id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0503025
Rajkumar Buyya
Jia Yu, Rajkumar Buyya
A Taxonomy of Workflow Management Systems for Grid Computing
29 pages, 15 figures
null
null
GRIDS-TR-2005-1, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, March 10, 2005
cs.DC
null
With the advent of Grid and application technologies, scientists and engineers are building more and more complex applications to manage and process large data sets, and execute scientific experiments on distributed resources. Such application scenarios require means for composing and executing complex workflows. Therefore, many efforts have been made towards the development of workflow management systems for Grid computing. In this paper, we propose a taxonomy that characterizes and classifies various approaches for building and executing workflows on Grids. We also survey several representative Grid workflow systems developed by various projects world-wide to demonstrate the comprehensiveness of the taxonomy. The taxonomy not only highlights the design and engineering similarities and differences of state-of-the-art in Grid workflow systems, but also identifies the areas that need further research.
[ { "version": "v1", "created": "Fri, 11 Mar 2005 01:13:07 GMT" }, { "version": "v2", "created": "Wed, 13 Apr 2005 08:21:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Yu", "Jia", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0503028
Do Duc Hanh
Phan Minh Dung, Do Duc Hanh, and Phan Minh Thang (Asian Institute of Technology)
Stabilization of Cooperative Information Agents in Unpredictable Environment: A Logic Programming Approach
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.MA cs.PL
null
An information agent is viewed as a deductive database consisting of 3 parts: an observation database containing the facts the agent has observed or sensed from its surrounding environment, an input database containing the information the agent has obtained from other agents, and an intensional database which is a set of rules for computing derived information from the information stored in the observation and input databases. Stabilization of a system of information agents represents a capability of the agents to eventually get correct information about their surrounding despite unpredictable environment changes and the incapability of many agents to sense such changes causing them to have temporary incorrect information. We argue that the stabilization of a system of cooperative information agents could be understood as the convergence of the behavior of the whole system toward the behavior of a "superagent", who has the sensing and computing capabilities of all agents combined. We show that unfortunately, stabilization is not guaranteed in general, even if the agents are fully cooperative and do not hide any information from each other. We give sufficient conditions for stabilization and discuss the consequences of our results.
[ { "version": "v1", "created": "Mon, 14 Mar 2005 09:07:24 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2005 01:57:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Dung", "Phan Minh", "", "Asian Institute of\n Technology" ], [ "Hanh", "Do Duc", "", "Asian Institute of\n Technology" ], [ "Thang", "Phan Minh", "", "Asian Institute of\n Technology" ] ]
cs/0503030
Rajesh Pampapathi
Rajesh M. Pampapathi, Boris Mirkin, Mark Levene
A Suffix Tree Approach to Email Filtering
Revisions made in the light of reviewer comments. Main changes: (i) The extension and elaboration of section 4.4 which describes the scoring algorithm; (ii) Favouring the use of false positive and false negative performance measures over the use of precision and recall; (iii) The addition of ROC curves wherever possible; and (iv) Inclusion of performance statistics for algorithm. Re-submitted 5th August 2005
null
null
null
cs.AI cs.CL
null
We present an approach to email filtering based on the suffix tree data structure. A method for the scoring of emails using the suffix tree is developed and a number of scoring and score normalisation functions are tested. Our results show that the character level representation of emails and classes facilitated by the suffix tree can significantly improve classification accuracy when compared with the currently popular methods, such as naive Bayes. We believe the method can be extended to the classification of documents in other domains.
[ { "version": "v1", "created": "Mon, 14 Mar 2005 18:12:03 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2005 15:22:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Pampapathi", "Rajesh M.", "" ], [ "Mirkin", "Boris", "" ], [ "Levene", "Mark", "" ] ]
cs/0503032
Loreto Bravo
L. Bertossi (1), L. Bravo (1), E. Franconi (2), A. Lopatenko (2 and 3) ((1) Carleton University (2) Free University of Bozen--Bolzano, (3) University of Manchester)
Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints
35 pages. Extended version of the camera ready version to appear in Proc. of the Databases Programming Languages Conference (DBPL 05), Springer LNCS volume 3774
null
null
null
cs.DB cs.CC
null
Consistent query answering is the problem of computing the answers from a database that are consistent with respect to certain integrity constraints that the database as a whole may fail to satisfy. Those answers are characterized as those that are invariant under minimal forms of restoring the consistency of the database. In this context, we study the problem of repairing databases by fixing integer numerical values at the attribute level with respect to denial and aggregation constraints. We introduce a quantitative definition of database fix, and investigate the complexity of several decision and optimization problems, including DFP, i.e. the existence of fixes within a given distance from the original instance, and CQA, i.e. deciding consistency of answers to aggregate conjunctive queries under different semantics. We provide sharp complexity bounds, identify relevant tractable cases; and introduce approximation algorithms for some of those that are intractable. More specifically, we obtain results like undecidability of existence of fixes for aggregation constraints; MAXSNP-hardness of DFP, but a good approximation algorithm for a relevant special case; and intractability but good approximation for CQA for aggregate queries for one database atom denials (plus built-ins).
[ { "version": "v1", "created": "Tue, 15 Mar 2005 00:03:59 GMT" }, { "version": "v2", "created": "Wed, 25 May 2005 17:46:21 GMT" }, { "version": "v3", "created": "Fri, 28 Oct 2005 19:43:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertossi", "L.", "", "2 and 3" ], [ "Bravo", "L.", "", "2 and 3" ], [ "Franconi", "E.", "", "2 and 3" ], [ "Lopatenko", "A.", "", "2 and 3" ] ]
cs/0503033
Stergos Afantenos
Stergos D. Afantenos, Konstantina Liontou, Maria Salapata, Vangelis Karkaletsis
An Introduction to the Summarization of Evolving Events: Linear and Non-linear Evolution
10 pages, 3 figures. To be pulished in Natural Language Understanding and Cognitive Science (NLUCS - 2005) conference
Edited by Bernadete Sharp, Proceedings of the 2nd International Workshop on Natural Language Understanding and Cognitive Science, NLUCS 2005. Maiami, Florida, USA: INSTICC Press. pp 91-99.
null
null
cs.CL cs.IR
null
This paper examines the summarization of events that evolve through time. It discusses different types of evolution taking into account the time in which the incidents of an event are happening and the different sources reporting on the specific event. It proposes an approach for multi-document summarization which employs ``messages'' for representing the incidents of an event and cross-document relations that hold between messages according to certain conditions. The paper also outlines the current version of the summarization system we are implementing to realize this approach.
[ { "version": "v1", "created": "Tue, 15 Mar 2005 15:31:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Afantenos", "Stergos D.", "" ], [ "Liontou", "Konstantina", "" ], [ "Salapata", "Maria", "" ], [ "Karkaletsis", "Vangelis", "" ] ]
cs/0503035
Alexey Savvateev
Anna Bogomolnaia, Michel Le Breton, Alexei Savvateev, Shlomo Weber
The egalitarian sharing rule in provision of public projects
7 pages
null
null
null
cs.GT
null
In this note we consider a society that partitions itself into disjoint jurisdictions, each choosing a location of its public project and a taxation scheme to finance it. The set of public project is multi-dimensional, and their costs could vary from jurisdiction to jurisdiction. We impose two principles, egalitarianism, that requires the equalization of the total cost for all agents in the same jurisdiction, and efficiency, that implies the minimization of the aggregate total cost within jurisdiction. We show that these two principles always yield a core-stable partition but a Nash stable partition may fail to exist.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 09:24:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Bogomolnaia", "Anna", "" ], [ "Breton", "Michel Le", "" ], [ "Savvateev", "Alexei", "" ], [ "Weber", "Shlomo", "" ] ]
cs/0503036
Ricardo Corin
R. Corin, S. Etalle, P.H. Hartel and A. Mader
Timed Analysis of Security Protocols
null
null
null
null
cs.CR
null
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the well known Clark Jacob library and the Security Protocol Open Repository (SPORE) library. Finally, we present some new challenges and threats that arise when considering time in the analysis, by providing a novel protocol that uses time challenges and exposing a timing attack over an implementation of an existing security protocol.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 10:05:18 GMT" }, { "version": "v2", "created": "Sun, 30 Oct 2005 21:03:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Corin", "R.", "" ], [ "Etalle", "S.", "" ], [ "Hartel", "P. H.", "" ], [ "Mader", "A.", "" ] ]
cs/0503037
Zengyou He
Zengyou He
Mining Top-k Approximate Frequent Patterns
13 pages
null
null
TR-2005-0315
cs.DB cs.AI
null
Frequent pattern (itemset) mining in transactional databases is one of the most well-studied problems in data mining. One obstacle that limits the practical usage of frequent pattern mining is the extremely large number of patterns generated. Such a large size of the output collection makes it difficult for users to understand and use in practice. Even restricting the output to the border of the frequent itemset collection does not help much in alleviating the problem. In this paper we address the issue of overwhelmingly large output size by introducing and studying the following problem: mining top-k approximate frequent patterns. The union of the power sets of these k sets should satisfy the following conditions: (1) including itemsets with larger support as many as possible and (2) including itemsets with smaller support as less as possible. An integrated objective function is designed to combine these two objectives. Consequently, we derive the upper bounds on objective function and present an approximate branch-and-bound method for finding the feasible solution. We give empirical evidence showing that our formulation and approximation methods work well in practice.
[ { "version": "v1", "created": "Thu, 17 Mar 2005 11:01:25 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
cs/0503043
Paolo Liberatore
Paolo Liberatore
Complexity Issues in Finding Succinct Solutions of PSPACE-Complete Problems
null
null
null
null
cs.AI cs.CC cs.LO
null
We study the problem of deciding whether some PSPACE-complete problems have models of bounded size. Contrary to problems in NP, models of PSPACE-complete problems may be exponentially large. However, such models may take polynomial space in a succinct representation. For example, the models of a QBF are explicitely represented by and-or trees (which are always of exponential size) but can be succinctely represented by circuits (which can be polynomial or exponential). We investigate the complexity of deciding the existence of such succinct models when a bound on size is given.
[ { "version": "v1", "created": "Fri, 18 Mar 2005 17:30:39 GMT" }, { "version": "v2", "created": "Sat, 19 Mar 2005 11:13:15 GMT" }, { "version": "v3", "created": "Tue, 29 Mar 2005 19:32:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Liberatore", "Paolo", "" ] ]
cs/0503045
Gregory Edwin Graham
G. E. Graham (1), M. Anzar Afaq (1), David Evans (1), Gerald Guglielmo (1), Eric Wicklund (1), Peter Love (2) ((1) Fermi National Accelerator Laboratory, (2) University of Lancaster)
Contextual Constraint Modeling in Grid Application Workflows
19 pages, 5 figures; Submitted to Concurrency and Computation: Practice and Experience for the Special Issue on Workflows at GGF10, cpe859
null
null
null
cs.DC
null
This paper introduces a new mechanism for specifying constraints in distributed workflows. By introducing constraints in a contextual form, it is shown how different people and groups within collaborative communities can cooperatively constrain workflows. A comparison with existing state-of-the-art workflow systems is made. These ideas are explored in practice with an illustrative example from High Energy Physics.
[ { "version": "v1", "created": "Sat, 19 Mar 2005 01:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Graham", "G. E.", "" ], [ "Afaq", "M. Anzar", "" ], [ "Evans", "David", "" ], [ "Guglielmo", "Gerald", "" ], [ "Wicklund", "Eric", "" ], [ "Love", "Peter", "" ] ]
cs/0503046
Haixia Jia
Dimitris Achlioptas and Haixia Jia and Cristopher Moore
Hiding Satisfying Assignments: Two are Better than One
Preliminary version appeared in AAAI 2004
null
null
null
cs.AI cond-mat.dis-nn cond-mat.stat-mech cs.CC
null
The evaluation of incomplete satisfiability solvers depends critically on the availability of hard satisfiable instances. A plausible source of such instances consists of random k-SAT formulas whose clauses are chosen uniformly from among all clauses satisfying some randomly chosen truth assignment A. Unfortunately, instances generated in this manner tend to be relatively easy and can be solved efficiently by practical heuristics. Roughly speaking, as the formula's density increases, for a number of different algorithms, A acts as a stronger and stronger attractor. Motivated by recent results on the geometry of the space of satisfying truth assignments of random k-SAT and NAE-k-SAT formulas, we introduce a simple twist on this basic model, which appears to dramatically increase its hardness. Namely, in addition to forbidding the clauses violated by the hidden assignment A, we also forbid the clauses violated by its complement, so that both A and complement of A are satisfying. It appears that under this "symmetrization'' the effects of the two attractors largely cancel out, making it much harder for algorithms to find any truth assignment. We give theoretical and experimental evidence supporting this assertion.
[ { "version": "v1", "created": "Sun, 20 Mar 2005 02:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Achlioptas", "Dimitris", "" ], [ "Jia", "Haixia", "" ], [ "Moore", "Cristopher", "" ] ]
cs/0503048
Arindam Mitra
Arindam Mitra
Is entanglement necessary to have unconditional security in quantum bit commitment ?
Pdf. 2 pages. Revised
null
null
null
cs.CR
null
A simple un-entanglement based quantum bit commitment scheme is presented. Although commitment is unconditionally secure but concealment is not.
