id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0501044 | Alexander Haubold | Alexander Haubold, John R. Kender | Augmented Segmentation and Visualization for Presentation Videos | null | null | null | null | cs.MM cs.IR | null | We investigate methods of segmenting, visualizing, and indexing presentation
videos by separately considering audio and visual data. The audio track is
segmented by speaker, and augmented with key phrases which are extracted using
an Automatic Speech Recognizer (ASR). The video track is segmented by visual
dissimilarities and augmented by representative key frames. An interactive user
interface combines a visual representation of audio, video, text, and key
frames, and allows the user to navigate a presentation video. We also explore
clustering and labeling of speaker data and present preliminary results.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 17:12:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
]
|
cs/0501045 | Kenneth Clarkson | Kenneth L. Clarkson and Kasturi Varadarajan | Improved Approximation Algorithms for Geometric Set Cover | null | null | null | null | cs.CG cs.DS | null | Given a collection S of subsets of some set U, and M a subset of U, the set
cover problem is to find the smallest subcollection C of S such that M is a
subset of the union of the sets in C. While the general problem is NP-hard to
solve, even approximately, here we consider some geometric special cases, where
usually U = R^d. Extending prior results, we show that approximation algorithms
with provable performance exist, under a certain general condition: that for a
random subset R of S and function f(), there is a decomposition of the portion
of U not covered by R into an expected f(|R|) regions, each region of a
particular simple form. We show that under this condition, a cover of size
O(f(|C|)) can be found. Our proof involves the generalization of shallow
cuttings to more general geometric situations. We obtain constant-factor
approximation algorithms for covering by unit cubes in R^3, for guarding a
one-dimensional terrain, and for covering by similar-sized fat triangles in
R^2. We also obtain improved approximation guarantees for fat triangles, of
arbitrary size, and for a class of fat objects.
| [
{
"version": "v1",
"created": "Thu, 20 Jan 2005 21:31:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Clarkson",
"Kenneth L.",
""
],
[
"Varadarajan",
"Kasturi",
""
]
]
|
cs/0501053 | Vadim Tropashko | Vadim Tropashko | Relational Algebra as non-Distributive Lattice | 9 pages | null | null | null | cs.DB | null | We reduce the set of classic relational algebra operators to two binary
operations: natural join and generalized union. We further demonstrate that
this set of operators is relationally complete and honors lattice axioms.
| [
{
"version": "v1",
"created": "Fri, 21 Jan 2005 20:07:32 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Feb 2005 03:45:10 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Feb 2005 01:12:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tropashko",
"Vadim",
""
]
]
|
cs/0501059 | Farn Wang | Farn Wang | Under-approximation of the Greatest Fixpoint in Real-Time System
Verification | null | null | null | null | cs.SE cs.LO | null | Techniques for the efficient successive under-approximation of the greatest
fixpoint in TCTL formulas can be useful in fast refutation of inevitability
properties and vacuity checking. We first give an integrated algorithmic
framework for both under and over-approximate model-checking. We design the
{\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation,
as a unified framework for the evaluation of formulas like
$\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$.
We then prove the correctness of a new formulation for the characterization of
the NZF predicate based on zone search and the least fixpoint evaluation. The
new formulation then leads to the design of an evaluation algorithm, with the
capability of successive under-approximation, for $\exists\pfrr\eta_1$,
$\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present
techniques to efficiently search for the zones and to speed up the
under-approximate evaluation of those three formulas. Our experiments show that
the techniques have significantly enhanced the verification performance against
several benchmarks over exact model-checking.
| [
{
"version": "v1",
"created": "Sat, 22 Jan 2005 11:02:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
]
|
cs/0501060 | Farn Wang | Farn Wang | Under-approximation of the Greatest Fixpoints in Real-Time System
Verification | null | null | null | null | cs.SE cs.LO | null | Techniques for the efficient successive under-approximation of the greatest
fixpoint in TCTL formulas can be useful in fast refutation of inevitability
properties and vacuity checking. We first give an integrated algorithmic
framework for both under and over-approximate model-checking. We design the
{\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation,
as a unified framework for the evaluation of formulas like
$\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$.
We then prove the correctness of a new formulation for the characterization of
the NZF predicate based on zone search and the least fixpoint evaluation. The
new formulation then leads to the design of an evaluation algorithm, with the
capability of successive under-approximation, for $\exists\pfrr\eta_1$,
$\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present
techniques to efficiently search for the zones and to speed up the
under-approximate evaluation of those three formulas. Our experiments show that
the techniques have significantly enhanced the verification performance against
several benchmarks over exact model-checking.
| [
{
"version": "v1",
"created": "Sat, 22 Jan 2005 11:03:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
]
|
cs/0501065 | Vladimir Clue Mr | Vladimir I Clue | Harmonic Analysis | This new twist in harmonic analysis was primary introduced in
Milwaukee's conference http://www.eit-conference.info/papers.asp | null | null | null | cs.NA cs.DM | null | This paper describes a method of calculating the transforms, currently
obtained via Fourier and reverse Fourier transforms. The method allows
calculating efficiently the transforms of a signal having an arbitrary
dimension of the digital representation by reducing the transform to a
vector-to-circulant matrix multiplying. There is a connection between harmonic
equations in rectangular and polar coordinate systems. The connection
established here and used to create a very robust iterative algorithm for a
conformal mapping calculation. There is also suggested a new ratio (and an
efficient way of computing it) of two oscillative signals.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 00:01:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Clue",
"Vladimir I",
""
]
]
|
cs/0501068 | Jean-Francois Mari | Olivier Aycard (GRAVIR - Imag, Orpailleur Loria), Jean-Francois Mari
(ORPAILLEUR Loria), Richard Washington | Learning to automatically detect features for mobile robots using
second-order Hidden Markov Models | 2004 | null | null | null | cs.AI | null | In this paper, we propose a new method based on Hidden Markov Models to
interpret temporal sequences of sensor data from mobile robots to automatically
detect features. Hidden Markov Models have been used for a long time in pattern
recognition, especially in speech recognition. Their main advantages over other
methods (such as neural networks) are their ability to model noisy temporal
signals of variable length. We show in this paper that this approach is well
suited for interpretation of temporal sequences of mobile-robot sensor data. We
present two distinct experiments and results: the first one in an indoor
environment where a mobile robot learns to detect features like open doors or
T-intersections, the second one in an outdoor environment where a different
mobile robot has to identify situations like climbing a hill or crossing a
rock.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 11:05:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aycard",
"Olivier",
"",
"GRAVIR - Imag, Orpailleur Loria"
],
[
"Mari",
"Jean-Francois",
"",
"ORPAILLEUR Loria"
],
[
"Washington",
"Richard",
""
]
]
|
cs/0501069 | Supriya Krishnamurthy | Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi | A Statistical Theory of Chord under Churn | 6 pages, In the 4th International Workshop on Peer-to- Peer Systems
(IPTPS'05), Ithaca, New York, USA, 2005 | null | null | null | cs.NI cond-mat.stat-mech cs.DC | null | Most earlier studies of Distributed Hash Tables (DHTs) under churn have
either depended on simulations as the primary investigation tool, or on
establishing bounds for DHTs to function. In this paper, we present a complete
analytical study of churn using a master-equation-based approach, used
traditionally in non-equilibrium statistical mechanics to describe steady-state
or transient phenomena. Simulations are used to verify all theoretical
predictions. We demonstrate the application of our methodology to the Chord
system. For any rate of churn and stabilization rates, and any system size, we
accurately predict the fraction of failed or incorrect successor and finger
pointers and show how we can use these quantities to predict the performance
and consistency of lookups under churn. We also discuss briefly how churn may
actually be of different 'types' and the implications this will have for the
functioning of DHTs in general.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 16:22:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Krishnamurthy",
"Supriya",
""
],
[
"El-Ansary",
"Sameh",
""
],
[
"Aurell",
"Erik",
""
],
[
"Haridi",
"Seif",
""
]
]
|
cs/0501070 | David Lorenz | David H. Lorenz, Therapon Skotiniotis | Extending Design by Contract for Aspect-Oriented Programming | null | null | null | NU-CCIS-04-14 | cs.SE cs.PL | null | Design by Contract (DbC) and runtime enforcement of program assertions
enables the construction of more robust software. It also enables the
assignment of blame in error reporting. Unfortunately, there is no support for
runtime contract enforcement and blame assignment for Aspect-Oriented
Programming (AOP). Extending DbC to also cover aspects brings forward a
plethora of issues related to the correct order of assertion validation. We
show that there is no generally correct execution sequence of object assertions
and aspect assertions. A further classification of aspects as agnostic,
obedient, or rebellious defines the order of assertion validation that needs to
be followed. We describe the application of this classification in a prototyped
DbC tool for AOP named Cona, where aspects are used for implementing contracts,
and contracts are used for enforcing assertions on aspects.
| [
{
"version": "v1",
"created": "Mon, 24 Jan 2005 20:28:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lorenz",
"David H.",
""
],
[
"Skotiniotis",
"Therapon",
""
]
]
|
cs/0501072 | Thierry Poibeau | Dominique Dutoit, Thierry Poibeau (LIPN) | Inferring knowledge from a large semantic network | null | Inferring knowledge from a large semantic network (2002) 232-238 | null | null | cs.AI | null | In this paper, we present a rich semantic network based on a differential
analysis. We then detail implemented measures that take into account common and
differential features between words. In a last section, we describe some
industrial applications.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2005 16:09:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dutoit",
"Dominique",
"",
"LIPN"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
]
|
cs/0501073 | Tom Schrijvers | Tom Schrijvers and Thom Fruehwirth | Optimal Union-Find in Constraint Handling Rules | 12 pages, 3 figures, to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.PL cs.CC cs.DS cs.PF | null | Constraint Handling Rules (CHR) is a committed-choice rule-based language
that was originally intended for writing constraint solvers. In this paper we
show that it is also possible to write the classic union-find algorithm and
variants in CHR. The programs neither compromise in declarativeness nor
efficiency. We study the time complexity of our programs: they match the
almost-linear complexity of the best known imperative implementations. This
fact is illustrated with experimental results.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2005 13:28:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schrijvers",
"Tom",
""
],
[
"Fruehwirth",
"Thom",
""
]
]
|
cs/0501075 | Marius Zimand | Marius Zimand | Simple extractors via constructions of cryptographic pseudo-random
generators | 21 pages, an extended abstract will appear in Proc. ICALP 2005; small
corrections, some comments and references added | null | null | null | cs.CC cs.CR | null | Trevisan has shown that constructions of pseudo-random generators from hard
functions (the Nisan-Wigderson approach) also produce extractors. We show that
constructions of pseudo-random generators from one-way permutations (the
Blum-Micali-Yao approach) can be used for building extractors as well. Using
this new technique we build extractors that do not use designs and
polynomial-based error-correcting codes and that are very simple and efficient.
For example, one extractor produces each output bit separately in $O(\log^2 n)$
time. These extractors work for weak sources with min entropy $\lambda n$, for
arbitrary constant $\lambda > 0$, have seed length $O(\log^2 n)$, and their
output length is $\approx n^{\lambda/3}$.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2005 15:43:11 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Feb 2005 17:55:47 GMT"
},
{
"version": "v3",
"created": "Mon, 9 May 2005 13:29:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zimand",
"Marius",
""
]
]
|
cs/0501076 | Ketan Mulmuley D. | Ketan D. Mulmuley and Milind Sohoni | Geometric Complexity III: on deciding positivity of
Littlewood-Richardson coefficients | 10 pages | null | null | null | cs.CC math.RT | null | We point out that the remarkable Knutson and Tao Saturation Theorem and
polynomial time algorithms for LP have together an important and immediate
consequence in Geometric Complexity Theory. The problem of deciding positivity
of Littlewood-Richardson coefficients for GLn(C) belongs to P. Furthermore, the
algorithm is strongly polynomial.
