id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0504101
Marko Znidaric
Marko Znidaric
Single-solution Random 3-SAT Instances
18 pages, 9 figures; considerable revision
null
null
null
cs.AI cs.CC cs.DM
null
We study a class of random 3-SAT instances having exactly one solution. The properties of this ensemble considerably differ from those of a random 3-SAT ensemble. It is numerically shown that the running time of several complete and stochastic local search algorithms monotonically increases as the clause density is decreased. Therefore, there is no easy-hard-easy pattern of hardness as for standard random 3-SAT ensemble. Furthermore, the running time for short single-solution formulas increases with the problem size much faster than for random 3-SAT formulas from the phase transition region.
[ { "version": "v1", "created": "Mon, 25 Apr 2005 10:40:32 GMT" }, { "version": "v2", "created": "Thu, 18 Aug 2005 15:15:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Znidaric", "Marko", "" ] ]
cs/0504105
G Gordon Worley III
G Gordon Worley III
Wikis in Tuple Spaces
To appear at WMSCI 2005
null
null
null
cs.DC cs.MM
null
We consider storing the pages of a wiki in a tuple space and the effects this might have on the wiki experience. In particular, wiki pages are stored in tuples with a few identifying values such as title, author, revision date, content, etc. and pages are retrieved by sending the tuple space templates, such as one that gives the title but nothing else, leaving the tuple space to resolve to a single tuple. We use a tuple space wiki to avoid deadlocks, infinite loops, and wasted efforts when page edit contention arises and examine how a tuple space wiki changes the wiki experience.
[ { "version": "v1", "created": "Wed, 27 Apr 2005 23:04:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Worley", "G Gordon", "III" ] ]
cs/0504106
Thomas C. Schmidt
Hans L. Cycon, Thomas C. Schmidt, Matthias Waehlisch, Mark Palkow and Henrik Regensburg
A Distributed Multimedia Communication System and its Applications to E-Learning
Including 6 figures
IEEE International Symposium on Consumer Electronics, Sept. 1-3, 2004, Page(s):425 - 429
null
null
cs.MM cs.NI
null
In this paper we report on a multimedia communication system including a VCoIP (Video Conferencing over IP) software with a distributed architecture and its applications for teaching scenarios. It is a simple, ready-to-use scheme for distributed presenting, recording and streaming multimedia content. We also introduce and investigate concepts and experiments to IPv6 user and session mobility, with the special focus on real-time video group communication.
[ { "version": "v1", "created": "Thu, 28 Apr 2005 13:40:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Cycon", "Hans L.", "" ], [ "Schmidt", "Thomas C.", "" ], [ "Waehlisch", "Matthias", "" ], [ "Palkow", "Mark", "" ], [ "Regensburg", "Henrik", "" ] ]
cs/0504108
Derek Messie
Derek Messie (Syracuse University) and Jae C. Oh (Syracuse University)
Cooperative Game Theory within Multi-Agent Systems for Systems Scheduling
Fourth International Conference on Hybrid Intelligent Systems (HIS), Kitakyushu, Japan, December, 2004
null
null
null
cs.AI cs.MA
null
Research concerning organization and coordination within multi-agent systems continues to draw from a variety of architectures and methodologies. The work presented in this paper combines techniques from game theory and multi-agent systems to produce self-organizing, polymorphic, lightweight, embedded agents for systems scheduling within a large-scale real-time systems environment. Results show how this approach is used to experimentally produce optimum real-time scheduling through the emergent behavior of thousands of agents. These results are obtained using a SWARM simulation of systems scheduling within a High Energy Physics experiment consisting of 2500 digital signal processors.
[ { "version": "v1", "created": "Fri, 29 Apr 2005 13:43:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Messie", "Derek", "", "Syracuse University" ], [ "Oh", "Jae C.", "", "Syracuse University" ] ]
cs/0504109
Derek Messie
Derek Messie (1), Mina Jung (1), Jae C. Oh (1), Shweta Shetty (2), Steven Nordstrom (2), Michael Haney (3) ((1) Syracuse University, (2) Vanderbilt University, (3) University of Illinois at Urbana-Champaign)
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
2nd Workshop on Engineering of Autonomic Systems (EASe), in the 12th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), Washington, DC, April, 2005
null
null
null
cs.SE
null
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight self-optimizing agents embedded within Level 1 of the prototype are responsible for proactive and reactive monitoring and mitigation based on specified layers of competence. The agents are self-protecting, detecting cascading failures using a distributed approach. Adaptive, reconfigurable, and mobile objects for reliablility are designed to be self-configuring to adapt automatically to dynamically changing environments. These objects provide a self-healing layer with the ability to discover, diagnose, and react to discontinuities in real-time processing. A generic modeling environment was developed to facilitate design and implementation of hardware resource specifications, application data flow, and failure mitigation strategies. Level 1 of the planned BTeV trigger system alone will consist of 2500 DSPs, so the number of components and intractable fault scenarios involved make it impossible to design an `expert system' that applies traditional centralized mitigative strategies based on rules capturing every possible system state. Instead, a distributed reactive approach is implemented using the tools and methodologies developed by the Real-Time Embedded Systems group.
[ { "version": "v1", "created": "Fri, 29 Apr 2005 14:59:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Messie", "Derek", "" ], [ "Jung", "Mina", "" ], [ "Oh", "Jae C.", "" ], [ "Shetty", "Shweta", "" ], [ "Nordstrom", "Steven", "" ], [ "Haney", "Michael", "" ] ]
cs/0504110
Lawrence Ioannou
Lawrence M. Ioannou
Computing finite-dimensional bipartite quantum separability
Replaced orginal archive submission with PhD thesis, which subsumes and mildly corrects it
null
null
null
cs.DS quant-ph
null
Ever since entanglement was identified as a computational and cryptographic resource, effort has been made to find an efficient way to tell whether a given density matrix represents an unentangled, or separable, state. Essentially, this is the quantum separability problem. Chapters 1 to 3 motivate a new interior-point algorithm which, given the expected values of a subset of an orthogonal basis of observables of an otherwise unknown quantum state, searches for an entanglement witness in the span of the subset of observables. When all the expected values are known, the algorithm solves the separability problem. In Chapter 4, I give the motivation for the algorithm and show how it can be used in a particular physical scenario to detect entanglement (or decide separability) of an unknown quantum state using as few quantum resources as possible. I then explain the intuitive idea behind the algorithm and relate it to the standard algorithms of its kind. I end the chapter with a comparison of the complexities of the algorithms surveyed in Chapter 3. Finally, in Chapter 5, I present the details of the algorithm and discuss its performance relative to standard methods.
[ { "version": "v1", "created": "Fri, 29 Apr 2005 16:42:54 GMT" }, { "version": "v2", "created": "Sat, 30 Apr 2005 12:11:17 GMT" }, { "version": "v3", "created": "Wed, 15 Feb 2006 15:47:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Ioannou", "Lawrence M.", "" ] ]
cs/0504111
Karim Seada
Karim Seada, Ahmed Helmy
Efficient and Robust Geocasting Protocols for Sensor Networks
null
null
null
null
cs.NI
null
Geocasting is the delivery of packets to nodes within a certain geographic area. For many applications in wireless ad hoc and sensor networks, geocasting is an important and frequent communication service. The challenging problem in geocasting is distributing the packets to all the nodes within the geocast region with high probability but with low overhead. According to our study we notice a clear tradeoff between the proportion of nodes in the geocast region that receive the packet and the overhead incurred by the geocast packet especially at low densities and irregular distributions. We present two novel protocols for geocasting that achieve high delivery rate and low overhead by utilizing the local location information of nodes to combine geographic routing mechanisms with region flooding. We show that the first protocol Geographic-Forwarding-Geocast (GFG) has close-to-minimum overhead in dense networks and that the second protocol Geographic-Forwarding-Perimeter-Geocast (GFPG) provides guaranteed delivery without global flooding or global network information even at low densities and with the existence of region gaps or obstacles. An adaptive version of the second protocol (GFPG*) has the desirable property of perfect delivery at all densities and close-to-minimum overhead at high densities. We evaluate our mechanisms and compare them using simulation to other proposed geocasting mechanisms. The results show the significant improvement in delivery rate (up to 63% higher delivery percentage in low density networks) and reduction in overhead (up to 80% reduction) achieved by our mechanisms. We hope for our protocols to become building block mechanisms for dependable sensor network architectures that require robust efficient geocast services.
[ { "version": "v1", "created": "Fri, 29 Apr 2005 18:37:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Seada", "Karim", "" ], [ "Helmy", "Ahmed", "" ] ]
cs/0505001
Roberto da Silva
Roberto da Silva, Alexandre Tavares Baraviera, Silvio R. Dahmen
Modelling investment in artificial stock markets: Analytical and Numerical Results
19 pages 10 figures
null
null
null
cs.CE
null
In this article we study the behavior of a group of economic agents in the context of cooperative game theory, interacting according to rules based on the Potts Model with suitable modifications. Each agent can be thought of as belonging to a chain, where agents can only interact with their nearest neighbors (periodic boundary conditions are imposed). Each agent can invest an amount σ_{i}=0,...,q-1. Using the transfer matrix method we study analytically, among other things, the behavior of the investment as a function of a control parameter (denoted β) for the cases q=2 and 3. For q>3 numerical evaluation of eigenvalues and high precision numerical derivatives are used in order to assess this information.
[ { "version": "v1", "created": "Fri, 29 Apr 2005 20:38:42 GMT" } ]
2007-05-23T00:00:00
[ [ "da Silva", "Roberto", "" ], [ "Baraviera", "Alexandre Tavares", "" ], [ "Dahmen", "Silvio R.", "" ] ]
cs/0505002
Christoph Koch
Martin Grohe, Christoph Koch, Nicole Schweikardt
Tight Lower Bounds for Query Processing on Streaming and External Memory Data
25 pages, 4 figures, to appear in Proc. ICALP 2005; extended version with appendix
null
null
null
cs.DB cs.CC
null
We study a clean machine model for external memory and stream processing. We show that the number of scans of the external data induces a strict hierarchy (as long as work space is sufficiently small, e.g., polylogarithmic in the size of the input). We also show that neither joins nor sorting are feasible if the product of the number $r(n)$ of scans of the external memory and the size $s(n)$ of the internal memory buffers is sufficiently small, e.g., of size $o(\sqrt[5]{n})$. We also establish tight bounds for the complexity of XPath evaluation and filtering.
[ { "version": "v1", "created": "Fri, 29 Apr 2005 22:28:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Grohe", "Martin", "" ], [ "Koch", "Christoph", "" ], [ "Schweikardt", "Nicole", "" ] ]
cs/0505003
Xiaofei Huang
Xiaofei Huang
A New Kind of Hopfield Networks for Finding Global Optimum
6 pages, accepted by International Joint Conference on Neural Networks 2005
null
null
null
cs.NE
null
The Hopfield network has been applied to solve optimization problems over decades. However, it still has many limitations in accomplishing this task. Most of them are inherited from the optimization algorithms it implements. The computation of a Hopfield network, defined by a set of difference equations, can easily be trapped into one local optimum or another, sensitive to initial conditions, perturbations, and neuron update orders. It doesn't know how long it will take to converge, as well as if the final solution is a global optimum, or not. In this paper, we present a Hopfield network with a new set of difference equations to fix those problems. The difference equations directly implement a new powerful optimization algorithm.
[ { "version": "v1", "created": "Sat, 30 Apr 2005 16:13:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
cs/0505005
Sandor P. Fekete
Jan van der Veen and Sandor P. Fekete and Ali Ahmadinia and Christophe Bobda and Frank Hannig and Juergen Teich
Defragmenting the Module Layout of a Partially Reconfigurable Device
10 pages, 11 figures, 1 table, Latex, to appear in "Engineering of Reconfigurable Systems and Algorithms" as a "Distinguished Paper"
null
null
null
cs.AR cs.DS
null
Modern generations of field-programmable gate arrays (FPGAs) allow for partial reconfiguration. In an online context, where the sequence of modules to be loaded on the FPGA is unknown beforehand, repeated insertion and deletion of modules leads to progressive fragmentation of the available space, making defragmentation an important issue. We address this problem by propose an online and an offline component for the defragmentation of the available space. We consider defragmenting the module layout on a reconfigurable device. This corresponds to solving a two-dimensional strip packing problem. Problems of this type are NP-hard in the strong sense, and previous algorithmic results are rather limited. Based on a graph-theoretic characterization of feasible packings, we develop a method that can solve two-dimensional defragmentation instances of practical size to optimality. Our approach is validated for a set of benchmark instances.
