id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0501044
Alexander Haubold
Alexander Haubold, John R. Kender
Augmented Segmentation and Visualization for Presentation Videos
null
null
null
null
cs.MM cs.IR
null
We investigate methods of segmenting, visualizing, and indexing presentation videos by separately considering audio and visual data. The audio track is segmented by speaker, and augmented with key phrases which are extracted using an Automatic Speech Recognizer (ASR). The video track is segmented by visual dissimilarities and augmented by representative key frames. An interactive user interface combines a visual representation of audio, video, text, and key frames, and allows the user to navigate a presentation video. We also explore clustering and labeling of speaker data and present preliminary results.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 17:12:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0501045
Kenneth Clarkson
Kenneth L. Clarkson and Kasturi Varadarajan
Improved Approximation Algorithms for Geometric Set Cover
null
null
null
null
cs.CG cs.DS
null
Given a collection S of subsets of some set U, and M a subset of U, the set cover problem is to find the smallest subcollection C of S such that M is a subset of the union of the sets in C. While the general problem is NP-hard to solve, even approximately, here we consider some geometric special cases, where usually U = R^d. Extending prior results, we show that approximation algorithms with provable performance exist, under a certain general condition: that for a random subset R of S and function f(), there is a decomposition of the portion of U not covered by R into an expected f(|R|) regions, each region of a particular simple form. We show that under this condition, a cover of size O(f(|C|)) can be found. Our proof involves the generalization of shallow cuttings to more general geometric situations. We obtain constant-factor approximation algorithms for covering by unit cubes in R^3, for guarding a one-dimensional terrain, and for covering by similar-sized fat triangles in R^2. We also obtain improved approximation guarantees for fat triangles, of arbitrary size, and for a class of fat objects.
[ { "version": "v1", "created": "Thu, 20 Jan 2005 21:31:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Clarkson", "Kenneth L.", "" ], [ "Varadarajan", "Kasturi", "" ] ]
cs/0501053
Vadim Tropashko
Vadim Tropashko
Relational Algebra as non-Distributive Lattice
9 pages
null
null
null
cs.DB
null
We reduce the set of classic relational algebra operators to two binary operations: natural join and generalized union. We further demonstrate that this set of operators is relationally complete and honors lattice axioms.
[ { "version": "v1", "created": "Fri, 21 Jan 2005 20:07:32 GMT" }, { "version": "v2", "created": "Thu, 3 Feb 2005 03:45:10 GMT" }, { "version": "v3", "created": "Fri, 4 Feb 2005 01:12:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Tropashko", "Vadim", "" ] ]
cs/0501059
Farn Wang
Farn Wang
Under-approximation of the Greatest Fixpoint in Real-Time System Verification
null
null
null
null
cs.SE cs.LO
null
Techniques for the efficient successive under-approximation of the greatest fixpoint in TCTL formulas can be useful in fast refutation of inevitability properties and vacuity checking. We first give an integrated algorithmic framework for both under and over-approximate model-checking. We design the {\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation, as a unified framework for the evaluation of formulas like $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then prove the correctness of a new formulation for the characterization of the NZF predicate based on zone search and the least fixpoint evaluation. The new formulation then leads to the design of an evaluation algorithm, with the capability of successive under-approximation, for $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present techniques to efficiently search for the zones and to speed up the under-approximate evaluation of those three formulas. Our experiments show that the techniques have significantly enhanced the verification performance against several benchmarks over exact model-checking.
[ { "version": "v1", "created": "Sat, 22 Jan 2005 11:02:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ] ]
cs/0501060
Farn Wang
Farn Wang
Under-approximation of the Greatest Fixpoints in Real-Time System Verification
null
null
null
null
cs.SE cs.LO
null
Techniques for the efficient successive under-approximation of the greatest fixpoint in TCTL formulas can be useful in fast refutation of inevitability properties and vacuity checking. We first give an integrated algorithmic framework for both under and over-approximate model-checking. We design the {\em NZF (Non-Zeno Fairness) predicate}, with a greatest fixpoint formulation, as a unified framework for the evaluation of formulas like $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then prove the correctness of a new formulation for the characterization of the NZF predicate based on zone search and the least fixpoint evaluation. The new formulation then leads to the design of an evaluation algorithm, with the capability of successive under-approximation, for $\exists\pfrr\eta_1$, $\exists\pfrr\pevt\eta_1$, and $\exists\pevt\pfrr\eta_1$. We then present techniques to efficiently search for the zones and to speed up the under-approximate evaluation of those three formulas. Our experiments show that the techniques have significantly enhanced the verification performance against several benchmarks over exact model-checking.
[ { "version": "v1", "created": "Sat, 22 Jan 2005 11:03:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Farn", "" ] ]
cs/0501065
Vladimir Clue Mr
Vladimir I Clue
Harmonic Analysis
This new twist in harmonic analysis was primary introduced in Milwaukee's conference http://www.eit-conference.info/papers.asp
null
null
null
cs.NA cs.DM
null
This paper describes a method of calculating the transforms, currently obtained via Fourier and reverse Fourier transforms. The method allows calculating efficiently the transforms of a signal having an arbitrary dimension of the digital representation by reducing the transform to a vector-to-circulant matrix multiplying. There is a connection between harmonic equations in rectangular and polar coordinate systems. The connection established here and used to create a very robust iterative algorithm for a conformal mapping calculation. There is also suggested a new ratio (and an efficient way of computing it) of two oscillative signals.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 00:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Clue", "Vladimir I", "" ] ]
cs/0501068
Jean-Francois Mari
Olivier Aycard (GRAVIR - Imag, Orpailleur Loria), Jean-Francois Mari (ORPAILLEUR Loria), Richard Washington
Learning to automatically detect features for mobile robots using second-order Hidden Markov Models
2004
null
null
null
cs.AI
null
In this paper, we propose a new method based on Hidden Markov Models to interpret temporal sequences of sensor data from mobile robots to automatically detect features. Hidden Markov Models have been used for a long time in pattern recognition, especially in speech recognition. Their main advantages over other methods (such as neural networks) are their ability to model noisy temporal signals of variable length. We show in this paper that this approach is well suited for interpretation of temporal sequences of mobile-robot sensor data. We present two distinct experiments and results: the first one in an indoor environment where a mobile robot learns to detect features like open doors or T-intersections, the second one in an outdoor environment where a different mobile robot has to identify situations like climbing a hill or crossing a rock.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 11:05:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Aycard", "Olivier", "", "GRAVIR - Imag, Orpailleur Loria" ], [ "Mari", "Jean-Francois", "", "ORPAILLEUR Loria" ], [ "Washington", "Richard", "" ] ]
cs/0501069
Supriya Krishnamurthy
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi
A Statistical Theory of Chord under Churn
6 pages, In the 4th International Workshop on Peer-to- Peer Systems (IPTPS'05), Ithaca, New York, USA, 2005
null
null
null
cs.NI cond-mat.stat-mech cs.DC
null
Most earlier studies of Distributed Hash Tables (DHTs) under churn have either depended on simulations as the primary investigation tool, or on establishing bounds for DHTs to function. In this paper, we present a complete analytical study of churn using a master-equation-based approach, used traditionally in non-equilibrium statistical mechanics to describe steady-state or transient phenomena. Simulations are used to verify all theoretical predictions. We demonstrate the application of our methodology to the Chord system. For any rate of churn and stabilization rates, and any system size, we accurately predict the fraction of failed or incorrect successor and finger pointers and show how we can use these quantities to predict the performance and consistency of lookups under churn. We also discuss briefly how churn may actually be of different 'types' and the implications this will have for the functioning of DHTs in general.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 16:22:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Krishnamurthy", "Supriya", "" ], [ "El-Ansary", "Sameh", "" ], [ "Aurell", "Erik", "" ], [ "Haridi", "Seif", "" ] ]
cs/0501070
David Lorenz
David H. Lorenz, Therapon Skotiniotis
Extending Design by Contract for Aspect-Oriented Programming
null
null
null
NU-CCIS-04-14
cs.SE cs.PL
null
Design by Contract (DbC) and runtime enforcement of program assertions enables the construction of more robust software. It also enables the assignment of blame in error reporting. Unfortunately, there is no support for runtime contract enforcement and blame assignment for Aspect-Oriented Programming (AOP). Extending DbC to also cover aspects brings forward a plethora of issues related to the correct order of assertion validation. We show that there is no generally correct execution sequence of object assertions and aspect assertions. A further classification of aspects as agnostic, obedient, or rebellious defines the order of assertion validation that needs to be followed. We describe the application of this classification in a prototyped DbC tool for AOP named Cona, where aspects are used for implementing contracts, and contracts are used for enforcing assertions on aspects.
[ { "version": "v1", "created": "Mon, 24 Jan 2005 20:28:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Lorenz", "David H.", "" ], [ "Skotiniotis", "Therapon", "" ] ]
cs/0501072
Thierry Poibeau
Dominique Dutoit, Thierry Poibeau (LIPN)
Inferring knowledge from a large semantic network
null
Inferring knowledge from a large semantic network (2002) 232-238
null
null
cs.AI
null
In this paper, we present a rich semantic network based on a differential analysis. We then detail implemented measures that take into account common and differential features between words. In a last section, we describe some industrial applications.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 16:09:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutoit", "Dominique", "", "LIPN" ], [ "Poibeau", "Thierry", "", "LIPN" ] ]
cs/0501073
Tom Schrijvers
Tom Schrijvers and Thom Fruehwirth
Optimal Union-Find in Constraint Handling Rules
12 pages, 3 figures, to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.CC cs.DS cs.PF
null
Constraint Handling Rules (CHR) is a committed-choice rule-based language that was originally intended for writing constraint solvers. In this paper we show that it is also possible to write the classic union-find algorithm and variants in CHR. The programs neither compromise in declarativeness nor efficiency. We study the time complexity of our programs: they match the almost-linear complexity of the best known imperative implementations. This fact is illustrated with experimental results.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 13:28:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Schrijvers", "Tom", "" ], [ "Fruehwirth", "Thom", "" ] ]
cs/0501075
Marius Zimand
Marius Zimand
Simple extractors via constructions of cryptographic pseudo-random generators
21 pages, an extended abstract will appear in Proc. ICALP 2005; small corrections, some comments and references added
null
null
null
cs.CC cs.CR
null
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-correcting codes and that are very simple and efficient. For example, one extractor produces each output bit separately in $O(\log^2 n)$ time. These extractors work for weak sources with min entropy $\lambda n$, for arbitrary constant $\lambda > 0$, have seed length $O(\log^2 n)$, and their output length is $\approx n^{\lambda/3}$.
[ { "version": "v1", "created": "Tue, 25 Jan 2005 15:43:11 GMT" }, { "version": "v2", "created": "Wed, 2 Feb 2005 17:55:47 GMT" }, { "version": "v3", "created": "Mon, 9 May 2005 13:29:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Zimand", "Marius", "" ] ]
cs/0501076
Ketan Mulmuley D.
Ketan D. Mulmuley and Milind Sohoni
Geometric Complexity III: on deciding positivity of Littlewood-Richardson coefficients
10 pages
null
null
null
cs.CC math.RT
null
We point out that the remarkable Knutson and Tao Saturation Theorem and polynomial time algorithms for LP have together an important and immediate consequence in Geometric Complexity Theory. The problem of deciding positivity of Littlewood-Richardson coefficients for GLn(C) belongs to P. Furthermore, the algorithm is strongly polynomial. The main goal of this article is to explain the significance of this result in the context of Geometric Complexity Theory. Furthermore, it is also conjectured that an analogous result holds for arbitrary symmetrizable Kac-Moody algebras.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 11:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ], [ "Sohoni", "Milind", "" ] ]
cs/0501077
Andrew Krizhanovsky A.
Alexander Smirnov, Mikhail Pashkin, Nikolai Chilov, Tatiana Levashova, Andrew Krizhanovsky and Alexey Kashevnik
Ontology-Based Users & Requests Clustering in Customer Service Management System
15 pages, 4 figures, published in Lecture Notes in Computer Science
Smirnov A., Pashkin M., Chilov N., Levashova T., Krizhanovsky A., Kashevnik A. 2005. Ontology-Based Users and Requests Clustering in Customer Service Management System. Springer-Verlag GmbH, Lecture Notes in Computer Science, 3505: 231-246
null
null
cs.IR cs.CL
null
Customer Service Management is one of major business activities to better serve company customers through the introduction of reliable processes and procedures. Today this kind of activities is implemented through e-services to directly involve customers into business processes. Traditionally Customer Service Management involves application of data mining techniques to discover usage patterns from the company knowledge memory. Hence grouping of customers/requests to clusters is one of major technique to improve the level of company customization. The goal of this paper is to present an efficient for implementation approach for clustering users and their requests. The approach uses ontology as knowledge representation model to improve the semantic interoperability between units of the company and customers. Some fragments of the approach tested in an industrial company are also presented in the paper.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 14:11:38 GMT" }, { "version": "v2", "created": "Fri, 27 May 2005 13:59:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Smirnov", "Alexander", "" ], [ "Pashkin", "Mikhail", "" ], [ "Chilov", "Nikolai", "" ], [ "Levashova", "Tatiana", "" ], [ "Krizhanovsky", "Andrew", "" ], [ "Kashevnik", "Alexey", "" ] ]
cs/0501078
Liang Zhou
Liang Zhou, Miruna Ticrea and Eduard Hovy
Multi-document Biography Summarization
null
Proceedings of EMNLP, pp. 434-441, 2004
null
null
cs.CL
null
In this paper we describe a biography summarization system using sentence classification and ideas from information retrieval. Although the individual techniques are not new, assembling and applying them to generate multi-document biographies is new. Our system was evaluated in DUC2004. It is among the top performers in task 5-short summaries focused by person questions.