The main goal of this article is to explain the significance of this result
in the context of Geometric Complexity Theory. Furthermore, it is also
conjectured that an analogous result holds for arbitrary symmetrizable
Kac-Moody algebras.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2005 11:58:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mulmuley",
"Ketan D.",
""
],
[
"Sohoni",
"Milind",
""
]
]
|
cs/0501077 | Andrew Krizhanovsky A. | Alexander Smirnov, Mikhail Pashkin, Nikolai Chilov, Tatiana Levashova,
Andrew Krizhanovsky and Alexey Kashevnik | Ontology-Based Users & Requests Clustering in Customer Service
Management System | 15 pages, 4 figures, published in Lecture Notes in Computer Science | Smirnov A., Pashkin M., Chilov N., Levashova T., Krizhanovsky A.,
Kashevnik A. 2005. Ontology-Based Users and Requests Clustering in Customer
Service Management System. Springer-Verlag GmbH, Lecture Notes in Computer
Science, 3505: 231-246 | null | null | cs.IR cs.CL | null | Customer Service Management is one of major business activities to better
serve company customers through the introduction of reliable processes and
procedures. Today this kind of activities is implemented through e-services to
directly involve customers into business processes. Traditionally Customer
Service Management involves application of data mining techniques to discover
usage patterns from the company knowledge memory. Hence grouping of
customers/requests to clusters is one of major technique to improve the level
of company customization. The goal of this paper is to present an efficient for
implementation approach for clustering users and their requests. The approach
uses ontology as knowledge representation model to improve the semantic
interoperability between units of the company and customers. Some fragments of
the approach tested in an industrial company are also presented in the paper.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2005 14:11:38 GMT"
},
{
"version": "v2",
"created": "Fri, 27 May 2005 13:59:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smirnov",
"Alexander",
""
],
[
"Pashkin",
"Mikhail",
""
],
[
"Chilov",
"Nikolai",
""
],
[
"Levashova",
"Tatiana",
""
],
[
"Krizhanovsky",
"Andrew",
""
],
[
"Kashevnik",
"Alexey",
""
]
]
|
cs/0501078 | Liang Zhou | Liang Zhou, Miruna Ticrea and Eduard Hovy | Multi-document Biography Summarization | null | Proceedings of EMNLP, pp. 434-441, 2004 | null | null | cs.CL | null | In this paper we describe a biography summarization system using sentence
classification and ideas from information retrieval. Although the individual
techniques are not new, assembling and applying them to generate multi-document
biographies is new. Our system was evaluated in DUC2004. It is among the top
performers in task 5-short summaries focused by person questions.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2005 22:43:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Liang",
""
],
[
"Ticrea",
"Miruna",
""
],
[
"Hovy",
"Eduard",
""
]
]
|
cs/0501079 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | Data Mining for Actionable Knowledge: A Survey | 11 pages | null | null | Tr-05-01 | cs.DB cs.AI | null | The data mining process consists of a series of steps ranging from data
cleaning, data selection and transformation, to pattern evaluation and
visualization. One of the central problems in data mining is to make the mined
patterns or knowledge actionable. Here, the term actionable refers to the mined
patterns suggest concrete and profitable actions to the decision-maker. That
is, the user can do something to bring direct benefits (increase in profits,
reduction in cost, improvement in efficiency, etc.) to the organization's
advantage. However, there has been written no comprehensive survey available on
this topic. The goal of this paper is to fill the void.
In this paper, we first present two frameworks for mining actionable
knowledge that are inexplicitly adopted by existing research methods. Then we
try to situate some of the research on this topic from two different
viewpoints: 1) data mining tasks and 2) adopted framework. Finally, we specify
issues that are either not addressed or insufficiently studied yet and conclude
the paper.
| [
{
"version": "v1",
"created": "Thu, 27 Jan 2005 12:13:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0501080 | Carl Lagoze | Carl Lagoze, Dean B. Krafft, Susan Jesuroga, Tim Cornwell, Ellen J.
Cramer, Eddie Shin | An Information Network Overlay Architecture for the NSDL | null | null | null | null | cs.DL | null | We describe the underlying data model and implementation of a new
architecture for the National Science Digital Library (NSDL) by the Core
Integration Team (CI). The architecture is based on the notion of an
information network overlay. This network, implemented as a graph of digital
objects in a Fedora repository, allows the representation of multiple
information entities and their relationships. The architecture provides the
framework for contextualization and reuse of resources, which we argue is
essential for the utility of the NSDL as a tool for teaching and learning.
| [
{
"version": "v1",
"created": "Thu, 27 Jan 2005 19:49:11 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Feb 2005 21:04:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean B.",
""
],
[
"Jesuroga",
"Susan",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Cramer",
"Ellen J.",
""
],
[
"Shin",
"Eddie",
""
]
]
|
cs/0501083 | Jon Phipps | Jon Phipps, Diane I. Hillmann, Gordon Paynter | Orchestrating Metadata Enhancement Services: Introducing Lenny | null | null | null | null | cs.DL | null | Harvested metadata often suffers from uneven quality to the point that
utility is compromised. Although some aggregators have developed methods for
evaluating and repairing specific metadata problems, it has been unclear how
these methods might be scaled into services that can be used within an
automated production environment. The National Science Digital Library (NSDL),
as part of its work with INFOMINE, has developed a model of ser-vice
interaction that enables loosely-coupled third party services to provide
metadata enhancements to a central repository, with interactions orchestrated
by a centralized software application.
| [
{
"version": "v1",
"created": "Fri, 28 Jan 2005 18:44:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Phipps",
"Jon",
""
],
[
"Hillmann",
"Diane I.",
""
],
[
"Paynter",
"Gordon",
""
]
]
|
cs/0501084 | Axel Polleres | Thomas Eiter and Axel Polleres | Towards Automated Integration of Guess and Check Programs in Answer Set
Programming: A Meta-Interpreter and Applications | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | 1843-04-01 | cs.AI | null | Answer set programming (ASP) with disjunction offers a powerful tool for
declaratively representing and solving hard problems. Many NP-complete problems
can be encoded in the answer set semantics of logic programs in a very concise
and intuitive way, where the encoding reflects the typical "guess and check"
nature of NP problems: The property is encoded in a way such that polynomial
size certificates for it correspond to stable models of a program. However, the
problem-solving capacity of full disjunctive logic programs (DLPs) is beyond
NP, and captures a class of problems at the second level of the polynomial
hierarchy. While these problems also have a clear "guess and check" structure,
finding an encoding in a DLP reflecting this structure may sometimes be a
non-obvious task, in particular if the "check" itself is a coNP-complete
problem; usually, such problems are solved by interleaving separate guess and
check programs, where the check is expressed by inconsistency of the check
program. In this paper, we present general transformations of head-cycle free
(extended) disjunctive logic programs into stratified and positive (extended)
disjunctive logic programs based on meta-interpretation techniques. The answer
sets of the original and the transformed program are in simple correspondence,
and, moreover, inconsistency of the original program is indicated by a
designated answer set of the transformed program. Our transformations
facilitate the integration of separate "guess" and "check" programs, which are
often easy to obtain, automatically into a single disjunctive logic program.
Our results complement recent results on meta-interpretation in ASP, and extend
methods and techniques for a declarative "guess and check" problem solving
paradigm through ASP.
| [
{
"version": "v1",
"created": "Fri, 28 Jan 2005 20:19:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Polleres",
"Axel",
""
]
]
|
cs/0501086 | Manuela Kunze | Peter M. Kruse and Andre Naujoks and Dietmar Roesner and Manuela Kunze | Clever Search: A WordNet Based Wrapper for Internet Search Engines | null | Proceedings of 2nd GermaNet Workshop 2005 | null | null | cs.AI | null | This paper presents an approach to enhance search engines with information
about word senses available in WordNet. The approach exploits information about
the conceptual relations within the lexical-semantic net. In the wrapper for
search engines presented, WordNet information is used to specify user's request
or to classify the results of a publicly available web search engine, like
google, yahoo, etc.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 16:00:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kruse",
"Peter M.",
""
],
[
"Naujoks",
"Andre",
""
],
[
"Roesner",
"Dietmar",
""
],
[
"Kunze",
"Manuela",
""
]
]
|
cs/0501087 | Manoj Kumar | Manoj Kumar | Faults and Improvements of an Enhanced Remote User Authentication Scheme
Using Smart Cards | 5 pages | null | null | null | cs.CR | null | In 2000, Hwang and Li proposed a remote user authentication scheme using
smart cards to solve the problems of Lamport scheme. Later, Chan- Chang, Shen-
Lin- Hwang and then Chang-Hwang pointed out some attacks on Hwang –
Li’s scheme. In 2003, Shen, Lin and Hwang also proposed a modified scheme
to remove these attacks. In the same year, Leung-Cheng-Fong-Chan showed that
modified scheme proposed by Shen-Lin-Hwang is still insecure. In 2004, Awasthi
and Lal enhanced Shen-Lin-Hwang’s scheme to overcome its security
pitfalls. This paper analyses that the user U/smart card does not provide
complete information for the execution and proper running of the login phase of
the Awasthi- Lal’s scheme. Furthermore, this paper also modifies the
Awasthi- Lal’s scheme for the proper functioning.
| [
{
"version": "v1",
"created": "Sat, 29 Jan 2005 06:44:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
|
cs/0501089 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Issues in Exploiting GermaNet as a Resource in Real Applications | 10 pages, 3 figures | null | null | null | cs.AI | null | This paper reports about experiments with GermaNet as a resource within
domain specific document analysis. The main question to be answered is: How is
the coverage of GermaNet in a specific domain? We report about results of a
field test of GermaNet for analyses of autopsy protocols and present a sketch
about the integration of GermaNet inside XDOC. Our remarks will contribute to a
GermaNet user's wish list.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 10:07:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
]
|
cs/0501093 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Transforming Business Rules Into Natural Language Text | 3 pages | in Proceedings of IWCS-6, 2005 | null | null | cs.AI | null | The aim of the project presented in this paper is to design a system for an
NLG architecture, which supports the documentation process of eBusiness models.
A major task is to enrich the formal description of an eBusiness model with
additional information needed in an NLG task.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 07:59:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
]
|
cs/0501094 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Corpus based Enrichment of GermaNet Verb Frames | 4 pages | in Proceedings of LREC 2004 | null | null | cs.AI | null | Lexical semantic resources, like WordNet, are often used in real applications
of natural language document processing. For example, we integrated GermaNet in
our document suite XDOC of processing of German forensic autopsy protocols. In
addition to the hypernymy and synonymy relation, we want to adapt GermaNet's
verb frames for our analysis. In this paper we outline an approach for the
domain related enrichment of GermaNet verb frames by corpus based syntactic and
co-occurred data analyses of real documents.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 08:36:39 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Feb 2005 08:06:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
]
|
cs/0501095 | Manuela Kunze | Manuela Kunze and Dietmar Roesner | Context Related Derivation of Word Senses | 5 pages, 2 figures | in Proceedings of Ontolex- Workshop 2004 | null | null | cs.AI | null | Real applications of natural language document processing are very often
confronted with domain specific lexical gaps during the analysis of documents
of a new domain. This paper describes an approach for the derivation of domain
specific concepts for the extension of an existing ontology. As resources we
need an initial ontology and a partially processed corpus of a domain. We
exploit the specific characteristic of the sublanguage in the corpus. Our
approach is based on syntactical structures (noun phrases) and compound
analyses to extract information required for the extension of GermaNet's
lexical resources.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 09:25:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kunze",
"Manuela",
""
],
[
"Roesner",
"Dietmar",
""
]
]
|
cs/0501096 | Manuela Kunze | Dietmar Roesner and Manuela Kunze and Sylke Kroetzsch | Transforming and Enriching Documents for the Semantic Web | 10 pages, 1 figure | KI (1), 2004 | null | null | cs.AI | null | We suggest to employ techniques from Natural Language Processing (NLP) and
Knowledge Representation (KR) to transform existing documents into documents
amenable for the Semantic Web. Semantic Web documents have at least part of
their semantics and pragmatics marked up explicitly in both a machine
processable as well as human readable manner. XML and its related standards
(XSLT, RDF, Topic Maps etc.) are the unifying platform for the tools and
methodologies developed for different application scenarios.
| [
{
"version": "v1",
"created": "Mon, 31 Jan 2005 09:48:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Roesner",
"Dietmar",
""
],
[
"Kunze",
"Manuela",
""
],
[
"Kroetzsch",
"Sylke",
""
]
]
|
cs/0502002 | Manoj Kumar | Manoj Kumar | Directed Threshold Multi – Signature Scheme without SDC | 13 pages | null | null | null | cs.CR | null | In this paper, we propose a Directed threshold multisignature scheme without
SDC. This signature scheme is applicable when the message is sensitive to the
signature receiver; and the signatures are generated by the cooperation of a
number of people from a given group of senders. In this scheme, any malicious
set of signers cannot impersonate any other set of signers to forge the
signatures. In case of forgery, it is possible to trace the signing set.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 06:29:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
|
cs/0502003 | Sandor P. Fekete | Alexander Kroeller, Dennis Pfisterer, Carsten Buschmann, Sandor P.
Fekete, and Stefan Fischer | Shawn: A new approach to simulating wireless sensor networks | 10 pages, 2 figures, 2 tables, Latex, to appear in Design, Analysis,
and Simulation of Distributed Systems 2005 | null | null | null | cs.DC cs.PF | null | We consider the simulation of wireless sensor networks (WSN) using a new
approach. We present Shawn, an open-source discrete-event simulator that has
considerable differences to all other existing simulators. Shawn is very
powerful in simulating large scale networks with an abstract point of view. It
is, to the best of our knowledge, the first simulator to support generic
high-level algorithms as well as distributed protocols on exactly the same
underlying networks.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 12:23:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kroeller",
"Alexander",
""
],
[
"Pfisterer",
"Dennis",
""
],
[
"Buschmann",
"Carsten",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Fischer",
"Stefan",
""
]
]
|
cs/0502006 | Alejandro Ceccatto | P.M. Granitto, P.F. Verdes and H.A. Ceccatto | Neural network ensembles: Evaluation of aggregation algorithms | 35 pages, 2 figures, In press AI Journal | null | null | null | cs.AI cs.NE | null | Ensembles of artificial neural networks show improved generalization
capabilities that outperform those of single networks. However, for aggregation
to be effective, the individual networks must be as accurate and diverse as
possible. An important problem is, then, how to tune the aggregate members in
order to have an optimal compromise between these two conflicting conditions.
