved to be versatile
and robust in multi-dimensional data classification. In this article we shall
study the classification of gamma from the hadrons for the MAGIC Experiment.
Two neural networks have been used for the classification task. One is
Multi-Layer Perceptron based on supervised learning and other is
Self-Organising Map (SOM), which is based on unsupervised learning technique.
The results have been shown and the possible ways of combining these networks
have been proposed to yield better and faster classification results.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 20:23:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Boinee",
"P.",
""
],
[
"Barbarino",
"F.",
""
],
[
"De Angelis",
"A.",
""
]
]
|
cs/0412024 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Human-Level Performance on Word Analogy Questions by Latent Relational
Analysis | 32 pages, issued 2004, related work available at
http://purl.org/peter.turney | null | null | NRC-47422 | cs.CL cs.IR cs.LG | null | This paper introduces Latent Relational Analysis (LRA), a method for
measuring relational similarity. LRA has potential applications in many areas,
including information extraction, word sense disambiguation, machine
translation, and information retrieval. Relational similarity is correspondence
between relations, in contrast with attributional similarity, which is
correspondence between attributes. When two words have a high degree of
attributional similarity, we call them synonyms. When two pairs of words have a
high degree of relational similarity, we say that their relations are
analogous. For example, the word pair mason/stone is analogous to the pair
carpenter/wood. Past work on semantic similarity measures has mainly been
concerned with attributional similarity. Recently the Vector Space Model (VSM)
of information retrieval has been adapted to the task of measuring relational
similarity, achieving a score of 47% on a collection of 374 college-level
multiple-choice word analogy questions. In the VSM approach, the relation
between a pair of words is characterized by a vector of frequencies of
predefined patterns in a large corpus. LRA extends the VSM approach in three
ways: (1) the patterns are derived automatically from the corpus (they are not
predefined), (2) the Singular Value Decomposition (SVD) is used to smooth the
frequency data (it is also used this way in Latent Semantic Analysis), and (3)
automatically generated synonyms are used to explore reformulations of the word
pairs. LRA achieves 56% on the 374 analogy questions, statistically equivalent
to the average human score of 57%. On the related problem of classifying
noun-modifier relations, LRA achieves similar gains over the VSM, while using a
smaller corpus.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2004 21:50:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
]
|
cs/0412026 | Chiu Wo Choi | Chiu Wo Choi, Jimmy Ho-Man Lee, Peter J. Stuckey | Removing Propagation Redundant Constraints in Redundant Modeling | 30 pages, submitted to ACM Transactions on Computational Logic (TOCL) | null | null | null | cs.LO cs.AI | null | A widely adopted approach to solving constraint satisfaction problems
combines systematic tree search with various degrees of constraint propagation
for pruning the search space. One common technique to improve the execution
efficiency is to add redundant constraints, which are constraints logically
implied by others in the problem model. However, some redundant constraints are
propagation redundant and hence do not contribute additional propagation
information to the constraint solver. Redundant constraints arise naturally in
the process of redundant modeling where two models of the same problem are
connected and combined through channeling constraints. In this paper, we give
general theorems for proving propagation redundancy of one constraint with
respect to channeling constraints and constraints in the other model. We
illustrate, on problems from CSPlib (http://www.csplib.org/), how detecting and
removing propagation redundant constraints in redundant modeling can
significantly speed up constraint solving.
| [
{
"version": "v1",
"created": "Tue, 7 Dec 2004 06:31:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Choi",
"Chiu Wo",
""
],
[
"Lee",
"Jimmy Ho-Man",
""
],
[
"Stuckey",
"Peter J.",
""
]
]
|
cs/0412028 | Kazushige Terui | Patrick Baillot and Kazushige Terui | A feasible algorithm for typing in Elementary Affine Logic | 20 pages | null | null | null | cs.LO | null | We give a new type inference algorithm for typing lambda-terms in Elementary
Affine Logic (EAL), which is motivated by applications to complexity and
optimal reduction. Following previous references on this topic, the variant of
EAL type system we consider (denoted EAL*) is a variant without sharing and
without polymorphism. Our algorithm improves over the ones already known in
that it offers a better complexity bound: if a simple type derivation for the
term t is given our algorithm performs EAL* type inference in polynomial time.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:33:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baillot",
"Patrick",
""
],
[
"Terui",
"Kazushige",
""
]
]
|
cs/0412029 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin | The modular technology of development of the CAD expansions: profiles of
outside networks of water supply and water drain | 8 pages, 2 figures, in Russian | null | null | null | cs.CE cs.DS | null | The modular technology of development of the problem-oriented CAD expansions
is applied to a task of designing of profiles of outside networks of water
supply and water drain with realization in program system TechnoCAD GlassX. The
unity of structure of this profiles is revealed, the system model of the
drawings of profiles of networks is developed including the structured
parametric representation (properties of objects and their interdependence,
general settings and default settings) and operations with it, which
efficiently automate designing
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:42:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiyatullov",
"Rustem R.",
""
],
[
"Safin",
"Ilsur T.",
""
]
]
|
cs/0412030 | Vladimir Migunov | Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin | The modular technology of development of the CAD expansions: protection
of the buildings from the lightning | 8 pages, 2 figures, in Russian | null | null | null | cs.CE cs.DS | null | The modular technology of development of the problem-oriented CAD expansions
is applied to a task of designing of protection of the buildings from the
lightning with realization in program system TechnoCAD GlassX. The system model
of the drawings of lightning protection is developed including the structured
parametric representation (properties of objects and their interdependence,
general settings and default settings) and operations with it, which
efficiently automate designing
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:49:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
],
[
"Kafiyatullov",
"Rustem R.",
""
],
[
"Safin",
"Ilsur T.",
""
]
]
|
cs/0412031 | Vladimir Migunov | Vladimir V. Migunov | The Features of the Complex CAD system of Reconstruction of the
Industrial Plants | 6 pages, no figures, in Russian | null | null | null | cs.CE | null | The features of designing of reconstruction of the acting plant by its design
department are considered: the results of work are drawings corresponding with
the national standards; large number of the small projects for different acting
objects; variety of the types of the drawings in one project; large paper
archive. The models and methods of developing of the complex CAD system with
friend uniform environment of designing, with setting a profile of operations,
with usage of the general parts of the project, with a series of
problem-oriented subsystems are described on an example of a CAD system
TechnoCAD GlassX
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:52:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0412032 | Vladimir Migunov | Vladimir V. Migunov | The methods of support of the requirements of the Russian standards at
development of a CAD of industrial objects | 8 pages, 4 figures, in Russian | null | null | null | cs.CE cs.DS | null | The methods of support of the requirements of the Russian standards in a CAD
of industrial objects are explained, which were implemented in the CAD system
TechnoCAD GlassX with an own graphics core and own structures of data storage.
It is rotined, that the binding of storage structures and program code of a CAD
to the requirements of standards enable not only to fulfil these requirements
in project documentation, but also to increase a degree of compactness of
storage of drawings both on the disk and in the RAM
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 08:57:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0412033 | Vladimir Migunov | Vladimir V. Migunov | The modelling of the build constructions in a CAD of the renovation of
the enterprises by means of units in the drawings | 8 pages, 4 figures, in Russian | null | null | null | cs.CE | null | The parametric model of build constructions and features of design operations
are described for making drawings, which are the common component of the
different parts of the projects of renovation of enterprises. The key moment of
the deep design automation is the using of so-called units in the drawings,
which are joining a visible graphic part and invisible parameters. The model
has passed check during designing of several hundreds of drawings
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 09:01:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0412034 | Vladimir Migunov | Vladimir V. Migunov | The informatization of design works at industry firm during its
renovation | 9 pages, 3 figures, in Russian | null | null | null | cs.CE | null | The characteristic of design works on firm at its renovation and of the
common directions of their informatization is given. The implantation of a CAD
is selected as the key direction, and the requirements to a complex CAD-system
are stated. The methods of such a CAD-system development are featured, and the
connectedness of this development with the process of integration of
information space of design department of the firm is characterized. The
experience of development and implantation of a complex CAD of renovation of
firms TechnoCAD GlassX lies in a basis of this reviewing
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 11:08:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
]
|
cs/0412035 | Richard McClatchey | S R Amendolia, F Estrella, C del Frate, J Galvez, W Hassan, T Hauer, D
Manset, R McClatchey, M Odeh, D Rogulin, T Solomonides, R Warren | Deployment of a Grid-based Medical Imaging Application | 10 pages, 5 figures. Accepted by the 2005 HealthGrid Conference | null | null | null | cs.DC cs.DB | null | The MammoGrid project has deployed its Service-Oriented Architecture
(SOA)-based Grid application in a real environment comprising actual
participating hospitals. The resultant setup is currently being exploited to
conduct rigorous in-house tests in the first phase before handing over the
setup to the actual clinicians to get their feedback. This paper elaborates the
deployment details and the experiences acquired during this phase of the
project. Finally the strategy regarding migration to an upcoming middleware
from EGEE project will be described. This paper concludes by highlighting some
of the potential areas of future work.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 17:15:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Amendolia",
"S R",
""
],
[
"Estrella",
"F",
""
],
[
"del Frate",
"C",
""
],
[
"Galvez",
"J",
""
],
[
"Hassan",
"W",
""
],
[
"Hauer",
"T",
""
],
[
"Manset",
"D",
""
],
[
"McClatchey",
"R",
""
],
[
"Odeh",
"M",
""
],
[
"Rogulin",
"D",
""
],
[
"Solomonides",
"T",
""
],
[
"Warren",
"R",
""
]
]
|
cs/0412036 | Richard McClatchey | Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey & Tony
Solomonides | Reverse Engineering Ontology to Conceptual Data Models | 6 pages, 3 figures. Accepted by the IASTED International Conference
on Databases and Applications (DBA 2005) | null | null | null | cs.DC cs.DB | null | Ontologies facilitate the integration of heterogeneous data sources by
resolving semantic heterogeneity between them. This research aims to study the
possibility of generating a domain conceptual model from a given ontology with
the vision to grow this generated conceptual data model into a global
conceptual model integrating a number of existing data and information sources.
Based on ontologically derived semantics of the BWW model, rules are identified
that map elements of the ontology language (DAML+OIL) to domain conceptual
model elements. This mapping is demonstrated using TAMBIS ontology. A
significant corollary of this study is that it is possible to generate a domain
conceptual model from a given ontology subject to validation that needs to be
performed by the domain specialist before evolving this model into a global
conceptual model.
| [
{
"version": "v1",
"created": "Wed, 8 Dec 2004 17:23:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Solomonides",
"Tony",
""
]
]
|
cs/0412039 | Michel Dagenais | Marc Chatel, Michel Dagenais, Charles Levert, Makan Pourzandi | Security in Carrier Class Server Applications for All-IP Networks | Survey paper on the challenges of all IP networks in telecom
applications | null | null | null | cs.NI | null | A revolution is taking place in telecommunication networks. New services are
appearing on platforms such as third generation cellular phones (3G) and
broadband Internet access. This motivates the transition from mostly switched
to all-IP networks. The replacement of the traditional shallow and well-defined
interface to telephony networks brings accrued flexibility, but also makes the
network accordingly difficult to properly secure. This paper surveys the
implications of this transition on security issues in telecom applications. It
does not give an exhaustive list of security tools or security protocols. Its
goal is rather to initiate the reader to the security issues brought to carrier
class servers by this revolution.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2004 16:57:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chatel",
"Marc",
""
],
[
"Dagenais",
"Michel",
""
],
[
"Levert",
"Charles",
""
],
[
"Pourzandi",
"Makan",
""
]
]
|
cs/0412040 | Robert Burger | J. R. Burger | Data-stationary Architecture to Execute Quantum Algorithms Classically | null | null | null | null | cs.AR | null | This paper presents a data stationary architecture in which each word has an
attached address field. Address fields massively update in parallel to record
data interchanges. Words do not move until memory is read for post processing.
A sea of such cells can test large-scale quantum algorithms, although other
programming is possible.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2004 22:10:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burger",
"J. R.",
""
]
]
|
cs/0412041 | Hai-Feng Guo | Hai-Feng Guo and Gopal Gupta | An Efficient and Flexible Engine for Computing Fixed Points | 26 pages | null | null | null | cs.PL cs.AI cs.LO | null | An efficient and flexible engine for computing fixed points is critical for
many practical applications. In this paper, we firstly present a goal-directed
fixed point computation strategy in the logic programming paradigm. The
strategy adopts a tabled resolution (or memorized resolution) to mimic the
efficient semi-naive bottom-up computation. Its main idea is to dynamically
identify and record those clauses that will lead to recursive variant calls,
and then repetitively apply those alternatives incrementally until the fixed
point is reached. Secondly, there are many situations in which a fixed point
contains a large number or even infinite number of solutions. In these cases, a
fixed point computation engine may not be efficient enough or feasible at all.
