id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0412023
Praveen Boinee
P. Boinee, F. Barbarino, A. De Angelis
Multidimensional data classification with artificial neural networks
8 pages, 4 figures, Submitted to EURASIP Journal on Applied Signal Processing, 2004
null
null
null
cs.NE cs.AI
null
Multi-dimensional data classification is an important and challenging problem in many astro-particle experiments. Neural networks have proved to be versatile and robust in multi-dimensional data classification. In this article we shall study the classification of gamma from the hadrons for the MAGIC Experiment. Two neural networks have been used for the classification task. One is Multi-Layer Perceptron based on supervised learning and other is Self-Organising Map (SOM), which is based on unsupervised learning technique. The results have been shown and the possible ways of combining these networks have been proposed to yield better and faster classification results.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 20:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Boinee", "P.", "" ], [ "Barbarino", "F.", "" ], [ "De Angelis", "A.", "" ] ]
cs/0412024
Peter Turney
Peter D. Turney (National Research Council of Canada)
Human-Level Performance on Word Analogy Questions by Latent Relational Analysis
32 pages, issued 2004, related work available at http://purl.org/peter.turney
null
null
NRC-47422
cs.CL cs.IR cs.LG
null
This paper introduces Latent Relational Analysis (LRA), a method for measuring relational similarity. LRA has potential applications in many areas, including information extraction, word sense disambiguation, machine translation, and information retrieval. Relational similarity is correspondence between relations, in contrast with attributional similarity, which is correspondence between attributes. When two words have a high degree of attributional similarity, we call them synonyms. When two pairs of words have a high degree of relational similarity, we say that their relations are analogous. For example, the word pair mason/stone is analogous to the pair carpenter/wood. Past work on semantic similarity measures has mainly been concerned with attributional similarity. Recently the Vector Space Model (VSM) of information retrieval has been adapted to the task of measuring relational similarity, achieving a score of 47% on a collection of 374 college-level multiple-choice word analogy questions. In the VSM approach, the relation between a pair of words is characterized by a vector of frequencies of predefined patterns in a large corpus. LRA extends the VSM approach in three ways: (1) the patterns are derived automatically from the corpus (they are not predefined), (2) the Singular Value Decomposition (SVD) is used to smooth the frequency data (it is also used this way in Latent Semantic Analysis), and (3) automatically generated synonyms are used to explore reformulations of the word pairs. LRA achieves 56% on the 374 analogy questions, statistically equivalent to the average human score of 57%. On the related problem of classifying noun-modifier relations, LRA achieves similar gains over the VSM, while using a smaller corpus.
[ { "version": "v1", "created": "Mon, 6 Dec 2004 21:50:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
cs/0412026
Chiu Wo Choi
Chiu Wo Choi, Jimmy Ho-Man Lee, Peter J. Stuckey
Removing Propagation Redundant Constraints in Redundant Modeling
30 pages, submitted to ACM Transactions on Computational Logic (TOCL)
null
null
null
cs.LO cs.AI
null
A widely adopted approach to solving constraint satisfaction problems combines systematic tree search with various degrees of constraint propagation for pruning the search space. One common technique to improve the execution efficiency is to add redundant constraints, which are constraints logically implied by others in the problem model. However, some redundant constraints are propagation redundant and hence do not contribute additional propagation information to the constraint solver. Redundant constraints arise naturally in the process of redundant modeling where two models of the same problem are connected and combined through channeling constraints. In this paper, we give general theorems for proving propagation redundancy of one constraint with respect to channeling constraints and constraints in the other model. We illustrate, on problems from CSPlib (http://www.csplib.org/), how detecting and removing propagation redundant constraints in redundant modeling can significantly speed up constraint solving.
[ { "version": "v1", "created": "Tue, 7 Dec 2004 06:31:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Chiu Wo", "" ], [ "Lee", "Jimmy Ho-Man", "" ], [ "Stuckey", "Peter J.", "" ] ]
cs/0412028
Kazushige Terui
Patrick Baillot and Kazushige Terui
A feasible algorithm for typing in Elementary Affine Logic
20 pages
null
null
null
cs.LO
null
We give a new type inference algorithm for typing lambda-terms in Elementary Affine Logic (EAL), which is motivated by applications to complexity and optimal reduction. Following previous references on this topic, the variant of EAL type system we consider (denoted EAL*) is a variant without sharing and without polymorphism. Our algorithm improves over the ones already known in that it offers a better complexity bound: if a simple type derivation for the term t is given our algorithm performs EAL* type inference in polynomial time.
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "" ], [ "Terui", "Kazushige", "" ] ]
cs/0412029
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin
The modular technology of development of the CAD expansions: profiles of outside networks of water supply and water drain
8 pages, 2 figures, in Russian
null
null
null
cs.CE cs.DS
null
The modular technology of development of the problem-oriented CAD expansions is applied to a task of designing of profiles of outside networks of water supply and water drain with realization in program system TechnoCAD GlassX. The unity of structure of this profiles is revealed, the system model of the drawings of profiles of networks is developed including the structured parametric representation (properties of objects and their interdependence, general settings and default settings) and operations with it, which efficiently automate designing
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:42:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiyatullov", "Rustem R.", "" ], [ "Safin", "Ilsur T.", "" ] ]
cs/0412030
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiyatullov, Ilsur T. Safin
The modular technology of development of the CAD expansions: protection of the buildings from the lightning
8 pages, 2 figures, in Russian
null
null
null
cs.CE cs.DS
null
The modular technology of development of the problem-oriented CAD expansions is applied to a task of designing of protection of the buildings from the lightning with realization in program system TechnoCAD GlassX. The system model of the drawings of lightning protection is developed including the structured parametric representation (properties of objects and their interdependence, general settings and default settings) and operations with it, which efficiently automate designing
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:49:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiyatullov", "Rustem R.", "" ], [ "Safin", "Ilsur T.", "" ] ]
cs/0412031
Vladimir Migunov
Vladimir V. Migunov
The Features of the Complex CAD system of Reconstruction of the Industrial Plants
6 pages, no figures, in Russian
null
null
null
cs.CE
null
The features of designing of reconstruction of the acting plant by its design department are considered: the results of work are drawings corresponding with the national standards; large number of the small projects for different acting objects; variety of the types of the drawings in one project; large paper archive. The models and methods of developing of the complex CAD system with friend uniform environment of designing, with setting a profile of operations, with usage of the general parts of the project, with a series of problem-oriented subsystems are described on an example of a CAD system TechnoCAD GlassX
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:52:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412032
Vladimir Migunov
Vladimir V. Migunov
The methods of support of the requirements of the Russian standards at development of a CAD of industrial objects
8 pages, 4 figures, in Russian
null
null
null
cs.CE cs.DS
null
The methods of support of the requirements of the Russian standards in a CAD of industrial objects are explained, which were implemented in the CAD system TechnoCAD GlassX with an own graphics core and own structures of data storage. It is rotined, that the binding of storage structures and program code of a CAD to the requirements of standards enable not only to fulfil these requirements in project documentation, but also to increase a degree of compactness of storage of drawings both on the disk and in the RAM
[ { "version": "v1", "created": "Wed, 8 Dec 2004 08:57:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412033
Vladimir Migunov
Vladimir V. Migunov
The modelling of the build constructions in a CAD of the renovation of the enterprises by means of units in the drawings
8 pages, 4 figures, in Russian
null
null
null
cs.CE
null
The parametric model of build constructions and features of design operations are described for making drawings, which are the common component of the different parts of the projects of renovation of enterprises. The key moment of the deep design automation is the using of so-called units in the drawings, which are joining a visible graphic part and invisible parameters. The model has passed check during designing of several hundreds of drawings
[ { "version": "v1", "created": "Wed, 8 Dec 2004 09:01:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412034
Vladimir Migunov
Vladimir V. Migunov
The informatization of design works at industry firm during its renovation
9 pages, 3 figures, in Russian
null
null
null
cs.CE
null
The characteristic of design works on firm at its renovation and of the common directions of their informatization is given. The implantation of a CAD is selected as the key direction, and the requirements to a complex CAD-system are stated. The methods of such a CAD-system development are featured, and the connectedness of this development with the process of integration of information space of design department of the firm is characterized. The experience of development and implantation of a complex CAD of renovation of firms TechnoCAD GlassX lies in a basis of this reviewing
[ { "version": "v1", "created": "Wed, 8 Dec 2004 11:08:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0412035
Richard McClatchey
S R Amendolia, F Estrella, C del Frate, J Galvez, W Hassan, T Hauer, D Manset, R McClatchey, M Odeh, D Rogulin, T Solomonides, R Warren
Deployment of a Grid-based Medical Imaging Application
10 pages, 5 figures. Accepted by the 2005 HealthGrid Conference
null
null
null
cs.DC cs.DB
null
The MammoGrid project has deployed its Service-Oriented Architecture (SOA)-based Grid application in a real environment comprising actual participating hospitals. The resultant setup is currently being exploited to conduct rigorous in-house tests in the first phase before handing over the setup to the actual clinicians to get their feedback. This paper elaborates the deployment details and the experiences acquired during this phase of the project. Finally the strategy regarding migration to an upcoming middleware from EGEE project will be described. This paper concludes by highlighting some of the potential areas of future work.
[ { "version": "v1", "created": "Wed, 8 Dec 2004 17:15:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Amendolia", "S R", "" ], [ "Estrella", "F", "" ], [ "del Frate", "C", "" ], [ "Galvez", "J", "" ], [ "Hassan", "W", "" ], [ "Hauer", "T", "" ], [ "Manset", "D", "" ], [ "McClatchey", "R", "" ], [ "Odeh", "M", "" ], [ "Rogulin", "D", "" ], [ "Solomonides", "T", "" ], [ "Warren", "R", "" ] ]
cs/0412036
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey & Tony Solomonides
Reverse Engineering Ontology to Conceptual Data Models
6 pages, 3 figures. Accepted by the IASTED International Conference on Databases and Applications (DBA 2005)
null
null
null
cs.DC cs.DB
null
Ontologies facilitate the integration of heterogeneous data sources by resolving semantic heterogeneity between them. This research aims to study the possibility of generating a domain conceptual model from a given ontology with the vision to grow this generated conceptual data model into a global conceptual model integrating a number of existing data and information sources. Based on ontologically derived semantics of the BWW model, rules are identified that map elements of the ontology language (DAML+OIL) to domain conceptual model elements. This mapping is demonstrated using TAMBIS ontology. A significant corollary of this study is that it is possible to generate a domain conceptual model from a given ontology subject to validation that needs to be performed by the domain specialist before evolving this model into a global conceptual model.
[ { "version": "v1", "created": "Wed, 8 Dec 2004 17:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ], [ "Solomonides", "Tony", "" ] ]
cs/0412039
Michel Dagenais
Marc Chatel, Michel Dagenais, Charles Levert, Makan Pourzandi
Security in Carrier Class Server Applications for All-IP Networks
Survey paper on the challenges of all IP networks in telecom applications
null
null
null
cs.NI
null
A revolution is taking place in telecommunication networks. New services are appearing on platforms such as third generation cellular phones (3G) and broadband Internet access. This motivates the transition from mostly switched to all-IP networks. The replacement of the traditional shallow and well-defined interface to telephony networks brings accrued flexibility, but also makes the network accordingly difficult to properly secure. This paper surveys the implications of this transition on security issues in telecom applications. It does not give an exhaustive list of security tools or security protocols. Its goal is rather to initiate the reader to the security issues brought to carrier class servers by this revolution.
[ { "version": "v1", "created": "Thu, 9 Dec 2004 16:57:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Chatel", "Marc", "" ], [ "Dagenais", "Michel", "" ], [ "Levert", "Charles", "" ], [ "Pourzandi", "Makan", "" ] ]
cs/0412040
Robert Burger
J. R. Burger
Data-stationary Architecture to Execute Quantum Algorithms Classically
null
null
null
null
cs.AR
null
This paper presents a data stationary architecture in which each word has an attached address field. Address fields massively update in parallel to record data interchanges. Words do not move until memory is read for post processing. A sea of such cells can test large-scale quantum algorithms, although other programming is possible.
[ { "version": "v1", "created": "Thu, 9 Dec 2004 22:10:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "J. R.", "" ] ]
cs/0412041
Hai-Feng Guo
Hai-Feng Guo and Gopal Gupta
An Efficient and Flexible Engine for Computing Fixed Points
26 pages
null
null
null
cs.PL cs.AI cs.LO
null
An efficient and flexible engine for computing fixed points is critical for many practical applications. In this paper, we firstly present a goal-directed fixed point computation strategy in the logic programming paradigm. The strategy adopts a tabled resolution (or memorized resolution) to mimic the efficient semi-naive bottom-up computation. Its main idea is to dynamically identify and record those clauses that will lead to recursive variant calls, and then repetitively apply those alternatives incrementally until the fixed point is reached. Secondly, there are many situations in which a fixed point contains a large number or even infinite number of solutions. In these cases, a fixed point computation engine may not be efficient enough or feasible at all. We present a mode-declaration scheme which provides the capabilities to reduce a fixed point from a big solution set to a preferred small one, or from an infeasible infinite set to a finite one. The mode declaration scheme can be characterized as a meta-level operation over the original fixed point. We show the correctness of the mode declaration scheme. Thirdly, the mode-declaration scheme provides a new declarative method for dynamic programming, which is typically used for solving optimization problems. There is no need to define the value of an optimal solution recursively, instead, defining a general solution suffices. The optimal value as well as its corresponding concrete solution can be derived implicitly and automatically using a mode-directed fixed point computation engine. Finally, this fixed point computation engine has been successfully implemented in a commercial Prolog system. Experimental results are shown to indicate that the mode declaration improves both time and space performances in solving dynamic programming problems.