[ { "version": "v1", "created": "Mon, 2 May 2005 01:10:04 GMT" } ]
2007-05-23T00:00:00
[ [ "van der Veen", "Jan", "" ], [ "Fekete", "Sandor P.", "" ], [ "Ahmadinia", "Ali", "" ], [ "Bobda", "Christophe", "" ], [ "Hannig", "Frank", "" ], [ "Teich", "Juergen", "" ] ]
cs/0505007
Dragos Trinca
Dragos Trinca
Adaptive Codes: A New Class of Non-standard Variable-length Codes
10 pages
null
null
null
cs.DS
null
We introduce a new class of non-standard variable-length codes, called adaptive codes. This class of codes associates a variable-length codeword to the symbol being encoded depending on the previous symbols in the input data string. An efficient algorithm for constructing adaptive codes of order one is presented. Then, we introduce a natural generalization of adaptive codes, called GA codes.
[ { "version": "v1", "created": "Mon, 2 May 2005 09:40:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0505008
Ralf-Michael Vetter
A. Kuhlmann, R.-M. Vetter, Ch. Luebbing, C.-A. Thole
Data Mining on Crash Simulation Data
12 pages, 10 figures. Accepted for Lecture Notes in Computer Science (LNCS)
Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence, Proceedings Conference MLDM 2005, Leipzig/Germany, Springer Verlag, LNAI 3587, ISBN: 3-540-26923-1, 2005
null
null
cs.IR cs.CE
null
The work presented in this paper is part of the cooperative research project AUTO-OPT carried out by twelve partners from the automotive industries. One major work package concerns the application of data mining methods in the area of automotive design. Suitable methods for data preparation and data analysis are developed. The objective of the work is the re-use of data stored in the crash-simulation department at BMW in order to gain deeper insight into the interrelations between the geometric variations of the car during its design and its performance in crash testing. In this paper a method for data analysis of finite element models and results from crash simulation is proposed and application to recent data from the industrial partner BMW is demonstrated. All necessary steps from data pre-processing to re-integration into the working environment of the engineer are covered.
[ { "version": "v1", "created": "Mon, 2 May 2005 15:27:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuhlmann", "A.", "" ], [ "Vetter", "R. -M.", "" ], [ "Luebbing", "Ch.", "" ], [ "Thole", "C. -A.", "" ] ]
cs/0505011
Ramona Su
Tony Chang, Damon Cook, Ramona Su
SWiM: A Simple Window Mover
7 pages, 4 figures
null
null
null
cs.HC
null
As computers become more ubiquitous, traditional two-dimensional interfaces must be replaced with interfaces based on a three-dimensional metaphor. However, these interfaces must still be as simple and functional as their two-dimensional predecessors. This paper introduces SWiM, a new interface for moving application windows between various screens, such as wall displays, laptop monitors, and desktop displays, in a three-dimensional physical environment. SWiM was designed based on the results of initial "paper and pencil" user tests of three possible interfaces. The results of these tests led to a map-like interface where users select the destination display for their application from various icons. If the destination is a mobile display it is not displayed on the map. Instead users can select the screen's name from a list of all possible destination displays. User testing of SWiM was conducted to discover whether it is easy to learn and use. Users that were asked to use SWiM without any instructions found the interface as intuitive to use as users who were given a demonstration. The results show that SWiM combines simplicity and functionality to create an interface that is easy to learn and easy to use.
[ { "version": "v1", "created": "Wed, 4 May 2005 16:17:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Chang", "Tony", "" ], [ "Cook", "Damon", "" ], [ "Su", "Ramona", "" ] ]
cs/0505014
Haibin Wang
Haibin Wang, Florentin Smarandache, Yan-Qing Zhang, Rajshekhar Sunderraman
Interval Neutrosophic Sets and Logic: Theory and Applications in Computing
12 figures, 100 pages, book in press
null
null
null
cs.LO
null
This book presents the advancements and applications of neutrosophics. Chapter 1 first introduces the interval neutrosophic sets which is an instance of neutrosophic sets. In this chapter, the definition of interval neutrosophic sets and set-theoretic operators are given and various properties of interval neutrosophic set are proved. Chapter 2 defines the interval neutrosophic logic based on interval neutrosophic sets including the syntax and semantics of first order interval neutrosophic propositional logic and first order interval neutrosophic predicate logic. The interval neutrosophic logic can reason and model fuzzy, incomplete and inconsistent information. In this chapter, we also design an interval neutrosophic inference system based on first order interval neutrosophic predicate logic. The interval neutrosophic inference system can be applied to decision making. Chapter 3 gives one application of interval neutrosophic sets and logic in the field of relational databases. Neutrosophic data model is the generalization of fuzzy data model and paraconsistent data model. Here, we generalize various set-theoretic and relation-theoretic operations of fuzzy data model to neutrosophic data model. Chapter 4 gives another application of interval neutrosophic logic. A soft semantic Web Services agent framework is proposed to faciliate the registration and discovery of high quality semantic Web Services agent. The intelligent inference engine module of soft Semantic Web Services agent is implemented using interval neutrosophic logic.
[ { "version": "v1", "created": "Fri, 6 May 2005 13:57:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Haibin", "" ], [ "Smarandache", "Florentin", "" ], [ "Zhang", "Yan-Qing", "" ], [ "Sunderraman", "Rajshekhar", "" ] ]
cs/0505016
Shashank Araokar
Shashank Araokar
Visual Character Recognition using Artificial Neural Networks
7 pages, tutorial resource
null
null
null
cs.NE
null
The recognition of optical characters is known to be one of the earliest applications of Artificial Neural Networks, which partially emulate human thinking in the domain of artificial intelligence. In this paper, a simplified neural approach to recognition of optical or visual characters is portrayed and discussed. The document is expected to serve as a resource for learners and amateur investigators in pattern recognition, neural networking and related disciplines.
[ { "version": "v1", "created": "Sat, 7 May 2005 20:56:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Araokar", "Shashank", "" ] ]
cs/0505017
Merc\`e Claverol
Manuel Abellanas, Merc\`e Claverol, and Ferran Hurtado
Point set stratification and Delaunay depth
17 pages, 16 figures
null
null
null
cs.CG
null
In the study of depth functions it is important to decide whether we want such a function to be sensitive to multimodality or not. In this paper we analyze the Delaunay depth function, which is sensitive to multimodality and compare this depth with others, as convex depth and location depth. We study the stratification that Delaunay depth induces in the point set (layers) and in the whole plane (levels), and we develop an algorithm for computing the Delaunay depth contours, associated to a point set in the plane, with running time O(n log^2 n). The depth of a query point p with respect to a data set S in the plane is the depth of p in the union of S and p. When S and p are given in the input the Delaunay depth can be computed in O(n log n), and we prove that this value is optimal.
[ { "version": "v1", "created": "Sun, 8 May 2005 16:36:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Abellanas", "Manuel", "" ], [ "Claverol", "Mercè", "" ], [ "Hurtado", "Ferran", "" ] ]
cs/0505018
Jean-Francois Mari
Jean-Francois Mari (INRIA Lorraine - LORIA), Florence Le Ber (CEVH)
Temporal and Spatial Data Mining with Second-Order Hidden Models
null
null
10.1007/s00500-005-0501-0
null
cs.AI
null
In the frame of designing a knowledge discovery system, we have developed stochastic models based on high-order hidden Markov models. These models are capable to map sequences of data into a Markov chain in which the transitions between the states depend on the \texttt{n} previous states according to the order of the model. We study the process of achieving information extraction fromspatial and temporal data by means of an unsupervised classification. We use therefore a French national database related to the land use of a region, named Teruti, which describes the land use both in the spatial and temporal domain. Land-use categories (wheat, corn, forest, ...) are logged every year on each site regularly spaced in the region. They constitute a temporal sequence of images in which we look for spatial and temporal dependencies. The temporal segmentation of the data is done by means of a second-order Hidden Markov Model (\hmmd) that appears to have very good capabilities to locate stationary segments, as shown in our previous work in speech recognition. Thespatial classification is performed by defining a fractal scanning ofthe images with the help of a Hilbert-Peano curve that introduces atotal order on the sites, preserving the relation ofneighborhood between the sites. We show that the \hmmd performs aclassification that is meaningful for the agronomists.Spatial and temporal classification may be achieved simultaneously by means of a 2 levels \hmmd that measures the \aposteriori probability to map a temporal sequence of images onto a set of hidden classes.
[ { "version": "v1", "created": "Mon, 9 May 2005 06:54:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Mari", "Jean-Francois", "", "INRIA Lorraine - LORIA" ], [ "Ber", "Florence Le", "", "CEVH" ] ]
cs/0505019
Nitin Malik
Nitin Malik
Artificial Neural Networks and their Applications
6 pages, 2 figures, 1 table
null
null
null
cs.NE
null
The Artificial Neural network is a functional imitation of simplified model of the biological neurons and their goal is to construct useful computers for real world problems. The ANN applications have increased dramatically in the last few years fired by both theoretical and practical applications in a wide variety of applications. A brief theory of ANN is presented and potential areas are identified and future trends are discussed.
[ { "version": "v1", "created": "Tue, 10 May 2005 06:37:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Malik", "Nitin", "" ] ]
cs/0505023
Guillaume Gardey
Guillaume Gardey and Olivier H. Roux and Olivier F. Roux
State Space Computation and Analysis of Time Petri Nets
21 pages
null
null
null
cs.LO
null
The theory of Petri Nets provides a general framework to specify the behaviors of real-time reactive systems and Time Petri Nets were introduced to take also temporal specifications into account. We present in this paper a forward zone-based algorithm to compute the state space of a bounded Time Petri Net: the method is different and more efficient than the classical State Class Graph. We prove the algorithm to be exact with respect to the reachability problem. Furthermore, we propose a translation of the computed state space into a Timed Automaton, proved to be timed bisimilar to the original Time Petri Net. As the method produce a single Timed Automaton, syntactical clocks reduction methods (Daws and Yovine for instance) may be applied to produce an automaton with fewer clocks. Then, our method allows to model-check TTPN by the use of efficient Timed Automata tools. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 10 May 2005 13:30:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Gardey", "Guillaume", "" ], [ "Roux", "Olivier H.", "" ], [ "Roux", "Olivier F.", "" ] ]
cs/0505024
Riccardo Pucella
Riccardo Pucella
Logic Column 12: Logical Verification and Equational Verification
11 pages
SIGACT News, 36(2), pp. 77-88, 2005
null
null
cs.LO
null
This article examines two approaches to verification, one based on using a logic for expressing properties of a system, and one based on showing the system equivalent to a simpler system that obviously has whatever property is of interest. Using examples such as process calculi and regular programs, the relationship between these two approaches is explored.
[ { "version": "v1", "created": "Tue, 10 May 2005 14:49:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
cs/0505025
Anton\'in Ku\v{c}era
Antonin Kucera and Petr Jancar
Equivalence-Checking on Infinite-State Systems: Techniques and Results
null
null
null
null
cs.LO
null
The paper presents a selection of recently developed and/or used techniques for equivalence-checking on infinite-state systems, and an up-to-date overview of existing results (as of September 2004).
[ { "version": "v1", "created": "Tue, 10 May 2005 16:47:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Kucera", "Antonin", "" ], [ "Jancar", "Petr", "" ] ]
cs/0505026
Alicia Villanueva
Moreno Falaschi and Alicia Villanueva
Automatic Verification of Timed Concurrent Constraint Programs
null
null
null
null
cs.LO
null
The language Timed Concurrent Constraint (tccp) is the extension over time of the Concurrent Constraint Programming (cc) paradigm that allows us to specify concurrent systems where timing is critical, for example reactive systems. Systems which may have an infinite number of states can be specified in tccp. Model checking is a technique which is able to verify finite-state systems with a huge number of states in an automatic way. In the last years several studies have investigated how to extend model checking techniques to systems with an infinite number of states. In this paper we propose an approach which exploits the computation model of tccp. Constraint based computations allow us to define a methodology for applying a model checking algorithm to (a class of) infinite-state systems. We extend the classical algorithm of model checking for LTL to a specific logic defined for the verification of tccp and to the tccp Structure which we define in this work for modeling the program behavior. We define a restriction on the time in order to get a finite model and then we develop some illustrative examples. To the best of our knowledge this is the first approach that defines a model checking methodology for tccp.