[ { "version": "v1", "created": "Wed, 26 Jan 2005 22:43:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Liang", "" ], [ "Ticrea", "Miruna", "" ], [ "Hovy", "Eduard", "" ] ]
cs/0501079
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
Data Mining for Actionable Knowledge: A Survey
11 pages
null
null
Tr-05-01
cs.DB cs.AI
null
The data mining process consists of a series of steps ranging from data cleaning, data selection and transformation, to pattern evaluation and visualization. One of the central problems in data mining is to make the mined patterns or knowledge actionable. Here, the term actionable refers to the mined patterns suggest concrete and profitable actions to the decision-maker. That is, the user can do something to bring direct benefits (increase in profits, reduction in cost, improvement in efficiency, etc.) to the organization's advantage. However, there has been written no comprehensive survey available on this topic. The goal of this paper is to fill the void. In this paper, we first present two frameworks for mining actionable knowledge that are inexplicitly adopted by existing research methods. Then we try to situate some of the research on this topic from two different viewpoints: 1) data mining tasks and 2) adopted framework. Finally, we specify issues that are either not addressed or insufficiently studied yet and conclude the paper.
[ { "version": "v1", "created": "Thu, 27 Jan 2005 12:13:16 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0501080
Carl Lagoze
Carl Lagoze, Dean B. Krafft, Susan Jesuroga, Tim Cornwell, Ellen J. Cramer, Eddie Shin
An Information Network Overlay Architecture for the NSDL
null
null
null
null
cs.DL
null
We describe the underlying data model and implementation of a new architecture for the National Science Digital Library (NSDL) by the Core Integration Team (CI). The architecture is based on the notion of an information network overlay. This network, implemented as a graph of digital objects in a Fedora repository, allows the representation of multiple information entities and their relationships. The architecture provides the framework for contextualization and reuse of resources, which we argue is essential for the utility of the NSDL as a tool for teaching and learning.
[ { "version": "v1", "created": "Thu, 27 Jan 2005 19:49:11 GMT" }, { "version": "v2", "created": "Wed, 2 Feb 2005 21:04:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean B.", "" ], [ "Jesuroga", "Susan", "" ], [ "Cornwell", "Tim", "" ], [ "Cramer", "Ellen J.", "" ], [ "Shin", "Eddie", "" ] ]
cs/0501083
Jon Phipps
Jon Phipps, Diane I. Hillmann, Gordon Paynter
Orchestrating Metadata Enhancement Services: Introducing Lenny
null
null
null
null
cs.DL
null
Harvested metadata often suffers from uneven quality to the point that utility is compromised. Although some aggregators have developed methods for evaluating and repairing specific metadata problems, it has been unclear how these methods might be scaled into services that can be used within an automated production environment. The National Science Digital Library (NSDL), as part of its work with INFOMINE, has developed a model of ser-vice interaction that enables loosely-coupled third party services to provide metadata enhancements to a central repository, with interactions orchestrated by a centralized software application.
[ { "version": "v1", "created": "Fri, 28 Jan 2005 18:44:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Phipps", "Jon", "" ], [ "Hillmann", "Diane I.", "" ], [ "Paynter", "Gordon", "" ] ]
cs/0501084
Axel Polleres
Thomas Eiter and Axel Polleres
Towards Automated Integration of Guess and Check Programs in Answer Set Programming: A Meta-Interpreter and Applications
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
1843-04-01
cs.AI
null
Answer set programming (ASP) with disjunction offers a powerful tool for declaratively representing and solving hard problems. Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise and intuitive way, where the encoding reflects the typical "guess and check" nature of NP problems: The property is encoded in a way such that polynomial size certificates for it correspond to stable models of a program. However, the problem-solving capacity of full disjunctive logic programs (DLPs) is beyond NP, and captures a class of problems at the second level of the polynomial hierarchy. While these problems also have a clear "guess and check" structure, finding an encoding in a DLP reflecting this structure may sometimes be a non-obvious task, in particular if the "check" itself is a coNP-complete problem; usually, such problems are solved by interleaving separate guess and check programs, where the check is expressed by inconsistency of the check program. In this paper, we present general transformations of head-cycle free (extended) disjunctive logic programs into stratified and positive (extended) disjunctive logic programs based on meta-interpretation techniques. The answer sets of the original and the transformed program are in simple correspondence, and, moreover, inconsistency of the original program is indicated by a designated answer set of the transformed program. Our transformations facilitate the integration of separate "guess" and "check" programs, which are often easy to obtain, automatically into a single disjunctive logic program. Our results complement recent results on meta-interpretation in ASP, and extend methods and techniques for a declarative "guess and check" problem solving paradigm through ASP.
[ { "version": "v1", "created": "Fri, 28 Jan 2005 20:19:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Polleres", "Axel", "" ] ]
cs/0501086
Manuela Kunze
Peter M. Kruse and Andre Naujoks and Dietmar Roesner and Manuela Kunze
Clever Search: A WordNet Based Wrapper for Internet Search Engines
null
Proceedings of 2nd GermaNet Workshop 2005
null
null
cs.AI
null
This paper presents an approach to enhance search engines with information about word senses available in WordNet. The approach exploits information about the conceptual relations within the lexical-semantic net. In the wrapper for search engines presented, WordNet information is used to specify user's request or to classify the results of a publicly available web search engine, like google, yahoo, etc.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 16:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Kruse", "Peter M.", "" ], [ "Naujoks", "Andre", "" ], [ "Roesner", "Dietmar", "" ], [ "Kunze", "Manuela", "" ] ]
cs/0501087
Manoj Kumar
Manoj Kumar
Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards
5 pages
null
null
null
cs.CR
null
In 2000, Hwang and Li proposed a remote user authentication scheme using smart cards to solve the problems of Lamport scheme. Later, Chan- Chang, Shen- Lin- Hwang and then Chang-Hwang pointed out some attacks on Hwang – Li’s scheme. In 2003, Shen, Lin and Hwang also proposed a modified scheme to remove these attacks. In the same year, Leung-Cheng-Fong-Chan showed that modified scheme proposed by Shen-Lin-Hwang is still insecure. In 2004, Awasthi and Lal enhanced Shen-Lin-Hwang’s scheme to overcome its security pitfalls. This paper analyses that the user U/smart card does not provide complete information for the execution and proper running of the login phase of the Awasthi- Lal’s scheme. Furthermore, this paper also modifies the Awasthi- Lal’s scheme for the proper functioning.
[ { "version": "v1", "created": "Sat, 29 Jan 2005 06:44:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0501089
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Issues in Exploiting GermaNet as a Resource in Real Applications
10 pages, 3 figures
null
null
null
cs.AI
null
This paper reports about experiments with GermaNet as a resource within domain specific document analysis. The main question to be answered is: How is the coverage of GermaNet in a specific domain? We report about results of a field test of GermaNet for analyses of autopsy protocols and present a sketch about the integration of GermaNet inside XDOC. Our remarks will contribute to a GermaNet user's wish list.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 10:07:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501093
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Transforming Business Rules Into Natural Language Text
3 pages
in Proceedings of IWCS-6, 2005
null
null
cs.AI
null
The aim of the project presented in this paper is to design a system for an NLG architecture, which supports the documentation process of eBusiness models. A major task is to enrich the formal description of an eBusiness model with additional information needed in an NLG task.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 07:59:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501094
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Corpus based Enrichment of GermaNet Verb Frames
4 pages
in Proceedings of LREC 2004
null
null
cs.AI
null
Lexical semantic resources, like WordNet, are often used in real applications of natural language document processing. For example, we integrated GermaNet in our document suite XDOC of processing of German forensic autopsy protocols. In addition to the hypernymy and synonymy relation, we want to adapt GermaNet's verb frames for our analysis. In this paper we outline an approach for the domain related enrichment of GermaNet verb frames by corpus based syntactic and co-occurred data analyses of real documents.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 08:36:39 GMT" }, { "version": "v2", "created": "Tue, 1 Feb 2005 08:06:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501095
Manuela Kunze
Manuela Kunze and Dietmar Roesner
Context Related Derivation of Word Senses
5 pages, 2 figures
in Proceedings of Ontolex- Workshop 2004
null
null
cs.AI
null
Real applications of natural language document processing are very often confronted with domain specific lexical gaps during the analysis of documents of a new domain. This paper describes an approach for the derivation of domain specific concepts for the extension of an existing ontology. As resources we need an initial ontology and a partially processed corpus of a domain. We exploit the specific characteristic of the sublanguage in the corpus. Our approach is based on syntactical structures (noun phrases) and compound analyses to extract information required for the extension of GermaNet's lexical resources.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 09:25:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Kunze", "Manuela", "" ], [ "Roesner", "Dietmar", "" ] ]
cs/0501096
Manuela Kunze
Dietmar Roesner and Manuela Kunze and Sylke Kroetzsch
Transforming and Enriching Documents for the Semantic Web
10 pages, 1 figure
KI (1), 2004
null
null
cs.AI
null
We suggest to employ techniques from Natural Language Processing (NLP) and Knowledge Representation (KR) to transform existing documents into documents amenable for the Semantic Web. Semantic Web documents have at least part of their semantics and pragmatics marked up explicitly in both a machine processable as well as human readable manner. XML and its related standards (XSLT, RDF, Topic Maps etc.) are the unifying platform for the tools and methodologies developed for different application scenarios.
[ { "version": "v1", "created": "Mon, 31 Jan 2005 09:48:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Roesner", "Dietmar", "" ], [ "Kunze", "Manuela", "" ], [ "Kroetzsch", "Sylke", "" ] ]
cs/0502002
Manoj Kumar
Manoj Kumar
Directed Threshold Multi – Signature Scheme without SDC
13 pages
null
null
null
cs.CR
null
In this paper, we propose a Directed threshold multisignature scheme without SDC. This signature scheme is applicable when the message is sensitive to the signature receiver; and the signatures are generated by the cooperation of a number of people from a given group of senders. In this scheme, any malicious set of signers cannot impersonate any other set of signers to forge the signatures. In case of forgery, it is possible to trace the signing set.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 06:29:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0502003
Sandor P. Fekete
Alexander Kroeller, Dennis Pfisterer, Carsten Buschmann, Sandor P. Fekete, and Stefan Fischer
Shawn: A new approach to simulating wireless sensor networks
10 pages, 2 figures, 2 tables, Latex, to appear in Design, Analysis, and Simulation of Distributed Systems 2005
null
null
null
cs.DC cs.PF
null
We consider the simulation of wireless sensor networks (WSN) using a new approach. We present Shawn, an open-source discrete-event simulator that has considerable differences to all other existing simulators. Shawn is very powerful in simulating large scale networks with an abstract point of view. It is, to the best of our knowledge, the first simulator to support generic high-level algorithms as well as distributed protocols on exactly the same underlying networks.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 12:23:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kroeller", "Alexander", "" ], [ "Pfisterer", "Dennis", "" ], [ "Buschmann", "Carsten", "" ], [ "Fekete", "Sandor P.", "" ], [ "Fischer", "Stefan", "" ] ]
cs/0502006
Alejandro Ceccatto
P.M. Granitto, P.F. Verdes and H.A. Ceccatto
Neural network ensembles: Evaluation of aggregation algorithms
35 pages, 2 figures, In press AI Journal
null
null
null
cs.AI cs.NE
null
Ensembles of artificial neural networks show improved generalization capabilities that outperform those of single networks. However, for aggregation to be effective, the individual networks must be as accurate and diverse as possible. An important problem is, then, how to tune the aggregate members in order to have an optimal compromise between these two conflicting conditions. We present here an extensive evaluation of several algorithms for ensemble construction, including new proposals and comparing them with standard methods in the literature. We also discuss a potential problem with sequential aggregation algorithms: the non-frequent but damaging selection through their heuristics of particularly bad ensemble members. We introduce modified algorithms that cope with this problem by allowing individual weighting of aggregate members. Our algorithms and their weighted modifications are favorably tested against other methods in the literature, producing a sensible improvement in performance on most of the standard statistical databases used as benchmarks.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 21:22:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Granitto", "P. M.", "" ], [ "Verdes", "P. F.", "" ], [ "Ceccatto", "H. A.", "" ] ]
cs/0502007
Alexander Shaydurov S.
