id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0503025 | Rajkumar Buyya | Jia Yu, Rajkumar Buyya | A Taxonomy of Workflow Management Systems for Grid Computing | 29 pages, 15 figures | null | null | GRIDS-TR-2005-1, Grid Computing and Distributed Systems Laboratory,
University of Melbourne, Australia, March 10, 2005 | cs.DC | null | With the advent of Grid and application technologies, scientists and
engineers are building more and more complex applications to manage and process
large data sets, and execute scientific experiments on distributed resources.
Such application scenarios require means for composing and executing complex
workflows. Therefore, many efforts have been made towards the development of
workflow management systems for Grid computing. In this paper, we propose a
taxonomy that characterizes and classifies various approaches for building and
executing workflows on Grids. We also survey several representative Grid
workflow systems developed by various projects world-wide to demonstrate the
comprehensiveness of the taxonomy. The taxonomy not only highlights the design
and engineering similarities and differences of state-of-the-art in Grid
workflow systems, but also identifies the areas that need further research.
| [
{
"version": "v1",
"created": "Fri, 11 Mar 2005 01:13:07 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Apr 2005 08:21:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yu",
"Jia",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
|
cs/0503028 | Do Duc Hanh | Phan Minh Dung, Do Duc Hanh, and Phan Minh Thang (Asian Institute of
Technology) | Stabilization of Cooperative Information Agents in Unpredictable
Environment: A Logic Programming Approach | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.LO cs.MA cs.PL | null | An information agent is viewed as a deductive database consisting of 3 parts:
an observation database containing the facts the agent has observed or sensed
from its surrounding environment, an input database containing the information
the agent has obtained from other agents, and an intensional database which is
a set of rules for computing derived information from the information stored in
the observation and input databases. Stabilization of a system of information
agents represents a capability of the agents to eventually get correct
information about their surrounding despite unpredictable environment changes
and the incapability of many agents to sense such changes causing them to have
temporary incorrect information. We argue that the stabilization of a system of
cooperative information agents could be understood as the convergence of the
behavior of the whole system toward the behavior of a "superagent", who has the
sensing and computing capabilities of all agents combined. We show that
unfortunately, stabilization is not guaranteed in general, even if the agents
are fully cooperative and do not hide any information from each other. We give
sufficient conditions for stabilization and discuss the consequences of our
results.
| [
{
"version": "v1",
"created": "Mon, 14 Mar 2005 09:07:24 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Mar 2005 01:57:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dung",
"Phan Minh",
"",
"Asian Institute of\n Technology"
],
[
"Hanh",
"Do Duc",
"",
"Asian Institute of\n Technology"
],
[
"Thang",
"Phan Minh",
"",
"Asian Institute of\n Technology"
]
]
|
cs/0503030 | Rajesh Pampapathi | Rajesh M. Pampapathi, Boris Mirkin, Mark Levene | A Suffix Tree Approach to Email Filtering | Revisions made in the light of reviewer comments. Main changes: (i)
The extension and elaboration of section 4.4 which describes the scoring
algorithm; (ii) Favouring the use of false positive and false negative
performance measures over the use of precision and recall; (iii) The addition
of ROC curves wherever possible; and (iv) Inclusion of performance statistics
for algorithm. Re-submitted 5th August 2005 | null | null | null | cs.AI cs.CL | null | We present an approach to email filtering based on the suffix tree data
structure. A method for the scoring of emails using the suffix tree is
developed and a number of scoring and score normalisation functions are tested.
Our results show that the character level representation of emails and classes
facilitated by the suffix tree can significantly improve classification
accuracy when compared with the currently popular methods, such as naive Bayes.
We believe the method can be extended to the classification of documents in
other domains.
| [
{
"version": "v1",
"created": "Mon, 14 Mar 2005 18:12:03 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2005 15:22:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pampapathi",
"Rajesh M.",
""
],
[
"Mirkin",
"Boris",
""
],
[
"Levene",
"Mark",
""
]
]
|
cs/0503032 | Loreto Bravo | L. Bertossi (1), L. Bravo (1), E. Franconi (2), A. Lopatenko (2 and 3)
((1) Carleton University (2) Free University of Bozen--Bolzano, (3)
University of Manchester) | Complexity and Approximation of Fixing Numerical Attributes in Databases
Under Integrity Constraints | 35 pages. Extended version of the camera ready version to appear in
Proc. of the Databases Programming Languages Conference (DBPL 05), Springer
LNCS volume 3774 | null | null | null | cs.DB cs.CC | null | Consistent query answering is the problem of computing the answers from a
database that are consistent with respect to certain integrity constraints that
the database as a whole may fail to satisfy. Those answers are characterized as
those that are invariant under minimal forms of restoring the consistency of
the database. In this context, we study the problem of repairing databases by
fixing integer numerical values at the attribute level with respect to denial
and aggregation constraints. We introduce a quantitative definition of database
fix, and investigate the complexity of several decision and optimization
problems, including DFP, i.e. the existence of fixes within a given distance
from the original instance, and CQA, i.e. deciding consistency of answers to
aggregate conjunctive queries under different semantics. We provide sharp
complexity bounds, identify relevant tractable cases; and introduce
approximation algorithms for some of those that are intractable. More
specifically, we obtain results like undecidability of existence of fixes for
aggregation constraints; MAXSNP-hardness of DFP, but a good approximation
algorithm for a relevant special case; and intractability but good
approximation for CQA for aggregate queries for one database atom denials (plus
built-ins).
| [
{
"version": "v1",
"created": "Tue, 15 Mar 2005 00:03:59 GMT"
},
{
"version": "v2",
"created": "Wed, 25 May 2005 17:46:21 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Oct 2005 19:43:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bertossi",
"L.",
"",
"2 and 3"
],
[
"Bravo",
"L.",
"",
"2 and 3"
],
[
"Franconi",
"E.",
"",
"2 and 3"
],
[
"Lopatenko",
"A.",
"",
"2 and 3"
]
]
|
cs/0503033 | Stergos Afantenos | Stergos D. Afantenos, Konstantina Liontou, Maria Salapata, Vangelis
Karkaletsis | An Introduction to the Summarization of Evolving Events: Linear and
Non-linear Evolution | 10 pages, 3 figures. To be pulished in Natural Language Understanding
and Cognitive Science (NLUCS - 2005) conference | Edited by Bernadete Sharp, Proceedings of the 2nd International
Workshop on Natural Language Understanding and Cognitive Science, NLUCS 2005.
Maiami, Florida, USA: INSTICC Press. pp 91-99. | null | null | cs.CL cs.IR | null | This paper examines the summarization of events that evolve through time. It
discusses different types of evolution taking into account the time in which
the incidents of an event are happening and the different sources reporting on
the specific event. It proposes an approach for multi-document summarization
which employs ``messages'' for representing the incidents of an event and
cross-document relations that hold between messages according to certain
conditions. The paper also outlines the current version of the summarization
system we are implementing to realize this approach.
| [
{
"version": "v1",
"created": "Tue, 15 Mar 2005 15:31:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
],
[
"Liontou",
"Konstantina",
""
],
[
"Salapata",
"Maria",
""
],
[
"Karkaletsis",
"Vangelis",
""
]
]
|
cs/0503035 | Alexey Savvateev | Anna Bogomolnaia, Michel Le Breton, Alexei Savvateev, Shlomo Weber | The egalitarian sharing rule in provision of public projects | 7 pages | null | null | null | cs.GT | null | In this note we consider a society that partitions itself into disjoint
jurisdictions, each choosing a location of its public project and a taxation
scheme to finance it. The set of public project is multi-dimensional, and their
costs could vary from jurisdiction to jurisdiction. We impose two principles,
egalitarianism, that requires the equalization of the total cost for all agents
in the same jurisdiction, and efficiency, that implies the minimization of the
aggregate total cost within jurisdiction. We show that these two principles
always yield a core-stable partition but a Nash stable partition may fail to
exist.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2005 09:24:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bogomolnaia",
"Anna",
""
],
[
"Breton",
"Michel Le",
""
],
[
"Savvateev",
"Alexei",
""
],
[
"Weber",
"Shlomo",
""
]
]
|
cs/0503036 | Ricardo Corin | R. Corin, S. Etalle, P.H. Hartel and A. Mader | Timed Analysis of Security Protocols | null | null | null | null | cs.CR | null | We propose a method for engineering security protocols that are aware of
timing aspects. We study a simplified version of the well-known Needham
Schroeder protocol and the complete Yahalom protocol, where timing information
allows the study of different attack scenarios. We model check the protocols
using UPPAAL. Further, a taxonomy is obtained by studying and categorising
protocols from the well known Clark Jacob library and the Security Protocol
Open Repository (SPORE) library. Finally, we present some new challenges and
threats that arise when considering time in the analysis, by providing a novel
protocol that uses time challenges and exposing a timing attack over an
implementation of an existing security protocol.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2005 10:05:18 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Oct 2005 21:03:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Corin",
"R.",
""
],
[
"Etalle",
"S.",
""
],
[
"Hartel",
"P. H.",
""
],
[
"Mader",
"A.",
""
]
]
|
cs/0503037 | Zengyou He | Zengyou He | Mining Top-k Approximate Frequent Patterns | 13 pages | null | null | TR-2005-0315 | cs.DB cs.AI | null | Frequent pattern (itemset) mining in transactional databases is one of the
most well-studied problems in data mining. One obstacle that limits the
practical usage of frequent pattern mining is the extremely large number of
patterns generated. Such a large size of the output collection makes it
difficult for users to understand and use in practice. Even restricting the
output to the border of the frequent itemset collection does not help much in
alleviating the problem. In this paper we address the issue of overwhelmingly
large output size by introducing and studying the following problem: mining
top-k approximate frequent patterns. The union of the power sets of these k
sets should satisfy the following conditions: (1) including itemsets with
larger support as many as possible and (2) including itemsets with smaller
support as less as possible. An integrated objective function is designed to
combine these two objectives. Consequently, we derive the upper bounds on
objective function and present an approximate branch-and-bound method for
finding the feasible solution. We give empirical evidence showing that our
formulation and approximation methods work well in practice.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2005 11:01:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
]
]
|
cs/0503043 | Paolo Liberatore | Paolo Liberatore | Complexity Issues in Finding Succinct Solutions of PSPACE-Complete
Problems | null | null | null | null | cs.AI cs.CC cs.LO | null | We study the problem of deciding whether some PSPACE-complete problems have
models of bounded size. Contrary to problems in NP, models of PSPACE-complete
problems may be exponentially large. However, such models may take polynomial
space in a succinct representation. For example, the models of a QBF are
explicitely represented by and-or trees (which are always of exponential size)
but can be succinctely represented by circuits (which can be polynomial or
exponential). We investigate the complexity of deciding the existence of such
succinct models when a bound on size is given.
| [
{
"version": "v1",
"created": "Fri, 18 Mar 2005 17:30:39 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Mar 2005 11:13:15 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Mar 2005 19:32:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Liberatore",
"Paolo",
""
]
]
|
cs/0503045 | Gregory Edwin Graham | G. E. Graham (1), M. Anzar Afaq (1), David Evans (1), Gerald Guglielmo
(1), Eric Wicklund (1), Peter Love (2) ((1) Fermi National Accelerator
Laboratory, (2) University of Lancaster) | Contextual Constraint Modeling in Grid Application Workflows | 19 pages, 5 figures; Submitted to Concurrency and Computation:
Practice and Experience for the Special Issue on Workflows at GGF10, cpe859 | null | null | null | cs.DC | null | This paper introduces a new mechanism for specifying constraints in
distributed workflows. By introducing constraints in a contextual form, it is
shown how different people and groups within collaborative communities can
cooperatively constrain workflows. A comparison with existing state-of-the-art
workflow systems is made. These ideas are explored in practice with an
illustrative example from High Energy Physics.
| [
{
"version": "v1",
"created": "Sat, 19 Mar 2005 01:28:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Graham",
"G. E.",
""
],
[
"Afaq",
"M. Anzar",
""
],
[
"Evans",
"David",
""
],
[
"Guglielmo",
"Gerald",
""
],
[
"Wicklund",
"Eric",
""
],
[
"Love",
"Peter",
""
]
]
|
cs/0503046 | Haixia Jia | Dimitris Achlioptas and Haixia Jia and Cristopher Moore | Hiding Satisfying Assignments: Two are Better than One | Preliminary version appeared in AAAI 2004 | null | null | null | cs.AI cond-mat.dis-nn cond-mat.stat-mech cs.CC | null | The evaluation of incomplete satisfiability solvers depends critically on the
availability of hard satisfiable instances. A plausible source of such
instances consists of random k-SAT formulas whose clauses are chosen uniformly
from among all clauses satisfying some randomly chosen truth assignment A.
Unfortunately, instances generated in this manner tend to be relatively easy
and can be solved efficiently by practical heuristics. Roughly speaking, as the
formula's density increases, for a number of different algorithms, A acts as a
stronger and stronger attractor. Motivated by recent results on the geometry of
the space of satisfying truth assignments of random k-SAT and NAE-k-SAT
formulas, we introduce a simple twist on this basic model, which appears to
dramatically increase its hardness. Namely, in addition to forbidding the
clauses violated by the hidden assignment A, we also forbid the clauses
violated by its complement, so that both A and complement of A are satisfying.
It appears that under this "symmetrization'' the effects of the two attractors
largely cancel out, making it much harder for algorithms to find any truth
assignment. We give theoretical and experimental evidence supporting this
assertion.
| [
{
"version": "v1",
"created": "Sun, 20 Mar 2005 02:46:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Achlioptas",
"Dimitris",
""
],
[
"Jia",
"Haixia",
""
],
[
"Moore",
"Cristopher",
""
]
]
|
cs/0503048 | Arindam Mitra | Arindam Mitra | Is entanglement necessary to have unconditional security in quantum bit
commitment ? | Pdf. 2 pages. Revised | null | null | null | cs.CR | null | A simple un-entanglement based quantum bit commitment scheme is presented.