We present here an extensive evaluation of several algorithms for ensemble
construction, including new proposals and comparing them with standard methods
in the literature. We also discuss a potential problem with sequential
aggregation algorithms: the non-frequent but damaging selection through their
heuristics of particularly bad ensemble members. We introduce modified
algorithms that cope with this problem by allowing individual weighting of
aggregate members. Our algorithms and their weighted modifications are
favorably tested against other methods in the literature, producing a sensible
improvement in performance on most of the standard statistical databases used
as benchmarks.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 21:22:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Granitto",
"P. M.",
""
],
[
"Verdes",
"P. F.",
""
],
[
"Ceccatto",
"H. A.",
""
]
]
|
cs/0502007 | Alexander Shaydurov S. | Alexander Shaydurov | Identification of complex systems in the basis of wavelets | 4 pages, 6 figures | null | null | null | cs.CE cs.NE | null | In this paper is proposed the method of the identification of complex dynamic
systems. Method can be used for the identification of linear and nonlinear
complex dynamic systems for the determined or stochastic signals at the inputs
and the outputs. It is proposed to use a basis of wavelets for obtaining the
impulse transient function (ITF) of system. ITF is considered in the form of
surface in the 3D space. Are given the results of experiments on the
identification of systems in the basis of wavelets.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 00:12:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shaydurov",
"Alexander",
""
]
]
|
cs/0502008 | Jim Gray | Jim Gray, David T. Liu, Maria Nieto-Santisteban, Alexander S. Szalay,
David DeWitt, Gerd Heber | Scientific Data Management in the Coming Decade | null | null | null | Microsoft Technical Report MSR-TR-2005-10 | cs.DB cs.CE | null | This is a thought piece on data-intensive science requirements for databases
and science centers. It argues that peta-scale datasets will be housed by
science centers that provide substantial storage and processing for scientists
who access the data via smart notebooks. Next-generation science instruments
and simulations will generate these peta-scale datasets. The need to publish
and share data and the need for generic analysis and visualization tools will
finally create a convergence on common metadata standards. Database systems
will be judged by their support of these metadata standards and by their
ability to manage and access peta-scale datasets. The procedural
stream-of-bytes-file-centric approach to data analysis is both too cumbersome
and too serial for such large datasets. Non-procedural query and analysis of
schematized self-describing data is both easier to use and allows much more
parallelism.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 03:15:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Liu",
"David T.",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"DeWitt",
"David",
""
],
[
"Heber",
"Gerd",
""
]
]
|
cs/0502009 | Jim Gray | Peter Kukol, Jim Gray | Performance Considerations for Gigabyte per Second Transcontinental
Disk-to-Disk File Transfers | null | null | null | Microsoft Technical Report MSR-TR-2004-62 | cs.DB cs.PF | null | Moving data from CERN to Pasadena at a gigabyte per second using the next
generation Internet requires good networking and good disk IO. Ten Gbps
Ethernet and OC192 links are in place, so now it is simply a matter of
programming. This report describes our preliminary work and measurements in
configuring the disk subsystem for this effort. Using 24 SATA disks at each
endpoint we are able to locally read and write an NTFS volume is striped across
24 disks at 1.2 GBps. A 32-disk stripe delivers 1.7 GBps. Experiments on higher
performance and higher-capacity systems deliver up to 3.5 GBps.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 03:26:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kukol",
"Peter",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0502010 | Jim Gray | Tom Barclay, Jim Gray | TerraServer SAN-Cluster Architecture and Operations Experience | null | null | null | Microsoft Technical Report MSR-TR-2004-67 | cs.DC cs.DB | null | Microsoft TerraServer displays aerial, satellite, and to-pographic images of
the earth in a SQL database available via the Internet. It is one of the most
popular online at-lases, presenting seventeen terabytes of image data from the
United States Geological Survey (USGS). Initially de-ployed in 1998, the system
demonstrated the scalability of PC hardware and software - Windows and SQL
Server - on a single, mainframe-class processor. In September 2000, the
back-end database application was migrated to 4-node active/passive cluster
connected to an 18 terabyte Storage Area Network (SAN). The new configuration
was designed to achieve 99.99% availability for the back-end application. This
paper describes the hardware and software components of the TerraServer Cluster
and SAN, and describes our experience in configuring and operating this system
for three years. Not surprisingly, the hardware and architecture delivered
better than four-9's of availability, but operations mistakes delivered
three-9's.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 03:36:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0502011 | Jim Gray | Jim Gray, Alexander S. Szalay | Where the Rubber Meets the Sky: Bridging the Gap between Databases and
Science | null | IEEE Data Engineering Bulletin, Vol 27.4, Dec. 2004, pp. 3-11 | null | Microsoft Technical Report MSR-TR-2004-110 | cs.DB cs.CE | null | Scientists in all domains face a data avalanche - both from better
instruments and from improved simulations. We believe that computer science
tools and computer scientists are in a position to help all the sciences by
building tools and developing techniques to manage, analyze, and visualize
peta-scale scientific information. This article is summarizes our experiences
over the last seven years trying to bridge the gap between database technology
and the needs of the astronomy community in building the World-Wide Telescope.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 04:40:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alexander S.",
""
]
]
|
cs/0502012 | Jim Gray | Peter Kukol, Jim Gray | Sequential File Programming Patterns and Performance with .NET | null | null | null | Microsoft Technical Report MSR-TR-2004-136 | cs.PF cs.OS | null | Programming patterns for sequential file access in the .NET Framework are
described and the performance is measured. The default behavior provides
excellent performance on a single disk - 50 MBps both reading and writing.
Using large request sizes and doing file pre-allocation when possible have
quantifiable benefits. When one considers disk arrays, .NET unbuffered IO
delivers 800 MBps on a 16-disk array, but buffered IO delivers about 12% of
that performance. Consequently, high-performance file and database utilities
are still forced to use unbuffered IO for maximum sequential performance. The
report is accompanied by downloadable source code that demonstrates the
concepts and code that was used to obtain these measurements.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 04:43:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kukol",
"Peter",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0502013 | Robert Hearn | Robert A. Hearn | Amazons is PSPACE-complete | 7 pages, 5 figures. For 2005 Combinatorial Game Theory Workshop at
BIRS | null | null | null | cs.CC cs.GT | null | Amazons is a board game which combines elements of Chess and Go. It has
become popular in recent years, and has served as a useful platform for both
game-theoretic study and AI games research. Buro showed that simple Amazons
endgames are NP-equivalent, leaving the complexity of the general case as an
open problem.
We settle this problem, by showing that deciding the outcome of an n x n
Amazons position is PSPACE-hard. We give a reduction from one of the
PSPACE-complete two-player formula games described by Schaefer. Since the
number of moves in an Amazons game is polynomially bounded (unlike Chess and
Go), Amazons is in PSPACE. It is thus on a par with other two-player,
bounded-move, perfect-information games such as Hex, Othello, and Kayles. Our
construction also provides an alternate proof that simple Amazons endgames are
NP-equivalent.
Our reduction uses a number of amazons polynomial in the input formula
length; a remaining open problem is the complexity of Amazons when only a
constant number of amazons is used.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 18:55:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hearn",
"Robert A.",
""
]
]
|
cs/0502014 | Philippe Robert | Philippe Robert (RAP UR-R) | On the asymptotic behavior of some Algorithms | November 2004 | Random Structures and Algorithms 27 (2005) 235--250 | 10.1002/rsa.20075 | null | cs.DS math.CA math.PR | null | A simple approach is presented to study the asymptotic behavior of some
algorithms with an underlying tree structure. It is shown that some asymptotic
oscillating behaviors can be precisely analyzed without resorting to complex
analysis techniques as it is usually done in this context. A new explicit
representation of periodic functions involved is obtained at the same time.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 08:25:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robert",
"Philippe",
"",
"RAP UR-R"
]
]
|
cs/0502015 | Remi Barrere | R. Barrere | Can Computer Algebra be Liberated from its Algebraic Yoke ? | 8 pages, 2-column presentation, 2 figures | null | null | null | cs.SC cs.CE | null | So far, the scope of computer algebra has been needlessly restricted to exact
algebraic methods. Its possible extension to approximate analytical methods is
discussed. The entangled roles of functional analysis and symbolic programming,
especially the functional and transformational paradigms, are put forward. In
the future, algebraic algorithms could constitute the core of extended symbolic
manipulation systems including primitives for symbolic approximations.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 17:28:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barrere",
"R.",
""
]
]
|
cs/0502016 | Cynthia Rudin | Cynthia Rudin | Stability Analysis for Regularized Least Squares Regression | 14 pages, 0 figures, 1 class file | null | null | null | cs.LG | null | We discuss stability for a class of learning algorithms with respect to noisy
labels. The algorithms we consider are for regression, and they involve the
minimization of regularized risk functionals, such as L(f) := 1/N sum_i
(f(x_i)-y_i)^2+ lambda ||f||_H^2. We shall call the algorithm `stable' if, when
y_i is a noisy version of f*(x_i) for some function f* in H, the output of the
algorithm converges to f* as the regularization term and noise simultaneously
vanish. We consider two flavors of this problem, one where a data set of N
points remains fixed, and the other where N -> infinity. For the case where N
-> infinity, we give conditions for convergence to f_E (the function which is
the expectation of y(x) for each x), as lambda -> 0. For the fixed N case, we
describe the limiting 'non-noisy', 'non-regularized' function f*, and give
conditions for convergence. In the process, we develop a set of tools for
dealing with functionals such as L(f), which are applicable to many other
problems in learning theory.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 19:54:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rudin",
"Cynthia",
""
]
]
|
cs/0502018 | Jim Gray | Maria A. Nieto-Santisteban, Alexander S. Szalay, Aniruddha R. Thakar,
William J. O'Mullane, Jim Gray, James Annis | When Database Systems Meet the Grid | better version of the paper (better graphics exceed ArXiv 1MB limit)
at http://www-db.cs.wisc.edu/cidr/papers/P13.pdf | Proceedings of CIDR 2005 Conference, Asilomar, CA. Jan. 2005, pp
154-161 | null | Microsoft Technical Report MSR-TR-2004-81 | cs.DC | null | We illustrate the benefits of combining database systems and Grid
technologies for data-intensive applications. Using a cluster of SQL servers,
we reimplemented an existing Grid application that finds galaxy clusters in a
large astronomical database. The SQL implementation runs an order of magnitude
faster than the earlier Tcl-C-file-based implementation. We discuss why and how
Grid applications can take advantage of database systems.
| [
{
"version": "v1",
"created": "Thu, 3 Feb 2005 21:43:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Thakar",
"Aniruddha R.",
""
],
[
"O'Mullane",
"William J.",
""
],
[
"Gray",
"Jim",
""
],
[
"Annis",
"James",
""
]
]
|
cs/0502019 | Kevin Lai | Michal Feldman, Kevin Lai, Li Zhang | A Price-Anticipating Resource Allocation Mechanism for Distributed
Shared Clusters | null | Proceedings of the ACM Conference on Electronic Commerce 2005 | null | null | cs.DC cs.GT | null | In this paper we formulate the fixed budget resource allocation game to
understand the performance of a distributed market-based resource allocation
system. Multiple users decide how to distribute their budget (bids) among
multiple machines according to their individual preferences to maximize their
individual utility. We look at both the efficiency and the fairness of the
allocation at the equilibrium, where fairness is evaluated through the measures
of utility uniformity and envy-freeness. We show analytically and through
simulations that despite being highly decentralized, such a system converges
quickly to an equilibrium and unlike the social optimum that achieves high
efficiency but poor fairness, the proposed allocation scheme achieves a nice
balance of high degrees of efficiency and fairness at the equilibrium.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 02:48:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feldman",
"Michal",
""
],
[
"Lai",
"Kevin",
""
],
[
"Zhang",
"Li",
""
]
]
|
cs/0502020 | Kumara Sastry | K. Sastry, U.-M. O'Reilly, D. E. Goldberg | Population Sizing for Genetic Programming Based Upon Decision Making | Final version published in O'Reilly, U.-M., et al. (2004). Genetic
Programming Theory and Practice II. Boston, MA: Kluwer Academic Publishers.
49--66 | null | null | IlliGAL Report No. 2004028 | cs.AI cs.NE | null | This paper derives a population sizing relationship for genetic programming
(GP). Following the population-sizing derivation for genetic algorithms in
Goldberg, Deb, and Clark (1992), it considers building block decision making as
a key facet. The analysis yields a GP-unique relationship because it has to
account for bloat and for the fact that GP solutions often use subsolution
multiple times. The population-sizing relationship depends upon tree size,
solution complexity, problem difficulty and building block expression
probability. The relationship is used to analyze and empirically investigate
population sizing for three model GP problems named ORDER, ON-OFF and LOUD.