Alexander Shaydurov
Identification of complex systems in the basis of wavelets
4 pages, 6 figures
null
null
null
cs.CE cs.NE
null
In this paper is proposed the method of the identification of complex dynamic systems. Method can be used for the identification of linear and nonlinear complex dynamic systems for the determined or stochastic signals at the inputs and the outputs. It is proposed to use a basis of wavelets for obtaining the impulse transient function (ITF) of system. ITF is considered in the form of surface in the 3D space. Are given the results of experiments on the identification of systems in the basis of wavelets.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 00:12:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Shaydurov", "Alexander", "" ] ]
cs/0502008
Jim Gray
Jim Gray, David T. Liu, Maria Nieto-Santisteban, Alexander S. Szalay, David DeWitt, Gerd Heber
Scientific Data Management in the Coming Decade
null
null
null
Microsoft Technical Report MSR-TR-2005-10
cs.DB cs.CE
null
This is a thought piece on data-intensive science requirements for databases and science centers. It argues that peta-scale datasets will be housed by science centers that provide substantial storage and processing for scientists who access the data via smart notebooks. Next-generation science instruments and simulations will generate these peta-scale datasets. The need to publish and share data and the need for generic analysis and visualization tools will finally create a convergence on common metadata standards. Database systems will be judged by their support of these metadata standards and by their ability to manage and access peta-scale datasets. The procedural stream-of-bytes-file-centric approach to data analysis is both too cumbersome and too serial for such large datasets. Non-procedural query and analysis of schematized self-describing data is both easier to use and allows much more parallelism.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 03:15:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Liu", "David T.", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Szalay", "Alexander S.", "" ], [ "DeWitt", "David", "" ], [ "Heber", "Gerd", "" ] ]
cs/0502009
Jim Gray
Peter Kukol, Jim Gray
Performance Considerations for Gigabyte per Second Transcontinental Disk-to-Disk File Transfers
null
null
null
Microsoft Technical Report MSR-TR-2004-62
cs.DB cs.PF
null
Moving data from CERN to Pasadena at a gigabyte per second using the next generation Internet requires good networking and good disk IO. Ten Gbps Ethernet and OC192 links are in place, so now it is simply a matter of programming. This report describes our preliminary work and measurements in configuring the disk subsystem for this effort. Using 24 SATA disks at each endpoint we are able to locally read and write an NTFS volume is striped across 24 disks at 1.2 GBps. A 32-disk stripe delivers 1.7 GBps. Experiments on higher performance and higher-capacity systems deliver up to 3.5 GBps.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 03:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kukol", "Peter", "" ], [ "Gray", "Jim", "" ] ]
cs/0502010
Jim Gray
Tom Barclay, Jim Gray
TerraServer SAN-Cluster Architecture and Operations Experience
null
null
null
Microsoft Technical Report MSR-TR-2004-67
cs.DC cs.DB
null
Microsoft TerraServer displays aerial, satellite, and to-pographic images of the earth in a SQL database available via the Internet. It is one of the most popular online at-lases, presenting seventeen terabytes of image data from the United States Geological Survey (USGS). Initially de-ployed in 1998, the system demonstrated the scalability of PC hardware and software - Windows and SQL Server - on a single, mainframe-class processor. In September 2000, the back-end database application was migrated to 4-node active/passive cluster connected to an 18 terabyte Storage Area Network (SAN). The new configuration was designed to achieve 99.99% availability for the back-end application. This paper describes the hardware and software components of the TerraServer Cluster and SAN, and describes our experience in configuring and operating this system for three years. Not surprisingly, the hardware and architecture delivered better than four-9's of availability, but operations mistakes delivered three-9's.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 03:36:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Barclay", "Tom", "" ], [ "Gray", "Jim", "" ] ]
cs/0502011
Jim Gray
Jim Gray, Alexander S. Szalay
Where the Rubber Meets the Sky: Bridging the Gap between Databases and Science
null
IEEE Data Engineering Bulletin, Vol 27.4, Dec. 2004, pp. 3-11
null
Microsoft Technical Report MSR-TR-2004-110
cs.DB cs.CE
null
Scientists in all domains face a data avalanche - both from better instruments and from improved simulations. We believe that computer science tools and computer scientists are in a position to help all the sciences by building tools and developing techniques to manage, analyze, and visualize peta-scale scientific information. This article is summarizes our experiences over the last seven years trying to bridge the gap between database technology and the needs of the astronomy community in building the World-Wide Telescope.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 04:40:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alexander S.", "" ] ]
cs/0502012
Jim Gray
Peter Kukol, Jim Gray
Sequential File Programming Patterns and Performance with .NET
null
null
null
Microsoft Technical Report MSR-TR-2004-136
cs.PF cs.OS
null
Programming patterns for sequential file access in the .NET Framework are described and the performance is measured. The default behavior provides excellent performance on a single disk - 50 MBps both reading and writing. Using large request sizes and doing file pre-allocation when possible have quantifiable benefits. When one considers disk arrays, .NET unbuffered IO delivers 800 MBps on a 16-disk array, but buffered IO delivers about 12% of that performance. Consequently, high-performance file and database utilities are still forced to use unbuffered IO for maximum sequential performance. The report is accompanied by downloadable source code that demonstrates the concepts and code that was used to obtain these measurements.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 04:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Kukol", "Peter", "" ], [ "Gray", "Jim", "" ] ]
cs/0502013
Robert Hearn
Robert A. Hearn
Amazons is PSPACE-complete
7 pages, 5 figures. For 2005 Combinatorial Game Theory Workshop at BIRS
null
null
null
cs.CC cs.GT
null
Amazons is a board game which combines elements of Chess and Go. It has become popular in recent years, and has served as a useful platform for both game-theoretic study and AI games research. Buro showed that simple Amazons endgames are NP-equivalent, leaving the complexity of the general case as an open problem. We settle this problem, by showing that deciding the outcome of an n x n Amazons position is PSPACE-hard. We give a reduction from one of the PSPACE-complete two-player formula games described by Schaefer. Since the number of moves in an Amazons game is polynomially bounded (unlike Chess and Go), Amazons is in PSPACE. It is thus on a par with other two-player, bounded-move, perfect-information games such as Hex, Othello, and Kayles. Our construction also provides an alternate proof that simple Amazons endgames are NP-equivalent. Our reduction uses a number of amazons polynomial in the input formula length; a remaining open problem is the complexity of Amazons when only a constant number of amazons is used.
[ { "version": "v1", "created": "Wed, 2 Feb 2005 18:55:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hearn", "Robert A.", "" ] ]
cs/0502014
Philippe Robert
Philippe Robert (RAP UR-R)
On the asymptotic behavior of some Algorithms
November 2004
Random Structures and Algorithms 27 (2005) 235--250
10.1002/rsa.20075
null
cs.DS math.CA math.PR
null
A simple approach is presented to study the asymptotic behavior of some algorithms with an underlying tree structure. It is shown that some asymptotic oscillating behaviors can be precisely analyzed without resorting to complex analysis techniques as it is usually done in this context. A new explicit representation of periodic functions involved is obtained at the same time.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 08:25:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Philippe", "", "RAP UR-R" ] ]
cs/0502015
Remi Barrere
R. Barrere
Can Computer Algebra be Liberated from its Algebraic Yoke ?
8 pages, 2-column presentation, 2 figures
null
null
null
cs.SC cs.CE
null
So far, the scope of computer algebra has been needlessly restricted to exact algebraic methods. Its possible extension to approximate analytical methods is discussed. The entangled roles of functional analysis and symbolic programming, especially the functional and transformational paradigms, are put forward. In the future, algebraic algorithms could constitute the core of extended symbolic manipulation systems including primitives for symbolic approximations.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 17:28:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Barrere", "R.", "" ] ]
cs/0502016
Cynthia Rudin
Cynthia Rudin
Stability Analysis for Regularized Least Squares Regression
14 pages, 0 figures, 1 class file
null
null
null
cs.LG
null
We discuss stability for a class of learning algorithms with respect to noisy labels. The algorithms we consider are for regression, and they involve the minimization of regularized risk functionals, such as L(f) := 1/N sum_i (f(x_i)-y_i)^2+ lambda ||f||_H^2. We shall call the algorithm `stable' if, when y_i is a noisy version of f*(x_i) for some function f* in H, the output of the algorithm converges to f* as the regularization term and noise simultaneously vanish. We consider two flavors of this problem, one where a data set of N points remains fixed, and the other where N -> infinity. For the case where N -> infinity, we give conditions for convergence to f_E (the function which is the expectation of y(x) for each x), as lambda -> 0. For the fixed N case, we describe the limiting 'non-noisy', 'non-regularized' function f*, and give conditions for convergence. In the process, we develop a set of tools for dealing with functionals such as L(f), which are applicable to many other problems in learning theory.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 19:54:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Rudin", "Cynthia", "" ] ]
cs/0502018
Jim Gray
Maria A. Nieto-Santisteban, Alexander S. Szalay, Aniruddha R. Thakar, William J. O'Mullane, Jim Gray, James Annis
When Database Systems Meet the Grid
better version of the paper (better graphics exceed ArXiv 1MB limit) at http://www-db.cs.wisc.edu/cidr/papers/P13.pdf
Proceedings of CIDR 2005 Conference, Asilomar, CA. Jan. 2005, pp 154-161
null
Microsoft Technical Report MSR-TR-2004-81
cs.DC
null
We illustrate the benefits of combining database systems and Grid technologies for data-intensive applications. Using a cluster of SQL servers, we reimplemented an existing Grid application that finds galaxy clusters in a large astronomical database. The SQL implementation runs an order of magnitude faster than the earlier Tcl-C-file-based implementation. We discuss why and how Grid applications can take advantage of database systems.