[ { "version": "v1", "created": "Thu, 9 Dec 2004 22:59:37 GMT" }, { "version": "v2", "created": "Sun, 2 Jan 2005 21:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Guo", "Hai-Feng", "" ], [ "Gupta", "Gopal", "" ] ]
cs/0412042
Peter Jonsson
Peter Jonsson, Mikael Klasson, and Andrei Krokhin
The approximability of three-valued MAX CSP
null
null
null
null
cs.CC
null
In the maximum constraint satisfaction problem (Max CSP), one is given a finite collection of (possibly weighted) constraints on overlapping sets of variables, and the goal is to assign values from a given domain to the variables so as to maximize the number (or the total weight, for the weighted case) of satisfied constraints. This problem is NP-hard in general, and, therefore, it is natural to study how restricting the allowed types of constraints affects the approximability of the problem. It is known that every Boolean (that is, two-valued) Max CSP problem with a finite set of allowed constraint types is either solvable exactly in polynomial time or else APX-complete (and hence can have no polynomial time approximation scheme unless P=NP. It has been an open problem for several years whether this result can be extended to non-Boolean Max CSP, which is much more difficult to analyze than the Boolean case. In this paper, we make the first step in this direction by establishing this result for Max CSP over a three-element domain. Moreover, we present a simple description of all polynomial-time solvable cases of our problem. This description uses the well-known algebraic combinatorial property of supermodularity. We also show that every hard three-valued Max CSP problem contains, in a certain specified sense, one of the two basic hard Max CSP problems which are the Maximum k-colourable subgraph problems for k=2,3.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 15:34:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Jonsson", "Peter", "" ], [ "Klasson", "Mikael", "" ], [ "Krokhin", "Andrei", "" ] ]
cs/0412043
Roberto Bagnara
Roberto Bagnara, Patricia M. Hill, Elena Mazzi, and Enea Zaffanella
Widening Operators for Weakly-Relational Numeric Abstractions (Extended Abstract)
null
null
null
null
cs.PL
null
We discuss the divergence problems recently identified in some extrapolation operators for weakly-relational numeric domains. We identify the cause of the divergences and point out that resorting to more concrete, syntactic domains can be avoided by researching suitable algorithms for the elimination of redundant constraints in the chosen representation.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 15:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Hill", "Patricia M.", "" ], [ "Mazzi", "Elena", "" ], [ "Zaffanella", "Enea", "" ] ]
cs/0412045
Riccardo Pucella
Andrew D. Gordon, Riccardo Pucella
Validating a Web Service Security Abstraction by Typing
44 pages. A preliminary version appears in the Proceedings of the Workshop on XML Security 2002, pp. 18-29, November 2002
Formal Aspects of Computing 17 (3), pp. 277-318, 2005
null
null
cs.CR
null
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP. We consider the problem of authenticating requests and responses at the SOAP-level, rather than relying on transport-level security. We propose a security abstraction, inspired by earlier work on secure RPC, in which the methods exported by a web service are annotated with one of three security levels: none, authenticated, or both authenticated and encrypted. We model our abstraction as an object calculus with primitives for defining and calling web services. We describe the semantics of our object calculus by translating to a lower-level language with primitives for message passing and cryptography. To validate our semantics, we embed correspondence assertions that specify the correct authentication of requests and responses. By appeal to the type theory for cryptographic protocols of Gordon and Jeffrey's Cryptyc, we verify the correspondence assertions simply by typing. Finally, we describe an implementation of our semantics via custom SOAP headers.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 21:34:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gordon", "Andrew D.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0412046
David Eppstein
David Eppstein
Quasiconvex Programming
33 pages, 14 figures
null
null
null
cs.CG
null
We define quasiconvex programming, a form of generalized linear programming in which one seeks the point minimizing the pointwise maximum of a collection of quasiconvex functions. We survey algorithms for solving quasiconvex programs either numerically or via generalizations of the dual simplex method from linear programming, and describe varied applications of this geometric optimization technique in meshing, scientific computation, information visualization, automated algorithm analysis, and robust statistics.
[ { "version": "v1", "created": "Fri, 10 Dec 2004 22:50:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0412047
Marko Rodriguez
Marko Rodriguez and Daniel Steinbock
A Social Network for Societal-Scale Decision-Making Systems
Dynamically Distributed Democracy algorithm presented in the arena of a societal-scale decision support system
North American Association for Computational Social and Organizational Science Conference Proceedings 2004
null
null
cs.CY cs.DS cs.HC
null
In societal-scale decision-making systems the collective is faced with the problem of ensuring that the derived group decision is in accord with the collective's intention. In modern systems, political institutions have instatiated representative forms of decision-making to ensure that every individual in the society has a participatory voice in the decision-making behavior of the whole--even if only indirectly through representation. An agent-based simulation demonstrates that in modern representative systems, as the ratio of representatives increases, there exists an exponential decrease in the ability for the group to behave in accord with the desires of the whole. To remedy this issue, this paper provides a novel representative power structure for decision-making that utilizes a social network and power distribution algorithm to maintain the collective's perspective over varying degrees of participation and/or ratios of representation. This work shows promise for the future development of policy-making systems that are supported by the computer and network infrastructure of our society.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 00:32:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko", "" ], [ "Steinbock", "Daniel", "" ] ]
cs/0412048
Benoit Masson
Enrico Formenti (I3S), Benoit Masson (I3S)
On computing fixed points for generalized sandpiles
Presented in DMCS 2004 (Turku, FINLAND)
null
null
null
cs.CC
null
We prove fixed points results for sandpiles starting with arbitrary initial conditions. We give an effective algorithm for computing such fixed points, and we refine it in the particular case of SPM.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 07:51:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Formenti", "Enrico", "", "I3S" ], [ "Masson", "Benoit", "", "I3S" ] ]
cs/0412049
Vedran Kordic
Danica Janglova
Neural Networks in Mobile Robot Motion
9 Pages
International Journal of Advanced Robotic Systems, Volume 1, Number 1, March 2004, pp.15-22
null
null
cs.RO cs.AI
null
This paper deals with a path planning and intelligent control of an autonomous robot which should move safely in partially structured environment. This environment may involve any number of obstacles of arbitrary shape and size; some of them are allowed to move. We describe our approach to solving the motion-planning problem in mobile robot control using neural networks-based technique. Our method of the construction of a collision-free path for moving robot among obstacles is based on two neural networks. The first neural network is used to determine the "free" space using ultrasound range finder data. The second neural network "finds" a safe direction for the next robot section of the path in the workspace while avoiding the nearest obstacles. Simulation examples of generated path with proposed techniques will be presented.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:32:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Janglova", "Danica", "" ] ]
cs/0412050
Vedran Kordic
Yongsheng Ou & Yangsheng Xu
Gyroscopically Stabilized Robot: Balance and Tracking
null
International Journal of Advanced Robotic Systems, Volume 1, Number 1, March 2004, pp.23-32
null
null
cs.RO
null
The single wheel, gyroscopically stabilized robot - Gyrover, is a dynamically stable but statically unstable, underactuated system. In this paper, based on the dynamic model of the robot, we investigate two classes of nonholonomic constraints associated with the system. Then, based on the backstepping technology, we propose a control law for balance control of Gyrover. Next, through transferring the systems states from Cartesian coordinate to polar coordinate, control laws for point-to-point control and line tracking in Cartesian space are provided.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:38:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ou", "Yongsheng", "" ], [ "Xu", "Yangsheng", "" ] ]
cs/0412052
Vedran Kordic
Olivier Michel
WebotsTM: Professional Mobile Robot Simulation
null
International Journal of Advanced Robotic Systems, Volume 1, Number 1, March 2004, pp.39-42
null
null
cs.RO
null
Cyberbotics Ltd. develops WebotsTM, a mobile robotics simulation software that provides you with a rapid prototyping environment for modelling, programming and simulating mobile robots. The provided robot libraries enable you to transfer your control programs to several commercially available real mobile robots. WebotsTM lets you define and modify a complete mobile robotics setup, even several different robots sharing the same environment. For each object, you can define a number of properties, such as shape, color, texture, mass, friction, etc. You can equip each robot with a large number of available sensors and actuators. You can program these robots using your favorite development environment, simulate them and optionally transfer the resulting programs onto your real robots. WebotsTM has been developed in collaboration with the Swiss Federal Institute of Technology in Lausanne, thoroughly tested, well documented and continuously maintained for over 7 years. It is now the main commercial product available from Cyberbotics Ltd.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:45:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Michel", "Olivier", "" ] ]
cs/0412053
Vedran Kordic
Atef A. Ata & Habib Johar
Dynamic simulation of task constrained of a rigid-flexible manipulator
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp.61-66
null
null
cs.RO
null
A rigid-flexible manipulator may be assigned tasks in a moving environment where the winds or vibrations affect the position and/or orientation of surface of operation. Consequently, losses of the contact and perhaps degradation of the performance may occur as references are changed. When the environment is moving, knowledge of the angle α between the contact surface and the horizontal is required at every instant. In this paper, different profiles for the time varying angle α are proposed to investigate the effect of this change into the contact force and the joint torques of a rigid-flexible manipulator. The coefficients of the equation of the proposed rotating surface are changing with time to determine the new X and Y coordinates of the moving surface as the surface rotates.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:48:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Ata", "Atef A.", "" ], [ "Johar", "Habib", "" ] ]
cs/0412054
Vedran Kordic
L. M. Galantucci, G. Percoco & R. Spina
Assembly and Disassembly Planning by using Fuzzy Logic & Genetic Algorithms
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp.67-74
null
null
cs.RO
null
The authors propose the implementation of hybrid Fuzzy Logic-Genetic Algorithm (FL-GA) methodology to plan the automatic assembly and disassembly sequence of products. The GA-Fuzzy Logic approach is implemented onto two levels. The first level of hybridization consists of the development of a Fuzzy controller for the parameters of an assembly or disassembly planner based on GAs. This controller acts on mutation probability and crossover rate in order to adapt their values dynamically while the algorithm runs. The second level consists of the identification of theoptimal assembly or disassembly sequence by a Fuzzy function, in order to obtain a closer control of the technological knowledge of the assembly/disassembly process. Two case studies were analyzed in order to test the efficiency of the Fuzzy-GA methodologies.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:50:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Galantucci", "L. M.", "" ], [ "Percoco", "G.", "" ], [ "Spina", "R.", "" ] ]
cs/0412055
Vedran Kordic
Alan P. Kypson and W. Randolph Chitwood Jr
Robotic Applications in Cardiac Surgery
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp.87-92
null
null
cs.RO
null
Traditionally, cardiac surgery has been performed through a median sternotomy, which allows the surgeon generous access to the heart and surrounding great vessels. As a paradigm shift in the size and location of incisions occurs in cardiac surgery, new methods have been developed to allow the surgeon the same amount of dexterity and accessibility to the heart in confined spaces and in a less invasive manner. Initially, long instruments without pivot points were used, however, more recent robotic telemanipulation systems have been applied that allow for improved dexterity, enabling the surgeon to perform cardiac surgery from a distance not previously possible. In this rapidly evolving field, we review the recent history and clinical results of using robotics in cardiac surgery.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kypson", "Alan P.", "" ], [ "Chitwood", "W. Randolph", "Jr" ] ]
cs/0412056
Vedran Kordic
Nikita Pashenkov & Ryuichi Iwamasa
One-Chip Solution to Intelligent Robot Control: Implementing Hexapod Subsumption Architecture Using a Contemporary Microprocessor
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp. 93-98
null
null
cs.RO
null
This paper introduces a six-legged autonomous robot managed by a single controller and a software core modeled on subsumption architecture. We begin by discussing the features and capabilities of IsoPod, a new processor for robotics which has enabled a streamlined implementation of our project. We argue that this processor offers a unique set of hardware and software features, making it a practical development platform for robotics in general and for subsumption-based control architectures in particular. Next, we summarize original ideas on subsumption architecture implementation for a six-legged robot, as presented by its inventor Rodney Brooks in 1980s. A comparison is then made to a more recent example of a hexapod control architecture based on subsumption. The merits of both systems are analyzed and a new subsumption architecture layout is formulated as a response. We conclude with some remarks regarding the development of this project as a hint at new potentials for intelligent robot design, opened by a recent development in embedded controller market.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:55:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Pashenkov", "Nikita", "" ], [ "Iwamasa", "Ryuichi", "" ] ]
cs/0412057
Vedran Kordic
Miomir Vukobratovic, Dejan Andric & Branislav Borovac
How to achieve various gait patterns from single nominal
null
International Journal of Advanced Robotic Systems, Volume 1, Number 2, June 2004, pp. 99-108
null
null
cs.RO
null
In this paper is presented an approach to achieving on-line modification of nominal biped gait without recomputing entire dynamics when steady motion is performed. Straight, dynamically balanced walk was used as a nominal gait, and applied modifications were speed-up and slow-down walk and turning left and right. It is shown that the disturbances caused by these modifications jeopardize dynamic stability, but they can be simply compensated to enable walk continuation.