These problems exhibit bloat to differing extents and differ in whether their
solutions require the use of a building block multiple times.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 03:58:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sastry",
"K.",
""
],
[
"O'Reilly",
"U. -M.",
""
],
[
"Goldberg",
"D. E.",
""
]
]
|
cs/0502021 | Kumara Sastry | H. A. Abbass, K. Sastry, D. E. Goldberg | Oiling the Wheels of Change: The Role of Adaptive Automatic Problem
Decomposition in Non--Stationary Environments | null | null | null | null | cs.NE cs.AI | null | Genetic algorithms (GAs) that solve hard problems quickly, reliably and
accurately are called competent GAs. When the fitness landscape of a problem
changes overtime, the problem is called non--stationary, dynamic or
time--variant problem. This paper investigates the use of competent GAs for
optimizing non--stationary optimization problems. More specifically, we use an
information theoretic approach based on the minimum description length
principle to adaptively identify regularities and substructures that can be
exploited to respond quickly to changes in the environment. We also develop a
special type of problems with bounded difficulties to test non--stationary
optimization problems. The results provide new insights into non-stationary
optimization problems and show that a search algorithm which automatically
identifies and exploits possible decompositions is more robust and responds
quickly to changes than a simple genetic algorithm.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 04:15:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abbass",
"H. A.",
""
],
[
"Sastry",
"K.",
""
],
[
"Goldberg",
"D. E.",
""
]
]
|
cs/0502022 | Kumara Sastry | K. Sastry, H. A. Abbass, D. E. Goldberg | Sub-Structural Niching in Non-Stationary Environments | Final version published in 2005 Australian Artificial Intelligence
Conference, pp. 873--885 | null | null | IlliGAL Report No. 2004035 | cs.NE cs.AI | null | Niching enables a genetic algorithm (GA) to maintain diversity in a
population. It is particularly useful when the problem has multiple optima
where the aim is to find all or as many as possible of these optima. When the
fitness landscape of a problem changes overtime, the problem is called
non--stationary, dynamic or time--variant problem. In these problems, niching
can maintain useful solutions to respond quickly, reliably and accurately to a
change in the environment. In this paper, we present a niching method that
works on the problem substructures rather than the whole solution, therefore it
has less space complexity than previously known niching mechanisms. We show
that the method is responding accurately when environmental changes occur.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 04:29:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sastry",
"K.",
""
],
[
"Abbass",
"H. A.",
""
],
[
"Goldberg",
"D. E.",
""
]
]
|
cs/0502023 | Kumara Sastry | K. Sastry, H. A. Abbass, D. E. Goldberg, D. D. Johnson | Sub-structural Niching in Estimation of Distribution Algorithms | null | null | null | IlliGAL Report No. 2005002 | cs.NE cs.AI | null | We propose a sub-structural niching method that fully exploits the problem
decomposition capability of linkage-learning methods such as the estimation of
distribution algorithms and concentrate on maintaining diversity at the
sub-structural level. The proposed method consists of three key components: (1)
Problem decomposition and sub-structure identification, (2) sub-structure
fitness estimation, and (3) sub-structural niche preservation. The
sub-structural niching method is compared to restricted tournament selection
(RTS)--a niching method used in hierarchical Bayesian optimization
algorithm--with special emphasis on sustained preservation of multiple global
solutions of a class of boundedly-difficult, additively-separable multimodal
problems. The results show that sub-structural niching successfully maintains
multiple global optima over large number of generations and does so with
significantly less population than RTS. Additionally, the market share of each
of the niche is much closer to the expected level in sub-structural niching
when compared to RTS.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 04:46:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sastry",
"K.",
""
],
[
"Abbass",
"H. A.",
""
],
[
"Goldberg",
"D. E.",
""
],
[
"Johnson",
"D. D.",
""
]
]
|
cs/0502025 | Hahnsang Kim | Hahnsang Kim, Theirry Turletti, Amar Bouali | EPspectra: A Formal Toolkit for Developing DSP Software Applications | 31 pages | null | null | null | cs.LO cs.SE | null | The software approach to developing Digital Signal Processing (DSP)
applications brings some great features such as flexibility, re-usability of
resources and easy upgrading of applications. However, it requires long and
tedious tests and verification phases because of the increasing complexity of
the software. This implies the need of a software programming environment
capable of putting together DSP modules and providing facilities to debug,
verify and validate the code. The objective of the work is to provide such
facilities as simulation and verification for developing DSP software
applications. This led us to develop an extension toolkit, Epspectra, built
upon Pspectra, one of the first toolkits available to design basic software
radio applications on standard PC workstations. In this paper, we first present
Epspectra, an Esterel-based extension of Pspectra that makes the design and
implementation of portable DSP applications easier. It allows drastic reduction
of testing and verification time while requiring relatively little expertise in
formal verification methods. Second, we demonstrate the use of Epspectra,
taking as an example the radio interface part of a GSM base station. We also
present the verification procedures for the three safety properties of the
implementation programs which have complex control-paths. These have to obey
strict scheduling rules. In addition, Epspectra achieves the verification of
the targeted application since the same model is used for the executable code
generation and for the formal verification.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 15:11:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kim",
"Hahnsang",
""
],
[
"Turletti",
"Theirry",
""
],
[
"Bouali",
"Amar",
""
]
]
|
cs/0502027 | Kevin Lai | Kevin Lai | Markets are Dead, Long Live Markets | Fix rotation of figures | null | null | null | cs.OS | null | Researchers have long proposed using economic approaches to resource
allocation in computer systems. However, few of these proposals became
operational, let alone commercial. Questions persist about the economic
approach regarding its assumptions, value, applicability, and relevance to
system design. The goal of this paper is to answer these questions. We find
that market-based resource allocation is useful, and more importantly, that
mechanism design and system design should be integrated to produce systems that
are both economically and computationally efficient.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 22:48:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lai",
"Kevin",
""
]
]
|
cs/0502028 | Herbert van de Sompel | Herbert Van de Sompel, Jeroen Bekaert, Xiaoming Liu, Luda Balakireva,
Thorsten Schwander | aDORe: a modular, standards-based Digital Object Repository | Draft of submission to Computer Journal | null | null | null | cs.DL | null | This paper describes the aDORe repository architecture, designed and
implemented for ingesting, storing, and accessing a vast collection of Digital
Objects at the Research Library of the Los Alamos National Laboratory. The
aDORe architecture is highly modular and standards-based. In the architecture,
the MPEG-21 Digital Item Declaration Language is used as the XML-based format
to represent Digital Objects that can consist of multiple datastreams as Open
Archival Information System Archival Information Packages (OAIS AIPs).Through
an ingestion process, these OAIS AIPs are stored in a multitude of autonomous
repositories. A Repository Index keeps track of the creation and location of
all the autonomous repositories, whereas an Identifier Locator registers in
which autonomous repository a given Digital Object or OAIS AIP resides. A
front-end to the complete environment, the OAI-PMH Federator, is introduced for
requesting OAIS Dissemination Information Packages (OAIS DIPs). These OAIS DIPs
can be the stored OAIS AIPs themselves, or transformations thereof. This
front-end allows OAI-PMH harvesters to recurrently and selectively collect
batches of OAIS DIPs from aDORe, and hence to create multiple, parallel
services using the collected objects. Another front-end, the OpenURL Resolver,
is introduced for requesting OAIS Result Sets. An OAIS Result Set is a
dissemination of an individual Digital Object or of its constituent
datastreams. Both front-ends make use of an MPEG-21 Digital Item Processing
Engine to apply services to OAIS AIPs, Digital Objects, or constituent
datastreams that were specified in a dissemination request.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 22:09:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Van de Sompel",
"Herbert",
""
],
[
"Bekaert",
"Jeroen",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Balakireva",
"Luda",
""
],
[
"Schwander",
"Thorsten",
""
]
]
|
cs/0502029 | Martin Pelikan | Radovan Ondas, Martin Pelikan, Kumara Sastry | Scalability of Genetic Programming and Probabilistic Incremental Program
Evolution | Submitted to GECCO-2005 | null | null | null | cs.NE cs.AI | null | This paper discusses scalability of standard genetic programming (GP) and the
probabilistic incremental program evolution (PIPE). To investigate the need for
both effective mixing and linkage learning, two test problems are considered:
ORDER problem, which is rather easy for any recombination-based GP, and TRAP or
the deceptive trap problem, which requires the algorithm to learn interactions
among subsets of terminals. The scalability results show that both GP and PIPE
scale up polynomially with problem size on the simple ORDER problem, but they
both scale up exponentially on the deceptive problem. This indicates that while
standard recombination is sufficient when no interactions need to be
considered, for some problems linkage learning is necessary. These results are
in agreement with the lessons learned in the domain of binary-string genetic
algorithms (GAs). Furthermore, the paper investigates the effects of
introducing utnnecessary and irrelevant primitives on the performance of GP and
PIPE.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2005 19:40:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ondas",
"Radovan",
""
],
[
"Pelikan",
"Martin",
""
],
[
"Sastry",
"Kumara",
""
]
]
|
cs/0502031 | Riccardo Pucella | Riccardo Pucella | Logic Column 11: The Finite and the Infinite in Temporal Logic | 14 pages | SIGACT News, 36(1), pp. 86-99, 2005 | null | null | cs.LO | null | This article examines the interpretation of the LTL temporal operators over
finite and infinite sequences. This is used as the basis for deriving a sound
and complete axiomatization for Caret, a recent temporal logic for reasoning
about programs with nested procedure calls and returns.
| [
{
"version": "v1",
"created": "Sat, 5 Feb 2005 21:00:13 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Apr 2005 17:51:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0502032 | Mihai P?tra\c{s}cu | Christian Worm Mortensen, Rasmus Pagh and Mihai Patrascu | On Dynamic Range Reporting in One Dimension | 18 pages. Full version of a paper that will appear in STOC'05 | null | null | null | cs.DS | null | We consider the problem of maintaining a dynamic set of integers and
answering queries of the form: report a point (equivalently, all points) in a
given interval. Range searching is a natural and fundamental variant of integer
search, and can be solved using predecessor search. However, for a RAM with
w-bit words, we show how to perform updates in O(lg w) time and answer queries
in O(lglg w) time. The update time is identical to the van Emde Boas structure,
but the query time is exponentially faster. Existing lower bounds show that
achieving our query time for predecessor search requires doubly-exponentially
slower updates. We present some arguments supporting the conjecture that our
solution is optimal.
Our solution is based on a new and interesting recursion idea which is "more
extreme" that the van Emde Boas recursion. Whereas van Emde Boas uses a simple
recursion (repeated halving) on each path in a trie, we use a nontrivial, van
Emde Boas-like recursion on every such path. Despite this, our algorithm is
quite clean when seen from the right angle. To achieve linear space for our
data structure, we solve a problem which is of independent interest. We develop
the first scheme for dynamic perfect hashing requiring sublinear space. This
gives a dynamic Bloomier filter (an approximate storage scheme for sparse
vectors) which uses low space. We strengthen previous lower bounds to show that
these results are optimal.
| [
{
"version": "v1",
"created": "Sat, 5 Feb 2005 23:22:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mortensen",
"Christian Worm",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Patrascu",
"Mihai",
""
]
]
|
cs/0502034 | Martin Pelikan | Martin Pelikan, Kumara Sastry, David E. Goldberg | Multiobjective hBOA, Clustering, and Scalability | Also IlliGAL Report No. 2005005 (http://www-illigal.ge.uiuc.edu/).
Submitted to GECCO-2005 | null | null | IlliGAL Report No. 2005005 | cs.NE cs.AI | null | This paper describes a scalable algorithm for solving multiobjective
decomposable problems by combining the hierarchical Bayesian optimization
algorithm (hBOA) with the nondominated sorting genetic algorithm (NSGA-II) and
clustering in the objective space. It is first argued that for good
scalability, clustering or some other form of niching in the objective space is
necessary and the size of each niche should be approximately equal.
Multiobjective hBOA (mohBOA) is then described that combines hBOA, NSGA-II and
clustering in the objective space. The algorithm mohBOA differs from the
multiobjective variants of BOA and hBOA proposed in the past by including
clustering in the objective space and allocating an approximately equally sized
portion of the population to each cluster. The algorithm mohBOA is shown to
scale up well on a number of problems on which standard multiobjective
evolutionary algorithms perform poorly.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2005 05:26:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pelikan",
"Martin",
""
],
[
"Sastry",
"Kumara",
""
],
[
"Goldberg",
"David E.",
""
]
]
|
cs/0502038 | Stavros Nikolopoulos D. | Stavros D. Nikolopoulos and Charis Papadopoulos | The Number of Spanning Trees in Kn-complements of Quasi-threshold Graphs | 13 pages, 2 figures | Graphs and Combinatorics 20(3): 383-397, 2004 | null | null | cs.DM | null | In this paper we examine the classes of graphs whose $K_n$-complements are
trees and quasi-threshold graphs and derive formulas for their number of
spanning trees; for a subgraph $H$ of $K_n$, the $K_n$-complement of $H$ is the
graph $K_n-H$ which is obtained from $K_n$ by removing the edges of $H$. Our
proofs are based on the complement spanning-tree matrix theorem, which
expresses the number of spanning trees of a graph as a function of the
determinant of a matrix that can be easily constructed from the adjacency
relation of the graph. Our results generalize previous results and extend the
family of graphs of the form $K_n-H$ admitting formulas for the number of their
spanning trees.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2005 15:26:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nikolopoulos",
"Stavros D.",
""
],
[
"Papadopoulos",
"Charis",
""
]
]
|
cs/0502039 | Boris D. Lubachevsky | Boris D. Lubachevsky | Efficient Parallel Simulations of Asynchronous Cellular Arrays | 26 pages, 10 figures | Complex Systems, vol.1, no.6, December 1987, pp.1099--1123, S.