[ { "version": "v1", "created": "Thu, 3 Feb 2005 21:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Nieto-Santisteban", "Maria A.", "" ], [ "Szalay", "Alexander S.", "" ], [ "Thakar", "Aniruddha R.", "" ], [ "O'Mullane", "William J.", "" ], [ "Gray", "Jim", "" ], [ "Annis", "James", "" ] ]
cs/0502019
Kevin Lai
Michal Feldman, Kevin Lai, Li Zhang
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters
null
Proceedings of the ACM Conference on Electronic Commerce 2005
null
null
cs.DC cs.GT
null
In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed market-based resource allocation system. Multiple users decide how to distribute their budget (bids) among multiple machines according to their individual preferences to maximize their individual utility. We look at both the efficiency and the fairness of the allocation at the equilibrium, where fairness is evaluated through the measures of utility uniformity and envy-freeness. We show analytically and through simulations that despite being highly decentralized, such a system converges quickly to an equilibrium and unlike the social optimum that achieves high efficiency but poor fairness, the proposed allocation scheme achieves a nice balance of high degrees of efficiency and fairness at the equilibrium.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 02:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Feldman", "Michal", "" ], [ "Lai", "Kevin", "" ], [ "Zhang", "Li", "" ] ]
cs/0502020
Kumara Sastry
K. Sastry, U.-M. O'Reilly, D. E. Goldberg
Population Sizing for Genetic Programming Based Upon Decision Making
Final version published in O'Reilly, U.-M., et al. (2004). Genetic Programming Theory and Practice II. Boston, MA: Kluwer Academic Publishers. 49--66
null
null
IlliGAL Report No. 2004028
cs.AI cs.NE
null
This paper derives a population sizing relationship for genetic programming (GP). Following the population-sizing derivation for genetic algorithms in Goldberg, Deb, and Clark (1992), it considers building block decision making as a key facet. The analysis yields a GP-unique relationship because it has to account for bloat and for the fact that GP solutions often use subsolution multiple times. The population-sizing relationship depends upon tree size, solution complexity, problem difficulty and building block expression probability. The relationship is used to analyze and empirically investigate population sizing for three model GP problems named ORDER, ON-OFF and LOUD. These problems exhibit bloat to differing extents and differ in whether their solutions require the use of a building block multiple times.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 03:58:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "K.", "" ], [ "O'Reilly", "U. -M.", "" ], [ "Goldberg", "D. E.", "" ] ]
cs/0502021
Kumara Sastry
H. A. Abbass, K. Sastry, D. E. Goldberg
Oiling the Wheels of Change: The Role of Adaptive Automatic Problem Decomposition in Non--Stationary Environments
null
null
null
null
cs.NE cs.AI
null
Genetic algorithms (GAs) that solve hard problems quickly, reliably and accurately are called competent GAs. When the fitness landscape of a problem changes overtime, the problem is called non--stationary, dynamic or time--variant problem. This paper investigates the use of competent GAs for optimizing non--stationary optimization problems. More specifically, we use an information theoretic approach based on the minimum description length principle to adaptively identify regularities and substructures that can be exploited to respond quickly to changes in the environment. We also develop a special type of problems with bounded difficulties to test non--stationary optimization problems. The results provide new insights into non-stationary optimization problems and show that a search algorithm which automatically identifies and exploits possible decompositions is more robust and responds quickly to changes than a simple genetic algorithm.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 04:15:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbass", "H. A.", "" ], [ "Sastry", "K.", "" ], [ "Goldberg", "D. E.", "" ] ]
cs/0502022
Kumara Sastry
K. Sastry, H. A. Abbass, D. E. Goldberg
Sub-Structural Niching in Non-Stationary Environments
Final version published in 2005 Australian Artificial Intelligence Conference, pp. 873--885
null
null
IlliGAL Report No. 2004035
cs.NE cs.AI
null
Niching enables a genetic algorithm (GA) to maintain diversity in a population. It is particularly useful when the problem has multiple optima where the aim is to find all or as many as possible of these optima. When the fitness landscape of a problem changes overtime, the problem is called non--stationary, dynamic or time--variant problem. In these problems, niching can maintain useful solutions to respond quickly, reliably and accurately to a change in the environment. In this paper, we present a niching method that works on the problem substructures rather than the whole solution, therefore it has less space complexity than previously known niching mechanisms. We show that the method is responding accurately when environmental changes occur.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 04:29:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "K.", "" ], [ "Abbass", "H. A.", "" ], [ "Goldberg", "D. E.", "" ] ]
cs/0502023
Kumara Sastry
K. Sastry, H. A. Abbass, D. E. Goldberg, D. D. Johnson
Sub-structural Niching in Estimation of Distribution Algorithms
null
null
null
IlliGAL Report No. 2005002
cs.NE cs.AI
null
We propose a sub-structural niching method that fully exploits the problem decomposition capability of linkage-learning methods such as the estimation of distribution algorithms and concentrate on maintaining diversity at the sub-structural level. The proposed method consists of three key components: (1) Problem decomposition and sub-structure identification, (2) sub-structure fitness estimation, and (3) sub-structural niche preservation. The sub-structural niching method is compared to restricted tournament selection (RTS)--a niching method used in hierarchical Bayesian optimization algorithm--with special emphasis on sustained preservation of multiple global solutions of a class of boundedly-difficult, additively-separable multimodal problems. The results show that sub-structural niching successfully maintains multiple global optima over large number of generations and does so with significantly less population than RTS. Additionally, the market share of each of the niche is much closer to the expected level in sub-structural niching when compared to RTS.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 04:46:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "K.", "" ], [ "Abbass", "H. A.", "" ], [ "Goldberg", "D. E.", "" ], [ "Johnson", "D. D.", "" ] ]
cs/0502025
Hahnsang Kim
Hahnsang Kim, Theirry Turletti, Amar Bouali
EPspectra: A Formal Toolkit for Developing DSP Software Applications
31 pages
null
null
null
cs.LO cs.SE
null
The software approach to developing Digital Signal Processing (DSP) applications brings some great features such as flexibility, re-usability of resources and easy upgrading of applications. However, it requires long and tedious tests and verification phases because of the increasing complexity of the software. This implies the need of a software programming environment capable of putting together DSP modules and providing facilities to debug, verify and validate the code. The objective of the work is to provide such facilities as simulation and verification for developing DSP software applications. This led us to develop an extension toolkit, Epspectra, built upon Pspectra, one of the first toolkits available to design basic software radio applications on standard PC workstations. In this paper, we first present Epspectra, an Esterel-based extension of Pspectra that makes the design and implementation of portable DSP applications easier. It allows drastic reduction of testing and verification time while requiring relatively little expertise in formal verification methods. Second, we demonstrate the use of Epspectra, taking as an example the radio interface part of a GSM base station. We also present the verification procedures for the three safety properties of the implementation programs which have complex control-paths. These have to obey strict scheduling rules. In addition, Epspectra achieves the verification of the targeted application since the same model is used for the executable code generation and for the formal verification.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 15:11:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Hahnsang", "" ], [ "Turletti", "Theirry", "" ], [ "Bouali", "Amar", "" ] ]
cs/0502027
Kevin Lai
Kevin Lai
Markets are Dead, Long Live Markets
Fix rotation of figures
null
null
null
cs.OS
null
Researchers have long proposed using economic approaches to resource allocation in computer systems. However, few of these proposals became operational, let alone commercial. Questions persist about the economic approach regarding its assumptions, value, applicability, and relevance to system design. The goal of this paper is to answer these questions. We find that market-based resource allocation is useful, and more importantly, that mechanism design and system design should be integrated to produce systems that are both economically and computationally efficient.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 22:48:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Lai", "Kevin", "" ] ]
cs/0502028
Herbert van de Sompel
Herbert Van de Sompel, Jeroen Bekaert, Xiaoming Liu, Luda Balakireva, Thorsten Schwander
aDORe: a modular, standards-based Digital Object Repository
Draft of submission to Computer Journal
null
null
null
cs.DL
null
This paper describes the aDORe repository architecture, designed and implemented for ingesting, storing, and accessing a vast collection of Digital Objects at the Research Library of the Los Alamos National Laboratory. The aDORe architecture is highly modular and standards-based. In the architecture, the MPEG-21 Digital Item Declaration Language is used as the XML-based format to represent Digital Objects that can consist of multiple datastreams as Open Archival Information System Archival Information Packages (OAIS AIPs).Through an ingestion process, these OAIS AIPs are stored in a multitude of autonomous repositories. A Repository Index keeps track of the creation and location of all the autonomous repositories, whereas an Identifier Locator registers in which autonomous repository a given Digital Object or OAIS AIP resides. A front-end to the complete environment, the OAI-PMH Federator, is introduced for requesting OAIS Dissemination Information Packages (OAIS DIPs). These OAIS DIPs can be the stored OAIS AIPs themselves, or transformations thereof. This front-end allows OAI-PMH harvesters to recurrently and selectively collect batches of OAIS DIPs from aDORe, and hence to create multiple, parallel services using the collected objects. Another front-end, the OpenURL Resolver, is introduced for requesting OAIS Result Sets. An OAIS Result Set is a dissemination of an individual Digital Object or of its constituent datastreams. Both front-ends make use of an MPEG-21 Digital Item Processing Engine to apply services to OAIS AIPs, Digital Objects, or constituent datastreams that were specified in a dissemination request.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 22:09:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Van de Sompel", "Herbert", "" ], [ "Bekaert", "Jeroen", "" ], [ "Liu", "Xiaoming", "" ], [ "Balakireva", "Luda", "" ], [ "Schwander", "Thorsten", "" ] ]
cs/0502029
Martin Pelikan
Radovan Ondas, Martin Pelikan, Kumara Sastry
Scalability of Genetic Programming and Probabilistic Incremental Program Evolution
Submitted to GECCO-2005
null
null
null
cs.NE cs.AI
null
This paper discusses scalability of standard genetic programming (GP) and the probabilistic incremental program evolution (PIPE). To investigate the need for both effective mixing and linkage learning, two test problems are considered: ORDER problem, which is rather easy for any recombination-based GP, and TRAP or the deceptive trap problem, which requires the algorithm to learn interactions among subsets of terminals. The scalability results show that both GP and PIPE scale up polynomially with problem size on the simple ORDER problem, but they both scale up exponentially on the deceptive problem. This indicates that while standard recombination is sufficient when no interactions need to be considered, for some problems linkage learning is necessary. These results are in agreement with the lessons learned in the domain of binary-string genetic algorithms (GAs). Furthermore, the paper investigates the effects of introducing utnnecessary and irrelevant primitives on the performance of GP and PIPE.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 19:40:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ondas", "Radovan", "" ], [ "Pelikan", "Martin", "" ], [ "Sastry", "Kumara", "" ] ]
cs/0502031
Riccardo Pucella
Riccardo Pucella
Logic Column 11: The Finite and the Infinite in Temporal Logic
14 pages
SIGACT News, 36(1), pp. 86-99, 2005
null
null
cs.LO
null
This article examines the interpretation of the LTL temporal operators over finite and infinite sequences. This is used as the basis for deriving a sound and complete axiomatization for Caret, a recent temporal logic for reasoning about programs with nested procedure calls and returns.
[ { "version": "v1", "created": "Sat, 5 Feb 2005 21:00:13 GMT" }, { "version": "v2", "created": "Sun, 24 Apr 2005 17:51:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0502032
Mihai P?tra\c{s}cu
Christian Worm Mortensen, Rasmus Pagh and Mihai Patrascu
On Dynamic Range Reporting in One Dimension
18 pages. Full version of a paper that will appear in STOC'05
null
null
null
cs.DS
null
We consider the problem of maintaining a dynamic set of integers and answering queries of the form: report a point (equivalently, all points) in a given interval. Range searching is a natural and fundamental variant of integer search, and can be solved using predecessor search. However, for a RAM with w-bit words, we show how to perform updates in O(lg w) time and answer queries in O(lglg w) time. The update time is identical to the van Emde Boas structure, but the query time is exponentially faster. Existing lower bounds show that achieving our query time for predecessor search requires doubly-exponentially slower updates. We present some arguments supporting the conjecture that our solution is optimal. Our solution is based on a new and interesting recursion idea which is "more extreme" that the van Emde Boas recursion. Whereas van Emde Boas uses a simple recursion (repeated halving) on each path in a trie, we use a nontrivial, van Emde Boas-like recursion on every such path. Despite this, our algorithm is quite clean when seen from the right angle. To achieve linear space for our data structure, we solve a problem which is of independent interest. We develop the first scheme for dynamic perfect hashing requiring sublinear space. This gives a dynamic Bloomier filter (an approximate storage scheme for sparse vectors) which uses low space. We strengthen previous lower bounds to show that these results are optimal.
[ { "version": "v1", "created": "Sat, 5 Feb 2005 23:22:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Mortensen", "Christian Worm", "" ], [ "Pagh", "Rasmus", "" ], [ "Patrascu", "Mihai", "" ] ]
cs/0502034
Martin Pelikan
Martin Pelikan, Kumara Sastry, David E. Goldberg
Multiobjective hBOA, Clustering, and Scalability
Also IlliGAL Report No. 2005005 (http://www-illigal.ge.uiuc.edu/). Submitted to GECCO-2005
null
null
IlliGAL Report No. 2005005
cs.NE cs.AI
null
This paper describes a scalable algorithm for solving multiobjective decomposable problems by combining the hierarchical Bayesian optimization algorithm (hBOA) with the nondominated sorting genetic algorithm (NSGA-II) and clustering in the objective space. It is first argued that for good scalability, clustering or some other form of niching in the objective space is necessary and the size of each niche should be approximately equal. Multiobjective hBOA (mohBOA) is then described that combines hBOA, NSGA-II and clustering in the objective space. The algorithm mohBOA differs from the multiobjective variants of BOA and hBOA proposed in the past by including clustering in the objective space and allocating an approximately equally sized portion of the population to each cluster. The algorithm mohBOA is shown to scale up well on a number of problems on which standard multiobjective evolutionary algorithms perform poorly.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 05:26:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Pelikan", "Martin", "" ], [ "Sastry", "Kumara", "" ], [ "Goldberg", "David E.", "" ] ]
cs/0502038
Stavros Nikolopoulos D.
Stavros D. Nikolopoulos and Charis Papadopoulos
The Number of Spanning Trees in Kn-complements of Quasi-threshold Graphs
13 pages, 2 figures
Graphs and Combinatorics 20(3): 383-397, 2004
null
null
cs.DM
null
In this paper we examine the classes of graphs whose $K_n$-complements are trees and quasi-threshold graphs and derive formulas for their number of spanning trees; for a subgraph $H$ of $K_n$, the $K_n$-complement of $H$ is the graph $K_n-H$ which is obtained from $K_n$ by removing the edges of $H$. Our proofs are based on the complement spanning-tree matrix theorem, which expresses the number of spanning trees of a graph as a function of the determinant of a matrix that can be easily constructed from the adjacency relation of the graph. Our results generalize previous results and extend the family of graphs of the form $K_n-H$ admitting formulas for the number of their spanning trees.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 15:26:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Nikolopoulos", "Stavros D.", "" ], [ "Papadopoulos", "Charis", "" ] ]
cs/0502039
Boris D. Lubachevsky
Boris D. Lubachevsky
Efficient Parallel Simulations of Asynchronous Cellular Arrays
26 pages, 10 figures
Complex Systems, vol.1, no.6, December 1987, pp.1099--1123, S. Wolfram, (ed.)
null
null
cs.DC cond-mat.mtrl-sci cs.PF
null
A definition for a class of asynchronous cellular arrays is proposed. An example of such asynchrony would be independent Poisson arrivals of cell iterations. The Ising model in the continuous time formulation of Glauber falls into this class. Also proposed are efficient parallel algorithms for simulating these asynchronous cellular arrays. In the algorithms, one or several cells are assigned to a processing element (PE), local times for different PEs can be different. Although the standard serial algorithm by Metropolis, Rosenbluth, Rosenbluth, Teller, and Teller can simulate such arrays, it is usually believed to be without an efficient parallel counterpart. However, the proposed parallel algorithms contradict this belief proving to be both efficient and able to perform the same task as the standard algorithm. The results of experiments with the new algorithms are encouraging: the speed-up is greater than 16 using 25 PEs on a shared memory MIMD bus computer, and greater than 1900 using 2**14 PEs on a SIMD computer. The algorithm by Bortz, Kalos, and Lebowitz can be incorporated in the proposed parallel algorithms, further contributing to speed-up. [In this paper I invented the update-cites-of-local-time-minima parallel simulation scheme. Now the scheme is becoming popular. Many misprints of the original 1987 Complex Systems publication are corrected here.-B.L.]