[ { "version": "v1", "created": "Wed, 11 May 2005 11:33:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Falaschi", "Moreno", "" ], [ "Villanueva", "Alicia", "" ] ]
cs/0505028
Irmtraud Meyer
Istvan Miklos, Irmtraud M. Meyer
A linear memory algorithm for Baum-Welch training
14 pages, 1 figure version 2: fixed some errors, final version of paper
BMC Bioinformatics (2005) 6:231
null
null
cs.LG cs.DS q-bio.QM
null
Background: Baum-Welch training is an expectation-maximisation algorithm for training the emission and transition probabilities of hidden Markov models in a fully automated way. Methods and results: We introduce a linear space algorithm for Baum-Welch training. For a hidden Markov model with M states, T free transition and E free emission parameters, and an input sequence of length L, our new algorithm requires O(M) memory and O(L M T_max (T + E)) time for one Baum-Welch iteration, where T_max is the maximum number of states that any state is connected to. The most memory efficient algorithm until now was the checkpointing algorithm with O(log(L) M) memory and O(log(L) L M T_max) time requirement. Our novel algorithm thus renders the memory requirement completely independent of the length of the training sequences. More generally, for an n-hidden Markov model and n input sequences of length L, the memory requirement of O(log(L) L^(n-1) M) is reduced to O(L^(n-1) M) memory while the running time is changed from O(log(L) L^n M T_max + L^n (T + E)) to O(L^n M T_max (T + E)). Conclusions: For the large class of hidden Markov models used for example in gene prediction, whose number of states does not scale with the length of the input sequence, our novel algorithm can thus be both faster and more memory-efficient than any of the existing algorithms.
[ { "version": "v1", "created": "Wed, 11 May 2005 16:45:58 GMT" }, { "version": "v2", "created": "Mon, 30 May 2005 19:46:56 GMT" }, { "version": "v3", "created": "Tue, 16 Aug 2005 12:43:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Miklos", "Istvan", "" ], [ "Meyer", "Irmtraud M.", "" ] ]
cs/0505030
Gilles Villard
Arne Storjohann (UWO), Gilles Villard (LIP)
Computing the Rank and a Small Nullspace Basis of a Polynomial Matrix
Research Report LIP RR2005-03, January 2005
Proceedings of the 2005 International Symposium on Symbolic and Algebraic Computation (2005) 309-316
null
null
cs.SC cs.CC
null
We reduce the problem of computing the rank and a nullspace basis of a univariate polynomial matrix to polynomial matrix multiplication. For an input n x n matrix of degree d over a field K we give a rank and nullspace algorithm using about the same number of operations as for multiplying two matrices of dimension n and degree d. If the latter multiplication is done in MM(n,d)=softO(n^omega d) operations, with omega the exponent of matrix multiplication over K, then the algorithm uses softO(MM(n,d)) operations in K. The softO notation indicates some missing logarithmic factors. The method is randomized with Las Vegas certification. We achieve our results in part through a combination of matrix Hensel high-order lifting and matrix minimal fraction reconstruction, and through the computation of minimal or small degree vectors in the nullspace seen as a K[x]-module
[ { "version": "v1", "created": "Wed, 11 May 2005 18:29:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Storjohann", "Arne", "", "UWO" ], [ "Villard", "Gilles", "", "LIP" ] ]
cs/0505031
Rudini Sampaio
Rudini M. Sampaio, Horacio H. Yanasse
Estudo e Implementacao de Algoritmos de Roteamento sobre Grafos em um Sistema de Informacoes Geograficas
INFOCOMP Journal of Computer Science
INFOCOMP Journal of Computer Science, 3(1), 2004
null
null
cs.MS cs.DS
null
This article presents an implementation of a graphical software with various algorithms in Operations research, like minimum path, minimum tree, chinese postman problem and travelling salesman.
[ { "version": "v1", "created": "Wed, 11 May 2005 18:50:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Sampaio", "Rudini M.", "" ], [ "Yanasse", "Horacio H.", "" ] ]
cs/0505035
Hubie Chen
Hubie Chen and Victor Dalmau
Beyond Hypertree Width: Decomposition Methods Without Decompositions
null
null
null
null
cs.CC cs.AI
null
The general intractability of the constraint satisfaction problem has motivated the study of restrictions on this problem that permit polynomial-time solvability. One major line of work has focused on structural restrictions, which arise from restricting the interaction among constraint scopes. In this paper, we engage in a mathematical investigation of generalized hypertree width, a structural measure that has up to recently eluded study. We obtain a number of computational results, including a simple proof of the tractability of CSP instances having bounded generalized hypertree width.
[ { "version": "v1", "created": "Thu, 12 May 2005 16:53:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ], [ "Dalmau", "Victor", "" ] ]
cs/0505036
Eduardo Moreno
Martin Matamala and Eduardo Moreno
Minimal Eulerian trail in a labeled digraph
Tech. Report DIM-CMM, Universidad de Chile, August 2004
null
null
CMM-B-04/08-108
cs.DM
null
Let $G$ be an Eulerian directed graph with an arc-labeling such that arcs going out from the same vertex have different labels. In this work, we present an algorithm to construct the Eulerian trail starting at an arbitrary vertex $v$ of minimum lexicographical label among labels of all Eulerian trails starting at this vertex. We also show an application of this algorithm to construct the minimal de Bruijn sequence of a language.
[ { "version": "v1", "created": "Thu, 12 May 2005 20:52:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Matamala", "Martin", "" ], [ "Moreno", "Eduardo", "" ] ]
cs/0505038
Albrecht Schmidt
Albrecht Schmidt, Christian S. Jensen
Efficient Management of Short-Lived Data
switched to TimeCenter latex style
null
null
TimeCenter, TR-82
cs.DB
null
Motivated by the increasing prominence of loosely-coupled systems, such as mobile and sensor networks, which are characterised by intermittent connectivity and volatile data, we study the tagging of data with so-called expiration times. More specifically, when data are inserted into a database, they may be tagged with time values indicating when they expire, i.e., when they are regarded as stale or invalid and thus are no longer considered part of the database. In a number of applications, expiration times are known and can be assigned at insertion time. We present data structures and algorithms for online management of data tagged with expiration times. The algorithms are based on fully functional, persistent treaps, which are a combination of binary search trees with respect to a primary attribute and heaps with respect to a secondary attribute. The primary attribute implements primary keys, and the secondary attribute stores expiration times in a minimum heap, thus keeping a priority queue of tuples to expire. A detailed and comprehensive experimental study demonstrates the well-behavedness and scalability of the approach as well as its efficiency with respect to a number of competitors.
[ { "version": "v1", "created": "Mon, 16 May 2005 14:42:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidt", "Albrecht", "" ], [ "Jensen", "Christian S.", "" ] ]
cs/0505039
Judit Bar-Ilan
Judit Bar-Ilan, Mazlita Mat-Hassan, Mark Levene
Methods for comparing rankings of search engine results
19 pages, 4 figures, 8 tables
null
null
null
cs.IR
null
In this paper we present a number of measures that compare rankings of search engine results. We apply these measures to five queries that were monitored daily for two periods of about 21 days each. Rankings of the different search engines (Google, Yahoo and Teoma for text searches and Google, Yahoo and Picsearch for image searches) are compared on a daily basis, in addition to longitudinal comparisons of the same engine for the same query over time. The results and rankings of the two periods are compared as well.
[ { "version": "v1", "created": "Sat, 14 May 2005 17:48:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Bar-Ilan", "Judit", "" ], [ "Mat-Hassan", "Mazlita", "" ], [ "Levene", "Mark", "" ] ]
cs/0505040
Serban Vlad E.
Serban E. Vlad
Asynchronous pseudo-systems
28 pages
Analele Universitatii Oradea, Fasc. Matematica, Tom XI, 2004, 133-174
null
null
cs.OH
null
The paper introduces the concept of asynchronous pseudo-system. Its purpose is to correct/generalize/continue the study of the asynchronous systems (the models of the asynchronous circuits) that has been started in [1], [2].
[ { "version": "v1", "created": "Sat, 14 May 2005 17:59:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0505041
Sanjiang Li
Yongming Li, Sanjiang Li and Mingsheng Ying
Relational reasoning in the region connection calculus
Latex2e, 35 pages, 2 figures
null
null
null
cs.AI cs.LO
null
This paper is mainly concerned with the relation-algebraical aspects of the well-known Region Connection Calculus (RCC). We show that the contact relation algebra (CRA) of certain RCC model is not atomic complete and hence infinite. So in general an extensional composition table for the RCC cannot be obtained by simply refining the RCC8 relations. After having shown that each RCC model is a consistent model of the RCC11 CT, we give an exhaustive investigation about extensional interpretation of the RCC11 CT. More important, we show the complemented closed disk algebra is a representation for the relation algebra determined by the RCC11 table. The domain of this algebra contains two classes of regions, the closed disks and closures of their complements in the real plane.
[ { "version": "v1", "created": "Sat, 14 May 2005 21:16:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Yongming", "" ], [ "Li", "Sanjiang", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0505042
Matthew Earl
Matthew Earl and Raffaello D'Andrea
Iterative MILP Methods for Vehicle Control Problems
22 pages, 9 figures, submitted to IEEE Transactions on Robotics, for associated web page see http://control.mae.cornell.edu/earl/milp2
M. G. Earl and R. D'Andrea, "Iterative MILP Methods for Vehicle Control Problems," IEEE Transactions on Robotics, Volume 21, Issue 6, pages 1158-1167, Dec. 2005.
null
null
cs.RO
null
Mixed integer linear programming (MILP) is a powerful tool for planning and control problems because of its modeling capability and the availability of good solvers. However, for large models, MILP methods suffer computationally. In this paper, we present iterative MILP algorithms that address this issue. We consider trajectory generation problems with obstacle avoidance requirements and minimum time trajectory generation problems. The algorithms use fewer binary variables than standard MILP methods and require less computational effort.
[ { "version": "v1", "created": "Mon, 16 May 2005 03:54:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Earl", "Matthew", "" ], [ "D'Andrea", "Raffaello", "" ] ]
cs/0505045
Madhava Krishna K
K Madhava Krishna, Henry Hexmoor and Shravan Sogani
A T Step Ahead Optimal Target Detection Algorithm for a Multi Sensor Surveillance System
7 pages, 3 figures, 2 tables
null
null
null
cs.MA cs.RO
null
This paper presents a methodology for optimal target detection in a multi sensor surveillance system. The system consists of mobile sensors that guard a rectangular surveillance zone crisscrossed by moving targets. Targets percolate the surveillance zone in a poisson fashion with uniform velocities. Under these statistics this paper computes a motion strategy for a sensor that maximizes target detections for the next T time steps. A coordination mechanism between sensors ensures that overlapping areas between sensors is reduced. This coordination mechanism is interleaved with the motion strategy computation to reduce detections of the same target by more than one sensor. To avoid an exhaustive search in the joint space of all sensors the coordination mechanism constraints the search by assigning priorities to the sensors. A comparison of this methodology with other multi target tracking schemes verifies its efficacy in maximizing detections. A tabulation of these comparisons is reported in results section of the paper
[ { "version": "v1", "created": "Tue, 17 May 2005 13:06:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Krishna", "K Madhava", "" ], [ "Hexmoor", "Henry", "" ], [ "Sogani", "Shravan", "" ] ]
cs/0505047
David Wood
David R. Wood
A Simple Proof of the F{\'a}ry-Wagner Theorem
2 pages
null
null
null
cs.CG
null
We give a simple proof of the following fundamental result independently due to Fary (1948) and Wagner (1936): Every plane graph has a drawing in which every edge is straight.
[ { "version": "v1", "created": "Wed, 18 May 2005 11:27:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Wood", "David R.", "" ] ]
cs/0505050
Manuel Arturo Izquierdo
Manuel Arturo Izquierdo
The QDF file format: an electronic system to describe ancient andean khipus
LaTeX text, 12 pages
null
null
null
cs.CY
null
With the goal of bringing to reseachers of the ancient andean khipus with a tool to share and process electronically the current corpus of these ancient information devices, I present on this paper a proposal for a Quipu Description Format (QDF), a XML based file format designed to describe such documents in a systematic and computer standard way.