[ { "version": "v1", "created": "Mon, 21 Mar 2005 15:20:14 GMT" }, { "version": "v2", "created": "Fri, 18 Nov 2005 15:39:44 GMT" }, { "version": "v3", "created": "Fri, 31 Mar 2006 13:58:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
cs/0503050
Nikita Sakhanenko
Hanna Makaruk, Robert Owczarek, Nikita Sakhanenko
Systematic Method for Path-Complete White Box Testing
24 pages, 3 figures, submitted to Software Testing, Verification and Reliability (STVR)
null
null
LA-UR-05-1850
cs.SE
null
A systematic, language-independent method of finding a minimal set of paths covering the code of a sequential program is proposed for application in White Box testing. Execution of all paths from the set ensures also statement coverage. Execution fault marks problematic areas of the code. The method starts from a UML activity diagram of a program. The diagram is transformed into a directed graph: graph's nodes substitute decision and action points; graph's directed edges substitute action arrows. The number of independent paths equals easy-to-compute cyclomatic complexity of the graph. Association of a vector to each path creates a path vector space. Independence of the paths is equivalent to linear independence of the vectors. It is sufficient to test any base of the path space to complete the procedure. An effective algorithm for choosing the base paths is presented.
[ { "version": "v1", "created": "Mon, 21 Mar 2005 21:26:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Makaruk", "Hanna", "" ], [ "Owczarek", "Robert", "" ], [ "Sakhanenko", "Nikita", "" ] ]
cs/0503051
Fengfeng Zhou
Fengfeng Zhou, Guoliang Chen, and Yinlong Xu
Construction of Small Worlds in the Physical Topology of Wireless Networks
null
null
null
null
cs.NI
null
The concept of small worlds is introduced into the physical topology of wireless networks in this work. A. Helmy provided two con- struction schemes of small worlds for the wireless networks, link rewiring and link addition, but he mainly focused on the virtual topology. Based on the broadcasting nature of the radio transmission, we propose a con- struction scheme of small worlds for the physical topology of Multiple- Input Multiple-Output (MIMO) wireless networks. Besides the topology- related topics, we also evaluate the reduction of the power required by a request.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 03:23:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Fengfeng", "" ], [ "Chen", "Guoliang", "" ], [ "Xu", "Yinlong", "" ] ]
cs/0503053
Carlos Miravet
Carlos Miravet and Francisco B. Rodriguez (EPS-UAM, Madrid, Spain)
A hybrid MLP-PNN architecture for fast image superresolution
8 pages with 4 figures. ICANN/ICONIP 2003
Lect. Notes Comput. Sc. 2714 (2003) 401-408
null
null
cs.CV cs.MM
null
Image superresolution methods process an input image sequence of a scene to obtain a still image with increased resolution. Classical approaches to this problem involve complex iterative minimization procedures, typically with high computational costs. In this paper is proposed a novel algorithm for super-resolution that enables a substantial decrease in computer load. First, a probabilistic neural network architecture is used to perform a scattered-point interpolation of the image sequence data. The network kernel function is optimally determined for this problem by a multi-layer perceptron trained on synthetic data. Network parameters dependence on sequence noise level is quantitatively analyzed. This super-sampled image is spatially filtered to correct finite pixel size effects, to yield the final high-resolution estimate. Results on a real outdoor sequence are presented, showing the quality of the proposed method.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 11:45:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Miravet", "Carlos", "", "EPS-UAM, Madrid, Spain" ], [ "Rodriguez", "Francisco B.", "", "EPS-UAM, Madrid, Spain" ] ]
cs/0503056
Carlos Miravet
Carlos Miravet, Enrique Coiras and Javier Santamaria (SENER, Madrid, Spain)
Semi-automatic vectorization of linear networks on rasterized cartographic maps
12 pages with 13 figures, in Spanish
Revista de Teledeteccion, 10 (1998)
null
null
cs.CV cs.MM
null
A system for semi-automatic vectorization of linear networks (roads, rivers, etc.) on rasterized cartographic maps is presented. In this system, human intervention is limited to a graphic, interactive selection of the color attributes of the information to be obtained. Using this data, the system performs a preliminary extraction of the linear network, which is subsequently completed, refined and vectorized by means of an automatic procedure. Results on maps of different sources and scales are included. ----- Se presenta un sistema semi-automatico de vectorizacion de redes de objetos lineales (carreteras, rios, etc.) en mapas cartograficos digitalizados. En este sistema, la intervencion humana queda reducida a la seleccion grafica interactiva de los atributos de color de la informacion a obtener. Con estos datos, el sistema realiza una extraccion preliminar de la red lineal, que se completa, refina y vectoriza mediante un procedimiento automatico. Se presentan resultados de la aplicacion del sistema sobre imagenes digitalizadas de mapas de distinta procedencia y escala.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 20:16:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Miravet", "Carlos", "", "SENER, Madrid,\n Spain" ], [ "Coiras", "Enrique", "", "SENER, Madrid,\n Spain" ], [ "Santamaria", "Javier", "", "SENER, Madrid,\n Spain" ] ]
cs/0503057
Ion Mandoiu
Ion I. Mandoiu and Dragos Trinca
Exact and Approximation Algorithms for DNA Tag Set Design
null
null
null
null
cs.DS
null
In this paper we propose new solution methods for designing tag sets for use in universal DNA arrays. First, we give integer linear programming formulations for two previous formalizations of the tag set design problem, and show that these formulations can be solved to optimality for instance sizes of practical interest by using general purpose optimization packages. Second, we note the benefits of periodic tags, and establish an interesting connection between the tag design problem and the problem of packing the maximum number of vertex-disjoint directed cycles in a given graph. We show that combining a simple greedy cycle packing algorithm with a previously proposed alphabetic tree search strategy yields an increase of over 40% in the number of tags compared to previous methods.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 02:36:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Trinca", "Dragos", "" ] ]
cs/0503060
Quan Son Nguyen
Quan Son Nguyen (Hanoi University of Technology, Vietnam)
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
9 pages with 2 figures. Accepted for the International Workshop on Coding and Cryptography (WCC'2005), March 2005 in Bergen, Norway
null
null
null
cs.CR
null
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains. We show that this construction has storage-computational complexity of O(logN) per chain element, which is comparable with the best result reported in recent literature. Based on multi-dimensional hash chains, we then propose two cash-like micropayment schemes, which have a number of advantages in terms of efficiency and security. We also point out some possible improvements to PayWord and similar schemes by using multi-dimensional hash chains
[ { "version": "v1", "created": "Wed, 23 Mar 2005 09:15:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Nguyen", "Quan Son", "", "Hanoi University of Technology, Vietnam" ] ]
cs/0503061
Sandro Etalle
Sandro Etalle and William H. Winsborough
Integrity Constraints in Trust Management
An extended abstract appears in the proc. of the 10th ACM Symp. on Access Control Models and Technologies (SACMAT). 2005
null
null
null
cs.CR cs.DB
null
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 15:20:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Etalle", "Sandro", "" ], [ "Winsborough", "William H.", "" ] ]
cs/0503062
Christoph Koch
Christoph Koch
On the Complexity of Nonrecursive XQuery and Functional Query Languages on Complex Values
Long version of PODS 2005 paper
null
null
null
cs.DB cs.CC
null
This paper studies the complexity of evaluating functional query languages for complex values such as monad algebra and the recursion-free fragment of XQuery. We show that monad algebra with equality restricted to atomic values is complete for the class TA[2^{O(n)}, O(n)] of problems solvable in linear exponential time with a linear number of alternations. The monotone fragment of monad algebra with atomic value equality but without negation is complete for nondeterministic exponential time. For monad algebra with deep equality, we establish TA[2^{O(n)}, O(n)] lower and exponential-space upper bounds. Then we study a fragment of XQuery, Core XQuery, that seems to incorporate all the features of a query language on complex values that are traditionally deemed essential. A close connection between monad algebra on lists and Core XQuery (with ``child'' as the only axis) is exhibited, and it is shown that these languages are expressively equivalent up to representation issues. We show that Core XQuery is just as hard as monad algebra w.r.t. combined complexity, and that it is in TC0 if the query is assumed fixed.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 15:36:55 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2005 00:22:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Koch", "Christoph", "" ] ]
cs/0503065
Rachid Echahed
Dominique Duval (LMC - IMAG), Rachid Echahed (Leibniz - IMAG), Frederic Prost (Leibniz - IMAG)
Data-Structure Rewriting
null
null
null
null
cs.PL cs.DS
null
We tackle the problem of data-structure rewriting including pointer redirections. We propose two basic rewrite steps: (i) Local Redirection and Replacement steps the aim of which is redirecting specific pointers determined by means of a pattern, as well as adding new information to an existing data ; and (ii) Global Redirection steps which are aimed to redirect all pointers targeting a node towards another one. We define these two rewriting steps following the double pushout approach. We define first the category of graphs we consider and then define rewrite rules as pairs of graph homomorphisms of the form "L <- K ->R". Unfortunately, inverse pushouts (complement pushouts) are not unique in our setting and pushouts do not always exist. Therefore, we define rewriting steps so that a rewrite rule can always be performed once a matching is found.
[ { "version": "v1", "created": "Thu, 24 Mar 2005 09:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Duval", "Dominique", "", "LMC - IMAG" ], [ "Echahed", "Rachid", "", "Leibniz - IMAG" ], [ "Prost", "Frederic", "", "Leibniz - IMAG" ] ]
cs/0503068
Michael Nelson
Michael L. Nelson
A Survey of Reverse Engineering and Program Comprehension
originally released as web-only in 1996
null
null
null
cs.SE
null
Reverse engineering has been a standard practice in the hardware community for some time. It has only been within the last ten years that reverse engineering, or "program comprehension", has grown into the current sub-discipline of software engineering. Traditional software engineering is primarily focused on the development and design of new software. However, most programmers work on software that other people have designed and developed. Up to 50% of a software maintainers time can be spent determining the intent of source code. The growing demand to reevaluate and reimplement legacy software systems, brought on by the proliferation of clientserver and World Wide Web technologies, has underscored the need for reverse engineering tools and techniques. This paper introduces the terminology of reverse engineering and gives some of the obstacles that make reverse engineering difficult. Although reverse engineering remains heavily dependent on the human component, a number of automated tools are presented that aid the reverse engineer.
[ { "version": "v1", "created": "Thu, 24 Mar 2005 13:55:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Nelson", "Michael L.", "" ] ]
cs/0503069
Michael Nelson
Michael L. Nelson, Herbert Van de Sompel, Xiaoming Liu, Terry L. Harrison, Nathan McFarland
mod_oai: An Apache Module for Metadata Harvesting
null
null
null
null
cs.DL
null
We describe mod_oai, an Apache 2.0 module that implements the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto standard for metadata exchange in digital libraries and allows repositories to expose their contents in a structured, application-neutral format with semantics optimized for accurate incremental harvesting. Current implementations of OAI-PMH are either separate applications that access an existing repository, or are built-in to repository software packages. mod_oai is different in that it optimizes harvesting web content by building OAI-PMH capability into the Apache server. We discuss the implications of adding harvesting capability to an Apache server and describe our initial experimental results accessing a departmental web site using both web crawling and OAIPMH harvesting techniques.
[ { "version": "v1", "created": "Thu, 24 Mar 2005 14:38:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Nelson", "Michael L.", "" ], [ "Van de Sompel", "Herbert", "" ], [ "Liu", "Xiaoming", "" ], [ "Harrison", "Terry L.", "" ], [ "McFarland", "Nathan", "" ] ]
cs/0503073
Viktor Toth
Viktor Toth
Tensor manipulation in GPL Maxima
26 pages (some formulae fixed, terminology usage corrected, comments added on improved tensor contraction algorithm)
null
null
null
cs.SC
null
GPL Maxima is an open-source computer algebra system based on DOE-MACSYMA. GPL Maxima included two tensor manipulation packages from DOE-MACSYMA, but these were in various states of disrepair. One of the two packages, CTENSOR, implemented component-based tensor manipulation; the other, ITENSOR, treated tensor symbols as opaque, manipulating them based on their index properties. The present paper describes the state in which these packages were found, the steps that were needed to make the packages fully functional again, and the new functionality that was implemented to make them more versatile. A third package, ATENSOR, was also implemented; fully compatible with the identically named package in the commercial version of MACSYMA, ATENSOR implements abstract tensor algebras.
[ { "version": "v1", "created": "Sat, 26 Mar 2005 14:41:49 GMT" }, { "version": "v2", "created": "Wed, 25 May 2005 16:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Toth", "Viktor", "" ] ]
cs/0503074
Sameer Tilak
Sameer Tilak, Bhanu Pisupati, Kenneth Chiu, Geoffrey Brown, Nael Abu-Ghazaleh
A File System Abstraction for Sense and Respond Systems
6 pages, 3 figures Workshop on End-to-End, Sense-and-Respond Systems, Applications, and Services In conjunction with MobiSys '05
null
null
null
cs.NI cs.OS
null
The heterogeneity and resource constraints of sense-and-respond systems pose significant challenges to system and application development. In this paper, we present a flexible, intuitive file system abstraction for organizing and managing sense-and-respond systems based on the Plan 9 design principles. A key feature of this abstraction is the ability to support multiple views of the system via filesystem namespaces. Constructed logical views present an application-specific representation of the network, thus enabling high-level programming of the network. Concurrently, structural views of the network enable resource-efficient planning and execution of tasks. We present and motivate the design using several examples, outline research challenges and our research plan to address them, and describe the current state of implementation.