[ { "version": "v1", "created": "Tue, 8 Feb 2005 00:32:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Lubachevsky", "Boris D.", "" ] ]
cs/0502040
Gaoyan Xie
Gaoyan Xie and Zhe Dang
Testing Systems of Concurrent Black-boxes--an Automata-Theoretic and Decompositional Approach
null
null
null
null
cs.SE
null
The global testing problem studied in this paper is to seek a definite answer to whether a system of concurrent black-boxes has an observable behavior in a given finite (but could be huge) set "Bad". We introduce a novel approach to solve the problem that does not require integration testing. Instead, in our approach, the global testing problem is reduced to testing individual black-boxes in the system one by one in some given order. Using an automata-theoretic approach, test sequences for each individual black-box are generated from the system's description as well as the test results of black-boxes prior to this black-box in the given order. In contrast to the conventional compositional/modular verification/testing approaches, our approach is essentially decompositional. Also, our technique is complete, sound, and can be carried out automatically. Our experiment results show that the total number of tests needed to solve the global testing problem is substantially small even for an extremely large "Bad".
[ { "version": "v1", "created": "Tue, 8 Feb 2005 01:15:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Gaoyan", "" ], [ "Dang", "Zhe", "" ] ]
cs/0502041
Mihai Patrascu
Mihai Patrascu and Erik D. Demaine
Logarithmic Lower Bounds in the Cell-Probe Model
Second version contains significant changes to the presentation. 32 pages, 1 figure. Journal version of two conference publications: "Tight Bounds for the Partial-Sums Problem" Proc. 15th ACM-SIAM Symposium on Discrete Algorithms (SODA'04), pp 20-29. "Lower Bounds for Dynamic Connectivity" Proc. 36th ACM Symposium on Theory of Computing (STOC'04), pp 546-553
null
null
null
cs.DS cs.CC
null
We develop a new technique for proving cell-probe lower bounds on dynamic data structures. This technique enables us to prove an amortized randomized Omega(lg n) lower bound per operation for several data structural problems on n elements, including partial sums, dynamic connectivity among disjoint paths (or a forest or a graph), and several other dynamic graph problems (by simple reductions). Such a lower bound breaks a long-standing barrier of Omega(lg n / lglg n) for any dynamic language membership problem. It also establishes the optimality of several existing data structures, such as Sleator and Tarjan's dynamic trees. We also prove the first Omega(log_B n) lower bound in the external-memory model without assumptions on the data structure (such as the comparison model). Our lower bounds also give a query-update trade-off curve matched, e.g., by several data structures for dynamic connectivity in graphs. We also prove matching upper and lower bounds for partial sums when parameterized by the word size and the maximum additive change in an update.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 03:03:55 GMT" }, { "version": "v2", "created": "Sat, 28 May 2005 21:49:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Patrascu", "Mihai", "" ], [ "Demaine", "Erik D.", "" ] ]
cs/0502043
Satyan L. Devadoss
Jeff Danciger, Satyan L. Devadoss, Don Sheehy
Compatible Triangulations and Point Partitions by Series-Triangular Graphs
11 pages, 8 figures
Computational Geometry: Theory and Applications, 34 (2006) 195-202
null
null
cs.CG cs.DM
null
We introduce series-triangular graph embeddings and show how to partition point sets with them. This result is then used to improve the upper bound on the number of Steiner points needed to obtain compatible triangulations of point sets. The problem is generalized to finding compatible triangulations for more than two point sets and we show that such triangulations can be constructed with only a linear number of Steiner points added to each point set.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 16:19:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Danciger", "Jeff", "" ], [ "Devadoss", "Satyan L.", "" ], [ "Sheehy", "Don", "" ] ]
cs/0502044
Martin Lotz
Peter Buergisser, Martin Lotz
The complexity of computing the Hilbert polynomial of smooth equidimensional complex projective varieties
null
null
null
null
cs.SC cs.CC
null
We continue the study of counting complexity begun in [Buergisser, Cucker 04] and [Buergisser, Cucker, Lotz 05] by proving upper and lower bounds on the complexity of computing the Hilbert polynomial of a homogeneous ideal. We show that the problem of computing the Hilbert polynomial of a smooth equidimensional complex projective variety can be reduced in polynomial time to the problem of counting the number of complex common zeros of a finite set of multivariate polynomials. Moreover, we prove that the more general problem of computing the Hilbert polynomial of a homogeneous ideal is polynomial space hard. This implies polynomial space lower bounds for both the problems of computing the rank and the Euler characteristic of cohomology groups of coherent sheaves on projective space, improving the #P-lower bound of Bach (JSC 1999).
[ { "version": "v1", "created": "Tue, 8 Feb 2005 17:10:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Buergisser", "Peter", "" ], [ "Lotz", "Martin", "" ] ]
cs/0502045
Gianluca Argentini
Gianluca Argentini
Adaptive grids as parametrized scale-free networks
10 pages, 3 figures
null
null
null
cs.NA math-ph math.AP math.MP physics.flu-dyn
null
In this paper we present a possible model of adaptive grids for numerical resolution of differential problems, using physical or geometrical properties, as viscosity or velocity gradient of a moving fluid. The relation between the values of grid step and these entities is based on the mathematical scheme offered by the model of scale-free networks, due to Barabasi, so that the step can be connected to the other variables by a constitutive relation. Some examples and an application are discussed, showing that this approach can be further developed for treatment of more complex situations.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 17:51:26 GMT" }, { "version": "v2", "created": "Wed, 9 Feb 2005 00:12:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0502046
Didier Bert
Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG)
Proof obligations for specification and refinement of liveness properties under weak fairness
null
null
null
Rapport LSR IMAG : RR 1071-I LSR 20
cs.LO
null
In this report, we present a formal model of fair iteration of events for B event systems. The model is used to justify proof obligations for basic liveness properties and preservation under refinement of general liveness properties. The model of fair iteration of events uses the dovetail operator, an operator proposed by Broy and Nelson to model fair choice. The proofs are mainly founded in fixpoint calculations of fair iteration of events and weakest precondition calculus.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 09:23:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Barradas", "Hector Ruiz", "", "LSR - IMAG" ], [ "Bert", "Didier", "", "LSR - IMAG" ] ]
cs/0502048
Nikolaos Papanikolaou
Rajagopal Nagarajan, Nikolaos Papanikolaou, Garry Bowen, Simon Gay
An Automated Analysis of the Security of Quantum Key Distribution
null
null
null
null
cs.CR quant-ph
null
This paper discusses the use of computer-aided verification as a practical means for analysing quantum information systems; specifically, the BB84 protocol for quantum key distribution is examined using this method. This protocol has been shown to be unconditionally secure against all attacks in an information-theoretic setting, but the relevant security proof requires a thorough understanding of the formalism of quantum mechanics and is not easily adaptable to practical scenarios. Our approach is based on probabilistic model-checking; we have used the PRISM model-checker to show that, as the number of qubits transmitted in BB84 is increased, the equivocation of the eavesdropper with respect to the channel decreases exponentially. We have also shown that the probability of detecting the presence of an eavesdropper increases exponentially with the number of qubits. The results presented here are a testament to the effectiveness of the model-checking approach for systems where analytical solutions may not be possible or plausible.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 13:49:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Nagarajan", "Rajagopal", "" ], [ "Papanikolaou", "Nikolaos", "" ], [ "Bowen", "Garry", "" ], [ "Gay", "Simon", "" ] ]
cs/0502051
Richard McClatchey
Zaheer Abbas, Muhammad Umer, Mohammed Odeh, Richard McClatchey, Arshad Ali, Farooq Ahmad
A Semantic Grid-based E-Learning Framework (SELF)
8 pages, 2 tables, 3 figures
null
null
null
cs.DC
null
E-learning can be loosely defined as a wide set of applications and processes, which uses available electronic media (and tools) to deliver vocational education and training. With its increasing recognition as an ubiquitous mode of instruction and interaction in the academic as well as corporate world, the need for a scaleable and realistic model is becoming important. In this paper we introduce SELF; a Semantic grid-based E-Learning Framework. SELF aims to identify the key-enablers in a practical grid-based E-learning environment and to minimize technological reworking by proposing a well-defined interaction plan among currently available tools and technologies. We define a dichotomy with E-learning specific application layers on top and semantic grid-based support layers underneath. We also map the latest open and freeware technologies with various components in SELF.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 17:22:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbas", "Zaheer", "" ], [ "Umer", "Muhammad", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Ahmad", "Farooq", "" ] ]
cs/0502052
Dmitry Mogilevsky
Dmitry Mogilevsky
Log Analysis Case Study Using LoGS
null
null
null
null
cs.CR cs.IR
null
A very useful technique a network administrator can use to identify problematic network behavior is careful analysis of logs of incoming and outgoing network flows. The challenge one faces when attempting to undertake this course of action, though, is that large networks tend to generate an extremely large quantity of network traffic in a very short period of time, resulting in very large traffic logs which must be analyzed post-generation with an eye for contextual information which may reveal symptoms of problematic traffic. A better technique is to perform real-time log analysis using a real-time context-generating tool such as LoGS.
[ { "version": "v1", "created": "Wed, 9 Feb 2005 19:49:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ] ]
cs/0502054
Ion Mandoiu
Ion I. Mandoiu, Claudia Prajescu, Dragos Trinca
Improved Tag Set Design and Multiplexing Algorithms for Universal Arrays
null
null
null
null
cs.DS
null
In this paper we address two optimization problems arising in the design of genomic assays based on universal tag arrays. First, we address the universal array tag set design problem. For this problem, we extend previous formulations to incorporate antitag-to-antitag hybridization constraints in addition to constraints on antitag-to-tag hybridization specificity, establish a constructive upper bound on the maximum number of tags satisfying the extended constraints, and propose a simple greedy tag selection algorithm. Second, we give methods for improving the multiplexing rate in large-scale genomic assays by combining primer selection with tag assignment. Experimental results on simulated data show that this integrated optimization leads to reductions of up to 50% in the number of required arrays.
[ { "version": "v1", "created": "Thu, 10 Feb 2005 20:20:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Prajescu", "Claudia", "" ], [ "Trinca", "Dragos", "" ] ]
cs/0502057
Kumara Sastry
Kumara Sastry, Martin Pelikan, David E. Goldberg
Decomposable Problems, Niching, and Scalability of Multiobjective Estimation of Distribution Algorithms
Submitted to Genetic and Evolutionary Computation Conference, GECCO-2005
null
null
IlliGAL Report No. 2005004
cs.NE cs.AI
null
The paper analyzes the scalability of multiobjective estimation of distribution algorithms (MOEDAs) on a class of boundedly-difficult additively-separable multiobjective optimization problems. The paper illustrates that even if the linkage is correctly identified, massive multimodality of the search problems can easily overwhelm the nicher and lead to exponential scale-up. Facetwise models are subsequently used to propose a growth rate of the number of differing substructures between the two objectives to avoid the niching method from being overwhelmed and lead to polynomial scalability of MOEDAs.
[ { "version": "v1", "created": "Sat, 12 Feb 2005 22:29:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Sastry", "Kumara", "" ], [ "Pelikan", "Martin", "" ], [ "Goldberg", "David E.", "" ] ]
cs/0502059
Stanko Shtrakov
Stanko Shtrakov and Anton Stoilov
New approach for Finite Difference Method for Thermal Analysis of Passive Solar Systems
7 pages, 4 figures
null
null
null
cs.NA
null
Mathematical treatment of massive wall systems is a useful tool for investigation of these solar applications. The objectives of this work are to develop (and validate) a numerical solution model for predication the thermal behaviour of passive solar systems with massive wall, to improve knowledge of using indirect passive solar systems and assess its energy efficiency according to climatic conditions in Bulgaria. The problem of passive solar systems with massive walls is modelled by thermal and mass transfer equations. As a boundary conditions for the mathematical problem are used equations, which describe influence of weather data and constructive parameters of building on the thermal performance of the passive system. The mathematical model is solved by means of finite differences method and improved solution procedure. In article are presented results of theoretical and experimental study for developing and validating a numerical solution model for predication the thermal behaviour of passive solar systems with massive wall.