We present a mode-declaration scheme which provides the capabilities to reduce
a fixed point from a big solution set to a preferred small one, or from an
infeasible infinite set to a finite one. The mode declaration scheme can be
characterized as a meta-level operation over the original fixed point. We show
the correctness of the mode declaration scheme. Thirdly, the mode-declaration
scheme provides a new declarative method for dynamic programming, which is
typically used for solving optimization problems. There is no need to define
the value of an optimal solution recursively, instead, defining a general
solution suffices. The optimal value as well as its corresponding concrete
solution can be derived implicitly and automatically using a mode-directed
fixed point computation engine. Finally, this fixed point computation engine
has been successfully implemented in a commercial Prolog system. Experimental
results are shown to indicate that the mode declaration improves both time and
space performances in solving dynamic programming problems.
| [
{
"version": "v1",
"created": "Thu, 9 Dec 2004 22:59:37 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jan 2005 21:18:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Guo",
"Hai-Feng",
""
],
[
"Gupta",
"Gopal",
""
]
]
|
cs/0412042 | Peter Jonsson | Peter Jonsson, Mikael Klasson, and Andrei Krokhin | The approximability of three-valued MAX CSP | null | null | null | null | cs.CC | null | In the maximum constraint satisfaction problem (Max CSP), one is given a
finite collection of (possibly weighted) constraints on overlapping sets of
variables, and the goal is to assign values from a given domain to the
variables so as to maximize the number (or the total weight, for the weighted
case) of satisfied constraints. This problem is NP-hard in general, and,
therefore, it is natural to study how restricting the allowed types of
constraints affects the approximability of the problem. It is known that every
Boolean (that is, two-valued) Max CSP problem with a finite set of allowed
constraint types is either solvable exactly in polynomial time or else
APX-complete (and hence can have no polynomial time approximation scheme unless
P=NP. It has been an open problem for several years whether this result can be
extended to non-Boolean Max CSP, which is much more difficult to analyze than
the Boolean case. In this paper, we make the first step in this direction by
establishing this result for Max CSP over a three-element domain. Moreover, we
present a simple description of all polynomial-time solvable cases of our
problem. This description uses the well-known algebraic combinatorial property
of supermodularity. We also show that every hard three-valued Max CSP problem
contains, in a certain specified sense, one of the two basic hard Max CSP
problems which are the Maximum k-colourable subgraph problems for k=2,3.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 15:34:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jonsson",
"Peter",
""
],
[
"Klasson",
"Mikael",
""
],
[
"Krokhin",
"Andrei",
""
]
]
|
cs/0412043 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Elena Mazzi, and Enea Zaffanella | Widening Operators for Weakly-Relational Numeric Abstractions (Extended
Abstract) | null | null | null | null | cs.PL | null | We discuss the divergence problems recently identified in some extrapolation
operators for weakly-relational numeric domains. We identify the cause of the
divergences and point out that resorting to more concrete, syntactic domains
can be avoided by researching suitable algorithms for the elimination of
redundant constraints in the chosen representation.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 15:52:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Mazzi",
"Elena",
""
],
[
"Zaffanella",
"Enea",
""
]
]
|
cs/0412045 | Riccardo Pucella | Andrew D. Gordon, Riccardo Pucella | Validating a Web Service Security Abstraction by Typing | 44 pages. A preliminary version appears in the Proceedings of the
Workshop on XML Security 2002, pp. 18-29, November 2002 | Formal Aspects of Computing 17 (3), pp. 277-318, 2005 | null | null | cs.CR | null | An XML web service is, to a first approximation, an RPC service in which
requests and responses are encoded in XML as SOAP envelopes, and transported
over HTTP. We consider the problem of authenticating requests and responses at
the SOAP-level, rather than relying on transport-level security. We propose a
security abstraction, inspired by earlier work on secure RPC, in which the
methods exported by a web service are annotated with one of three security
levels: none, authenticated, or both authenticated and encrypted. We model our
abstraction as an object calculus with primitives for defining and calling web
services. We describe the semantics of our object calculus by translating to a
lower-level language with primitives for message passing and cryptography. To
validate our semantics, we embed correspondence assertions that specify the
correct authentication of requests and responses. By appeal to the type theory
for cryptographic protocols of Gordon and Jeffrey's Cryptyc, we verify the
correspondence assertions simply by typing. Finally, we describe an
implementation of our semantics via custom SOAP headers.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 21:34:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gordon",
"Andrew D.",
""
],
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0412046 | David Eppstein | David Eppstein | Quasiconvex Programming | 33 pages, 14 figures | null | null | null | cs.CG | null | We define quasiconvex programming, a form of generalized linear programming
in which one seeks the point minimizing the pointwise maximum of a collection
of quasiconvex functions. We survey algorithms for solving quasiconvex programs
either numerically or via generalizations of the dual simplex method from
linear programming, and describe varied applications of this geometric
optimization technique in meshing, scientific computation, information
visualization, automated algorithm analysis, and robust statistics.
| [
{
"version": "v1",
"created": "Fri, 10 Dec 2004 22:50:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
]
|
cs/0412047 | Marko Rodriguez | Marko Rodriguez and Daniel Steinbock | A Social Network for Societal-Scale Decision-Making Systems | Dynamically Distributed Democracy algorithm presented in the arena of
a societal-scale decision support system | North American Association for Computational Social and
Organizational Science Conference Proceedings 2004 | null | null | cs.CY cs.DS cs.HC | null | In societal-scale decision-making systems the collective is faced with the
problem of ensuring that the derived group decision is in accord with the
collective's intention. In modern systems, political institutions have
instatiated representative forms of decision-making to ensure that every
individual in the society has a participatory voice in the decision-making
behavior of the whole--even if only indirectly through representation. An
agent-based simulation demonstrates that in modern representative systems, as
the ratio of representatives increases, there exists an exponential decrease in
the ability for the group to behave in accord with the desires of the whole. To
remedy this issue, this paper provides a novel representative power structure
for decision-making that utilizes a social network and power distribution
algorithm to maintain the collective's perspective over varying degrees of
participation and/or ratios of representation. This work shows promise for the
future development of policy-making systems that are supported by the computer
and network infrastructure of our society.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 00:32:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko",
""
],
[
"Steinbock",
"Daniel",
""
]
]
|
cs/0412048 | Benoit Masson | Enrico Formenti (I3S), Benoit Masson (I3S) | On computing fixed points for generalized sandpiles | Presented in DMCS 2004 (Turku, FINLAND) | null | null | null | cs.CC | null | We prove fixed points results for sandpiles starting with arbitrary initial
conditions. We give an effective algorithm for computing such fixed points, and
we refine it in the particular case of SPM.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 07:51:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Formenti",
"Enrico",
"",
"I3S"
],
[
"Masson",
"Benoit",
"",
"I3S"
]
]
|
cs/0412049 | Vedran Kordic | Danica Janglova | Neural Networks in Mobile Robot Motion | 9 Pages | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.15-22 | null | null | cs.RO cs.AI | null | This paper deals with a path planning and intelligent control of an
autonomous robot which should move safely in partially structured environment.
This environment may involve any number of obstacles of arbitrary shape and
size; some of them are allowed to move. We describe our approach to solving the
motion-planning problem in mobile robot control using neural networks-based
technique. Our method of the construction of a collision-free path for moving
robot among obstacles is based on two neural networks. The first neural network
is used to determine the "free" space using ultrasound range finder data. The
second neural network "finds" a safe direction for the next robot section of
the path in the workspace while avoiding the nearest obstacles. Simulation
examples of generated path with proposed techniques will be presented.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:32:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Janglova",
"Danica",
""
]
]
|
cs/0412050 | Vedran Kordic | Yongsheng Ou & Yangsheng Xu | Gyroscopically Stabilized Robot: Balance and Tracking | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.23-32 | null | null | cs.RO | null | The single wheel, gyroscopically stabilized robot - Gyrover, is a dynamically
stable but statically unstable, underactuated system. In this paper, based on
the dynamic model of the robot, we investigate two classes of nonholonomic
constraints associated with the system. Then, based on the backstepping
technology, we propose a control law for balance control of Gyrover. Next,
through transferring the systems states from Cartesian coordinate to polar
coordinate, control laws for point-to-point control and line tracking in
Cartesian space are provided.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:38:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ou",
"Yongsheng",
""
],
[
"Xu",
"Yangsheng",
""
]
]
|
cs/0412052 | Vedran Kordic | Olivier Michel | WebotsTM: Professional Mobile Robot Simulation | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.39-42 | null | null | cs.RO | null | Cyberbotics Ltd. develops WebotsTM, a mobile robotics simulation software
that provides you with a rapid prototyping environment for modelling,
programming and simulating mobile robots. The provided robot libraries enable
you to transfer your control programs to several commercially available real
mobile robots. WebotsTM lets you define and modify a complete mobile robotics
setup, even several different robots sharing the same environment. For each
object, you can define a number of properties, such as shape, color, texture,
mass, friction, etc. You can equip each robot with a large number of available
sensors and actuators. You can program these robots using your favorite
development environment, simulate them and optionally transfer the resulting
programs onto your real robots. WebotsTM has been developed in collaboration
with the Swiss Federal Institute of Technology in Lausanne, thoroughly tested,
well documented and continuously maintained for over 7 years. It is now the
main commercial product available from Cyberbotics Ltd.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:45:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Michel",
"Olivier",
""
]
]
|
cs/0412053 | Vedran Kordic | Atef A. Ata & Habib Johar | Dynamic simulation of task constrained of a rigid-flexible manipulator | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.61-66 | null | null | cs.RO | null | A rigid-flexible manipulator may be assigned tasks in a moving environment
where the winds or vibrations affect the position and/or orientation of surface
of operation. Consequently, losses of the contact and perhaps degradation of
the performance may occur as references are changed. When the environment is
moving, knowledge of the angle α between the contact surface and the
horizontal is required at every instant. In this paper, different profiles for
the time varying angle α are proposed to investigate the effect of this
change into the contact force and the joint torques of a rigid-flexible
manipulator. The coefficients of the equation of the proposed rotating surface
are changing with time to determine the new X and Y coordinates of the moving
surface as the surface rotates.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:48:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ata",
"Atef A.",
""
],
[
"Johar",
"Habib",
""
]
]
|
cs/0412054 | Vedran Kordic | L. M. Galantucci, G. Percoco & R. Spina | Assembly and Disassembly Planning by using Fuzzy Logic & Genetic
Algorithms | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.67-74 | null | null | cs.RO | null | The authors propose the implementation of hybrid Fuzzy Logic-Genetic
Algorithm (FL-GA) methodology to plan the automatic assembly and disassembly
sequence of products. The GA-Fuzzy Logic approach is implemented onto two
levels. The first level of hybridization consists of the development of a Fuzzy
controller for the parameters of an assembly or disassembly planner based on
GAs. This controller acts on mutation probability and crossover rate in order
to adapt their values dynamically while the algorithm runs. The second level
consists of the identification of theoptimal assembly or disassembly sequence
by a Fuzzy function, in order to obtain a closer control of the technological
knowledge of the assembly/disassembly process. Two case studies were analyzed
in order to test the efficiency of the Fuzzy-GA methodologies.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:50:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Galantucci",
"L. M.",
""
],
[
"Percoco",
"G.",
""
],
[
"Spina",
"R.",
""
]
]
|
cs/0412055 | Vedran Kordic | Alan P. Kypson and W. Randolph Chitwood Jr | Robotic Applications in Cardiac Surgery | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.87-92 | null | null | cs.RO | null | Traditionally, cardiac surgery has been performed through a median
sternotomy, which allows the surgeon generous access to the heart and
surrounding great vessels. As a paradigm shift in the size and location of
incisions occurs in cardiac surgery, new methods have been developed to allow
the surgeon the same amount of dexterity and accessibility to the heart in
confined spaces and in a less invasive manner. Initially, long instruments
without pivot points were used, however, more recent robotic telemanipulation
systems have been applied that allow for improved dexterity, enabling the
surgeon to perform cardiac surgery from a distance not previously possible. In
this rapidly evolving field, we review the recent history and clinical results
of using robotics in cardiac surgery.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:52:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kypson",
"Alan P.",
""
],
[
"Chitwood",
"W. Randolph",
"Jr"
]
]
|
cs/0412056 | Vedran Kordic | Nikita Pashenkov & Ryuichi Iwamasa | One-Chip Solution to Intelligent Robot Control: Implementing Hexapod
Subsumption Architecture Using a Contemporary Microprocessor | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp. 93-98 | null | null | cs.RO | null | This paper introduces a six-legged autonomous robot managed by a single
controller and a software core modeled on subsumption architecture. We begin by
discussing the features and capabilities of IsoPod, a new processor for
robotics which has enabled a streamlined implementation of our project. We
argue that this processor offers a unique set of hardware and software
features, making it a practical development platform for robotics in general
and for subsumption-based control architectures in particular. Next, we
summarize original ideas on subsumption architecture implementation for a
six-legged robot, as presented by its inventor Rodney Brooks in 1980s. A
comparison is then made to a more recent example of a hexapod control
architecture based on subsumption. The merits of both systems are analyzed and
a new subsumption architecture layout is formulated as a response. We conclude
with some remarks regarding the development of this project as a hint at new
potentials for intelligent robot design, opened by a recent development in
embedded controller market.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:55:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pashenkov",
"Nikita",
""
],
[
"Iwamasa",
"Ryuichi",
""
]
]
|
cs/0412057 | Vedran Kordic | Miomir Vukobratovic, Dejan Andric & Branislav Borovac | How to achieve various gait patterns from single nominal | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp. 99-108 | null | null | cs.RO | null | In this paper is presented an approach to achieving on-line modification of
nominal biped gait without recomputing entire dynamics when steady motion is
performed. Straight, dynamically balanced walk was used as a nominal gait, and
applied modifications were speed-up and slow-down walk and turning left and
right. It is shown that the disturbances caused by these modifications
jeopardize dynamic stability, but they can be simply compensated to enable walk
continuation.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:57:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vukobratovic",
"Miomir",
""
],
[
"Andric",
"Dejan",
""
],
[
"Borovac",
"Branislav",
""
]
]
|
cs/0412058 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng, Joshua Zhexue Huang | Clustering Categorical Data Streams | 23 pages. To Appear in Journal of Computational Methods on Science
and Engineering(JCMSE) | null | null | null | cs.DB cs.AI | null | The data stream model has been defined for new classes of applications
involving massive data being generated at a fast pace. Web click stream
analysis and detection of network intrusions are two examples. Cluster analysis
on data streams becomes more difficult, because the data objects in a data
stream must be accessed in order and can be read only once or few times with
limited resources. Recently, a few clustering algorithms have been developed
for analyzing numeric data streams. However, to our knowledge to date, no
algorithm exists for clustering categorical data streams. In this paper, we
propose an efficient clustering algorithm for analyzing categorical data
streams. It has been proved that the proposed algorithm uses small memory
footprints. We provide empirical analysis on the performance of the algorithm
in clustering both synthetic and real data streams
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 06:14:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
],
[
"Huang",
"Joshua Zhexue",
""
]
]
|
cs/0412059 | Ross Gayler | Ross W. Gayler | Vector Symbolic Architectures answer Jackendoff's challenges for
cognitive neuroscience | This is a slightly updated version of the paper presented at the
Joint International Conference on Cognitive Science, 13-17 July 2003,
University of New South Wales, Sydney, Australia. 6 pages | null | null | null | cs.NE cs.AI | null | Jackendoff (2002) posed four challenges that linguistic combinatoriality and
rules of language present to theories of brain function. The essence of these
problems is the question of how to neurally instantiate the rapid construction
and transformation of the compositional structures that are typically taken to
be the domain of symbolic processing. He contended that typical connectionist
approaches fail to meet these challenges and that the dialogue between
linguistic theory and cognitive neuroscience will be relatively unproductive
until the importance of these problems is widely recognised and the challenges
answered by some technical innovation in connectionist modelling. This paper
claims that a little-known family of connectionist models (Vector Symbolic
Architectures) are able to meet Jackendoff's challenges.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 08:00:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gayler",
"Ross W.",
""
]
]
|
cs/0412061 | Gerard Henry Edmond Duchamp | Gerard Henry Edmond Duchamp (LIPN), Jean-Gabriel Luque (IGM), Karol A.