[ { "version": "v1", "created": "Sat, 11 Dec 2004 12:57:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Vukobratovic", "Miomir", "" ], [ "Andric", "Dejan", "" ], [ "Borovac", "Branislav", "" ] ]
cs/0412058
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng, Joshua Zhexue Huang
Clustering Categorical Data Streams
23 pages. To Appear in Journal of Computational Methods on Science and Engineering(JCMSE)
null
null
null
cs.DB cs.AI
null
The data stream model has been defined for new classes of applications involving massive data being generated at a fast pace. Web click stream analysis and detection of network intrusions are two examples. Cluster analysis on data streams becomes more difficult, because the data objects in a data stream must be accessed in order and can be read only once or few times with limited resources. Recently, a few clustering algorithms have been developed for analyzing numeric data streams. However, to our knowledge to date, no algorithm exists for clustering categorical data streams. In this paper, we propose an efficient clustering algorithm for analyzing categorical data streams. It has been proved that the proposed algorithm uses small memory footprints. We provide empirical analysis on the performance of the algorithm in clustering both synthetic and real data streams
[ { "version": "v1", "created": "Mon, 13 Dec 2004 06:14:20 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ], [ "Huang", "Joshua Zhexue", "" ] ]
cs/0412059
Ross Gayler
Ross W. Gayler
Vector Symbolic Architectures answer Jackendoff's challenges for cognitive neuroscience
This is a slightly updated version of the paper presented at the Joint International Conference on Cognitive Science, 13-17 July 2003, University of New South Wales, Sydney, Australia. 6 pages
null
null
null
cs.NE cs.AI
null
Jackendoff (2002) posed four challenges that linguistic combinatoriality and rules of language present to theories of brain function. The essence of these problems is the question of how to neurally instantiate the rapid construction and transformation of the compositional structures that are typically taken to be the domain of symbolic processing. He contended that typical connectionist approaches fail to meet these challenges and that the dialogue between linguistic theory and cognitive neuroscience will be relatively unproductive until the importance of these problems is widely recognised and the challenges answered by some technical innovation in connectionist modelling. This paper claims that a little-known family of connectionist models (Vector Symbolic Architectures) are able to meet Jackendoff's challenges.
[ { "version": "v1", "created": "Mon, 13 Dec 2004 08:00:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayler", "Ross W.", "" ] ]
cs/0412061
Gerard Henry Edmond Duchamp
Gerard Henry Edmond Duchamp (LIPN), Jean-Gabriel Luque (IGM), Karol A. Penson (LPTL), Christophe Tollu (LIPN)
Free quasi-symmetric functions, product actions and quantum field theory of partitions
Submitted 28.11.04
null
null
null
cs.SC math.CO quant-ph
null
We examine two associative products over the ring of symmetric functions related to the intransitive and Cartesian products of permutation groups. As an application, we give an enumeration of some Feynman type diagrams arising in Bender's QFT of partitions. We end by exploring possibilities to construct noncommutative analogues.
[ { "version": "v1", "created": "Mon, 13 Dec 2004 19:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Duchamp", "Gerard Henry Edmond", "", "LIPN" ], [ "Luque", "Jean-Gabriel", "", "IGM" ], [ "Penson", "Karol A.", "", "LPTL" ], [ "Tollu", "Christophe", "", "LIPN" ] ]
cs/0412062
Michael Bauland
Michael Bauland and Edith Hemaspaandra
Isomorphic Implication
22 pages; corrected typos and minor errors
null
null
null
cs.CC
null
We study the isomorphic implication problem for Boolean constraints. We show that this is a natural analog of the subgraph isomorphism problem. We prove that, depending on the set of constraints, this problem is in P, NP-complete, or NP-hard, coNP-hard, and in parallel access to NP. We show how to extend the NP-hardness and coNP-hardness to hardness for parallel access to NP for some cases, and conjecture that this can be done in all cases.
[ { "version": "v1", "created": "Tue, 14 Dec 2004 17:15:29 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2005 12:29:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bauland", "Michael", "" ], [ "Hemaspaandra", "Edith", "" ] ]
cs/0412064
Marko Rodriguez
Dan Steinbock, Craig Kaplan, Marko Rodriguez, Juana Diaz, Newton Der, Suzanne Garcia
Collective Intelligence Quanitifed for Computer-Mediated Group Problem Solving
University of California, Santa Cruz Tech Report UCSC-CRL-02-28
null
null
null
cs.CY cs.HC cs.OH
null
Collective Intelligence (CI) is the ability of a group to exhibit greater intelligence than its individual members. Expressed by the common saying that "two minds are better than one," CI has been a topic of interest for social psychology and the information sciences. Computer mediation adds a new element in the form of distributed networks and group support systems. These facilitate highly organized group activities that were all but impossible before computer mediation. This paper presents experimental findings on group problem solving where a distributed software system automatically integrates input from many humans. In order to quantify Collective Intelligence, we compare the performance of groups to individuals when solving a mathematically formalized problem. This study shows that groups can outperform individuals on difficult but not easy problems, though groups are slower to produce solutions. The subjects are 57 university students. The task is the 8-Puzzle sliding tile game.
[ { "version": "v1", "created": "Wed, 15 Dec 2004 17:13:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinbock", "Dan", "" ], [ "Kaplan", "Craig", "" ], [ "Rodriguez", "Marko", "" ], [ "Diaz", "Juana", "" ], [ "Der", "Newton", "" ], [ "Garcia", "Suzanne", "" ] ]
cs/0412065
Riccardo Pucella
Stephen Chong, Riccardo Pucella
A Framework for Creating Natural Language User Interfaces for Action-Based Applications
25 pages, 1 figure. A preliminary version of this paper appeared in the Proceedings of the Third International AMAST Workshop on Algebraic Methods in Language Processing, TWLT Report 21, pp. 83-98, 2003
null
null
null
cs.CL cs.HC
null
In this paper we present a framework for creating natural language interfaces to action-based applications. Our framework uses a number of reusable application-independent components, in order to reduce the effort of creating a natural language interface for a given application. Using a type-logical grammar, we first translate natural language sentences into expressions in an extended higher-order logic. These expressions can be seen as executable specifications corresponding to the original sentences. The executable specifications are then interpreted by invoking appropriate procedures provided by the application for which a natural language interface is being created.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 03:24:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Chong", "Stephen", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0412066
Vitorino Ramos Dr.
Vitorino Ramos, Pedro Pina, Fernando Muge
From Feature Extraction to Classification: A multidisciplinary Approach applied to Portuguese Granites
8 pages, 6 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_21.html
SCIA 99, 11th Scandinavian Conf. on Image Analysis, ISBN 87-88306-42-9, Vol.2, pp. 817-824, Kangerlussuaq, Greenland, 7-11, June 1999
null
null
cs.AI cs.CV
null
The purpose of this paper is to present a complete methodology based on a multidisciplinary approach, that goes from the extraction of features till the classification of a set of different portuguese granites. The set of tools to extract the features that characterise polished surfaces of the granites is mainly based on mathematical morphology. The classification methodology is based on a genetic algorithm capable of search the input feature space used by the nearest neighbour rule classifier. Results show that is adequate to perform feature reduction and simultaneous improve the recognition rate. Moreover, the present methodology represents a robust strategy to understand the proper nature of the images treated, and their discriminant features. KEYWORDS: Portuguese grey granites, feature extraction, mathematical morphology, feature reduction, genetic algorithms, nearest neighbour rule classifiers (k-NNR).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 19:04:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Pina", "Pedro", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412068
Vitorino Ramos Dr.
Vitorino Ramos, Ajith Abraham
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special track at WSTST 2005, Muroran, JAPAN
null
null
null
cs.CR cs.AI
null
Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. Due to the fact that it is more and more improbable to a system administrator to recognize and manually intervene to stop an attack, there is an increasing recognition that ID systems should have a lot to earn on following its basic principles on the behavior of complex natural systems, namely in what refers to self-organization, allowing for a real distributed and collective perception of this phenomena. With that aim in mind, the present work presents a self-organized ant colony based intrusion detection system (ANTIDS) to detect intrusions in a network infrastructure. The performance is compared among conventional soft computing paradigms like Decision Trees, Support Vector Machines and Linear Genetic Programming to model fast, online and efficient intrusion detection systems.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 13:17:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Abraham", "Ajith", "" ] ]
cs/0412069
Vitorino Ramos Dr.
Vitorino Ramos, Jonathan Campbell, John Slater, John Gillespie, Ivan F. Bendezu, Fionn Murtagh
Swarming around Shellfish Larvae
11 pages, 4 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_53.html, submitted to IbPRIA 2005, Portugal
null
null
null
cs.AI cs.CV
null
The collection of wild larvae seed as a source of raw material is a major sub industry of shellfish aquaculture. To predict when, where and in what quantities wild seed will be available, it is necessary to track the appearance and growth of planktonic larvae. One of the most difficult groups to identify, particularly at the species level are the Bivalvia. This difficulty arises from the fact that fundamentally all bivalve larvae have a similar shape and colour. Identification based on gross morphological appearance is limited by the time-consuming nature of the microscopic examination and by the limited availability of expertise in this field. Molecular and immunological methods are also being studied. We describe the application of computational pattern recognition methods to the automated identification and size analysis of scallop larvae. For identification, the shape features used are binary invariant moments; that is, the features are invariant to shift (position within the image), scale (induced either by growth or differential image magnification) and rotation. Images of a sample of scallop and non-scallop larvae covering a range of maturities have been analysed. In order to overcome the automatic identification, as well as to allow the system to receive new unknown samples at any moment, a self-organized and unsupervised ant-like clustering algorithm based on Swarm Intelligence is proposed, followed by simple k-NNR nearest neighbour classification on the final map. Results achieve a full recognition rate of 100% under several situations (k =1 or 3).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 13:30:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Campbell", "Jonathan", "" ], [ "Slater", "John", "" ], [ "Gillespie", "John", "" ], [ "Bendezu", "Ivan F.", "" ], [ "Murtagh", "Fionn", "" ] ]
cs/0412070
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
Less is More - Genetic Optimisation of Nearest Neighbour Classifiers
9 pages, 7 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_13.html
Proc. RecPad 98 - 10th Portuguese Conference on Pattern Recognition, F.Muge, C.Pinto and M.Piedade Eds., ISBN 972-97711-0-3, pp. 293-301, Lisbon, March 1998
null
null
cs.AI cs.CV
null
The present paper deals with optimisation of Nearest Neighbour rule Classifiers via Genetic Algorithms. The methodology consists on implement a Genetic Algorithm capable of search the input feature space used by the NNR classifier. Results show that is adequate to perform feature reduction and simultaneous improve the Recognition Rate. Some practical examples prove that is possible to Recognise Portuguese Granites in 100%, with only 3 morphological features (from an original set of 117 features), which is well suited for real time applications. Moreover, the present method represents a robust strategy to understand the proper nature of the images treated, and their discriminant features. KEYWORDS: Feature Reduction, Genetic Algorithms, Nearest Neighbour Rule Classifiers (k-NNR).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 19:09:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412073
Vitorino Ramos Dr.
Vitorino Ramos
Self-Organizing the Abstract: Canvas as a Swarm Habitat for Collective Memory, Perception and Cooperative Distributed Creativity
2 pages, 1 figure, Project at http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html. Publication at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html
in First Art and Science Symposium, Models to Know Reality, J. Rekalde, R. Ibanez and A. Simo (Eds.), pp. 59-60, Facultad de Bellas Artes EHU/UPV, Universidad del Pais Vasco, 11-12 Dec., Bilbao, Spain, 2003
null
null
cs.MM cs.AI
null
Past experiences under the designation of "Swarm Paintings" conducted in 2001, not only confirmed the possibility of realizing an artificial art (thus non-human), as introduced into the process the questioning of creative migration, specifically from the computer monitors to the canvas via a robotic harm. In more recent self-organized based research we seek to develop and profound the initial ideas by using a swarm of autonomous robots (ARTsBOT project 2002-03), that "live" avoiding the purpose of being merely a simple perpetrator of order streams coming from an external computer, but instead, that actually co-evolve within the canvas space, acting (that is, laying ink) according to simple inner threshold stimulus response functions, reacting simultaneously to the chromatic stimulus present in the canvas environment done by the passage of their team-mates, as well as by the distributed feedback, affecting their future collective behaviour. In parallel, and in what respects to certain types of collective systems, we seek to confirm, in a physically embedded way, that the emergence of order (even as a concept) seems to be found at a lower level of complexity, based on simple and basic interchange of information, and on the local dynamic of parts, who, by self-organizing mechanisms tend to form an lived whole, innovative and adapting, allowing for emergent open-ended creative and distributed production. KEYWORDS: ArtSBots Project, Swarm Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm Paintings, Robot Paintings, Non-Human Art, Painting Emergence and Cooperation, Art and Complexity, ArtBots: The Robot Talent Show.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:36:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412074
Elizabeth Haubert
Elizabeth Haubert
Threats of Human Error in a High-Performance Storage System: Problem Statement and Case Study
13 pages, 1 figure
null
null
null
cs.HC cs.OS
null
System administration is a difficult, often tedious, job requiring many skilled laborers. The data that is protected by system administrators is often valued at or above the value of the institution maintaining that data. A number of ethnographic studies have confirmed the skill of these operators, and the difficulty of providing adequate tools. In an effort to minimize the maintenance costs, an increasing portion of system administration is subject to automation - particularly simple, routine tasks such as data backup. While such tools reduce the risk of errors from carelessness, the same tools may result in reduced skill and system familiarity in experienced workers. Care should be taken to ensure that operators maintain system awareness without placing the operator in a passive, monitoring role.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:38:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubert", "Elizabeth", "" ] ]
cs/0412075
Vitorino Ramos Dr.