[ { "version": "v1", "created": "Sun, 13 Feb 2005 15:29:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Stanko", "" ], [ "Stoilov", "Anton", "" ] ]
cs/0502060
Jean-Philippe Rennard
J.-Ph Rennard
Perspectives for Strong Artificial Life
19 pages, 5 figures
Rennard, J.-Ph., (2004), Perspective for Strong Artificial Life in De Castro, L.N. & von Zuben F.J. (Eds), Recent Developments in Biologically Inspired Computing, Hershey:IGP, 301-318
null
null
cs.AI
null
This text introduces the twin deadlocks of strong artificial life. Conceptualization of life is a deadlock both because of the existence of a continuum between the inert and the living, and because we only know one instance of life. Computationalism is a second deadlock since it remains a matter of faith. Nevertheless, artificial life realizations quickly progress and recent constructions embed an always growing set of the intuitive properties of life. This growing gap between theory and realizations should sooner or later crystallize in some kind of paradigm shift and then give clues to break the twin deadlocks.
[ { "version": "v1", "created": "Sun, 13 Feb 2005 18:20:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Rennard", "J. -Ph", "" ] ]
cs/0502061
Avishai Wool
Sagy Bar, Mira Gonen, Avishai Wool
A Geographic Directed Preferential Internet Topology Model
21 pages, 4 figures
null
null
null
cs.NI cs.AR
null
The goal of this work is to model the peering arrangements between Autonomous Systems (ASes). Most existing models of the AS-graph assume an undirected graph. However, peering arrangements are mostly asymmetric Customer-Provider arrangements, which are better modeled as directed edges. Furthermore, it is well known that the AS-graph, and in particular its clustering structure, is influenced by geography. We introduce a new model that describes the AS-graph as a directed graph, with an edge going from the customer to the provider, but also models symmetric peer-to-peer arrangements, and takes geography into account. We are able to mathematically analyze its power-law exponent and number of leaves. Beyond the analysis we have implemented our model as a synthetic network generator we call GdTang. Experimentation with GdTang shows that the networks it produces are more realistic than those generated by other network generators, in terms of its power-law exponent, fractions of customer-provider and symmetric peering arrangements, and the size of its dense core. We believe that our model is the first to manifest realistic regional dense cores that have a clear geographic flavor. Our synthetic networks also exhibit path inflation effects that are similar to those observed in the real AS graph.
[ { "version": "v1", "created": "Mon, 14 Feb 2005 11:39:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bar", "Sagy", "" ], [ "Gonen", "Mira", "" ], [ "Wool", "Avishai", "" ] ]
cs/0502062
Markus Volkmer
Markus Volkmer and Sebastian Wallner
Tree Parity Machine Rekeying Architectures
null
IEEE Transactions on Computers Vol. 54 No. 4, pp. 421-427, April 2005
null
null
cs.CR cs.AR
null
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e. small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronisation of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration we evaluate characteristics of a standard-cell ASIC design realisation as IP-core in 0.18-micrometer CMOS-technology.
[ { "version": "v1", "created": "Mon, 14 Feb 2005 13:06:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Volkmer", "Markus", "" ], [ "Wallner", "Sebastian", "" ] ]
cs/0502064
J\=anis Buls
Janis Buls
The Lattice of Machine Invariant Sets and Subword Complexity
9 pages, extended abstract published in 67th Workshop on General Algebra
null
null
null
cs.CR cs.CC cs.DM
null
We investigate the lattice of machine invariant classes. This is an infinite completely distributive lattice but it is not a Boolean lattice. We show the subword complexity and the growth function create machine invariant classes. So the lattice would serve as a measure of words cryptographic quality if we like to identify new stream ciphers suitable for widespread adoption.
[ { "version": "v1", "created": "Mon, 14 Feb 2005 15:28:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Buls", "Janis", "" ] ]
cs/0502066
Mark Braverman
Mark Braverman
On the Complexity of Real Functions
null
null
null
null
cs.CC cs.NA math.NA
null
We develop a notion of computability and complexity of functions over the reals, which seems to be very natural when one tries to determine just how "difficult" a certain function is. This notion can be viewed as an extension of both BSS computability [Blum, Cucker, Shub, Smale 1998], and bit computability in the tradition of computable analysis [Weihrauch 2000] as it relies on the latter but allows some discontinuities and multiple values.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 05:24:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Braverman", "Mark", "" ] ]
cs/0502067
Marcus Hutter
Jan Poland and Marcus Hutter
Master Algorithms for Active Experts Problems based on Increasing Loss Values
8 two-column pages, latex2e
Proc. 14th Dutch-Belgium Conf. on Machine Learning (Benelearn 2005) 59-66
null
IDSIA-01-05
cs.LG cs.AI
null
We specify an experts algorithm with the following characteristics: (a) it uses only feedback from the actions actually chosen (bandit setup), (b) it can be applied with countably infinite expert classes, and (c) it copes with losses that may grow in time appropriately slowly. We prove loss bounds against an adaptive adversary. From this, we obtain master algorithms for "active experts problems", which means that the master's actions may influence the behavior of the adversary. Our algorithm can significantly outperform standard experts algorithms on such problems. Finally, we combine it with a universal expert class. This results in a (computationally infeasible) universal master algorithm which performs - in a certain sense - almost as well as any computable strategy, for any online problem.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 14:59:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0502068
John Tromp
John Tromp and Rudi Cilibrasi
Limits of Rush Hour Logic Complexity
null
null
null
null
cs.CC
null
Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation inspired by the ``Rush Hour'' toy puzzle, in which cars can move horizontally or vertically within a parking lot. The authors show how the model supports polynomial space computation, using certain car configurations as building blocks to construct boolean circuits for a cpu and memory. They consider the use of cars of length 3 crucial to their construction, and conjecture that cars of size 2 only, which we'll call `Size 2 Rush Hour', do not support polynomial space computation. We settle this conjecture by showing that the required building blocks are constructible in Size 2 Rush Hour. Furthermore, we consider Unit Rush Hour, which was hitherto believed to be trivial, show its relation to maze puzzles, and provide empirical support for its hardness.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 14:22:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Tromp", "John", "" ], [ "Cilibrasi", "Rudi", "" ] ]
cs/0502070
Erik Demaine
Erik D. Demaine and MohammadTaghi Hajiaghayi
Bidimensionality, Map Graphs, and Grid Minors
12 pages
null
null
null
cs.DM cs.DS
null
In this paper we extend the theory of bidimensionality to two families of graphs that do not exclude fixed minors: map graphs and power graphs. In both cases we prove a polynomial relation between the treewidth of a graph in the family and the size of the largest grid minor. These bounds improve the running times of a broad class of fixed-parameter algorithms. Our novel technique of using approximate max-min relations between treewidth and size of grid minors is powerful, and we show how it can also be used, e.g., to prove a linear relation between the treewidth of a bounded-genus graph and the treewidth of its dual.
[ { "version": "v1", "created": "Wed, 16 Feb 2005 19:01:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Hajiaghayi", "MohammadTaghi", "" ] ]
cs/0502072
Jim Gray
William OMullane, Nolan Li, Maria Nieto-Santisteban, Alex Szalay, Ani Thakar, Jim Gray
Batch is back: CasJobs, serving multi-TB data on the Web
null
null
null
Microsoft Technical Report MSR TR 2005 19
cs.DC cs.DB
null
The Sloan Digital Sky Survey (SDSS) science database describes over 140 million objects and is over 1.5 TB in size. The SDSS Catalog Archive Server (CAS) provides several levels of query interface to the SDSS data via the SkyServer website. Most queries execute in seconds or minutes. However, some queries can take hours or days, either because they require non-index scans of the largest tables, or because they request very large result sets, or because they represent very complex aggregations of the data. These "monster queries" not only take a long time, they also affect response times for everyone else - one or more of them can clog the entire system. To ameliorate this problem, we developed a multi-server multi-queue batch job submission and tracking system for the CAS called CasJobs. The transfer of very large result sets from queries over the network is another serious problem. Statistics suggested that much of this data transfer is unnecessary; users would prefer to store results locally in order to allow further joins and filtering. To allow local analysis, a system was developed that gives users their own personal databases (MyDB) at the server side. Users may transfer data to their MyDB, and then perform further analysis before extracting it to their own machine. MyDB tables also provide a convenient way to share results of queries with collaborators without downloading them. CasJobs is built using SOAP XML Web services and has been in operation since May 2004.
[ { "version": "v1", "created": "Thu, 17 Feb 2005 01:55:35 GMT" } ]
2007-05-23T00:00:00
[ [ "OMullane", "William", "" ], [ "Li", "Nolan", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Szalay", "Alex", "" ], [ "Thakar", "Ani", "" ], [ "Gray", "Jim", "" ] ]
cs/0502078
Michael Fink
Thomas Eiter, Michael Fink, and Stefan Woltran
Semantical Characterizations and Complexity of Equivalences in Answer Set Programming
58 pages, 6 tables. The contents were partially published in: Proceedings 19th International Conference on Logic Programming (ICLP 2003), pp. 224-238, LNCS 2916, Springer, 2003; and Proceedings 9th European Conference on Logics in Artificial Intelligence (JELIA 2004), pp. 161-173, LNCS 3229, Springer, 2004
null
null
1843-05-01
cs.AI cs.CC
null
In recent research on non-monotonic logic programming, repeatedly strong equivalence of logic programs P and Q has been considered, which holds if the programs P union R and Q union R have the same answer sets for any other program R. This property strengthens equivalence of P and Q with respect to answer sets (which is the particular case for R is the empty set), and has its applications in program optimization, verification, and modular logic programming. In this paper, we consider more liberal notions of strong equivalence, in which the actual form of R may be syntactically restricted. On the one hand, we consider uniform equivalence, where R is a set of facts rather than a set of rules. This notion, which is well known in the area of deductive databases, is particularly useful for assessing whether programs P and Q are equivalent as components of a logic program which is modularly structured. On the other hand, we consider relativized notions of equivalence, where R ranges over rules over a fixed alphabet, and thus generalize our results to relativized notions of strong and uniform equivalence. For all these notions, we consider disjunctive logic programs in the propositional (ground) case, as well as some restricted classes, provide semantical characterizations and analyze the computational complexity. Our results, which naturally extend to answer set semantics for programs with strong negation, complement the results on strong equivalence of logic programs and pave the way for optimizations in answer set solvers as a tool for input-based problem solving.