Penson (LPTL), Christophe Tollu (LIPN) | Free quasi-symmetric functions, product actions and quantum field theory
of partitions | Submitted 28.11.04 | null | null | null | cs.SC math.CO quant-ph | null | We examine two associative products over the ring of symmetric functions
related to the intransitive and Cartesian products of permutation groups. As an
application, we give an enumeration of some Feynman type diagrams arising in
Bender's QFT of partitions. We end by exploring possibilities to construct
noncommutative analogues.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 19:37:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Duchamp",
"Gerard Henry Edmond",
"",
"LIPN"
],
[
"Luque",
"Jean-Gabriel",
"",
"IGM"
],
[
"Penson",
"Karol A.",
"",
"LPTL"
],
[
"Tollu",
"Christophe",
"",
"LIPN"
]
]
|
cs/0412062 | Michael Bauland | Michael Bauland and Edith Hemaspaandra | Isomorphic Implication | 22 pages; corrected typos and minor errors | null | null | null | cs.CC | null | We study the isomorphic implication problem for Boolean constraints. We show
that this is a natural analog of the subgraph isomorphism problem. We prove
that, depending on the set of constraints, this problem is in P, NP-complete,
or NP-hard, coNP-hard, and in parallel access to NP. We show how to extend the
NP-hardness and coNP-hardness to hardness for parallel access to NP for some
cases, and conjecture that this can be done in all cases.
| [
{
"version": "v1",
"created": "Tue, 14 Dec 2004 17:15:29 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2005 12:29:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bauland",
"Michael",
""
],
[
"Hemaspaandra",
"Edith",
""
]
]
|
cs/0412064 | Marko Rodriguez | Dan Steinbock, Craig Kaplan, Marko Rodriguez, Juana Diaz, Newton Der,
Suzanne Garcia | Collective Intelligence Quanitifed for Computer-Mediated Group Problem
Solving | University of California, Santa Cruz Tech Report UCSC-CRL-02-28 | null | null | null | cs.CY cs.HC cs.OH | null | Collective Intelligence (CI) is the ability of a group to exhibit greater
intelligence than its individual members. Expressed by the common saying that
"two minds are better than one," CI has been a topic of interest for social
psychology and the information sciences. Computer mediation adds a new element
in the form of distributed networks and group support systems. These facilitate
highly organized group activities that were all but impossible before computer
mediation. This paper presents experimental findings on group problem solving
where a distributed software system automatically integrates input from many
humans. In order to quantify Collective Intelligence, we compare the
performance of groups to individuals when solving a mathematically formalized
problem. This study shows that groups can outperform individuals on difficult
but not easy problems, though groups are slower to produce solutions. The
subjects are 57 university students. The task is the 8-Puzzle sliding tile
game.
| [
{
"version": "v1",
"created": "Wed, 15 Dec 2004 17:13:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Steinbock",
"Dan",
""
],
[
"Kaplan",
"Craig",
""
],
[
"Rodriguez",
"Marko",
""
],
[
"Diaz",
"Juana",
""
],
[
"Der",
"Newton",
""
],
[
"Garcia",
"Suzanne",
""
]
]
|
cs/0412065 | Riccardo Pucella | Stephen Chong, Riccardo Pucella | A Framework for Creating Natural Language User Interfaces for
Action-Based Applications | 25 pages, 1 figure. A preliminary version of this paper appeared in
the Proceedings of the Third International AMAST Workshop on Algebraic
Methods in Language Processing, TWLT Report 21, pp. 83-98, 2003 | null | null | null | cs.CL cs.HC | null | In this paper we present a framework for creating natural language interfaces
to action-based applications. Our framework uses a number of reusable
application-independent components, in order to reduce the effort of creating a
natural language interface for a given application. Using a type-logical
grammar, we first translate natural language sentences into expressions in an
extended higher-order logic. These expressions can be seen as executable
specifications corresponding to the original sentences. The executable
specifications are then interpreted by invoking appropriate procedures provided
by the application for which a natural language interface is being created.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 03:24:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chong",
"Stephen",
""
],
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0412066 | Vitorino Ramos Dr. | Vitorino Ramos, Pedro Pina, Fernando Muge | From Feature Extraction to Classification: A multidisciplinary Approach
applied to Portuguese Granites | 8 pages, 6 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_21.html | SCIA 99, 11th Scandinavian Conf. on Image Analysis, ISBN
87-88306-42-9, Vol.2, pp. 817-824, Kangerlussuaq, Greenland, 7-11, June 1999 | null | null | cs.AI cs.CV | null | The purpose of this paper is to present a complete methodology based on a
multidisciplinary approach, that goes from the extraction of features till the
classification of a set of different portuguese granites. The set of tools to
extract the features that characterise polished surfaces of the granites is
mainly based on mathematical morphology. The classification methodology is
based on a genetic algorithm capable of search the input feature space used by
the nearest neighbour rule classifier. Results show that is adequate to perform
feature reduction and simultaneous improve the recognition rate. Moreover, the
present methodology represents a robust strategy to understand the proper
nature of the images treated, and their discriminant features. KEYWORDS:
Portuguese grey granites, feature extraction, mathematical morphology, feature
reduction, genetic algorithms, nearest neighbour rule classifiers (k-NNR).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 19:04:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Pina",
"Pedro",
""
],
[
"Muge",
"Fernando",
""
]
]
|
cs/0412068 | Vitorino Ramos Dr. | Vitorino Ramos, Ajith Abraham | ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion
Detection System | 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special
track at WSTST 2005, Muroran, JAPAN | null | null | null | cs.CR cs.AI | null | Security of computers and the networks that connect them is increasingly
becoming of great significance. Computer security is defined as the protection
of computing systems against threats to confidentiality, integrity, and
availability. There are two types of intruders: the external intruders who are
unauthorized users of the machines they attack, and internal intruders, who
have permission to access the system with some restrictions. Due to the fact
that it is more and more improbable to a system administrator to recognize and
manually intervene to stop an attack, there is an increasing recognition that
ID systems should have a lot to earn on following its basic principles on the
behavior of complex natural systems, namely in what refers to
self-organization, allowing for a real distributed and collective perception of
this phenomena. With that aim in mind, the present work presents a
self-organized ant colony based intrusion detection system (ANTIDS) to detect
intrusions in a network infrastructure. The performance is compared among
conventional soft computing paradigms like Decision Trees, Support Vector
Machines and Linear Genetic Programming to model fast, online and efficient
intrusion detection systems.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 13:17:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Abraham",
"Ajith",
""
]
]
|
cs/0412069 | Vitorino Ramos Dr. | Vitorino Ramos, Jonathan Campbell, John Slater, John Gillespie, Ivan
F. Bendezu, Fionn Murtagh | Swarming around Shellfish Larvae | 11 pages, 4 figures,
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_53.html, submitted to IbPRIA
2005, Portugal | null | null | null | cs.AI cs.CV | null | The collection of wild larvae seed as a source of raw material is a major sub
industry of shellfish aquaculture. To predict when, where and in what
quantities wild seed will be available, it is necessary to track the appearance
and growth of planktonic larvae. One of the most difficult groups to identify,
particularly at the species level are the Bivalvia. This difficulty arises from
the fact that fundamentally all bivalve larvae have a similar shape and colour.
Identification based on gross morphological appearance is limited by the
time-consuming nature of the microscopic examination and by the limited
availability of expertise in this field. Molecular and immunological methods
are also being studied. We describe the application of computational pattern
recognition methods to the automated identification and size analysis of
scallop larvae. For identification, the shape features used are binary
invariant moments; that is, the features are invariant to shift (position
within the image), scale (induced either by growth or differential image
magnification) and rotation. Images of a sample of scallop and non-scallop
larvae covering a range of maturities have been analysed. In order to overcome
the automatic identification, as well as to allow the system to receive new
unknown samples at any moment, a self-organized and unsupervised ant-like
clustering algorithm based on Swarm Intelligence is proposed, followed by
simple k-NNR nearest neighbour classification on the final map. Results achieve
a full recognition rate of 100% under several situations (k =1 or 3).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 13:30:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Campbell",
"Jonathan",
""
],
[
"Slater",
"John",
""
],
[
"Gillespie",
"John",
""
],
[
"Bendezu",
"Ivan F.",
""
],
[
"Murtagh",
"Fionn",
""
]
]
|
cs/0412070 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | Less is More - Genetic Optimisation of Nearest Neighbour Classifiers | 9 pages, 7 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_13.html | Proc. RecPad 98 - 10th Portuguese Conference on Pattern
Recognition, F.Muge, C.Pinto and M.Piedade Eds., ISBN 972-97711-0-3, pp.
293-301, Lisbon, March 1998 | null | null | cs.AI cs.CV | null | The present paper deals with optimisation of Nearest Neighbour rule
Classifiers via Genetic Algorithms. The methodology consists on implement a
Genetic Algorithm capable of search the input feature space used by the NNR
classifier. Results show that is adequate to perform feature reduction and
simultaneous improve the Recognition Rate. Some practical examples prove that
is possible to Recognise Portuguese Granites in 100%, with only 3 morphological
features (from an original set of 117 features), which is well suited for real
time applications. Moreover, the present method represents a robust strategy to
understand the proper nature of the images treated, and their discriminant
features. KEYWORDS: Feature Reduction, Genetic Algorithms, Nearest Neighbour
Rule Classifiers (k-NNR).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 19:09:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
]
|
cs/0412073 | Vitorino Ramos Dr. | Vitorino Ramos | Self-Organizing the Abstract: Canvas as a Swarm Habitat for Collective
Memory, Perception and Cooperative Distributed Creativity | 2 pages, 1 figure, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html. Publication at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html | in First Art and Science Symposium, Models to Know Reality, J.
Rekalde, R. Ibanez and A. Simo (Eds.), pp. 59-60, Facultad de Bellas Artes
EHU/UPV, Universidad del Pais Vasco, 11-12 Dec., Bilbao, Spain, 2003 | null | null | cs.MM cs.AI | null | Past experiences under the designation of "Swarm Paintings" conducted in
2001, not only confirmed the possibility of realizing an artificial art (thus
non-human), as introduced into the process the questioning of creative
migration, specifically from the computer monitors to the canvas via a robotic
harm. In more recent self-organized based research we seek to develop and
profound the initial ideas by using a swarm of autonomous robots (ARTsBOT
project 2002-03), that "live" avoiding the purpose of being merely a simple
perpetrator of order streams coming from an external computer, but instead,
that actually co-evolve within the canvas space, acting (that is, laying ink)
according to simple inner threshold stimulus response functions, reacting
simultaneously to the chromatic stimulus present in the canvas environment done
by the passage of their team-mates, as well as by the distributed feedback,
affecting their future collective behaviour. In parallel, and in what respects
to certain types of collective systems, we seek to confirm, in a physically
embedded way, that the emergence of order (even as a concept) seems to be found
at a lower level of complexity, based on simple and basic interchange of
information, and on the local dynamic of parts, who, by self-organizing
mechanisms tend to form an lived whole, innovative and adapting, allowing for
emergent open-ended creative and distributed production. KEYWORDS: ArtSBots
Project, Swarm Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm
Paintings, Robot Paintings, Non-Human Art, Painting Emergence and Cooperation,
Art and Complexity, ArtBots: The Robot Talent Show.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:36:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
|
cs/0412074 | Elizabeth Haubert | Elizabeth Haubert | Threats of Human Error in a High-Performance Storage System: Problem
Statement and Case Study | 13 pages, 1 figure | null | null | null | cs.HC cs.OS | null | System administration is a difficult, often tedious, job requiring many
skilled laborers. The data that is protected by system administrators is often
valued at or above the value of the institution maintaining that data. A number
of ethnographic studies have confirmed the skill of these operators, and the
difficulty of providing adequate tools. In an effort to minimize the
maintenance costs, an increasing portion of system administration is subject to
automation - particularly simple, routine tasks such as data backup. While such
tools reduce the risk of errors from carelessness, the same tools may result in
reduced skill and system familiarity in experienced workers. Care should be
taken to ensure that operators maintain system awareness without placing the
operator in a passive, monitoring role.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:38:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haubert",
"Elizabeth",
""
]
]
|
cs/0412075 | Vitorino Ramos Dr. | Vitorino Ramos, Juan J. Merelo | Self-Organized Stigmergic Document Maps: Environment as a Mechanism for
Context Learning | 10 pages, 5 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_42.html | in AEB 2002, 1st Spanish Conference on Evolutionary and
Bio-Inspired Algorithms, E. Alba, F. Herrera, J.J. Merelo et al. (Eds.), pp.