Although commitment is unconditionally secure but concealment is not.
| [
{
"version": "v1",
"created": "Mon, 21 Mar 2005 15:20:14 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Nov 2005 15:39:44 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Mar 2006 13:58:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
]
|
cs/0503050 | Nikita Sakhanenko | Hanna Makaruk, Robert Owczarek, Nikita Sakhanenko | Systematic Method for Path-Complete White Box Testing | 24 pages, 3 figures, submitted to Software Testing, Verification and
Reliability (STVR) | null | null | LA-UR-05-1850 | cs.SE | null | A systematic, language-independent method of finding a minimal set of paths
covering the code of a sequential program is proposed for application in White
Box testing. Execution of all paths from the set ensures also statement
coverage. Execution fault marks problematic areas of the code. The method
starts from a UML activity diagram of a program. The diagram is transformed
into a directed graph: graph's nodes substitute decision and action points;
graph's directed edges substitute action arrows.
The number of independent paths equals easy-to-compute cyclomatic complexity
of the graph. Association of a vector to each path creates a path vector space.
Independence of the paths is equivalent to linear independence of the vectors.
It is sufficient to test any base of the path space to complete the procedure.
An effective algorithm for choosing the base paths is presented.
| [
{
"version": "v1",
"created": "Mon, 21 Mar 2005 21:26:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Makaruk",
"Hanna",
""
],
[
"Owczarek",
"Robert",
""
],
[
"Sakhanenko",
"Nikita",
""
]
]
|
cs/0503051 | Fengfeng Zhou | Fengfeng Zhou, Guoliang Chen, and Yinlong Xu | Construction of Small Worlds in the Physical Topology of Wireless
Networks | null | null | null | null | cs.NI | null | The concept of small worlds is introduced into the physical topology of
wireless networks in this work. A. Helmy provided two con- struction schemes of
small worlds for the wireless networks, link rewiring and link addition, but he
mainly focused on the virtual topology. Based on the broadcasting nature of the
radio transmission, we propose a con- struction scheme of small worlds for the
physical topology of Multiple- Input Multiple-Output (MIMO) wireless networks.
Besides the topology- related topics, we also evaluate the reduction of the
power required by a request.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 03:23:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Fengfeng",
""
],
[
"Chen",
"Guoliang",
""
],
[
"Xu",
"Yinlong",
""
]
]
|
cs/0503053 | Carlos Miravet | Carlos Miravet and Francisco B. Rodriguez (EPS-UAM, Madrid, Spain) | A hybrid MLP-PNN architecture for fast image superresolution | 8 pages with 4 figures. ICANN/ICONIP 2003 | Lect. Notes Comput. Sc. 2714 (2003) 401-408 | null | null | cs.CV cs.MM | null | Image superresolution methods process an input image sequence of a scene to
obtain a still image with increased resolution. Classical approaches to this
problem involve complex iterative minimization procedures, typically with high
computational costs. In this paper is proposed a novel algorithm for
super-resolution that enables a substantial decrease in computer load. First, a
probabilistic neural network architecture is used to perform a scattered-point
interpolation of the image sequence data. The network kernel function is
optimally determined for this problem by a multi-layer perceptron trained on
synthetic data. Network parameters dependence on sequence noise level is
quantitatively analyzed. This super-sampled image is spatially filtered to
correct finite pixel size effects, to yield the final high-resolution estimate.
Results on a real outdoor sequence are presented, showing the quality of the
proposed method.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 11:45:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Miravet",
"Carlos",
"",
"EPS-UAM, Madrid, Spain"
],
[
"Rodriguez",
"Francisco B.",
"",
"EPS-UAM, Madrid, Spain"
]
]
|
cs/0503056 | Carlos Miravet | Carlos Miravet, Enrique Coiras and Javier Santamaria (SENER, Madrid,
Spain) | Semi-automatic vectorization of linear networks on rasterized
cartographic maps | 12 pages with 13 figures, in Spanish | Revista de Teledeteccion, 10 (1998) | null | null | cs.CV cs.MM | null | A system for semi-automatic vectorization of linear networks (roads, rivers,
etc.) on rasterized cartographic maps is presented. In this system, human
intervention is limited to a graphic, interactive selection of the color
attributes of the information to be obtained. Using this data, the system
performs a preliminary extraction of the linear network, which is subsequently
completed, refined and vectorized by means of an automatic procedure. Results
on maps of different sources and scales are included.
-----
Se presenta un sistema semi-automatico de vectorizacion de redes de objetos
lineales (carreteras, rios, etc.) en mapas cartograficos digitalizados. En este
sistema, la intervencion humana queda reducida a la seleccion grafica
interactiva de los atributos de color de la informacion a obtener. Con estos
datos, el sistema realiza una extraccion preliminar de la red lineal, que se
completa, refina y vectoriza mediante un procedimiento automatico. Se presentan
resultados de la aplicacion del sistema sobre imagenes digitalizadas de mapas
de distinta procedencia y escala.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 20:16:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Miravet",
"Carlos",
"",
"SENER, Madrid,\n Spain"
],
[
"Coiras",
"Enrique",
"",
"SENER, Madrid,\n Spain"
],
[
"Santamaria",
"Javier",
"",
"SENER, Madrid,\n Spain"
]
]
|
cs/0503057 | Ion Mandoiu | Ion I. Mandoiu and Dragos Trinca | Exact and Approximation Algorithms for DNA Tag Set Design | null | null | null | null | cs.DS | null | In this paper we propose new solution methods for designing tag sets for use
in universal DNA arrays. First, we give integer linear programming formulations
for two previous formalizations of the tag set design problem, and show that
these formulations can be solved to optimality for instance sizes of practical
interest by using general purpose optimization packages. Second, we note the
benefits of periodic tags, and establish an interesting connection between the
tag design problem and the problem of packing the maximum number of
vertex-disjoint directed cycles in a given graph. We show that combining a
simple greedy cycle packing algorithm with a previously proposed alphabetic
tree search strategy yields an increase of over 40% in the number of tags
compared to previous methods.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 02:36:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mandoiu",
"Ion I.",
""
],
[
"Trinca",
"Dragos",
""
]
]
|
cs/0503060 | Quan Son Nguyen | Quan Son Nguyen (Hanoi University of Technology, Vietnam) | Multi-Dimensional Hash Chains and Application to Micropayment Schemes | 9 pages with 2 figures. Accepted for the International Workshop on
Coding and Cryptography (WCC'2005), March 2005 in Bergen, Norway | null | null | null | cs.CR | null | One-way hash chains have been used in many micropayment schemes due to their
simplicity and efficiency. In this paper we introduce the notion of
multi-dimensional hash chains, which is a new generalization of traditional
one-way hash chains. We show that this construction has storage-computational
complexity of O(logN) per chain element, which is comparable with the best
result reported in recent literature. Based on multi-dimensional hash chains,
we then propose two cash-like micropayment schemes, which have a number of
advantages in terms of efficiency and security. We also point out some possible
improvements to PayWord and similar schemes by using multi-dimensional hash
chains
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 09:15:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nguyen",
"Quan Son",
"",
"Hanoi University of Technology, Vietnam"
]
]
|
cs/0503061 | Sandro Etalle | Sandro Etalle and William H. Winsborough | Integrity Constraints in Trust Management | An extended abstract appears in the proc. of the 10th ACM Symp. on
Access Control Models and Technologies (SACMAT). 2005 | null | null | null | cs.CR cs.DB | null | We introduce the use, monitoring, and enforcement of integrity constraints in
trust management-style authorization systems. We consider what portions of the
policy state must be monitored to detect violations of integrity constraints.
Then we address the fact that not all participants in a trust management system
can be trusted to assist in such monitoring, and show how many integrity
constraints can be monitored in a conservative manner so that trusted
participants detect and report if the system enters a policy state from which
evolution in unmonitored portions of the policy could lead to a constraint
violation.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 15:20:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Etalle",
"Sandro",
""
],
[
"Winsborough",
"William H.",
""
]
]
|
cs/0503062 | Christoph Koch | Christoph Koch | On the Complexity of Nonrecursive XQuery and Functional Query Languages
on Complex Values | Long version of PODS 2005 paper | null | null | null | cs.DB cs.CC | null | This paper studies the complexity of evaluating functional query languages
for complex values such as monad algebra and the recursion-free fragment of
XQuery.
We show that monad algebra with equality restricted to atomic values is
complete for the class TA[2^{O(n)}, O(n)] of problems solvable in linear
exponential time with a linear number of alternations. The monotone fragment of
monad algebra with atomic value equality but without negation is complete for
nondeterministic exponential time. For monad algebra with deep equality, we
establish TA[2^{O(n)}, O(n)] lower and exponential-space upper bounds.
Then we study a fragment of XQuery, Core XQuery, that seems to incorporate
all the features of a query language on complex values that are traditionally
deemed essential. A close connection between monad algebra on lists and Core
XQuery (with ``child'' as the only axis) is exhibited, and it is shown that
these languages are expressively equivalent up to representation issues. We
show that Core XQuery is just as hard as monad algebra w.r.t. combined
complexity, and that it is in TC0 if the query is assumed fixed.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 15:36:55 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Mar 2005 00:22:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Koch",
"Christoph",
""
]
]
|
cs/0503065 | Rachid Echahed | Dominique Duval (LMC - IMAG), Rachid Echahed (Leibniz - IMAG),
Frederic Prost (Leibniz - IMAG) | Data-Structure Rewriting | null | null | null | null | cs.PL cs.DS | null | We tackle the problem of data-structure rewriting including pointer
redirections. We propose two basic rewrite steps: (i) Local Redirection and
Replacement steps the aim of which is redirecting specific pointers determined
by means of a pattern, as well as adding new information to an existing data ;
and (ii) Global Redirection steps which are aimed to redirect all pointers
targeting a node towards another one. We define these two rewriting steps
following the double pushout approach. We define first the category of graphs
we consider and then define rewrite rules as pairs of graph homomorphisms of
the form "L <- K ->R". Unfortunately, inverse pushouts (complement pushouts)
are not unique in our setting and pushouts do not always exist. Therefore, we
define rewriting steps so that a rewrite rule can always be performed once a
matching is found.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 09:55:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Duval",
"Dominique",
"",
"LMC - IMAG"
],
[
"Echahed",
"Rachid",
"",
"Leibniz - IMAG"
],
[
"Prost",
"Frederic",
"",
"Leibniz - IMAG"
]
]
|
cs/0503068 | Michael Nelson | Michael L. Nelson | A Survey of Reverse Engineering and Program Comprehension | originally released as web-only in 1996 | null | null | null | cs.SE | null | Reverse engineering has been a standard practice in the hardware community
for some time. It has only been within the last ten years that reverse
engineering, or "program comprehension", has grown into the current
sub-discipline of software engineering. Traditional software engineering is
primarily focused on the development and design of new software. However, most
programmers work on software that other people have designed and developed. Up
to 50% of a software maintainers time can be spent determining the intent of
source code. The growing demand to reevaluate and reimplement legacy software
systems, brought on by the proliferation of clientserver and World Wide Web
technologies, has underscored the need for reverse engineering tools and
techniques. This paper introduces the terminology of reverse engineering and
gives some of the obstacles that make reverse engineering difficult. Although
reverse engineering remains heavily dependent on the human component, a number
of automated tools are presented that aid the reverse engineer.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 13:55:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nelson",
"Michael L.",
""
]
]
|
cs/0503069 | Michael Nelson | Michael L. Nelson, Herbert Van de Sompel, Xiaoming Liu, Terry L.
Harrison, Nathan McFarland | mod_oai: An Apache Module for Metadata Harvesting | null | null | null | null | cs.DL | null | We describe mod_oai, an Apache 2.0 module that implements the Open Archives
Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto
standard for metadata exchange in digital libraries and allows repositories to
expose their contents in a structured, application-neutral format with
semantics optimized for accurate incremental harvesting. Current
implementations of OAI-PMH are either separate applications that access an
existing repository, or are built-in to repository software packages. mod_oai
is different in that it optimizes harvesting web content by building OAI-PMH
capability into the Apache server. We discuss the implications of adding
harvesting capability to an Apache server and describe our initial experimental
results accessing a departmental web site using both web crawling and OAIPMH
harvesting techniques.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 14:38:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nelson",
"Michael L.",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Harrison",
"Terry L.",
""
],
[
"McFarland",
"Nathan",
""
]
]
|
cs/0503073 | Viktor Toth | Viktor Toth | Tensor manipulation in GPL Maxima | 26 pages (some formulae fixed, terminology usage corrected, comments
added on improved tensor contraction algorithm) | null | null | null | cs.SC | null | GPL Maxima is an open-source computer algebra system based on DOE-MACSYMA.
GPL Maxima included two tensor manipulation packages from DOE-MACSYMA, but
these were in various states of disrepair. One of the two packages, CTENSOR,
implemented component-based tensor manipulation; the other, ITENSOR, treated
tensor symbols as opaque, manipulating them based on their index properties.