[ { "version": "v1", "created": "Fri, 18 Feb 2005 11:01:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Fink", "Michael", "" ], [ "Woltran", "Stefan", "" ] ]
cs/0502082
Thomas Linke
Kathrin Konczak, Thomas Linke, Torsten Schaub
Graphs and colorings for answer set programming
null
null
null
null
cs.AI cs.LO
null
We investigate the usage of rule dependency graphs and their colorings for characterizing and computing answer sets of logic programs. This approach provides us with insights into the interplay between rules when inducing answer sets. We start with different characterizations of answer sets in terms of totally colored dependency graphs that differ in graph-theoretical aspects. We then develop a series of operational characterizations of answer sets in terms of operators on partial colorings. In analogy to the notion of a derivation in proof theory, our operational characterizations are expressed as (non-deterministically formed) sequences of colorings, turning an uncolored graph into a totally colored one. In this way, we obtain an operational framework in which different combinations of operators result in different formal properties. Among others, we identify the basic strategy employed by the noMoRe system and justify its algorithmic approach. Furthermore, we distinguish operations corresponding to Fitting's operator as well as to well-founded semantics. (To appear in Theory and Practice of Logic Programming (TPLP))
[ { "version": "v1", "created": "Mon, 21 Feb 2005 14:28:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Konczak", "Kathrin", "" ], [ "Linke", "Thomas", "" ], [ "Schaub", "Torsten", "" ] ]
cs/0502085
Fabien Viger
Fabien Viger (LIAFA, Regal Ur-R Lip6), Matthieu Latapy (LIAFA)
Fast generation of random connected graphs with prescribed degrees
null
null
null
null
cs.NI cond-mat.dis-nn cs.DM
null
We address here the problem of generating random graphs uniformly from the set of simple connected graphs having a prescribed degree sequence. Our goal is to provide an algorithm designed for practical use both because of its ability to generate very large graphs (efficiency) and because it is easy to implement (simplicity). We focus on a family of heuristics for which we prove optimality conditions, and show how this optimality can be reached in practice. We then propose a different approach, specifically designed for typical real-world degree distributions, which outperforms the first one. Assuming a conjecture which we state and argue rigorously, we finally obtain an log-linear algorithm, which, in spite of being very simple, improves the best known complexity.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 07:59:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Viger", "Fabien", "", "LIAFA, Regal Ur-R Lip6" ], [ "Latapy", "Matthieu", "", "LIAFA" ] ]
cs/0502086
Pierre-Yves Oudeyer
Pierre-Yves Oudeyer
The Self-Organization of Speech Sounds
null
Journal of Theoretical Biology 233 (2005) Issue 3, Pages 435-449
null
null
cs.LG cs.AI cs.CL cs.NE cs.RO math.DS
null
The speech code is a vehicle of language: it defines a set of forms used by a community to carry information. Such a code is necessary to support the linguistic interactions that allow humans to communicate. How then may a speech code be formed prior to the existence of linguistic interactions? Moreover, the human speech code is discrete and compositional, shared by all the individuals of a community but different across communities, and phoneme inventories are characterized by statistical regularities. How can a speech code with these properties form? We try to approach these questions in the paper, using the "methodology of the artificial". We build a society of artificial agents, and detail a mechanism that shows the formation of a discrete speech code without pre-supposing the existence of linguistic capacities or of coordinated interactions. The mechanism is based on a low-level model of sensory-motor interactions. We show that the integration of certain very simple and non language-specific neural devices leads to the formation of a speech code that has properties similar to the human speech code. This result relies on the self-organizing properties of a generic coupling between perception and production within agents, and on the interactions between agents. The artificial system helps us to develop better intuitions on how speech might have appeared, by showing how self-organization might have helped natural selection to find speech.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 09:51:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Oudeyer", "Pierre-Yves", "" ] ]
cs/0502087
Peter Turney
Robert Ewaschuk, Peter Turney
Self-Replicating Strands that Self-Assemble into User-Specified Meshes
27 pages, issued 2005, Java code available at http://purl.org/net/johnnyvon/
null
null
NRC-47442, ERB-1121
cs.NE cs.CE cs.MA
null
It has been argued that a central objective of nanotechnology is to make products inexpensively, and that self-replication is an effective approach to very low-cost manufacturing. The research presented here is intended to be a step towards this vision. In previous work (JohnnyVon 1.0), we simulated machines that bonded together to form self-replicating strands. There were two types of machines (called types 0 and 1), which enabled strands to encode arbitrary bit strings. However, the information encoded in the strands had no functional role in the simulation. The information was replicated without being interpreted, which was a significant limitation for potential manufacturing applications. In the current work (JohnnyVon 2.0), the information in a strand is interpreted as instructions for assembling a polygonal mesh. There are now four types of machines and the information encoded in a strand determines how it folds. A strand may be in an unfolded state, in which the bonds are straight (although they flex slightly due to virtual forces acting on the machines), or in a folded state, in which the bond angles depend on the types of machines. By choosing the sequence of machine types in a strand, the user can specify a variety of polygonal shapes. A simulation typically begins with an initial unfolded seed strand in a soup of unbonded machines. The seed strand replicates by bonding with free machines in the soup. The child strands fold into the encoded polygonal shape, and then the polygons drift together and bond to form a mesh. We demonstrate that a variety of polygonal meshes can be manufactured in the simulation, by simply changing the sequence of machine types in the seed.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 16:53:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Ewaschuk", "Robert", "" ], [ "Turney", "Peter", "" ] ]
cs/0502088
Pascal Hitzler
Pascal Hitzler
Towards a Systematic Account of Different Semantics for Logic Programs
20 pages
null
null
null
cs.AI cs.LO
null
In [Hitzler and Wendt 2002, 2005], a new methodology has been proposed which allows to derive uniform characterizations of different declarative semantics for logic programs with negation. One result from this work is that the well-founded semantics can formally be understood as a stratified version of the Fitting (or Kripke-Kleene) semantics. The constructions leading to this result, however, show a certain asymmetry which is not readily understood. We will study this situation here with the result that we will obtain a coherent picture of relations between different semantics for normal logic programs.
[ { "version": "v1", "created": "Tue, 22 Feb 2005 18:53:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitzler", "Pascal", "" ] ]
cs/0502090
Achim Streit
A. Streit, D. Erwin, Th. Lippert, D. Mallmann, R. Menday, M. Rambadt, M. Riedel, M. Romberg, B. Schuller, Ph. Wieder
UNICORE - From Project Results to Production Grids
21 pages, 3 figures
null
null
null
cs.DC cs.OS
null
The UNICORE Grid-technology provides a seamless, secure and intuitive access to distributed Grid resources. In this paper we present the recent evolution from project results to production Grids. At the beginning UNICORE was developed as a prototype software in two projects funded by the German research ministry (BMBF). Over the following years, in various European-funded projects, UNICORE evolved to a full-grown and well-tested Grid middleware system, which today is used in daily production at many supercomputing centers worldwide. Beyond this production usage, the UNICORE technology serves as a solid basis in many European and International research projects, which use existing UNICORE components to implement advanced features, high level services, and support for applications from a growing range of domains. In order to foster these ongoing developments, UNICORE is available as open source under BSD licence at SourceForge, where new releases are published on a regular basis. This paper is a review of the UNICORE achievements so far and gives a glimpse on the UNICORE roadmap.
[ { "version": "v1", "created": "Thu, 24 Feb 2005 14:13:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Streit", "A.", "" ], [ "Erwin", "D.", "" ], [ "Lippert", "Th.", "" ], [ "Mallmann", "D.", "" ], [ "Menday", "R.", "" ], [ "Rambadt", "M.", "" ], [ "Riedel", "M.", "" ], [ "Romberg", "M.", "" ], [ "Schuller", "B.", "" ], [ "Wieder", "Ph.", "" ] ]
cs/0502093
Alessandro Mei
Alessandro Mei and Romeo Rizzi
Online Permutation Routing in Partitioned Optical Passive Star Networks
null
null
null
null
cs.DC
null
This paper establishes the state of the art in both deterministic and randomized online permutation routing in the POPS network. Indeed, we show that any permutation can be routed online on a POPS network either with $O(\frac{d}{g}\log g)$ deterministic slots, or, with high probability, with $5c\lceil d/g\rceil+o(d/g)+O(\log\log g)$ randomized slots, where constant $c=\exp (1+e^{-1})\approx 3.927$. When $d=\Theta(g)$, that we claim to be the "interesting" case, the randomized algorithm is exponentially faster than any other algorithm in the literature, both deterministic and randomized ones. This is true in practice as well. Indeed, experiments show that it outperforms its rivals even starting from as small a network as a POPS(2,2), and the gap grows exponentially with the size of the network. We can also show that, under proper hypothesis, no deterministic algorithm can asymptotically match its performance.
[ { "version": "v1", "created": "Sat, 26 Feb 2005 00:07:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Mei", "Alessandro", "" ], [ "Rizzi", "Romeo", "" ] ]
cs/0502094
Samir Aknine
Samir Aknine, Onn Shehory
Coalition Formation: Concessions, Task Relationships and Complexity Reduction
null
null
null
null
cs.MA
null
Solutions to the coalition formation problem commonly assume agent rationality and, correspondingly, utility maximization. This in turn may prevent agents from making compromises. As shown in recent studies, compromise may facilitate coalition formation and increase agent utilities. In this study we leverage on those new results. We devise a novel coalition formation mechanism that enhances compromise. Our mechanism can utilize information on task dependencies to reduce formation complexity. Further, it works well with both cardinal and ordinal task values. Via experiments we show that the use of the suggested compromise-based coalition formation mechanism provides significant savings in the computation and communication complexity of coalition formation. Our results also show that when information on task dependencies is used, the complexity of coalition formation is further reduced. We demonstrate successful use of the mechanism for collaborative information filtering, where agents combine linguistic rules to analyze documents' contents.
[ { "version": "v1", "created": "Sun, 27 Feb 2005 18:16:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Aknine", "Samir", "" ], [ "Shehory", "Onn", "" ] ]
cs/0502095
Leandro Marturelli Schaeffer
Gilson A. Giraldi, Leandro S. Marturelli, Paulo S. Rodrigues
Gradient Vector Flow Models for Boundary Extraction in 2D Images
8 pages, 11 figures
null
null
null
cs.CV
null
The Gradient Vector Flow (GVF) is a vector diffusion approach based on Partial Differential Equations (PDEs). This method has been applied together with snake models for boundary extraction medical images segmentation. The key idea is to use a diffusion-reaction PDE to generate a new external force field that makes snake models less sensitivity to initialization as well as improves the snake's ability to move into boundary concavities. In this paper, we firstly review basic results about convergence and numerical analysis of usual GVF schemes. We point out that GVF presents numerical problems due to discontinuities image intensity. This point is considered from a practical viewpoint from which the GVF parameters must follow a relationship in order to improve numerical convergence. Besides, we present an analytical analysis of the GVF dependency from the parameters values. Also, we observe that the method can be used for multiply connected domains by just imposing the suitable boundary condition. In the experimental results we verify these theoretical points and demonstrate the utility of GVF on a segmentation approach that we have developed based on snakes.
[ { "version": "v1", "created": "Mon, 28 Feb 2005 15:09:08 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2005 19:19:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Marturelli", "Leandro S.", "" ], [ "Rodrigues", "Paulo S.", "" ] ]
cs/0502096
Jano van Hemert
J.I. van Hemert
Property analysis of symmetric travelling salesman problem instances acquired through evolution
To be published in G. Raidl and J. Gottlieb, editors, Evolutionary Computation in Combinatorial Optimization, Springer Lecture Notes on Computer Science, pages 122-131. Springer-Verlag, Berlin, 2005
null
null
null
cs.NE cs.AI
null
We show how an evolutionary algorithm can successfully be used to evolve a set of difficult to solve symmetric travelling salesman problem instances for two variants of the Lin-Kernighan algorithm. Then we analyse the instances in those sets to guide us towards deferring general knowledge about the efficiency of the two variants in relation to structural properties of the symmetric travelling sale sman problem.
[ { "version": "v1", "created": "Mon, 28 Feb 2005 16:40:34 GMT" } ]
2007-05-23T00:00:00
[ [ "van Hemert", "J. I.", "" ] ]
cs/0503001
Emanuel Diamant
Emanuel Diamant
Top-Down Unsupervised Image Segmentation (it sounds like oxymoron, but actually it is not)
null
null
null
null
cs.CV cs.IR
null
Pattern recognition is generally assumed as an interaction of two inversely directed image-processing streams: the bottom-up information details gathering and localization (segmentation) stream, and the top-down information features aggregation, association and interpretation (recognition) stream. Inspired by recent evidence from biological vision research and by the insights of Kolmogorov Complexity theory, we propose a new, just top-down evolving, procedure of initial image segmentation. We claim that traditional top-down cognitive reasoning, which is supposed to guide the segmentation process to its final result, is not at all a part of the image information content evaluation. And that initial image segmentation is certainly an unsupervised process. We present some illustrative examples, which support our claims.
[ { "version": "v1", "created": "Tue, 1 Mar 2005 05:17:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0503002
Lester Lobo
Lester Lobo, James D. Arthur
Local and Global Analysis: Complementary Activities for Increasing the Effectiveness of Requirements Verification and Validation
6 pages, 3 figures, published: ACM Southeast Conference, March 2005
null
null
null
cs.SE
null
This paper presents a unique approach to connecting requirements engineering (RE) activities into a process framework that can be employed to obtain quality requirements with reduced expenditures of effort and cost. We propose a two-phase model that is novel in that it introduces the concept of verification and validation (V&V) early in the requirements life cycle. In the first phase, we perform V&V immediately following the elicitation of requirements for each individually distinct system function. Because the first phase focuses on capturing smaller sets of related requirements iteratively, each corresponding V&V activity is better focused for detecting and correcting errors in each requirement set. In the second phase, a complementary verification activity is initiated; the corresponding focus is on the quality of linkages between requirements sets rather than on the requirements within the sets. Consequently, this approach reduces the effort in verification and enhances the focus on the verification task. Our approach, unlike other models, has a minimal time delay between the elicitation of requirements and the execution of the V&V activities. Because of this short time gap, the stakeholders have a clearer recollection of the requirements, their context and rationale; this enhances the stakeholder feedback. Furthermore, our model includes activities that closely align with the effective RE processes employed in the software industry. Thus, our approach facilitates a better understanding of the flow of requirements, and provides guidance for the implementation of the RE process.
[ { "version": "v1", "created": "Wed, 2 Mar 2005 00:21:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Lester", "" ], [ "Arthur", "James D.", "" ] ]
cs/0503004
Lester Lobo
Lester Lobo, James D. Arthur
Effective Requirements Generation: Synchronizing Early Verification & Validation, Methods and Method Selection Criteria
46 pages, 7 figures, 7 tables, provides elaborate description of the research
null
null
null
cs.SE
null
This paper presents an approach for the implementation and execution of an effective requirements generation process. We achieve this goal by providing a well-defined requirements engineering model that includes verification and validation (V&V), and analysis. In addition, we identify focused activity objectives and map popular methods to lower-level activities, and define a criterion based process for optimizing method selection for attendant activities. Our model, unlike other models, addresses the complete requirements generation process and consists of activities defined at more adequate levels of abstraction. Furthermore, our model also incorporates a unique approach to V&V that enhances quality and reduces the cost of generating requirements. Additionally, activity objectives are identified and explicitly stated - not implied as in the current models. To assist in the selection of an appropriate set of methods, we have mapped commonly used methods to activities based on their objectives. Finally, we have identified method selection criteria and prescribed a reduced set of methods that optimize these criteria for each activity in our model. Thus, our approach assists in the task of selecting methods by using selection criteria to reduce a large collection of potential methods to a smaller, manageable set. The model, clear mapping of methods to activity objectives, and the criteria based process, taken together, provide the much needed guidance for the effective implementation and execution of the requirements generation process.