284-293, Centro Univ. de Merida, Merida, Spain, 6-8 Feb. 2002 | null | null | cs.AI cs.DC | null | Social insect societies and more specifically ant colonies, are distributed
systems that, in spite of the simplicity of their individuals, present a highly
structured social organization. As a result of this organization, ant colonies
can accomplish complex tasks that in some cases exceed the individual
capabilities of a single ant. The study of ant colonies behavior and of their
self-organizing capabilities is of interest to knowledge retrieval/management
and decision support systems sciences, because it provides models of
distributed adaptive organization which are useful to solve difficult
optimization, classification, and distributed control problems, among others.
In the present work we overview some models derived from the observation of
real ants, emphasizing the role played by stigmergy as distributed
communication paradigm, and we present a novel strategy to tackle unsupervised
clustering as well as data retrieval problems. The present ant clustering
system (ACLUSTER) avoids not only short-term memory based strategies, as well
as the use of several artificial ant types (using different speeds), present in
some recent approaches. Moreover and according to our knowledge, this is also
the first application of ant systems into textual document clustering.
KEYWORDS: Swarm Intelligence, Ant Systems, Unsupervised Clustering, Data
Retrieval, Data Mining, Distributed Computing, Document Maps, Textual Document
Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:47:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Merelo",
"Juan J.",
""
]
]
|
cs/0412076 | Vitorino Ramos Dr. | J.R. Caldas-Pinto, Pedro Pina, Vitorino Ramos, Mario Ramalho | Clustering Techniques for Marbles Classification | 7 pages, 17 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_41.html | RecPad 2002 -12th Portuguese Conference on Pattern Recognition,
ISBN 972-789-067-9, Aveiro, Portugal, June 27-28, 2002 | null | null | cs.AI cs.CV | null | Automatic marbles classification based on their visual appearance is an
important industrial issue. However, there is no definitive solution to the
problem mainly due to the presence of randomly distributed high number of
different colours and its subjective evaluation by the human expert. In this
paper we present a study of segmentation techniques, we evaluate they overall
performance using a training set and standard quality measures and finally we
apply different clustering techniques to automatically classify the marbles.
KEYWORDS: Segmentation, Clustering, Quadtrees, Learning Vector Quantization
(LVQ), Simulated Annealing (SA).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:55:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Caldas-Pinto",
"J. R.",
""
],
[
"Pina",
"Pedro",
""
],
[
"Ramos",
"Vitorino",
""
],
[
"Ramalho",
"Mario",
""
]
]
|
cs/0412077 | Vitorino Ramos Dr. | Vitorino Ramos | On the Implicit and on the Artificial - Morphogenesis and Emergent
Aesthetics in Autonomous Collective Systems | 33 pages, 7 figures, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html . Publ. at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html | Chapter 2 in ARCHITOPIA Book, Art, Architecture and Science, J.L.
Maubant et al. (Eds.), pp. 25-57, INSTITUT D'ART CONTEMPORAIN (France), ISBN
: 2905985631, Feb. 2002 | null | null | cs.AI cs.MM | null | Imagine a "machine" where there is no pre-commitment to any particular
representational scheme: the desired behaviour is distributed and roughly
specified simultaneously among many parts, but there is minimal specification
of the mechanism required to generate that behaviour, i.e. the global behaviour
evolves from the many relations of multiple simple behaviours. A machine that
lives to and from/with Synergy. An artificial super-organism that avoids
specific constraints and emerges within multiple low-level implicit
bio-inspired mechanisms. KEYWORDS: Complex Science, ArtSBots Project, Swarm
Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm Paintings, Robot
Paintings, Non-Human Art, Painting Emergence and Cooperation, Art and
Complexity, ArtBots: The Robot Talent Show.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:15:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
|
cs/0412078 | David Renault | D. Renault | The vertex-transitive TLF-planar graphs | Article : 23 pages, 15 figures Appendix : 13 pages, 72 figures
Submitted to Discrete Mathematics The appendix is accessible at
http://www.labri.fr/~renault/research/research.html | null | null | null | cs.DM | null | We consider the class of the topologically locally finite (in short TLF)
planar vertex-transitive graphs, a class containing in particular all the
one-ended planar Cayley graphs and the normal transitive tilings. We
characterize these graphs with a finite local representation and a special kind
of finite state automaton named labeling scheme. As a result, we are able to
enumerate and describe all TLF-planar vertex-transitive graphs of any given
degree. Also, we are able decide to whether any TLF-planar transitive graph is
Cayley or not.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:18:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Renault",
"D.",
""
]
]
|
cs/0412079 | Vitorino Ramos Dr. | Vitorino Ramos | The MC2 Project [Machines of Collective Conscience]: A possible walk, up
to Life-like Complexity and Behaviour, from bottom, basic and simple
bio-inspired heuristics - a walk, up into the morphogenesis of information | 14 pages, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/MC2.html | at UTOPIA Biennial Art Exposition CATALOGUE, Cascais, Portugal,
July 12-22, 2001 | null | null | cs.AI cs.MM | null | Synergy (from the Greek word synergos), broadly defined, refers to combined
or co-operative effects produced by two or more elements (parts or
individuals). The definition is often associated with the holistic conviction
quote that "the whole is greater than the sum of its parts" (Aristotle, in
Metaphysics), or the whole cannot exceed the sum of the energies invested in
each of its parts (e.g. first law of thermodynamics) even if it is more
accurate to say that the functional effects produced by wholes are different
from what the parts can produce alone. Synergy is a ubiquitous phenomena in
nature and human societies alike. One well know example is provided by the
emergence of self-organization in social insects, via direct or indirect
interactions. The latter types are more subtle and defined as stigmergy to
explain task coordination and regulation in the context of nest reconstruction
in termites. An example, could be provided by two individuals, who interact
indirectly when one of them modifies the environment and the other responds to
the new environment at a later time. In other words, stigmergy could be defined
as a particular case of environmental or spatial synergy. The system is purely
holistic, and their properties are intrinsically emergent and autocatalytic. On
the present work we present a "machine" where there is no precommitment to any
particular representational scheme: the desired behaviour is distributed and
roughly specified simultaneously among many parts, but there is minimal
specification of the mechanism required to generate that behaviour, i.e. the
global behaviour evolves from the many relations of multiple simple behaviours.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:28:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
|
cs/0412080 | Vitorino Ramos Dr. | Vitorino Ramos | The Biological Concept of Neoteny in Evolutionary Colour Image
Segmentation - Simple Experiments in Simple Non-Memetic Genetic Algorithms | 12 pages, 3 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_35.html | in Applications of Evolutionary Computation, (Eds.), EuroGP /
EvoIASP 2001 - 3rd Eur. Works. on Evol. Comp. in Image Analysis and Signal
Processing, Lake Como, Milan, Italy, Lecture Notes in Computer Science, Vol.
2037, pp. 364-378, Springer-Verlag, Berlin-Heidelberg, April 18-20, 2001 | null | null | cs.AI cs.NE | null | Neoteny, also spelled Paedomorphosis, can be defined in biological terms as
the retention by an organism of juvenile or even larval traits into later life.
In some species, all morphological development is retarded; the organism is
juvenilized but sexually mature. Such shifts of reproductive capability would
appear to have adaptive significance to organisms that exhibit it. In terms of
evolutionary theory, the process of paedomorphosis suggests that larval stages
and developmental phases of existing organisms may give rise, under certain
circumstances, to wholly new organisms. Although the present work does not
pretend to model or simulate the biological details of such a concept in any
way, these ideas were incorporated by a rather simple abstract computational
strategy, in order to allow (if possible) for faster convergence into simple
non-memetic Genetic Algorithms, i.e. without using local improvement procedures
(e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic
Algorithm was used for colour image segmentation purposes by using K-mean
unsupervised clustering methods, namely for guiding the evolutionary algorithm
in his search for finding the optimal or sub-optimal data partition. Average
results suggest that the use of neotonic strategies by employing juvenile
genotypes into the later generations and the use of linear-dynamic mutation
rates instead of constant, can increase fitness values by 58% comparing to
classical Genetic Algorithms, independently from the starting population
characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:39:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
|
cs/0412081 | Vitorino Ramos Dr. | Vitorino Ramos | Artificial Neoteny in Evolutionary Image Segmentation | 10 pages, 4 figures | SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge,
Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 69-78, Lisbon,
Portugal, 11-13 Sep. 2000 | null | null | cs.AI cs.NE | null | Neoteny, also spelled Paedomorphosis, can be defined in biological terms as
the retention by an organism of juvenile or even larval traits into later life.
In some species, all morphological development is retarded; the organism is
juvenilized but sexually mature. Such shifts of reproductive capability would
appear to have adaptive significance to organisms that exhibit it. In terms of
evolutionary theory, the process of paedomorphosis suggests that larval stages
and developmental phases of existing organisms may give rise, under certain
circumstances, to wholly new organisms. Although the present work does not
pretend to model or simulate the biological details of such a concept in any
way, these ideas were incorporated by a rather simple abstract computational
strategy, in order to allow (if possible) for faster convergence into simple
non-memetic Genetic Algorithms, i.e. without using local improvement procedures
(e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic
Algorithm was used for colour image segmentation purposes by using K-mean
unsupervised clustering methods, namely for guiding the evolutionary algorithm
in his search for finding the optimal or sub-optimal data partition. Average
results suggest that the use of neotonic strategies by employing juvenile
genotypes into the later generations and the use of linear-dynamic mutation
rates instead of constant, can increase fitness values by 58% comparing to
classical Genetic Algorithms, independently from the starting population
characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:44:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
|
cs/0412083 | Vitorino Ramos Dr. | A. Marcolino, Vitorino Ramos, Mario Ramalho, J.R. Caldas Pinto | Line and Word Matching in Old Documents | 12 pages, 7 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_32.html | SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge,
Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 123-135,
Lisbon, Portugal, 11-13 Sep. 2000 | null | null | cs.AI cs.CV | null | This paper is concerned with the problem of establishing an index based on
word matching. It is assumed that the book was digitised as better as possible
and some pre-processing techniques were already applied as line orientation
correction and some noise removal. However two main factor are responsible for
being not possible to apply ordinary optical character recognition techniques
(OCR): the presence of antique fonts and the degraded state of many characters
due to unrecoverable original time degradation. In this paper we make a short
introduction to word segmentation that involves finding the lines that
characterise a word. After we discuss different approaches for word matching
and how they can be combined to obtain an ordered list for candidate words for
the matching. This discussion will be illustrated by examples.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:58:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Marcolino",
"A.",
""
],
[
"Ramos",
"Vitorino",
""
],
[
"Ramalho",
"Mario",
""
],
[
"Pinto",
"J. R. Caldas",
""
]
]
|
cs/0412084 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | Map Segmentation by Colour Cube Genetic K-Mean Clustering | 4 pages, 1 figure, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_31.html | ECDL 2000 - 4th Eur. Conf. on Research and Advanced Technology for
Digital Libraries, J. Borbinha and T. Baker (Eds.), ISBN 3-540-41023-6, LNCS
series, Vol. 1923, pp. 319-323, Springer-Verlag, Heidelberg, Lisbon,
Portugal, 18-20 Sep. 2000 | null | null | cs.AI cs.NE | null | Segmentation of a colour image composed of different kinds of texture regions
can be a hard problem, namely to compute for an exact texture fields and a
decision of the optimum number of segmentation areas in an image when it
contains similar and/or unstationary texture fields. In this work, a method is
described for evolving adaptive procedures for these problems. In many real
world applications data clustering constitutes a fundamental issue whenever
behavioural or feature domains can be mapped into topological domains. We
formulate the segmentation problem upon such images as an optimisation problem
and adopt evolutionary strategy of Genetic Algorithms for the clustering of
small regions in colour feature space. The present approach uses k-Means
unsupervised clustering methods into Genetic Algorithms, namely for guiding
this last Evolutionary Algorithm in his search for finding the optimal or
sub-optimal data partition, task that as we know, requires a non-trivial search
because of its NP-complete nature. To solve this task, the appropriate genetic
coding is also discussed, since this is a key aspect in the implementation. Our
purpose is to demonstrate the efficiency of Genetic Algorithms to automatic and
unsupervised texture segmentation. Some examples in Colour Maps are presented
and overall results discussed. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 17:04:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
]
|
cs/0412086 | Vitorino Ramos Dr. | Vitorino Ramos, Filipe Almeida | Artificial Ant Colonies in Digital Image Habitats - A Mass Behaviour
Effect Study on Pattern Recognition | 11 pages, 3 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_29.html | Proc. of ANTS 2000 - 2nd Int. Works. on Ant Algorithms (From Ant
Colonies to Artificial Ants), Marco Dorigo, Martin Middendorf, Thomas Stuzle
(Eds.), pp. 113, Brussels, Belgium, 7-9 Sep. 2000 | null | null | cs.AI cs.CV | null | Some recent studies have pointed that, the self-organization of neurons into
brain-like structures, and the self-organization of ants into a swarm are
similar in many respects. If possible to implement, these features could lead
to important developments in pattern recognition systems, where perceptive
capabilities can emerge and evolve from the interaction of many simple local
rules. The principle of the method is inspired by the work of Chialvo and
Millonas who developed the first numerical simulation in which swarm cognitive
map formation could be explained. From this point, an extended model is
presented in order to deal with digital image habitats, in which artificial
ants could be able to react to the environment and perceive it. Evolution of
pheromone fields point that artificial ant colonies could react and adapt
appropriately to any type of digital habitat. KEYWORDS: Swarm Intelligence,
Self-Organization, Stigmergy, Artificial Ant Systems, Pattern Recognition and
Perception, Image Segmentation, Gestalt Perception Theory, Distributed
Computation.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 17:19:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Almeida",
"Filipe",
""
]
]
|
cs/0412087 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | Image Colour Segmentation by Genetic Algorithms | 5 pages, 1 figure, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_26.html | RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in
Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp.