Vitorino Ramos, Juan J. Merelo
Self-Organized Stigmergic Document Maps: Environment as a Mechanism for Context Learning
10 pages, 5 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_42.html
in AEB 2002, 1st Spanish Conference on Evolutionary and Bio-Inspired Algorithms, E. Alba, F. Herrera, J.J. Merelo et al. (Eds.), pp. 284-293, Centro Univ. de Merida, Merida, Spain, 6-8 Feb. 2002
null
null
cs.AI cs.DC
null
Social insect societies and more specifically ant colonies, are distributed systems that, in spite of the simplicity of their individuals, present a highly structured social organization. As a result of this organization, ant colonies can accomplish complex tasks that in some cases exceed the individual capabilities of a single ant. The study of ant colonies behavior and of their self-organizing capabilities is of interest to knowledge retrieval/management and decision support systems sciences, because it provides models of distributed adaptive organization which are useful to solve difficult optimization, classification, and distributed control problems, among others. In the present work we overview some models derived from the observation of real ants, emphasizing the role played by stigmergy as distributed communication paradigm, and we present a novel strategy to tackle unsupervised clustering as well as data retrieval problems. The present ant clustering system (ACLUSTER) avoids not only short-term memory based strategies, as well as the use of several artificial ant types (using different speeds), present in some recent approaches. Moreover and according to our knowledge, this is also the first application of ant systems into textual document clustering. KEYWORDS: Swarm Intelligence, Ant Systems, Unsupervised Clustering, Data Retrieval, Data Mining, Distributed Computing, Document Maps, Textual Document Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:47:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Merelo", "Juan J.", "" ] ]
cs/0412076
Vitorino Ramos Dr.
J.R. Caldas-Pinto, Pedro Pina, Vitorino Ramos, Mario Ramalho
Clustering Techniques for Marbles Classification
7 pages, 17 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_41.html
RecPad 2002 -12th Portuguese Conference on Pattern Recognition, ISBN 972-789-067-9, Aveiro, Portugal, June 27-28, 2002
null
null
cs.AI cs.CV
null
Automatic marbles classification based on their visual appearance is an important industrial issue. However, there is no definitive solution to the problem mainly due to the presence of randomly distributed high number of different colours and its subjective evaluation by the human expert. In this paper we present a study of segmentation techniques, we evaluate they overall performance using a training set and standard quality measures and finally we apply different clustering techniques to automatically classify the marbles. KEYWORDS: Segmentation, Clustering, Quadtrees, Learning Vector Quantization (LVQ), Simulated Annealing (SA).
[ { "version": "v1", "created": "Fri, 17 Dec 2004 15:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Caldas-Pinto", "J. R.", "" ], [ "Pina", "Pedro", "" ], [ "Ramos", "Vitorino", "" ], [ "Ramalho", "Mario", "" ] ]
cs/0412077
Vitorino Ramos Dr.
Vitorino Ramos
On the Implicit and on the Artificial - Morphogenesis and Emergent Aesthetics in Autonomous Collective Systems
33 pages, 7 figures, Project at http://alfa.ist.utl.pt/~cvrm/staff/vramos/Artsbot.html . Publ. at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_37.html
Chapter 2 in ARCHITOPIA Book, Art, Architecture and Science, J.L. Maubant et al. (Eds.), pp. 25-57, INSTITUT D'ART CONTEMPORAIN (France), ISBN : 2905985631, Feb. 2002
null
null
cs.AI cs.MM
null
Imagine a "machine" where there is no pre-commitment to any particular representational scheme: the desired behaviour is distributed and roughly specified simultaneously among many parts, but there is minimal specification of the mechanism required to generate that behaviour, i.e. the global behaviour evolves from the many relations of multiple simple behaviours. A machine that lives to and from/with Synergy. An artificial super-organism that avoids specific constraints and emerges within multiple low-level implicit bio-inspired mechanisms. KEYWORDS: Complex Science, ArtSBots Project, Swarm Intelligence, Stigmergy, UnManned Art, Symbiotic Art, Swarm Paintings, Robot Paintings, Non-Human Art, Painting Emergence and Cooperation, Art and Complexity, ArtBots: The Robot Talent Show.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:15:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412078
David Renault
D. Renault
The vertex-transitive TLF-planar graphs
Article : 23 pages, 15 figures Appendix : 13 pages, 72 figures Submitted to Discrete Mathematics The appendix is accessible at http://www.labri.fr/~renault/research/research.html
null
null
null
cs.DM
null
We consider the class of the topologically locally finite (in short TLF) planar vertex-transitive graphs, a class containing in particular all the one-ended planar Cayley graphs and the normal transitive tilings. We characterize these graphs with a finite local representation and a special kind of finite state automaton named labeling scheme. As a result, we are able to enumerate and describe all TLF-planar vertex-transitive graphs of any given degree. Also, we are able decide to whether any TLF-planar transitive graph is Cayley or not.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:18:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Renault", "D.", "" ] ]
cs/0412079
Vitorino Ramos Dr.
Vitorino Ramos
The MC2 Project [Machines of Collective Conscience]: A possible walk, up to Life-like Complexity and Behaviour, from bottom, basic and simple bio-inspired heuristics - a walk, up into the morphogenesis of information
14 pages, Project at http://alfa.ist.utl.pt/~cvrm/staff/vramos/MC2.html
at UTOPIA Biennial Art Exposition CATALOGUE, Cascais, Portugal, July 12-22, 2001
null
null
cs.AI cs.MM
null
Synergy (from the Greek word synergos), broadly defined, refers to combined or co-operative effects produced by two or more elements (parts or individuals). The definition is often associated with the holistic conviction quote that "the whole is greater than the sum of its parts" (Aristotle, in Metaphysics), or the whole cannot exceed the sum of the energies invested in each of its parts (e.g. first law of thermodynamics) even if it is more accurate to say that the functional effects produced by wholes are different from what the parts can produce alone. Synergy is a ubiquitous phenomena in nature and human societies alike. One well know example is provided by the emergence of self-organization in social insects, via direct or indirect interactions. The latter types are more subtle and defined as stigmergy to explain task coordination and regulation in the context of nest reconstruction in termites. An example, could be provided by two individuals, who interact indirectly when one of them modifies the environment and the other responds to the new environment at a later time. In other words, stigmergy could be defined as a particular case of environmental or spatial synergy. The system is purely holistic, and their properties are intrinsically emergent and autocatalytic. On the present work we present a "machine" where there is no precommitment to any particular representational scheme: the desired behaviour is distributed and roughly specified simultaneously among many parts, but there is minimal specification of the mechanism required to generate that behaviour, i.e. the global behaviour evolves from the many relations of multiple simple behaviours.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:28:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412080
Vitorino Ramos Dr.
Vitorino Ramos
The Biological Concept of Neoteny in Evolutionary Colour Image Segmentation - Simple Experiments in Simple Non-Memetic Genetic Algorithms
12 pages, 3 figures, at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_35.html
in Applications of Evolutionary Computation, (Eds.), EuroGP / EvoIASP 2001 - 3rd Eur. Works. on Evol. Comp. in Image Analysis and Signal Processing, Lake Como, Milan, Italy, Lecture Notes in Computer Science, Vol. 2037, pp. 364-378, Springer-Verlag, Berlin-Heidelberg, April 18-20, 2001
null
null
cs.AI cs.NE
null
Neoteny, also spelled Paedomorphosis, can be defined in biological terms as the retention by an organism of juvenile or even larval traits into later life. In some species, all morphological development is retarded; the organism is juvenilized but sexually mature. Such shifts of reproductive capability would appear to have adaptive significance to organisms that exhibit it. In terms of evolutionary theory, the process of paedomorphosis suggests that larval stages and developmental phases of existing organisms may give rise, under certain circumstances, to wholly new organisms. Although the present work does not pretend to model or simulate the biological details of such a concept in any way, these ideas were incorporated by a rather simple abstract computational strategy, in order to allow (if possible) for faster convergence into simple non-memetic Genetic Algorithms, i.e. without using local improvement procedures (e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic Algorithm was used for colour image segmentation purposes by using K-mean unsupervised clustering methods, namely for guiding the evolutionary algorithm in his search for finding the optimal or sub-optimal data partition. Average results suggest that the use of neotonic strategies by employing juvenile genotypes into the later generations and the use of linear-dynamic mutation rates instead of constant, can increase fitness values by 58% comparing to classical Genetic Algorithms, independently from the starting population characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:39:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412081
Vitorino Ramos Dr.
Vitorino Ramos
Artificial Neoteny in Evolutionary Image Segmentation
10 pages, 4 figures
SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge, Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 69-78, Lisbon, Portugal, 11-13 Sep. 2000
null
null
cs.AI cs.NE
null
Neoteny, also spelled Paedomorphosis, can be defined in biological terms as the retention by an organism of juvenile or even larval traits into later life. In some species, all morphological development is retarded; the organism is juvenilized but sexually mature. Such shifts of reproductive capability would appear to have adaptive significance to organisms that exhibit it. In terms of evolutionary theory, the process of paedomorphosis suggests that larval stages and developmental phases of existing organisms may give rise, under certain circumstances, to wholly new organisms. Although the present work does not pretend to model or simulate the biological details of such a concept in any way, these ideas were incorporated by a rather simple abstract computational strategy, in order to allow (if possible) for faster convergence into simple non-memetic Genetic Algorithms, i.e. without using local improvement procedures (e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic Algorithm was used for colour image segmentation purposes by using K-mean unsupervised clustering methods, namely for guiding the evolutionary algorithm in his search for finding the optimal or sub-optimal data partition. Average results suggest that the use of neotonic strategies by employing juvenile genotypes into the later generations and the use of linear-dynamic mutation rates instead of constant, can increase fitness values by 58% comparing to classical Genetic Algorithms, independently from the starting population characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:44:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ] ]
cs/0412083
Vitorino Ramos Dr.
A. Marcolino, Vitorino Ramos, Mario Ramalho, J.R. Caldas Pinto
Line and Word Matching in Old Documents
12 pages, 7 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_32.html
SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge, Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 123-135, Lisbon, Portugal, 11-13 Sep. 2000
null
null
cs.AI cs.CV
null
This paper is concerned with the problem of establishing an index based on word matching. It is assumed that the book was digitised as better as possible and some pre-processing techniques were already applied as line orientation correction and some noise removal. However two main factor are responsible for being not possible to apply ordinary optical character recognition techniques (OCR): the presence of antique fonts and the degraded state of many characters due to unrecoverable original time degradation. In this paper we make a short introduction to word segmentation that involves finding the lines that characterise a word. After we discuss different approaches for word matching and how they can be combined to obtain an ordered list for candidate words for the matching. This discussion will be illustrated by examples.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 16:58:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Marcolino", "A.", "" ], [ "Ramos", "Vitorino", "" ], [ "Ramalho", "Mario", "" ], [ "Pinto", "J. R. Caldas", "" ] ]
cs/0412084
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
Map Segmentation by Colour Cube Genetic K-Mean Clustering
4 pages, 1 figure, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_31.html
ECDL 2000 - 4th Eur. Conf. on Research and Advanced Technology for Digital Libraries, J. Borbinha and T. Baker (Eds.), ISBN 3-540-41023-6, LNCS series, Vol. 1923, pp. 319-323, Springer-Verlag, Heidelberg, Lisbon, Portugal, 18-20 Sep. 2000
null
null
cs.AI cs.NE
null
Segmentation of a colour image composed of different kinds of texture regions can be a hard problem, namely to compute for an exact texture fields and a decision of the optimum number of segmentation areas in an image when it contains similar and/or unstationary texture fields. In this work, a method is described for evolving adaptive procedures for these problems. In many real world applications data clustering constitutes a fundamental issue whenever behavioural or feature domains can be mapped into topological domains. We formulate the segmentation problem upon such images as an optimisation problem and adopt evolutionary strategy of Genetic Algorithms for the clustering of small regions in colour feature space. The present approach uses k-Means unsupervised clustering methods into Genetic Algorithms, namely for guiding this last Evolutionary Algorithm in his search for finding the optimal or sub-optimal data partition, task that as we know, requires a non-trivial search because of its NP-complete nature. To solve this task, the appropriate genetic coding is also discussed, since this is a key aspect in the implementation. Our purpose is to demonstrate the efficiency of Genetic Algorithms to automatic and unsupervised texture segmentation. Some examples in Colour Maps are presented and overall results discussed. KEYWORDS: Genetic Algorithms, Artificial Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 17:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412086
Vitorino Ramos Dr.