[ { "version": "v1", "created": "Wed, 2 Mar 2005 01:05:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Lester", "" ], [ "Arthur", "James D.", "" ] ]
cs/0503007
Johan Bollen
Johan Bollen, Herbert Van de Sompel, Joan Smith and Rick Luce
Toward alternative metrics of journal impact: A comparison of download and citation data
34 pages, submitted to Information Processing and Management, special issue on Informetrics
null
null
null
cs.DL
null
We generated networks of journal relationships from citation and download data, and determined journal impact rankings from these networks using a set of social network centrality metrics. The resulting journal impact rankings were compared to the ISI IF. Results indicate that, although social network metrics and ISI IF rankings deviate moderately for citation-based journal networks, they differ considerably for journal networks derived from download data. We believe the results represent a unique aspect of general journal impact that is not captured by the ISI IF. These results furthermore raise questions regarding the validity of the ISI IF as the sole assessment of journal impact, and suggest the possibility of devising impact metrics based on usage information in general.
[ { "version": "v1", "created": "Thu, 3 Mar 2005 05:14:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ], [ "Smith", "Joan", "" ], [ "Luce", "Rick", "" ] ]
cs/0503008
Laurent Tournier
Laurent Tournier (LMC - IMAG)
Approximation of dynamical systems using S-systems theory : application to biological systems
null
null
null
null
cs.SC math.DS q-bio.MN
null
In this paper we propose a new symbolic-numeric algorithm to find positive equilibria of a n-dimensional dynamical system. This algorithm implies a symbolic manipulation of ODE in order to give a local approximation of differential equations with power-law dynamics (S-systems). A numerical calculus is then needed to converge towards an equilibrium, giving at the same time a S-system approximating the initial system around this equilibrium. This algorithm is applied to a real biological example in 14 dimensions which is a subsystem of a metabolic pathway in Arabidopsis Thaliana.
[ { "version": "v1", "created": "Thu, 3 Mar 2005 06:32:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Tournier", "Laurent", "", "LMC - IMAG" ] ]
cs/0503009
Valmir Barbosa
R. S. C. Leao, V. C. Barbosa
Minimal chordal sense of direction and circulant graphs
null
Lecture Notes in Computer Science 4162 (2006), 670-680
10.1007/11821069_58
null
cs.DM
null
A sense of direction is an edge labeling on graphs that follows a globally consistent scheme and is known to considerably reduce the complexity of several distributed problems. In this paper, we study a particular instance of sense of direction, called a chordal sense of direction (CSD). In special, we identify the class of k-regular graphs that admit a CSD with exactly k labels (a minimal CSD). We prove that connected graphs in this class are Hamiltonian and that the class is equivalent to that of circulant graphs, presenting an efficient (polynomial-time) way of recognizing it when the graphs' degree k is fixed.
[ { "version": "v1", "created": "Thu, 3 Mar 2005 12:06:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Leao", "R. S. C.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0503014
Christian W. Straka
Christian W. Straka
ADF95: Tool for automatic differentiation of a FORTRAN code designed for large numbers of independent variables
24 pages, 2 figures, 4 tables, accepted in Computer Physics Communications
null
10.1016/j.cpc.2005.01.011
null
cs.MS
null
ADF95 is a tool to automatically calculate numerical first derivatives for any mathematical expression as a function of user defined independent variables. Accuracy of derivatives is achieved within machine precision. ADF95 may be applied to any FORTRAN 77/90/95 conforming code and requires minimal changes by the user. It provides a new derived data type that holds the value and derivatives and applies forward differencing by overloading all FORTRAN operators and intrinsic functions. An efficient indexing technique leads to a reduced memory usage and a substantially increased performance gain over other available tools with operator overloading. This gain is especially pronounced for sparse systems with large number of independent variables. A wide class of numerical simulations, e.g., those employing implicit solvers, can profit from ADF95.
[ { "version": "v1", "created": "Fri, 4 Mar 2005 19:20:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Straka", "Christian W.", "" ] ]
cs/0503016
Xiaoming Liu
Xiaoming Liu, Lyudmila Balakireva, Patrick Hochstenbach, Herbert Van de Sompel
File-based storage of Digital Objects and constituent datastreams: XMLtapes and Internet Archive ARC files
12 pages, 1 figures (camera-ready copy for ECDL 2005)
null
null
null
cs.DL
null
This paper introduces the write-once/read-many XMLtape/ARC storage approach for Digital Objects and their constituent datastreams. The approach combines two interconnected file-based storage mechanisms that are made accessible in a protocol-based manner. First, XML-based representations of multiple Digital Objects are concatenated into a single file named an XMLtape. An XMLtape is a valid XML file; its format definition is independent of the choice of the XML-based complex object format by which Digital Objects are represented. The creation of indexes for both the identifier and the creation datetime of the XML-based representation of the Digital Objects facilitates OAI-PMH-based access to Digital Objects stored in an XMLtape. Second, ARC files, as introduced by the Internet Archive, are used to contain the constituent datastreams of the Digital Objects in a concatenated manner. An index for the identifier of the datastream facilitates OpenURL-based access to an ARC file. The interconnection between XMLtapes and ARC files is provided by conveying the identifiers of ARC files associated with an XMLtape as administrative information in the XMLtape, and by including OpenURL references to constituent datastreams of a Digital Object in the XML-based representation of that Digital Object.
[ { "version": "v1", "created": "Mon, 7 Mar 2005 23:17:23 GMT" }, { "version": "v2", "created": "Fri, 3 Jun 2005 17:27:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Xiaoming", "" ], [ "Balakireva", "Lyudmila", "" ], [ "Hochstenbach", "Patrick", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0503017
Hooman Nikmehr
Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim
A Fast Combined Decimal Adder/Subtractor
This paper has been withdrawn by the authors
null
null
null
cs.OH
null
This paper has been withdrawn.
[ { "version": "v1", "created": "Mon, 7 Mar 2005 23:32:27 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2005 01:54:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Nikmehr", "Hooman", "" ], [ "Phillips", "Braden", "" ], [ "Lim", "Cheng-Chew", "" ] ]
cs/0503020
Stevan Harnad
Tim Brody, Stevan Harnad
Earlier Web Usage Statistics as Predictors of Later Citation Impact
null
null
null
null
cs.IR
null
The use of citation counts to assess the impact of research articles is well established. However, the citation impact of an article can only be measured several years after it has been published. As research articles are increasingly accessed through the Web, the number of times an article is downloaded can be instantly recorded and counted. One would expect the number of times an article is read to be related both to the number of times it is cited and to how old the article is. This paper analyses how short-term Web usage impact predicts medium-term citation impact. The physics e-print archive (arXiv.org) is used to test this.
[ { "version": "v1", "created": "Tue, 8 Mar 2005 22:26:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Brody", "Tim", "" ], [ "Harnad", "Stevan", "" ] ]
cs/0503021
Stevan Harnad
Stevan Harnad
Fast-Forward on the Green Road to Open Access: The Case Against Mixing Up Green and Gold
null
Ariadne 42 January 2005; http://www.ariadne.ac.uk/issue42/harnad/
null
null
cs.IR
null
This article is a critique of: "The 'Green' and 'Gold' Roads to Open Access: The Case for Mixing and Matching" by Jean-Claude Guedon (in Serials Review 30(4) 2004). Open Access (OA) means: free online access to all peer-reviewed journal articles. Jean-Claude Guedon argues against the efficacy of author self-archiving of peer-reviewed journal articles (the "Green" road to OA). He suggests instead that we should convert to Open Access Publishing (the "Golden" road to OA) by "mixing and matching" Green and Gold as follows: o First, self-archive dissertations (not published, peer-reviewed journal articles). o Second, identify and tag how those dissertations have been evaluated and reviewed. o Third, self-archive unrefereed preprints (not published, peer-reviewed journal articles). o Fourth, develop new mechanisms for evaluating and reviewing those unrefereed preprints, at multiple levels. The result will be OA Publishing (Gold). I argue that rather than yet another 10 years of speculation like this, what is actually needed (and imminent) is for OA self-archiving to be mandated by research funders and institutions so that the self-archiving of published, peer-reviewed journal articles (Green) can be fast-forwarded to 100% OA.
[ { "version": "v1", "created": "Tue, 8 Mar 2005 22:44:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Harnad", "Stevan", "" ] ]
cs/0503022
Daniel Pfeifer
Daniel Pfeifer and Peter C. Lockemann
Theory and Practice of Transactional Method Caching
null
null
null
2005-9
cs.DB
null
Nowadays, tiered architectures are widely accepted for constructing large scale information systems. In this context application servers often form the bottleneck for a system's efficiency. An application server exposes an object oriented interface consisting of set of methods which are accessed by potentially remote clients. The idea of method caching is to store results of read-only method invocations with respect to the application server's interface on the client side. If the client invokes the same method with the same arguments again, the corresponding result can be taken from the cache without contacting the server. It has been shown that this approach can considerably improve a real world system's efficiency. This paper extends the concept of method caching by addressing the case where clients wrap related method invocations in ACID transactions. Demarcating sequences of method calls in this way is supported by many important application server standards. In this context the paper presents an architecture, a theory and an efficient protocol for maintaining full transactional consistency and in particular serializability when using a method cache on the client side. In order to create a protocol for scheduling cached method results, the paper extends a classical transaction formalism. Based on this extension, a recovery protocol and an optimistic serializability protocol are derived. The latter one differs from traditional transactional cache protocols in many essential ways. An efficiency experiment validates the approach: Using the cache a system's performance and scalability are considerably improved.
[ { "version": "v1", "created": "Wed, 9 Mar 2005 17:53:15 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2005 12:35:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Pfeifer", "Daniel", "" ], [ "Lockemann", "Peter C.", "" ] ]
cs/0503023
Josiah Carlson
Josiah Carlson and David Eppstein
The Weighted Maximum-Mean Subtree and Other Bicriterion Subtree Problems
10 pages
null
null
null
cs.CG cs.DS
null
We consider problems in which we are given a rooted tree as input, and must find a subtree with the same root, optimizing some objective function of the nodes in the subtree. When this function is the sum of constant node weights, the problem is trivially solved in linear time. When the objective is the sum of weights that are linear functions of a parameter, we show how to list all optima for all possible parameter values in O(n log n) time; this parametric optimization problem can be used to solve many bicriterion optimizations problems, in which each node has two values xi and yi associated with it, and the objective function is a bivariate function f(SUM(xi),SUM(yi)) of the sums of these two values. A special case, when f is the ratio of the two sums, is the Weighted Maximum-Mean Subtree Problem, or equivalently the Fractional Prize-Collecting Steiner Tree Problem on Trees; for this special case, we provide a linear time algorithm for this problem when all weights are positive, improving a previous O(n log n) solution, and prove that the problem is NP-complete when negative weights are allowed.
[ { "version": "v1", "created": "Wed, 9 Mar 2005 18:16:14 GMT" }, { "version": "v2", "created": "Wed, 4 May 2005 21:45:54 GMT" }, { "version": "v3", "created": "Tue, 16 Aug 2005 06:06:57 GMT" }, { "version": "v4", "created": "Tue, 6 Dec 2005 01:56:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Carlson", "Josiah", "" ], [ "Eppstein", "David", "" ] ]
cs/0503024
Dan Tufis I.
Dan Tufis, Radu Ion, Nancy Ide
Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word Alignment, Word Clustering and Aligned Wordnets
7 pages in Proc. of COLING2005
In proceedings of the 20th International Conference on Computational Linguistics, COLING2004, Geneva, 2004, pp. 1312-1318
null
null
cs.AI cs.CL
null
The paper presents a method for word sense disambiguation based on parallel corpora. The method exploits recent advances in word alignment and word clustering based on automatic extraction of translation equivalents and being supported by available aligned wordnets for the languages in the corpus. The wordnets are aligned to the Princeton Wordnet, according to the principles established by EuroWordNet. The evaluation of the WSD system, implementing the method described herein showed very encouraging results. The same system used in a validation mode, can be used to check and spot alignment errors in multilingually aligned wordnets as BalkaNet and EuroWordNet.
[ { "version": "v1", "created": "Thu, 10 Mar 2005 11:49:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Tufis", "Dan", "" ], [ "Ion", "Radu", "" ], [ "Ide", "Nancy", "" ] ]