125-129, Porto, Portugal, May 11-12, 2000 | null | null | cs.AI cs.CV | null | Segmentation of a colour image composed of different kinds of texture regions
can be a hard problem, namely to compute for an exact texture fields and a
decision of the optimum number of segmentation areas in an image when it
contains similar and/or unstationary texture fields. In this work, a method is
described for evolving adaptive procedures for these problems. In many real
world applications data clustering constitutes a fundamental issue whenever
behavioural or feature domains can be mapped into topological domains. We
formulate the segmentation problem upon such images as an optimisation problem
and adopt evolutionary strategy of Genetic Algorithms for the clustering of
small regions in colour feature space. The present approach uses k-Means
unsupervised clustering methods into Genetic Algorithms, namely for guiding
this last Evolutionary Algorithm in his search for finding the optimal or
sub-optimal data partition, task that as we know, requires a non-trivial search
because of its intrinsic NP-complete nature. To solve this task, the
appropriate genetic coding is also discussed, since this is a key aspect in the
implementation. Our purpose is to demonstrate the efficiency of Genetic
Algorithms to automatic and unsupervised texture segmentation. Some examples in
Colour Maps, Ornamental Stones and in Human Skin Mark segmentation are
presented and overall results discussed. KEYWORDS: Genetic Algorithms, Colour
Image Segmentation, Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 17:29:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
]
|
cs/0412088 | Vitorino Ramos Dr. | Vitorino Ramos, Fernando Muge | On Image Filtering, Noise and Morphological Size Intensity Diagrams | 9 pages, 4 figures, Author at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_25.html | RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in
Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp.
483-491, Porto, Portugal, May 11-12, 2000 | null | null | cs.CV cs.AI | null | In the absence of a pure noise-free image it is hard to define what noise is,
in any original noisy image, and as a consequence also where it is, and in what
amount. In fact, the definition of noise depends largely on our own aim in the
whole image analysis process, and (perhaps more important) in our
self-perception of noise. For instance, when we perceive noise as disconnected
and small it is normal to use MM-ASF filters to treat it. There is two
evidences of this. First, in many instances there is no ideal and pure
noise-free image to compare our filtering process (nothing but our
self-perception of its pure image); second, and related with this first point,
MM transformations that we chose are only based on our self - and perhaps -
fuzzy notion. The present proposal combines the results of two MM filtering
transformations (FT1, FT2) and makes use of some measures and quantitative
relations on their Size/Intensity Diagrams to find the most appropriate noise
removal process. Results can also be used for finding the most appropriate stop
criteria, and the right sequence of MM operators combination on Alternating
Sequential Filters (ASF), if these measures are applied, for instance, on a
Genetic Algorithm's target function.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 18:58:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Muge",
"Fernando",
""
]
]
|
cs/0412089 | Evgeny Yanenko O. | Evgeny Yanenko | Evolving Categories: Consistent Framework for Representation of Data and
Algorithms | 10 pages, 20 pictures | null | null | null | cs.DS | null | A concept of "evolving categories" is suggested to build a simple, scalable,
mathematically consistent framework for representing in uniform way both data
and algorithms. A state machine for executing algorithms becomes clear, rich
and powerful semantics, based on category theory, and still allows easy
implementation. Moreover, it gives an original insight into the nature and
semantics of algorithms.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 22:58:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yanenko",
"Evgeny",
""
]
]
|
cs/0412090 | Serban Vlad E. | Serban E. Vlad | Real Time Models of the Asynchronous Circuits: The Delay Theory | 82 pages, 30 figures | in New Developments in Computer Science Research, Editor Susan
Shannon, Nova Science Publishers, Inc., New York, 2005 | null | null | cs.GL | null | The chapter from the book introduces the delay theory, whose purpose is the
modeling of the asynchronous circuits from digital electrical engineering with
ordinary and differential pseudo-boolean equations.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 23:04:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
]
|
cs/0412091 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | The Combination of Paradoxical, Uncertain, and Imprecise Sources of
Information based on DSmT and Neutro-Fuzzy Inference | 20 pages | A version of this paper published in Proceedings of 10th
International Conference on Fuzzy Theory and Technology (FT&T 2005), Salt
Lake City, Utah, USA, July 21-26, 2005. | null | null | cs.AI | null | The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been, and
still remains today, of primal importance for the development of reliable
modern information systems involving artificial reasoning. In this chapter, we
present a survey of our recent theory of plausible and paradoxical reasoning,
known as Dezert-Smarandache Theory (DSmT) in the literature, developed for
dealing with imprecise, uncertain and paradoxical sources of information. We
focus our presentation here rather on the foundations of DSmT, and on the two
important new rules of combination, than on browsing specific applications of
DSmT available in literature. Several simple examples are given throughout the
presentation to show the efficiency and the generality of this new approach.
The last part of this chapter concerns the presentation of the neutrosophic
logic, the neutro-fuzzy inference and its connection with DSmT. Fuzzy logic and
neutrosophic logic are useful tools in decision making after fusioning the
information using the DSm hybrid rule of combination of masses.
| [
{
"version": "v1",
"created": "Sun, 19 Dec 2004 14:56:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
]
|
cs/0412092 | Alasdair Earl | A. Earl and P. Clark | Mass Storage Management and the Grid | 4 pages, 3 figures, Presented at Computing for High Energy and
Nuclear Physics 2004 (CHEP '04), Interlaken, Switzerland, September 2004 | null | null | null | cs.DC cs.SE | null | The University of Edinburgh has a significant interest in mass storage
systems as it is one of the core groups tasked with the roll out of storage
software for the UK's particle physics grid, GridPP. We present the results of
a development project to provide software interfaces between the SDSC Storage
Resource Broker, the EU DataGrid and the Storage Resource Manager. This project
was undertaken in association with the eDikt group at the National eScience
Centre, the Universities of Bristol and Glasgow, Rutherford Appleton Laboratory
and the San Diego Supercomputing Center.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 11:50:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Earl",
"A.",
""
],
[
"Clark",
"P.",
""
]
]
|
cs/0412093 | Alasdair Earl | A. Earl, P. Clark, S. Thorn | ScotGrid: A Prototype Tier 2 Centre | 4 pages, 4 diagrams. Presented at Computing for High Energy and
Nuclear Physics 2004 (CHEP '04). Interlaken, Switzerland, September 2004 | null | null | null | cs.AR cs.DC | null | ScotGrid is a prototype regional computing centre formed as a collaboration
between the universities of Durham, Edinburgh and Glasgow as part of the UK's
national particle physics grid, GridPP. We outline the resources available at
the three core sites and our optimisation efforts for our user communities. We
discuss the work which has been conducted in extending the centre to embrace
new projects both from particle physics and new user communities and explain
our methodology for doing this.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 11:55:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Earl",
"A.",
""
],
[
"Clark",
"P.",
""
],
[
"Thorn",
"S.",
""
]
]
|
cs/0412094 | Christoph Durr | Philippe Baptiste, Marek Chrobak, Christoph Durr, Francis Sourd | Preemptive Multi-Machine Scheduling of Equal-Length Jobs to Minimize the
Average Flow Time | null | null | null | This paper is now part of the report cs.DS/0605078. | cs.DS | null | We study the problem of preemptive scheduling of n equal-length jobs with
given release times on m identical parallel machines. The objective is to
minimize the average flow time. Recently, Brucker and Kravchenko proved that
the optimal schedule can be computed in polynomial time by solving a linear
program with O(n^3) variables and constraints, followed by some substantial
post-processing (where n is the number of jobs.) In this note we describe a
simple linear program with only O(mn) variables and constraints. Our linear
program produces directly the optimal schedule and does not require any
post-processing.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 16:15:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baptiste",
"Philippe",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Sourd",
"Francis",
""
]
]
|
cs/0412095 | Mirela Damian | Mirela Damian and Joseph O'Rourke | Partitioning Regular Polygons into Circular Pieces II:Nonconvex
Partitions | 13 pages, 11 figures | null | null | null | cs.CG cs.DM | null | We explore optimal circular nonconvex partitions of regular k-gons. The
circularity of a polygon is measured by its aspect ratio: the ratio of the
radii of the smallest circumscribing circle to the largest inscribed disk. An
optimal circular partition minimizes the maximum ratio over all pieces in the
partition. We show that the equilateral triangle has an optimal 4-piece
nonconvex partition, the square an optimal 13-piece nonconvex partition, and
the pentagon has an optimal nonconvex partition with more than 20 thousand
pieces. For hexagons and beyond, we provide a general algorithm that approaches
optimality, but does not achieve it.
| [
{
"version": "v1",
"created": "Tue, 21 Dec 2004 05:41:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"O'Rourke",
"Joseph",
""
]
]
|
cs/0412100 | Stephan Tobies | Peter H. Deussen and Stephan Tobies | Formal Test Purposes and The Validity of Test Cases | This paper appeared in the proceedings of the 22nd IFIP WG 6.1
International Conference on Formal Techniques for Networked and Distributed
Systems (FORTE 2002), number 2529 Lecture Notes in Computer Science | null | null | null | cs.DS | null | We give a formalization of the notion of test purpose based on (suitably
restricted) Message Sequence Charts. We define the validity of test cases with
respect to such a formal test purpose and provide a simple decision procedure
for validity.
| [
{
"version": "v1",
"created": "Wed, 22 Dec 2004 08:53:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Deussen",
"Peter H.",
""
],
[
"Tobies",
"Stephan",
""
]
]
|
cs/0412101 | Stephan Tobies | Franz Baader and Stephan Tobies | The Inverse Method Implements the Automata Approach for Modal
Satisfiability | A short version of this report has appeared at the First
International Joint Conference on Automated Reasoning, IJCAR 2001 | null | null | null | cs.LO | null | Tableaux-based decision procedures for satisfiability of modal and
description logics behave quite well in practice, but it is sometimes hard to
obtain exact worst-case complexity results using these approaches, especially
for EXPTIME-complete logics. In contrast, automata-based approaches often yield
algorithms for which optimal worst-case complexity can easily be proved.
However, the algorithms obtained this way are usually not only worst-case, but
also best-case exponential: they first construct an automaton that is always
exponential in the size of the input, and then apply the (polynomial) emptiness
test to this large automaton. To overcome this problem, one must try to
construct the automaton "on-the-fly" while performing the emptiness test.
In this paper we will show that Voronkov's inverse method for the modal logic
K can be seen as an on-the-fly realization of the emptiness test done by the
automata approach for K. The benefits of this result are two-fold. First, it
shows that Voronkov's implementation of the inverse method, which behaves quite
well in practice, is an optimized on-the-fly implementation of the
automata-based satisfiability procedure for K. Second, it can be used to give a
simpler proof of the fact that Voronkov's optimizations do not destroy
completeness of the procedure. We will also show that the inverse method can
easily be extended to handle global axioms, and that the correspondence to the
automata approach still holds in this setting. In particular, the inverse
method yields an EXPTIME-algorithm for satisfiability in K w.r.t. global
axioms.
| [
{
"version": "v1",
"created": "Wed, 22 Dec 2004 14:17:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baader",
"Franz",
""
],
[
"Tobies",
"Stephan",
""
]
]
|
cs/0412104 | Tomas Klos | Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1)
Center for Mathematics and Computer Science (CWI), Amsterdam, The
Netherlands, (2) Eindhoven University of Technology, Eindhoven, The
Netherlands) | Negotiating over Bundles and Prices Using Aggregate Knowledge | 15 pages, 7 eps figures, Springer llncs documentclass. Extended
version of the paper published in "E-Commerce and Web Technologies," Kurt
Bauknecht, Martin Bichler and Birgit Pr\"{o}ll (eds.). Springer Lecture Notes
in Computer Science, Volume 3182, Berlin: Springer, p. 218--227 | null | null | SEN-E0405 | cs.MA cs.GT | null | Combining two or more items and selling them as one good, a practice called
bundling, can be a very effective strategy for reducing the costs of producing,
marketing, and selling goods. In this paper, we consider a form of multi-issue
negotiation where a shop negotiates both the contents and the price of bundles
of goods with his customers. We present some key insights about, as well as a
technique for, locating mutually beneficial alternatives to the bundle
currently under negotiation. The essence of our approach lies in combining
historical sales data, condensed into aggregate knowledge, with current data
about the ongoing negotiation process, to exploit these insights. In
particular, when negotiating a given bundle of goods with a customer, the shop
analyzes the sequence of the customer's offers to determine the progress in the
negotiation process. In addition, it uses aggregate knowledge concerning
customers' valuations of goods in general. We show how the shop can use these
two sources of data to locate promising alternatives to the current bundle.
