id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0504101 | Marko Znidaric | Marko Znidaric | Single-solution Random 3-SAT Instances | 18 pages, 9 figures; considerable revision | null | null | null | cs.AI cs.CC cs.DM | null | We study a class of random 3-SAT instances having exactly one solution. The
properties of this ensemble considerably differ from those of a random 3-SAT
ensemble. It is numerically shown that the running time of several complete and
stochastic local search algorithms monotonically increases as the clause
density is decreased. Therefore, there is no easy-hard-easy pattern of hardness
as for standard random 3-SAT ensemble. Furthermore, the running time for short
single-solution formulas increases with the problem size much faster than for
random 3-SAT formulas from the phase transition region.
| [
{
"version": "v1",
"created": "Mon, 25 Apr 2005 10:40:32 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Aug 2005 15:15:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Znidaric",
"Marko",
""
]
]
|
cs/0504105 | G Gordon Worley III | G Gordon Worley III | Wikis in Tuple Spaces | To appear at WMSCI 2005 | null | null | null | cs.DC cs.MM | null | We consider storing the pages of a wiki in a tuple space and the effects this
might have on the wiki experience. In particular, wiki pages are stored in
tuples with a few identifying values such as title, author, revision date,
content, etc. and pages are retrieved by sending the tuple space templates,
such as one that gives the title but nothing else, leaving the tuple space to
resolve to a single tuple. We use a tuple space wiki to avoid deadlocks,
infinite loops, and wasted efforts when page edit contention arises and examine
how a tuple space wiki changes the wiki experience.
| [
{
"version": "v1",
"created": "Wed, 27 Apr 2005 23:04:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Worley",
"G Gordon",
"III"
]
]
|
cs/0504106 | Thomas C. Schmidt | Hans L. Cycon, Thomas C. Schmidt, Matthias Waehlisch, Mark Palkow and
Henrik Regensburg | A Distributed Multimedia Communication System and its Applications to
E-Learning | Including 6 figures | IEEE International Symposium on Consumer Electronics, Sept. 1-3,
2004, Page(s):425 - 429 | null | null | cs.MM cs.NI | null | In this paper we report on a multimedia communication system including a
VCoIP (Video Conferencing over IP) software with a distributed architecture and
its applications for teaching scenarios. It is a simple, ready-to-use scheme
for distributed presenting, recording and streaming multimedia content. We also
introduce and investigate concepts and experiments to IPv6 user and session
mobility, with the special focus on real-time video group communication.
| [
{
"version": "v1",
"created": "Thu, 28 Apr 2005 13:40:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cycon",
"Hans L.",
""
],
[
"Schmidt",
"Thomas C.",
""
],
[
"Waehlisch",
"Matthias",
""
],
[
"Palkow",
"Mark",
""
],
[
"Regensburg",
"Henrik",
""
]
]
|
cs/0504108 | Derek Messie | Derek Messie (Syracuse University) and Jae C. Oh (Syracuse University) | Cooperative Game Theory within Multi-Agent Systems for Systems
Scheduling | Fourth International Conference on Hybrid Intelligent Systems (HIS),
Kitakyushu, Japan, December, 2004 | null | null | null | cs.AI cs.MA | null | Research concerning organization and coordination within multi-agent systems
continues to draw from a variety of architectures and methodologies. The work
presented in this paper combines techniques from game theory and multi-agent
systems to produce self-organizing, polymorphic, lightweight, embedded agents
for systems scheduling within a large-scale real-time systems environment.
Results show how this approach is used to experimentally produce optimum
real-time scheduling through the emergent behavior of thousands of agents.
These results are obtained using a SWARM simulation of systems scheduling
within a High Energy Physics experiment consisting of 2500 digital signal
processors.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2005 13:43:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Messie",
"Derek",
"",
"Syracuse University"
],
[
"Oh",
"Jae C.",
"",
"Syracuse University"
]
]
|
cs/0504109 | Derek Messie | Derek Messie (1), Mina Jung (1), Jae C. Oh (1), Shweta Shetty (2),
Steven Nordstrom (2), Michael Haney (3) ((1) Syracuse University, (2)
Vanderbilt University, (3) University of Illinois at Urbana-Champaign) | Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time
Systems | 2nd Workshop on Engineering of Autonomic Systems (EASe), in the 12th
Annual IEEE International Conference and Workshop on the Engineering of
Computer Based Systems (ECBS), Washington, DC, April, 2005 | null | null | null | cs.SE | null | This paper describes a comprehensive prototype of large-scale fault adaptive
embedded software developed for the proposed Fermilab BTeV high energy physics
experiment. Lightweight self-optimizing agents embedded within Level 1 of the
prototype are responsible for proactive and reactive monitoring and mitigation
based on specified layers of competence. The agents are self-protecting,
detecting cascading failures using a distributed approach. Adaptive,
reconfigurable, and mobile objects for reliablility are designed to be
self-configuring to adapt automatically to dynamically changing environments.