Vitorino Ramos, Filipe Almeida
Artificial Ant Colonies in Digital Image Habitats - A Mass Behaviour Effect Study on Pattern Recognition
11 pages, 3 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_29.html
Proc. of ANTS 2000 - 2nd Int. Works. on Ant Algorithms (From Ant Colonies to Artificial Ants), Marco Dorigo, Martin Middendorf, Thomas Stuzle (Eds.), pp. 113, Brussels, Belgium, 7-9 Sep. 2000
null
null
cs.AI cs.CV
null
Some recent studies have pointed that, the self-organization of neurons into brain-like structures, and the self-organization of ants into a swarm are similar in many respects. If possible to implement, these features could lead to important developments in pattern recognition systems, where perceptive capabilities can emerge and evolve from the interaction of many simple local rules. The principle of the method is inspired by the work of Chialvo and Millonas who developed the first numerical simulation in which swarm cognitive map formation could be explained. From this point, an extended model is presented in order to deal with digital image habitats, in which artificial ants could be able to react to the environment and perceive it. Evolution of pheromone fields point that artificial ant colonies could react and adapt appropriately to any type of digital habitat. KEYWORDS: Swarm Intelligence, Self-Organization, Stigmergy, Artificial Ant Systems, Pattern Recognition and Perception, Image Segmentation, Gestalt Perception Theory, Distributed Computation.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 17:19:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Almeida", "Filipe", "" ] ]
cs/0412087
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
Image Colour Segmentation by Genetic Algorithms
5 pages, 1 figure, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_26.html
RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp. 125-129, Porto, Portugal, May 11-12, 2000
null
null
cs.AI cs.CV
null
Segmentation of a colour image composed of different kinds of texture regions can be a hard problem, namely to compute for an exact texture fields and a decision of the optimum number of segmentation areas in an image when it contains similar and/or unstationary texture fields. In this work, a method is described for evolving adaptive procedures for these problems. In many real world applications data clustering constitutes a fundamental issue whenever behavioural or feature domains can be mapped into topological domains. We formulate the segmentation problem upon such images as an optimisation problem and adopt evolutionary strategy of Genetic Algorithms for the clustering of small regions in colour feature space. The present approach uses k-Means unsupervised clustering methods into Genetic Algorithms, namely for guiding this last Evolutionary Algorithm in his search for finding the optimal or sub-optimal data partition, task that as we know, requires a non-trivial search because of its intrinsic NP-complete nature. To solve this task, the appropriate genetic coding is also discussed, since this is a key aspect in the implementation. Our purpose is to demonstrate the efficiency of Genetic Algorithms to automatic and unsupervised texture segmentation. Some examples in Colour Maps, Ornamental Stones and in Human Skin Mark segmentation are presented and overall results discussed. KEYWORDS: Genetic Algorithms, Colour Image Segmentation, Classification, Clustering.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 17:29:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412088
Vitorino Ramos Dr.
Vitorino Ramos, Fernando Muge
On Image Filtering, Noise and Morphological Size Intensity Diagrams
9 pages, 4 figures, Author at http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_25.html
RecPad 2000 - 11th Portuguese Conf. on Pattern Recognition, in Aurelio C. Campilho and A.M. Mendonca (Eds.), ISBN 972-96883-2-5, pp. 483-491, Porto, Portugal, May 11-12, 2000
null
null
cs.CV cs.AI
null
In the absence of a pure noise-free image it is hard to define what noise is, in any original noisy image, and as a consequence also where it is, and in what amount. In fact, the definition of noise depends largely on our own aim in the whole image analysis process, and (perhaps more important) in our self-perception of noise. For instance, when we perceive noise as disconnected and small it is normal to use MM-ASF filters to treat it. There is two evidences of this. First, in many instances there is no ideal and pure noise-free image to compare our filtering process (nothing but our self-perception of its pure image); second, and related with this first point, MM transformations that we chose are only based on our self - and perhaps - fuzzy notion. The present proposal combines the results of two MM filtering transformations (FT1, FT2) and makes use of some measures and quantitative relations on their Size/Intensity Diagrams to find the most appropriate noise removal process. Results can also be used for finding the most appropriate stop criteria, and the right sequence of MM operators combination on Alternating Sequential Filters (ASF), if these measures are applied, for instance, on a Genetic Algorithm's target function.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 18:58:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Muge", "Fernando", "" ] ]
cs/0412089
Evgeny Yanenko O.
Evgeny Yanenko
Evolving Categories: Consistent Framework for Representation of Data and Algorithms
10 pages, 20 pictures
null
null
null
cs.DS
null
A concept of "evolving categories" is suggested to build a simple, scalable, mathematically consistent framework for representing in uniform way both data and algorithms. A state machine for executing algorithms becomes clear, rich and powerful semantics, based on category theory, and still allows easy implementation. Moreover, it gives an original insight into the nature and semantics of algorithms.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 22:58:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Yanenko", "Evgeny", "" ] ]
cs/0412090
Serban Vlad E.
Serban E. Vlad
Real Time Models of the Asynchronous Circuits: The Delay Theory
82 pages, 30 figures
in New Developments in Computer Science Research, Editor Susan Shannon, Nova Science Publishers, Inc., New York, 2005
null
null
cs.GL
null
The chapter from the book introduces the delay theory, whose purpose is the modeling of the asynchronous circuits from digital electrical engineering with ordinary and differential pseudo-boolean equations.
[ { "version": "v1", "created": "Fri, 17 Dec 2004 23:04:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0412091
Florentin Smarandache
Florentin Smarandache, Jean Dezert
The Combination of Paradoxical, Uncertain, and Imprecise Sources of Information based on DSmT and Neutro-Fuzzy Inference
20 pages
A version of this paper published in Proceedings of 10th International Conference on Fuzzy Theory and Technology (FT&T 2005), Salt Lake City, Utah, USA, July 21-26, 2005.
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems involving artificial reasoning. In this chapter, we present a survey of our recent theory of plausible and paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the literature, developed for dealing with imprecise, uncertain and paradoxical sources of information. We focus our presentation here rather on the foundations of DSmT, and on the two important new rules of combination, than on browsing specific applications of DSmT available in literature. Several simple examples are given throughout the presentation to show the efficiency and the generality of this new approach. The last part of this chapter concerns the presentation of the neutrosophic logic, the neutro-fuzzy inference and its connection with DSmT. Fuzzy logic and neutrosophic logic are useful tools in decision making after fusioning the information using the DSm hybrid rule of combination of masses.
[ { "version": "v1", "created": "Sun, 19 Dec 2004 14:56:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0412092
Alasdair Earl
A. Earl and P. Clark
Mass Storage Management and the Grid
4 pages, 3 figures, Presented at Computing for High Energy and Nuclear Physics 2004 (CHEP '04), Interlaken, Switzerland, September 2004
null
null
null
cs.DC cs.SE
null
The University of Edinburgh has a significant interest in mass storage systems as it is one of the core groups tasked with the roll out of storage software for the UK's particle physics grid, GridPP. We present the results of a development project to provide software interfaces between the SDSC Storage Resource Broker, the EU DataGrid and the Storage Resource Manager. This project was undertaken in association with the eDikt group at the National eScience Centre, the Universities of Bristol and Glasgow, Rutherford Appleton Laboratory and the San Diego Supercomputing Center.
[ { "version": "v1", "created": "Mon, 20 Dec 2004 11:50:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Earl", "A.", "" ], [ "Clark", "P.", "" ] ]
cs/0412093
Alasdair Earl
A. Earl, P. Clark, S. Thorn
ScotGrid: A Prototype Tier 2 Centre
4 pages, 4 diagrams. Presented at Computing for High Energy and Nuclear Physics 2004 (CHEP '04). Interlaken, Switzerland, September 2004
null
null
null
cs.AR cs.DC
null
ScotGrid is a prototype regional computing centre formed as a collaboration between the universities of Durham, Edinburgh and Glasgow as part of the UK's national particle physics grid, GridPP. We outline the resources available at the three core sites and our optimisation efforts for our user communities. We discuss the work which has been conducted in extending the centre to embrace new projects both from particle physics and new user communities and explain our methodology for doing this.
[ { "version": "v1", "created": "Mon, 20 Dec 2004 11:55:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Earl", "A.", "" ], [ "Clark", "P.", "" ], [ "Thorn", "S.", "" ] ]
cs/0412094
Christoph Durr
Philippe Baptiste, Marek Chrobak, Christoph Durr, Francis Sourd
Preemptive Multi-Machine Scheduling of Equal-Length Jobs to Minimize the Average Flow Time
null
null
null
This paper is now part of the report cs.DS/0605078.
cs.DS
null
We study the problem of preemptive scheduling of n equal-length jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. Recently, Brucker and Kravchenko proved that the optimal schedule can be computed in polynomial time by solving a linear program with O(n^3) variables and constraints, followed by some substantial post-processing (where n is the number of jobs.) In this note we describe a simple linear program with only O(mn) variables and constraints. Our linear program produces directly the optimal schedule and does not require any post-processing.
[ { "version": "v1", "created": "Mon, 20 Dec 2004 16:15:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Sourd", "Francis", "" ] ]
cs/0412095
Mirela Damian
Mirela Damian and Joseph O'Rourke
Partitioning Regular Polygons into Circular Pieces II:Nonconvex Partitions
13 pages, 11 figures
null
null
null
cs.CG cs.DM
null
We explore optimal circular nonconvex partitions of regular k-gons. The circularity of a polygon is measured by its aspect ratio: the ratio of the radii of the smallest circumscribing circle to the largest inscribed disk. An optimal circular partition minimizes the maximum ratio over all pieces in the partition. We show that the equilateral triangle has an optimal 4-piece nonconvex partition, the square an optimal 13-piece nonconvex partition, and the pentagon has an optimal nonconvex partition with more than 20 thousand pieces. For hexagons and beyond, we provide a general algorithm that approaches optimality, but does not achieve it.
[ { "version": "v1", "created": "Tue, 21 Dec 2004 05:41:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0412100
Stephan Tobies
Peter H. Deussen and Stephan Tobies
Formal Test Purposes and The Validity of Test Cases
This paper appeared in the proceedings of the 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2002), number 2529 Lecture Notes in Computer Science
null
null
null
cs.DS
null
We give a formalization of the notion of test purpose based on (suitably restricted) Message Sequence Charts. We define the validity of test cases with respect to such a formal test purpose and provide a simple decision procedure for validity.
[ { "version": "v1", "created": "Wed, 22 Dec 2004 08:53:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Deussen", "Peter H.", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0412101
Stephan Tobies
Franz Baader and Stephan Tobies
The Inverse Method Implements the Automata Approach for Modal Satisfiability
A short version of this report has appeared at the First International Joint Conference on Automated Reasoning, IJCAR 2001
null
null
null
cs.LO
null
Tableaux-based decision procedures for satisfiability of modal and description logics behave quite well in practice, but it is sometimes hard to obtain exact worst-case complexity results using these approaches, especially for EXPTIME-complete logics. In contrast, automata-based approaches often yield algorithms for which optimal worst-case complexity can easily be proved. However, the algorithms obtained this way are usually not only worst-case, but also best-case exponential: they first construct an automaton that is always exponential in the size of the input, and then apply the (polynomial) emptiness test to this large automaton. To overcome this problem, one must try to construct the automaton "on-the-fly" while performing the emptiness test. In this paper we will show that Voronkov's inverse method for the modal logic K can be seen as an on-the-fly realization of the emptiness test done by the automata approach for K. The benefits of this result are two-fold. First, it shows that Voronkov's implementation of the inverse method, which behaves quite well in practice, is an optimized on-the-fly implementation of the automata-based satisfiability procedure for K. Second, it can be used to give a simpler proof of the fact that Voronkov's optimizations do not destroy completeness of the procedure. We will also show that the inverse method can easily be extended to handle global axioms, and that the correspondence to the automata approach still holds in this setting. In particular, the inverse method yields an EXPTIME-algorithm for satisfiability in K w.r.t. global axioms.