Wolfram, (ed.) | null | null | cs.DC cond-mat.mtrl-sci cs.PF | null | A definition for a class of asynchronous cellular arrays is proposed. An
example of such asynchrony would be independent Poisson arrivals of cell
iterations. The Ising model in the continuous time formulation of Glauber falls
into this class. Also proposed are efficient parallel algorithms for simulating
these asynchronous cellular arrays. In the algorithms, one or several cells are
assigned to a processing element (PE), local times for different PEs can be
different. Although the standard serial algorithm by Metropolis, Rosenbluth,
Rosenbluth, Teller, and Teller can simulate such arrays, it is usually believed
to be without an efficient parallel counterpart. However, the proposed parallel
algorithms contradict this belief proving to be both efficient and able to
perform the same task as the standard algorithm. The results of experiments
with the new algorithms are encouraging: the speed-up is greater than 16 using
25 PEs on a shared memory MIMD bus computer, and greater than 1900 using 2**14
PEs on a SIMD computer. The algorithm by Bortz, Kalos, and Lebowitz can be
incorporated in the proposed parallel algorithms, further contributing to
speed-up. [In this paper I invented the update-cites-of-local-time-minima
parallel simulation scheme. Now the scheme is becoming popular. Many misprints
of the original 1987 Complex Systems publication are corrected here.-B.L.]
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 00:32:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lubachevsky",
"Boris D.",
""
]
]
|
cs/0502040 | Gaoyan Xie | Gaoyan Xie and Zhe Dang | Testing Systems of Concurrent Black-boxes--an Automata-Theoretic and
Decompositional Approach | null | null | null | null | cs.SE | null | The global testing problem studied in this paper is to seek a definite answer
to whether a system of concurrent black-boxes has an observable behavior in a
given finite (but could be huge) set "Bad". We introduce a novel approach to
solve the problem that does not require integration testing. Instead, in our
approach, the global testing problem is reduced to testing individual
black-boxes in the system one by one in some given order. Using an
automata-theoretic approach, test sequences for each individual black-box are
generated from the system's description as well as the test results of
black-boxes prior to this black-box in the given order. In contrast to the
conventional compositional/modular verification/testing approaches, our
approach is essentially decompositional.
Also, our technique is complete, sound, and can be carried out automatically.
Our experiment results show that the total number of tests needed to solve the
global testing problem is substantially small even for an extremely large
"Bad".
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 01:15:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xie",
"Gaoyan",
""
],
[
"Dang",
"Zhe",
""
]
]
|
cs/0502041 | Mihai Patrascu | Mihai Patrascu and Erik D. Demaine | Logarithmic Lower Bounds in the Cell-Probe Model | Second version contains significant changes to the presentation. 32
pages, 1 figure. Journal version of two conference publications: "Tight
Bounds for the Partial-Sums Problem" Proc. 15th ACM-SIAM Symposium on
Discrete Algorithms (SODA'04), pp 20-29. "Lower Bounds for Dynamic
Connectivity" Proc. 36th ACM Symposium on Theory of Computing (STOC'04), pp
546-553 | null | null | null | cs.DS cs.CC | null | We develop a new technique for proving cell-probe lower bounds on dynamic
data structures. This technique enables us to prove an amortized randomized
Omega(lg n) lower bound per operation for several data structural problems on n
elements, including partial sums, dynamic connectivity among disjoint paths (or
a forest or a graph), and several other dynamic graph problems (by simple
reductions). Such a lower bound breaks a long-standing barrier of Omega(lg n /
lglg n) for any dynamic language membership problem. It also establishes the
optimality of several existing data structures, such as Sleator and Tarjan's
dynamic trees. We also prove the first Omega(log_B n) lower bound in the
external-memory model without assumptions on the data structure (such as the
comparison model). Our lower bounds also give a query-update trade-off curve
matched, e.g., by several data structures for dynamic connectivity in graphs.
We also prove matching upper and lower bounds for partial sums when
parameterized by the word size and the maximum additive change in an update.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 03:03:55 GMT"
},
{
"version": "v2",
"created": "Sat, 28 May 2005 21:49:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Patrascu",
"Mihai",
""
],
[
"Demaine",
"Erik D.",
""
]
]
|
cs/0502043 | Satyan L. Devadoss | Jeff Danciger, Satyan L. Devadoss, Don Sheehy | Compatible Triangulations and Point Partitions by Series-Triangular
Graphs | 11 pages, 8 figures | Computational Geometry: Theory and Applications, 34 (2006) 195-202 | null | null | cs.CG cs.DM | null | We introduce series-triangular graph embeddings and show how to partition
point sets with them. This result is then used to improve the upper bound on
the number of Steiner points needed to obtain compatible triangulations of
point sets. The problem is generalized to finding compatible triangulations for
more than two point sets and we show that such triangulations can be
constructed with only a linear number of Steiner points added to each point
set.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 16:19:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Danciger",
"Jeff",
""
],
[
"Devadoss",
"Satyan L.",
""
],
[
"Sheehy",
"Don",
""
]
]
|
cs/0502044 | Martin Lotz | Peter Buergisser, Martin Lotz | The complexity of computing the Hilbert polynomial of smooth
equidimensional complex projective varieties | null | null | null | null | cs.SC cs.CC | null | We continue the study of counting complexity begun in [Buergisser, Cucker 04]
and [Buergisser, Cucker, Lotz 05] by proving upper and lower bounds on the
complexity of computing the Hilbert polynomial of a homogeneous ideal. We show
that the problem of computing the Hilbert polynomial of a smooth
equidimensional complex projective variety can be reduced in polynomial time to
the problem of counting the number of complex common zeros of a finite set of
multivariate polynomials. Moreover, we prove that the more general problem of
computing the Hilbert polynomial of a homogeneous ideal is polynomial space
hard. This implies polynomial space lower bounds for both the problems of
computing the rank and the Euler characteristic of cohomology groups of
coherent sheaves on projective space, improving the #P-lower bound of Bach (JSC
1999).
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 17:10:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buergisser",
"Peter",
""
],
[
"Lotz",
"Martin",
""
]
]
|
cs/0502045 | Gianluca Argentini | Gianluca Argentini | Adaptive grids as parametrized scale-free networks | 10 pages, 3 figures | null | null | null | cs.NA math-ph math.AP math.MP physics.flu-dyn | null | In this paper we present a possible model of adaptive grids for numerical
resolution of differential problems, using physical or geometrical properties,
as viscosity or velocity gradient of a moving fluid. The relation between the
values of grid step and these entities is based on the mathematical scheme
offered by the model of scale-free networks, due to Barabasi, so that the step
can be connected to the other variables by a constitutive relation. Some
examples and an application are discussed, showing that this approach can be
further developed for treatment of more complex situations.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 17:51:26 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Feb 2005 00:12:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
|
cs/0502046 | Didier Bert | Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG) | Proof obligations for specification and refinement of liveness
properties under weak fairness | null | null | null | Rapport LSR IMAG : RR 1071-I LSR 20 | cs.LO | null | In this report, we present a formal model of fair iteration of events for B
event systems. The model is used to justify proof obligations for basic
liveness properties and preservation under refinement of general liveness
properties. The model of fair iteration of events uses the dovetail operator,
an operator proposed by Broy and Nelson to model fair choice. The proofs are
mainly founded in fixpoint calculations of fair iteration of events and weakest
precondition calculus.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 09:23:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barradas",
"Hector Ruiz",
"",
"LSR - IMAG"
],
[
"Bert",
"Didier",
"",
"LSR - IMAG"
]
]
|
cs/0502048 | Nikolaos Papanikolaou | Rajagopal Nagarajan, Nikolaos Papanikolaou, Garry Bowen, Simon Gay | An Automated Analysis of the Security of Quantum Key Distribution | null | null | null | null | cs.CR quant-ph | null | This paper discusses the use of computer-aided verification as a practical
means for analysing quantum information systems; specifically, the BB84
protocol for quantum key distribution is examined using this method. This
protocol has been shown to be unconditionally secure against all attacks in an
information-theoretic setting, but the relevant security proof requires a
thorough understanding of the formalism of quantum mechanics and is not easily
adaptable to practical scenarios. Our approach is based on probabilistic
model-checking; we have used the PRISM model-checker to show that, as the
number of qubits transmitted in BB84 is increased, the equivocation of the
eavesdropper with respect to the channel decreases exponentially. We have also
shown that the probability of detecting the presence of an eavesdropper
increases exponentially with the number of qubits. The results presented here
are a testament to the effectiveness of the model-checking approach for systems
where analytical solutions may not be possible or plausible.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 13:49:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nagarajan",
"Rajagopal",
""
],
[
"Papanikolaou",
"Nikolaos",
""
],
[
"Bowen",
"Garry",
""
],
[
"Gay",
"Simon",
""
]
]
|
cs/0502051 | Richard McClatchey | Zaheer Abbas, Muhammad Umer, Mohammed Odeh, Richard McClatchey, Arshad
Ali, Farooq Ahmad | A Semantic Grid-based E-Learning Framework (SELF) | 8 pages, 2 tables, 3 figures | null | null | null | cs.DC | null | E-learning can be loosely defined as a wide set of applications and
processes, which uses available electronic media (and tools) to deliver
vocational education and training. With its increasing recognition as an
ubiquitous mode of instruction and interaction in the academic as well as
corporate world, the need for a scaleable and realistic model is becoming
important. In this paper we introduce SELF; a Semantic grid-based E-Learning
Framework. SELF aims to identify the key-enablers in a practical grid-based
E-learning environment and to minimize technological reworking by proposing a
well-defined interaction plan among currently available tools and technologies.
We define a dichotomy with E-learning specific application layers on top and
semantic grid-based support layers underneath. We also map the latest open and
freeware technologies with various components in SELF.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 17:22:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abbas",
"Zaheer",
""
],
[
"Umer",
"Muhammad",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Ahmad",
"Farooq",
""
]
]
|
cs/0502052 | Dmitry Mogilevsky | Dmitry Mogilevsky | Log Analysis Case Study Using LoGS | null | null | null | null | cs.CR cs.IR | null | A very useful technique a network administrator can use to identify
problematic network behavior is careful analysis of logs of incoming and
outgoing network flows. The challenge one faces when attempting to undertake
this course of action, though, is that large networks tend to generate an
extremely large quantity of network traffic in a very short period of time,
resulting in very large traffic logs which must be analyzed post-generation
with an eye for contextual information which may reveal symptoms of problematic
traffic. A better technique is to perform real-time log analysis using a
real-time context-generating tool such as LoGS.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2005 19:49:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mogilevsky",
"Dmitry",
""
]
]
|
cs/0502054 | Ion Mandoiu | Ion I. Mandoiu, Claudia Prajescu, Dragos Trinca | Improved Tag Set Design and Multiplexing Algorithms for Universal Arrays | null | null | null | null | cs.DS | null | In this paper we address two optimization problems arising in the design of
genomic assays based on universal tag arrays. First, we address the universal
array tag set design problem. For this problem, we extend previous formulations
to incorporate antitag-to-antitag hybridization constraints in addition to
constraints on antitag-to-tag hybridization specificity, establish a
constructive upper bound on the maximum number of tags satisfying the extended
constraints, and propose a simple greedy tag selection algorithm. Second, we
give methods for improving the multiplexing rate in large-scale genomic assays
by combining primer selection with tag assignment. Experimental results on
simulated data show that this integrated optimization leads to reductions of up
to 50% in the number of required arrays.
| [
{
"version": "v1",
"created": "Thu, 10 Feb 2005 20:20:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mandoiu",
"Ion I.",
""
],
[
"Prajescu",
"Claudia",
""
],
[
"Trinca",
"Dragos",
""
]
]
|
cs/0502057 | Kumara Sastry | Kumara Sastry, Martin Pelikan, David E. Goldberg | Decomposable Problems, Niching, and Scalability of Multiobjective
Estimation of Distribution Algorithms | Submitted to Genetic and Evolutionary Computation Conference,
GECCO-2005 | null | null | IlliGAL Report No. 2005004 | cs.NE cs.AI | null | The paper analyzes the scalability of multiobjective estimation of
distribution algorithms (MOEDAs) on a class of boundedly-difficult
additively-separable multiobjective optimization problems. The paper
illustrates that even if the linkage is correctly identified, massive
multimodality of the search problems can easily overwhelm the nicher and lead
to exponential scale-up. Facetwise models are subsequently used to propose a
growth rate of the number of differing substructures between the two objectives
to avoid the niching method from being overwhelmed and lead to polynomial
scalability of MOEDAs.
| [
{
"version": "v1",
"created": "Sat, 12 Feb 2005 22:29:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sastry",
"Kumara",
""
],
[
"Pelikan",
"Martin",
""
],
[
"Goldberg",
"David E.",
""
]
]
|
cs/0502059 | Stanko Shtrakov | Stanko Shtrakov and Anton Stoilov | New approach for Finite Difference Method for Thermal Analysis of
Passive Solar Systems | 7 pages, 4 figures | null | null | null | cs.NA | null | Mathematical treatment of massive wall systems is a useful tool for
investigation of these solar applications. The objectives of this work are to
develop (and validate) a numerical solution model for predication the thermal
behaviour of passive solar systems with massive wall, to improve knowledge of
using indirect passive solar systems and assess its energy efficiency according
to climatic conditions in Bulgaria. The problem of passive solar systems with
massive walls is modelled by thermal and mass transfer equations. As a boundary
conditions for the mathematical problem are used equations, which describe
influence of weather data and constructive parameters of building on the
thermal performance of the passive system. The mathematical model is solved by
means of finite differences method and improved solution procedure. In article
are presented results of theoretical and experimental study for developing and
validating a numerical solution model for predication the thermal behaviour of
passive solar systems with massive wall.
| [
{
"version": "v1",
"created": "Sun, 13 Feb 2005 15:29:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Stanko",
""
],
[
"Stoilov",
"Anton",
""
]
]
|
cs/0502060 | Jean-Philippe Rennard | J.-Ph Rennard | Perspectives for Strong Artificial Life | 19 pages, 5 figures | Rennard, J.-Ph., (2004), Perspective for Strong Artificial Life in
De Castro, L.N. & von Zuben F.J. (Eds), Recent Developments in Biologically
Inspired Computing, Hershey:IGP, 301-318 | null | null | cs.AI | null | This text introduces the twin deadlocks of strong artificial life.