These objects provide a self-healing layer with the ability to discover,
diagnose, and react to discontinuities in real-time processing. A generic
modeling environment was developed to facilitate design and implementation of
hardware resource specifications, application data flow, and failure mitigation
strategies. Level 1 of the planned BTeV trigger system alone will consist of
2500 DSPs, so the number of components and intractable fault scenarios involved
make it impossible to design an `expert system' that applies traditional
centralized mitigative strategies based on rules capturing every possible
system state. Instead, a distributed reactive approach is implemented using the
tools and methodologies developed by the Real-Time Embedded Systems group.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2005 14:59:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Messie",
"Derek",
""
],
[
"Jung",
"Mina",
""
],
[
"Oh",
"Jae C.",
""
],
[
"Shetty",
"Shweta",
""
],
[
"Nordstrom",
"Steven",
""
],
[
"Haney",
"Michael",
""
]
]
|
cs/0504110 | Lawrence Ioannou | Lawrence M. Ioannou | Computing finite-dimensional bipartite quantum separability | Replaced orginal archive submission with PhD thesis, which subsumes
and mildly corrects it | null | null | null | cs.DS quant-ph | null | Ever since entanglement was identified as a computational and cryptographic
resource, effort has been made to find an efficient way to tell whether a given
density matrix represents an unentangled, or separable, state. Essentially,
this is the quantum separability problem.
Chapters 1 to 3 motivate a new interior-point algorithm which, given the
expected values of a subset of an orthogonal basis of observables of an
otherwise unknown quantum state, searches for an entanglement witness in the
span of the subset of observables. When all the expected values are known, the
algorithm solves the separability problem. In Chapter 4, I give the motivation
for the algorithm and show how it can be used in a particular physical scenario
to detect entanglement (or decide separability) of an unknown quantum state
using as few quantum resources as possible. I then explain the intuitive idea
behind the algorithm and relate it to the standard algorithms of its kind. I
end the chapter with a comparison of the complexities of the algorithms
surveyed in Chapter 3. Finally, in Chapter 5, I present the details of the
algorithm and discuss its performance relative to standard methods.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2005 16:42:54 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Apr 2005 12:11:17 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Feb 2006 15:47:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ioannou",
"Lawrence M.",
""
]
]
|
cs/0504111 | Karim Seada | Karim Seada, Ahmed Helmy | Efficient and Robust Geocasting Protocols for Sensor Networks | null | null | null | null | cs.NI | null | Geocasting is the delivery of packets to nodes within a certain geographic
area. For many applications in wireless ad hoc and sensor networks, geocasting
is an important and frequent communication service. The challenging problem in
geocasting is distributing the packets to all the nodes within the geocast
region with high probability but with low overhead. According to our study we
notice a clear tradeoff between the proportion of nodes in the geocast region
that receive the packet and the overhead incurred by the geocast packet
especially at low densities and irregular distributions. We present two novel
protocols for geocasting that achieve high delivery rate and low overhead by
utilizing the local location information of nodes to combine geographic routing
mechanisms with region flooding. We show that the first protocol
Geographic-Forwarding-Geocast (GFG) has close-to-minimum overhead in dense
networks and that the second protocol Geographic-Forwarding-Perimeter-Geocast
(GFPG) provides guaranteed delivery without global flooding or global network
information even at low densities and with the existence of region gaps or
obstacles. An adaptive version of the second protocol (GFPG*) has the desirable
property of perfect delivery at all densities and close-to-minimum overhead at
high densities. We evaluate our mechanisms and compare them using simulation to
other proposed geocasting mechanisms. The results show the significant
improvement in delivery rate (up to 63% higher delivery percentage in low
density networks) and reduction in overhead (up to 80% reduction) achieved by
our mechanisms. We hope for our protocols to become building block mechanisms
for dependable sensor network architectures that require robust efficient
geocast services.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2005 18:37:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Seada",
"Karim",
""
],
[
"Helmy",
"Ahmed",
""
]
]
|
cs/0505001 | Roberto da Silva | Roberto da Silva, Alexandre Tavares Baraviera, Silvio R. Dahmen | Modelling investment in artificial stock markets: Analytical and
Numerical Results | 19 pages 10 figures | null | null | null | cs.CE | null | In this article we study the behavior of a group of economic agents in the