[ { "version": "v1", "created": "Mon, 28 Mar 2005 15:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Tilak", "Sameer", "" ], [ "Pisupati", "Bhanu", "" ], [ "Chiu", "Kenneth", "" ], [ "Brown", "Geoffrey", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0503075
Wing-kai Lin
W.-Y. Ng, W.K. Lin, D.M. Chiu
Statistical Modelling of Information Sharing: Community, Membership and Content
accepted in International Symposium on Computer Performance, Modeling, Measurements and Evaluation, Juan-les-Pins, France, October-2005
null
null
null
cs.NI cond-mat.stat-mech physics.soc-ph
null
File-sharing systems, like many online and traditional information sharing communities (e.g. newsgroups, BBS, forums, interest clubs), are dynamical systems in nature. As peers get in and out of the system, the information content made available by the prevailing membership varies continually in amount as well as composition, which in turn affects all peers' join/leave decisions. As a result, the dynamics of membership and information content are strongly coupled, suggesting interesting issues about growth, sustenance and stability. In this paper, we propose to study such communities with a simple statistical model of an information sharing club. Carrying their private payloads of information goods as potential supply to the club, peers join or leave on the basis of whether the information they demand is currently available. Information goods are chunked and typed, as in a file sharing system where peers contribute different files, or a forum where messages are grouped by topics or threads. Peers' demand and supply are then characterized by statistical distributions over the type domain. This model reveals interesting critical behaviour with multiple equilibria. A sharp growth threshold is derived: the club may grow towards a sustainable equilibrium only if the value of an order parameter is above the threshold, or shrink to emptiness otherwise. The order parameter is composite and comprises the peer population size, the level of their contributed supply, the club's efficiency in information search, the spread of supply and demand over the type domain, as well as the goodness of match between them.
[ { "version": "v1", "created": "Mon, 28 Mar 2005 07:33:37 GMT" }, { "version": "v2", "created": "Fri, 8 Apr 2005 07:48:16 GMT" }, { "version": "v3", "created": "Sat, 2 Jul 2005 01:55:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ng", "W. -Y.", "" ], [ "Lin", "W. K.", "" ], [ "Chiu", "D. M.", "" ] ]
cs/0503076
Marci Meingast
Marci Meingast, Christopher Geyer, Shankar Sastry
Geometric Models of Rolling-Shutter Cameras
null
null
null
null
cs.CV cs.RO
null
Cameras with rolling shutters are becoming more common as low-power, low-cost CMOS sensors are being used more frequently in cameras. The rolling shutter means that not all scanlines are exposed over the same time interval. The effects of a rolling shutter are noticeable when either the camera or objects in the scene are moving and can lead to systematic biases in projection estimation. We develop a general projection equation for a rolling shutter camera and show how it is affected by different types of camera motion. In the case of fronto-parallel motion, we show how that camera can be modeled as an X-slit camera. We also develop approximate projection equations for a non-zero angular velocity about the optical axis and approximate the projection equation for a constant velocity screw motion. We demonstrate how the rolling shutter effects the projective geometry of the camera and in turn the structure-from-motion.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 00:00:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Meingast", "Marci", "" ], [ "Geyer", "Christopher", "" ], [ "Sastry", "Shankar", "" ] ]
cs/0503077
Mehryar Mohri
Mehryar Mohri, Fernando Pereira, Michael Riley
Weighted Automata in Text and Speech Processing
null
Mehryar Mohri, Fernando Pereira, and Michael Riley. Weighted Automata in Text and Speech Processing. In Proceedings of the 12th biennial European Conference on Artificial Intelligence (ECAI-96), Workshop on Extended finite state models of language. Budapest, Hungary, 1996. John Wiley and Sons, Chichester
null
null
cs.CL cs.HC
null
Finite-state automata are a very effective tool in natural language processing. However, in a variety of applications and especially in speech precessing, it is necessary to consider more general machines in which arcs are assigned weights or costs. We briefly describe some of the main theoretical and algorithmic aspects of these machines. In particular, we describe an efficient composition algorithm for weighted transducers, and give examples illustrating the value of determinization and minimization algorithms for weighted automata.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 04:59:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohri", "Mehryar", "" ], [ "Pereira", "Fernando", "" ], [ "Riley", "Michael", "" ] ]
cs/0503078
Fernando Sasse D.
Angelo Luis Pagliosa, Claudio Cesar de Sa and Fernando D. Sasse
Obtaining Membership Functions from a Neuron Fuzzy System extended by Kohonen Network
6 pages, 6 figures, 5th Congress of Logic Applied to Technology (LAPTEC 2005) Himeji, Japan, April 2-6, 2005
null
null
null
cs.NE
null
This article presents the Neo-Fuzzy-Neuron Modified by Kohonen Network (NFN-MK), an hybrid computational model that combines fuzzy system technique and artificial neural networks. Its main task consists in the automatic generation of membership functions, in particular, triangle forms, aiming a dynamic modeling of a system. The model is tested by simulating real systems, here represented by a nonlinear mathematical function. Comparison with the results obtained by traditional neural networks, and correlated studies of neurofuzzy systems applied in system identification area, shows that the NFN-MK model has a similar performance, despite its greater simplicity.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 19:40:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Pagliosa", "Angelo Luis", "" ], [ "de Sa", "Claudio Cesar", "" ], [ "Sasse", "Fernando D.", "" ] ]
cs/0503081
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
An Optimization Model for Outlier Detection in Categorical Data
12 pages
null
null
Tr-05-0329
cs.DB cs.AI
null
The task of outlier detection is to find small groups of data objects that are exceptional when compared with rest large amount of data. Detection of such outliers is important for many applications such as fraud detection and customer migration. Most existing methods are designed for numeric data. They will encounter problems with real-life applications that contain categorical data. In this paper, we formally define the problem of outlier detection in categorical data as an optimization problem from a global viewpoint. Moreover, we present a local-search heuristic based algorithm for efficiently finding feasible solutions. Experimental results on real datasets and large synthetic datasets demonstrate the superiority of our model and algorithm.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 13:31:01 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0503082
Gabriel Istrate
Gabriel Istrate, Stefan Boettcher, Allon G. Percus
Spines of Random Constraint Satisfaction Problems: Definition and Connection with Computational Complexity
A revised version of this paper will appear in Annals of Mathematics and Artificial Intelligence
null
null
null
cs.CC cond-mat.dis-nn cs.AI
null
We study the connection between the order of phase transitions in combinatorial problems and the complexity of decision algorithms for such problems. We rigorously show that, for a class of random constraint satisfaction problems, a limited connection between the two phenomena indeed exists. Specifically, we extend the definition of the spine order parameter of Bollobas et al. to random constraint satisfaction problems, rigorously showing that for such problems a discontinuity of the spine is associated with a $2^{\Omega(n)}$ resolution complexity (and thus a $2^{\Omega(n)}$ complexity of DPLL algorithms) on random instances. The two phenomena have a common underlying cause: the emergence of ``large'' (linear size) minimally unsatisfiable subformulas of a random formula at the satisfiability phase transition. We present several further results that add weight to the intuition that random constraint satisfaction problems with a sharp threshold and a continuous spine are ``qualitatively similar to random 2-SAT''. Finally, we argue that it is the spine rather than the backbone parameter whose continuity has implications for the decision complexity of combinatorial problems, and we provide experimental evidence that the two parameters can behave in a different manner.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 21:58:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ], [ "Boettcher", "Stefan", "" ], [ "Percus", "Allon G.", "" ] ]
cs/0503083
Gabriel Istrate
Gabriel Istrate
Coarse and Sharp Thresholds of Boolean Constraint Satisfaction Problems
A revised version of this paper will appear in Discrete Applied Mathematics
null
null
null
cs.DM cs.CC
null
We study threshold properties of random constraint satisfaction problems under a probabilistic model due to Molloy. We give a sufficient condition for the existence of a sharp threshold that leads (for boolean constraints) to a necessary and sufficient for the existence of a sharp threshold in the case where constraint templates are applied with equal probability, solving thus an open problem of Creignou and Daude.
[ { "version": "v1", "created": "Tue, 29 Mar 2005 22:25:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
cs/0503084
Pavlo Nefyodov
P. Nefyodov, V. Reztsov, O. Riabinina
The Peculiarities of Nonstationary Formation of Inhomogeneous Structures of Charged Particles in the Electrodiffusion Processes
6 pages, 6 figures The example of our scientific work
null
null
null
cs.CE
null
In this paper the distribution of charged particles is constructed under the approximation of ambipolar diffusion. The results of mathematical modelling in two-dimensional case taking into account the velocities of the system are presented.
[ { "version": "v1", "created": "Wed, 30 Mar 2005 07:00:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Nefyodov", "P.", "" ], [ "Reztsov", "V.", "" ], [ "Riabinina", "O.", "" ] ]
cs/0503086
Joseph Morlier
Joseph Morlier (LRBB)
Segmentation of the Homogeneity of a Signal Using a Piecewise Linear Recognition Tool
This preprint could help me to receive comments on my work in order to enhance the paper to be submitted
null
null
null
cs.NA
null
In this paper a new method of detection of homogeneous zones and singularity parts of a 1D signal is proposed. The entropy function is used to transform signal in piecewise linear one. The multiple regression permits to detect lines and project them in the Hough parameters space in order to easily recognise homogeneous zone and abrupt changes of the signal. Two application examples are analysed, the first is a classical fractal signal and the other is issued from a dynamic mechanical study.
[ { "version": "v1", "created": "Wed, 30 Mar 2005 13:53:19 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 14:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Morlier", "Joseph", "", "LRBB" ] ]
cs/0503090
Francesco Sorrentino Ing
David Arrowsmith, Mario di Bernardo, Francesco Sorrentino
Effects of variations of load distribution on network performance
4 pages, 4 figures, included in conference proceedings ISCAS 2005, Kobe Japan
null
null
null
cs.NI
null
This paper is concerned with the characterization of the relationship between topology and traffic dynamics. We use a model of network generation that allows the transition from random to scale free networks. Specifically, we consider three different topological types of network: random, scale-free with \gamma = 3, scale-free with \gamma = 2. By using a novel LRD traffic generator, we observe best performance, in terms of transmission rates and delivered packets, in the case of random networks. We show that, even if scale-free networks are characterized by shorter characteristic-path- length (the lower the exponent, the lower the path-length), they show worst performances in terms of communication. We conjecture this could be explained in terms of changes in the load distribution, defined here as the number of shortest paths going through a given vertex. In fact, that distribu- tion is characterized by (i) a decreasing mean (ii) an increas- ing standard deviation, as the networks becomes scale-free (especially scale-free networks with low exponents). The use of a degree-independent server also discriminates against a scale-free structure. As a result, since the model is un- controlled, most packets will go through the same vertices, favoring the onset of congestion.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 09:01:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Arrowsmith", "David", "" ], [ "di Bernardo", "Mario", "" ], [ "Sorrentino", "Francesco", "" ] ]
cs/0503091
Tatsuaki Okamoto
Tatsuaki Okamoto, Ryo Kashima
Resource Bounded Unprovability of Computational Lower Bounds
78 pages
null
null
null
cs.CC cs.LO
null
This paper introduces new notions of asymptotic proofs, PT(polynomial-time)-extensions, PTM(polynomial-time Turing machine)-omega-consistency, etc. on formal theories of arithmetic including PA (Peano Arithmetic). This paper shows that P not= NP (more generally, any super-polynomial-time lower bound in PSPACE) is unprovable in a PTM-omega-consistent theory T, where T is a consistent PT-extension of PA. This result gives a unified view to the existing two major negative results on proving P not= NP, Natural Proofs and relativizable proofs, through the two manners of characterization of PTM-omega-consistency. We also show that the PTM-omega-consistency of T cannot be proven in any PTM-omega-consistent theory S, where S is a consistent PT-extension of T.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 10:40:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Okamoto", "Tatsuaki", "" ], [ "Kashima", "Ryo", "" ] ]
cs/0503092
Jan Chomicki
Jan Chomicki, Joyce Song
Monotonic and Nonmonotonic Preference Revision
null
null
null
null
cs.DB cs.AI
null
We study here preference revision, considering both the monotonic case where the original preferences are preserved and the nonmonotonic case where the new preferences may override the original ones. We use a relational framework in which preferences are represented using binary relations (not necessarily finite). We identify several classes of revisions that preserve order axioms, for example the axioms of strict partial or weak orders. We consider applications of our results to preference querying in relational databases.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 19:43:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ], [ "Song", "Joyce", "" ] ]
cs/0504002
Nael Abu-Ghazaleh
Seon-Yeong Han and Nael Abu-Ghazaleh
On the Effect of Fading on Ad hoc Networking
12 pages; 14 figures
null
null
null
cs.NI
null
Most MANET (Mobile Ad hoc NETwork) research assumes idealized propagation models. Experimental results have shown significant divergence from simulation results due to the effect of signal fading in realistic wireless communication channels. In this paper, we characterize the impact of fading on protocol performance. We first study the effect of fading on MAC performance and show that its effect can be dominating. One of our important conclusions is that eliminating RTS/CTS packets results in more effective operation under fading. We also identify an unfairness problem that arises due to backoffs in the presence of fading. Moreover, fading results in several subtle interactions between the MAC and routing layers. We identify several of these problems and make observations about effective approaches for addressing them. For example, the criteria for determining the best path should not only consider the link status but also the link order. In addition, because routing protocols rely on MAC level transmission failure (when the retry limit is exceeded), route failure errors are often generated unnecessarily. Finally, because MAC level broadcasts are unreliable, they are especially vulnerable to fading. We analyze these effects and outline preliminary solutions to them.