Conceptualization of life is a deadlock both because of the existence of a
continuum between the inert and the living, and because we only know one
instance of life. Computationalism is a second deadlock since it remains a
matter of faith. Nevertheless, artificial life realizations quickly progress
and recent constructions embed an always growing set of the intuitive
properties of life. This growing gap between theory and realizations should
sooner or later crystallize in some kind of paradigm shift and then give clues
to break the twin deadlocks.
| [
{
"version": "v1",
"created": "Sun, 13 Feb 2005 18:20:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rennard",
"J. -Ph",
""
]
]
|
cs/0502061 | Avishai Wool | Sagy Bar, Mira Gonen, Avishai Wool | A Geographic Directed Preferential Internet Topology Model | 21 pages, 4 figures | null | null | null | cs.NI cs.AR | null | The goal of this work is to model the peering arrangements between Autonomous
Systems (ASes). Most existing models of the AS-graph assume an undirected
graph. However, peering arrangements are mostly asymmetric Customer-Provider
arrangements, which are better modeled as directed edges. Furthermore, it is
well known that the AS-graph, and in particular its clustering structure, is
influenced by geography.
We introduce a new model that describes the AS-graph as a directed graph,
with an edge going from the customer to the provider, but also models symmetric
peer-to-peer arrangements, and takes geography into account. We are able to
mathematically analyze its power-law exponent and number of leaves. Beyond the
analysis we have implemented our model as a synthetic network generator we call
GdTang. Experimentation with GdTang shows that the networks it produces are
more realistic than those generated by other network generators, in terms of
its power-law exponent, fractions of customer-provider and symmetric peering
arrangements, and the size of its dense core. We believe that our model is the
first to manifest realistic regional dense cores that have a clear geographic
flavor. Our synthetic networks also exhibit path inflation effects that are
similar to those observed in the real AS graph.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2005 11:39:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bar",
"Sagy",
""
],
[
"Gonen",
"Mira",
""
],
[
"Wool",
"Avishai",
""
]
]
|
cs/0502062 | Markus Volkmer | Markus Volkmer and Sebastian Wallner | Tree Parity Machine Rekeying Architectures | null | IEEE Transactions on Computers Vol. 54 No. 4, pp. 421-427, April
2005 | null | null | cs.CR cs.AR | null | The necessity to secure the communication between hardware components in
embedded systems becomes increasingly important with regard to the secrecy of
data and particularly its commercial use. We suggest a low-cost (i.e. small
logic-area) solution for flexible security levels and short key lifetimes. The
basis is an approach for symmetric key exchange using the synchronisation of
Tree Parity Machines. Fast successive key generation enables a key exchange
within a few milliseconds, given realistic communication channels with a
limited bandwidth. For demonstration we evaluate characteristics of a
standard-cell ASIC design realisation as IP-core in 0.18-micrometer
CMOS-technology.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2005 13:06:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Volkmer",
"Markus",
""
],
[
"Wallner",
"Sebastian",
""
]
]
|
cs/0502064 | J\=anis Buls | Janis Buls | The Lattice of Machine Invariant Sets and Subword Complexity | 9 pages, extended abstract published in 67th Workshop on General
Algebra | null | null | null | cs.CR cs.CC cs.DM | null | We investigate the lattice of machine invariant classes. This is an infinite
completely distributive lattice but it is not a Boolean lattice. We show the
subword complexity and the growth function create machine invariant classes. So
the lattice would serve as a measure of words cryptographic quality if we like
to identify new stream ciphers suitable for widespread adoption.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2005 15:28:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buls",
"Janis",
""
]
]
|
cs/0502066 | Mark Braverman | Mark Braverman | On the Complexity of Real Functions | null | null | null | null | cs.CC cs.NA math.NA | null | We develop a notion of computability and complexity of functions over the
reals, which seems to be very natural when one tries to determine just how
"difficult" a certain function is. This notion can be viewed as an extension of
both BSS computability [Blum, Cucker, Shub, Smale 1998], and bit computability
in the tradition of computable analysis [Weihrauch 2000] as it relies on the
latter but allows some discontinuities and multiple values.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 05:24:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Braverman",
"Mark",
""
]
]
|
cs/0502067 | Marcus Hutter | Jan Poland and Marcus Hutter | Master Algorithms for Active Experts Problems based on Increasing Loss
Values | 8 two-column pages, latex2e | Proc. 14th Dutch-Belgium Conf. on Machine Learning (Benelearn
2005) 59-66 | null | IDSIA-01-05 | cs.LG cs.AI | null | We specify an experts algorithm with the following characteristics: (a) it
uses only feedback from the actions actually chosen (bandit setup), (b) it can
be applied with countably infinite expert classes, and (c) it copes with losses
that may grow in time appropriately slowly. We prove loss bounds against an
adaptive adversary. From this, we obtain master algorithms for "active experts
problems", which means that the master's actions may influence the behavior of
the adversary. Our algorithm can significantly outperform standard experts
algorithms on such problems. Finally, we combine it with a universal expert
class. This results in a (computationally infeasible) universal master
algorithm which performs - in a certain sense - almost as well as any
computable strategy, for any online problem.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 14:59:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
]
|
cs/0502068 | John Tromp | John Tromp and Rudi Cilibrasi | Limits of Rush Hour Logic Complexity | null | null | null | null | cs.CC | null | Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation
inspired by the ``Rush Hour'' toy puzzle, in which cars can move horizontally
or vertically within a parking lot. The authors show how the model supports
polynomial space computation, using certain car configurations as building
blocks to construct boolean circuits for a cpu and memory. They consider the
use of cars of length 3 crucial to their construction, and conjecture that cars
of size 2 only, which we'll call `Size 2 Rush Hour', do not support polynomial
space computation. We settle this conjecture by showing that the required
building blocks are constructible in Size 2 Rush Hour. Furthermore, we consider
Unit Rush Hour, which was hitherto believed to be trivial, show its relation to
maze puzzles, and provide empirical support for its hardness.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 14:22:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tromp",
"John",
""
],
[
"Cilibrasi",
"Rudi",
""
]
]
|
cs/0502070 | Erik Demaine | Erik D. Demaine and MohammadTaghi Hajiaghayi | Bidimensionality, Map Graphs, and Grid Minors | 12 pages | null | null | null | cs.DM cs.DS | null | In this paper we extend the theory of bidimensionality to two families of
graphs that do not exclude fixed minors: map graphs and power graphs. In both
cases we prove a polynomial relation between the treewidth of a graph in the
family and the size of the largest grid minor. These bounds improve the running
times of a broad class of fixed-parameter algorithms. Our novel technique of
using approximate max-min relations between treewidth and size of grid minors
is powerful, and we show how it can also be used, e.g., to prove a linear
relation between the treewidth of a bounded-genus graph and the treewidth of
its dual.
| [
{
"version": "v1",
"created": "Wed, 16 Feb 2005 19:01:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
]
]
|
cs/0502072 | Jim Gray | William OMullane, Nolan Li, Maria Nieto-Santisteban, Alex Szalay, Ani
Thakar, Jim Gray | Batch is back: CasJobs, serving multi-TB data on the Web | null | null | null | Microsoft Technical Report MSR TR 2005 19 | cs.DC cs.DB | null | The Sloan Digital Sky Survey (SDSS) science database describes over 140
million objects and is over 1.5 TB in size. The SDSS Catalog Archive Server
(CAS) provides several levels of query interface to the SDSS data via the
SkyServer website. Most queries execute in seconds or minutes. However, some
queries can take hours or days, either because they require non-index scans of
the largest tables, or because they request very large result sets, or because
they represent very complex aggregations of the data. These "monster queries"
not only take a long time, they also affect response times for everyone else -
one or more of them can clog the entire system. To ameliorate this problem, we
developed a multi-server multi-queue batch job submission and tracking system
for the CAS called CasJobs. The transfer of very large result sets from queries
over the network is another serious problem. Statistics suggested that much of
this data transfer is unnecessary; users would prefer to store results locally
in order to allow further joins and filtering. To allow local analysis, a
system was developed that gives users their own personal databases (MyDB) at
the server side. Users may transfer data to their MyDB, and then perform
further analysis before extracting it to their own machine. MyDB tables also
provide a convenient way to share results of queries with collaborators without
downloading them. CasJobs is built using SOAP XML Web services and has been in
operation since May 2004.
| [
{
"version": "v1",
"created": "Thu, 17 Feb 2005 01:55:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"OMullane",
"William",
""
],
[
"Li",
"Nolan",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Szalay",
"Alex",
""
],
[
"Thakar",
"Ani",
""
],
[
"Gray",
"Jim",
""
]
]
|
cs/0502078 | Michael Fink | Thomas Eiter, Michael Fink, and Stefan Woltran | Semantical Characterizations and Complexity of Equivalences in Answer
Set Programming | 58 pages, 6 tables. The contents were partially published in:
Proceedings 19th International Conference on Logic Programming (ICLP 2003),
pp. 224-238, LNCS 2916, Springer, 2003; and Proceedings 9th European
Conference on Logics in Artificial Intelligence (JELIA 2004), pp. 161-173,
LNCS 3229, Springer, 2004 | null | null | 1843-05-01 | cs.AI cs.CC | null | In recent research on non-monotonic logic programming, repeatedly strong
equivalence of logic programs P and Q has been considered, which holds if the
programs P union R and Q union R have the same answer sets for any other
program R. This property strengthens equivalence of P and Q with respect to
answer sets (which is the particular case for R is the empty set), and has its
applications in program optimization, verification, and modular logic
programming. In this paper, we consider more liberal notions of strong
equivalence, in which the actual form of R may be syntactically restricted. On
the one hand, we consider uniform equivalence, where R is a set of facts rather
than a set of rules. This notion, which is well known in the area of deductive
databases, is particularly useful for assessing whether programs P and Q are
equivalent as components of a logic program which is modularly structured. On
the other hand, we consider relativized notions of equivalence, where R ranges
over rules over a fixed alphabet, and thus generalize our results to
relativized notions of strong and uniform equivalence. For all these notions,
we consider disjunctive logic programs in the propositional (ground) case, as
well as some restricted classes, provide semantical characterizations and
analyze the computational complexity. Our results, which naturally extend to
answer set semantics for programs with strong negation, complement the results
on strong equivalence of logic programs and pave the way for optimizations in
answer set solvers as a tool for input-based problem solving.