context of cooperative game theory, interacting according to rules based on the
Potts Model with suitable modifications. Each agent can be thought of as
belonging to a chain, where agents can only interact with their nearest
neighbors (periodic boundary conditions are imposed). Each agent can invest an
amount σ_{i}=0,...,q-1. Using the transfer matrix method we study
analytically, among other things, the behavior of the investment as a function
of a control parameter (denoted β) for the cases q=2 and 3. For q>3
numerical evaluation of eigenvalues and high precision numerical derivatives
are used in order to assess this information.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2005 20:38:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"da Silva",
"Roberto",
""
],
[
"Baraviera",
"Alexandre Tavares",
""
],
[
"Dahmen",
"Silvio R.",
""
]
]
|
cs/0505002 | Christoph Koch | Martin Grohe, Christoph Koch, Nicole Schweikardt | Tight Lower Bounds for Query Processing on Streaming and External Memory
Data | 25 pages, 4 figures, to appear in Proc. ICALP 2005; extended version
with appendix | null | null | null | cs.DB cs.CC | null | We study a clean machine model for external memory and stream processing. We
show that the number of scans of the external data induces a strict hierarchy
(as long as work space is sufficiently small, e.g., polylogarithmic in the size
of the input). We also show that neither joins nor sorting are feasible if the
product of the number $r(n)$ of scans of the external memory and the size
$s(n)$ of the internal memory buffers is sufficiently small, e.g., of size
$o(\sqrt[5]{n})$. We also establish tight bounds for the complexity of XPath
evaluation and filtering.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2005 22:28:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grohe",
"Martin",
""
],
[
"Koch",
"Christoph",
""
],
[
"Schweikardt",
"Nicole",
""
]
]
|
cs/0505003 | Xiaofei Huang | Xiaofei Huang | A New Kind of Hopfield Networks for Finding Global Optimum | 6 pages, accepted by International Joint Conference on Neural
Networks 2005 | null | null | null | cs.NE | null | The Hopfield network has been applied to solve optimization problems over
decades. However, it still has many limitations in accomplishing this task.
Most of them are inherited from the optimization algorithms it implements. The
computation of a Hopfield network, defined by a set of difference equations,
can easily be trapped into one local optimum or another, sensitive to initial
conditions, perturbations, and neuron update orders. It doesn't know how long
it will take to converge, as well as if the final solution is a global optimum,
or not. In this paper, we present a Hopfield network with a new set of
difference equations to fix those problems. The difference equations directly
implement a new powerful optimization algorithm.
| [
{
"version": "v1",
"created": "Sat, 30 Apr 2005 16:13:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
]
|
cs/0505005 | Sandor P. Fekete | Jan van der Veen and Sandor P. Fekete and Ali Ahmadinia and Christophe
Bobda and Frank Hannig and Juergen Teich | Defragmenting the Module Layout of a Partially Reconfigurable Device | 10 pages, 11 figures, 1 table, Latex, to appear in "Engineering of
Reconfigurable Systems and Algorithms" as a "Distinguished Paper" | null | null | null | cs.AR cs.DS | null | Modern generations of field-programmable gate arrays (FPGAs) allow for
partial reconfiguration. In an online context, where the sequence of modules to
be loaded on the FPGA is unknown beforehand, repeated insertion and deletion of
modules leads to progressive fragmentation of the available space, making
defragmentation an important issue. We address this problem by propose an
online and an offline component for the defragmentation of the available space.
We consider defragmenting the module layout on a reconfigurable device. This
corresponds to solving a two-dimensional strip packing problem. Problems of
this type are NP-hard in the strong sense, and previous algorithmic results are
rather limited. Based on a graph-theoretic characterization of feasible
packings, we develop a method that can solve two-dimensional defragmentation
instances of practical size to optimality. Our approach is validated for a set
of benchmark instances.
| [
{
"version": "v1",
"created": "Mon, 2 May 2005 01:10:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van der Veen",
"Jan",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Ahmadinia",
"Ali",
""
],
[
"Bobda",
"Christophe",
""
],
[
"Hannig",
"Frank",
""
],
[
"Teich",
"Juergen",
""
]
]
|
cs/0505007 | Dragos Trinca | Dragos Trinca | Adaptive Codes: A New Class of Non-standard Variable-length Codes | 10 pages | null | null | null | cs.DS | null | We introduce a new class of non-standard variable-length codes, called
adaptive codes. This class of codes associates a variable-length codeword to
the symbol being encoded depending on the previous symbols in the input data
string. An efficient algorithm for constructing adaptive codes of order one is
presented. Then, we introduce a natural generalization of adaptive codes,
called GA codes.