[ { "version": "v1", "created": "Fri, 1 Apr 2005 18:16:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Seon-Yeong", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0504004
Henning Bostelmann
Henning Bostelmann
Statistical analysis of quality measures for mobile ad hoc networks
Master's thesis; 78 pages, 10 figures
null
null
null
cs.NI cs.DM
null
How can the quality of a mobile ad hoc network (MANET) be quantified? This work aims at an answer based on the lower network layers, i.e. on connectivity between the wireless nodes, using statistical methods. A number of different quality measures are introduced and classified according to their scaling behaviour. They are analysed in a statistical model of a 1-dimensional MANET system (corresponding e.g. to cars on a road). Neglecting boundary effects, the model turns out to be exactly solvable, so that explicit analytical results for the quality levels can be obtained both at fixed system size and in the limit of large systems. In particular, this improves estimates known in the literature for the probability of connectedness of 1-dimensional MANETs.
[ { "version": "v1", "created": "Sat, 2 Apr 2005 23:19:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bostelmann", "Henning", "" ] ]
cs/0504009
Sanjeeva kumar Chandrasekaran
N. Srinivasan, C. Sanjeevakumar, L. Sudarsan, M. Kasi Rajan, R. Venkatesh
Towards a Group Theoretic Quantum Encryption Scheme Based on Generalized Hidden Subgroup Problem
8 pages, work of undergraduate students
null
null
null
cs.DM cs.CR
null
This paper introduces a completely new approach to encryption based on group theoretic quantum framework. Quantum cryptography has essentially focused only on key distribution and proceeded with classical encryption algorithm with the generated key. Here, we present a first step towards a quantum encryption scheme based on the solution for the hidden subgroup problem. The shared secret key K from QKD evolves as a generator for a subgroup H of a group G, in combination of the plain text data modeled as group elements. The key K helps in regeneration of the plain data on the receiver's side based on subgroup reconstruction. This paper models all quantum computations using group representations. A non-constructive proof is attempted towards the security of the encryption scheme. We also address the issues involved in a such a venture into the realms of Quantum data encryption.
[ { "version": "v1", "created": "Mon, 4 Apr 2005 17:26:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Srinivasan", "N.", "" ], [ "Sanjeevakumar", "C.", "" ], [ "Sudarsan", "L.", "" ], [ "Rajan", "M. Kasi", "" ], [ "Venkatesh", "R.", "" ] ]
cs/0504012
Rodrigo Barra Almeida
Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A. Bettencourt, Virgilio A. F. Almeida, Jussara M. Almeida
Improving Spam Detection Based on Structural Similarity
null
null
null
null
cs.CR
null
We propose a new detection algorithm that uses structural relationships between senders and recipients of email as the basis for the identification of spam messages. Users and receivers are represented as vectors in their reciprocal spaces. A measure of similarity between vectors is constructed and used to group users into clusters. Knowledge of their classification as past senders/receivers of spam or legitimate mail, comming from an auxiliary detection algorithm, is then used to label these clusters probabilistically. This knowledge comes from an auxiliary algorithm. The measure of similarity between the sender and receiver sets of a new message to the center vector of clusters is then used to asses the possibility of that message being legitimate or spam. We show that the proposed algorithm is able to correct part of the false positives (legitimate messages classified as spam) using a testbed of one week smtp log.
[ { "version": "v1", "created": "Tue, 5 Apr 2005 14:30:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gomes", "Luiz H.", "" ], [ "Castro", "Fernando D. O.", "" ], [ "Almeida", "Rodrigo B.", "" ], [ "Bettencourt", "Luis M. A.", "" ], [ "Almeida", "Virgilio A. F.", "" ], [ "Almeida", "Jussara M.", "" ] ]
cs/0504018
Olivier Brunet
Olivier Brunet (Leibniz - IMAG)
A Rule-Based Logic for Quantum Information
null
null
null
null
cs.LO quant-ph
null
In the present article, we explore a new approach for the study of orthomodular lattices, where we replace the problematic conjunction by a binary operator, called the Sasaki projection. We present a characterization of orthomodular lattices based on the use of an algebraic version of the Sasaki projection operator (together with orthocomplementation) rather than on the conjunction. We then define of a new logic, which we call Sasaki Orthologic, which is closely related to quantum logic, and provide a rule-based definition of this logic.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 08:11:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Brunet", "Olivier", "", "Leibniz - IMAG" ] ]
cs/0504019
Guilin Wang
Guilin Wang, Feng Bao, Changshe Ma, and Kefei Chen
Efficient Authenticated Encryption Schemes with Public Verifiability
Early version appears in the Proc. of The 60th IEEE Vehicular Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global Security. IEEE, 2004
null
null
null
cs.CR
null
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability. That is, in their scheme the receiver can efficiently prove to a third party that a message is indeed originated from a specific sender. In this paper, we first identify two security weaknesses in the Ma-Chen authenticated encryption scheme. Then, based on the Schnorr signature, we proposed an efficient and secure improved scheme such that all the desired security requirements are satisfied.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 09:03:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Guilin", "" ], [ "Bao", "Feng", "" ], [ "Ma", "Changshe", "" ], [ "Chen", "Kefei", "" ] ]
cs/0504022
Lillian Lee
Lillian Lee
A Matter of Opinion: Sentiment Analysis and Business Intelligence (position paper)
2 pages
Presented at the IBM Faculty Summit on the Architecture of On-Demand Business, May 2004
null
null
cs.CL
null
A general-audience introduction to the area of "sentiment analysis", the computational treatment of subjective, opinion-oriented language (an example application is determining whether a review is "thumbs up" or "thumbs down"). Some challenges, applications to business-intelligence tasks, and potential future directions are described.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 20:04:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Lillian", "" ] ]
cs/0504023
Ioannis Giotis
Ioannis Giotis and Venkatesan Guruswami
Correlation Clustering with a Fixed Number of Clusters
16 pages
null
null
null
cs.DS
null
We continue the investigation of problems concerning correlation clustering or clustering with qualitative information, which is a clustering formulation that has been studied recently. The basic setup here is that we are given as input a complete graph on n nodes (which correspond to nodes to be clustered) whose edges are labeled + (for similar pairs of items) and - (for dissimilar pairs of items). Thus we have only as input qualitative information on similarity and no quantitative distance measure between items. The quality of a clustering is measured in terms of its number of agreements, which is simply the number of edges it correctly classifies, that is the sum of number of - edges whose endpoints it places in different clusters plus the number of + edges both of whose endpoints it places within the same cluster. In this paper, we study the problem of finding clusterings that maximize the number of agreements, and the complementary minimization version where we seek clusterings that minimize the number of disagreements. We focus on the situation when the number of clusters is stipulated to be a small constant k. Our main result is that for every k, there is a polynomial time approximation scheme for both maximizing agreements and minimizing disagreements. (The problems are NP-hard for every k >= 2.) The main technical work is for the minimization version, as the PTAS for maximizing agreements follows along the lines of the property tester for Max k-CUT. In contrast, when the number of clusters is not specified, the problem of minimizing disagreements was shown to be APX-hard, even though the maximization version admits a PTAS.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 22:36:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Giotis", "Ioannis", "" ], [ "Guruswami", "Venkatesan", "" ] ]
cs/0504024
Sebastian Brand
Krzysztof R. Apt, Sebastian Brand
Constraint-Based Qualitative Simulation
10 pages, to appear at the conference TIME 2005
null
null
null
cs.AI cs.LO
null
We consider qualitative simulation involving a finite set of qualitative relations in presence of complete knowledge about their interrelationship. We show how it can be naturally captured by means of constraints expressed in temporal logic and constraint satisfaction problems. The constraints relate at each stage the 'past' of a simulation with its 'future'. The benefit of this approach is that it readily leads to an implementation based on constraint technology that can be used to generate simulations and to answer queries about them.
[ { "version": "v1", "created": "Thu, 7 Apr 2005 12:06:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0504026
Yongxi Cheng
Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin
Searching Monotone Multi-dimensional Arrays
13 pages, 2 figures; same results, presentation improved, add two figures
null
null
null
cs.DS cs.DM
null
In this paper we investigate the problem of searching monotone multi-dimensional arrays. We generalize Linial and Saks' search algorithm \cite{LS1} for monotone 3-dimensional arrays to $d$-dimensions with $d\geq 4$. Our new search algorithm is asymptotically optimal for $d=4$.
[ { "version": "v1", "created": "Thu, 7 Apr 2005 15:58:18 GMT" }, { "version": "v2", "created": "Mon, 21 Aug 2006 07:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Yongxi", "" ], [ "Sun", "Xiaoming", "" ], [ "Yin", "Yiqun Lisa", "" ] ]
cs/0504029
Devavrat Shah
Damon Mosk-Aoyama and Devavrat Shah
Fast Distributed Algorithms for Computing Separable Functions
15 pages
null
null
null
cs.NI cs.DC cs.DS
null
The problem of computing functions of values at the nodes in a network in a totally distributed manner, where nodes do not have unique identities and make decisions based only on local information, has applications in sensor, peer-to-peer, and ad-hoc networks. The task of computing separable functions, which can be written as linear combinations of functions of individual variables, is studied in this context. Known iterative algorithms for averaging can be used to compute the normalized values of such functions, but these algorithms do not extend in general to the computation of the actual values of separable functions. The main contribution of this paper is the design of a distributed randomized algorithm for computing separable functions. The running time of the algorithm is shown to depend on the running time of a minimum computation algorithm used as a subroutine. Using a randomized gossip mechanism for minimum computation as the subroutine yields a complete totally distributed algorithm for computing separable functions. For a class of graphs with small spectral gap, such as grid graphs, the time used by the algorithm to compute averages is of a smaller order than the time required by a known iterative averaging scheme.
[ { "version": "v1", "created": "Fri, 8 Apr 2005 06:49:29 GMT" }, { "version": "v2", "created": "Sat, 9 Apr 2005 02:53:53 GMT" }, { "version": "v3", "created": "Sat, 4 Feb 2006 21:47:36 GMT" }, { "version": "v4", "created": "Sun, 22 Apr 2007 23:19:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Mosk-Aoyama", "Damon", "" ], [ "Shah", "Devavrat", "" ] ]
cs/0504031
Gilson Antonio Giraldi
Gilson Antonio Giraldi, Antonio Alberto Fernandes de Oliveira
Convexity Analysis of Snake Models Based on Hamiltonian Formulation
17 pages, 3 figures, technical report
null
null
null
cs.CV cs.GR
null
This paper presents a convexity analysis for the dynamic snake model based on the Potential Energy functional and the Hamiltonian formulation of the classical mechanics. First we see the snake model as a dynamical system whose singular points are the borders we seek. Next we show that a necessary condition for a singular point to be an attractor is that the energy functional is strictly convex in a neighborhood of it, that means, if the singular point is a local minimum of the potential energy. As a consequence of this analysis, a local expression relating the dynamic parameters and the rate of convergence arises. Such results link the convexity analysis of the potential energy and the dynamic snake model and point forward to the necessity of a physical quantity whose convexity analysis is related to the dynamic and which incorporate the velocity space. Such a quantity is exactly the (conservative) Hamiltonian of the system.
[ { "version": "v1", "created": "Fri, 8 Apr 2005 16:41:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson Antonio", "" ], [ "de Oliveira", "Antonio Alberto Fernandes", "" ] ]
cs/0504033
Richard McClatchey
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Atif Mehmood, Richard McClatchey, Harvey Newman, Waqas ur Rehman, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar
Resource Management Services for a Grid Analysis Environment
8 pages, 7 figures. Workshop on Web and Grid Services for Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June 2005
null
null
null
cs.DC
null
Selecting optimal resources for submitting jobs on a computational Grid or accessing data from a data grid is one of the most important tasks of any Grid middleware. Most modern Grid software today satisfies this responsibility and gives a best-effort performance to solve this problem. Almost all decisions regarding scheduling and data access are made by the software automatically, giving users little or no control over the entire process. To solve this problem, a more interactive set of services and middleware is desired that provides users more information about Grid weather, and gives them more control over the decision making process. This paper presents a set of services that have been developed to provide more interactive resource management capabilities within the Grid Analysis Environment (GAE) being developed collaboratively by Caltech, NUST and several other institutes. These include a steering service, a job monitoring service and an estimator service that have been designed and written using a common Grid-enabled Web Services framework named Clarens. The paper also presents a performance analysis of the developed services to show that they have indeed resulted in a more interactive and powerful system for user-centric Grid-enabled physics analysis.