[ { "version": "v1", "created": "Wed, 22 Dec 2004 14:17:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Baader", "Franz", "" ], [ "Tobies", "Stephan", "" ] ]
cs/0412104
Tomas Klos
Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1) Center for Mathematics and Computer Science (CWI), Amsterdam, The Netherlands, (2) Eindhoven University of Technology, Eindhoven, The Netherlands)
Negotiating over Bundles and Prices Using Aggregate Knowledge
15 pages, 7 eps figures, Springer llncs documentclass. Extended version of the paper published in "E-Commerce and Web Technologies," Kurt Bauknecht, Martin Bichler and Birgit Pr\"{o}ll (eds.). Springer Lecture Notes in Computer Science, Volume 3182, Berlin: Springer, p. 218--227
null
null
SEN-E0405
cs.MA cs.GT
null
Combining two or more items and selling them as one good, a practice called bundling, can be a very effective strategy for reducing the costs of producing, marketing, and selling goods. In this paper, we consider a form of multi-issue negotiation where a shop negotiates both the contents and the price of bundles of goods with his customers. We present some key insights about, as well as a technique for, locating mutually beneficial alternatives to the bundle currently under negotiation. The essence of our approach lies in combining historical sales data, condensed into aggregate knowledge, with current data about the ongoing negotiation process, to exploit these insights. In particular, when negotiating a given bundle of goods with a customer, the shop analyzes the sequence of the customer's offers to determine the progress in the negotiation process. In addition, it uses aggregate knowledge concerning customers' valuations of goods in general. We show how the shop can use these two sources of data to locate promising alternatives to the current bundle. When the current negotiation's progress slows down, the shop may suggest the most promising of those alternatives and, depending on the customer's response, continue negotiating about the alternative bundle, or propose another alternative. Extensive computer simulation experiments show that our approach increases the speed with which deals are reached, as well as the number and quality of the deals reached, as compared to a benchmark. In addition, we show that the performance of our system is robust to a variety of changes in the negotiation strategies employed by the customers.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 11:31:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Somefun", "Koye", "", "1 and 2" ], [ "Klos", "Tomas", "", "1 and 2" ], [ "La Poutré", "Han", "", "1 and 2" ] ]
cs/0412105
Stefania Costantini
Stefania Costantini
On the existence of stable models of non-stratified logic programs
null
null
null
null
cs.AI cs.LO
null
This paper introduces a fundamental result, which is relevant for Answer Set programming, and planning. For the first time since the definition of the stable model semantics, the class of logic programs for which a stable model exists is given a syntactic characterization. This condition may have a practical importance both for defining new algorithms for checking consistency and computing answer sets, and for improving the existing systems. The approach of this paper is to introduce a new canonical form (to which any logic program can be reduced to), to focus the attention on cyclic dependencies. The technical result is then given in terms of programs in canonical form (canonical programs), without loss of generality. The result is based on identifying the cycles contained in the program, showing that stable models of the overall program are composed of stable models of suitable sub-programs, corresponding to the cycles, and on defining the Cycle Graph. Each vertex of this graph corresponds to one cycle, and each edge corresponds to onehandle, which is a literal containing an atom that, occurring in both cycles, actually determines a connection between them. In fact, the truth value of the handle in the cycle where it appears as the head of a rule, influences the truth value of the atoms of the cycle(s) where it occurs in the body. We can therefore introduce the concept of a handle path, connecting different cycles. If for every odd cycle we can find a handle path with certain properties, then the existence of stable model is guaranteed.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 12:02:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Costantini", "Stefania", "" ] ]
cs/0412106
Tomas Klos
Koye Somefun (1), Tomas Klos (1), Han La Poutr\'e (1 and 2) ((1) Center for Mathematics and Computer Science (CWI), Amsterdam, The Netherlands, (2) Eindhoven University of Technology, Eindhoven, The Netherlands)
Online Learning of Aggregate Knowledge about Non-linear Preferences Applied to Negotiating Prices and Bundles
10 pages, 5 eps figures, ACM Proceedings documentclass, Published in "Proc. 6th Int'l Conf. on Electronic Commerce ICEC04, Delft, The Netherlands," M. Janssen, H. Sol, R. Wagenaar (eds.). ACM Press
null
null
SEN-E0415
cs.MA cs.GT cs.LG
null
In this paper, we consider a form of multi-issue negotiation where a shop negotiates both the contents and the price of bundles of goods with his customers. We present some key insights about, as well as a procedure for, locating mutually beneficial alternatives to the bundle currently under negotiation. The essence of our approach lies in combining aggregate (anonymous) knowledge of customer preferences with current data about the ongoing negotiation process. The developed procedure either works with already obtained aggregate knowledge or, in the absence of such knowledge, learns the relevant information online. We conduct computer experiments with simulated customers that have_nonlinear_ preferences. We show how, for various types of customers, with distinct negotiation heuristics, our procedure (with and without the necessary aggregate knowledge) increases the speed with which deals are reached, as well as the number and the Pareto efficiency of the deals reached compared to a benchmark.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 15:21:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Somefun", "Koye", "", "1 and 2" ], [ "Klos", "Tomas", "", "1 and 2" ], [ "La Poutré", "Han", "", "1 and 2" ] ]
cs/0412107
Carlos Cabrillo
L. A. Garcia-Cortes and C. Cabrillo
A Monte Carlo algorithm for efficient large matrix inversion
13 pages, no figure. Title corrected
null
null
null
cs.DS cs.NA hep-lat
null
This paper introduces a new Monte Carlo algorithm to invert large matrices. It is based on simultaneous coupled draws from two random vectors whose covariance is the required inverse. It can be considered a generalization of a previously reported algorithm for hermitian matrices inversion based in only one draw. The use of two draws allows the inversion on non-hermitian matrices. Both the conditions for convergence and the rate of convergence are similar to the Gauss-Seidel algorithm. Results on two examples are presented, a real non-symmetric matrix related to quantitative genetics and a complex non-hermitian matrix relevant for physicists. Compared with other Monte Carlo algorithms it reveals a large reduction of the processing time showing eight times faster processing in the examples studied.
[ { "version": "v1", "created": "Thu, 23 Dec 2004 17:01:14 GMT" }, { "version": "v2", "created": "Mon, 10 Jan 2005 16:41:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Garcia-Cortes", "L. A.", "" ], [ "Cabrillo", "C.", "" ] ]
cs/0412109
Leonid Litinskii
L.B.Litinskii, B.M.Magomedov
Global minimization of a quadratic functional: neural network approach
4 pages, Lecture on 7th International Conference on Pattern Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia
null
null
IONT-04-16
cs.NE cs.DM
null
The problem of finding out the global minimum of a multiextremal functional is discussed. One frequently faces with such a functional in various applications. We propose a procedure, which depends on the dimensionality of the problem polynomially. In our approach we use the eigenvalues and eigenvectors of the connection matrix.
[ { "version": "v1", "created": "Fri, 24 Dec 2004 13:41:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Litinskii", "L. B.", "" ], [ "Magomedov", "B. M.", "" ] ]
cs/0412110
Leonid Litinskii
D.I.Alieva, B.V.Kryzhanovsky, V.M.Kryzhanovsky, A.B.Fonarev
Q-valued neural network as a system of fast identification and pattern recognition
4 pages, Presentation on the 7th International Conference on Pattern Recognition and Image Analysis PRIA-07-2004, St. Petersburg, Russia
null
null
IONT-04-17
cs.NE cs.CV
null
An effective neural network algorithm of the perceptron type is proposed. The algorithm allows us to identify strongly distorted input vector reliably. It is shown that its reliability and processing speed are orders of magnitude higher than that of full connected neural networks. The processing speed of our algorithm exceeds the one of the stack fast-access retrieval algorithm that is modified for working when there are noises in the input channel.
[ { "version": "v1", "created": "Fri, 24 Dec 2004 13:48:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Alieva", "D. I.", "" ], [ "Kryzhanovsky", "B. V.", "" ], [ "Kryzhanovsky", "V. M.", "" ], [ "Fonarev", "A. B.", "" ] ]
cs/0412114
Pierre Andrews
Martin Rajman and Martin Vesely and Pierre Andrews
State of the Art, Evaluation and Recommendations regarding "Document Processing and Visualization Techniques"
54 pages, Report of Working Group 1 for the European Network of Excellence (NoE) in Text Mining and its Applications in Statistics (NEMIS)
null
null
null
cs.CL
null
Several Networks of Excellence have been set up in the framework of the European FP5 research program. Among these Networks of Excellence, the NEMIS project focuses on the field of Text Mining. Within this field, document processing and visualization was identified as one of the key topics and the WG1 working group was created in the NEMIS project, to carry out a detailed survey of techniques associated with the text mining process and to identify the relevant research topics in related research areas. In this document we present the results of this comprehensive survey. The report includes a description of the current state-of-the-art and practice, a roadmap for follow-up research in the identified areas, and recommendations for anticipated technological development in the domain of text mining.
[ { "version": "v1", "created": "Wed, 29 Dec 2004 15:19:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Rajman", "Martin", "" ], [ "Vesely", "Martin", "" ], [ "Andrews", "Pierre", "" ] ]
cs/0412115
Bernadette Charron-Bost
Bernadette Charron-Bost
Reductions in Distributed Computing Part I: Consensus and Atomic Commitment Tasks
27 pages, 3 figures
null
null
null
cs.DC
null
We introduce several notions of reduction in distributed computing, and investigate reduction properties of two fundamental agreement tasks, namely Consensus and Atomic Commitment. We first propose the notion of reduction "a la Karp'', an analog for distributed computing of the classical Karp reduction. We then define a weaker reduction which is the analog of Cook reduction. These two reductions are called K-reduction and C-reduction, respectively. We also introduce the notion of C*-reduction which has no counterpart in classical (namely, non distributed) systems, and which naturally arises when dealing with symmetric tasks. We establish various reducibility and irreducibility theorems with respect to these three reductions. Our main result is an incomparability statement for Consensus and Atomic Commitment tasks: we show that they are incomparable with respect to the C-reduction, except when the resiliency degree is 1, in which case Atomic Commitment is strictly harder than Consensus. A side consequence of these results is that our notion of C-reduction is strictly weaker than the one of K-reduction, even for unsolvable tasks.
[ { "version": "v1", "created": "Wed, 29 Dec 2004 19:50:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Charron-Bost", "Bernadette", "" ] ]
cs/0412116
Bernadette Charron-Bost
Bernadette Charron-Bost
Reductions in Distributed Computing Part II: k-Threshold Agreement Tasks
27 pages, 4 figures
null
null
null
cs.DC
null
We extend the results of Part I by considering a new class of agreement tasks, the so-called k-Threshold Agreement tasks (previously introduced by Charron-Bost and Le Fessant). These tasks naturally interpolate between Atomic Commitment and Consensus. Moreover, they constitute a valuable tool to derive irreducibility results between Consensus tasks only. In particular, they allow us to show that (A) for a fixed set of processes, the higher the resiliency degree is, the harder the Consensus task is, and (B) for a fixed resiliency degree, the smaller the set of processes is, the harder the Consensus task is. The proofs of these results lead us to consider new oracle-based reductions, involving a weaker variant of the C-reduction introduced in Part I. We also discuss the relationship between our results and previous ones relating f-resiliency and wait-freedom.
[ { "version": "v1", "created": "Wed, 29 Dec 2004 20:51:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Charron-Bost", "Bernadette", "" ] ]
cs/0412117
Pierre Andrews
Pierre Andrews and Martin Rajman
Thematic Annotation: extracting concepts out of documents
Technical report EPFL/LIA. 81 pages, 16 figures
null
null
IC/2004/68
cs.CL
null
Contrarily to standard approaches to topic annotation, the technique used in this work does not centrally rely on some sort of -- possibly statistical -- keyword extraction. In fact, the proposed annotation algorithm uses a large scale semantic database -- the EDR Electronic Dictionary -- that provides a concept hierarchy based on hyponym and hypernym relations. This concept hierarchy is used to generate a synthetic representation of the document by aggregating the words present in topically homogeneous document segments into a set of concepts best preserving the document's content. This new extraction technique uses an unexplored approach to topic selection. Instead of using semantic similarity measures based on a semantic resource, the later is processed to extract the part of the conceptual hierarchy relevant to the document content. Then this conceptual hierarchy is searched to extract the most relevant set of concepts to represent the topics discussed in the document. Notice that this algorithm is able to extract generic concepts that are not directly present in the document.
[ { "version": "v1", "created": "Thu, 30 Dec 2004 02:01:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Andrews", "Pierre", "" ], [ "Rajman", "Martin", "" ] ]
cs/0412119
Shmuel Varner
Shmuel Vagner
CDTP Chain Distributed Transfer Protocol
PDF. 47 pages
null
null
1937340
cs.NI cs.AR
null
The rapid growth of the internet in general and of bandwidth capacity at internet clients in particular poses increasing computation and bandwidth demands on internet servers. Internet access technologies like ADSL [DSL], Cable Modem and Wireless modem allow internet clients to access the internet with orders of magnitude more bandwidth than using traditional modems. We present CDTP a distributed transfer protocol that allows clients to cooperate and therefore remove the strain from the internet server thus achieving much better performance than traditional transfer protocols (e.g. FTP [FTP]). The CDTP server and client tools are presented also as well as results of experiments. Finally a bandwidth measurement technique is presented. CDTP tools use this technique to differentiate between slow and fast clients.