| [
{
"version": "v1",
"created": "Mon, 2 May 2005 09:40:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
]
|
cs/0505008 | Ralf-Michael Vetter | A. Kuhlmann, R.-M. Vetter, Ch. Luebbing, C.-A. Thole | Data Mining on Crash Simulation Data | 12 pages, 10 figures. Accepted for Lecture Notes in Computer Science
(LNCS) | Lecture Notes in Computer Science, Lecture Notes in Artificial
Intelligence, Proceedings Conference MLDM 2005, Leipzig/Germany, Springer
Verlag, LNAI 3587, ISBN: 3-540-26923-1, 2005 | null | null | cs.IR cs.CE | null | The work presented in this paper is part of the cooperative research project
AUTO-OPT carried out by twelve partners from the automotive industries. One
major work package concerns the application of data mining methods in the area
of automotive design. Suitable methods for data preparation and data analysis
are developed. The objective of the work is the re-use of data stored in the
crash-simulation department at BMW in order to gain deeper insight into the
interrelations between the geometric variations of the car during its design
and its performance in crash testing. In this paper a method for data analysis
of finite element models and results from crash simulation is proposed and
application to recent data from the industrial partner BMW is demonstrated. All
necessary steps from data pre-processing to re-integration into the working
environment of the engineer are covered.
| [
{
"version": "v1",
"created": "Mon, 2 May 2005 15:27:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuhlmann",
"A.",
""
],
[
"Vetter",
"R. -M.",
""
],
[
"Luebbing",
"Ch.",
""
],
[
"Thole",
"C. -A.",
""
]
]
|
cs/0505011 | Ramona Su | Tony Chang, Damon Cook, Ramona Su | SWiM: A Simple Window Mover | 7 pages, 4 figures | null | null | null | cs.HC | null | As computers become more ubiquitous, traditional two-dimensional interfaces
must be replaced with interfaces based on a three-dimensional metaphor.
However, these interfaces must still be as simple and functional as their
two-dimensional predecessors. This paper introduces SWiM, a new interface for
moving application windows between various screens, such as wall displays,
laptop monitors, and desktop displays, in a three-dimensional physical
environment. SWiM was designed based on the results of initial "paper and
pencil" user tests of three possible interfaces. The results of these tests led
to a map-like interface where users select the destination display for their
application from various icons. If the destination is a mobile display it is
not displayed on the map. Instead users can select the screen's name from a
list of all possible destination displays. User testing of SWiM was conducted
to discover whether it is easy to learn and use. Users that were asked to use
SWiM without any instructions found the interface as intuitive to use as users
who were given a demonstration. The results show that SWiM combines simplicity
and functionality to create an interface that is easy to learn and easy to use.
| [
{
"version": "v1",
"created": "Wed, 4 May 2005 16:17:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chang",
"Tony",
""
],
[
"Cook",
"Damon",
""
],
[
"Su",
"Ramona",
""
]
]
|
cs/0505014 | Haibin Wang | Haibin Wang, Florentin Smarandache, Yan-Qing Zhang, Rajshekhar
Sunderraman | Interval Neutrosophic Sets and Logic: Theory and Applications in
Computing | 12 figures, 100 pages, book in press | null | null | null | cs.LO | null | This book presents the advancements and applications of neutrosophics.
Chapter 1 first introduces the interval neutrosophic sets which is an instance
of neutrosophic sets. In this chapter, the definition of interval neutrosophic
sets and set-theoretic operators are given and various properties of interval
neutrosophic set are proved. Chapter 2 defines the interval neutrosophic logic
based on interval neutrosophic sets including the syntax and semantics of first
order interval neutrosophic propositional logic and first order interval
neutrosophic predicate logic. The interval neutrosophic logic can reason and
model fuzzy, incomplete and inconsistent information. In this chapter, we also
design an interval neutrosophic inference system based on first order interval
neutrosophic predicate logic. The interval neutrosophic inference system can be
applied to decision making. Chapter 3 gives one application of interval
neutrosophic sets and logic in the field of relational databases. Neutrosophic
data model is the generalization of fuzzy data model and paraconsistent data
model. Here, we generalize various set-theoretic and relation-theoretic
operations of fuzzy data model to neutrosophic data model. Chapter 4 gives
another application of interval neutrosophic logic. A soft semantic Web
Services agent framework is proposed to faciliate the registration and
discovery of high quality semantic Web Services agent. The intelligent
inference engine module of soft Semantic Web Services agent is implemented
using interval neutrosophic logic.