[ { "version": "v1", "created": "Sun, 10 Apr 2005 11:59:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ali", "Arshad", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Bunn", "Julian", "" ], [ "Mehmood", "Atif", "" ], [ "McClatchey", "Richard", "" ], [ "Newman", "Harvey", "" ], [ "Rehman", "Waqas ur", "" ], [ "Steenberg", "Conrad", "" ], [ "Thomas", "Michael", "" ], [ "van Lingen", "Frank", "" ], [ "Willers", "Ian", "" ], [ "Zafar", "Muhammad Adeel", "" ] ]
cs/0504034
Richard McClatchey
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Saima Iqbal, Richard McClatchey, Harvey Newman, S. Yousaf Shah, Tony Solomonides, Conrad Steenberg, Michael Thomas, Frank van Lingen, Ian Willers
Heterogeneous Relational Databases for a Grid-enabled Analysis Environment
8 pages, 6 figures, 1 table. Workshop on Web and Grid Services for Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June 2005
null
null
null
cs.DC
null
Grid based systems require a database access mechanism that can provide seamless homogeneous access to the requested data through a virtual data access system, i.e. a system which can take care of tracking the data that is stored in geographically distributed heterogeneous databases. This system should provide an integrated view of the data that is stored in the different repositories by using a virtual data access mechanism, i.e. a mechanism which can hide the heterogeneity of the backend databases from the client applications. This paper focuses on accessing data stored in disparate relational databases through a web service interface, and exploits the features of a Data Warehouse and Data Marts. We present a middleware that enables applications to access data stored in geographically distributed relational databases without being aware of their physical locations and underlying schema. A web service interface is provided to enable applications to access this middleware in a language and platform independent way. A prototype implementation was created based on Clarens [4], Unity [7] and POOL [8]. This ability to access the data stored in the distributed relational databases transparently is likely to be a very powerful one for Grid users, especially the scientific community wishing to collate and analyze data distributed over the Grid.
[ { "version": "v1", "created": "Sun, 10 Apr 2005 12:05:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Ali", "Arshad", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Bunn", "Julian", "" ], [ "Iqbal", "Saima", "" ], [ "McClatchey", "Richard", "" ], [ "Newman", "Harvey", "" ], [ "Shah", "S. Yousaf", "" ], [ "Solomonides", "Tony", "" ], [ "Steenberg", "Conrad", "" ], [ "Thomas", "Michael", "" ], [ "van Lingen", "Frank", "" ], [ "Willers", "Ian", "" ] ]
cs/0504035
Marcus Hutter
Shane Legg and Marcus Hutter
Fitness Uniform Deletion: A Simple Way to Preserve Diversity
8 two-column pages, 19 figures
Proc. Genetic and Evolutionary Computation Conference (GECCO 2005) 1271-1278
null
IDSIA-11-04
cs.NE cs.AI
null
A commonly experienced problem with population based optimisation methods is the gradual decline in population diversity that tends to occur over time. This can slow a system's progress or even halt it completely if the population converges on a local optimum from which it cannot escape. In this paper we present the Fitness Uniform Deletion Scheme (FUDS), a simple but somewhat unconventional approach to this problem. Under FUDS the deletion operation is modified to only delete those individuals which are "common" in the sense that there exist many other individuals of similar fitness in the population. This makes it impossible for the population to collapse to a collection of highly related individuals with similar fitness. Our experimental results on a range of optimisation problems confirm this, in particular for deceptive optimisation problems the performance is significantly more robust to variation in the selection intensity.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 10:42:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0504036
Richard Belew
Richard K. Belew
Scientific impact quantity and quality: Analysis of two sources of bibliographic data
12 pages, 1 table, 6 figures
null
null
null
cs.IR cs.DL
null
Attempts to understand the consequence of any individual scientist's activity within the long-term trajectory of science is one of the most difficult questions within the philosophy of science. Because scientific publications play such as central role in the modern enterprise of science, bibliometric techniques which measure the ``impact'' of an individual publication as a function of the number of citations it receives from subsequent authors have provided some of the most useful empirical data on this question. Until recently, Thompson/ISI has provided the only source of large-scale ``inverted'' bibliographic data of the sort required for impact analysis. In the end of 2004, Google introduced a new service, GoogleScholar, making much of this same data available. Here we analyze 203 publications, collectively cited by more than 4000 other publications. We show surprisingly good agreement between data citation counts provided by the two services. Data quality across the systems is analyzed, and potentially useful complementarities between are considered. The additional robustness offered by multiple sources of such data promises to increase the utility of these measurements as open citation protocols and open access increase their impact on electronic scientific publication practices.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 13:52:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Belew", "Richard K.", "" ] ]
cs/0504037
K. P.N. Murthy
K. P. N. Murthy, M. Janani and B. Shenbga Priya
Bayesian Restoration of Digital Images Employing Markov Chain Monte Carlo a Review
42 pages; 16 figures; revised version with several typos removed and mistakes in equations corrected
null
null
null
cs.CV cond-mat.stat-mech physics.comp-ph
null
A review of Bayesian restoration of digital images based on Monte Carlo techniques is presented. The topics covered include Likelihood, Prior and Posterior distributions, Poisson, Binay symmetric channel, and Gaussian channel models of Likelihood distribution,Ising and Potts spin models of Prior distribution, restoration of an image through Posterior maximization, statistical estimation of a true image from Posterior ensembles, Markov Chain Monte Carlo methods and cluster algorithms.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 12:41:19 GMT" }, { "version": "v2", "created": "Tue, 31 Oct 2006 14:34:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Murthy", "K. P. N.", "" ], [ "Janani", "M.", "" ], [ "Priya", "B. Shenbga", "" ] ]
cs/0504039
Andrey Grozin
A. G. Grozin
TeXmacs-maxima interface
html file, 32 png screenshots
null
null
null
cs.SC cs.MS hep-ph
null
This tutorial presents features of the new and improved TeXmacs-maxima interface. It is designed for running maxima-5.9.2 from TeXmacs-1.0.5 (or later).
[ { "version": "v1", "created": "Mon, 11 Apr 2005 16:39:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Grozin", "A. G.", "" ] ]
cs/0504040
J?r?mie Leguay M.
Jeremie Leguay, Timur Friedman and Vania Conan
DTN Routing in a Mobility Pattern Space
8 pages, preprint
null
null
null
cs.NI
null
Routing in Delay Tolerant Networks (DTNs) benefits considerably if one can take advantage of knowledge concerning node mobility. The main contribution of this paper is the definition of a generic routing scheme for DTNs using a high-dimensional Euclidean space constructed upon nodes' mobility patterns. For example, nodes are represented as points having as coordinates their probability of being found in each possible location. We present simulation results indicating that such a scheme can be beneficial in a scenario inspired by studies done on real mobility traces. This work should open the way to further use of the virtual space formalism in DTN routing.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 17:03:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Leguay", "Jeremie", "" ], [ "Friedman", "Timur", "" ], [ "Conan", "Vania", "" ] ]
cs/0504041
Vitaly Schetinin
Vitaly Schetinin and Joachim Schult
Learning Polynomial Networks for Classification of Clinical Electroencephalograms
null
J Soft Computing 2005
null
null
cs.AI cs.NE
null
We describe a polynomial network technique developed for learning to classify clinical electroencephalograms (EEGs) presented by noisy features. Using an evolutionary strategy implemented within Group Method of Data Handling, we learn classification models which are comprehensively described by sets of short-term polynomials. The polynomial models were learnt to classify the EEGs recorded from Alzheimer and healthy patients and recognize the EEG artifacts. Comparing the performances of our technique and some machine learning methods we conclude that our technique can learn well-suited polynomial models which experts can find easy-to-understand.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 17:11:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Schult", "Joachim", "" ] ]
cs/0504042
Vitaly Schetinin
V. Schetinin, J.E. Fieldsend, D. Partridge, W.J. Krzanowski, R.M. Everson, T.C. Bailey, A. Hernandez
The Bayesian Decision Tree Technique with a Sweeping Strategy
null
null
null
null
cs.AI cs.LG
null
The uncertainty of classification outcomes is of crucial importance for many safety critical applications including, for example, medical diagnostics. In such applications the uncertainty of classification can be reliably estimated within a Bayesian model averaging technique that allows the use of prior information. Decision Tree (DT) classification models used within such a technique gives experts additional information by making this classification scheme observable. The use of the Markov Chain Monte Carlo (MCMC) methodology of stochastic sampling makes the Bayesian DT technique feasible to perform. However, in practice, the MCMC technique may become stuck in a particular DT which is far away from a region with a maximal posterior. Sampling such DTs causes bias in the posterior estimates, and as a result the evaluation of classification uncertainty may be incorrect. In a particular case, the negative effect of such sampling may be reduced by giving additional prior information on the shape of DTs. In this paper we describe a new approach based on sweeping the DTs without additional priors on the favorite shape of DTs. The performances of Bayesian DT techniques with the standard and sweeping strategies are compared on a synthetic data as well as on real datasets. Quantitatively evaluating the uncertainty in terms of entropy of class posterior probabilities, we found that the sweeping strategy is superior to the standard strategy.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 17:45:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "V.", "" ], [ "Fieldsend", "J. E.", "" ], [ "Partridge", "D.", "" ], [ "Krzanowski", "W. J.", "" ], [ "Everson", "R. M.", "" ], [ "Bailey", "T. C.", "" ], [ "Hernandez", "A.", "" ] ]
cs/0504043
Vitaly Schetinin
V. Schetinin, D. Partridge, W.J. Krzanowski, R.M. Everson, J.E. Fieldsend, T.C. Bailey, and A. Hernandez
Experimental Comparison of Classification Uncertainty for Randomised and Bayesian Decision Tree Ensembles
IDEAL-2004
null
null
null
cs.AI cs.LG
null
In this paper we experimentally compare the classification uncertainty of the randomised Decision Tree (DT) ensemble technique and the Bayesian DT technique with a restarting strategy on a synthetic dataset as well as on some datasets commonly used in the machine learning community. For quantitative evaluation of classification uncertainty, we use an Uncertainty Envelope dealing with the class posterior distribution and a given confidence probability. Counting the classifier outcomes, this technique produces feasible evaluations of the classification uncertainty. Using this technique in our experiments, we found that the Bayesian DT technique is superior to the randomised DT ensemble technique.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 17:53:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "V.", "" ], [ "Partridge", "D.", "" ], [ "Krzanowski", "W. J.", "" ], [ "Everson", "R. M.", "" ], [ "Fieldsend", "J. E.", "" ], [ "Bailey", "T. C.", "" ], [ "Hernandez", "A.", "" ] ]
cs/0504044
Richard McClatchey
Michael Thomas, Conrad Steenberg, Frank van Lingen, Harvey Newman, Julian Bunn, Arshad Ali, Richard McClatchey, Ashiq Anjum, Tahir Azim, Waqas ur Rehman, Faisal Khan, Jang Uk In
JClarens: A Java Framework for Developing and Deploying Web Services for Grid Computing
8 pages, 4 figures. Paper at the 3rd IEEE International Conference on Web Services (ICWS05). Florida, USA. July 2005
null
null
null
cs.DC
null
High Energy Physics (HEP) and other scientific communities have adopted Service Oriented Architectures (SOA) as part of a larger Grid computing effort. This effort involves the integration of many legacy applications and programming libraries into a SOA framework. The Grid Analysis Environment (GAE) is such a service oriented architecture based on the Clarens Grid Services Framework and is being developed as part of the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC) at European Laboratory for Particle Physics (CERN). Clarens provides a set of authorization, access control, and discovery services, as well as XMLRPC and SOAP access to all deployed services. Two implementations of the Clarens Web Services Framework (Python and Java) offer integration possibilities for a wide range of programming languages. This paper describes the Java implementation of the Clarens Web Services Framework called JClarens. and several web services of interest to the scientific and Grid community that have been deployed using JClarens.
[ { "version": "v1", "created": "Mon, 11 Apr 2005 21:45:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomas", "Michael", "" ], [ "Steenberg", "Conrad", "" ], [ "van Lingen", "Frank", "" ], [ "Newman", "Harvey", "" ], [ "Bunn", "Julian", "" ], [ "Ali", "Arshad", "" ], [ "McClatchey", "Richard", "" ], [ "Anjum", "Ashiq", "" ], [ "Azim", "Tahir", "" ], [ "Rehman", "Waqas ur", "" ], [ "Khan", "Faisal", "" ], [ "In", "Jang Uk", "" ] ]
cs/0504048
Scott Aaronson
Scott Aaronson
Oracles Are Subtle But Not Malicious
20 pages, 1 figure
null
null
null
cs.CC quant-ph
null
Theoretical computer scientists have been debating the role of oracles since the 1970's. This paper illustrates both that oracles can give us nontrivial insights about the barrier problems in circuit complexity, and that they need not prevent us from trying to solve those problems. First, we give an oracle relative to which PP has linear-sized circuits, by proving a new lower bound for perceptrons and low- degree threshold polynomials. This oracle settles a longstanding open question, and generalizes earlier results due to Beigel and to Buhrman, Fortnow, and Thierauf. More importantly, it implies the first nonrelativizing separation of "traditional" complexity classes, as opposed to interactive proof classes such as MIP and MA-EXP. For Vinodchandran showed, by a nonrelativizing argument, that PP does not have circuits of size n^k for any fixed k. We present an alternative proof of this fact, which shows that PP does not even have quantum circuits of size n^k with quantum advice. To our knowledge, this is the first nontrivial lower bound on quantum circuit size. Second, we study a beautiful algorithm of Bshouty et al. for learning Boolean circuits in ZPP^NP. We show that the NP queries in this algorithm cannot be parallelized by any relativizing technique, by giving an oracle relative to which ZPP^||NP and even BPP^||NP have linear-size circuits. On the other hand, we also show that the NP queries could be parallelized if P=NP. Thus, classes such as ZPP^||NP inhabit a "twilight zone," where we need to distinguish between relativizing and black-box techniques. Our results on this subject have implications for computational learning theory as well as for the circuit minimization problem.