The present paper describes the state in which these packages were found, the
steps that were needed to make the packages fully functional again, and the new
functionality that was implemented to make them more versatile. A third
package, ATENSOR, was also implemented; fully compatible with the identically
named package in the commercial version of MACSYMA, ATENSOR implements abstract
tensor algebras.
| [
{
"version": "v1",
"created": "Sat, 26 Mar 2005 14:41:49 GMT"
},
{
"version": "v2",
"created": "Wed, 25 May 2005 16:52:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Toth",
"Viktor",
""
]
]
|
cs/0503074 | Sameer Tilak | Sameer Tilak, Bhanu Pisupati, Kenneth Chiu, Geoffrey Brown, Nael
Abu-Ghazaleh | A File System Abstraction for Sense and Respond Systems | 6 pages, 3 figures Workshop on End-to-End, Sense-and-Respond Systems,
Applications, and Services In conjunction with MobiSys '05 | null | null | null | cs.NI cs.OS | null | The heterogeneity and resource constraints of sense-and-respond systems pose
significant challenges to system and application development. In this paper, we
present a flexible, intuitive file system abstraction for organizing and
managing sense-and-respond systems based on the Plan 9 design principles. A key
feature of this abstraction is the ability to support multiple views of the
system via filesystem namespaces. Constructed logical views present an
application-specific representation of the network, thus enabling high-level
programming of the network. Concurrently, structural views of the network
enable resource-efficient planning and execution of tasks. We present and
motivate the design using several examples, outline research challenges and our
research plan to address them, and describe the current state of
implementation.
| [
{
"version": "v1",
"created": "Mon, 28 Mar 2005 15:32:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tilak",
"Sameer",
""
],
[
"Pisupati",
"Bhanu",
""
],
[
"Chiu",
"Kenneth",
""
],
[
"Brown",
"Geoffrey",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
]
|
cs/0503075 | Wing-kai Lin | W.-Y. Ng, W.K. Lin, D.M. Chiu | Statistical Modelling of Information Sharing: Community, Membership and
Content | accepted in International Symposium on Computer Performance,
Modeling, Measurements and Evaluation, Juan-les-Pins, France, October-2005 | null | null | null | cs.NI cond-mat.stat-mech physics.soc-ph | null | File-sharing systems, like many online and traditional information sharing
communities (e.g. newsgroups, BBS, forums, interest clubs), are dynamical
systems in nature. As peers get in and out of the system, the information
content made available by the prevailing membership varies continually in
amount as well as composition, which in turn affects all peers' join/leave
decisions. As a result, the dynamics of membership and information content are
strongly coupled, suggesting interesting issues about growth, sustenance and
stability.
In this paper, we propose to study such communities with a simple statistical
model of an information sharing club. Carrying their private payloads of
information goods as potential supply to the club, peers join or leave on the
basis of whether the information they demand is currently available.
Information goods are chunked and typed, as in a file sharing system where
peers contribute different files, or a forum where messages are grouped by
topics or threads. Peers' demand and supply are then characterized by
statistical distributions over the type domain.
This model reveals interesting critical behaviour with multiple equilibria. A
sharp growth threshold is derived: the club may grow towards a sustainable
equilibrium only if the value of an order parameter is above the threshold, or
shrink to emptiness otherwise. The order parameter is composite and comprises
the peer population size, the level of their contributed supply, the club's
efficiency in information search, the spread of supply and demand over the type
domain, as well as the goodness of match between them.
| [
{
"version": "v1",
"created": "Mon, 28 Mar 2005 07:33:37 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Apr 2005 07:48:16 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Jul 2005 01:55:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ng",
"W. -Y.",
""
],
[
"Lin",
"W. K.",
""
],
[
"Chiu",
"D. M.",
""
]
]
|
cs/0503076 | Marci Meingast | Marci Meingast, Christopher Geyer, Shankar Sastry | Geometric Models of Rolling-Shutter Cameras | null | null | null | null | cs.CV cs.RO | null | Cameras with rolling shutters are becoming more common as low-power, low-cost
CMOS sensors are being used more frequently in cameras. The rolling shutter
means that not all scanlines are exposed over the same time interval. The
effects of a rolling shutter are noticeable when either the camera or objects
in the scene are moving and can lead to systematic biases in projection
estimation. We develop a general projection equation for a rolling shutter
camera and show how it is affected by different types of camera motion. In the
case of fronto-parallel motion, we show how that camera can be modeled as an
X-slit camera. We also develop approximate projection equations for a non-zero
angular velocity about the optical axis and approximate the projection equation
for a constant velocity screw motion. We demonstrate how the rolling shutter
effects the projective geometry of the camera and in turn the
structure-from-motion.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 00:00:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Meingast",
"Marci",
""
],
[
"Geyer",
"Christopher",
""
],
[
"Sastry",
"Shankar",
""
]
]
|
cs/0503077 | Mehryar Mohri | Mehryar Mohri, Fernando Pereira, Michael Riley | Weighted Automata in Text and Speech Processing | null | Mehryar Mohri, Fernando Pereira, and Michael Riley. Weighted
Automata in Text and Speech Processing. In Proceedings of the 12th biennial
European Conference on Artificial Intelligence (ECAI-96), Workshop on
Extended finite state models of language. Budapest, Hungary, 1996. John Wiley
and Sons, Chichester | null | null | cs.CL cs.HC | null | Finite-state automata are a very effective tool in natural language
processing. However, in a variety of applications and especially in speech
precessing, it is necessary to consider more general machines in which arcs are
assigned weights or costs. We briefly describe some of the main theoretical and
algorithmic aspects of these machines. In particular, we describe an efficient
composition algorithm for weighted transducers, and give examples illustrating
the value of determinization and minimization algorithms for weighted automata.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 04:59:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mohri",
"Mehryar",
""
],
[
"Pereira",
"Fernando",
""
],
[
"Riley",
"Michael",
""
]
]
|
cs/0503078 | Fernando Sasse D. | Angelo Luis Pagliosa, Claudio Cesar de Sa and Fernando D. Sasse | Obtaining Membership Functions from a Neuron Fuzzy System extended by
Kohonen Network | 6 pages, 6 figures, 5th Congress of Logic Applied to Technology
(LAPTEC 2005) Himeji, Japan, April 2-6, 2005 | null | null | null | cs.NE | null | This article presents the Neo-Fuzzy-Neuron Modified by Kohonen Network
(NFN-MK), an hybrid computational model that combines fuzzy system technique
and artificial neural networks. Its main task consists in the automatic
generation of membership functions, in particular, triangle forms, aiming a
dynamic modeling of a system. The model is tested by simulating real systems,
here represented by a nonlinear mathematical function. Comparison with the
results obtained by traditional neural networks, and correlated studies of
neurofuzzy systems applied in system identification area, shows that the NFN-MK
model has a similar performance, despite its greater simplicity.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 19:40:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pagliosa",
"Angelo Luis",
""
],
[
"de Sa",
"Claudio Cesar",
""
],
[
"Sasse",
"Fernando D.",
""
]
]
|
cs/0503081 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | An Optimization Model for Outlier Detection in Categorical Data | 12 pages | null | null | Tr-05-0329 | cs.DB cs.AI | null | The task of outlier detection is to find small groups of data objects that
are exceptional when compared with rest large amount of data. Detection of such
outliers is important for many applications such as fraud detection and
customer migration. Most existing methods are designed for numeric data. They
will encounter problems with real-life applications that contain categorical
data. In this paper, we formally define the problem of outlier detection in
categorical data as an optimization problem from a global viewpoint. Moreover,
we present a local-search heuristic based algorithm for efficiently finding
feasible solutions. Experimental results on real datasets and large synthetic
datasets demonstrate the superiority of our model and algorithm.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 13:31:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0503082 | Gabriel Istrate | Gabriel Istrate, Stefan Boettcher, Allon G. Percus | Spines of Random Constraint Satisfaction Problems: Definition and
Connection with Computational Complexity | A revised version of this paper will appear in Annals of Mathematics
and Artificial Intelligence | null | null | null | cs.CC cond-mat.dis-nn cs.AI | null | We study the connection between the order of phase transitions in
combinatorial problems and the complexity of decision algorithms for such
problems. We rigorously show that, for a class of random constraint
satisfaction problems, a limited connection between the two phenomena indeed
exists. Specifically, we extend the definition of the spine order parameter of
Bollobas et al. to random constraint satisfaction problems, rigorously showing
that for such problems a discontinuity of the spine is associated with a
$2^{\Omega(n)}$ resolution complexity (and thus a $2^{\Omega(n)}$ complexity of
DPLL algorithms) on random instances. The two phenomena have a common
underlying cause: the emergence of ``large'' (linear size) minimally
unsatisfiable subformulas of a random formula at the satisfiability phase
transition.
We present several further results that add weight to the intuition that
random constraint satisfaction problems with a sharp threshold and a continuous
spine are ``qualitatively similar to random 2-SAT''. Finally, we argue that it
is the spine rather than the backbone parameter whose continuity has
implications for the decision complexity of combinatorial problems, and we
provide experimental evidence that the two parameters can behave in a different
manner.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 21:58:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
],
[
"Boettcher",
"Stefan",
""
],
[
"Percus",
"Allon G.",
""
]
]
|
cs/0503083 | Gabriel Istrate | Gabriel Istrate | Coarse and Sharp Thresholds of Boolean Constraint Satisfaction Problems | A revised version of this paper will appear in Discrete Applied
Mathematics | null | null | null | cs.DM cs.CC | null | We study threshold properties of random constraint satisfaction problems
under a probabilistic model due to Molloy. We give a sufficient condition for
the existence of a sharp threshold that leads (for boolean constraints) to a
necessary and sufficient for the existence of a sharp threshold in the case
where constraint templates are applied with equal probability, solving thus an
open problem of Creignou and Daude.
| [
{
"version": "v1",
"created": "Tue, 29 Mar 2005 22:25:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
]
|
cs/0503084 | Pavlo Nefyodov | P. Nefyodov, V. Reztsov, O. Riabinina | The Peculiarities of Nonstationary Formation of Inhomogeneous Structures
of Charged Particles in the Electrodiffusion Processes | 6 pages, 6 figures The example of our scientific work | null | null | null | cs.CE | null | In this paper the distribution of charged particles is constructed under the
approximation of ambipolar diffusion. The results of mathematical modelling in
two-dimensional case taking into account the velocities of the system are
presented.
| [
{
"version": "v1",
"created": "Wed, 30 Mar 2005 07:00:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nefyodov",
"P.",
""
],
[
"Reztsov",
"V.",
""
],
[
"Riabinina",
"O.",
""
]
]
|
cs/0503086 | Joseph Morlier | Joseph Morlier (LRBB) | Segmentation of the Homogeneity of a Signal Using a Piecewise Linear
Recognition Tool | This preprint could help me to receive comments on my work in order
to enhance the paper to be submitted | null | null | null | cs.NA | null | In this paper a new method of detection of homogeneous zones and singularity
parts of a 1D signal is proposed. The entropy function is used to transform
signal in piecewise linear one. The multiple regression permits to detect lines
and project them in the Hough parameters space in order to easily recognise
homogeneous zone and abrupt changes of the signal. Two application examples are
analysed, the first is a classical fractal signal and the other is issued from
a dynamic mechanical study.
| [
{
"version": "v1",
"created": "Wed, 30 Mar 2005 13:53:19 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 14:41:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Morlier",
"Joseph",
"",
"LRBB"
]
]
|
cs/0503090 | Francesco Sorrentino Ing | David Arrowsmith, Mario di Bernardo, Francesco Sorrentino | Effects of variations of load distribution on network performance | 4 pages, 4 figures, included in conference proceedings ISCAS 2005,
Kobe Japan | null | null | null | cs.NI | null | This paper is concerned with the characterization of the relationship between
topology and traffic dynamics. We use a model of network generation that allows
the transition from random to scale free networks. Specifically, we consider
three different topological types of network: random, scale-free with \gamma =
3, scale-free with \gamma = 2. By using a novel LRD traffic generator, we
observe best performance, in terms of transmission rates and delivered packets,
in the case of random networks. We show that, even if scale-free networks are
characterized by shorter characteristic-path- length (the lower the exponent,
the lower the path-length), they show worst performances in terms of
communication. We conjecture this could be explained in terms of changes in the
load distribution, defined here as the number of shortest paths going through a
given vertex. In fact, that distribu- tion is characterized by (i) a decreasing
mean (ii) an increas- ing standard deviation, as the networks becomes
scale-free (especially scale-free networks with low exponents). The use of a
degree-independent server also discriminates against a scale-free structure. As
a result, since the model is un- controlled, most packets will go through the
same vertices, favoring the onset of congestion.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2005 09:01:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arrowsmith",
"David",
""
],
[
"di Bernardo",
"Mario",
""
],
[
"Sorrentino",
"Francesco",
""
]
]
|
cs/0503091 | Tatsuaki Okamoto | Tatsuaki Okamoto, Ryo Kashima | Resource Bounded Unprovability of Computational Lower Bounds | 78 pages | null | null | null | cs.CC cs.LO | null | This paper introduces new notions of asymptotic proofs,
PT(polynomial-time)-extensions, PTM(polynomial-time Turing
machine)-omega-consistency, etc. on formal theories of arithmetic including PA
(Peano Arithmetic). This paper shows that P not= NP (more generally, any
super-polynomial-time lower bound in PSPACE) is unprovable in a
PTM-omega-consistent theory T, where T is a consistent PT-extension of PA. This
result gives a unified view to the existing two major negative results on
proving P not= NP, Natural Proofs and relativizable proofs, through the two
manners of characterization of PTM-omega-consistency. We also show that the
PTM-omega-consistency of T cannot be proven in any PTM-omega-consistent theory
S, where S is a consistent PT-extension of T.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2005 10:40:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Okamoto",
"Tatsuaki",
""
],
[
"Kashima",
"Ryo",
""
]
]
|
cs/0503092 | Jan Chomicki | Jan Chomicki, Joyce Song | Monotonic and Nonmonotonic Preference Revision | null | null | null | null | cs.DB cs.AI | null | We study here preference revision, considering both the monotonic case where
the original preferences are preserved and the nonmonotonic case where the new
preferences may override the original ones. We use a relational framework in
which preferences are represented using binary relations (not necessarily
finite). We identify several classes of revisions that preserve order axioms,
for example the axioms of strict partial or weak orders. We consider
applications of our results to preference querying in relational databases.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2005 19:43:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
],
[
"Song",
"Joyce",
""
]
]
|
cs/0504002 | Nael Abu-Ghazaleh | Seon-Yeong Han and Nael Abu-Ghazaleh | On the Effect of Fading on Ad hoc Networking | 12 pages; 14 figures | null | null | null | cs.NI | null | Most MANET (Mobile Ad hoc NETwork) research assumes idealized propagation
models. Experimental results have shown significant divergence from simulation
results due to the effect of signal fading in realistic wireless communication
channels. In this paper, we characterize the impact of fading on protocol
performance. We first study the effect of fading on MAC performance and show
that its effect can be dominating. One of our important conclusions is that
eliminating RTS/CTS packets results in more effective operation under fading.