[ { "version": "v1", "created": "Thu, 19 May 2005 22:42:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Izquierdo", "Manuel Arturo", "" ] ]
cs/0505051
Jaime Gomez
Jaime Gomez, Ignacio Melgar, Juan Seijas, Diego Andina
Sub-Optimum Signal Linear Detector Using Wavelets and Support Vector Machines
6 pages
WSEAS Transactions on Communications, ISSN 1109-2742, issue 4, vol 2, p426-431, October-2003
null
null
cs.IR cs.NE
null
The problem of known signal detection in Additive White Gaussian Noise is considered. In previous work, a new detection scheme was introduced by the authors, and it was demonstrated that optimum performance cannot be reached in a real implementation. In this paper we analyse Support Vector Machines (SVM) as an alternative, evaluating the results in terms of Probability of detection curves for a fixed Probability of false alarm.
[ { "version": "v1", "created": "Fri, 20 May 2005 14:54:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Gomez", "Jaime", "" ], [ "Melgar", "Ignacio", "" ], [ "Seijas", "Juan", "" ], [ "Andina", "Diego", "" ] ]
cs/0505052
Jaime Gomez
Jaime Gomez, Ignacio Melgar, Juan Seijas
Upgrading Pulse Detection with Time Shift Properties Using Wavelets and Support Vector Machines
6 pages
Proceedings of the World Automation Congress (WAC-04), Sevilla, Spain, June-2004
null
null
cs.IR cs.NE
null
Current approaches in pulse detection use domain transformations so as to concentrate frequency related information that can be distinguishable from noise. In real cases we do not know when the pulse will begin, so we need a time search process in which time windows are scheduled and analysed. Each window can contain the pulsed signal (either complete or incomplete) and / or noise. In this paper a simple search process will be introduced, allowing the algorithm to process more information, upgrading the capabilities in terms of probability of detection (Pd) and probability of false alarm (Pfa).
[ { "version": "v1", "created": "Fri, 20 May 2005 15:01:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gomez", "Jaime", "" ], [ "Melgar", "Ignacio", "" ], [ "Seijas", "Juan", "" ] ]
cs/0505053
Jaime Gomez
Jaime Gomez, Ignacio Melgar, Juan Seijas
Wavelet Time Shift Properties Integration with Support Vector Machines
11 pages
LNAI-3131 Modeling Decisions for Artificial Intelligence, ISSN 0302-9743, p49-59, Barcelona, Spain, August-2004
null
null
cs.IR cs.NE
null
This paper presents a short evaluation about the integration of information derived from wavelet non-linear-time-invariant (non-LTI) projection properties using Support Vector Machines (SVM). These properties may give additional information for a classifier trying to detect known patterns hidden by noise. In the experiments we present a simple electromagnetic pulsed signal recognition scheme, where some improvement is achieved with respect to previous work. SVMs are used as a tool for information integration, exploiting some unique properties not easily found in neural networks.
[ { "version": "v1", "created": "Fri, 20 May 2005 15:06:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Gomez", "Jaime", "" ], [ "Melgar", "Ignacio", "" ], [ "Seijas", "Juan", "" ] ]
cs/0505055
Kooshiar Azimian
Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Siamak Fayyaz
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
null
null
null
null
cs.CR cs.CC
null
In this paper, firstly we propose two new concepts concerning the notion of key escrow encryption schemes: provable partiality and independency. Roughly speaking we say that a scheme has provable partiality if existing polynomial time algorithm for recovering the secret knowing escrowed information implies a polynomial time algorithm that can solve a well-known intractable problem. In addition, we say that a scheme is independent if the secret key and the escrowed information are independent. Finally, we propose a new verifiable partial key escrow, which has both of above criteria. The new scheme use McCurley encryption scheme as underlying scheme.
[ { "version": "v1", "created": "Sun, 22 May 2005 12:40:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Azimian", "Kooshiar", "" ], [ "Mohajeri", "Javad", "" ], [ "Salmasizadeh", "Mahmoud", "" ], [ "Fayyaz", "Siamak", "" ] ]
cs/0505059
Francesco Parisi
Sergio Flesca, Filippo Furfaro, Francesco Parisi
Consistent query answers on numerical databases under aggregate constraints
null
null
null
null
cs.DB
null
The problem of extracting consistent information from relational databases violating integrity constraints on numerical data is addressed. In particular, aggregate constraints defined as linear inequalities on aggregate-sum queries on input data are considered. The notion of repair as consistent set of updates at attribute-value level is exploited, and the characterization of several complexity issues related to repairing data and computing consistent query answers is provided.
[ { "version": "v1", "created": "Mon, 23 May 2005 14:19:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Flesca", "Sergio", "" ], [ "Furfaro", "Filippo", "" ], [ "Parisi", "Francesco", "" ] ]
cs/0505060
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A Unified Subspace Outlier Ensemble Framework for Outlier Detection in High Dimensional Spaces
17 pages
null
null
TR-04-08
cs.DB cs.AI
null
The task of outlier detection is to find small groups of data objects that are exceptional when compared with rest large amount of data. Detection of such outliers is important for many applications such as fraud detection and customer migration. Most such applications are high dimensional domains in which the data may contain hundreds of dimensions. However, the outlier detection problem itself is not well defined and none of the existing definitions are widely accepted, especially in high dimensional space. In this paper, our first contribution is to propose a unified framework for outlier detection in high dimensional spaces from an ensemble-learning viewpoint. In our new framework, the outlying-ness of each data object is measured by fusing outlier factors in different subspaces using a combination function. Accordingly, we show that all existing researches on outlier detection can be regarded as special cases in the unified framework with respect to the set of subspaces considered and the type of combination function used. In addition, to demonstrate the usefulness of the ensemble-learning based outlier detection framework, we developed a very simple and fast algorithm, namely SOE1 (Subspace Outlier Ensemble using 1-dimensional Subspaces) in which only subspaces with one dimension is used for mining outliers from large categorical datasets. The SOE1 algorithm needs only two scans over the dataset and hence is very appealing in real data mining applications. Experimental results on real datasets and large synthetic datasets show that: (1) SOE1 has comparable performance with respect to those state-of-art outlier detection algorithms on identifying true outliers and (2) SOE1 can be an order of magnitude faster than one of the fastest outlier detection algorithms known so far.
[ { "version": "v1", "created": "Tue, 24 May 2005 02:41:51 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0505061
Dragos Trinca
Dragos Trinca
EAH: A New Encoder based on Adaptive Variable-length Codes
16 pages
null
null
null
cs.DS
null
Adaptive variable-length codes associate a variable-length codeword to the symbol being encoded depending on the previous symbols in the input string. This class of codes has been recently presented in [Dragos Trinca, arXiv:cs.DS/0505007] as a new class of non-standard variable-length codes. New algorithms for data compression, based on adaptive variable-length codes of order one and Huffman's algorithm, have been recently presented in [Dragos Trinca, ITCC 2004]. In this paper, we extend the work done so far by the following contributions: first, we propose an improved generalization of these algorithms, called EAHn. Second, we compute the entropy bounds for EAHn, using the well-known bounds for Huffman's algorithm. Third, we discuss implementation details and give reports of experimental results obtained on some well-known corpora. Finally, we describe a parallel version of EAHn using the PRAM model of computation.
[ { "version": "v1", "created": "Tue, 24 May 2005 06:53:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0505062
Ashutosh Saxena PhD Comp. Science
Ravi S. Veerubhotla, Ashutosh Saxena, V.P. Gulati, A.K. Pujari
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
28 pages
Journal of Universal Computer Science, vol. 11, no. 1 (2005), 122-149
null
null
cs.CR
null
This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discusses the construction of concatenated codes and realisation of erasure model through concatenated codes.
[ { "version": "v1", "created": "Tue, 24 May 2005 13:44:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Veerubhotla", "Ravi S.", "" ], [ "Saxena", "Ashutosh", "" ], [ "Gulati", "V. P.", "" ], [ "Pujari", "A. K.", "" ] ]
cs/0505065
Xiao-feng Xie
Xiao-Feng Xie, Wen-Jun Zhang, Zhi-Lian Yang
A dissipative particle swarm optimization
Proceedings of the 2002 Congress on Evolutionary Computation, 2002. Volume: 2, On page(s): 1456-1461
null
null
null
cs.NE
null
A dissipative particle swarm optimization is developed according to the self-organization of dissipative structure. The negative entropy is introduced to construct an opening dissipative system that is far-from-equilibrium so as to driving the irreversible evolution process with better fitness. The testing of two multimodal functions indicates it improves the performance effectively
[ { "version": "v1", "created": "Tue, 24 May 2005 14:54:06 GMT" }, { "version": "v2", "created": "Fri, 27 May 2005 04:41:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Xiao-Feng", "" ], [ "Zhang", "Wen-Jun", "" ], [ "Yang", "Zhi-Lian", "" ] ]
cs/0505066
Udayan Khurana
Udayan Khuarana
Decision Sort and its Parallel Implementation
5 pages, 3 tables, 1 figure, National Conference on Bioinformatics Computing'05
null
null
null
cs.DS
null
In this paper, a sorting technique is presented that takes as input a data set whose primary key domain is known to the sorting algorithm, and works with an time efficiency of O(n+k), where k is the primary key domain. It is shown that the algorithm has applicability over a wide range of data sets. Later, a parallel formulation of the same is proposed and its effectiveness is argued. Though this algorithm is applicable over a wide range of general data sets, it finds special application (much superior to others) in places where sorting information that arrives in parts and in cases where input data is huge in size.
[ { "version": "v1", "created": "Tue, 24 May 2005 15:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Khuarana", "Udayan", "" ] ]
cs/0505067
Xiao-feng Xie
Xiao-Feng Xie, Wen-Jun Zhang, De-Chun Bi
Optimizing semiconductor devices by self-organizing particle swarm
Congress on Evolutionary Computation, 2004. CEC2004. Volume: 2, On page(s): 2017- 2022 Vol.2
null
null
null
cs.NE
null
A self-organizing particle swarm is presented. It works in dissipative state by employing the small inertia weight, according to experimental analysis on a simplified model, which with fast convergence. Then by recognizing and replacing inactive particles according to the process deviation information of device parameters, the fluctuation is introduced so as to driving the irreversible evolution process with better fitness. The testing on benchmark functions and an application example for device optimization with designed fitness function indicates it improves the performance effectively.
[ { "version": "v1", "created": "Wed, 25 May 2005 01:28:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Xiao-Feng", "" ], [ "Zhang", "Wen-Jun", "" ], [ "Bi", "De-Chun", "" ] ]
cs/0505068
Xiao-feng Xie
Xiao-Feng Xie, Wen-Jun Zhang, De-Chun Bi
Handling equality constraints by adaptive relaxing rule for swarm algorithms
Congress on Evolutionary Computation, 2004. CEC2004. Volume: 2, On page(s): 2012- 2016 Vol.2
null
null
null
cs.NE
null
The adaptive constraints relaxing rule for swarm algorithms to handle with the problems with equality constraints is presented. The feasible space of such problems may be similiar to ridge function class, which is hard for applying swarm algorithms. To enter the solution space more easily, the relaxed quasi feasible space is introduced and shrinked adaptively. The experimental results on benchmark functions are compared with the performance of other algorithms, which show its efficiency.
[ { "version": "v1", "created": "Wed, 25 May 2005 01:32:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Xiao-Feng", "" ], [ "Zhang", "Wen-Jun", "" ], [ "Bi", "De-Chun", "" ] ]
cs/0505069
Xiao-feng Xie
Wen-Jun Zhang, Xiao-Feng Xie, De-Chun Bi
Handling boundary constraints for numerical optimization by particle swarm flying in periodic search space
Congress on Evolutionary Computation, 2004. CEC2004. Volume: 2, On page(s): 2307- 2311 Vol.2
null
null
null
cs.NE
null
The periodic mode is analyzed together with two conventional boundary handling modes for particle swarm. By providing an infinite space that comprises periodic copies of original search space, it avoids possible disorganizing of particle swarm that is induced by the undesired mutations at the boundary. The results on benchmark functions show that particle swarm with periodic mode is capable of improving the search performance significantly, by compared with that of conventional modes and other algorithms.