[ { "version": "v1", "created": "Tue, 12 Apr 2005 22:57:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Aaronson", "Scott", "" ] ]
cs/0504050
Ivan Lanese
Ivan Lanese and Ugo Montanari
Mapping Fusion and Synchronized Hyperedge Replacement into Logic Programming
44 pages, 8 figures, to appear in a special issue of Theory and Practice of Logic Programming, minor revision
null
null
null
cs.LO cs.PL
null
In this paper we compare three different formalisms that can be used in the area of models for distributed, concurrent and mobile systems. In particular we analyze the relationships between a process calculus, the Fusion Calculus, graph transformations in the Synchronized Hyperedge Replacement with Hoare synchronization (HSHR) approach and logic programming. We present a translation from Fusion Calculus into HSHR (whereas Fusion Calculus uses Milner synchronization) and prove a correspondence between the reduction semantics of Fusion Calculus and HSHR transitions. We also present a mapping from HSHR into a transactional version of logic programming and prove that there is a full correspondence between the two formalisms. The resulting mapping from Fusion Calculus to logic programming is interesting since it shows the tight analogies between the two formalisms, in particular for handling name generation and mobility. The intermediate step in terms of HSHR is convenient since graph transformations allow for multiple, remote synchronizations, as required by Fusion Calculus semantics.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 14:40:28 GMT" }, { "version": "v2", "created": "Sun, 15 Jan 2006 09:55:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Lanese", "Ivan", "" ], [ "Montanari", "Ugo", "" ] ]
cs/0504051
Tassos Argyros
Tassos S. Argyros and David R. Cheriton
A Scalable Stream-Oriented Framework for Cluster Applications
null
null
null
null
cs.DC cs.DB cs.NI cs.OS cs.PL
null
This paper presents a stream-oriented architecture for structuring cluster applications. Clusters that run applications based on this architecture can scale to tenths of thousands of nodes with significantly less performance loss or reliability problems. Our architecture exploits the stream nature of the data flow and reduces congestion through load balancing, hides latency behind data pushes and transparently handles node failures. In our ongoing work, we are developing an implementation for this architecture and we are able to run simple data mining applications on a cluster simulator.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 16:37:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Argyros", "Tassos S.", "" ], [ "Cheriton", "David R.", "" ] ]
cs/0504053
Vitaly Schetinin
V.V.Zharkova and V.Schetinin
A Neural-Network Technique for Recognition of Filaments in Solar Images
null
null
null
null
cs.NE
null
We describe a new neural-network technique developed for an automated recognition of solar filaments visible in the hydrogen H-alpha line full disk spectroheliograms. This technique allows neural networks learn from a few image fragments labelled manually to recognize the single filaments depicted on a local background. The trained network is able to recognize filaments depicted on the backgrounds with variations in brightness caused by atmospherics distortions. Despite the difference in backgrounds in our experiments the neural network has properly recognized filaments in the testing image fragments. Using a parabolic activation function we extend this technique to recognize multiple solar filaments which may appear in one fragment.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 13:28:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Zharkova", "V. V.", "" ], [ "Schetinin", "V.", "" ] ]
cs/0504054
Vitaly Schetinin
Vitaly Schetinin
Learning from Web: Review of Approaches
null
null
null
null
cs.NE cs.LG
null
Knowledge discovery is defined as non-trivial extraction of implicit, previously unknown and potentially useful information from given data. Knowledge extraction from web documents deals with unstructured, free-format documents whose number is enormous and rapidly growing. The artificial neural networks are well suitable to solve a problem of knowledge discovery from web documents because trained networks are able more accurately and easily to classify the learning and testing examples those represent the text mining domain. However, the neural networks that consist of large number of weighted connections and activation units often generate the incomprehensible and hard-to-understand models of text classification. This problem may be also addressed to most powerful recurrent neural networks that employ the feedback links from hidden or output units to their input units. Due to feedback links, recurrent neural networks are able take into account of a context in document. To be useful for data mining, self-organizing neural network techniques of knowledge extraction have been explored and developed. Self-organization principles were used to create an adequate neural-network structure and reduce a dimensionality of features used to describe text documents. The use of these principles seems interesting because ones are able to reduce a neural-network redundancy and considerably facilitate the knowledge representation.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 13:40:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ] ]
cs/0504055
Vitaly Schetinin
Vitaly Schetinin
A Learning Algorithm for Evolving Cascade Neural Networks
null
Neural Processing Letter 17:21-31, 2003. Kluwer
null
null
cs.NE cs.AI
null
A new learning algorithm for Evolving Cascade Neural Networks (ECNNs) is described. An ECNN starts to learn with one input node and then adding new inputs as well as new hidden neurons evolves it. The trained ECNN has a nearly minimal number of input and hidden neurons as well as connections. The algorithm was successfully applied to classify artifacts and normal segments in clinical electroencephalograms (EEGs). The EEG segments were visually labeled by EEG-viewer. The trained ECNN has correctly classified 96.69% of the testing segments. It is slightly better than a standard fully connected neural network.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 13:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ] ]
cs/0504056
Vitaly Schetinin
V. Schetinin
Self-Organizing Multilayered Neural Networks of Optimal Complexity
null
null
null
null
cs.NE cs.AI
null
The principles of self-organizing the neural networks of optimal complexity is considered under the unrepresentative learning set. The method of self-organizing the multi-layered neural networks is offered and used to train the logical neural networks which were applied to the medical diagnostics.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 13:59:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "V.", "" ] ]
cs/0504057
Vitaly Schetinin
Vitaly Schetinin and Anatoly Brazhnikov
Diagnostic Rule Extraction Using Neural Networks
null
null
null
null
cs.NE cs.AI
null
The neural networks have trained on incomplete sets that a doctor could collect. Trained neural networks have correctly classified all the presented instances. The number of intervals entered for encoding the quantitative variables is equal two. The number of features as well as the number of neurons and layers in trained neural networks was minimal. Trained neural networks are adequately represented as a set of logical formulas that more comprehensible and easy-to-understand. These formulas are as the syndrome-complexes, which may be easily tabulated and represented as a diagnostic table that the doctors usually use. Decision rules provide the evaluations of their confidence in which interested a doctor. Conducted clinical researches have shown that iagnostic decisions produced by symbolic rules have coincided with the doctor's conclusions.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 14:03:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Brazhnikov", "Anatoly", "" ] ]
cs/0504058
Vitaly Schetinin
Vitaly Schetinin
Polynomial Neural Networks Learnt to Classify EEG Signals
null
null
null
null
cs.NE cs.AI
null
A neural network based technique is presented, which is able to successfully extract polynomial classification rules from labeled electroencephalogram (EEG) signals. To represent the classification rules in an analytical form, we use the polynomial neural networks trained by a modified Group Method of Data Handling (GMDH). The classification rules were extracted from clinical EEG data that were recorded from an Alzheimer patient and the sudden death risk patients. The third data is EEG recordings that include the normal and artifact segments. These EEG data were visually identified by medical experts. The extracted polynomial rules verified on the testing EEG data allow to correctly classify 72% of the risk group patients and 96.5% of the segments. These rules performs slightly better than standard feedforward neural networks.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 14:06:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ] ]
cs/0504059
Vitaly Schetinin
Vitaly Schetinin
A Neural Network Decision Tree for Learning Concepts from EEG Data
null
null
null
null
cs.NE cs.AI
null
To learn the multi-class conceptions from the electroencephalogram (EEG) data we developed a neural network decision tree (DT), that performs the linear tests, and a new training algorithm. We found that the known methods fail inducting the classification models when the data are presented by the features some of them are irrelevant, and the classes are heavily overlapped. To train the DT, our algorithm exploits a bottom up search of the features that provide the best classification accuracy of the linear tests. We applied the developed algorithm to induce the DT from the large EEG dataset consisted of 65 patients belonging to 16 age groups. In these recordings each EEG segment was represented by 72 calculated features. The DT correctly classified 80.8% of the training and 80.1% of the testing examples. Correspondingly it correctly classified 89.2% and 87.7% of the EEG recordings.
[ { "version": "v1", "created": "Wed, 13 Apr 2005 14:28:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ] ]
cs/0504061
Stergos Afantenos
Stergos D. Afantenos, Vangelis Karkaletsis, Panagiotis Stamatopoulos
Summarization from Medical Documents: A Survey
21 pages, 4 tables
Artificial Intelligence in Medicine, Volume 33, Issue 2, February 2005, Pages 157-177
10.1016/j.artmed.2004.07.017
null
cs.CL cs.IR
null
Objective: The aim of this paper is to survey the recent work in medical documents summarization. Background: During the last decade, documents summarization got increasing attention by the AI research community. More recently it also attracted the interest of the medical research community as well, due to the enormous growth of information that is available to the physicians and researchers in medicine, through the large and growing number of published journals, conference proceedings, medical sites and portals on the World Wide Web, electronic medical records, etc. Methodology: This survey gives first a general background on documents summarization, presenting the factors that summarization depends upon, discussing evaluation issues and describing briefly the various types of summarization techniques. It then examines the characteristics of the medical domain through the different types of medical documents. Finally, it presents and discusses the summarization techniques used so far in the medical domain, referring to the corresponding systems and their characteristics. Discussion and conclusions: The paper discusses thoroughly the promising paths for future research in medical documents summarization. It mainly focuses on the issue of scaling to large collections of documents in various languages and from different media, on personalization issues, on portability to new sub-domains, and on the integration of summarization technology in practical applications
[ { "version": "v1", "created": "Wed, 13 Apr 2005 20:02:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Afantenos", "Stergos D.", "" ], [ "Karkaletsis", "Vangelis", "" ], [ "Stamatopoulos", "Panagiotis", "" ] ]
cs/0504062
Elchanan Mossel
Irit Dinur and Elchanan Mossel and Oded Regev
Conditional Hardness for Approximate Coloring
null
null
null
null
cs.CC math.PR
null
We study the coloring problem: Given a graph G, decide whether $c(G) \leq q$ or $c(G) \ge Q$, where c(G) is the chromatic number of G. We derive conditional hardness for this problem for any constant $3 \le q < Q$. For $q\ge 4$, our result is based on Khot's 2-to-1 conjecture [Khot'02]. For $q=3$, we base our hardness result on a certain `fish shaped' variant of his conjecture. We also prove that the problem almost coloring is hard for any constant $\eps>0$, assuming Khot's Unique Games conjecture. This is the problem of deciding for a given graph, between the case where one can 3-color all but a $\eps$ fraction of the vertices without monochromatic edges, and the case where the graph contains no independent set of relative size at least $\eps$. Our result is based on bounding various generalized noise-stability quantities using the invariance principle of Mossel et al [MOO'05].