| [
{
"version": "v1",
"created": "Fri, 18 Feb 2005 11:01:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eiter",
"Thomas",
""
],
[
"Fink",
"Michael",
""
],
[
"Woltran",
"Stefan",
""
]
]
|
cs/0502082 | Thomas Linke | Kathrin Konczak, Thomas Linke, Torsten Schaub | Graphs and colorings for answer set programming | null | null | null | null | cs.AI cs.LO | null | We investigate the usage of rule dependency graphs and their colorings for
characterizing and computing answer sets of logic programs. This approach
provides us with insights into the interplay between rules when inducing answer
sets. We start with different characterizations of answer sets in terms of
totally colored dependency graphs that differ in graph-theoretical aspects. We
then develop a series of operational characterizations of answer sets in terms
of operators on partial colorings. In analogy to the notion of a derivation in
proof theory, our operational characterizations are expressed as
(non-deterministically formed) sequences of colorings, turning an uncolored
graph into a totally colored one. In this way, we obtain an operational
framework in which different combinations of operators result in different
formal properties. Among others, we identify the basic strategy employed by the
noMoRe system and justify its algorithmic approach. Furthermore, we distinguish
operations corresponding to Fitting's operator as well as to well-founded
semantics. (To appear in Theory and Practice of Logic Programming (TPLP))
| [
{
"version": "v1",
"created": "Mon, 21 Feb 2005 14:28:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Konczak",
"Kathrin",
""
],
[
"Linke",
"Thomas",
""
],
[
"Schaub",
"Torsten",
""
]
]
|
cs/0502085 | Fabien Viger | Fabien Viger (LIAFA, Regal Ur-R Lip6), Matthieu Latapy (LIAFA) | Fast generation of random connected graphs with prescribed degrees | null | null | null | null | cs.NI cond-mat.dis-nn cs.DM | null | We address here the problem of generating random graphs uniformly from the
set of simple connected graphs having a prescribed degree sequence. Our goal is
to provide an algorithm designed for practical use both because of its ability
to generate very large graphs (efficiency) and because it is easy to implement
(simplicity). We focus on a family of heuristics for which we prove optimality
conditions, and show how this optimality can be reached in practice. We then
propose a different approach, specifically designed for typical real-world
degree distributions, which outperforms the first one. Assuming a conjecture
which we state and argue rigorously, we finally obtain an log-linear algorithm,
which, in spite of being very simple, improves the best known complexity.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 07:59:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Viger",
"Fabien",
"",
"LIAFA, Regal Ur-R Lip6"
],
[
"Latapy",
"Matthieu",
"",
"LIAFA"
]
]
|
cs/0502086 | Pierre-Yves Oudeyer | Pierre-Yves Oudeyer | The Self-Organization of Speech Sounds | null | Journal of Theoretical Biology 233 (2005) Issue 3, Pages 435-449 | null | null | cs.LG cs.AI cs.CL cs.NE cs.RO math.DS | null | The speech code is a vehicle of language: it defines a set of forms used by a
community to carry information. Such a code is necessary to support the
linguistic interactions that allow humans to communicate. How then may a speech
code be formed prior to the existence of linguistic interactions? Moreover, the
human speech code is discrete and compositional, shared by all the individuals
of a community but different across communities, and phoneme inventories are
characterized by statistical regularities. How can a speech code with these
properties form? We try to approach these questions in the paper, using the
"methodology of the artificial". We build a society of artificial agents, and
detail a mechanism that shows the formation of a discrete speech code without
pre-supposing the existence of linguistic capacities or of coordinated
interactions. The mechanism is based on a low-level model of sensory-motor
interactions. We show that the integration of certain very simple and non
language-specific neural devices leads to the formation of a speech code that
has properties similar to the human speech code. This result relies on the
self-organizing properties of a generic coupling between perception and
production within agents, and on the interactions between agents. The
artificial system helps us to develop better intuitions on how speech might
have appeared, by showing how self-organization might have helped natural
selection to find speech.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 09:51:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oudeyer",
"Pierre-Yves",
""
]
]
|
cs/0502087 | Peter Turney | Robert Ewaschuk, Peter Turney | Self-Replicating Strands that Self-Assemble into User-Specified Meshes | 27 pages, issued 2005, Java code available at
http://purl.org/net/johnnyvon/ | null | null | NRC-47442, ERB-1121 | cs.NE cs.CE cs.MA | null | It has been argued that a central objective of nanotechnology is to make
products inexpensively, and that self-replication is an effective approach to
very low-cost manufacturing. The research presented here is intended to be a
step towards this vision. In previous work (JohnnyVon 1.0), we simulated
machines that bonded together to form self-replicating strands. There were two
types of machines (called types 0 and 1), which enabled strands to encode
arbitrary bit strings. However, the information encoded in the strands had no
functional role in the simulation. The information was replicated without being
interpreted, which was a significant limitation for potential manufacturing
applications. In the current work (JohnnyVon 2.0), the information in a strand
is interpreted as instructions for assembling a polygonal mesh. There are now
four types of machines and the information encoded in a strand determines how
it folds. A strand may be in an unfolded state, in which the bonds are straight
(although they flex slightly due to virtual forces acting on the machines), or
in a folded state, in which the bond angles depend on the types of machines. By
choosing the sequence of machine types in a strand, the user can specify a
variety of polygonal shapes. A simulation typically begins with an initial
unfolded seed strand in a soup of unbonded machines. The seed strand replicates
by bonding with free machines in the soup. The child strands fold into the
encoded polygonal shape, and then the polygons drift together and bond to form
a mesh. We demonstrate that a variety of polygonal meshes can be manufactured
in the simulation, by simply changing the sequence of machine types in the
seed.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 16:53:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ewaschuk",
"Robert",
""
],
[
"Turney",
"Peter",
""
]
]
|
cs/0502088 | Pascal Hitzler | Pascal Hitzler | Towards a Systematic Account of Different Semantics for Logic Programs | 20 pages | null | null | null | cs.AI cs.LO | null | In [Hitzler and Wendt 2002, 2005], a new methodology has been proposed which
allows to derive uniform characterizations of different declarative semantics
for logic programs with negation. One result from this work is that the
well-founded semantics can formally be understood as a stratified version of
the Fitting (or Kripke-Kleene) semantics. The constructions leading to this
result, however, show a certain asymmetry which is not readily understood. We
will study this situation here with the result that we will obtain a coherent
picture of relations between different semantics for normal logic programs.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 18:53:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hitzler",
"Pascal",
""
]
]
|
cs/0502090 | Achim Streit | A. Streit, D. Erwin, Th. Lippert, D. Mallmann, R. Menday, M. Rambadt,
M. Riedel, M. Romberg, B. Schuller, Ph. Wieder | UNICORE - From Project Results to Production Grids | 21 pages, 3 figures | null | null | null | cs.DC cs.OS | null | The UNICORE Grid-technology provides a seamless, secure and intuitive access
to distributed Grid resources. In this paper we present the recent evolution
from project results to production Grids. At the beginning UNICORE was
developed as a prototype software in two projects funded by the German research
ministry (BMBF). Over the following years, in various European-funded projects,
UNICORE evolved to a full-grown and well-tested Grid middleware system, which
today is used in daily production at many supercomputing centers worldwide.
Beyond this production usage, the UNICORE technology serves as a solid basis in
many European and International research projects, which use existing UNICORE
components to implement advanced features, high level services, and support for
applications from a growing range of domains. In order to foster these ongoing
developments, UNICORE is available as open source under BSD licence at
SourceForge, where new releases are published on a regular basis. This paper is
a review of the UNICORE achievements so far and gives a glimpse on the UNICORE
roadmap.
| [
{
"version": "v1",
"created": "Thu, 24 Feb 2005 14:13:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Streit",
"A.",
""
],
[
"Erwin",
"D.",
""
],
[
"Lippert",
"Th.",
""
],
[
"Mallmann",
"D.",
""
],
[
"Menday",
"R.",
""
],
[
"Rambadt",
"M.",
""
],
[
"Riedel",
"M.",
""
],
[
"Romberg",
"M.",
""
],
[
"Schuller",
"B.",
""
],
[
"Wieder",
"Ph.",
""
]
]
|
cs/0502093 | Alessandro Mei | Alessandro Mei and Romeo Rizzi | Online Permutation Routing in Partitioned Optical Passive Star Networks | null | null | null | null | cs.DC | null | This paper establishes the state of the art in both deterministic and
randomized online permutation routing in the POPS network. Indeed, we show that
any permutation can be routed online on a POPS network either with
$O(\frac{d}{g}\log g)$ deterministic slots, or, with high probability, with
$5c\lceil d/g\rceil+o(d/g)+O(\log\log g)$ randomized slots, where constant
$c=\exp (1+e^{-1})\approx 3.927$. When $d=\Theta(g)$, that we claim to be the
"interesting" case, the randomized algorithm is exponentially faster than any
other algorithm in the literature, both deterministic and randomized ones. This
is true in practice as well. Indeed, experiments show that it outperforms its
rivals even starting from as small a network as a POPS(2,2), and the gap grows
exponentially with the size of the network. We can also show that, under proper
hypothesis, no deterministic algorithm can asymptotically match its
performance.
| [
{
"version": "v1",
"created": "Sat, 26 Feb 2005 00:07:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mei",
"Alessandro",
""
],
[
"Rizzi",
"Romeo",
""
]
]
|
cs/0502094 | Samir Aknine | Samir Aknine, Onn Shehory | Coalition Formation: Concessions, Task Relationships and Complexity
Reduction | null | null | null | null | cs.MA | null | Solutions to the coalition formation problem commonly assume agent
rationality and, correspondingly, utility maximization. This in turn may
prevent agents from making compromises. As shown in recent studies, compromise
may facilitate coalition formation and increase agent utilities. In this study
we leverage on those new results. We devise a novel coalition formation
mechanism that enhances compromise. Our mechanism can utilize information on
task dependencies to reduce formation complexity. Further, it works well with
both cardinal and ordinal task values. Via experiments we show that the use of
the suggested compromise-based coalition formation mechanism provides
significant savings in the computation and communication complexity of
coalition formation. Our results also show that when information on task
dependencies is used, the complexity of coalition formation is further reduced.
We demonstrate successful use of the mechanism for collaborative information
filtering, where agents combine linguistic rules to analyze documents'
contents.
| [
{
"version": "v1",
"created": "Sun, 27 Feb 2005 18:16:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aknine",
"Samir",
""
],
[
"Shehory",
"Onn",
""
]
]
|
cs/0502095 | Leandro Marturelli Schaeffer | Gilson A. Giraldi, Leandro S. Marturelli, Paulo S. Rodrigues | Gradient Vector Flow Models for Boundary Extraction in 2D Images | 8 pages, 11 figures | null | null | null | cs.CV | null | The Gradient Vector Flow (GVF) is a vector diffusion approach based on
Partial Differential Equations (PDEs). This method has been applied together
with snake models for boundary extraction medical images segmentation. The key
idea is to use a diffusion-reaction PDE to generate a new external force field
that makes snake models less sensitivity to initialization as well as improves
the snake's ability to move into boundary concavities. In this paper, we
firstly review basic results about convergence and numerical analysis of usual
GVF schemes. We point out that GVF presents numerical problems due to
discontinuities image intensity. This point is considered from a practical
viewpoint from which the GVF parameters must follow a relationship in order to
improve numerical convergence. Besides, we present an analytical analysis of
the GVF dependency from the parameters values. Also, we observe that the method
can be used for multiply connected domains by just imposing the suitable
boundary condition. In the experimental results we verify these theoretical
points and demonstrate the utility of GVF on a segmentation approach that we
have developed based on snakes.
| [
{
"version": "v1",
"created": "Mon, 28 Feb 2005 15:09:08 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2005 19:19:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Marturelli",
"Leandro S.",
""
],
[
"Rodrigues",
"Paulo S.",
""
]
]
|
cs/0502096 | Jano van Hemert | J.I. van Hemert | Property analysis of symmetric travelling salesman problem instances
acquired through evolution | To be published in G. Raidl and J. Gottlieb, editors, Evolutionary
Computation in Combinatorial Optimization, Springer Lecture Notes on Computer
Science, pages 122-131. Springer-Verlag, Berlin, 2005 | null | null | null | cs.NE cs.AI | null | We show how an evolutionary algorithm can successfully be used to evolve a
set of difficult to solve symmetric travelling salesman problem instances for
two variants of the Lin-Kernighan algorithm. Then we analyse the instances in
those sets to guide us towards deferring general knowledge about the efficiency
of the two variants in relation to structural properties of the symmetric
travelling sale sman problem.
| [
{
"version": "v1",
"created": "Mon, 28 Feb 2005 16:40:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van Hemert",
"J. I.",
""
]
]
|
cs/0503001 | Emanuel Diamant | Emanuel Diamant | Top-Down Unsupervised Image Segmentation (it sounds like oxymoron, but
actually it is not) | null | null | null | null | cs.CV cs.IR | null | Pattern recognition is generally assumed as an interaction of two inversely
directed image-processing streams: the bottom-up information details gathering
and localization (segmentation) stream, and the top-down information features
aggregation, association and interpretation (recognition) stream. Inspired by
recent evidence from biological vision research and by the insights of
Kolmogorov Complexity theory, we propose a new, just top-down evolving,
procedure of initial image segmentation. We claim that traditional top-down
cognitive reasoning, which is supposed to guide the segmentation process to its
final result, is not at all a part of the image information content evaluation.
And that initial image segmentation is certainly an unsupervised process. We
present some illustrative examples, which support our claims.
| [
{
"version": "v1",
"created": "Tue, 1 Mar 2005 05:17:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
]
|
cs/0503002 | Lester Lobo | Lester Lobo, James D. Arthur | Local and Global Analysis: Complementary Activities for Increasing the
Effectiveness of Requirements Verification and Validation | 6 pages, 3 figures, published: ACM Southeast Conference, March 2005 | null | null | null | cs.SE | null | This paper presents a unique approach to connecting requirements engineering
(RE) activities into a process framework that can be employed to obtain quality
requirements with reduced expenditures of effort and cost. We propose a
two-phase model that is novel in that it introduces the concept of verification
and validation (V&V) early in the requirements life cycle. In the first phase,
we perform V&V immediately following the elicitation of requirements for each
individually distinct system function. Because the first phase focuses on
capturing smaller sets of related requirements iteratively, each corresponding
V&V activity is better focused for detecting and correcting errors in each
requirement set. In the second phase, a complementary verification activity is
initiated; the corresponding focus is on the quality of linkages between
requirements sets rather than on the requirements within the sets.
Consequently, this approach reduces the effort in verification and enhances the
focus on the verification task. Our approach, unlike other models, has a
minimal time delay between the elicitation of requirements and the execution of
the V&V activities. Because of this short time gap, the stakeholders have a
clearer recollection of the requirements, their context and rationale; this
enhances the stakeholder feedback. Furthermore, our model includes activities
that closely align with the effective RE processes employed in the software
industry. Thus, our approach facilitates a better understanding of the flow of
requirements, and provides guidance for the implementation of the RE process.
| [
{
"version": "v1",
"created": "Wed, 2 Mar 2005 00:21:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lobo",
"Lester",
""
],
[
"Arthur",
"James D.",
""
]
]
|
cs/0503004 | Lester Lobo | Lester Lobo, James D. Arthur | Effective Requirements Generation: Synchronizing Early Verification &
Validation, Methods and Method Selection Criteria | 46 pages, 7 figures, 7 tables, provides elaborate description of the
research | null | null | null | cs.SE | null | This paper presents an approach for the implementation and execution of an
effective requirements generation process. We achieve this goal by providing a
well-defined requirements engineering model that includes verification and
validation (V&V), and analysis. In addition, we identify focused activity
objectives and map popular methods to lower-level activities, and define a
criterion based process for optimizing method selection for attendant
activities. Our model, unlike other models, addresses the complete requirements
generation process and consists of activities defined at more adequate levels
of abstraction. Furthermore, our model also incorporates a unique approach to
V&V that enhances quality and reduces the cost of generating requirements.