[ { "version": "v1", "created": "Wed, 25 May 2005 01:36:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Wen-Jun", "" ], [ "Xie", "Xiao-Feng", "" ], [ "Bi", "De-Chun", "" ] ]
cs/0505070
Xiao-feng Xie
Xiao-Feng Xie, Wen-Jun Zhang
SWAF: Swarm Algorithm Framework for Numerical Optimization
Genetic and Evolutionary Computation Conference (GECCO), Part I, 2004: 238-250 (LNCS 3102)
null
null
null
cs.NE
null
A swarm algorithm framework (SWAF), realized by agent-based modeling, is presented to solve numerical optimization problems. Each agent is a bare bones cognitive architecture, which learns knowledge by appropriately deploying a set of simple rules in fast and frugal heuristics. Two essential categories of rules, the generate-and-test and the problem-formulation rules, are implemented, and both of the macro rules by simple combination and subsymbolic deploying of multiple rules among them are also studied. Experimental results on benchmark problems are presented, and performance comparison between SWAF and other existing algorithms indicates that it is efficiently.
[ { "version": "v1", "created": "Wed, 25 May 2005 01:39:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Xiao-Feng", "" ], [ "Zhang", "Wen-Jun", "" ] ]
cs/0505071
Taneli Mielik\"ainen
Taneli Mielik\"ainen
Summarization Techniques for Pattern Collections in Data Mining
PhD Thesis, Department of Computer Science, University of Helsinki
null
null
A-2005-1, Department of Computer Science, University of Helsinki
cs.DB cs.AI cs.DS
null
Discovering patterns from data is an important task in data mining. There exist techniques to find large collections of many kinds of patterns from data very efficiently. A collection of patterns can be regarded as a summary of the data. A major difficulty with patterns is that pattern collections summarizing the data well are often very large. In this dissertation we describe methods for summarizing pattern collections in order to make them also more understandable. More specifically, we focus on the following themes: 1) Quality value simplifications. 2) Pattern orderings. 3) Pattern chains and antichains. 4) Change profiles. 5) Inverse pattern discovery.
[ { "version": "v1", "created": "Thu, 26 May 2005 04:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Mielikäinen", "Taneli", "" ] ]
cs/0505074
Roel Vercammen
Stijn Dekeyser, Jan Hidders, Jan Paredaens, Roel Vercammen
Instance-Independent View Serializability for Semistructured Databases
null
null
null
null
cs.DB
null
Semistructured databases require tailor-made concurrency control mechanisms since traditional solutions for the relational model have been shown to be inadequate. Such mechanisms need to take full advantage of the hierarchical structure of semistructured data, for instance allowing concurrent updates of subtrees of, or even individual elements in, XML documents. We present an approach for concurrency control which is document-independent in the sense that two schedules of semistructured transactions are considered equivalent if they are equivalent on all possible documents. We prove that it is decidable in polynomial time whether two given schedules in this framework are equivalent. This also solves the view serializability for semistructured schedules polynomially in the size of the schedule and exponentially in the number of transactions.
[ { "version": "v1", "created": "Thu, 26 May 2005 09:51:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Dekeyser", "Stijn", "" ], [ "Hidders", "Jan", "" ], [ "Paredaens", "Jan", "" ], [ "Vercammen", "Roel", "" ] ]
cs/0505075
Yongxi Cheng
Yongxi Cheng, Xi Chen, Yiqun Lisa Yin
On Searching a Table Consistent with Division Poset
16 pages, no figure; same results, representation improved, add references
null
null
null
cs.DM cs.DS
null
Suppose $P_n=\{1,2,...,n\}$ is a partially ordered set with the partial order defined by divisibility, that is, for any two distinct elements $i,j\in P_n$ satisfying $i$ divides $j$, $i<_{P_n} j$. A table $A_n=\{a_i|i=1,2,...,n\}$ of distinct real numbers is said to be \emph{consistent} with $P_n$, provided for any two distinct elements $i,j\in \{1,2,...,n\}$ satisfying $i$ divides $j$, $a_i< a_j$. Given an real number $x$, we want to determine whether $x\in A_n$, by comparing $x$ with as few entries of $A_n$ as possible. In this paper we investigate the complexity $\tau(n)$, measured in the number of comparisons, of the above search problem. We present a $\frac{55n}{72}+O(\ln^2 n)$ search algorithm for $A_n$ and prove a lower bound $({3/4}+{17/2160})n+O(1)$ on $\tau(n)$ by using an adversary argument.
[ { "version": "v1", "created": "Thu, 26 May 2005 17:45:48 GMT" }, { "version": "v2", "created": "Thu, 6 Apr 2006 04:46:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheng", "Yongxi", "" ], [ "Chen", "Xi", "" ], [ "Yin", "Yiqun Lisa", "" ] ]
cs/0505076
Marats Golovkins
Marats Golovkins
On the Solution of Graph Isomorphism by Dynamical Algorithms
20 pages
null
null
null
cs.CC
null
In the recent years, several polynomial algorithms of a dynamical nature have been proposed to address the graph isomorphism problem. In this paper we propose a generalization of an approach exposed in cond-mat/0209112 and find that this dynamical algorithm is covered by a combinatorial approach. It is possible to infer that polynomial dynamical algorithms addressing graph isomorphism are covered by suitable polynomial combinatorial approaches and thus are tackled by the same weaknesses as the last ones.
[ { "version": "v1", "created": "Fri, 27 May 2005 00:09:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Golovkins", "Marats", "" ] ]
cs/0505077
Sagi Snir
Shlomo Moran and Sagi Snir
Efficient Approximation of Convex Recolorings
null
null
null
null
cs.DS
null
A coloring of a tree is convex if the vertices that pertain to any color induce a connected subtree; a partial coloring (which assigns colors to some of the vertices) is convex if it can be completed to a convex (total) coloring. Convex coloring of trees arise in areas such as phylogenetics, linguistics, etc. eg, a perfect phylogenetic tree is one in which the states of each character induce a convex coloring of the tree. Research on perfect phylogeny is usually focused on finding a tree so that few predetermined partial colorings of its vertices are convex. When a coloring of a tree is not convex, it is desirable to know "how far" it is from a convex one. In [19], a natural measure for this distance, called the recoloring distance was defined: the minimal number of color changes at the vertices needed to make the coloring convex. This can be viewed as minimizing the number of "exceptional vertices" w.r.t. to a closest convex coloring. The problem was proved to be NP-hard even for colored string. In this paper we continue the work of [19], and present a 2-approximation algorithm of convex recoloring of strings whose running time O(cn), where c is the number of colors and n is the size of the input, and an O(cn^2)-time 3-approximation algorithm for convex recoloring of trees.
[ { "version": "v1", "created": "Fri, 27 May 2005 23:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Moran", "Shlomo", "" ], [ "Snir", "Sagi", "" ] ]
cs/0505079
Boris Ryabko
Boris Ryabko and Jaakko Astola and Alex Gammerman
Application of Kolmogorov complexity and universal codes to identity testing and nonparametric testing of serial independence for time series
submitted
null
null
null
cs.CC
null
We show that Kolmogorov complexity and such its estimators as universal codes (or data compression methods) can be applied for hypotheses testing in a framework of classical mathematical statistics. The methods for identity testing and nonparametric testing of serial independence for time series are suggested.
[ { "version": "v1", "created": "Sun, 29 May 2005 17:12:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Boris", "" ], [ "Astola", "Jaakko", "" ], [ "Gammerman", "Alex", "" ] ]
cs/0505081
Gilles Kassel
Sabine Bruaux (LaRIA), Gilles Kassel (LaRIA), Gilles Morel (LaRIA)
An ontological approach to the construction of problem-solving models
null
null
null
LRR 2005-03
cs.AI
null
Our ongoing work aims at defining an ontology-centered approach for building expertise models for the CommonKADS methodology. This approach (which we have named "OntoKADS") is founded on a core problem-solving ontology which distinguishes between two conceptualization levels: at an object level, a set of concepts enable us to define classes of problem-solving situations, and at a meta level, a set of meta-concepts represent modeling primitives. In this article, our presentation of OntoKADS will focus on the core ontology and, in particular, on roles - the primitive situated at the interface between domain knowledge and reasoning, and whose ontological status is still much debated. We first propose a coherent, global, ontological framework which enables us to account for this primitive. We then show how this novel characterization of the primitive allows definition of new rules for the construction of expertise models.
[ { "version": "v1", "created": "Mon, 30 May 2005 13:42:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Bruaux", "Sabine", "", "LaRIA" ], [ "Kassel", "Gilles", "", "LaRIA" ], [ "Morel", "Gilles", "", "LaRIA" ] ]
cs/0505083
Vladimir Vovk
Vladimir Vovk, Akimichi Takemura, Glenn Shafer
Defensive forecasting
15 pages, 2 figures, to appear in the AIStats'2005 electronic proceedings
Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, 2005, pages 365--372.
null
null
cs.LG cs.AI
null
We consider how to make probability forecasts of binary labels. Our main mathematical result is that for any continuous gambling strategy used for detecting disagreement between the forecasts and the actual labels, there exists a forecasting strategy whose forecasts are ideal as far as this gambling strategy is concerned. A forecasting strategy obtained in this way from a gambling strategy demonstrating a strong law of large numbers is simplified and studied empirically.
[ { "version": "v1", "created": "Mon, 30 May 2005 21:12:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ], [ "Takemura", "Akimichi", "" ], [ "Shafer", "Glenn", "" ] ]
cs/0505084
Valentin Brimkov
Valentin Brimkov, Angelo Maimone, Giorgio Nordo
An explicit formula for the number of tunnels in digital objects
9 pages, 4 figures
null
null
null
cs.DM cs.CG cs.CV
null
An important concept in digital geometry for computer imagery is that of tunnel. In this paper we obtain a formula for the number of tunnels as a function of the number of the object vertices, pixels, holes, connected components, and 2x2 grid squares. It can be used to test for tunnel-freedom a digital object, in particular a digital curve.
[ { "version": "v1", "created": "Tue, 31 May 2005 00:44:16 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 23:28:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Brimkov", "Valentin", "" ], [ "Maimone", "Angelo", "" ], [ "Nordo", "Giorgio", "" ] ]
cs/0505087
Michael Soltys
Michael Soltys
Feasible Proofs of Matrix Properties with Csanky's Algorithm
null
null
null
null
cs.LO
null
We show that Csanky's fast parallel algorithm for computing the characteristic polynomial of a matrix can be formalized in the logical theory LAP, and can be proved correct in LAP from the principle of linear independence. LAP is a natural theory for reasoning about linear algebra introduced by Cook and Soltys. Further, we show that several principles of matrix algebra, such as linear independence or the Cayley-Hamilton Theorem, can be shown equivalent in the logical theory QLA. Applying the separation between complexity classes AC^0[2] contained in DET(GF(2)), we show that these principles are in fact not provable in QLA. In a nutshell, we show that linear independence is ``all there is'' to elementary linear algebra (from a proof complexity point of view), and furthermore, linear independence cannot be proved trivially (again, from a proof complexity point of view).
[ { "version": "v1", "created": "Tue, 31 May 2005 11:13:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Soltys", "Michael", "" ] ]
cs/0506001
Dmitry Mogilevsky
Dmitry Mogilevsky, Sean Keller
SafeMPI - Extending MPI for Byzantine Error Detection on Parallel Clusters
null
null
null
null
cs.DC
null
Modern high-performance computing relies heavily on the use of commodity processors arranged together in clusters. These clusters consist of individual nodes (typically off-the-shelf single or dual processor machines) connected together with a high speed interconnect. Using cluster computation has many benefits, but also carries the liability of being failure prone due to the sheer number of components involved. Many effective solutions have been proposed to aid failure recovery in clusters, their one significant downside being the failure models they support. Most of the work in the area has focused on detecting and correcting fail-stop errors. We propose a system that will also detect more general error models, such as Byzantine errors, thus allowing existing failure recovery methods to handle them correctly.