[ { "version": "v1", "created": "Thu, 14 Apr 2005 00:43:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Dinur", "Irit", "" ], [ "Mossel", "Elchanan", "" ], [ "Regev", "Oded", "" ] ]
cs/0504063
Zsolt Palotai
Zs. Palotai, Cs. Farkas, A. Lorincz
Selection in Scale-Free Small World
24 pages, 3 figures
null
null
null
cs.LG cs.IR
null
In this paper we compare the performance characteristics of our selection based learning algorithm for Web crawlers with the characteristics of the reinforcement learning algorithm. The task of the crawlers is to find new information on the Web. The selection algorithm, called weblog update, modifies the starting URL lists of our crawlers based on the found URLs containing new information. The reinforcement learning algorithm modifies the URL orderings of the crawlers based on the received reinforcements for submitted documents. We performed simulations based on data collected from the Web. The collected portion of the Web is typical and exhibits scale-free small world (SFSW) structure. We have found that on this SFSW, the weblog update algorithm performs better than the reinforcement learning algorithm. It finds the new information faster than the reinforcement learning algorithm and has better new information/all submitted documents ratio. We believe that the advantages of the selection algorithm over reinforcement learning algorithm is due to the small world property of the Web.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 07:57:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Palotai", "Zs.", "" ], [ "Farkas", "Cs.", "" ], [ "Lorincz", "A.", "" ] ]
cs/0504064
Vitaly Schetinin
Vitaly Schetinin, Joachim Schult and Anatoly Brazhnikov
Neural-Network Techniques for Visual Mining Clinical Electroencephalograms
null
null
null
null
cs.AI
null
In this chapter we describe new neural-network techniques developed for visual mining clinical electroencephalograms (EEGs), the weak electrical potentials invoked by brain activity. These techniques exploit fruitful ideas of Group Method of Data Handling (GMDH). Section 2 briefly describes the standard neural-network techniques which are able to learn well-suited classification modes from data presented by relevant features. Section 3 introduces an evolving cascade neural network technique which adds new input nodes as well as new neurons to the network while the training error decreases. This algorithm is applied to recognize artifacts in the clinical EEGs. Section 4 presents the GMDH-type polynomial networks learnt from data. We applied this technique to distinguish the EEGs recorded from an Alzheimer and a healthy patient as well as recognize EEG artifacts. Section 5 describes the new neural-network technique developed to induce multi-class concepts from data. We used this technique for inducing a 16-class concept from the large-scale clinical EEG data. Finally we discuss perspectives of applying the neural-network techniques to clinical EEGs.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:27:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Schult", "Joachim", "" ], [ "Brazhnikov", "Anatoly", "" ] ]
cs/0504065
Vitaly Schetinin
Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J. Krzanowski, Richard M. Everson, Trevor C. Bailey and Adolfo Hernandez
Estimating Classification Uncertainty of Bayesian Decision Tree Technique on Financial Data
null
null
null
null
cs.AI
null
Bayesian averaging over classification models allows the uncertainty of classification outcomes to be evaluated, which is of crucial importance for making reliable decisions in applications such as financial in which risks have to be estimated. The uncertainty of classification is determined by a trade-off between the amount of data available for training, the diversity of a classifier ensemble and the required performance. The interpretability of classification models can also give useful information for experts responsible for making reliable classifications. For this reason Decision Trees (DTs) seem to be attractive classification models. The required diversity of the DT ensemble can be achieved by using the Bayesian model averaging all possible DTs. In practice, the Bayesian approach can be implemented on the base of a Markov Chain Monte Carlo (MCMC) technique of random sampling from the posterior distribution. For sampling large DTs, the MCMC method is extended by Reversible Jump technique which allows inducing DTs under given priors. For the case when the prior information on the DT size is unavailable, the sweeping technique defining the prior implicitly reveals a better performance. Within this Chapter we explore the classification uncertainty of the Bayesian MCMC techniques on some datasets from the StatLog Repository and real financial data. The classification uncertainty is compared within an Uncertainty Envelope technique dealing with the class posterior distribution and a given confidence probability. This technique provides realistic estimates of the classification uncertainty which can be easily interpreted in statistical terms with the aim of risk evaluation.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:30:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Fieldsend", "Jonathan E.", "" ], [ "Partridge", "Derek", "" ], [ "Krzanowski", "Wojtek J.", "" ], [ "Everson", "Richard M.", "" ], [ "Bailey", "Trevor C.", "" ], [ "Hernandez", "Adolfo", "" ] ]
cs/0504066
Vitaly Schetinin
Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J. Krzanowski, Richard M. Everson, Trevor C. Bailey, and Adolfo Hernandez
Comparison of the Bayesian and Randomised Decision Tree Ensembles within an Uncertainty Envelope Technique
null
Journal of Mathematical Modelling and Algorithms, 2005
null
null
cs.AI
null
Multiple Classifier Systems (MCSs) allow evaluation of the uncertainty of classification outcomes that is of crucial importance for safety critical applications. The uncertainty of classification is determined by a trade-off between the amount of data available for training, the classifier diversity and the required performance. The interpretability of MCSs can also give useful information for experts responsible for making reliable classifications. For this reason Decision Trees (DTs) seem to be attractive classification models for experts. The required diversity of MCSs exploiting such classification models can be achieved by using two techniques, the Bayesian model averaging and the randomised DT ensemble. Both techniques have revealed promising results when applied to real-world problems. In this paper we experimentally compare the classification uncertainty of the Bayesian model averaging with a restarting strategy and the randomised DT ensemble on a synthetic dataset and some domain problems commonly used in the machine learning community. To make the Bayesian DT averaging feasible, we use a Markov Chain Monte Carlo technique. The classification uncertainty is evaluated within an Uncertainty Envelope technique dealing with the class posterior distribution and a given confidence probability. Exploring a full posterior distribution, this technique produces realistic estimates which can be easily interpreted in statistical terms. In our experiments we found out that the Bayesian DTs are superior to the randomised DT ensembles within the Uncertainty Envelope technique.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:33:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Fieldsend", "Jonathan E.", "" ], [ "Partridge", "Derek", "" ], [ "Krzanowski", "Wojtek J.", "" ], [ "Everson", "Richard M.", "" ], [ "Bailey", "Trevor C.", "" ], [ "Hernandez", "Adolfo", "" ] ]
cs/0504067
Vitaly Schetinin
Vitaly Schetinin
An Evolving Cascade Neural Network Technique for Cleaning Sleep Electroencephalograms
null
Natural Computing Application, 2005
null
null
cs.NE cs.AI
null
Evolving Cascade Neural Networks (ECNNs) and a new training algorithm capable of selecting informative features are described. The ECNN initially learns with one input node and then evolves by adding new inputs as well as new hidden neurons. The resultant ECNN has a near minimal number of hidden neurons and inputs. The algorithm is successfully used for training ECNN to recognise artefacts in sleep electroencephalograms (EEGs) which were visually labelled by EEG-viewers. In our experiments, the ECNN outperforms the standard neural-network as well as evolutionary techniques.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:36:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ] ]
cs/0504068
Vitaly Schetinin
V. Schetinin and A. Kostunin
Self-Organization of the Neuron Collective of Optimal Complexity
NOLTA-1996, Japan
null
null
null
cs.NE cs.AI
null
The optimal complexity of neural networks is achieved when the self-organization principles is used to eliminate the contradictions existing in accordance with the K. Godel theorem about incompleteness of the systems based on axiomatics. The principle of S. Beer exterior addition the Heuristic Group Method of Data Handling by A. Ivakhnenko realized is used.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:45:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "V.", "" ], [ "Kostunin", "A.", "" ] ]
cs/0504069
Vitaly Schetinin
Vitaly Schetinin and Joachim Schult
A Neural-Network Technique to Learn Concepts from Electroencephalograms
null
null
null
Theory in Biosciences, 2005
cs.NE cs.AI cs.LG
null
A new technique is presented developed to learn multi-class concepts from clinical electroencephalograms. A desired concept is represented as a neuronal computational model consisting of the input, hidden, and output neurons. In this model the hidden neurons learn independently to classify the electroencephalogram segments presented by spectral and statistical features. This technique has been applied to the electroencephalogram data recorded from 65 sleeping healthy newborns in order to learn a brain maturation concept of newborns aged between 35 and 51 weeks. The 39399 and 19670 segments from these data have been used for learning and testing the concept, respectively. As a result, the concept has correctly classified 80.1% of the testing segments or 87.7% of the 65 records.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:47:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Schult", "Joachim", "" ] ]
cs/0504070
Vitaly Schetinin
Vitaly Schetinin and Joachim Schult
The Combined Technique for Detection of Artifacts in Clinical Electroencephalograms of Sleeping Newborns
null
null
null
null
cs.NE cs.AI cs.LG
null
In this paper we describe a new method combining the polynomial neural network and decision tree techniques in order to derive comprehensible classification rules from clinical electroencephalograms (EEGs) recorded from sleeping newborns. These EEGs are heavily corrupted by cardiac, eye movement, muscle and noise artifacts and as a consequence some EEG features are irrelevant to classification problems. Combining the polynomial network and decision tree techniques, we discover comprehensible classification rules whilst also attempting to keep their classification error down. This technique is shown to outperform a number of commonly used machine learning technique applied to automatically recognize artifacts in the sleep EEGs.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 10:49:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Schetinin", "Vitaly", "" ], [ "Schult", "Joachim", "" ] ]
cs/0504071
Byeong Kang Dr
Byeong Ho Kang, Achim Hoffmann, Takahira Yamaguchi, Wai Kiang Yeap
Proceedings of the Pacific Knowledge Acquisition Workshop 2004
null
null
null
null
cs.AI
null
Artificial intelligence (AI) research has evolved over the last few decades and knowledge acquisition research is at the core of AI research. PKAW-04 is one of three international knowledge acquisition workshops held in the Pacific-Rim, Canada and Europe over the last two decades. PKAW-04 has a strong emphasis on incremental knowledge acquisition, machine learning, neural nets and active mining. The proceedings contain 19 papers that were selected by the program committee among 24 submitted papers. All papers were peer reviewed by at least two reviewers. The papers in these proceedings cover the methods and tools as well as the applications related to develop expert systems or knowledge based systems.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 13:14:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Kang", "Byeong Ho", "" ], [ "Hoffmann", "Achim", "" ], [ "Yamaguchi", "Takahira", "" ], [ "Yeap", "Wai Kiang", "" ] ]
cs/0504072
Marc Barthelemy
Marc Barthelemy, Edmond Chow, and Tina Eliassi-Rad
Knowledge Representation Issues in Semantic Graphs for Relationship Detection
9 pages, 2 tables, 7 figures
Papers from the 2005 AAAI Spring Symposium, AAAI Press, 2005, pp. 91-98
null
null
cs.AI physics.soc-ph
null
An important task for Homeland Security is the prediction of threat vulnerabilities, such as through the detection of relationships between seemingly disjoint entities. A structure used for this task is a "semantic graph", also known as a "relational data graph" or an "attributed relational graph". These graphs encode relationships as "typed" links between a pair of "typed" nodes. Indeed, semantic graphs are very similar to semantic networks used in AI. The node and link types are related through an ontology graph (also known as a schema). Furthermore, each node has a set of attributes associated with it (e.g., "age" may be an attribute of a node of type "person"). Unfortunately, the selection of types and attributes for both nodes and links depends on human expertise and is somewhat subjective and even arbitrary. This subjectiveness introduces biases into any algorithm that operates on semantic graphs. Here, we raise some knowledge representation issues for semantic graphs and provide some possible solutions using recently developed ideas in the field of complex networks. In particular, we use the concept of transitivity to evaluate the relevance of individual links in the semantic graph for detecting relationships. We also propose new statistical measures for semantic graphs and illustrate these semantic measures on graphs constructed from movies and terrorism data.
[ { "version": "v1", "created": "Thu, 14 Apr 2005 20:15:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Barthelemy", "Marc", "" ], [ "Chow", "Edmond", "" ], [ "Eliassi-Rad", "Tina", "" ] ]
cs/0504073
Karim Seada
Karim Seada, Ahmed Helmy
Rendezvous Regions: A Scalable Architecture for Resource Discovery and Service Location in Large-Scale Mobile Networks
null
null
null
null
cs.NI
null
In large-scale wireless networks such as mobile ad hoc and sensor networks, efficient and robust service discovery and data-access mechanisms are both essential and challenging. Rendezvous-based mechanisms provide a valuable solution for provisioning a wide range of services. In this paper, we describe Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for wireless networks. RR is a general architecture proposed for service location and bootstrapping in ad hoc networks, in addition to data-centric storage, configuration, and task assignment in sensor networks. In RR the network topology is divided into geographical regions, where each region is responsible for a set of keys representing the services or data of interest. Each key is mapped to a region based on a hash-table-like mapping scheme. A few elected nodes inside each region are responsible for maintaining the mapped information. The service or data provider stores the information in the corresponding region and the seekers retrieve it from there. We run extensive detailed simulations, and high-level simulations and analysis, to investigate the design space, and study the architecture in various environments including node mobility and failures. We evaluate it against other approaches to identify its merits and limitations. The results show high success rate and low overhead even with dynamics. RR scales to large number of nodes and is highly robust and efficient to node failures. It is also robust to node mobility and location inaccuracy with a significant advantage over point-based rendezvous mechanisms.
[ { "version": "v1", "created": "Fri, 15 Apr 2005 03:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Seada", "Karim", "" ], [ "Helmy", "Ahmed", "" ] ]
cs/0504074
Carlos Rodriguez
Carlos Rodriguez
Metalinguistic Information Extraction for Terminology
Presented at CompuTerm 2004, COLING. Geneve
null
null
null
cs.CL cs.AI cs.IR
null
This paper describes and evaluates the Metalinguistic Operation Processor (MOP) system for automatic compilation of metalinguistic information from technical and scientific documents. This system is designed to extract non-standard terminological resources that we have called Metalinguistic Information Databases (or MIDs), in order to help update changing glossaries, knowledge bases and ontologies, as well as to reflect the metastable dynamics of special-domain knowledge.
[ { "version": "v1", "created": "Fri, 15 Apr 2005 20:10:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Carlos", "" ] ]
cs/0504075
Lane A. Hemaspaandra
Edith Hemaspaandra and Lane A. Hemaspaandra
Dichotomy for Voting Systems
null
null
null
URCS-TR-2005-861
cs.GT cs.CC cs.MA
null
Scoring protocols are a broad class of voting systems. Each is defined by a vector $(\alpha_1,\alpha_2,...,\alpha_m)$, $\alpha_1 \geq \alpha_2 \geq >... \geq \alpha_m$, of integers such that each voter contributes $\alpha_1$ points to his/her first choice, $\alpha_2$ points to his/her second choice, and so on, and any candidate receiving the most points is a winner. What is it about scoring-protocol election systems that makes some have the desirable property of being NP-complete to manipulate, while others can be manipulated in polynomial time? We find the complete, dichotomizing answer: Diversity of dislike. Every scoring-protocol election system having two or more point values assigned to candidates other than the favorite--i.e., having $||\{\alpha_i \condition 2 \leq i \leq m\}||\geq 2$--is NP-complete to manipulate. Every other scoring-protocol election system can be manipulated in polynomial time. In effect, we show that--other than trivial systems (where all candidates alway tie), plurality voting, and plurality voting's transparently disguised translations--\emph{every} scoring-protocol election system is NP-complete to manipulate.
[ { "version": "v1", "created": "Fri, 15 Apr 2005 22:11:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/0504076
Manoj Kumar
Manoj Kumar
An Improved Remote User Authentication Scheme Using Smart Cards
16 pages, no figures
null
null
null
cs.CR
null
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. In the same year, Chan and Cheng pointed out that Hwang and Li&#8217;s scheme is not secure against the masquerade attack. Further, in 2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and Li&#8217;s scheme and presented a modified scheme to remove its security pitfalls. This paper presents an improved scheme which is secure against Chan-Cheng and all the extended attacks.
[ { "version": "v1", "created": "Sat, 16 Apr 2005 11:56:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0504077
Manoj Kumar
Manoj Kumar
The Modified Scheme is still vulnerable to the parallel Session Attack
12 pages, no figures
null
null
null
cs.CR
null
In 2002, Chien&#8211;Jan&#8211;Tseng introduced an efficient remote user authentication scheme using smart cards. Further, in 2004, W. C. Ku and S. M. Chen proposed an efficient remote user authentication scheme using smart cards to solve the security problems of Chien et al.&#8217;s scheme. Recently, Hsu and Yoon et al. pointed out the security weakness of the Ku and Chen&#8217;s scheme Furthermore, Yoon et al. modified the password change phase of Ku and Chen&#8217;s scheme and they also proposed a new efficient remote user authentication scheme using smart cards. This paper analyzes that the modified scheme of Yoon et al. still vulnerable to parallel session attack.