We also identify an unfairness problem that arises due to backoffs in the
presence of fading. Moreover, fading results in several subtle interactions
between the MAC and routing layers. We identify several of these problems and
make observations about effective approaches for addressing them. For example,
the criteria for determining the best path should not only consider the link
status but also the link order. In addition, because routing protocols rely on
MAC level transmission failure (when the retry limit is exceeded), route
failure errors are often generated unnecessarily. Finally, because MAC level
broadcasts are unreliable, they are especially vulnerable to fading. We analyze
these effects and outline preliminary solutions to them.
| [
{
"version": "v1",
"created": "Fri, 1 Apr 2005 18:16:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Han",
"Seon-Yeong",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
]
|
cs/0504004 | Henning Bostelmann | Henning Bostelmann | Statistical analysis of quality measures for mobile ad hoc networks | Master's thesis; 78 pages, 10 figures | null | null | null | cs.NI cs.DM | null | How can the quality of a mobile ad hoc network (MANET) be quantified? This
work aims at an answer based on the lower network layers, i.e. on connectivity
between the wireless nodes, using statistical methods. A number of different
quality measures are introduced and classified according to their scaling
behaviour. They are analysed in a statistical model of a 1-dimensional MANET
system (corresponding e.g. to cars on a road). Neglecting boundary effects, the
model turns out to be exactly solvable, so that explicit analytical results for
the quality levels can be obtained both at fixed system size and in the limit
of large systems. In particular, this improves estimates known in the
literature for the probability of connectedness of 1-dimensional MANETs.
| [
{
"version": "v1",
"created": "Sat, 2 Apr 2005 23:19:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bostelmann",
"Henning",
""
]
]
|
cs/0504009 | Sanjeeva kumar Chandrasekaran | N. Srinivasan, C. Sanjeevakumar, L. Sudarsan, M. Kasi Rajan, R.
Venkatesh | Towards a Group Theoretic Quantum Encryption Scheme Based on Generalized
Hidden Subgroup Problem | 8 pages, work of undergraduate students | null | null | null | cs.DM cs.CR | null | This paper introduces a completely new approach to encryption based on group
theoretic quantum framework. Quantum cryptography has essentially focused only
on key distribution and proceeded with classical encryption algorithm with the
generated key. Here, we present a first step towards a quantum encryption
scheme based on the solution for the hidden subgroup problem. The shared secret
key K from QKD evolves as a generator for a subgroup H of a group G, in
combination of the plain text data modeled as group elements. The key K helps
in regeneration of the plain data on the receiver's side based on subgroup
reconstruction. This paper models all quantum computations using group
representations. A non-constructive proof is attempted towards the security of
the encryption scheme. We also address the issues involved in a such a venture
into the realms of Quantum data encryption.
| [
{
"version": "v1",
"created": "Mon, 4 Apr 2005 17:26:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Srinivasan",
"N.",
""
],
[
"Sanjeevakumar",
"C.",
""
],
[
"Sudarsan",
"L.",
""
],
[
"Rajan",
"M. Kasi",
""
],
[
"Venkatesh",
"R.",
""
]
]
|
cs/0504012 | Rodrigo Barra Almeida | Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A.
Bettencourt, Virgilio A. F. Almeida, Jussara M. Almeida | Improving Spam Detection Based on Structural Similarity | null | null | null | null | cs.CR | null | We propose a new detection algorithm that uses structural relationships
between senders and recipients of email as the basis for the identification of
spam messages. Users and receivers are represented as vectors in their
reciprocal spaces. A measure of similarity between vectors is constructed and
used to group users into clusters. Knowledge of their classification as past
senders/receivers of spam or legitimate mail, comming from an auxiliary
detection algorithm, is then used to label these clusters probabilistically.
This knowledge comes from an auxiliary algorithm. The measure of similarity
between the sender and receiver sets of a new message to the center vector of
clusters is then used to asses the possibility of that message being legitimate
or spam. We show that the proposed algorithm is able to correct part of the
false positives (legitimate messages classified as spam) using a testbed of one
week smtp log.
| [
{
"version": "v1",
"created": "Tue, 5 Apr 2005 14:30:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gomes",
"Luiz H.",
""
],
[
"Castro",
"Fernando D. O.",
""
],
[
"Almeida",
"Rodrigo B.",
""
],
[
"Bettencourt",
"Luis M. A.",
""
],
[
"Almeida",
"Virgilio A. F.",
""
],
[
"Almeida",
"Jussara M.",
""
]
]
|
cs/0504018 | Olivier Brunet | Olivier Brunet (Leibniz - IMAG) | A Rule-Based Logic for Quantum Information | null | null | null | null | cs.LO quant-ph | null | In the present article, we explore a new approach for the study of
orthomodular lattices, where we replace the problematic conjunction by a binary
operator, called the Sasaki projection. We present a characterization of
orthomodular lattices based on the use of an algebraic version of the Sasaki
projection operator (together with orthocomplementation) rather than on the
conjunction. We then define of a new logic, which we call Sasaki Orthologic,
which is closely related to quantum logic, and provide a rule-based definition
of this logic.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 08:11:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brunet",
"Olivier",
"",
"Leibniz - IMAG"
]
]
|
cs/0504019 | Guilin Wang | Guilin Wang, Feng Bao, Changshe Ma, and Kefei Chen | Efficient Authenticated Encryption Schemes with Public Verifiability | Early version appears in the Proc. of The 60th IEEE Vehicular
Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global
Security. IEEE, 2004 | null | null | null | cs.CR | null | An authenticated encryption scheme allows messages to be encrypted and
authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with
public verifiability. That is, in their scheme the receiver can efficiently
prove to a third party that a message is indeed originated from a specific
sender. In this paper, we first identify two security weaknesses in the Ma-Chen
authenticated encryption scheme. Then, based on the Schnorr signature, we
proposed an efficient and secure improved scheme such that all the desired
security requirements are satisfied.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 09:03:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Guilin",
""
],
[
"Bao",
"Feng",
""
],
[
"Ma",
"Changshe",
""
],
[
"Chen",
"Kefei",
""
]
]
|
cs/0504022 | Lillian Lee | Lillian Lee | A Matter of Opinion: Sentiment Analysis and Business Intelligence
(position paper) | 2 pages | Presented at the IBM Faculty Summit on the Architecture of
On-Demand Business, May 2004 | null | null | cs.CL | null | A general-audience introduction to the area of "sentiment analysis", the
computational treatment of subjective, opinion-oriented language (an example
application is determining whether a review is "thumbs up" or "thumbs down").
Some challenges, applications to business-intelligence tasks, and potential
future directions are described.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 20:04:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lee",
"Lillian",
""
]
]
|
cs/0504023 | Ioannis Giotis | Ioannis Giotis and Venkatesan Guruswami | Correlation Clustering with a Fixed Number of Clusters | 16 pages | null | null | null | cs.DS | null | We continue the investigation of problems concerning correlation clustering
or clustering with qualitative information, which is a clustering formulation
that has been studied recently. The basic setup here is that we are given as
input a complete graph on n nodes (which correspond to nodes to be clustered)
whose edges are labeled + (for similar pairs of items) and - (for dissimilar
pairs of items). Thus we have only as input qualitative information on
similarity and no quantitative distance measure between items. The quality of a
clustering is measured in terms of its number of agreements, which is simply
the number of edges it correctly classifies, that is the sum of number of -
edges whose endpoints it places in different clusters plus the number of +
edges both of whose endpoints it places within the same cluster.
In this paper, we study the problem of finding clusterings that maximize the
number of agreements, and the complementary minimization version where we seek
clusterings that minimize the number of disagreements. We focus on the
situation when the number of clusters is stipulated to be a small constant k.
Our main result is that for every k, there is a polynomial time approximation
scheme for both maximizing agreements and minimizing disagreements. (The
problems are NP-hard for every k >= 2.) The main technical work is for the
minimization version, as the PTAS for maximizing agreements follows along the
lines of the property tester for Max k-CUT.
In contrast, when the number of clusters is not specified, the problem of
minimizing disagreements was shown to be APX-hard, even though the maximization
version admits a PTAS.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 22:36:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giotis",
"Ioannis",
""
],
[
"Guruswami",
"Venkatesan",
""
]
]
|
cs/0504024 | Sebastian Brand | Krzysztof R. Apt, Sebastian Brand | Constraint-Based Qualitative Simulation | 10 pages, to appear at the conference TIME 2005 | null | null | null | cs.AI cs.LO | null | We consider qualitative simulation involving a finite set of qualitative
relations in presence of complete knowledge about their interrelationship. We
show how it can be naturally captured by means of constraints expressed in
temporal logic and constraint satisfaction problems. The constraints relate at
each stage the 'past' of a simulation with its 'future'. The benefit of this
approach is that it readily leads to an implementation based on constraint
technology that can be used to generate simulations and to answer queries about
them.
| [
{
"version": "v1",
"created": "Thu, 7 Apr 2005 12:06:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Brand",
"Sebastian",
""
]
]
|
cs/0504026 | Yongxi Cheng | Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin | Searching Monotone Multi-dimensional Arrays | 13 pages, 2 figures; same results, presentation improved, add two
figures | null | null | null | cs.DS cs.DM | null | In this paper we investigate the problem of searching monotone
multi-dimensional arrays. We generalize Linial and Saks' search algorithm
\cite{LS1} for monotone 3-dimensional arrays to $d$-dimensions with $d\geq 4$.
Our new search algorithm is asymptotically optimal for $d=4$.
| [
{
"version": "v1",
"created": "Thu, 7 Apr 2005 15:58:18 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Aug 2006 07:52:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cheng",
"Yongxi",
""
],
[
"Sun",
"Xiaoming",
""
],
[
"Yin",
"Yiqun Lisa",
""
]
]
|
cs/0504029 | Devavrat Shah | Damon Mosk-Aoyama and Devavrat Shah | Fast Distributed Algorithms for Computing Separable Functions | 15 pages | null | null | null | cs.NI cs.DC cs.DS | null | The problem of computing functions of values at the nodes in a network in a
totally distributed manner, where nodes do not have unique identities and make
decisions based only on local information, has applications in sensor,
peer-to-peer, and ad-hoc networks. The task of computing separable functions,
which can be written as linear combinations of functions of individual
variables, is studied in this context. Known iterative algorithms for averaging
can be used to compute the normalized values of such functions, but these
algorithms do not extend in general to the computation of the actual values of
separable functions.
The main contribution of this paper is the design of a distributed randomized
algorithm for computing separable functions. The running time of the algorithm
is shown to depend on the running time of a minimum computation algorithm used
as a subroutine. Using a randomized gossip mechanism for minimum computation as
the subroutine yields a complete totally distributed algorithm for computing
separable functions. For a class of graphs with small spectral gap, such as
grid graphs, the time used by the algorithm to compute averages is of a smaller
order than the time required by a known iterative averaging scheme.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2005 06:49:29 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Apr 2005 02:53:53 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Feb 2006 21:47:36 GMT"
},
{
"version": "v4",
"created": "Sun, 22 Apr 2007 23:19:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mosk-Aoyama",
"Damon",
""
],
[
"Shah",
"Devavrat",
""
]
]
|
cs/0504031 | Gilson Antonio Giraldi | Gilson Antonio Giraldi, Antonio Alberto Fernandes de Oliveira | Convexity Analysis of Snake Models Based on Hamiltonian Formulation | 17 pages, 3 figures, technical report | null | null | null | cs.CV cs.GR | null | This paper presents a convexity analysis for the dynamic snake model based on
the Potential Energy functional and the Hamiltonian formulation of the
classical mechanics. First we see the snake model as a dynamical system whose
singular points are the borders we seek. Next we show that a necessary
condition for a singular point to be an attractor is that the energy functional
is strictly convex in a neighborhood of it, that means, if the singular point
is a local minimum of the potential energy. As a consequence of this analysis,
a local expression relating the dynamic parameters and the rate of convergence
arises. Such results link the convexity analysis of the potential energy and
the dynamic snake model and point forward to the necessity of a physical
quantity whose convexity analysis is related to the dynamic and which
incorporate the velocity space. Such a quantity is exactly the (conservative)
Hamiltonian of the system.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2005 16:41:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson Antonio",
""
],
[
"de Oliveira",
"Antonio Alberto Fernandes",
""
]
]
|
cs/0504033 | Richard McClatchey | Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Atif Mehmood,
Richard McClatchey, Harvey Newman, Waqas ur Rehman, Conrad Steenberg, Michael
Thomas, Frank van Lingen, Ian Willers, Muhammad Adeel Zafar | Resource Management Services for a Grid Analysis Environment | 8 pages, 7 figures. Workshop on Web and Grid Services for Scientific
Data Analysis at the Int Conf on Parallel Processing (ICPP05). Norway June
2005 | null | null | null | cs.DC | null | Selecting optimal resources for submitting jobs on a computational Grid or
accessing data from a data grid is one of the most important tasks of any Grid
middleware. Most modern Grid software today satisfies this responsibility and
gives a best-effort performance to solve this problem. Almost all decisions
regarding scheduling and data access are made by the software automatically,
giving users little or no control over the entire process. To solve this
problem, a more interactive set of services and middleware is desired that
provides users more information about Grid weather, and gives them more control
over the decision making process. This paper presents a set of services that
have been developed to provide more interactive resource management
capabilities within the Grid Analysis Environment (GAE) being developed
collaboratively by Caltech, NUST and several other institutes. These include a
steering service, a job monitoring service and an estimator service that have
been designed and written using a common Grid-enabled Web Services framework
named Clarens. The paper also presents a performance analysis of the developed
services to show that they have indeed resulted in a more interactive and
powerful system for user-centric Grid-enabled physics analysis.
| [
{
"version": "v1",
"created": "Sun, 10 Apr 2005 11:59:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ali",
"Arshad",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Bunn",
"Julian",
""
],
[
"Mehmood",
"Atif",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Newman",
"Harvey",
""
],
[
"Rehman",
"Waqas ur",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"Thomas",
"Michael",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Willers",
"Ian",
""
],
[
"Zafar",
"Muhammad Adeel",
""
]
]
|
cs/0504034 | Richard McClatchey | Arshad Ali, Ashiq Anjum, Tahir Azim, Julian Bunn, Saima Iqbal, Richard
McClatchey, Harvey Newman, S. Yousaf Shah, Tony Solomonides, Conrad
Steenberg, Michael Thomas, Frank van Lingen, Ian Willers | Heterogeneous Relational Databases for a Grid-enabled Analysis
Environment | 8 pages, 6 figures, 1 table. Workshop on Web and Grid Services for
Scientific Data Analysis at the Int Conf on Parallel Processing (ICPP05).