[ { "version": "v1", "created": "Tue, 31 May 2005 21:05:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ], [ "Keller", "Sean", "" ] ]
cs/0506002
Angela Bonifati
Angela Bonifati (Icar CNR, Italy), Elaine Qing Chang (UBC, Canada), Terence Ho (UBC, Canada), and Laks V.S. Lakshmanan (UBC, Canada)
HepToX: Heterogeneous Peer to Peer XML Databases
11 pages plus cover page
null
null
UBC TR-2005-15
cs.DB
null
We study a collection of heterogeneous XML databases maintaining similar and related information, exchanging data via a peer to peer overlay network. In this setting, a mediated global schema is unrealistic. Yet, users/applications wish to query the databases via one peer using its schema. We have recently developed HepToX, a P2P Heterogeneous XML database system. A key idea is that whenever a peer enters the system, it establishes an acquaintance with a small number of peer databases, possibly with different schema. The peer administrator provides correspondences between the local schema and the acquaintance schema using an informal and intuitive notation of arrows and boxes. We develop a novel algorithm that infers a set of precise mapping rules between the schemas from these visual annotations. We pin down a semantics of query translation given such mapping rules, and present a novel query translation algorithm for a simple but expressive fragment of XQuery, that employs the mapping rules in either direction. We show the translation algorithm is correct. Finally, we demonstrate the utility and scalability of our ideas and algorithms with a detailed set of experiments on top of the Emulab, a large scale P2P network emulation testbed.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 01:30:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Bonifati", "Angela", "", "Icar CNR, Italy" ], [ "Chang", "Elaine Qing", "", "UBC, Canada" ], [ "Ho", "Terence", "", "UBC, Canada" ], [ "Lakshmanan", "Laks V. S.", "", "UBC, Canada" ] ]
cs/0506003
Andrea Pasquinucci
Andrea Pasquinucci
Authentication and routing in simple Quantum Key Distribution networks
12 pages, latex, 6 eps figures
null
null
null
cs.NI cs.CR quant-ph
null
We consider various issues which arise as soon as one tries to practically implement simple networks of quantum relays for QKD. In particular we discuss authentication and routing which are essential ingredients of any QKD network. This paper aims to address some gaps between quantum and networking aspects of QKD networks usually reserved to specialist in physics and computer science respectively.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 10:37:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pasquinucci", "Andrea", "" ] ]
cs/0506004
Vladimir Vovk
Vladimir Vovk
Non-asymptotic calibration and resolution
20 pages
null
null
null
cs.LG
null
We analyze a new algorithm for probability forecasting of binary observations on the basis of the available data, without making any assumptions about the way the observations are generated. The algorithm is shown to be well calibrated and to have good resolution for long enough sequences of observations and for a suitable choice of its parameter, a kernel on the Cartesian product of the forecast space $[0,1]$ and the data space. Our main results are non-asymptotic: we establish explicit inequalities, shown to be tight, for the performance of the algorithm.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 14:03:20 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2005 16:15:54 GMT" }, { "version": "v3", "created": "Sun, 21 Aug 2005 19:55:55 GMT" }, { "version": "v4", "created": "Sat, 1 Jul 2006 13:46:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0506005
Neng-Fa Zhou
Neng-Fa Zhou
Programming Finite-Domain Constraint Propagators in Action Rules
null
TPLP Vol 5(4&5) 2005
null
null
cs.PL
null
In this paper, we propose a new language, called AR ({\it Action Rules}), and describe how various propagators for finite-domain constraints can be implemented in it. An action rule specifies a pattern for agents, an action that the agents can carry out, and an event pattern for events that can activate the agents. AR combines the goal-oriented execution model of logic programming with the event-driven execution model. This hybrid execution model facilitates programming constraint propagators. A propagator for a constraint is an agent that maintains the consistency of the constraint and is activated by the updates of the domain variables in the constraint. AR has a much stronger descriptive power than {\it indexicals}, the language widely used in the current finite-domain constraint systems, and is flexible for implementing not only interval-consistency but also arc-consistency algorithms. As examples, we present a weak arc-consistency propagator for the {\tt all\_distinct} constraint and a hybrid algorithm for n-ary linear equality constraints. B-Prolog has been extended to accommodate action rules. Benchmarking shows that B-Prolog as a CLP(FD) system significantly outperforms other CLP(FD) systems.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 03:49:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Neng-Fa", "" ] ]
cs/0506007
Vladimir Vovk
Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer
Defensive forecasting for linear protocols
16 pages
null
null
null
cs.LG
null
We consider a general class of forecasting protocols, called "linear protocols", and discuss several important special cases, including multi-class forecasting. Forecasting is formalized as a game between three players: Reality, whose role is to generate observations; Forecaster, whose goal is to predict the observations; and Skeptic, who tries to make money on any lack of agreement between Forecaster's predictions and the actual observations. Our main mathematical result is that for any continuous strategy for Skeptic in a linear protocol there exists a strategy for Forecaster that does not allow Skeptic's capital to grow. This result is a meta-theorem that allows one to transform any continuous law of probability in a linear protocol into a forecasting strategy whose predictions are guaranteed to satisfy this law. We apply this meta-theorem to a weak law of large numbers in Hilbert spaces to obtain a version of the K29 prediction algorithm for linear protocols and show that this version also satisfies the attractive properties of proper calibration and resolution under a suitable choice of its kernel parameter, with no assumptions about the way the data is generated.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 13:26:43 GMT" }, { "version": "v2", "created": "Sat, 24 Sep 2005 16:55:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ], [ "Nouretdinov", "Ilia", "" ], [ "Takemura", "Akimichi", "" ], [ "Shafer", "Glenn", "" ] ]
cs/0506008
Felix Klaedtke
Felix Klaedtke
Bounds on the Automata Size for Presburger Arithmetic
null
null
null
null
cs.LO
null
Automata provide a decision procedure for Presburger arithmetic. However, until now only crude lower and upper bounds were known on the sizes of the automata produced by this approach. In this paper, we prove an upper bound on the the number of states of the minimal deterministic automaton for a Presburger arithmetic formula. This bound depends on the length of the formula and the quantifiers occurring in the formula. The upper bound is established by comparing the automata for Presburger arithmetic formulas with the formulas produced by a quantifier elimination method. We also show that our bound is tight, even for nondeterministic automata. Moreover, we provide optimal automata constructions for linear equations and inequations.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 15:11:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Klaedtke", "Felix", "" ] ]
cs/0506010
Simeon Warner
Simeon Warner (Cornell University)
The OAI Data-Provider Registration and Validation Service
null
null
null
null
cs.DL
null
I present a summary of recent use of the Open Archives Initiative (OAI) registration and validation services for data-providers. The registration service has seen a steady stream of registrations since its launch in 2002, and there are now over 220 registered repositories. I examine the validation logs to produce a breakdown of reasons why repositories fail validation. This breakdown highlights some common problems and will be used to guide work to improve the validation service.
[ { "version": "v1", "created": "Fri, 3 Jun 2005 17:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Warner", "Simeon", "", "Cornell University" ] ]
cs/0506014
Sebastian Maneth
Joost Engelfriet and Sebastian Maneth
The Equivalence Problem for Deterministic MSO Tree Transducers is Decidable
null
null
null
null
cs.LO
null
It is decidable for deterministic MSO definable graph-to-string or graph-to-tree transducers whether they are equivalent on a context-free set of graphs.
[ { "version": "v1", "created": "Mon, 6 Jun 2005 07:05:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Engelfriet", "Joost", "" ], [ "Maneth", "Sebastian", "" ] ]
cs/0506015
Raju Gangishetti
Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
Submitted to National Workshop on Cryptology 2005, India
null
null
null
cs.CR
null
To remove key escrow problem and avoid the need of secure channel in ID based cryptosystem Lee et al. proposed a secure key issuing protocol. However we show that it suffers from impersonation, insider attacks and incompetency of the key privacy authorities. We also cryptanalyze Sui et al.'s separable and anonymous key issuing protocol.
[ { "version": "v1", "created": "Mon, 6 Jun 2005 09:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Gangishetti", "Raju", "" ], [ "Gorantla", "M. Choudary", "" ], [ "Das", "Manik Lal", "" ], [ "Saxena", "Ashutosh", "" ] ]
cs/0506019
Vicky Choi
Vicky Choi, Navin Goyal
An Efficient Approximation Algorithm for Point Pattern Matching Under Noise
18 pages
null
null
null
cs.CV cs.CG
null
Point pattern matching problems are of fundamental importance in various areas including computer vision and structural bioinformatics. In this paper, we study one of the more general problems, known as LCP (largest common point set problem): Let $\PP$ and $\QQ$ be two point sets in $\mathbb{R}^3$, and let $\epsilon \geq 0$ be a tolerance parameter, the problem is to find a rigid motion $\mu$ that maximizes the cardinality of subset $\II$ of $Q$, such that the Hausdorff distance $\distance(\PP,\mu(\II)) \leq \epsilon$. We denote the size of the optimal solution to the above problem by $\LCP(P,Q)$. The problem is called exact-LCP for $\epsilon=0$, and \tolerant-LCP when $\epsilon>0$ and the minimum interpoint distance is greater than $2\epsilon$. A $\beta$-distance-approximation algorithm for tolerant-LCP finds a subset $I \subseteq \QQ$ such that $|I|\geq \LCP(P,Q)$ and $\distance(\PP,\mu(\II)) \leq \beta \epsilon$ for some $\beta \ge 1$. This paper has three main contributions. (1) We introduce a new algorithm, called {\DA}, which gives the fastest known deterministic 4-distance-approximation algorithm for \tolerant-LCP. (2) For the exact-LCP, when the matched set is required to be large, we give a simple sampling strategy that improves the running times of all known deterministic algorithms, yielding the fastest known deterministic algorithm for this problem. (3) We use expander graphs to speed-up the \DA algorithm for \tolerant-LCP when the size of the matched set is required to be large, at the expense of approximation in the matched set size. Our algorithms also work when the transformation $\mu$ is allowed to be scaling transformation.
[ { "version": "v1", "created": "Tue, 7 Jun 2005 17:41:53 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2005 21:33:55 GMT" }, { "version": "v3", "created": "Wed, 21 Sep 2005 15:43:28 GMT" }, { "version": "v4", "created": "Sun, 2 Jul 2006 22:19:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Vicky", "" ], [ "Goyal", "Navin", "" ] ]
cs/0506023
Alexandre d'Aspremont
Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui
Sparse Covariance Selection via Robust Maximum Likelihood Estimation
Submitted to NIPS 2005
null
null
null
cs.CE cs.AI
null
We address a problem of covariance selection, where we seek a trade-off between a high likelihood against the number of non-zero elements in the inverse covariance matrix. We solve a maximum likelihood problem with a penalty term given by the sum of absolute values of the elements of the inverse covariance matrix, and allow for imposing bounds on the condition number of the solution. The problem is directly amenable to now standard interior-point algorithms for convex optimization, but remains challenging due to its size. We first give some results on the theoretical computational complexity of the problem, by showing that a recent methodology for non-smooth convex optimization due to Nesterov can be applied to this problem, to greatly improve on the complexity estimate given by interior-point algorithms. We then examine two practical algorithms aimed at solving large-scale, noisy (hence dense) instances: one is based on a block-coordinate descent approach, where columns and rows are updated sequentially, another applies a dual version of Nesterov's method.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 21:08:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Banerjee", "Onureena", "" ], [ "d'Aspremont", "Alexandre", "" ], [ "Ghaoui", "Laurent El", "" ] ]
cs/0506024
Marko Antonio Rodriguez
Marko A. Rodriguez
The Hyper-Cortex of Human Collective-Intelligence Systems
ECCO Working Paper 06-2005 (17-pages) This paper will be shortened to just the multi-layered digital-library hyper-cortex
null
null
null
cs.CY cs.AI cs.DL cs.NE
null
Individual-intelligence research, from a neurological perspective, discusses the hierarchical layers of the cortex as a structure that performs conceptual abstraction and specification. This theory has been used to explain how motor-cortex regions responsible for different behavioral modalities such as writing and speaking can be utilized to express the same general concept represented higher in the cortical hierarchy. For example, the concept of a dog, represented across a region of high-level cortical-neurons, can either be written or spoken about depending on the individual's context. The higher-layer cortical areas project down the hierarchy, sending abstract information to specific regions of the motor-cortex for contextual implementation. In this paper, this idea is expanded to incorporate collective-intelligence within a hyper-cortical construct. This hyper-cortex is a multi-layered network used to represent abstract collective concepts. These ideas play an important role in understanding how collective-intelligence systems can be engineered to handle problem abstraction and solution specification. Finally, a collection of common problems in the scientific community are solved using an artificial hyper-cortex generated from digital-library metadata.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 21:33:44 GMT" }, { "version": "v2", "created": "Thu, 9 Jun 2005 21:14:29 GMT" }, { "version": "v3", "created": "Fri, 17 Jun 2005 19:24:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
cs/0506026
Rada Chirkova
Rada Chirkova and Michael R. Genesereth
Database Reformulation with Integrity Constraints (extended abstract)
In the proceedings of the the Logic and Computational Complexity Workshop, in conjunction with of the Logic in Computer Science Conference (LICS), Chicago, June 2005
null
null
null
cs.DB
null
In this paper we study the problem of reducing the evaluation costs of queries on finite databases in presence of integrity constraints, by designing and materializing views. Given a database schema, a set of queries defined on the schema, a set of integrity constraints, and a storage limit, to find a solution to this problem means to find a set of views that satisfies the storage limit, provides equivalent rewritings of the queries under the constraints (this requirement is weaker than equivalence in the absence of constraints), and reduces the total costs of evaluating the queries. This problem, database reformulation, is important for many applications, including data warehousing and query optimization. We give complexity results and algorithms for database reformulation in presence of constraints, for conjunctive queries, views, and rewritings and for several types of constraints, including functional and inclusion dependencies. To obtain better complexity results, we introduce an unchase technique, which reduces the problem of query equivalence under constraints to equivalence in the absence of constraints without increasing query size.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 22:03:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Chirkova", "Rada", "" ], [ "Genesereth", "Michael R.", "" ] ]
cs/0506027
Travis Gagie
Travis Gagie
Sorting a Low-Entropy Sequence
null
null
null
null
cs.DS
null
We give the first sorting algorithm with bounds in terms of higher-order entropies: let $S$ be a sequence of length $m$ containing $n$ distinct elements and let (H_\ell (S)) be the $\ell$th-order empirical entropy of $S$, with (n^{\ell + 1} \log n \in O (m)); our algorithm sorts $S$ using ((H_\ell (S) + O (1)) m) comparisons.