[ { "version": "v1", "created": "Sat, 16 Apr 2005 12:17:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
cs/0504078
Marcus Hutter
Marcus Hutter and Jan Poland
Adaptive Online Prediction by Following the Perturbed Leader
25 pages
Journal of Machine Learning Research 6 (2005) 639--660
null
IDSIA-10-05
cs.AI cs.LG
null
When applying aggregating strategies to Prediction with Expert Advice, the learning rate must be adaptively tuned. The natural choice of sqrt(complexity/current loss) renders the analysis of Weighted Majority derivatives quite complicated. In particular, for arbitrary weights there have been no results proven so far. The analysis of the alternative "Follow the Perturbed Leader" (FPL) algorithm from Kalai & Vempala (2003) (based on Hannan's algorithm) is easier. We derive loss bounds for adaptive learning rate and both finite expert classes with uniform weights and countable expert classes with arbitrary weights. For the former setup, our loss bounds match the best known results so far, while for the latter our results are new.
[ { "version": "v1", "created": "Sat, 16 Apr 2005 16:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Poland", "Jan", "" ] ]
cs/0504083
Weiming Zhang
Zhang Weiming and Li Shiqu
On the Unicity Distance of Stego Key
8 pages, 3 figures
null
null
null
cs.CR
null
Steganography is about how to send secret message covertly. And the purpose of steganalysis is to not only detect the existence of the hidden message but also extract it. So far there have been many reliable detecting methods on various steganographic algorithms, while there are few approaches that can extract the hidden information. In this paper, the difficulty of extracting hidden information, which is essentially a kind of privacy, is analyzed with information-theoretic method in the terms of unicity distance of steganographic key (abbreviated stego key). A lower bound for the unicity distance is obtained, which shows the relations between key rate, message rate, hiding capacity and difficulty of extraction. Furthermore the extracting attack to steganography is viewed as a special kind of cryptanalysis, and an effective method on recovering the stego key of popular LSB replacing steganography in spatial images is presented by combining the detecting technique of steganalysis and correlation attack of cryptanalysis together. The analysis for this method and experimental results on steganographic software ``Hide and Seek 4.1" are both accordant with the information-theoretic conclusion.
[ { "version": "v1", "created": "Mon, 18 Apr 2005 13:45:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Weiming", "Zhang", "" ], [ "Shiqu", "Li", "" ] ]
cs/0504084
Marko Antonio Rodriguez
Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel
The Convergence of Digital-Libraries and the Peer-Review Process
Journal of Information Science [in press]
Journal of Information Science, 32(2), pp. 149-159, 2006.
10.1177/0165551506062327
http://jis.sagepub.com/cgi/content/abstract/32/2/149
cs.DL cs.CY
null
Pre-print repositories have seen a significant increase in use over the past fifteen years across multiple research domains. Researchers are beginning to develop applications capable of using these repositories to assist the scientific community above and beyond the pure dissemination of information. The contribution set forth by this paper emphasizes a deconstructed publication model in which the peer-review process is mediated by an OAI-PMH peer-review service. This peer-review service uses a social-network algorithm to determine potential reviewers for a submitted manuscript and for weighting the relative influence of each participating reviewer's evaluations. This paper also suggests a set of peer-review specific metadata tags that can accompany a pre-print's existing metadata record. The combinations of these contributions provide a unique repository-centric peer-review model that fits within the widely deployed OAI-PMH framework.
[ { "version": "v1", "created": "Mon, 18 Apr 2005 14:28:12 GMT" }, { "version": "v2", "created": "Fri, 22 Apr 2005 11:11:50 GMT" }, { "version": "v3", "created": "Mon, 12 Sep 2005 16:00:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0504086
Kristiaan Pelckmans
Kristiaan Pelckmans, Ivan Goethals, Jos De Brabanter, Johan A.K. Suykens, Bart De Moor
Componentwise Least Squares Support Vector Machines
22 pages. Accepted for publication in Support Vector Machines: Theory and Applications, ed. L. Wang, 2005
null
null
null
cs.LG cs.AI
null
This chapter describes componentwise Least Squares Support Vector Machines (LS-SVMs) for the estimation of additive models consisting of a sum of nonlinear components. The primal-dual derivations characterizing LS-SVMs for the estimation of the additive model result in a single set of linear equations with size growing in the number of data-points. The derivation is elaborated for the classification as well as the regression case. Furthermore, different techniques are proposed to discover structure in the data by looking for sparse components in the model based on dedicated regularization schemes on the one hand and fusion of the componentwise LS-SVMs training with a validation criterion on the other hand. (keywords: LS-SVMs, additive models, regularization, structure detection)
[ { "version": "v1", "created": "Tue, 19 Apr 2005 15:01:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Pelckmans", "Kristiaan", "" ], [ "Goethals", "Ivan", "" ], [ "De Brabanter", "Jos", "" ], [ "Suykens", "Johan A. K.", "" ], [ "De Moor", "Bart", "" ] ]
cs/0504087
Rahul Jain
Rahul Jain
Improved direct sum theorem in classical communication complexity
Withdrawn due to critical error
null
null
null
cs.OH
null
Withdrawn due to critical error.
[ { "version": "v1", "created": "Tue, 19 Apr 2005 21:53:09 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2005 17:11:36 GMT" }, { "version": "v3", "created": "Thu, 21 Apr 2005 21:00:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "Rahul", "" ] ]
cs/0504088
Paul Vitanyi
Paul Vitanyi (CWI, University of Amsterdam, and National ICT Australia)
Time, Space, and Energy in Reversible Computing
LaTeX, 10 pages, Proc. 2005 ACM International Conference on Computing Frontiers, Ischia, Italy, 4-6 May 2005 (1st Intn'l Workshop on Reversible Computing)
null
null
null
cs.CC
null
We survey results of a quarter century of work on computation by reversible general-purpose computers (in this setting Turing machines), and general reversible simulation of irreversible computations, with respect to energy-, time- and space requirements.
[ { "version": "v1", "created": "Wed, 20 Apr 2005 17:13:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitanyi", "Paul", "", "CWI, University of Amsterdam, and National ICT\n Australia" ] ]
cs/0504089
Paul Vitanyi
Paul Vitanyi (CWI, University of Amsterdam, and National ICT Australia)
Universal Similarity
LaTeX, 5 pages, Proc. ITW2005 - IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 29th Aug. - 1st Sept., 2005, Rotorua, New Zealand. (invited). The second version has minor changes, and corrections getting rid of typos: in (2) we "max" in the denominator is replaced by the correct "min", some refs to (1) in the text should have been to (2)
null
null
null
cs.IR cs.AI cs.CL physics.data-an
null
We survey a new area of parameter-free similarity distance measures useful in data-mining, pattern recognition, learning and automatic semantics extraction. Given a family of distances on a set of objects, a distance is universal up to a certain precision for that family if it minorizes every distance in the family between every two objects in the set, up to the stated precision (we do not require the universal distance to be an element of the family). We consider similarity distances for two types of objects: literal objects that as such contain all of their meaning, like genomes or books, and names for objects. The latter may have literal embodyments like the first type, but may also be abstract like ``red'' or ``christianity.'' For the first type we consider a family of computable distance measures corresponding to parameters expressing similarity according to particular features between pairs of literal objects. For the second type we consider similarity distances generated by web users corresponding to particular semantic relations between the (names for) the designated objects. For both families we give universal similarity distance measures, incorporating all particular distance measures in the family. In the first case the universal distance is based on compression and in the second case it is based on Google page counts related to search terms. In both cases experiments on a massive scale give evidence of the viability of the approaches.
[ { "version": "v1", "created": "Wed, 20 Apr 2005 17:40:55 GMT" }, { "version": "v2", "created": "Thu, 7 Jul 2005 17:16:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitanyi", "Paul", "", "CWI, University of Amsterdam, and National ICT\n Australia" ] ]
cs/0504090
Dmitry Kozlov N
Dmitry N. Kozlov
Discrete Morse Theory for free chain complexes
null
Comptes Rendus Mathematique, Acad. Sci. Paris, Ser. I 340 (2005), pp. 867-872
null
null
cs.DM math.RA
null
We extend the combinatorial Morse complex construction to the arbitrary free chain complexes, and give a short, self-contained, and elementary proof of the quasi-isomorphism between the original chain complex and its Morse complex. Even stronger, the main result states that, if $C_*$ is a free chain complex, and $\cm$ an acyclic matching, then $C_*=C_*^\cm\oplus T_*$, where $C_*^\cm$ is the Morse complex generated by the critical elements, and $T_*$ is an acyclic complex.
[ { "version": "v1", "created": "Thu, 21 Apr 2005 14:20:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Kozlov", "Dmitry N.", "" ] ]
cs/0504092
Victor Korotkikh
Victor Korotkikh, Galina Korotkikh and Darryl Bond
On Optimality Condition of Complex Systems: Computational Evidence
5 pages, 4 figures
null
null
null
cs.CC cond-mat.dis-nn nlin.AO
null
A general condition determining the optimal performance of a complex system has not yet been found and the possibility of its existence is unknown. To contribute in this direction, an optimization algorithm as a complex system is presented. The performance of the algorithm for any problem is controlled as a convex function with a single optimum. To characterize the performance optimums, certain quantities of the algorithm and the problem are suggested and interpreted as their complexities. An optimality condition of the algorithm is computationally found: if the algorithm shows its best performance for a problem, then the complexity of the algorithm is in a linear relationship with the complexity of the problem. The optimality condition provides a new perspective to the subject by recognizing that the relationship between certain quantities of the complex system and the problem may determine the optimal performance.
[ { "version": "v1", "created": "Sat, 23 Apr 2005 06:52:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Korotkikh", "Victor", "" ], [ "Korotkikh", "Galina", "" ], [ "Bond", "Darryl", "" ] ]
cs/0504093
Amit K Awasthi
Amit K Awasthi and Sunder Lal
A Multi-proxy Signature Scheme for Partial delegation with Warrant
Old Version 6 Pages
null
null
null
cs.CR
null
In some cases, the original signer may delegate its signing power to a specified proxy group while ensuring individual accountability of each participantsigner. The proxy signature scheme that achieves such purpose is called the multi-proxy signature scheme and the signature generated by the specified proxy group is called multi-proxy signature for the original signer. Recently such scheme has been discussed by Lin et al. Lins scheme is based on partial delegation by Mambo et al. In present chapter we introduce a new multi-proxy signature scheme, which requires less computational overhead in comparison to Lin et al, and also fulfill the requirement of partial delegation with warrant simultaneously.
[ { "version": "v1", "created": "Sat, 23 Apr 2005 22:09:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Awasthi", "Amit K", "" ], [ "Lal", "Sunder", "" ] ]
cs/0504094
Amit K Awasthi
Amit K Awasthi
A New Remote User Authentication Scheme Using Smart Cards with Check Digits
3 Pages. Not Published
null
null
null
cs.CR
null
Since 1981, when Lamport introduced the remote user authentication scheme using table, a plenty of schemes had been proposed with table and without table using. In 1993, Chang and Wu [5] introduced Remote password authentication scheme with smart cards. A number of remote authentication schemes with smart cards have been proposed since then. These schemes allow a valid user to login a remote server and access the services provided by the remote server. But still there is no scheme to authenticate the remote proxy user. In this paper we propose firstly, a protocol to authenticate a proxy user remotely using smartcards.
[ { "version": "v1", "created": "Sat, 23 Apr 2005 22:47:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Awasthi", "Amit K", "" ] ]
cs/0504095
Amit K Awasthi
Amit K Awasthi and Sunder Lal
An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
5 Pages. Intenational conference on sommunication. India 22 Dec 2004, Sastra Deemed Univ. Kumabakonam
null
null
null
cs.CR
null
Blind signature schemes enable a useful protocol that guarantee the anonymity of the participants while Signcryption offers authentication of message and confidentiality of messages at the same time and more efficiently. In this paper, we present a blind signcryption scheme that combines the functionality of blind signature and signcryption. This blind Signcryption is useful for applications that are based on anonymity untracebility and unlinkability.
[ { "version": "v1", "created": "Sat, 23 Apr 2005 23:05:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Awasthi", "Amit K", "" ], [ "Lal", "Sunder", "" ] ]
cs/0504096
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Leen Torenvliet
P-Selectivity, Immunity, and the Power of One Bit
null
null
null
URCS-TR-2005-864
cs.CC
null
We prove that P-sel, the class of all P-selective sets, is EXP-immune, but is not EXP/1-immune. That is, we prove that some infinite P-selective set has no infinite EXP-time subset, but we also prove that every infinite P-selective set has some infinite subset in EXP/1. Informally put, the immunity of P-sel is so fragile that it is pierced by a single bit of information. The above claims follow from broader results that we obtain about the immunity of the P-selective sets. In particular, we prove that for every recursive function f, P-sel is DTIME(f)-immune. Yet we also prove that P-sel is not \Pi_2^p/1-immune.
[ { "version": "v1", "created": "Mon, 25 Apr 2005 15:18:17 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2005 18:28:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Torenvliet", "Leen", "" ] ]