Norway June 2005 | null | null | null | cs.DC | null | Grid based systems require a database access mechanism that can provide
seamless homogeneous access to the requested data through a virtual data access
system, i.e. a system which can take care of tracking the data that is stored
in geographically distributed heterogeneous databases. This system should
provide an integrated view of the data that is stored in the different
repositories by using a virtual data access mechanism, i.e. a mechanism which
can hide the heterogeneity of the backend databases from the client
applications. This paper focuses on accessing data stored in disparate
relational databases through a web service interface, and exploits the features
of a Data Warehouse and Data Marts. We present a middleware that enables
applications to access data stored in geographically distributed relational
databases without being aware of their physical locations and underlying
schema. A web service interface is provided to enable applications to access
this middleware in a language and platform independent way. A prototype
implementation was created based on Clarens [4], Unity [7] and POOL [8]. This
ability to access the data stored in the distributed relational databases
transparently is likely to be a very powerful one for Grid users, especially
the scientific community wishing to collate and analyze data distributed over
the Grid.
| [
{
"version": "v1",
"created": "Sun, 10 Apr 2005 12:05:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ali",
"Arshad",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Bunn",
"Julian",
""
],
[
"Iqbal",
"Saima",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Newman",
"Harvey",
""
],
[
"Shah",
"S. Yousaf",
""
],
[
"Solomonides",
"Tony",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"Thomas",
"Michael",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Willers",
"Ian",
""
]
]
|
cs/0504035 | Marcus Hutter | Shane Legg and Marcus Hutter | Fitness Uniform Deletion: A Simple Way to Preserve Diversity | 8 two-column pages, 19 figures | Proc. Genetic and Evolutionary Computation Conference (GECCO 2005)
1271-1278 | null | IDSIA-11-04 | cs.NE cs.AI | null | A commonly experienced problem with population based optimisation methods is
the gradual decline in population diversity that tends to occur over time. This
can slow a system's progress or even halt it completely if the population
converges on a local optimum from which it cannot escape. In this paper we
present the Fitness Uniform Deletion Scheme (FUDS), a simple but somewhat
unconventional approach to this problem. Under FUDS the deletion operation is
modified to only delete those individuals which are "common" in the sense that
there exist many other individuals of similar fitness in the population. This
makes it impossible for the population to collapse to a collection of highly
related individuals with similar fitness. Our experimental results on a range
of optimisation problems confirm this, in particular for deceptive optimisation
problems the performance is significantly more robust to variation in the
selection intensity.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 10:42:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
]
|
cs/0504036 | Richard Belew | Richard K. Belew | Scientific impact quantity and quality: Analysis of two sources of
bibliographic data | 12 pages, 1 table, 6 figures | null | null | null | cs.IR cs.DL | null | Attempts to understand the consequence of any individual scientist's activity
within the long-term trajectory of science is one of the most difficult
questions within the philosophy of science. Because scientific publications
play such as central role in the modern enterprise of science, bibliometric
techniques which measure the ``impact'' of an individual publication as a
function of the number of citations it receives from subsequent authors have
provided some of the most useful empirical data on this question. Until
recently, Thompson/ISI has provided the only source of large-scale ``inverted''
bibliographic data of the sort required for impact analysis. In the end of
2004, Google introduced a new service, GoogleScholar, making much of this same
data available. Here we analyze 203 publications, collectively cited by more
than 4000 other publications. We show surprisingly good agreement between data
citation counts provided by the two services. Data quality across the systems
is analyzed, and potentially useful complementarities between are considered.
The additional robustness offered by multiple sources of such data promises to
increase the utility of these measurements as open citation protocols and open
access increase their impact on electronic scientific publication practices.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 13:52:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Belew",
"Richard K.",
""
]
]
|
cs/0504037 | K. P.N. Murthy | K. P. N. Murthy, M. Janani and B. Shenbga Priya | Bayesian Restoration of Digital Images Employing Markov Chain Monte
Carlo a Review | 42 pages; 16 figures; revised version with several typos removed and
mistakes in equations corrected | null | null | null | cs.CV cond-mat.stat-mech physics.comp-ph | null | A review of Bayesian restoration of digital images based on Monte Carlo
techniques is presented. The topics covered include Likelihood, Prior and
Posterior distributions, Poisson, Binay symmetric channel, and Gaussian channel
models of Likelihood distribution,Ising and Potts spin models of Prior
distribution, restoration of an image through Posterior maximization,
statistical estimation of a true image from Posterior ensembles, Markov Chain
Monte Carlo methods and cluster algorithms.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 12:41:19 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 14:34:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murthy",
"K. P. N.",
""
],
[
"Janani",
"M.",
""
],
[
"Priya",
"B. Shenbga",
""
]
]
|
cs/0504039 | Andrey Grozin | A. G. Grozin | TeXmacs-maxima interface | html file, 32 png screenshots | null | null | null | cs.SC cs.MS hep-ph | null | This tutorial presents features of the new and improved TeXmacs-maxima
interface. It is designed for running maxima-5.9.2 from TeXmacs-1.0.5 (or
later).
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 16:39:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grozin",
"A. G.",
""
]
]
|
cs/0504040 | J?r?mie Leguay M. | Jeremie Leguay, Timur Friedman and Vania Conan | DTN Routing in a Mobility Pattern Space | 8 pages, preprint | null | null | null | cs.NI | null | Routing in Delay Tolerant Networks (DTNs) benefits considerably if one can
take advantage of knowledge concerning node mobility. The main contribution of
this paper is the definition of a generic routing scheme for DTNs using a
high-dimensional Euclidean space constructed upon nodes' mobility patterns. For
example, nodes are represented as points having as coordinates their
probability of being found in each possible location. We present simulation
results indicating that such a scheme can be beneficial in a scenario inspired
by studies done on real mobility traces. This work should open the way to
further use of the virtual space formalism in DTN routing.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:03:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leguay",
"Jeremie",
""
],
[
"Friedman",
"Timur",
""
],
[
"Conan",
"Vania",
""
]
]
|
cs/0504041 | Vitaly Schetinin | Vitaly Schetinin and Joachim Schult | Learning Polynomial Networks for Classification of Clinical
Electroencephalograms | null | J Soft Computing 2005 | null | null | cs.AI cs.NE | null | We describe a polynomial network technique developed for learning to classify
clinical electroencephalograms (EEGs) presented by noisy features. Using an
evolutionary strategy implemented within Group Method of Data Handling, we
learn classification models which are comprehensively described by sets of
short-term polynomials. The polynomial models were learnt to classify the EEGs
recorded from Alzheimer and healthy patients and recognize the EEG artifacts.
Comparing the performances of our technique and some machine learning methods
we conclude that our technique can learn well-suited polynomial models which
experts can find easy-to-understand.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:11:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
]
]
|
cs/0504042 | Vitaly Schetinin | V. Schetinin, J.E. Fieldsend, D. Partridge, W.J. Krzanowski, R.M.
Everson, T.C. Bailey, A. Hernandez | The Bayesian Decision Tree Technique with a Sweeping Strategy | null | null | null | null | cs.AI cs.LG | null | The uncertainty of classification outcomes is of crucial importance for many
safety critical applications including, for example, medical diagnostics. In
such applications the uncertainty of classification can be reliably estimated
within a Bayesian model averaging technique that allows the use of prior
information. Decision Tree (DT) classification models used within such a
technique gives experts additional information by making this classification
scheme observable. The use of the Markov Chain Monte Carlo (MCMC) methodology
of stochastic sampling makes the Bayesian DT technique feasible to perform.
However, in practice, the MCMC technique may become stuck in a particular DT
which is far away from a region with a maximal posterior. Sampling such DTs
causes bias in the posterior estimates, and as a result the evaluation of
classification uncertainty may be incorrect. In a particular case, the negative
effect of such sampling may be reduced by giving additional prior information
on the shape of DTs. In this paper we describe a new approach based on sweeping
the DTs without additional priors on the favorite shape of DTs. The
performances of Bayesian DT techniques with the standard and sweeping
strategies are compared on a synthetic data as well as on real datasets.
Quantitatively evaluating the uncertainty in terms of entropy of class
posterior probabilities, we found that the sweeping strategy is superior to the
standard strategy.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:45:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"V.",
""
],
[
"Fieldsend",
"J. E.",
""
],
[
"Partridge",
"D.",
""
],
[
"Krzanowski",
"W. J.",
""
],
[
"Everson",
"R. M.",
""
],
[
"Bailey",
"T. C.",
""
],
[
"Hernandez",
"A.",
""
]
]
|
cs/0504043 | Vitaly Schetinin | V. Schetinin, D. Partridge, W.J. Krzanowski, R.M. Everson, J.E.
Fieldsend, T.C. Bailey, and A. Hernandez | Experimental Comparison of Classification Uncertainty for Randomised and
Bayesian Decision Tree Ensembles | IDEAL-2004 | null | null | null | cs.AI cs.LG | null | In this paper we experimentally compare the classification uncertainty of the
randomised Decision Tree (DT) ensemble technique and the Bayesian DT technique
with a restarting strategy on a synthetic dataset as well as on some datasets
commonly used in the machine learning community. For quantitative evaluation of
classification uncertainty, we use an Uncertainty Envelope dealing with the
class posterior distribution and a given confidence probability. Counting the
classifier outcomes, this technique produces feasible evaluations of the
classification uncertainty. Using this technique in our experiments, we found
that the Bayesian DT technique is superior to the randomised DT ensemble
technique.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:53:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"V.",
""
],
[
"Partridge",
"D.",
""
],
[
"Krzanowski",
"W. J.",
""
],
[
"Everson",
"R. M.",
""
],
[
"Fieldsend",
"J. E.",
""
],
[
"Bailey",
"T. C.",
""
],
[
"Hernandez",
"A.",
""
]
]
|
cs/0504044 | Richard McClatchey | Michael Thomas, Conrad Steenberg, Frank van Lingen, Harvey Newman,
Julian Bunn, Arshad Ali, Richard McClatchey, Ashiq Anjum, Tahir Azim, Waqas
ur Rehman, Faisal Khan, Jang Uk In | JClarens: A Java Framework for Developing and Deploying Web Services for
Grid Computing | 8 pages, 4 figures. Paper at the 3rd IEEE International Conference on
Web Services (ICWS05). Florida, USA. July 2005 | null | null | null | cs.DC | null | High Energy Physics (HEP) and other scientific communities have adopted
Service Oriented Architectures (SOA) as part of a larger Grid computing effort.
This effort involves the integration of many legacy applications and
programming libraries into a SOA framework. The Grid Analysis Environment (GAE)
is such a service oriented architecture based on the Clarens Grid Services
Framework and is being developed as part of the Compact Muon Solenoid (CMS)
experiment at the Large Hadron Collider (LHC) at European Laboratory for
Particle Physics (CERN). Clarens provides a set of authorization, access
control, and discovery services, as well as XMLRPC and SOAP access to all
deployed services. Two implementations of the Clarens Web Services Framework
(Python and Java) offer integration possibilities for a wide range of
programming languages. This paper describes the Java implementation of the
Clarens Web Services Framework called JClarens. and several web services of
interest to the scientific and Grid community that have been deployed using
JClarens.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 21:45:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thomas",
"Michael",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Newman",
"Harvey",
""
],
[
"Bunn",
"Julian",
""
],
[
"Ali",
"Arshad",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Rehman",
"Waqas ur",
""
],
[
"Khan",
"Faisal",
""
],
[
"In",
"Jang Uk",
""
]
]
|
cs/0504048 | Scott Aaronson | Scott Aaronson | Oracles Are Subtle But Not Malicious | 20 pages, 1 figure | null | null | null | cs.CC quant-ph | null | Theoretical computer scientists have been debating the role of oracles since
the 1970's. This paper illustrates both that oracles can give us nontrivial
insights about the barrier problems in circuit complexity, and that they need
not prevent us from trying to solve those problems.
First, we give an oracle relative to which PP has linear-sized circuits, by
proving a new lower bound for perceptrons and low- degree threshold
polynomials. This oracle settles a longstanding open question, and generalizes
earlier results due to Beigel and to Buhrman, Fortnow, and Thierauf. More
importantly, it implies the first nonrelativizing separation of "traditional"
complexity classes, as opposed to interactive proof classes such as MIP and
MA-EXP. For Vinodchandran showed, by a nonrelativizing argument, that PP does
not have circuits of size n^k for any fixed k. We present an alternative proof
of this fact, which shows that PP does not even have quantum circuits of size
n^k with quantum advice. To our knowledge, this is the first nontrivial lower
bound on quantum circuit size.