[ { "version": "v1", "created": "Thu, 30 Dec 2004 19:43:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vagner", "Shmuel", "" ] ]
cs/0412120
Gianluca Argentini
Gianluca Argentini
An estimate of accuracy for interpolant numerical solutions of a PDE problem
13 pages, 1 figure
APPLIED AND INDUSTRIAL MATHEMATICS IN ITALY, Series on Advances in Mathematics for Applied Sciences - Vol. 69, World Scientific Company, 2005, 56 - 64.
null
null
cs.NA math-ph math.MP
null
In this paper we present an estimate of accuracy for a piecewise polynomial approximation of a classical numerical solution to a non linear differential problem. We suppose the numerical solution U is computed using a grid with a small linear step and interval time Tu, while the polynomial approximation V is an interpolation of the values of a numerical solution on a less fine grid and interval time Tv << Tu. The estimate shows that the interpolant solution V can be, under suitable hypotheses, a good approximation and in general its computational cost is much lower of the cost of the fine numerical solution. We present two possible applications to linear case and periodic case.
[ { "version": "v1", "created": "Fri, 31 Dec 2004 18:16:00 GMT" }, { "version": "v2", "created": "Sun, 2 Jan 2005 23:23:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0412121
Michael Treaster
Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik
A Distributed Economics-based Infrastructure for Utility Computing
8 pages, 1 figure
null
null
null
cs.DC
null
Existing attempts at utility computing revolve around two approaches. The first consists of proprietary solutions involving renting time on dedicated utility computing machines. The second requires the use of heavy, monolithic applications that are difficult to deploy, maintain, and use. We propose a distributed, community-oriented approach to utility computing. Our approach provides an infrastructure built on Web Services in which modular components are combined to create a seemingly simple, yet powerful system. The community-oriented nature generates an economic environment which results in fair transactions between consumers and providers of computing cycles while simultaneously encouraging improvements in the infrastructure of the computational grid itself.
[ { "version": "v1", "created": "Fri, 31 Dec 2004 19:16:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Treaster", "Michael", "" ], [ "Kiyanclar", "Nadir", "" ], [ "Koenig", "Gregory A.", "" ], [ "Yurcik", "William", "" ] ]
cs/0501001
Michael Treaster
Michael Treaster
A Survey of Distributed Intrusion Detection Approaches
null
null
null
null
cs.CR
null
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggregated from distributed sources. The distributed nature of the data sources allows patterns in the data to be seen that might not be detectable if each of the sources were examined individually. This paper describes the various approaches that have been developed to share and analyze data in such systems, and discusses some issues that must be addressed before fully decentralized distributed intrusion detection systems can be made viable.
[ { "version": "v1", "created": "Sat, 1 Jan 2005 03:14:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Treaster", "Michael", "" ] ]
cs/0501002
Michael Treaster
Michael Treaster
A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel Systems
11 pages
null
null
null
cs.DC
null
Supercomputing systems today often come in the form of large numbers of commodity systems linked together into a computing cluster. These systems, like any distributed system, can have large numbers of independent hardware components cooperating or collaborating on a computation. Unfortunately, any of this vast number of components can fail at any time, resulting in potentially erroneous output. In order to improve the robustness of supercomputing applications in the presence of failures, many techniques have been developed to provide resilience to these kinds of system faults. This survey provides an overview of these various fault-tolerance techniques.
[ { "version": "v1", "created": "Sat, 1 Jan 2005 03:32:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Treaster", "Michael", "" ] ]
cs/0501003
Pavel Burovsky
P.A. Burovsky
Implementation of Motzkin-Burger algorithm in Maple
9 pages, 4 additional text files
null
null
null
cs.CG cs.CC cs.SC
null
Subject of this paper is an implementation of a well-known Motzkin-Burger algorithm, which solves the problem of finding the full set of solutions of a system of linear homogeneous inequalities. There exist a number of implementations of this algorithm, but there was no one in Maple, to the best of the author's knowledge.
[ { "version": "v1", "created": "Sat, 1 Jan 2005 04:55:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Burovsky", "P. A.", "" ] ]
cs/0501006
A. Prasad Sistla
A. Prasad Sistla
Formal Languages and Algorithms for Similarity based Retrieval from Sequence Databases
null
null
null
null
cs.LO cs.DB
null
The paper considers various formalisms based on Automata, Temporal Logic and Regular Expressions for specifying queries over sequences. Unlike traditional binary semantics, the paper presents a similarity based semantics for thse formalisms. More specifically, a distance measure in the range [0,1] is associated with a sequence, query pair denoting how closely the sequence satisfies the query. These measures are defined using a spectrum of normed vector distance measures. Various distance measures based on the syntax and the traditional semantics of the query are presented. Efficient algorithms for computing these distance measure are presented. These algorithms can be employed for retrieval of sequence from a database that closely satisfy a given.
[ { "version": "v1", "created": "Tue, 4 Jan 2005 01:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Sistla", "A. Prasad", "" ] ]
cs/0501007
Sariel Har-Peled
Sariel Har-Peled and Alper Ungor
A Time-Optimal Delaunay Refinement Algorithm in Two Dimensions
null
null
null
null
cs.CG
null
We propose a new refinement algorithm to generate size-optimal quality-guaranteed Delaunay triangulations in the plane. The algorithm takes $O(n \log n + m)$ time, where $n$ is the input size and $m$ is the output size. This is the first time-optimal Delaunay refinement algorithm.
[ { "version": "v1", "created": "Tue, 4 Jan 2005 22:30:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Har-Peled", "Sariel", "" ], [ "Ungor", "Alper", "" ] ]
cs/0501009
Mircea Alexandru Popescu Moscu
Mircea Alexandru Popescu Moscu
On The Liniar Time Complexity of Finite Languages
null
null
null
null
cs.CC
null
The present paper presents and proves a proposition concerning the time complexity of finite languages. It is shown herein, that for any finite language (a language for which the set of words composing it is finite) there is a Turing machine that computes the language in such a way that for any input of length k the machine stops in, at most, k + 1 steps.
[ { "version": "v1", "created": "Wed, 5 Jan 2005 19:13:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Moscu", "Mircea Alexandru Popescu", "" ] ]
cs/0501010
Manoj Kumar
Manoj Kumar
A Cryptographic Study of Some Digital Signature Schemes
This is a Ph.D. thesis,under the supervision of Prof Sunder Lal, Dr. B.R. Ambedkar University, I.B.S. Khandri,AGRA- INDIA
null
null
null
cs.CR
null
In this thesis, we propose some directed signature schemes. In addition, we have discussed their applications in different situations. In this thesis, we would like to discuss the security aspects during the design process of the proposed directed digital signature schemes. The security of the most digital signature schemes widely use in practice is based on the two difficult problems, viz; the problem of factoring integers (The RSA scheme) and the problem of finding discrete logarithms over finite fields (The ElGamal scheme). The proposed works in this thesis is divided into seven chapters.
[ { "version": "v1", "created": "Thu, 6 Jan 2005 10:21:20 GMT" }, { "version": "v2", "created": "Fri, 7 Jan 2005 05:33:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0501012
Carl Lagoze
Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper
Fedora: An Architecture for Complex Objects and their Relationships
25 pages, 8 figures Draft of submission to Journal of Digital Libraries Special Issue on Complex Objects
null
null
null
cs.DL cs.MM
null
The Fedora architecture is an extensible framework for the storage, management, and dissemination of complex objects and the relationships among them. Fedora accommodates the aggregation of local and distributed content into digital objects and the association of services with objects. This al-lows an object to have several accessible representations, some of them dy-namically produced. The architecture includes a generic RDF-based relation-ship model that represents relationships among objects and their components. Queries against these relationships are supported by an RDF triple store. The architecture is implemented as a web service, with all aspects of the complex object architecture and related management functions exposed through REST and SOAP interfaces. The implementation is available as open-source soft-ware, providing the foundation for a variety of end-user applications for digital libraries, archives, institutional repositories, and learning object systems.
[ { "version": "v1", "created": "Fri, 7 Jan 2005 17:57:05 GMT" }, { "version": "v2", "created": "Wed, 12 Jan 2005 13:16:45 GMT" }, { "version": "v3", "created": "Fri, 25 Feb 2005 20:13:37 GMT" }, { "version": "v4", "created": "Mon, 7 Mar 2005 15:14:47 GMT" }, { "version": "v5", "created": "Fri, 29 Jul 2005 13:04:31 GMT" }, { "version": "v6", "created": "Tue, 23 Aug 2005 13:26:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Payette", "Sandy", "" ], [ "Shin", "Edwin", "" ], [ "Wilper", "Chris", "" ] ]
cs/0501013
Shujun Li Dr.
Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
11 pages, 5 figures
Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, 2006
10.1016/j.jss.2005.04.021
null
cs.CR cs.MM nlin.CD
null
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security of DSEA, and points out the following weaknesses: 1) its security against the brute-force attack was overestimated; 2) it is not sufficiently secure against ciphertext-only attacks, and only one ciphertext is enough to get some information about the plaintext and to break the value of a sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense that the secret key can be recovered from a number of continuous bytes of only one known/chosen plaintext and the corresponding ciphertext. Experimental results are given to show the performance of the proposed attacks, and some countermeasures are discussed to improve DSEA.
[ { "version": "v1", "created": "Sat, 8 Jan 2005 15:35:13 GMT" }, { "version": "v2", "created": "Sun, 27 Aug 2006 17:27:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Lou", "Der-Chyuan", "" ], [ "Zhang", "Dan", "" ] ]
cs/0501014
Shujun Li Dr.
Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo
On the Design of Perceptual MPEG-Video Encryption Algorithms
10 pages, 5 figures, IEEEtran.cls
IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, 2007
10.1109/TCSVT.2006.888840
null
cs.MM cs.CR
null
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a simpler and more effective design is suggested, which selectively encrypts fixed-length codewords (FLC) in MPEG-video bitstreams under the control of three perceptibility factors. The proposed design is actually an encryption configuration that can work with any stream cipher or block cipher. Compared with the previously-proposed schemes, the new design provides more useful features, such as strict size-preservation, on-the-fly encryption and multiple perceptibility, which make it possible to support more applications with different requirements. In addition, four different measures are suggested to provide better security against known/chosen-plaintext attacks.
[ { "version": "v1", "created": "Sat, 8 Jan 2005 15:55:30 GMT" }, { "version": "v2", "created": "Thu, 31 Aug 2006 11:30:21 GMT" }, { "version": "v3", "created": "Tue, 27 Mar 2007 17:12:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Chen", "Guanrong", "" ], [ "Cheung", "Albert", "" ], [ "Bhargava", "Bharat", "" ], [ "Lo", "Kwok-Tung", "" ] ]
cs/0501018
Peter Turney
Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder
Combining Independent Modules in Lexical Multiple-Choice Problems
10 pages, related work available at http://www.cs.rutgers.edu/~mlittman/ and http://purl.org/peter.turney/
Recent Advances in Natural Language Processing III: Selected Papers from RANLP 2003, Eds: N. Nicolov, K. Botcheva, G. Angelova, and R. Mitkov, (2004), Current Issues in Linguistic Theory (CILT), 260, John Benjamins, 101-110
null
NRC-47434
cs.LG cs.CL cs.IR
null
Existing statistical approaches to natural language problems are very coarse approximations to the true complexity of language processing. As such, no single technique will be best for all problem instances. Many researchers are examining ensemble methods that combine the output of multiple modules to create more accurate solutions. This paper examines three merging rules for combining probability distributions: the familiar mixture rule, the logarithmic rule, and a novel product rule. These rules were applied with state-of-the-art results to two problems used to assess human mastery of lexical semantics -- synonym questions and analogy questions. All three merging rules result in ensembles that are more accurate than any of their component modules. The differences among the three rules are not statistically significant, but it is suggestive that the popular mixture rule is not the best rule for either of the two problems.
[ { "version": "v1", "created": "Mon, 10 Jan 2005 21:03:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "" ], [ "Littman", "Michael L.", "" ], [ "Bigham", "Jeffrey", "" ], [ "Shnayder", "Victor", "" ] ]
cs/0501019
Grigorii Pivovarov
G. B. Pivovarov and S. E. Trunov
Clustering SPIRES with EqRank
3 pp
null
null
null
cs.DL cs.IR
null
SPIRES is the largest database of scientific papers in the subject field of high energy and nuclear physics. It contains information on the citation graph of more than half a million of papers (vertexes of the citation graph). We outline the EqRank algorithm designed to cluster vertexes of directed graphs, and present the results of EqRank application to the SPIRES citation graph. The hierarchical clustering of SPIRES yielded by EqRank is used to set up a web service, which is also outlined.
[ { "version": "v1", "created": "Tue, 11 Jan 2005 05:00:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "G. B.", "" ], [ "Trunov", "S. E.", "" ] ]
cs/0501020
Gianluca Lax
Francesco Buccafurri, Gianluca Lax, Domenico Sacca', Luigi Pontieri and Domenico Rosaci
Enhancing Histograms by Tree-Like Bucket Indices
26 pages, 9 figures
null
null
null
cs.DS
null
Histograms are used to summarize the contents of relations into a number of buckets for the estimation of query result sizes. Several techniques (e.g., MaxDiff and V-Optimal) have been proposed in the past for determining bucket boundaries which provide accurate estimations. However, while search strategies for optimal bucket boundaries are rather sophisticated, no much attention has been paid for estimating queries inside buckets and all of the above techniques adopt naive methods for such an estimation. This paper focuses on the problem of improving the estimation inside a bucket once its boundaries have been fixed. The proposed technique is based on the addition, to each bucket, of 32-bit additional information (organized into a 4-level tree index), storing approximate cumulative frequencies at 7 internal intervals of the bucket. Both theoretical analysis and experimental results show that, among a number of alternative ways to organize the additional information, the 4-level tree index provides the best frequency estimation inside a bucket. The index is later added to two well-known histograms, MaxDiff and V-Optimal, obtaining the non-obvious result that despite the spatial cost of 4LT which reduces the number of allowed buckets once the storage space has been fixed, the original methods are strongly improved in terms of accuracy.