When the current negotiation's progress slows down, the shop may suggest the
most promising of those alternatives and, depending on the customer's response,
continue negotiating about the alternative bundle, or propose another
alternative. Extensive computer simulation experiments show that our approach
increases the speed with which deals are reached, as well as the number and
quality of the deals reached, as compared to a benchmark. In addition, we show
that the performance of our system is robust to a variety of changes in the
negotiation strategies employed by the customers.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 11:31:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Somefun",
"Koye",
"",
"1 and 2"
],
[
"Klos",
"Tomas",
"",
"1 and 2"
],
[
"La Poutré",
"Han",
"",
"1 and 2"
]
]
|
cs/0412105 | Stefania Costantini | Stefania Costantini | On the existence of stable models of non-stratified logic programs | null | null | null | null | cs.AI cs.LO | null | This paper introduces a fundamental result, which is relevant for Answer Set
programming, and planning. For the first time since the definition of the
stable model semantics, the class of logic programs for which a stable model
exists is given a syntactic characterization. This condition may have a
practical importance both for defining new algorithms for checking consistency
and computing answer sets, and for improving the existing systems. The approach
of this paper is to introduce a new canonical form (to which any logic program
can be reduced to), to focus the attention on cyclic dependencies. The
technical result is then given in terms of programs in canonical form
(canonical programs), without loss of generality. The result is based on
identifying the cycles contained in the program, showing that stable models of
the overall program are composed of stable models of suitable sub-programs,
corresponding to the cycles, and on defining the Cycle Graph. Each vertex of
this graph corresponds to one cycle, and each edge corresponds to onehandle,
which is a literal containing an atom that, occurring in both cycles, actually
determines a connection between them. In fact, the truth value of the handle in
the cycle where it appears as the head of a rule, influences the truth value of
the atoms of the cycle(s) where it occurs in the body. We can therefore
introduce the concept of a handle path, connecting different cycles. If for
every odd cycle we can find a handle path with certain properties, then the
existence of stable model is guaranteed.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 12:02:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Costantini",
"Stefania",
""
]
]
|
cs/0412106 | Tomas Klos | Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1)
Center for Mathematics and Computer Science (CWI), Amsterdam, The
Netherlands, (2) Eindhoven University of Technology, Eindhoven, The
Netherlands) | Online Learning of Aggregate Knowledge about Non-linear Preferences
Applied to Negotiating Prices and Bundles | 10 pages, 5 eps figures, ACM Proceedings documentclass, Published in
"Proc. 6th Int'l Conf. on Electronic Commerce ICEC04, Delft, The
Netherlands," M. Janssen, H. Sol, R. Wagenaar (eds.). ACM Press | null | null | SEN-E0415 | cs.MA cs.GT cs.LG | null | In this paper, we consider a form of multi-issue negotiation where a shop
negotiates both the contents and the price of bundles of goods with his
customers. We present some key insights about, as well as a procedure for,
locating mutually beneficial alternatives to the bundle currently under
negotiation. The essence of our approach lies in combining aggregate
(anonymous) knowledge of customer preferences with current data about the
ongoing negotiation process. The developed procedure either works with already
obtained aggregate knowledge or, in the absence of such knowledge, learns the
relevant information online. We conduct computer experiments with simulated
customers that have_nonlinear_ preferences. We show how, for various types of
customers, with distinct negotiation heuristics, our procedure (with and
without the necessary aggregate knowledge) increases the speed with which deals
are reached, as well as the number and the Pareto efficiency of the deals
reached compared to a benchmark.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 15:21:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Somefun",
"Koye",
"",
"1 and 2"
],
[
"Klos",
"Tomas",
"",
"1 and 2"
],
[
"La Poutré",
"Han",
"",
"1 and 2"
]
]
|
cs/0412107 | Carlos Cabrillo | L. A. Garcia-Cortes and C. Cabrillo | A Monte Carlo algorithm for efficient large matrix inversion | 13 pages, no figure. Title corrected | null | null | null | cs.DS cs.NA hep-lat | null | This paper introduces a new Monte Carlo algorithm to invert large matrices.
It is based on simultaneous coupled draws from two random vectors whose
covariance is the required inverse. It can be considered a generalization of a
previously reported algorithm for hermitian matrices inversion based in only
one draw. The use of two draws allows the inversion on non-hermitian matrices.
Both the conditions for convergence and the rate of convergence are similar to
the Gauss-Seidel algorithm. Results on two examples are presented, a real
non-symmetric matrix related to quantitative genetics and a complex
non-hermitian matrix relevant for physicists. Compared with other Monte Carlo
algorithms it reveals a large reduction of the processing time showing eight
times faster processing in the examples studied.
| [
{
"version": "v1",
"created": "Thu, 23 Dec 2004 17:01:14 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Jan 2005 16:41:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Garcia-Cortes",
"L. A.",
""
],
[
"Cabrillo",
"C.",
""
]
]
|
cs/0412109 | Leonid Litinskii | L.B.Litinskii, B.M.Magomedov | Global minimization of a quadratic functional: neural network approach | 4 pages, Lecture on 7th International Conference on Pattern
Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia | null | null | IONT-04-16 | cs.NE cs.DM | null | The problem of finding out the global minimum of a multiextremal functional
is discussed. One frequently faces with such a functional in various
applications. We propose a procedure, which depends on the dimensionality of
the problem polynomially. In our approach we use the eigenvalues and
eigenvectors of the connection matrix.
| [
{
"version": "v1",
"created": "Fri, 24 Dec 2004 13:41:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Litinskii",
"L. B.",
""
],
[
"Magomedov",
"B. M.",
""
]
]
|
cs/0412110 | Leonid Litinskii | D.I.Alieva, B.V.Kryzhanovsky, V.M.Kryzhanovsky, A.B.Fonarev | Q-valued neural network as a system of fast identification and pattern
recognition | 4 pages, Presentation on the 7th International Conference on Pattern
Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia | null | null | IONT-04-17 | cs.NE cs.CV | null | An effective neural network algorithm of the perceptron type is proposed. The
algorithm allows us to identify strongly distorted input vector reliably. It is
shown that its reliability and processing speed are orders of magnitude higher
than that of full connected neural networks. The processing speed of our
algorithm exceeds the one of the stack fast-access retrieval algorithm that is
modified for working when there are noises in the input channel.
| [
{
"version": "v1",
"created": "Fri, 24 Dec 2004 13:48:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Alieva",
"D. I.",
""
],
[
"Kryzhanovsky",
"B. V.",
""
],
[
"Kryzhanovsky",
"V. M.",
""
],
[
"Fonarev",
"A. B.",
""
]
]
|
cs/0412114 | Pierre Andrews | Martin Rajman and Martin Vesely and Pierre Andrews | State of the Art, Evaluation and Recommendations regarding "Document
Processing and Visualization Techniques" | 54 pages, Report of Working Group 1 for the European Network of
Excellence (NoE) in Text Mining and its Applications in Statistics (NEMIS) | null | null | null | cs.CL | null | Several Networks of Excellence have been set up in the framework of the
European FP5 research program. Among these Networks of Excellence, the NEMIS
project focuses on the field of Text Mining.
Within this field, document processing and visualization was identified as
one of the key topics and the WG1 working group was created in the NEMIS
project, to carry out a detailed survey of techniques associated with the text
mining process and to identify the relevant research topics in related research
areas.
In this document we present the results of this comprehensive survey. The
report includes a description of the current state-of-the-art and practice, a
roadmap for follow-up research in the identified areas, and recommendations for
anticipated technological development in the domain of text mining.
| [
{
"version": "v1",
"created": "Wed, 29 Dec 2004 15:19:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rajman",
"Martin",
""
],
[
"Vesely",
"Martin",
""
],
[
"Andrews",
"Pierre",
""
]
]
|
cs/0412115 | Bernadette Charron-Bost | Bernadette Charron-Bost | Reductions in Distributed Computing Part I: Consensus and Atomic
Commitment Tasks | 27 pages, 3 figures | null | null | null | cs.DC | null | We introduce several notions of reduction in distributed computing, and
investigate reduction properties of two fundamental agreement tasks, namely
Consensus and Atomic Commitment.
We first propose the notion of reduction "a la Karp'', an analog for
distributed computing of the classical Karp reduction. We then define a weaker
reduction which is the analog of Cook reduction. These two reductions are
called K-reduction and C-reduction, respectively.
We also introduce the notion of C*-reduction which has no counterpart in
classical (namely, non distributed) systems, and which naturally arises when
dealing with symmetric tasks.
We establish various reducibility and irreducibility theorems with respect to
these three reductions. Our main result is an incomparability statement for
Consensus and Atomic Commitment tasks: we show that they are incomparable with
respect to the C-reduction, except when the resiliency degree is 1, in which
case Atomic Commitment is strictly harder than Consensus. A side consequence of
these results is that our notion of C-reduction is strictly weaker than the one
of K-reduction, even for unsolvable tasks.
| [
{
"version": "v1",
"created": "Wed, 29 Dec 2004 19:50:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Charron-Bost",
"Bernadette",
""
]
]
|
cs/0412116 | Bernadette Charron-Bost | Bernadette Charron-Bost | Reductions in Distributed Computing Part II: k-Threshold Agreement Tasks | 27 pages, 4 figures | null | null | null | cs.DC | null | We extend the results of Part I by considering a new class of agreement
tasks, the so-called k-Threshold Agreement tasks (previously introduced by
Charron-Bost and Le Fessant). These tasks naturally interpolate between Atomic
Commitment and Consensus. Moreover, they constitute a valuable tool to derive
irreducibility results between Consensus tasks only. In particular, they allow
us to show that (A) for a fixed set of processes, the higher the resiliency
degree is, the harder the Consensus task is, and (B) for a fixed resiliency
degree, the smaller the set of processes is, the harder the Consensus task is.
The proofs of these results lead us to consider new oracle-based reductions,
involving a weaker variant of the C-reduction introduced in Part I. We also
discuss the relationship between our results and previous ones relating
f-resiliency and wait-freedom.
| [
{
"version": "v1",
"created": "Wed, 29 Dec 2004 20:51:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Charron-Bost",
"Bernadette",
""
]
]
|
cs/0412117 | Pierre Andrews | Pierre Andrews and Martin Rajman | Thematic Annotation: extracting concepts out of documents | Technical report EPFL/LIA. 81 pages, 16 figures | null | null | IC/2004/68 | cs.CL | null | Contrarily to standard approaches to topic annotation, the technique used in
this work does not centrally rely on some sort of -- possibly statistical --
keyword extraction. In fact, the proposed annotation algorithm uses a large
scale semantic database -- the EDR Electronic Dictionary -- that provides a
concept hierarchy based on hyponym and hypernym relations. This concept
hierarchy is used to generate a synthetic representation of the document by
aggregating the words present in topically homogeneous document segments into a
set of concepts best preserving the document's content.
This new extraction technique uses an unexplored approach to topic selection.
Instead of using semantic similarity measures based on a semantic resource, the
later is processed to extract the part of the conceptual hierarchy relevant to
the document content. Then this conceptual hierarchy is searched to extract the
most relevant set of concepts to represent the topics discussed in the
document. Notice that this algorithm is able to extract generic concepts that
are not directly present in the document.
| [
{
"version": "v1",
"created": "Thu, 30 Dec 2004 02:01:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Andrews",
"Pierre",
""
],
[
"Rajman",
"Martin",
""
]
]
|
cs/0412119 | Shmuel Varner | Shmuel Vagner | CDTP Chain Distributed Transfer Protocol | PDF. 47 pages | null | null | 1937340 | cs.NI cs.AR | null | The rapid growth of the internet in general and of bandwidth capacity at
internet clients in particular poses increasing computation and bandwidth
demands on internet servers. Internet access technologies like ADSL [DSL],
Cable Modem and Wireless modem allow internet clients to access the internet
with orders of magnitude more bandwidth than using traditional modems. We
present CDTP a distributed transfer protocol that allows clients to cooperate
and therefore remove the strain from the internet server thus achieving much
better performance than traditional transfer protocols (e.g. FTP [FTP]). The
CDTP server and client tools are presented also as well as results of
experiments. Finally a bandwidth measurement technique is presented. CDTP tools
use this technique to differentiate between slow and fast clients.
| [
{
"version": "v1",
"created": "Thu, 30 Dec 2004 19:43:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vagner",
"Shmuel",
""
]
]
|
cs/0412120 | Gianluca Argentini | Gianluca Argentini | An estimate of accuracy for interpolant numerical solutions of a PDE
problem | 13 pages, 1 figure | APPLIED AND INDUSTRIAL MATHEMATICS IN ITALY, Series on Advances in
Mathematics for Applied Sciences - Vol. 69, World Scientific Company, 2005,
56 - 64. | null | null | cs.NA math-ph math.MP | null | In this paper we present an estimate of accuracy for a piecewise polynomial
approximation of a classical numerical solution to a non linear differential
problem. We suppose the numerical solution U is computed using a grid with a
small linear step and interval time Tu, while the polynomial approximation V is
an interpolation of the values of a numerical solution on a less fine grid and
interval time Tv << Tu. The estimate shows that the interpolant solution V can
be, under suitable hypotheses, a good approximation and in general its
computational cost is much lower of the cost of the fine numerical solution. We
present two possible applications to linear case and periodic case.
| [
{
"version": "v1",
"created": "Fri, 31 Dec 2004 18:16:00 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jan 2005 23:23:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
|
cs/0412121 | Michael Treaster | Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik | A Distributed Economics-based Infrastructure for Utility Computing | 8 pages, 1 figure | null | null | null | cs.DC | null | Existing attempts at utility computing revolve around two approaches. The
first consists of proprietary solutions involving renting time on dedicated
utility computing machines. The second requires the use of heavy, monolithic
applications that are difficult to deploy, maintain, and use.