Second, we study a beautiful algorithm of Bshouty et al. for learning Boolean
circuits in ZPP^NP. We show that the NP queries in this algorithm cannot be
parallelized by any relativizing technique, by giving an oracle relative to
which ZPP^||NP and even BPP^||NP have linear-size circuits. On the other hand,
we also show that the NP queries could be parallelized if P=NP. Thus, classes
such as ZPP^||NP inhabit a "twilight zone," where we need to distinguish
between relativizing and black-box techniques. Our results on this subject have
implications for computational learning theory as well as for the circuit
minimization problem.
| [
{
"version": "v1",
"created": "Tue, 12 Apr 2005 22:57:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aaronson",
"Scott",
""
]
]
|
cs/0504050 | Ivan Lanese | Ivan Lanese and Ugo Montanari | Mapping Fusion and Synchronized Hyperedge Replacement into Logic
Programming | 44 pages, 8 figures, to appear in a special issue of Theory and
Practice of Logic Programming, minor revision | null | null | null | cs.LO cs.PL | null | In this paper we compare three different formalisms that can be used in the
area of models for distributed, concurrent and mobile systems. In particular we
analyze the relationships between a process calculus, the Fusion Calculus,
graph transformations in the Synchronized Hyperedge Replacement with Hoare
synchronization (HSHR) approach and logic programming. We present a translation
from Fusion Calculus into HSHR (whereas Fusion Calculus uses Milner
synchronization) and prove a correspondence between the reduction semantics of
Fusion Calculus and HSHR transitions. We also present a mapping from HSHR into
a transactional version of logic programming and prove that there is a full
correspondence between the two formalisms. The resulting mapping from Fusion
Calculus to logic programming is interesting since it shows the tight analogies
between the two formalisms, in particular for handling name generation and
mobility. The intermediate step in terms of HSHR is convenient since graph
transformations allow for multiple, remote synchronizations, as required by
Fusion Calculus semantics.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:40:28 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jan 2006 09:55:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lanese",
"Ivan",
""
],
[
"Montanari",
"Ugo",
""
]
]
|
cs/0504051 | Tassos Argyros | Tassos S. Argyros and David R. Cheriton | A Scalable Stream-Oriented Framework for Cluster Applications | null | null | null | null | cs.DC cs.DB cs.NI cs.OS cs.PL | null | This paper presents a stream-oriented architecture for structuring cluster
applications. Clusters that run applications based on this architecture can
scale to tenths of thousands of nodes with significantly less performance loss
or reliability problems. Our architecture exploits the stream nature of the
data flow and reduces congestion through load balancing, hides latency behind
data pushes and transparently handles node failures. In our ongoing work, we
are developing an implementation for this architecture and we are able to run
simple data mining applications on a cluster simulator.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 16:37:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argyros",
"Tassos S.",
""
],
[
"Cheriton",
"David R.",
""
]
]
|
cs/0504053 | Vitaly Schetinin | V.V.Zharkova and V.Schetinin | A Neural-Network Technique for Recognition of Filaments in Solar Images | null | null | null | null | cs.NE | null | We describe a new neural-network technique developed for an automated
recognition of solar filaments visible in the hydrogen H-alpha line full disk
spectroheliograms. This technique allows neural networks learn from a few image
fragments labelled manually to recognize the single filaments depicted on a
local background. The trained network is able to recognize filaments depicted
on the backgrounds with variations in brightness caused by atmospherics
distortions. Despite the difference in backgrounds in our experiments the
neural network has properly recognized filaments in the testing image
fragments. Using a parabolic activation function we extend this technique to
recognize multiple solar filaments which may appear in one fragment.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:28:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zharkova",
"V. V.",
""
],
[
"Schetinin",
"V.",
""
]
]
|
cs/0504054 | Vitaly Schetinin | Vitaly Schetinin | Learning from Web: Review of Approaches | null | null | null | null | cs.NE cs.LG | null | Knowledge discovery is defined as non-trivial extraction of implicit,
previously unknown and potentially useful information from given data.
Knowledge extraction from web documents deals with unstructured, free-format
documents whose number is enormous and rapidly growing. The artificial neural
networks are well suitable to solve a problem of knowledge discovery from web
documents because trained networks are able more accurately and easily to
classify the learning and testing examples those represent the text mining
domain. However, the neural networks that consist of large number of weighted
connections and activation units often generate the incomprehensible and
hard-to-understand models of text classification. This problem may be also
addressed to most powerful recurrent neural networks that employ the feedback
links from hidden or output units to their input units. Due to feedback links,
recurrent neural networks are able take into account of a context in document.
To be useful for data mining, self-organizing neural network techniques of
knowledge extraction have been explored and developed. Self-organization
principles were used to create an adequate neural-network structure and reduce
a dimensionality of features used to describe text documents. The use of these
principles seems interesting because ones are able to reduce a neural-network
redundancy and considerably facilitate the knowledge representation.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:40:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
]
]
|
cs/0504055 | Vitaly Schetinin | Vitaly Schetinin | A Learning Algorithm for Evolving Cascade Neural Networks | null | Neural Processing Letter 17:21-31, 2003. Kluwer | null | null | cs.NE cs.AI | null | A new learning algorithm for Evolving Cascade Neural Networks (ECNNs) is
described. An ECNN starts to learn with one input node and then adding new
inputs as well as new hidden neurons evolves it. The trained ECNN has a nearly
minimal number of input and hidden neurons as well as connections. The
algorithm was successfully applied to classify artifacts and normal segments in
clinical electroencephalograms (EEGs). The EEG segments were visually labeled
by EEG-viewer. The trained ECNN has correctly classified 96.69% of the testing
segments. It is slightly better than a standard fully connected neural network.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:57:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
]
]
|
cs/0504056 | Vitaly Schetinin | V. Schetinin | Self-Organizing Multilayered Neural Networks of Optimal Complexity | null | null | null | null | cs.NE cs.AI | null | The principles of self-organizing the neural networks of optimal complexity
is considered under the unrepresentative learning set. The method of
self-organizing the multi-layered neural networks is offered and used to train
the logical neural networks which were applied to the medical diagnostics.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 13:59:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"V.",
""
]
]
|
cs/0504057 | Vitaly Schetinin | Vitaly Schetinin and Anatoly Brazhnikov | Diagnostic Rule Extraction Using Neural Networks | null | null | null | null | cs.NE cs.AI | null | The neural networks have trained on incomplete sets that a doctor could
collect. Trained neural networks have correctly classified all the presented
instances. The number of intervals entered for encoding the quantitative
variables is equal two. The number of features as well as the number of neurons
and layers in trained neural networks was minimal. Trained neural networks are
adequately represented as a set of logical formulas that more comprehensible
and easy-to-understand. These formulas are as the syndrome-complexes, which may
be easily tabulated and represented as a diagnostic table that the doctors
usually use. Decision rules provide the evaluations of their confidence in
which interested a doctor. Conducted clinical researches have shown that
iagnostic decisions produced by symbolic rules have coincided with the doctor's
conclusions.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:03:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Brazhnikov",
"Anatoly",
""
]
]
|
cs/0504058 | Vitaly Schetinin | Vitaly Schetinin | Polynomial Neural Networks Learnt to Classify EEG Signals | null | null | null | null | cs.NE cs.AI | null | A neural network based technique is presented, which is able to successfully
extract polynomial classification rules from labeled electroencephalogram (EEG)
signals. To represent the classification rules in an analytical form, we use
the polynomial neural networks trained by a modified Group Method of Data
Handling (GMDH). The classification rules were extracted from clinical EEG data
that were recorded from an Alzheimer patient and the sudden death risk
patients. The third data is EEG recordings that include the normal and artifact
segments. These EEG data were visually identified by medical experts. The
extracted polynomial rules verified on the testing EEG data allow to correctly
classify 72% of the risk group patients and 96.5% of the segments. These rules
performs slightly better than standard feedforward neural networks.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:06:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
]
]
|
cs/0504059 | Vitaly Schetinin | Vitaly Schetinin | A Neural Network Decision Tree for Learning Concepts from EEG Data | null | null | null | null | cs.NE cs.AI | null | To learn the multi-class conceptions from the electroencephalogram (EEG) data
we developed a neural network decision tree (DT), that performs the linear
tests, and a new training algorithm. We found that the known methods fail
inducting the classification models when the data are presented by the features
some of them are irrelevant, and the classes are heavily overlapped. To train
the DT, our algorithm exploits a bottom up search of the features that provide
the best classification accuracy of the linear tests. We applied the developed
algorithm to induce the DT from the large EEG dataset consisted of 65 patients
belonging to 16 age groups. In these recordings each EEG segment was
represented by 72 calculated features. The DT correctly classified 80.8% of the
training and 80.1% of the testing examples. Correspondingly it correctly
classified 89.2% and 87.7% of the EEG recordings.
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 14:28:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
]
]
|
cs/0504061 | Stergos Afantenos | Stergos D. Afantenos, Vangelis Karkaletsis, Panagiotis Stamatopoulos | Summarization from Medical Documents: A Survey | 21 pages, 4 tables | Artificial Intelligence in Medicine, Volume 33, Issue 2, February
2005, Pages 157-177 | 10.1016/j.artmed.2004.07.017 | null | cs.CL cs.IR | null | Objective:
The aim of this paper is to survey the recent work in medical documents
summarization.
Background:
During the last decade, documents summarization got increasing attention by
the AI research community. More recently it also attracted the interest of the
medical research community as well, due to the enormous growth of information
that is available to the physicians and researchers in medicine, through the
large and growing number of published journals, conference proceedings, medical
sites and portals on the World Wide Web, electronic medical records, etc.
Methodology:
This survey gives first a general background on documents summarization,
presenting the factors that summarization depends upon, discussing evaluation
issues and describing briefly the various types of summarization techniques. It
then examines the characteristics of the medical domain through the different
types of medical documents. Finally, it presents and discusses the
summarization techniques used so far in the medical domain, referring to the
corresponding systems and their characteristics.
Discussion and conclusions:
The paper discusses thoroughly the promising paths for future research in
medical documents summarization. It mainly focuses on the issue of scaling to
large collections of documents in various languages and from different media,
on personalization issues, on portability to new sub-domains, and on the
integration of summarization technology in practical applications
| [
{
"version": "v1",
"created": "Wed, 13 Apr 2005 20:02:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Stamatopoulos",
"Panagiotis",
""
]
]
|
cs/0504062 | Elchanan Mossel | Irit Dinur and Elchanan Mossel and Oded Regev | Conditional Hardness for Approximate Coloring | null | null | null | null | cs.CC math.PR | null | We study the coloring problem: Given a graph G, decide whether $c(G) \leq q$
or $c(G) \ge Q$, where c(G) is the chromatic number of G. We derive conditional
hardness for this problem for any constant $3 \le q < Q$. For $q\ge 4$, our
result is based on Khot's 2-to-1 conjecture [Khot'02]. For $q=3$, we base our
hardness result on a certain `fish shaped' variant of his conjecture.
We also prove that the problem almost coloring is hard for any constant
$\eps>0$, assuming Khot's Unique Games conjecture. This is the problem of
deciding for a given graph, between the case where one can 3-color all but a
$\eps$ fraction of the vertices without monochromatic edges, and the case where
the graph contains no independent set of relative size at least $\eps$.
Our result is based on bounding various generalized noise-stability
quantities using the invariance principle of Mossel et al [MOO'05].
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 00:43:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dinur",
"Irit",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Regev",
"Oded",
""
]
]
|
cs/0504063 | Zsolt Palotai | Zs. Palotai, Cs. Farkas, A. Lorincz | Selection in Scale-Free Small World | 24 pages, 3 figures | null | null | null | cs.LG cs.IR | null | In this paper we compare the performance characteristics of our selection
based learning algorithm for Web crawlers with the characteristics of the
reinforcement learning algorithm. The task of the crawlers is to find new
information on the Web. The selection algorithm, called weblog update, modifies
the starting URL lists of our crawlers based on the found URLs containing new
information. The reinforcement learning algorithm modifies the URL orderings of
the crawlers based on the received reinforcements for submitted documents. We
performed simulations based on data collected from the Web. The collected
portion of the Web is typical and exhibits scale-free small world (SFSW)
structure. We have found that on this SFSW, the weblog update algorithm
performs better than the reinforcement learning algorithm. It finds the new
information faster than the reinforcement learning algorithm and has better new
information/all submitted documents ratio. We believe that the advantages of
the selection algorithm over reinforcement learning algorithm is due to the
small world property of the Web.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 07:57:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Palotai",
"Zs.",
""
],
[
"Farkas",
"Cs.",
""
],
[
"Lorincz",
"A.",
""
]
]
|
cs/0504064 | Vitaly Schetinin | Vitaly Schetinin, Joachim Schult and Anatoly Brazhnikov | Neural-Network Techniques for Visual Mining Clinical
Electroencephalograms | null | null | null | null | cs.AI | null | In this chapter we describe new neural-network techniques developed for
visual mining clinical electroencephalograms (EEGs), the weak electrical
potentials invoked by brain activity. These techniques exploit fruitful ideas
of Group Method of Data Handling (GMDH). Section 2 briefly describes the
standard neural-network techniques which are able to learn well-suited
classification modes from data presented by relevant features. Section 3
introduces an evolving cascade neural network technique which adds new input
nodes as well as new neurons to the network while the training error decreases.
This algorithm is applied to recognize artifacts in the clinical EEGs. Section
4 presents the GMDH-type polynomial networks learnt from data. We applied this
technique to distinguish the EEGs recorded from an Alzheimer and a healthy
patient as well as recognize EEG artifacts. Section 5 describes the new
neural-network technique developed to induce multi-class concepts from data. We
used this technique for inducing a 16-class concept from the large-scale
clinical EEG data. Finally we discuss perspectives of applying the
neural-network techniques to clinical EEGs.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:27:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
],
[
"Brazhnikov",
"Anatoly",
""
]
]
|
cs/0504065 | Vitaly Schetinin | Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J.