[ { "version": "v1", "created": "Wed, 8 Jun 2005 22:15:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Gagie", "Travis", "" ] ]
cs/0506030
Jonathan Ben-Naim
Jonathan Ben-Naim (LIF)
Preferential and Preferential-discriminative Consequence relations
team Logic and Complexity, written in 2004-2005
Journal of Logic and Computation 15 (2005) number 3, pp. 263-294
10.1093/logcom/exi013
null
cs.AI cs.LO
null
The present paper investigates consequence relations that are both non-monotonic and paraconsistent. More precisely, we put the focus on preferential consequence relations, i.e. those relations that can be defined by a binary preference relation on states labelled by valuations. We worked with a general notion of valuation that covers e.g. the classical valuations as well as certain kinds of many-valued valuations. In the many-valued cases, preferential consequence relations are paraconsistant (in addition to be non-monotonic), i.e. they are capable of drawing reasonable conclusions which contain contradictions. The first purpose of this paper is to provide in our general framework syntactic characterizations of several families of preferential relations. The second and main purpose is to provide, again in our general framework, characterizations of several families of preferential discriminative consequence relations. They are defined exactly as the plain version, but any conclusion such that its negation is also a conclusion is rejected (these relations bring something new essentially in the many-valued cases).
[ { "version": "v1", "created": "Thu, 9 Jun 2005 12:53:47 GMT" }, { "version": "v2", "created": "Mon, 6 Feb 2006 12:19:55 GMT" }, { "version": "v3", "created": "Wed, 1 Mar 2006 14:47:04 GMT" }, { "version": "v4", "created": "Mon, 19 Jun 2006 08:17:49 GMT" }, { "version": "v5", "created": "Tue, 3 Apr 2007 14:52:32 GMT" }, { "version": "v6", "created": "Sun, 8 Apr 2007 15:04:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ben-Naim", "Jonathan", "", "LIF" ] ]
cs/0506031
Laurent Henocque
Patrick Albert, Laurent Henocque, Mathias Kleiner
A Constrained Object Model for Configuration Based Workflow Composition
This is an extended version of the article published at BPM'05, Third International Conference on Business Process Management, Nancy France
null
null
null
cs.AI
null
Automatic or assisted workflow composition is a field of intense research for applications to the world wide web or to business process modeling. Workflow composition is traditionally addressed in various ways, generally via theorem proving techniques. Recent research observed that building a composite workflow bears strong relationships with finite model search, and that some workflow languages can be defined as constrained object metamodels . This lead to consider the viability of applying configuration techniques to this problem, which was proven feasible. Constrained based configuration expects a constrained object model as input. The purpose of this document is to formally specify the constrained object model involved in ongoing experiments and research using the Z specification language.
[ { "version": "v1", "created": "Thu, 9 Jun 2005 14:57:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Albert", "Patrick", "" ], [ "Henocque", "Laurent", "" ], [ "Kleiner", "Mathias", "" ] ]
cs/0506032
Shankar Ramachandran Mr
R. Shankar
Framework for Hopfield Network based Adaptive routing - A design level approach for adaptive routing phenomena with Artificial Neural Network
(13 pages, 7 figures, code)
null
null
null
cs.NE
null
Routing, as a basic phenomena, by itself, has got umpteen scopes to analyse, discuss and arrive at an optimal solution for the technocrats over years. Routing is analysed based on many factors; few key constraints that decide the factors are communication medium, time dependency, information source nature. Parametric routing has become the requirement of the day, with some kind of adaptation to the underlying network environment. Satellite constellations, particularly LEO satellite constellations have become a reality in operational to have a non-breaking voice/data communication around the world.Routing in these constellations has to be treated in a non conventional way, taking their network geometry into consideration. One of the efficient methods of optimization is putting Neural Networks to use. Few Artificial Neural Network models are very much suitable for the adaptive control mechanism, by their nature of network arrangement. One such efficient model is Hopfield Network model. This paper is an attempt to design a framework for the Hopfield Network based adaptive routing phenomena in satellite constellations.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 05:30:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Shankar", "R.", "" ] ]
cs/0506034
Srikumar Venugopal
Srikumar Venugopal, Rajkumar Buyya and Kotagiri Ramamohanarao
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing
46 pages, 16 figures, Technical Report
null
null
GRIDS-TR-2005-3
cs.DC cs.CE
null
Data Grids have been adopted as the platform for scientific communities that need to share, access, transport, process and manage large data collections distributed worldwide. They combine high-end computing technologies with high-performance networking and wide-area storage management techniques. In this paper, we discuss the key concepts behind Data Grids and compare them with other data sharing and distribution paradigms such as content delivery networks, peer-to-peer networks and distributed databases. We then provide comprehensive taxonomies that cover various aspects of architecture, data transportation, data replication and resource allocation and scheduling. Finally, we map the proposed taxonomy to various Data Grid systems not only to validate the taxonomy but also to identify areas for future exploration. Through this taxonomy, we aim to categorise existing systems to better understand their goals and their methodology. This would help evaluate their applicability for solving similar problems. This taxonomy also provides a "gap analysis" of this area through which researchers can potentially identify new issues for investigation. Finally, we hope that the proposed taxonomy and mapping also helps to provide an easy way for new practitioners to understand this complex area of research.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 10:59:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Venugopal", "Srikumar", "" ], [ "Buyya", "Rajkumar", "" ], [ "Ramamohanarao", "Kotagiri", "" ] ]
cs/0506035
Michel Dagenais
Jerome Collin (Computer Engineering, Ecole Polytechnique de Montreal), Michel Dagenais (Computer Engineering, Ecole Polytechnique de Montreal)
Fast Recompilation of Object Oriented Modules
null
null
null
null
cs.PL
null
Once a program file is modified, the recompilation time should be minimized, without sacrificing execution speed or high level object oriented features. The recompilation time is often a problem for the large graphical interactive distributed applications tackled by modern OO languages. A compilation server and fast code generator were developed and integrated with the SRC Modula-3 compiler and Linux ELF dynamic linker. The resulting compilation and recompilation speedups are impressive. The impact of different language features, processor speed, and application size are discussed.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 15:28:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Collin", "Jerome", "", "Computer Engineering, Ecole Polytechnique de Montreal" ], [ "Dagenais", "Michel", "", "Computer Engineering, Ecole Polytechnique de Montreal" ] ]
cs/0506038
Wen Ding
Wen Ding & William Yurcik
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market
16 pages, 2 figures
null
null
null
cs.GT
null
On information security outsourcing market, an important reason that firms do not want to let outside firms(usually called MSSPs-Managed Security Service Providers) to take care of their security need is that they worry about service quality MSSPs provide because they cannot monitor effort of the MSSPs. Since MSSPs action is unobservable to buyers, MSSPs can lower cost by working less hard than required in the contract and get higher profit. In the asymmetric information literature, this possible secret shirking behavior is termed as moral hazard problem. This paper considers a game theoretic economic framework to show that under information asymmetry, an optimal contract can be designed so that MSSPs will stick to their promised effort level. We also show that the optimal contract should be performance-based, i.e., payment to MSSP should base on performance of MSSP's security service period by period. For comparison, we also showed that if the moral hazard problem does not exist, the optimal contract does not depend on MSSP's performance. A contract that specifies constant payment to MSSP will be optimal. Besides these, we show that for no matter under perfect information scenario or imperfect information scenario, the higher the transaction cost is, the lower payment to MSSPs will be.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 23:58:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Wen", "" ], [ "Yurcik", "William", "" ] ]
cs/0506041
Vladimir Vovk
Vladimir Vovk
Competitive on-line learning with a convex loss function
26 pages
null
null
null
cs.LG cs.AI
null
We consider the problem of sequential decision making under uncertainty in which the loss caused by a decision depends on the following binary observation. In competitive on-line learning, the goal is to design decision algorithms that are almost as good as the best decision rules in a wide benchmark class, without making any assumptions about the way the observations are generated. However, standard algorithms in this area can only deal with finite-dimensional (often countable) benchmark classes. In this paper we give similar results for decision rules ranging over an arbitrary reproducing kernel Hilbert space. For example, it is shown that for a wide class of loss functions (including the standard square, absolute, and log loss functions) the average loss of the master algorithm, over the first $N$ observations, does not exceed the average loss of the best decision rule with a bounded norm plus $O(N^{-1/2})$. Our proof technique is very different from the standard ones and is based on recent results about defensive forecasting. Given the probabilities produced by a defensive forecasting algorithm, which are known to be well calibrated and to have good resolution in the long run, we use the expected loss minimization principle to find a suitable decision.
[ { "version": "v1", "created": "Sat, 11 Jun 2005 18:11:22 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2005 16:49:33 GMT" }, { "version": "v3", "created": "Fri, 2 Sep 2005 14:27:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0506046
Bernard Jacquemin
Bernard Jacquemin (ISC)
Dictionaries merger for text expansion in question answering
4 pp
Proceedings of COLING 2004 (2004) 1398
null
null
cs.DL
null
This paper presents an original way to add new data in a reference dictionary from several other lexical resources, without loosing any consistence. This operation is carried in order to get lexical information classified by the sense of the entry. This classification makes it possible to enrich utterances (in QA: the queries) following the meaning, and to reduce noise. An analysis of the experienced problems shows the interest of this method, and insists on the points that have to be tackled.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:36:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
cs/0506047
Bernard Jacquemin
Bernard Jacquemin (ISC)
Analyse et expansion des textes en question-r\'{e}ponse
11 pp
Le poids des mots. Actes des 7es journ\'{e}es internationales d'Analyse statistique des Donn\'{e}es Textuelles (2004) 1219
null
null
cs.IR
null
This paper presents an original methodology to consider question answering. We noticed that query expansion is often incorrect because of a bad understanding of the question. But the automatic good understanding of an utterance is linked to the context length, and the question are often short. This methodology proposes to analyse the documents and to construct an informative structure from the results of the analysis and from a semantic text expansion. The linguistic analysis identifies words (tokenization and morphological analysis), links between words (syntactic analysis) and word sense (semantic disambiguation). The text expansion adds to each word the synonyms matching its sense and replaces the words in the utterances by derivatives, modifying the syntactic schema if necessary. In this way, whatever enrichment may be, the text keeps the same meaning, but each piece of information matches many realisations. The questioning method consists in constructing a local informative structure without enrichment, and matches it with the documentary structure. If a sentence in the informative structure matches the question structure, this sentence is the answer to the question.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ] ]
cs/0506048
Bernard Jacquemin
Bernard Jacquemin (ISC), Caroline Brun, Claude Roux
Enriching a Text by Semantic Disambiguation for Information Extraction
7 pp
LREC 2002 Workshop Proceedings "Using semantics for informaiton retrival and filtering" (2002) 45-51
null
null
cs.IR
null
External linguistic resources have been used for a very long time in information extraction. These methods enrich a document with data that are semantically equivalent, in order to improve recall. For instance, some of these methods use synonym dictionaries. These dictionaries enrich a sentence with words that have a similar meaning. However, these methods present some serious drawbacks, since words are usually synonyms only in restricted contexts. The method we propose here consists of using word sense disambiguation rules (WSD) to restrict the selection of synonyms to only these that match a specific syntactico-semantic context. We show how WSD rules are built and how information extraction techniques can benefit from the application of these rules.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 16:44:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacquemin", "Bernard", "", "ISC" ], [ "Brun", "Caroline", "" ], [ "Roux", "Claude", "" ] ]
cs/0506050
Alex Wiesmaier
A. Wiesmaier, V. Karatsiolis, M. Lippert, J. Buchmann
The Workshop - Implementing Well Structured Enterprise Applications
7 pages (ieee), 1 figure, accepted for SERP'05
Proceedings of "The 2005 International Conference on Software Engineering Research and Practice"; June 2005
null
null
cs.SE
null
We specify an abstraction layer to be used between an enterprise application and the utilized enterprise framework (like J2EE or .NET). This specification is called the Workshop. It provides an intuitive metaphor supporting the programmer in designing easy understandable code. We present an implementation of this specification. It is based upon the J2EE framework and is called the JWorkshop. As a proof of concept we implement a special certification authority called the Key Authority based upon the JWorkshop. The mentioned certification authority runs very successfully in a variety of different real world projects.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 13:25:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Wiesmaier", "A.", "" ], [ "Karatsiolis", "V.", "" ], [ "Lippert", "M.", "" ], [ "Buchmann", "J.", "" ] ]
cs/0506051
Heiko Herrmann
Heiko Herrmann, Gunnar Rueckner
Comparison of two different implementations of a finite-difference-method for first-order pde in mathematica and matlab
LaTeX, 6 pages, 9 eps-figures, v2: minor additions/corrections
null
null
null
cs.CE cs.DM
null
In this article two implementations of a symmetric finite difference algorithm for a first-order partial differential equation are discussed. The considered partial differential equation discribes the time evolution of the crack length distribution of microcracks in brittle materia.