We propose a distributed, community-oriented approach to utility computing.
Our approach provides an infrastructure built on Web Services in which modular
components are combined to create a seemingly simple, yet powerful system. The
community-oriented nature generates an economic environment which results in
fair transactions between consumers and providers of computing cycles while
simultaneously encouraging improvements in the infrastructure of the
computational grid itself.
| [
{
"version": "v1",
"created": "Fri, 31 Dec 2004 19:16:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Treaster",
"Michael",
""
],
[
"Kiyanclar",
"Nadir",
""
],
[
"Koenig",
"Gregory A.",
""
],
[
"Yurcik",
"William",
""
]
]
|
cs/0501001 | Michael Treaster | Michael Treaster | A Survey of Distributed Intrusion Detection Approaches | null | null | null | null | cs.CR | null | Distributed intrustion detection systems detect attacks on computer systems
by analyzing data aggregated from distributed sources. The distributed nature
of the data sources allows patterns in the data to be seen that might not be
detectable if each of the sources were examined individually. This paper
describes the various approaches that have been developed to share and analyze
data in such systems, and discusses some issues that must be addressed before
fully decentralized distributed intrusion detection systems can be made viable.
| [
{
"version": "v1",
"created": "Sat, 1 Jan 2005 03:14:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Treaster",
"Michael",
""
]
]
|
cs/0501002 | Michael Treaster | Michael Treaster | A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel
Systems | 11 pages | null | null | null | cs.DC | null | Supercomputing systems today often come in the form of large numbers of
commodity systems linked together into a computing cluster. These systems, like
any distributed system, can have large numbers of independent hardware
components cooperating or collaborating on a computation. Unfortunately, any of
this vast number of components can fail at any time, resulting in potentially
erroneous output. In order to improve the robustness of supercomputing
applications in the presence of failures, many techniques have been developed
to provide resilience to these kinds of system faults. This survey provides an
overview of these various fault-tolerance techniques.
| [
{
"version": "v1",
"created": "Sat, 1 Jan 2005 03:32:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Treaster",
"Michael",
""
]
]
|
cs/0501003 | Pavel Burovsky | P.A. Burovsky | Implementation of Motzkin-Burger algorithm in Maple | 9 pages, 4 additional text files | null | null | null | cs.CG cs.CC cs.SC | null | Subject of this paper is an implementation of a well-known Motzkin-Burger
algorithm, which solves the problem of finding the full set of solutions of a
system of linear homogeneous inequalities. There exist a number of
implementations of this algorithm, but there was no one in Maple, to the best
of the author's knowledge.
| [
{
"version": "v1",
"created": "Sat, 1 Jan 2005 04:55:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burovsky",
"P. A.",
""
]
]
|
cs/0501006 | A. Prasad Sistla | A. Prasad Sistla | Formal Languages and Algorithms for Similarity based Retrieval from
Sequence Databases | null | null | null | null | cs.LO cs.DB | null | The paper considers various formalisms based on Automata, Temporal Logic and
Regular Expressions for specifying queries over sequences. Unlike traditional
binary semantics, the paper presents a similarity based semantics for thse
formalisms. More specifically, a distance measure in the range [0,1] is
associated with a sequence, query pair denoting how closely the sequence
satisfies the query. These measures are defined using a spectrum of normed
vector distance measures. Various distance measures based on the syntax and the
traditional semantics of the query are presented. Efficient algorithms for
computing these distance measure are presented. These algorithms can be
employed for retrieval of sequence from a database that closely satisfy a
given.
| [
{
"version": "v1",
"created": "Tue, 4 Jan 2005 01:05:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sistla",
"A. Prasad",
""
]
]
|
cs/0501007 | Sariel Har-Peled | Sariel Har-Peled and Alper Ungor | A Time-Optimal Delaunay Refinement Algorithm in Two Dimensions | null | null | null | null | cs.CG | null | We propose a new refinement algorithm to generate size-optimal
quality-guaranteed Delaunay triangulations in the plane. The algorithm takes
$O(n \log n + m)$ time, where $n$ is the input size and $m$ is the output size.
This is the first time-optimal Delaunay refinement algorithm.
| [
{
"version": "v1",
"created": "Tue, 4 Jan 2005 22:30:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Har-Peled",
"Sariel",
""
],
[
"Ungor",
"Alper",
""
]
]
|
cs/0501009 | Mircea Alexandru Popescu Moscu | Mircea Alexandru Popescu Moscu | On The Liniar Time Complexity of Finite Languages | null | null | null | null | cs.CC | null | The present paper presents and proves a proposition concerning the time
complexity of finite languages. It is shown herein, that for any finite
language (a language for which the set of words composing it is finite) there
is a Turing machine that computes the language in such a way that for any input
of length k the machine stops in, at most, k + 1 steps.
| [
{
"version": "v1",
"created": "Wed, 5 Jan 2005 19:13:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moscu",
"Mircea Alexandru Popescu",
""
]
]
|
cs/0501010 | Manoj Kumar | Manoj Kumar | A Cryptographic Study of Some Digital Signature Schemes | This is a Ph.D. thesis,under the supervision of Prof Sunder Lal, Dr.
B.R. Ambedkar University, I.B.S. Khandri,AGRA- INDIA | null | null | null | cs.CR | null | In this thesis, we propose some directed signature schemes. In addition, we
have discussed their applications in different situations. In this thesis, we
would like to discuss the security aspects during the design process of the
proposed directed digital signature schemes. The security of the most digital
signature schemes widely use in practice is based on the two difficult
problems, viz; the problem of factoring integers (The RSA scheme) and the
problem of finding discrete logarithms over finite fields (The ElGamal scheme).
The proposed works in this thesis is divided into seven chapters.
| [
{
"version": "v1",
"created": "Thu, 6 Jan 2005 10:21:20 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jan 2005 05:33:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
|
cs/0501012 | Carl Lagoze | Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper | Fedora: An Architecture for Complex Objects and their Relationships | 25 pages, 8 figures Draft of submission to Journal of Digital
Libraries Special Issue on Complex Objects | null | null | null | cs.DL cs.MM | null | The Fedora architecture is an extensible framework for the storage,
management, and dissemination of complex objects and the relationships among
them. Fedora accommodates the aggregation of local and distributed content into
digital objects and the association of services with objects. This al-lows an
object to have several accessible representations, some of them dy-namically
produced. The architecture includes a generic RDF-based relation-ship model
that represents relationships among objects and their components. Queries
against these relationships are supported by an RDF triple store. The
architecture is implemented as a web service, with all aspects of the complex
object architecture and related management functions exposed through REST and
SOAP interfaces. The implementation is available as open-source soft-ware,
providing the foundation for a variety of end-user applications for digital
libraries, archives, institutional repositories, and learning object systems.
| [
{
"version": "v1",
"created": "Fri, 7 Jan 2005 17:57:05 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jan 2005 13:16:45 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Feb 2005 20:13:37 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Mar 2005 15:14:47 GMT"
},
{
"version": "v5",
"created": "Fri, 29 Jul 2005 13:04:31 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Aug 2005 13:26:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Payette",
"Sandy",
""
],
[
"Shin",
"Edwin",
""
],
[
"Wilper",
"Chris",
""
]
]
|
cs/0501013 | Shujun Li Dr. | Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang | On the security of the Yen-Guo's domino signal encryption algorithm
(DSEA) | 11 pages, 5 figures | Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, 2006 | 10.1016/j.jss.2005.04.021 | null | cs.CR cs.MM nlin.CD | null | Recently, a new domino signal encryption algorithm (DSEA) was proposed for
digital signal transmission, especially for digital images and videos. This
paper analyzes the security of DSEA, and points out the following weaknesses:
1) its security against the brute-force attack was overestimated; 2) it is not
sufficiently secure against ciphertext-only attacks, and only one ciphertext is
enough to get some information about the plaintext and to break the value of a
sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense
that the secret key can be recovered from a number of continuous bytes of only
one known/chosen plaintext and the corresponding ciphertext. Experimental
results are given to show the performance of the proposed attacks, and some
countermeasures are discussed to improve DSEA.
| [
{
"version": "v1",
"created": "Sat, 8 Jan 2005 15:35:13 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Aug 2006 17:27:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Lou",
"Der-Chyuan",
""
],
[
"Zhang",
"Dan",
""
]
]
|
cs/0501014 | Shujun Li Dr. | Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung
Lo | On the Design of Perceptual MPEG-Video Encryption Algorithms | 10 pages, 5 figures, IEEEtran.cls | IEEE Transactions on Circuits and Systems for Video Technology,
vol. 17, no. 2, pp. 214-223, 2007 | 10.1109/TCSVT.2006.888840 | null | cs.MM cs.CR | null | In this paper, some existing perceptual encryption algorithms of MPEG videos
are reviewed and some problems, especially security defects of two recently
proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a
simpler and more effective design is suggested, which selectively encrypts
fixed-length codewords (FLC) in MPEG-video bitstreams under the control of
three perceptibility factors. The proposed design is actually an encryption
configuration that can work with any stream cipher or block cipher. Compared
with the previously-proposed schemes, the new design provides more useful
features, such as strict size-preservation, on-the-fly encryption and multiple
perceptibility, which make it possible to support more applications with
different requirements. In addition, four different measures are suggested to
provide better security against known/chosen-plaintext attacks.
| [
{
"version": "v1",
"created": "Sat, 8 Jan 2005 15:55:30 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2006 11:30:21 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Mar 2007 17:12:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Cheung",
"Albert",
""
],
[
"Bhargava",
"Bharat",
""
],
[
"Lo",
"Kwok-Tung",
""
]
]
|
cs/0501018 | Peter Turney | Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder | Combining Independent Modules in Lexical Multiple-Choice Problems | 10 pages, related work available at
http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/ | Recent Advances in Natural Language Processing III: Selected
Papers from RANLP 2003, Eds: N. Nicolov, K. Botcheva, G. Angelova, and R.
Mitkov, (2004), Current Issues in Linguistic Theory (CILT), 260, John
Benjamins, 101-110 | null | NRC-47434 | cs.LG cs.CL cs.IR | null | Existing statistical approaches to natural language problems are very coarse
approximations to the true complexity of language processing. As such, no
single technique will be best for all problem instances. Many researchers are
examining ensemble methods that combine the output of multiple modules to
create more accurate solutions. This paper examines three merging rules for
combining probability distributions: the familiar mixture rule, the logarithmic
rule, and a novel product rule. These rules were applied with state-of-the-art
results to two problems used to assess human mastery of lexical semantics --
synonym questions and analogy questions. All three merging rules result in
ensembles that are more accurate than any of their component modules. The
differences among the three rules are not statistically significant, but it is
suggestive that the popular mixture rule is not the best rule for either of the
two problems.
| [
{
"version": "v1",
"created": "Mon, 10 Jan 2005 21:03:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
""
],
[
"Littman",
"Michael L.",
""
],
[
"Bigham",
"Jeffrey",
""
],
[
"Shnayder",
"Victor",
""
]
]
|
cs/0501019 | Grigorii Pivovarov | G. B. Pivovarov and S. E. Trunov | Clustering SPIRES with EqRank | 3 pp | null | null | null | cs.DL cs.IR | null | SPIRES is the largest database of scientific papers in the subject field of
high energy and nuclear physics. It contains information on the citation graph
of more than half a million of papers (vertexes of the citation graph). We
outline the EqRank algorithm designed to cluster vertexes of directed graphs,
and present the results of EqRank application to the SPIRES citation graph. The
hierarchical clustering of SPIRES yielded by EqRank is used to set up a web
service, which is also outlined.
| [
{
"version": "v1",
"created": "Tue, 11 Jan 2005 05:00:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pivovarov",
"G. B.",
""
],
[
"Trunov",
"S. E.",
""
]
]
|
cs/0501020 | Gianluca Lax | Francesco Buccafurri, Gianluca Lax, Domenico Sacca', Luigi Pontieri
and Domenico Rosaci | Enhancing Histograms by Tree-Like Bucket Indices | 26 pages, 9 figures | null | null | null | cs.DS | null | Histograms are used to summarize the contents of relations into a number of
buckets for the estimation of query result sizes. Several techniques (e.g.,
MaxDiff and V-Optimal) have been proposed in the past for determining bucket
boundaries which provide accurate estimations. However, while search strategies
for optimal bucket boundaries are rather sophisticated, no much attention has
been paid for estimating queries inside buckets and all of the above techniques
adopt naive methods for such an estimation. This paper focuses on the problem
of improving the estimation inside a bucket once its boundaries have been
fixed. The proposed technique is based on the addition, to each bucket, of
32-bit additional information (organized into a 4-level tree index), storing
approximate cumulative frequencies at 7 internal intervals of the bucket. Both
theoretical analysis and experimental results show that, among a number of
alternative ways to organize the additional information, the 4-level tree index
provides the best frequency estimation inside a bucket. The index is later
added to two well-known histograms, MaxDiff and V-Optimal, obtaining the
non-obvious result that despite the spatial cost of 4LT which reduces the
number of allowed buckets once the storage space has been fixed, the original
methods are strongly improved in terms of accuracy.
| [
{
"version": "v1",
"created": "Tue, 11 Jan 2005 10:15:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buccafurri",
"Francesco",
""
],
[
"Lax",
"Gianluca",
""
],
[
"Sacca'",
"Domenico",
""
],
[
"Pontieri",
"Luigi",
""
],
[
"Rosaci",
"Domenico",
""
]
]
|
cs/0501022 | Lane A. Hemaspaandra | Lane A. Hemaspaandra, Harald Hempel, and Arfst Nickelsen | Algebraic Properties for Selector Functions | More recent version of most of this report appears in SICOMP, but the
appendix here is not included there | SICOMP, V. 33, Number 6, pp. 1309--1337, 2004 | null | URCS-TR-778 (January 7, 2004 revision) | cs.CC | null | The nondeterministic advice complexity of the P-selective sets is known to be
exactly linear. Regarding the deterministic advice complexity of the
P-selective sets--i.e., the amount of Karp--Lipton advice needed for
polynomial-time machines to recognize them in general--the best current upper
bound is quadratic [Ko, 1983] and the best current lower bound is linear
[Hemaspaandra and Torenvliet, 1996].