Krzanowski, Richard M. Everson, Trevor C. Bailey and Adolfo Hernandez | Estimating Classification Uncertainty of Bayesian Decision Tree
Technique on Financial Data | null | null | null | null | cs.AI | null | Bayesian averaging over classification models allows the uncertainty of
classification outcomes to be evaluated, which is of crucial importance for
making reliable decisions in applications such as financial in which risks have
to be estimated. The uncertainty of classification is determined by a trade-off
between the amount of data available for training, the diversity of a
classifier ensemble and the required performance. The interpretability of
classification models can also give useful information for experts responsible
for making reliable classifications. For this reason Decision Trees (DTs) seem
to be attractive classification models. The required diversity of the DT
ensemble can be achieved by using the Bayesian model averaging all possible
DTs. In practice, the Bayesian approach can be implemented on the base of a
Markov Chain Monte Carlo (MCMC) technique of random sampling from the posterior
distribution. For sampling large DTs, the MCMC method is extended by Reversible
Jump technique which allows inducing DTs under given priors. For the case when
the prior information on the DT size is unavailable, the sweeping technique
defining the prior implicitly reveals a better performance. Within this Chapter
we explore the classification uncertainty of the Bayesian MCMC techniques on
some datasets from the StatLog Repository and real financial data. The
classification uncertainty is compared within an Uncertainty Envelope technique
dealing with the class posterior distribution and a given confidence
probability. This technique provides realistic estimates of the classification
uncertainty which can be easily interpreted in statistical terms with the aim
of risk evaluation.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:30:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Fieldsend",
"Jonathan E.",
""
],
[
"Partridge",
"Derek",
""
],
[
"Krzanowski",
"Wojtek J.",
""
],
[
"Everson",
"Richard M.",
""
],
[
"Bailey",
"Trevor C.",
""
],
[
"Hernandez",
"Adolfo",
""
]
]
|
cs/0504066 | Vitaly Schetinin | Vitaly Schetinin, Jonathan E. Fieldsend, Derek Partridge, Wojtek J.
Krzanowski, Richard M. Everson, Trevor C. Bailey, and Adolfo Hernandez | Comparison of the Bayesian and Randomised Decision Tree Ensembles within
an Uncertainty Envelope Technique | null | Journal of Mathematical Modelling and Algorithms, 2005 | null | null | cs.AI | null | Multiple Classifier Systems (MCSs) allow evaluation of the uncertainty of
classification outcomes that is of crucial importance for safety critical
applications. The uncertainty of classification is determined by a trade-off
between the amount of data available for training, the classifier diversity and
the required performance. The interpretability of MCSs can also give useful
information for experts responsible for making reliable classifications. For
this reason Decision Trees (DTs) seem to be attractive classification models
for experts. The required diversity of MCSs exploiting such classification
models can be achieved by using two techniques, the Bayesian model averaging
and the randomised DT ensemble. Both techniques have revealed promising results
when applied to real-world problems. In this paper we experimentally compare
the classification uncertainty of the Bayesian model averaging with a
restarting strategy and the randomised DT ensemble on a synthetic dataset and
some domain problems commonly used in the machine learning community. To make
the Bayesian DT averaging feasible, we use a Markov Chain Monte Carlo
technique. The classification uncertainty is evaluated within an Uncertainty
Envelope technique dealing with the class posterior distribution and a given
confidence probability. Exploring a full posterior distribution, this technique
produces realistic estimates which can be easily interpreted in statistical
terms. In our experiments we found out that the Bayesian DTs are superior to
the randomised DT ensembles within the Uncertainty Envelope technique.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:33:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Fieldsend",
"Jonathan E.",
""
],
[
"Partridge",
"Derek",
""
],
[
"Krzanowski",
"Wojtek J.",
""
],
[
"Everson",
"Richard M.",
""
],
[
"Bailey",
"Trevor C.",
""
],
[
"Hernandez",
"Adolfo",
""
]
]
|
cs/0504067 | Vitaly Schetinin | Vitaly Schetinin | An Evolving Cascade Neural Network Technique for Cleaning Sleep
Electroencephalograms | null | Natural Computing Application, 2005 | null | null | cs.NE cs.AI | null | Evolving Cascade Neural Networks (ECNNs) and a new training algorithm capable
of selecting informative features are described. The ECNN initially learns with
one input node and then evolves by adding new inputs as well as new hidden
neurons. The resultant ECNN has a near minimal number of hidden neurons and
inputs. The algorithm is successfully used for training ECNN to recognise
artefacts in sleep electroencephalograms (EEGs) which were visually labelled by
EEG-viewers. In our experiments, the ECNN outperforms the standard
neural-network as well as evolutionary techniques.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:36:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
]
]
|
cs/0504068 | Vitaly Schetinin | V. Schetinin and A. Kostunin | Self-Organization of the Neuron Collective of Optimal Complexity | NOLTA-1996, Japan | null | null | null | cs.NE cs.AI | null | The optimal complexity of neural networks is achieved when the
self-organization principles is used to eliminate the contradictions existing
in accordance with the K. Godel theorem about incompleteness of the systems
based on axiomatics. The principle of S. Beer exterior addition the Heuristic
Group Method of Data Handling by A. Ivakhnenko realized is used.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:45:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"V.",
""
],
[
"Kostunin",
"A.",
""
]
]
|
cs/0504069 | Vitaly Schetinin | Vitaly Schetinin and Joachim Schult | A Neural-Network Technique to Learn Concepts from Electroencephalograms | null | null | null | Theory in Biosciences, 2005 | cs.NE cs.AI cs.LG | null | A new technique is presented developed to learn multi-class concepts from
clinical electroencephalograms. A desired concept is represented as a neuronal
computational model consisting of the input, hidden, and output neurons. In
this model the hidden neurons learn independently to classify the
electroencephalogram segments presented by spectral and statistical features.
This technique has been applied to the electroencephalogram data recorded from
65 sleeping healthy newborns in order to learn a brain maturation concept of
newborns aged between 35 and 51 weeks. The 39399 and 19670 segments from these
data have been used for learning and testing the concept, respectively. As a
result, the concept has correctly classified 80.1% of the testing segments or
87.7% of the 65 records.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:47:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
]
]
|
cs/0504070 | Vitaly Schetinin | Vitaly Schetinin and Joachim Schult | The Combined Technique for Detection of Artifacts in Clinical
Electroencephalograms of Sleeping Newborns | null | null | null | null | cs.NE cs.AI cs.LG | null | In this paper we describe a new method combining the polynomial neural
network and decision tree techniques in order to derive comprehensible
classification rules from clinical electroencephalograms (EEGs) recorded from
sleeping newborns. These EEGs are heavily corrupted by cardiac, eye movement,
muscle and noise artifacts and as a consequence some EEG features are
irrelevant to classification problems. Combining the polynomial network and
decision tree techniques, we discover comprehensible classification rules
whilst also attempting to keep their classification error down. This technique
is shown to outperform a number of commonly used machine learning technique
applied to automatically recognize artifacts in the sleep EEGs.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 10:49:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schetinin",
"Vitaly",
""
],
[
"Schult",
"Joachim",
""
]
]
|
cs/0504071 | Byeong Kang Dr | Byeong Ho Kang, Achim Hoffmann, Takahira Yamaguchi, Wai Kiang Yeap | Proceedings of the Pacific Knowledge Acquisition Workshop 2004 | null | null | null | null | cs.AI | null | Artificial intelligence (AI) research has evolved over the last few decades
and knowledge acquisition research is at the core of AI research. PKAW-04 is
one of three international knowledge acquisition workshops held in the
Pacific-Rim, Canada and Europe over the last two decades. PKAW-04 has a strong
emphasis on incremental knowledge acquisition, machine learning, neural nets
and active mining.
The proceedings contain 19 papers that were selected by the program committee
among 24 submitted papers. All papers were peer reviewed by at least two
reviewers. The papers in these proceedings cover the methods and tools as well
as the applications related to develop expert systems or knowledge based
systems.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 13:14:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kang",
"Byeong Ho",
""
],
[
"Hoffmann",
"Achim",
""
],
[
"Yamaguchi",
"Takahira",
""
],
[
"Yeap",
"Wai Kiang",
""
]
]
|
cs/0504072 | Marc Barthelemy | Marc Barthelemy, Edmond Chow, and Tina Eliassi-Rad | Knowledge Representation Issues in Semantic Graphs for Relationship
Detection | 9 pages, 2 tables, 7 figures | Papers from the 2005 AAAI Spring Symposium, AAAI Press, 2005, pp.
91-98 | null | null | cs.AI physics.soc-ph | null | An important task for Homeland Security is the prediction of threat
vulnerabilities, such as through the detection of relationships between
seemingly disjoint entities. A structure used for this task is a "semantic
graph", also known as a "relational data graph" or an "attributed relational
graph". These graphs encode relationships as "typed" links between a pair of
"typed" nodes. Indeed, semantic graphs are very similar to semantic networks
used in AI. The node and link types are related through an ontology graph (also
known as a schema). Furthermore, each node has a set of attributes associated
with it (e.g., "age" may be an attribute of a node of type "person").
Unfortunately, the selection of types and attributes for both nodes and links
depends on human expertise and is somewhat subjective and even arbitrary. This
subjectiveness introduces biases into any algorithm that operates on semantic
graphs. Here, we raise some knowledge representation issues for semantic graphs
and provide some possible solutions using recently developed ideas in the field
of complex networks. In particular, we use the concept of transitivity to
evaluate the relevance of individual links in the semantic graph for detecting
relationships. We also propose new statistical measures for semantic graphs and
illustrate these semantic measures on graphs constructed from movies and
terrorism data.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2005 20:15:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barthelemy",
"Marc",
""
],
[
"Chow",
"Edmond",
""
],
[
"Eliassi-Rad",
"Tina",
""
]
]
|
cs/0504073 | Karim Seada | Karim Seada, Ahmed Helmy | Rendezvous Regions: A Scalable Architecture for Resource Discovery and
Service Location in Large-Scale Mobile Networks | null | null | null | null | cs.NI | null | In large-scale wireless networks such as mobile ad hoc and sensor networks,
efficient and robust service discovery and data-access mechanisms are both
essential and challenging. Rendezvous-based mechanisms provide a valuable
solution for provisioning a wide range of services. In this paper, we describe
Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for
wireless networks. RR is a general architecture proposed for service location
and bootstrapping in ad hoc networks, in addition to data-centric storage,
configuration, and task assignment in sensor networks. In RR the network
topology is divided into geographical regions, where each region is responsible
for a set of keys representing the services or data of interest. Each key is
mapped to a region based on a hash-table-like mapping scheme. A few elected
nodes inside each region are responsible for maintaining the mapped
information. The service or data provider stores the information in the
corresponding region and the seekers retrieve it from there. We run extensive
detailed simulations, and high-level simulations and analysis, to investigate
the design space, and study the architecture in various environments including
node mobility and failures. We evaluate it against other approaches to identify
its merits and limitations. The results show high success rate and low overhead
even with dynamics. RR scales to large number of nodes and is highly robust and
efficient to node failures. It is also robust to node mobility and location
inaccuracy with a significant advantage over point-based rendezvous mechanisms.
| [
{
"version": "v1",
"created": "Fri, 15 Apr 2005 03:01:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Seada",
"Karim",
""
],
[
"Helmy",
"Ahmed",
""
]
]
|
cs/0504074 | Carlos Rodriguez | Carlos Rodriguez | Metalinguistic Information Extraction for Terminology | Presented at CompuTerm 2004, COLING. Geneve | null | null | null | cs.CL cs.AI cs.IR | null | This paper describes and evaluates the Metalinguistic Operation Processor
(MOP) system for automatic compilation of metalinguistic information from
technical and scientific documents. This system is designed to extract
non-standard terminological resources that we have called Metalinguistic
Information Databases (or MIDs), in order to help update changing glossaries,
knowledge bases and ontologies, as well as to reflect the metastable dynamics
of special-domain knowledge.
| [
{
"version": "v1",
"created": "Fri, 15 Apr 2005 20:10:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Carlos",
""
]
]
|
cs/0504075 | Lane A. Hemaspaandra | Edith Hemaspaandra and Lane A. Hemaspaandra | Dichotomy for Voting Systems | null | null | null | URCS-TR-2005-861 | cs.GT cs.CC cs.MA | null | Scoring protocols are a broad class of voting systems. Each is defined by a
vector $(\alpha_1,\alpha_2,...,\alpha_m)$, $\alpha_1 \geq \alpha_2 \geq >...
\geq \alpha_m$, of integers such that each voter contributes $\alpha_1$ points
to his/her first choice, $\alpha_2$ points to his/her second choice, and so on,
and any candidate receiving the most points is a winner.
What is it about scoring-protocol election systems that makes some have the
desirable property of being NP-complete to manipulate, while others can be
manipulated in polynomial time? We find the complete, dichotomizing answer:
Diversity of dislike. Every scoring-protocol election system having two or more
point values assigned to candidates other than the favorite--i.e., having
$||\{\alpha_i \condition 2 \leq i \leq m\}||\geq 2$--is NP-complete to
manipulate. Every other scoring-protocol election system can be manipulated in
polynomial time. In effect, we show that--other than trivial systems (where all
candidates alway tie), plurality voting, and plurality voting's transparently
disguised translations--\emph{every} scoring-protocol election system is
NP-complete to manipulate.
| [
{
"version": "v1",
"created": "Fri, 15 Apr 2005 22:11:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
]
|
cs/0504076 | Manoj Kumar | Manoj Kumar | An Improved Remote User Authentication Scheme Using Smart Cards | 16 pages, no figures | null | null | null | cs.CR | null | In 2000, Hwang and Li proposed a new remote user authentication scheme using
smart cards. In the same year, Chan and Cheng pointed out that Hwang and
Li’s scheme is not secure against the masquerade attack. Further, in
2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and
Li’s scheme and presented a modified scheme to remove its security
pitfalls. This paper presents an improved scheme which is secure against
Chan-Cheng and all the extended attacks.
| [
{
"version": "v1",
"created": "Sat, 16 Apr 2005 11:56:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
|
cs/0504077 | Manoj Kumar | Manoj Kumar | The Modified Scheme is still vulnerable to the parallel Session Attack | 12 pages, no figures | null | null | null | cs.CR | null | In 2002, Chien–Jan–Tseng introduced an efficient remote user
authentication scheme using smart cards. Further, in 2004, W. C. Ku and S. M.