Additionally, activity objectives are identified and explicitly stated - not
implied as in the current models. To assist in the selection of an appropriate
set of methods, we have mapped commonly used methods to activities based on
their objectives. Finally, we have identified method selection criteria and
prescribed a reduced set of methods that optimize these criteria for each
activity in our model. Thus, our approach assists in the task of selecting
methods by using selection criteria to reduce a large collection of potential
methods to a smaller, manageable set. The model, clear mapping of methods to
activity objectives, and the criteria based process, taken together, provide
the much needed guidance for the effective implementation and execution of the
requirements generation process.
| [
{
"version": "v1",
"created": "Wed, 2 Mar 2005 01:05:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lobo",
"Lester",
""
],
[
"Arthur",
"James D.",
""
]
]
|
cs/0503007 | Johan Bollen | Johan Bollen, Herbert Van de Sompel, Joan Smith and Rick Luce | Toward alternative metrics of journal impact: A comparison of download
and citation data | 34 pages, submitted to Information Processing and Management, special
issue on Informetrics | null | null | null | cs.DL | null | We generated networks of journal relationships from citation and download
data, and determined journal impact rankings from these networks using a set of
social network centrality metrics. The resulting journal impact rankings were
compared to the ISI IF. Results indicate that, although social network metrics
and ISI IF rankings deviate moderately for citation-based journal networks,
they differ considerably for journal networks derived from download data. We
believe the results represent a unique aspect of general journal impact that is
not captured by the ISI IF. These results furthermore raise questions regarding
the validity of the ISI IF as the sole assessment of journal impact, and
suggest the possibility of devising impact metrics based on usage information
in general.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 05:14:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Smith",
"Joan",
""
],
[
"Luce",
"Rick",
""
]
]
|
cs/0503008 | Laurent Tournier | Laurent Tournier (LMC - IMAG) | Approximation of dynamical systems using S-systems theory : application
to biological systems | null | null | null | null | cs.SC math.DS q-bio.MN | null | In this paper we propose a new symbolic-numeric algorithm to find positive
equilibria of a n-dimensional dynamical system. This algorithm implies a
symbolic manipulation of ODE in order to give a local approximation of
differential equations with power-law dynamics (S-systems). A numerical
calculus is then needed to converge towards an equilibrium, giving at the same
time a S-system approximating the initial system around this equilibrium. This
algorithm is applied to a real biological example in 14 dimensions which is a
subsystem of a metabolic pathway in Arabidopsis Thaliana.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 06:32:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tournier",
"Laurent",
"",
"LMC - IMAG"
]
]
|
cs/0503009 | Valmir Barbosa | R. S. C. Leao, V. C. Barbosa | Minimal chordal sense of direction and circulant graphs | null | Lecture Notes in Computer Science 4162 (2006), 670-680 | 10.1007/11821069_58 | null | cs.DM | null | A sense of direction is an edge labeling on graphs that follows a globally
consistent scheme and is known to considerably reduce the complexity of several
distributed problems. In this paper, we study a particular instance of sense of
direction, called a chordal sense of direction (CSD). In special, we identify
the class of k-regular graphs that admit a CSD with exactly k labels (a minimal
CSD). We prove that connected graphs in this class are Hamiltonian and that the
class is equivalent to that of circulant graphs, presenting an efficient
(polynomial-time) way of recognizing it when the graphs' degree k is fixed.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 12:06:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leao",
"R. S. C.",
""
],
[
"Barbosa",
"V. C.",
""
]
]
|
cs/0503014 | Christian W. Straka | Christian W. Straka | ADF95: Tool for automatic differentiation of a FORTRAN code designed for
large numbers of independent variables | 24 pages, 2 figures, 4 tables, accepted in Computer Physics
Communications | null | 10.1016/j.cpc.2005.01.011 | null | cs.MS | null | ADF95 is a tool to automatically calculate numerical first derivatives for
any mathematical expression as a function of user defined independent
variables. Accuracy of derivatives is achieved within machine precision. ADF95
may be applied to any FORTRAN 77/90/95 conforming code and requires minimal
changes by the user. It provides a new derived data type that holds the value
and derivatives and applies forward differencing by overloading all FORTRAN
operators and intrinsic functions. An efficient indexing technique leads to a
reduced memory usage and a substantially increased performance gain over other
available tools with operator overloading. This gain is especially pronounced
for sparse systems with large number of independent variables. A wide class of
numerical simulations, e.g., those employing implicit solvers, can profit from
ADF95.
| [
{
"version": "v1",
"created": "Fri, 4 Mar 2005 19:20:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Straka",
"Christian W.",
""
]
]
|
cs/0503016 | Xiaoming Liu | Xiaoming Liu, Lyudmila Balakireva, Patrick Hochstenbach, Herbert Van
de Sompel | File-based storage of Digital Objects and constituent datastreams:
XMLtapes and Internet Archive ARC files | 12 pages, 1 figures (camera-ready copy for ECDL 2005) | null | null | null | cs.DL | null | This paper introduces the write-once/read-many XMLtape/ARC storage approach
for Digital Objects and their constituent datastreams. The approach combines
two interconnected file-based storage mechanisms that are made accessible in a
protocol-based manner. First, XML-based representations of multiple Digital
Objects are concatenated into a single file named an XMLtape. An XMLtape is a
valid XML file; its format definition is independent of the choice of the
XML-based complex object format by which Digital Objects are represented. The
creation of indexes for both the identifier and the creation datetime of the
XML-based representation of the Digital Objects facilitates OAI-PMH-based
access to Digital Objects stored in an XMLtape. Second, ARC files, as
introduced by the Internet Archive, are used to contain the constituent
datastreams of the Digital Objects in a concatenated manner. An index for the
identifier of the datastream facilitates OpenURL-based access to an ARC file.
The interconnection between XMLtapes and ARC files is provided by conveying the
identifiers of ARC files associated with an XMLtape as administrative
information in the XMLtape, and by including OpenURL references to constituent
datastreams of a Digital Object in the XML-based representation of that Digital
Object.
| [
{
"version": "v1",
"created": "Mon, 7 Mar 2005 23:17:23 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Jun 2005 17:27:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Liu",
"Xiaoming",
""
],
[
"Balakireva",
"Lyudmila",
""
],
[
"Hochstenbach",
"Patrick",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
|
cs/0503017 | Hooman Nikmehr | Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim | A Fast Combined Decimal Adder/Subtractor | This paper has been withdrawn by the authors | null | null | null | cs.OH | null | This paper has been withdrawn.
| [
{
"version": "v1",
"created": "Mon, 7 Mar 2005 23:32:27 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Apr 2005 01:54:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nikmehr",
"Hooman",
""
],
[
"Phillips",
"Braden",
""
],
[
"Lim",
"Cheng-Chew",
""
]
]
|
cs/0503020 | Stevan Harnad | Tim Brody, Stevan Harnad | Earlier Web Usage Statistics as Predictors of Later Citation Impact | null | null | null | null | cs.IR | null | The use of citation counts to assess the impact of research articles is well
established. However, the citation impact of an article can only be measured
several years after it has been published. As research articles are
increasingly accessed through the Web, the number of times an article is
downloaded can be instantly recorded and counted. One would expect the number
of times an article is read to be related both to the number of times it is
cited and to how old the article is. This paper analyses how short-term Web
usage impact predicts medium-term citation impact. The physics e-print archive
(arXiv.org) is used to test this.
| [
{
"version": "v1",
"created": "Tue, 8 Mar 2005 22:26:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brody",
"Tim",
""
],
[
"Harnad",
"Stevan",
""
]
]
|
cs/0503021 | Stevan Harnad | Stevan Harnad | Fast-Forward on the Green Road to Open Access: The Case Against Mixing
Up Green and Gold | null | Ariadne 42 January 2005; http://www.ariadne.ac.uk/issue42/harnad/ | null | null | cs.IR | null | This article is a critique of: "The 'Green' and 'Gold' Roads to Open Access:
The Case for Mixing and Matching" by Jean-Claude Guedon (in Serials Review
30(4) 2004).
Open Access (OA) means: free online access to all peer-reviewed journal
articles. Jean-Claude Guedon argues against the efficacy of author
self-archiving of peer-reviewed journal articles (the "Green" road to OA). He
suggests instead that we should convert to Open Access Publishing (the "Golden"
road to OA) by "mixing and matching" Green and Gold as follows: o First,
self-archive dissertations (not published, peer-reviewed journal articles). o
Second, identify and tag how those dissertations have been evaluated and
reviewed. o Third, self-archive unrefereed preprints (not published,
peer-reviewed journal articles). o Fourth, develop new mechanisms for
evaluating and reviewing those unrefereed preprints, at multiple levels. The
result will be OA Publishing (Gold). I argue that rather than yet another 10
years of speculation like this, what is actually needed (and imminent) is for
OA self-archiving to be mandated by research funders and institutions so that
the self-archiving of published, peer-reviewed journal articles (Green) can be
fast-forwarded to 100% OA.
| [
{
"version": "v1",
"created": "Tue, 8 Mar 2005 22:44:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
]
|
cs/0503022 | Daniel Pfeifer | Daniel Pfeifer and Peter C. Lockemann | Theory and Practice of Transactional Method Caching | null | null | null | 2005-9 | cs.DB | null | Nowadays, tiered architectures are widely accepted for constructing large
scale information systems. In this context application servers often form the
bottleneck for a system's efficiency. An application server exposes an object
oriented interface consisting of set of methods which are accessed by
potentially remote clients. The idea of method caching is to store results of
read-only method invocations with respect to the application server's interface
on the client side. If the client invokes the same method with the same
arguments again, the corresponding result can be taken from the cache without
contacting the server. It has been shown that this approach can considerably
improve a real world system's efficiency.
This paper extends the concept of method caching by addressing the case where
clients wrap related method invocations in ACID transactions. Demarcating
sequences of method calls in this way is supported by many important
application server standards. In this context the paper presents an
architecture, a theory and an efficient protocol for maintaining full
transactional consistency and in particular serializability when using a method
cache on the client side. In order to create a protocol for scheduling cached
method results, the paper extends a classical transaction formalism. Based on
this extension, a recovery protocol and an optimistic serializability protocol
are derived. The latter one differs from traditional transactional cache
protocols in many essential ways. An efficiency experiment validates the
approach: Using the cache a system's performance and scalability are
considerably improved.
| [
{
"version": "v1",
"created": "Wed, 9 Mar 2005 17:53:15 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Mar 2005 12:35:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pfeifer",
"Daniel",
""
],
[
"Lockemann",
"Peter C.",
""
]
]
|
cs/0503023 | Josiah Carlson | Josiah Carlson and David Eppstein | The Weighted Maximum-Mean Subtree and Other Bicriterion Subtree Problems | 10 pages | null | null | null | cs.CG cs.DS | null | We consider problems in which we are given a rooted tree as input, and must
find a subtree with the same root, optimizing some objective function of the
nodes in the subtree. When this function is the sum of constant node weights,
the problem is trivially solved in linear time. When the objective is the sum
of weights that are linear functions of a parameter, we show how to list all
optima for all possible parameter values in O(n log n) time; this parametric
optimization problem can be used to solve many bicriterion optimizations
problems, in which each node has two values xi and yi associated with it, and
the objective function is a bivariate function f(SUM(xi),SUM(yi)) of the sums
of these two values. A special case, when f is the ratio of the two sums, is
the Weighted Maximum-Mean Subtree Problem, or equivalently the Fractional
Prize-Collecting Steiner Tree Problem on Trees; for this special case, we
provide a linear time algorithm for this problem when all weights are positive,
improving a previous O(n log n) solution, and prove that the problem is
NP-complete when negative weights are allowed.
| [
{
"version": "v1",
"created": "Wed, 9 Mar 2005 18:16:14 GMT"
},
{
"version": "v2",
"created": "Wed, 4 May 2005 21:45:54 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Aug 2005 06:06:57 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Dec 2005 01:56:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carlson",
"Josiah",
""
],
[
"Eppstein",
"David",
""
]
]
|
cs/0503024 | Dan Tufis I. | Dan Tufis, Radu Ion, Nancy Ide | Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word
Alignment, Word Clustering and Aligned Wordnets | 7 pages in Proc. of COLING2005 | In proceedings of the 20th International Conference on
Computational Linguistics, COLING2004, Geneva, 2004, pp. 1312-1318 | null | null | cs.AI cs.CL | null | The paper presents a method for word sense disambiguation based on parallel
corpora. The method exploits recent advances in word alignment and word
clustering based on automatic extraction of translation equivalents and being
supported by available aligned wordnets for the languages in the corpus. The
wordnets are aligned to the Princeton Wordnet, according to the principles
established by EuroWordNet. The evaluation of the WSD system, implementing the
method described herein showed very encouraging results. The same system used
in a validation mode, can be used to check and spot alignment errors in
multilingually aligned wordnets as BalkaNet and EuroWordNet.
| [
{
"version": "v1",
"created": "Thu, 10 Mar 2005 11:49:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tufis",
"Dan",
""
],
[
"Ion",
"Radu",
""
],
[
"Ide",
"Nancy",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.