[ { "version": "v1", "created": "Tue, 11 Jan 2005 10:15:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Buccafurri", "Francesco", "" ], [ "Lax", "Gianluca", "" ], [ "Sacca'", "Domenico", "" ], [ "Pontieri", "Luigi", "" ], [ "Rosaci", "Domenico", "" ] ]
cs/0501022
Lane A. Hemaspaandra
Lane A. Hemaspaandra, Harald Hempel, and Arfst Nickelsen
Algebraic Properties for Selector Functions
More recent version of most of this report appears in SICOMP, but the appendix here is not included there
SICOMP, V. 33, Number 6, pp. 1309--1337, 2004
null
URCS-TR-778 (January 7, 2004 revision)
cs.CC
null
The nondeterministic advice complexity of the P-selective sets is known to be exactly linear. Regarding the deterministic advice complexity of the P-selective sets--i.e., the amount of Karp--Lipton advice needed for polynomial-time machines to recognize them in general--the best current upper bound is quadratic [Ko, 1983] and the best current lower bound is linear [Hemaspaandra and Torenvliet, 1996]. We prove that every associatively P-selective set is commutatively, associatively P-selective. Using this, we establish an algebraic sufficient condition for the P-selective sets to have a linear upper bound (which thus would match the existing lower bound) on their deterministic advice complexity: If all P-selective sets are associatively P-selective then the deterministic advice complexity of the P-selective sets is linear. The weakest previously known sufficient condition was P=NP. We also establish related results for algebraic properties of, and advice complexity of, the nondeterministically selective sets.
[ { "version": "v1", "created": "Tue, 11 Jan 2005 23:55:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ], [ "Nickelsen", "Arfst", "" ] ]
cs/0501025
Eugenia Ternovska
Marc Denecker and Eugenia Ternovska
A Logic for Non-Monotone Inductive Definitions
50 pages, TOCL submission
null
null
null
cs.AI cs.LO
null
Well-known principles of induction include monotone induction and different sorts of non-monotone induction such as inflationary induction, induction over well-founded sets and iterated induction. In this work, we define a logic formalizing induction over well-founded sets and monotone and iterated induction. Just as the principle of positive induction has been formalized in FO(LFP), and the principle of inflationary induction has been formalized in FO(IFP), this paper formalizes the principle of iterated induction in a new logic for Non-Monotone Inductive Definitions (ID-logic). The semantics of the logic is strongly influenced by the well-founded semantics of logic programming. Our main result concerns the modularity properties of inductive definitions in ID-logic. Specifically, we formulate conditions under which a simultaneous definition $\D$ of several relations is logically equivalent to a conjunction of smaller definitions $\D_1 \land ... \land \D_n$ with disjoint sets of defined predicates. The difficulty of the result comes from the fact that predicates $P_i$ and $P_j$ defined in $\D_i$ and $\D_j$, respectively, may be mutually connected by simultaneous induction. Since logic programming and abductive logic programming under well-founded semantics are proper fragments of our logic, our modularity results are applicable there as well.
[ { "version": "v1", "created": "Thu, 13 Jan 2005 02:53:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Denecker", "Marc", "" ], [ "Ternovska", "Eugenia", "" ] ]
cs/0501026
Sourav Chakraborty
Sourav Chakraborty
On the Sensitivity of Cyclically-Invariant Boolean Functions
null
null
null
null
cs.CC
null
In this paper we construct a cyclically invariant Boolean function whose sensitivity is $\Theta(n^{1/3})$. This result answers two previously published questions. Tur\'an (1984) asked if any Boolean function, invariant under some transitive group of permutations, has sensitivity $\Omega(\sqrt{n})$. Kenyon and Kutin (2004) asked whether for a ``nice'' function the product of 0-sensitivity and 1-sensitivity is $\Omega(n)$. Our function answers both questions in the negative. We also prove that for minterm-transitive functions (a natural class of Boolean functions including our example) the sensitivity is $\Omega(n^{1/3})$. Hence for this class of functions sensitivity and block sensitivity are polynomially related.
[ { "version": "v1", "created": "Thu, 13 Jan 2005 22:06:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Chakraborty", "Sourav", "" ] ]
cs/0501027
Evan Greenberg
Evan P. Greenberg, David R. Cheriton
Enforcing Bulk Mail Classification
6 pages, changed spin on paper, added new idea (explicit tagging as a feature)
null
null
null
cs.NI
null
Spam costs US corporations upwards of $8.9 billion a year, and comprises as much as 40% of all email received. Solutions exist to reduce the amount of spam seen by end users, but cannot withstand sophisticated attacks. Worse yet, many will occasionally misclassify and silently drop legitimate email. Spammers take advantage of the near-zero cost of sending email to flood the network, knowing that success even a tiny fraction of the time means a profit. End users, however, have proven unwilling to pay money to send email to friends and family. We show that it is feasible to extend the existing mail system to reduce the amount of unwanted email, without misclassifying email, and without charging well-behaved users. We require that bulk email senders accurately classify each email message they send as an advertisement with an area of interest or else be charged a small negative incentive per message delivered. Recipients are able to filter out email outside their scope of interest, while senders are able to focus their sendings to the appropriate audience.
[ { "version": "v1", "created": "Thu, 13 Jan 2005 23:37:10 GMT" }, { "version": "v2", "created": "Thu, 19 May 2005 21:22:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenberg", "Evan P.", "" ], [ "Cheriton", "David R.", "" ] ]
cs/0501029
Filippo Furfaro
Francesco Buccafurri, Filippo Furfaro, Domenico Sacca'
Estimating Range Queries using Aggregate Data with Integrity Constraints: a Probabilistic Approach
46 pages, 6 figures
null
null
null
cs.DB
null
The problem of recovering (count and sum) range queries over multidimensional data only on the basis of aggregate information on such data is addressed. This problem can be formalized as follows. Suppose that a transformation T producing a summary from a multidimensional data set is used. Now, given a data set D, a summary S=T(D) and a range query r on D, the problem consists of studying r by modelling it as a random variable defined over the sample space of all the data sets D' such that T(D) = S. The study of such a random variable, done by the definition of its probability distribution and the computation of its mean value and variance, represents a well-founded, theoretical probabilistic approach for estimating the query only on the basis of the available information (that is the summary S) without assumptions on original data.
[ { "version": "v1", "created": "Fri, 14 Jan 2005 19:45:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Buccafurri", "Francesco", "" ], [ "Furfaro", "Filippo", "" ], [ "Sacca'", "Domenico", "" ] ]
cs/0501030
Sergey Tsarev P.
Sergey P. Tsarev
Generalized Laplace transformations and integration of hyperbolic systems of linear partial differential equations
LaTeX, 17 pages, Submitted to ISSAC 2005, Beijing, China, July 24--27 2005
null
null
null
cs.SC math.AP nlin.SI
null
We give a new procedure for generalized factorization and construction of the complete solution of strictly hyperbolic linear partial differential equations or strictly hyperbolic systems of such equations in the plane. This procedure generalizes the classical theory of Laplace transformations of second-order equations in the plane.
[ { "version": "v1", "created": "Sat, 15 Jan 2005 15:57:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsarev", "Sergey P.", "" ] ]
cs/0501032
Riccardo Pucella
Riccardo Pucella
On Partially Additive Kleene Algebras
23 pages; to be presented at the 8th International Conference on Relational Methods in Computer Science (RelMiCS 8)
null
null
null
cs.LO
null
We define the notion of a partially additive Kleene algebra, which is a Kleene algebra where the + operation need only be partially defined. These structures formalize a number of examples that cannot be handled directly by Kleene algebras. We relate partially additive Kleene algebras to existing algebraic structures, by exhibiting categorical connections with Kleene algebras, partially additive categories, and closed semirings.
[ { "version": "v1", "created": "Sun, 16 Jan 2005 20:39:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0501036
Jos\'e Ghislain Quenum
Jose Ghislain Quenum Samir Aknine
Enabling Agents to Dynamically Select Protocols for Interactions
null
null
null
null
cs.MA cs.SE
null
in this paper we describe a method which allows agents to dynamically select protocols and roles when they need to execute collaborative tasks
[ { "version": "v1", "created": "Tue, 18 Jan 2005 17:08:05 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2005 18:31:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Aknine", "Jose Ghislain Quenum Samir", "" ] ]
cs/0501037
Michele Tucci
Michele Tucci
Oligopolistic Competition in an Evolutionary Environment: a Computer Simulation
PDF, 20 pages, 4 graphs and a post-scriptum
null
null
null
cs.CY
null
The following notes contain a computer simulation concerning effective competition in an evolutionary environment. The scope is to underline the existence of a side effect pertaining to the competitive processes: the tendency toward an excess of supply by producers which operate in a strongly competitive situation. A set of four oligopolistic firms will be employed in the formal reconstruction. The simulation will operate following the Edmond Malinvaud "short side" approach, as far as the price adjustment is concerned, and the sequential Hicksian "weeks" structure with regard of the temporal characterization. The content of the present paper ought to be considered as a development of the writing: Michele Tucci, Evolution and Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model, published with the E-print Archives at arXiv.com (section: Computer Science, registration number: cs.CY/0209017). In such a paper there can be found some preliminary considerations regarding the comparison between the evolutionary and the gravitational paradigms and the evaluation of approaches belonging to rival schools of economic thought.
[ { "version": "v1", "created": "Tue, 18 Jan 2005 18:52:49 GMT" }, { "version": "v2", "created": "Tue, 18 Jan 2005 21:59:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "" ] ]
cs/0501038
D. J. Capelis
D.J. Capelis
Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms
5 pages
null
null
null
cs.CR
null
Over the recent months it has become clear that the current generation of cryptographic hashing algorithms are insufficient to meet future needs. The ASH family of algorithms provides modifications to the existing SHA-2 family. These modifications are designed with two main goals: 1) Providing increased collision resistance. 2) Increasing mitigation of security risks post-collision. The unique public/private sections and salt/pepper design elements provide increased flexibility for a broad range of applications. The ASH family is a new generation of cryptographic hashing algorithms.
[ { "version": "v1", "created": "Wed, 19 Jan 2005 10:28:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Capelis", "D. J.", "" ] ]
cs/0501041
Alexander Kondratiev
A. S. Kondratiev (1 and 2) and N. P. Polishchuk (2) ((1) Moscow Power Engineering Institute, (2) Altair Naval Research Institute of Radio Electronics)
Two Iterative Algorithms for Solving Systems of Simultaneous Linear Algebraic Equations with Real Matrices of Coefficients
5 pages; 0 figures; 4 references
null
null
null
cs.NA
null
The paper describes two iterative algorithms for solving general systems of M simultaneous linear algebraic equations (SLAE) with real matrices of coefficients. The system can be determined, underdetermined, and overdetermined. Linearly dependent equations are also allowed. Both algorithms use the method of Lagrange multipliers to transform the original SLAE into a positively determined function F of real original variables X(i) (i=1,...,N) and Lagrange multipliers Lambda(i) (i=1,...,M). Function F is differentiated with respect to variables X(i) and the obtained relationships are used to express F in terms of Lagrange multipliers Lambda(i). The obtained function is minimized with respect to variables Lambda(i) with the help of one of two the following minimization techniques: (1) relaxation method or (2) method of conjugate gradients by Fletcher and Reeves. Numerical examples are given.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 13:20:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Kondratiev", "A. S.", "", "1 and 2" ], [ "Polishchuk", "N. P.", "" ] ]
cs/0501042
Martin Bernauer
Martin Bernauer
Maintaining Consistency of Data on the Web
null
null
null
null
cs.DB cs.DS
null
Increasingly more data is becoming available on the Web, estimates speaking of 1 billion documents in 2002. Most of the documents are Web pages whose data is considered to be in XML format, expecting it to eventually replace HTML. A common problem in designing and maintaining a Web site is that data on a Web page often replicates or derives from other data, the so-called base data, that is usually not contained in the deriving or replicating page. Consequently, replicas and derivations become inconsistent upon modifying base data in a Web page or a relational database. For example, after assigning a thesis to a student and modifying the Web page that describes it in detail, the thesis is still incorrectly contained in the list of offered thesis, missing in the list of ongoing thesis, and missing in the advisor's teaching record. The thesis presents a solution by proposing a combined approach that provides for maintaining consistency of data in Web pages that (i) replicate data in relational databases, or (ii) replicate or derive from data in Web pages. Upon modifying base data, the modification is immediately pushed to affected Web pages. There, maintenance is performed incrementally by only modifying the affected part of the page instead of re-generating the whole page from scratch.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 14:11:03 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2005 16:00:49 GMT" }, { "version": "v3", "created": "Wed, 9 Feb 2005 19:59:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bernauer", "Martin", "" ] ]