Chen proposed an efficient remote user authentication scheme using smart cards
to solve the security problems of Chien et al.’s scheme. Recently, Hsu
and Yoon et al. pointed out the security weakness of the Ku and Chen’s
scheme Furthermore, Yoon et al. modified the password change phase of Ku and
Chen’s scheme and they also proposed a new efficient remote user
authentication scheme using smart cards. This paper analyzes that the modified
scheme of Yoon et al. still vulnerable to parallel session attack.
| [
{
"version": "v1",
"created": "Sat, 16 Apr 2005 12:17:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
|
cs/0504078 | Marcus Hutter | Marcus Hutter and Jan Poland | Adaptive Online Prediction by Following the Perturbed Leader | 25 pages | Journal of Machine Learning Research 6 (2005) 639--660 | null | IDSIA-10-05 | cs.AI cs.LG | null | When applying aggregating strategies to Prediction with Expert Advice, the
learning rate must be adaptively tuned. The natural choice of
sqrt(complexity/current loss) renders the analysis of Weighted Majority
derivatives quite complicated. In particular, for arbitrary weights there have
been no results proven so far. The analysis of the alternative "Follow the
Perturbed Leader" (FPL) algorithm from Kalai & Vempala (2003) (based on
Hannan's algorithm) is easier. We derive loss bounds for adaptive learning rate
and both finite expert classes with uniform weights and countable expert
classes with arbitrary weights. For the former setup, our loss bounds match the
best known results so far, while for the latter our results are new.
| [
{
"version": "v1",
"created": "Sat, 16 Apr 2005 16:48:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
],
[
"Poland",
"Jan",
""
]
]
|
cs/0504083 | Weiming Zhang | Zhang Weiming and Li Shiqu | On the Unicity Distance of Stego Key | 8 pages, 3 figures | null | null | null | cs.CR | null | Steganography is about how to send secret message covertly. And the purpose
of steganalysis is to not only detect the existence of the hidden message but
also extract it. So far there have been many reliable detecting methods on
various steganographic algorithms, while there are few approaches that can
extract the hidden information. In this paper, the difficulty of extracting
hidden information, which is essentially a kind of privacy, is analyzed with
information-theoretic method in the terms of unicity distance of steganographic
key (abbreviated stego key). A lower bound for the unicity distance is
obtained, which shows the relations between key rate, message rate, hiding
capacity and difficulty of extraction. Furthermore the extracting attack to
steganography is viewed as a special kind of cryptanalysis, and an effective
method on recovering the stego key of popular LSB replacing steganography in
spatial images is presented by combining the detecting technique of
steganalysis and correlation attack of cryptanalysis together. The analysis for
this method and experimental results on steganographic software ``Hide and Seek
4.1" are both accordant with the information-theoretic conclusion.
| [
{
"version": "v1",
"created": "Mon, 18 Apr 2005 13:45:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Weiming",
"Zhang",
""
],
[
"Shiqu",
"Li",
""
]
]
|
cs/0504084 | Marko Antonio Rodriguez | Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel | The Convergence of Digital-Libraries and the Peer-Review Process | Journal of Information Science [in press] | Journal of Information Science, 32(2), pp. 149-159, 2006. | 10.1177/0165551506062327 | http://jis.sagepub.com/cgi/content/abstract/32/2/149 | cs.DL cs.CY | null | Pre-print repositories have seen a significant increase in use over the past
fifteen years across multiple research domains. Researchers are beginning to
develop applications capable of using these repositories to assist the
scientific community above and beyond the pure dissemination of information.
The contribution set forth by this paper emphasizes a deconstructed publication
model in which the peer-review process is mediated by an OAI-PMH peer-review
service. This peer-review service uses a social-network algorithm to determine
potential reviewers for a submitted manuscript and for weighting the relative
influence of each participating reviewer's evaluations. This paper also
suggests a set of peer-review specific metadata tags that can accompany a
pre-print's existing metadata record. The combinations of these contributions
provide a unique repository-centric peer-review model that fits within the
widely deployed OAI-PMH framework.
| [
{
"version": "v1",
"created": "Mon, 18 Apr 2005 14:28:12 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Apr 2005 11:11:50 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Sep 2005 16:00:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
|
cs/0504086 | Kristiaan Pelckmans | Kristiaan Pelckmans, Ivan Goethals, Jos De Brabanter, Johan A.K.
Suykens, Bart De Moor | Componentwise Least Squares Support Vector Machines | 22 pages. Accepted for publication in Support Vector Machines: Theory
and Applications, ed. L. Wang, 2005 | null | null | null | cs.LG cs.AI | null | This chapter describes componentwise Least Squares Support Vector Machines
(LS-SVMs) for the estimation of additive models consisting of a sum of
nonlinear components. The primal-dual derivations characterizing LS-SVMs for
the estimation of the additive model result in a single set of linear equations
with size growing in the number of data-points. The derivation is elaborated
for the classification as well as the regression case. Furthermore, different
techniques are proposed to discover structure in the data by looking for sparse
components in the model based on dedicated regularization schemes on the one
hand and fusion of the componentwise LS-SVMs training with a validation
criterion on the other hand. (keywords: LS-SVMs, additive models,
regularization, structure detection)
| [
{
"version": "v1",
"created": "Tue, 19 Apr 2005 15:01:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pelckmans",
"Kristiaan",
""
],
[
"Goethals",
"Ivan",
""
],
[
"De Brabanter",
"Jos",
""
],
[
"Suykens",
"Johan A. K.",
""
],
[
"De Moor",
"Bart",
""
]
]
|
cs/0504087 | Rahul Jain | Rahul Jain | Improved direct sum theorem in classical communication complexity | Withdrawn due to critical error | null | null | null | cs.OH | null | Withdrawn due to critical error.
| [
{
"version": "v1",
"created": "Tue, 19 Apr 2005 21:53:09 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2005 17:11:36 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Apr 2005 21:00:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"Rahul",
""
]
]
|
cs/0504088 | Paul Vitanyi | Paul Vitanyi (CWI, University of Amsterdam, and National ICT
Australia) | Time, Space, and Energy in Reversible Computing | LaTeX, 10 pages, Proc. 2005 ACM International Conference on Computing
Frontiers, Ischia, Italy, 4-6 May 2005 (1st Intn'l Workshop on Reversible
Computing) | null | null | null | cs.CC | null | We survey results of a quarter century of work on computation by reversible
general-purpose computers (in this setting Turing machines), and general
reversible simulation of irreversible computations, with respect to energy-,
time- and space requirements.
| [
{
"version": "v1",
"created": "Wed, 20 Apr 2005 17:13:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
"",
"CWI, University of Amsterdam, and National ICT\n Australia"
]
]
|
cs/0504089 | Paul Vitanyi | Paul Vitanyi (CWI, University of Amsterdam, and National ICT
Australia) | Universal Similarity | LaTeX, 5 pages, Proc. ITW2005 - IEEE ITSOC Information Theory
Workshop 2005 on Coding and Complexity, 29th Aug. - 1st Sept., 2005, Rotorua,
New Zealand. (invited). The second version has minor changes, and corrections
getting rid of typos: in (2) we "max" in the denominator is replaced by the
correct "min", some refs to (1) in the text should have been to (2) | null | null | null | cs.IR cs.AI cs.CL physics.data-an | null | We survey a new area of parameter-free similarity distance measures useful in
data-mining, pattern recognition, learning and automatic semantics extraction.
Given a family of distances on a set of objects, a distance is universal up to
a certain precision for that family if it minorizes every distance in the
family between every two objects in the set, up to the stated precision (we do
not require the universal distance to be an element of the family). We consider
similarity distances for two types of objects: literal objects that as such
contain all of their meaning, like genomes or books, and names for objects. The
latter may have literal embodyments like the first type, but may also be
abstract like ``red'' or ``christianity.'' For the first type we consider a
family of computable distance measures corresponding to parameters expressing
similarity according to particular features between pairs of literal objects.
For the second type we consider similarity distances generated by web users
corresponding to particular semantic relations between the (names for) the
designated objects. For both families we give universal similarity distance
measures, incorporating all particular distance measures in the family. In the
first case the universal distance is based on compression and in the second
case it is based on Google page counts related to search terms. In both cases
experiments on a massive scale give evidence of the viability of the
approaches.
| [
{
"version": "v1",
"created": "Wed, 20 Apr 2005 17:40:55 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Jul 2005 17:16:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
"",
"CWI, University of Amsterdam, and National ICT\n Australia"
]
]
|
cs/0504090 | Dmitry Kozlov N | Dmitry N. Kozlov | Discrete Morse Theory for free chain complexes | null | Comptes Rendus Mathematique, Acad. Sci. Paris, Ser. I 340 (2005),
pp. 867-872 | null | null | cs.DM math.RA | null | We extend the combinatorial Morse complex construction to the arbitrary free
chain complexes, and give a short, self-contained, and elementary proof of the
quasi-isomorphism between the original chain complex and its Morse complex.
Even stronger, the main result states that, if $C_*$ is a free chain complex,
and $\cm$ an acyclic matching, then $C_*=C_*^\cm\oplus T_*$, where $C_*^\cm$ is
the Morse complex generated by the critical elements, and $T_*$ is an acyclic
complex.
| [
{
"version": "v1",
"created": "Thu, 21 Apr 2005 14:20:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kozlov",
"Dmitry N.",
""
]
]
|
cs/0504092 | Victor Korotkikh | Victor Korotkikh, Galina Korotkikh and Darryl Bond | On Optimality Condition of Complex Systems: Computational Evidence | 5 pages, 4 figures | null | null | null | cs.CC cond-mat.dis-nn nlin.AO | null | A general condition determining the optimal performance of a complex system
has not yet been found and the possibility of its existence is unknown. To
contribute in this direction, an optimization algorithm as a complex system is
presented. The performance of the algorithm for any problem is controlled as a
convex function with a single optimum. To characterize the performance
optimums, certain quantities of the algorithm and the problem are suggested and
interpreted as their complexities. An optimality condition of the algorithm is
computationally found: if the algorithm shows its best performance for a
problem, then the complexity of the algorithm is in a linear relationship with
the complexity of the problem. The optimality condition provides a new
perspective to the subject by recognizing that the relationship between certain
quantities of the complex system and the problem may determine the optimal
performance.
| [
{
"version": "v1",
"created": "Sat, 23 Apr 2005 06:52:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Korotkikh",
"Victor",
""
],
[
"Korotkikh",
"Galina",
""
],
[
"Bond",
"Darryl",
""
]
]
|
cs/0504093 | Amit K Awasthi | Amit K Awasthi and Sunder Lal | A Multi-proxy Signature Scheme for Partial delegation with Warrant | Old Version 6 Pages | null | null | null | cs.CR | null | In some cases, the original signer may delegate its signing power to a
specified proxy group while ensuring individual accountability of each
participantsigner. The proxy signature scheme that achieves such purpose is
called the multi-proxy signature scheme and the signature generated by the
specified proxy group is called multi-proxy signature for the original signer.
Recently such scheme has been discussed by Lin et al. Lins scheme is based on
partial delegation by Mambo et al. In present chapter we introduce a new
multi-proxy signature scheme, which requires less computational overhead in
comparison to Lin et al, and also fulfill the requirement of partial delegation
with warrant simultaneously.
| [
{
"version": "v1",
"created": "Sat, 23 Apr 2005 22:09:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K",
""
],
[
"Lal",
"Sunder",
""
]
]
|
cs/0504094 | Amit K Awasthi | Amit K Awasthi | A New Remote User Authentication Scheme Using Smart Cards with Check
Digits | 3 Pages. Not Published | null | null | null | cs.CR | null | Since 1981, when Lamport introduced the remote user authentication scheme
using table, a plenty of schemes had been proposed with table and without table
using. In 1993, Chang and Wu [5] introduced Remote password authentication
scheme with smart cards. A number of remote authentication schemes with smart
cards have been proposed since then. These schemes allow a valid user to login
a remote server and access the services provided by the remote server. But
still there is no scheme to authenticate the remote proxy user. In this paper
we propose firstly, a protocol to authenticate a proxy user remotely using
smartcards.
| [
{
"version": "v1",
"created": "Sat, 23 Apr 2005 22:47:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K",
""
]
]
|
cs/0504095 | Amit K Awasthi | Amit K Awasthi and Sunder Lal | An Efficient Scheme for Sensitive Message Transmission using Blind
Signcryption | 5 Pages. Intenational conference on sommunication. India 22 Dec 2004,
Sastra Deemed Univ. Kumabakonam | null | null | null | cs.CR | null | Blind signature schemes enable a useful protocol that guarantee the anonymity
of the participants while Signcryption offers authentication of message and
confidentiality of messages at the same time and more efficiently. In this
paper, we present a blind signcryption scheme that combines the functionality
of blind signature and signcryption. This blind Signcryption is useful for
applications that are based on anonymity untracebility and unlinkability.
| [
{
"version": "v1",
"created": "Sat, 23 Apr 2005 23:05:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K",
""
],
[
"Lal",
"Sunder",
""
]
]
|
cs/0504096 | Lane A. Hemaspaandra | Lane A. Hemaspaandra and Leen Torenvliet | P-Selectivity, Immunity, and the Power of One Bit | null | null | null | URCS-TR-2005-864 | cs.CC | null | We prove that P-sel, the class of all P-selective sets, is EXP-immune, but is
not EXP/1-immune. That is, we prove that some infinite P-selective set has no
infinite EXP-time subset, but we also prove that every infinite P-selective set
has some infinite subset in EXP/1. Informally put, the immunity of P-sel is so
fragile that it is pierced by a single bit of information.
The above claims follow from broader results that we obtain about the
immunity of the P-selective sets. In particular, we prove that for every
recursive function f, P-sel is DTIME(f)-immune. Yet we also prove that P-sel is
not \Pi_2^p/1-immune.
| [
{
"version": "v1",
"created": "Mon, 25 Apr 2005 15:18:17 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Dec 2005 18:28:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Torenvliet",
"Leen",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.