We prove that every associatively P-selective set is commutatively,
associatively P-selective. Using this, we establish an algebraic sufficient
condition for the P-selective sets to have a linear upper bound (which thus
would match the existing lower bound) on their deterministic advice complexity:
If all P-selective sets are associatively P-selective then the deterministic
advice complexity of the P-selective sets is linear. The weakest previously
known sufficient condition was P=NP.
We also establish related results for algebraic properties of, and advice
complexity of, the nondeterministically selective sets.
| [
{
"version": "v1",
"created": "Tue, 11 Jan 2005 23:55:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
],
[
"Nickelsen",
"Arfst",
""
]
]
|
cs/0501025 | Eugenia Ternovska | Marc Denecker and Eugenia Ternovska | A Logic for Non-Monotone Inductive Definitions | 50 pages, TOCL submission | null | null | null | cs.AI cs.LO | null | Well-known principles of induction include monotone induction and different
sorts of non-monotone induction such as inflationary induction, induction over
well-founded sets and iterated induction. In this work, we define a logic
formalizing induction over well-founded sets and monotone and iterated
induction. Just as the principle of positive induction has been formalized in
FO(LFP), and the principle of inflationary induction has been formalized in
FO(IFP), this paper formalizes the principle of iterated induction in a new
logic for Non-Monotone Inductive Definitions (ID-logic). The semantics of the
logic is strongly influenced by the well-founded semantics of logic
programming. Our main result concerns the modularity properties of inductive
definitions in ID-logic. Specifically, we formulate conditions under which a
simultaneous definition $\D$ of several relations is logically equivalent to a
conjunction of smaller definitions $\D_1 \land ... \land \D_n$ with disjoint
sets of defined predicates. The difficulty of the result comes from the fact
that predicates $P_i$ and $P_j$ defined in $\D_i$ and $\D_j$, respectively, may
be mutually connected by simultaneous induction. Since logic programming and
abductive logic programming under well-founded semantics are proper fragments
of our logic, our modularity results are applicable there as well.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2005 02:53:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Denecker",
"Marc",
""
],
[
"Ternovska",
"Eugenia",
""
]
]
|
cs/0501026 | Sourav Chakraborty | Sourav Chakraborty | On the Sensitivity of Cyclically-Invariant Boolean Functions | null | null | null | null | cs.CC | null | In this paper we construct a cyclically invariant Boolean function whose
sensitivity is $\Theta(n^{1/3})$. This result answers two previously published
questions. Tur\'an (1984) asked if any Boolean function, invariant under some
transitive group of permutations, has sensitivity $\Omega(\sqrt{n})$. Kenyon
and Kutin (2004) asked whether for a ``nice'' function the product of
0-sensitivity and 1-sensitivity is $\Omega(n)$. Our function answers both
questions in the negative.
We also prove that for minterm-transitive functions (a natural class of
Boolean functions including our example) the sensitivity is $\Omega(n^{1/3})$.
Hence for this class of functions sensitivity and block sensitivity are
polynomially related.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2005 22:06:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chakraborty",
"Sourav",
""
]
]
|
cs/0501027 | Evan Greenberg | Evan P. Greenberg, David R. Cheriton | Enforcing Bulk Mail Classification | 6 pages, changed spin on paper, added new idea (explicit tagging as a
feature) | null | null | null | cs.NI | null | Spam costs US corporations upwards of $8.9 billion a year, and comprises as
much as 40% of all email received. Solutions exist to reduce the amount of spam
seen by end users, but cannot withstand sophisticated attacks. Worse yet, many
will occasionally misclassify and silently drop legitimate email. Spammers take
advantage of the near-zero cost of sending email to flood the network, knowing
that success even a tiny fraction of the time means a profit. End users,
however, have proven unwilling to pay money to send email to friends and
family.
We show that it is feasible to extend the existing mail system to reduce the
amount of unwanted email, without misclassifying email, and without charging
well-behaved users. We require that bulk email senders accurately classify each
email message they send as an advertisement with an area of interest or else be
charged a small negative incentive per message delivered. Recipients are able
to filter out email outside their scope of interest, while senders are able to
focus their sendings to the appropriate audience.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2005 23:37:10 GMT"
},
{
"version": "v2",
"created": "Thu, 19 May 2005 21:22:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Greenberg",
"Evan P.",
""
],
[
"Cheriton",
"David R.",
""
]
]
|
cs/0501029 | Filippo Furfaro | Francesco Buccafurri, Filippo Furfaro, Domenico Sacca' | Estimating Range Queries using Aggregate Data with Integrity
Constraints: a Probabilistic Approach | 46 pages, 6 figures | null | null | null | cs.DB | null | The problem of recovering (count and sum) range queries over multidimensional
data only on the basis of aggregate information on such data is addressed. This
problem can be formalized as follows. Suppose that a transformation T producing
a summary from a multidimensional data set is used. Now, given a data set D, a
summary S=T(D) and a range query r on D, the problem consists of studying r by
modelling it as a random variable defined over the sample space of all the data
sets D' such that T(D) = S. The study of such a random variable, done by the
definition of its probability distribution and the computation of its mean
value and variance, represents a well-founded, theoretical probabilistic
approach for estimating the query only on the basis of the available
information (that is the summary S) without assumptions on original data.
| [
{
"version": "v1",
"created": "Fri, 14 Jan 2005 19:45:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buccafurri",
"Francesco",
""
],
[
"Furfaro",
"Filippo",
""
],
[
"Sacca'",
"Domenico",
""
]
]
|
cs/0501030 | Sergey Tsarev P. | Sergey P. Tsarev | Generalized Laplace transformations and integration of hyperbolic
systems of linear partial differential equations | LaTeX, 17 pages, Submitted to ISSAC 2005, Beijing, China, July 24--27
2005 | null | null | null | cs.SC math.AP nlin.SI | null | We give a new procedure for generalized factorization and construction of the
complete solution of strictly hyperbolic linear partial differential equations
or strictly hyperbolic systems of such equations in the plane. This procedure
generalizes the classical theory of Laplace transformations of second-order
equations in the plane.
| [
{
"version": "v1",
"created": "Sat, 15 Jan 2005 15:57:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tsarev",
"Sergey P.",
""
]
]
|
cs/0501032 | Riccardo Pucella | Riccardo Pucella | On Partially Additive Kleene Algebras | 23 pages; to be presented at the 8th International Conference on
Relational Methods in Computer Science (RelMiCS 8) | null | null | null | cs.LO | null | We define the notion of a partially additive Kleene algebra, which is a
Kleene algebra where the + operation need only be partially defined. These
structures formalize a number of examples that cannot be handled directly by
Kleene algebras. We relate partially additive Kleene algebras to existing
algebraic structures, by exhibiting categorical connections with Kleene
algebras, partially additive categories, and closed semirings.
| [
{
"version": "v1",
"created": "Sun, 16 Jan 2005 20:39:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0501036 | Jos\'e Ghislain Quenum | Jose Ghislain Quenum Samir Aknine | Enabling Agents to Dynamically Select Protocols for Interactions | null | null | null | null | cs.MA cs.SE | null | in this paper we describe a method which allows agents to dynamically select
protocols and roles when they need to execute collaborative tasks
| [
{
"version": "v1",
"created": "Tue, 18 Jan 2005 17:08:05 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2005 18:31:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aknine",
"Jose Ghislain Quenum Samir",
""
]
]
|
cs/0501037 | Michele Tucci | Michele Tucci | Oligopolistic Competition in an Evolutionary Environment: a Computer
Simulation | PDF, 20 pages, 4 graphs and a post-scriptum | null | null | null | cs.CY | null | The following notes contain a computer simulation concerning effective
competition in an evolutionary environment. The scope is to underline the
existence of a side effect pertaining to the competitive processes: the
tendency toward an excess of supply by producers which operate in a strongly
competitive situation. A set of four oligopolistic firms will be employed in
the formal reconstruction. The simulation will operate following the Edmond
Malinvaud "short side" approach, as far as the price adjustment is concerned,
and the sequential Hicksian "weeks" structure with regard of the temporal
characterization. The content of the present paper ought to be considered as a
development of the writing: Michele Tucci, Evolution and Gravitation: a
Computer Simulation of a Non-Walrasian Equilibrium Model, published with the
E-print Archives at arXiv.com (section: Computer Science, registration number:
cs.CY/0209017). In such a paper there can be found some preliminary
considerations regarding the comparison between the evolutionary and the
gravitational paradigms and the evaluation of approaches belonging to rival
schools of economic thought.
| [
{
"version": "v1",
"created": "Tue, 18 Jan 2005 18:52:49 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jan 2005 21:59:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tucci",
"Michele",
""
]
]
|
cs/0501038 | D. J. Capelis | D.J. Capelis | Data Tastes Better Seasoned: Introducing the ASH Family of Hashing
Algorithms | 5 pages | null | null | null | cs.CR | null | Over the recent months it has become clear that the current generation of
cryptographic hashing algorithms are insufficient to meet future needs. The ASH
family of algorithms provides modifications to the existing SHA-2 family. These
modifications are designed with two main goals: 1) Providing increased
collision resistance. 2) Increasing mitigation of security risks
post-collision. The unique public/private sections and salt/pepper design
elements provide increased flexibility for a broad range of applications. The
ASH family is a new generation of cryptographic hashing algorithms.
| [
{
"version": "v1",
"created": "Wed, 19 Jan 2005 10:28:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Capelis",
"D. J.",
""
]
]
|
cs/0501041 | Alexander Kondratiev | A. S. Kondratiev (1 and 2) and N. P. Polishchuk (2) ((1) Moscow Power
Engineering Institute, (2) Altair Naval Research Institute of Radio
Electronics) | Two Iterative Algorithms for Solving Systems of Simultaneous Linear
Algebraic Equations with Real Matrices of Coefficients | 5 pages; 0 figures; 4 references | null | null | null | cs.NA | null | The paper describes two iterative algorithms for solving general systems of M
simultaneous linear algebraic equations (SLAE) with real matrices of
coefficients. The system can be determined, underdetermined, and
overdetermined. Linearly dependent equations are also allowed. Both algorithms
use the method of Lagrange multipliers to transform the original SLAE into a
positively determined function F of real original variables X(i) (i=1,...,N)
and Lagrange multipliers Lambda(i) (i=1,...,M). Function F is differentiated
with respect to variables X(i) and the obtained relationships are used to
express F in terms of Lagrange multipliers Lambda(i). The obtained function is
minimized with respect to variables Lambda(i) with the help of one of two the
following minimization techniques: (1) relaxation method or (2) method of
conjugate gradients by Fletcher and Reeves. Numerical examples are given.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 13:20:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kondratiev",
"A. S.",
"",
"1 and 2"
],
[
"Polishchuk",
"N. P.",
""
]
]
|
cs/0501042 | Martin Bernauer | Martin Bernauer | Maintaining Consistency of Data on the Web | null | null | null | null | cs.DB cs.DS | null | Increasingly more data is becoming available on the Web, estimates speaking
of 1 billion documents in 2002. Most of the documents are Web pages whose data
is considered to be in XML format, expecting it to eventually replace HTML.
A common problem in designing and maintaining a Web site is that data on a
Web page often replicates or derives from other data, the so-called base data,
that is usually not contained in the deriving or replicating page.
Consequently, replicas and derivations become inconsistent upon modifying base
data in a Web page or a relational database. For example, after assigning a
thesis to a student and modifying the Web page that describes it in detail, the
thesis is still incorrectly contained in the list of offered thesis, missing in
the list of ongoing thesis, and missing in the advisor's teaching record.
The thesis presents a solution by proposing a combined approach that provides
for maintaining consistency of data in Web pages that (i) replicate data in
relational databases, or (ii) replicate or derive from data in Web pages. Upon
modifying base data, the modification is immediately pushed to affected Web
pages. There, maintenance is performed incrementally by only modifying the
affected part of the page instead of re-generating the whole page from scratch.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 14:11:03 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2005 16:00:49 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Feb 2005 19:59:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bernauer",
"Martin",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.