[ { "version": "v1", "created": "Mon, 13 Jun 2005 15:26:16 GMT" }, { "version": "v2", "created": "Fri, 11 Nov 2005 10:25:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Herrmann", "Heiko", "" ], [ "Rueckner", "Gunnar", "" ] ]
cs/0506054
Ramesh Johari
Ramesh Johari (Stanford University), Shie Mannor (McGill University), John N. Tsitsiklis (MIT)
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply
Originally Laboratory for Information and Decision Systems (MIT) Publication 2605
null
null
null
cs.GT
null
We consider a resource allocation problem where individual users wish to send data across a network to maximize their utility, and a cost is incurred at each link that depends on the total rate sent through the link. It is known that as long as users do not anticipate the effect of their actions on prices, a simple proportional pricing mechanism can maximize the sum of users' utilities minus the cost (called aggregate surplus). Continuing previous efforts to quantify the effects of selfish behavior in network pricing mechanisms, we consider the possibility that users anticipate the effect of their actions on link prices. Under the assumption that the links' marginal cost functions are convex, we establish existence of a Nash equilibrium. We show that the aggregate surplus at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the optimal aggregate surplus; thus, the efficiency loss when users are selfish is no more than approximately 34%.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 02:11:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Johari", "Ramesh", "", "Stanford University" ], [ "Mannor", "Shie", "", "McGill University" ], [ "Tsitsiklis", "John N.", "", "MIT" ] ]
cs/0506055
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe
The Complexity of Kings
null
null
null
URCS-TR-2005-870
cs.CC cs.DM
null
A king in a directed graph is a node from which each node in the graph can be reached via paths of length at most two. There is a broad literature on tournaments (completely oriented digraphs), and it has been known for more than half a century that all tournaments have at least one king [Lan53]. Recently, kings have proven useful in theoretical computer science, in particular in the study of the complexity of the semifeasible sets [HNP98,HT05] and in the study of the complexity of reachability problems [Tan01,NT02]. In this paper, we study the complexity of recognizing kings. For each succinctly specified family of tournaments, the king problem is known to belong to $\Pi_2^p$ [HOZZ]. We prove that this bound is optimal: We construct a succinctly specified tournament family whose king problem is $\Pi_2^p$-complete. It follows easily from our proof approach that the problem of testing kingship in succinctly specified graphs (which need not be tournaments) is $\Pi_2^p$-complete. We also obtain $\Pi_2^p$-completeness results for k-kings in succinctly specified j-partite tournaments, $k,j \geq 2$, and we generalize our main construction to show that $\Pi_2^p$-completeness holds for testing k-kingship in succinctly specified families of tournaments for all $k \geq 2$.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 02:31:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/0506057
Victor Kromer
Kromer Victor
About one 3-parameter Model of Testing
9 pages; in Russian; Paper with changed content
null
null
null
cs.LG
null
This article offers a 3-parameter model of testing, with 1) the difference between the ability level of the examinee and item difficulty; 2) the examinee discrimination and 3) the item discrimination as model parameters.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 04:00:38 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2005 02:43:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Victor", "Kromer", "" ] ]
cs/0506059
Hubie Chen
Hubie Chen
Existentially Restricted Quantified Constraint Satisfaction
null
null
null
null
cs.CC cs.LO
null
The quantified constraint satisfaction problem (QCSP) is a powerful framework for modelling computational problems. The general intractability of the QCSP has motivated the pursuit of restricted cases that avoid its maximal complexity. In this paper, we introduce and study a new model for investigating QCSP complexity in which the types of constraints given by the existentially quantified variables, is restricted. Our primary technical contribution is the development and application of a general technology for proving positive results on parameterizations of the model, of inclusion in the complexity class coNP.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 11:57:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
cs/0506060
Yong Luo
Yong Luo
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising
19 pages
null
null
null
cs.LO
null
In this paper, we prove the strong normalisation for Martin-L\"{o}f's Logical Framework, and suggest that {}``correct arity'', a condition weaker than well-typedness, will also guarantee the strong normalisation.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 12:13:22 GMT" }, { "version": "v2", "created": "Wed, 15 Jun 2005 16:56:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Luo", "Yong", "" ] ]
cs/0506063
Slawomir Staworko
Slawomir Staworko and Jan Chomicki
Priority-Based Conflict Resolution in Inconsistent Relational Databases
null
null
null
UB CSE Technical Report 2005-11
cs.DB
null
We study here the impact of priorities on conflict resolution in inconsistent relational databases. We extend the framework of repairs and consistent query answers. We propose a set of postulates that an extended framework should satisfy and consider two instantiations of the framework: (locally preferred) l-repairs and (globally preferred) g-repairs. We study the relationships between them and the impact each notion of repair has on the computational complexity of repair checking and consistent query answers.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 23:10:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Staworko", "Slawomir", "" ], [ "Chomicki", "Jan", "" ] ]
cs/0506066
Yoo Chung
Yoo Chung and Dongman Lee
Impersonation with the Echo Protocol
submitted to ACM Workshop on Wireless Security (2005)
null
null
null
cs.CR cs.NI
null
The Echo protocol tries to do secure location verification using physical limits imposed by the speeds of light and sound. While the protocol is able to guarantee that a certain object is within a certain region, it cannot ensure the authenticity of further messages from the object without using cryptography. This paper describes an impersonation attack against the protocol based on this weakness. It also describes a couple of approaches which can be used to defend against the attack.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 10:57:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Chung", "Yoo", "" ], [ "Lee", "Dongman", "" ] ]
cs/0506067
Juan Jose Amor
Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona
Measuring Woody: The Size of Debian 3.0
null
null
null
null
cs.SE
null
Debian is possibly the largest free software distribution, with well over 4,500 source packages in the latest stable release (Debian 3.0) and more than 8,000 source packages in the release currently in preparation. However, we wish to know what these numbers mean. In this paper, we use David A. Wheeler's SLOCCount system to determine the number of physical source lines of code (SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than 105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months later), showing that the Debian development model (based on the work of a large group of voluntary developers spread around the world) is at least as capable as other development methods (like the more centralized one, based on the work of employees, used by Red Hat or Microsoft) to manage distributions of this size. It is also shown that if Debian had been developed using traditional proprietary methods, the COCOMO model estimates that its cost would be close to $6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis of the programming languages used in the distribution (C amounts for about 65%, C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3, etc.)
[ { "version": "v1", "created": "Wed, 15 Jun 2005 21:48:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Amor", "Juan Jose", "" ], [ "Robles", "Gregorio", "" ], [ "Gonzalez-Barahona", "Jesus", "" ] ]
cs/0506068
John Watrous
Chris Marriott and John Watrous
Quantum Arthur-Merlin Games
22 pages
Computational Complexity, 14(2): 122 - 152, 2005
null
null
cs.CC quant-ph
null
This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games in which Arthur and Merlin can perform quantum computations and Merlin can send Arthur quantum information. As in the classical case, messages from Arthur to Merlin are restricted to be strings of uniformly generated random bits. It is proved that for one-message quantum Arthur-Merlin games, which correspond to the complexity class QMA, completeness and soundness errors can be reduced exponentially without increasing the length of Merlin's message. Previous constructions for reducing error required a polynomial increase in the length of Merlin's message. Applications of this fact include a proof that logarithmic length quantum certificates yield no increase in power over BQP and a simple proof that QMA is contained in PP. Other facts that are proved include the equivalence of three (or more) message quantum Arthur-Merlin games with ordinary quantum interactive proof systems and some basic properties concerning two-message quantum Arthur-Merlin games.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 22:13:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Marriott", "Chris", "" ], [ "Watrous", "John", "" ] ]
cs/0506070
Yuriy Chashkov
Ph.D. Yuriy A. Chashkov
Data Visualization on Shared Usage Multi-Screen Environment
4 pages, 1 figure
null
null
null
cs.MM
null
The modern multimedia technologies based on the whole palette of hardware and software facilities of real-time high-speed information processing, in a combination with effective facilities of the remote access to information resources, allow us to visualize diverse types of information. Data visualization facilities &#8211; is the face of the Automated Control System on whom often judge about their efficiency. They take a special place, providing visualization of the diverse information necessary for decision-making by a final control link - the person allocated by certain powers.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 10:15:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Chashkov", "Ph. D. Yuriy A.", "" ] ]
cs/0506071
Yuriy Reznykov
Yu. Reznykov
Signal transmission on lossy lines as a dissipative quantum state propagation
6 pages, revtex4
null
null
BTU LTP-05-06
cs.NI
null
The transmission of electric signals on a coupled line with distributed RLC-parameters is considered as a propagation of a dissipative quasi particle. A calculation technique is developed, alternative to the one, accepted for lumped lines. The relativistic wave equation for the transient response is deduced following the common Ohm-low-type considerations. The exact expressions for the Green function, for information transfer velocity and for time delay are obtained on this base. The fundamental restrictions on the measurement accuracy of the time delay are pointed out. The obtained results are naturally generalized for the multilevel networks of the arbitrary dimension.
[ { "version": "v1", "created": "Thu, 16 Jun 2005 11:40:54 GMT" }, { "version": "v2", "created": "Fri, 17 Jun 2005 07:28:35 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2005 09:31:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Reznykov", "Yu.", "" ] ]
cs/0506075
Lillian Lee
Bo Pang and Lillian Lee
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales
To appear, Proceedings of ACL 2005
null
null
null
cs.CL cs.LG
null
We address the rating-inference problem, wherein rather than simply decide whether a review is "thumbs up" or "thumbs down", as in previous sentiment analysis work, one must determine an author's evaluation with respect to a multi-point scale (e.g., one to five "stars"). This task represents an interesting twist on standard multi-class text categorization because there are several different degrees of similarity between class labels; for example, "three stars" is intuitively closer to "four stars" than to "one star". We first evaluate human performance at the task. Then, we apply a meta-algorithm, based on a metric labeling formulation of the problem, that alters a given n-ary classifier's output in an explicit attempt to ensure that similar items receive similar labels. We show that the meta-algorithm can provide significant improvements over both multi-class and regression versions of SVMs when we employ a novel similarity measure appropriate to the problem.
[ { "version": "v1", "created": "Fri, 17 Jun 2005 20:10:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Pang", "Bo", "" ], [ "Lee", "Lillian", "" ] ]
cs/0506076
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
Alternative security architecture for IP Telephony based on digital watermarking
10 pages, 5 figures
Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer, Heidelberg 2006. ISBN 978-3-540-45762-6
null
null
cs.CR cs.MM
null
Problems with securing IP Telephony systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper a new, alternative security architecture for voice-systems is presented. It is based on digital watermarking: a new, flexible and powerful technology that is increasingly gaining more and more attention. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that IP Telephony is based on.
[ { "version": "v1", "created": "Sat, 18 Jun 2005 21:41:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]