| [
{
"version": "v1",
"created": "Fri, 6 May 2005 13:57:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Zhang",
"Yan-Qing",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
]
|
cs/0505016 | Shashank Araokar | Shashank Araokar | Visual Character Recognition using Artificial Neural Networks | 7 pages, tutorial resource | null | null | null | cs.NE | null | The recognition of optical characters is known to be one of the earliest
applications of Artificial Neural Networks, which partially emulate human
thinking in the domain of artificial intelligence. In this paper, a simplified
neural approach to recognition of optical or visual characters is portrayed and
discussed. The document is expected to serve as a resource for learners and
amateur investigators in pattern recognition, neural networking and related
disciplines.
| [
{
"version": "v1",
"created": "Sat, 7 May 2005 20:56:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Araokar",
"Shashank",
""
]
]
|
cs/0505017 | Merc\`e Claverol | Manuel Abellanas, Merc\`e Claverol, and Ferran Hurtado | Point set stratification and Delaunay depth | 17 pages, 16 figures | null | null | null | cs.CG | null | In the study of depth functions it is important to decide whether we want
such a function to be sensitive to multimodality or not. In this paper we
analyze the Delaunay depth function, which is sensitive to multimodality and
compare this depth with others, as convex depth and location depth. We study
the stratification that Delaunay depth induces in the point set (layers) and in
the whole plane (levels), and we develop an algorithm for computing the
Delaunay depth contours, associated to a point set in the plane, with running
time O(n log^2 n). The depth of a query point p with respect to a data set S in
the plane is the depth of p in the union of S and p. When S and p are given in
the input the Delaunay depth can be computed in O(n log n), and we prove that
this value is optimal.
| [
{
"version": "v1",
"created": "Sun, 8 May 2005 16:36:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abellanas",
"Manuel",
""
],
[
"Claverol",
"Mercè",
""
],
[
"Hurtado",
"Ferran",
""
]
]
|
cs/0505018 | Jean-Francois Mari | Jean-Francois Mari (INRIA Lorraine - LORIA), Florence Le Ber (CEVH) | Temporal and Spatial Data Mining with Second-Order Hidden Models | null | null | 10.1007/s00500-005-0501-0 | null | cs.AI | null | In the frame of designing a knowledge discovery system, we have developed
stochastic models based on high-order hidden Markov models. These models are
capable to map sequences of data into a Markov chain in which the transitions
between the states depend on the \texttt{n} previous states according to the
order of the model. We study the process of achieving information extraction
fromspatial and temporal data by means of an unsupervised classification. We
use therefore a French national database related to the land use of a region,
named Teruti, which describes the land use both in the spatial and temporal
domain. Land-use categories (wheat, corn, forest, ...) are logged every year on
each site regularly spaced in the region. They constitute a temporal sequence
of images in which we look for spatial and temporal dependencies. The temporal
segmentation of the data is done by means of a second-order Hidden Markov Model
(\hmmd) that appears to have very good capabilities to locate stationary
segments, as shown in our previous work in speech recognition. Thespatial
classification is performed by defining a fractal scanning ofthe images with
the help of a Hilbert-Peano curve that introduces atotal order on the sites,
preserving the relation ofneighborhood between the sites. We show that the
\hmmd performs aclassification that is meaningful for the agronomists.Spatial
and temporal classification may be achieved simultaneously by means of a 2
levels \hmmd that measures the \aposteriori probability to map a temporal
sequence of images onto a set of hidden classes.
| [
{
"version": "v1",
"created": "Mon, 9 May 2005 06:54:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mari",
"Jean-Francois",
"",
"INRIA Lorraine - LORIA"
],
[
"Ber",
"Florence Le",
"",
"CEVH"
]
]
|
cs/0505019 | Nitin Malik | Nitin Malik | Artificial Neural Networks and their Applications | 6 pages, 2 figures, 1 table | null | null | null | cs.NE | null | The Artificial Neural network is a functional imitation of simplified model
of the biological neurons and their goal is to construct useful computers for
real world problems. The ANN applications have increased dramatically in the
last few years fired by both theoretical and practical applications in a wide
variety of applications. A brief theory of ANN is presented and potential areas
are identified and future trends are discussed.
| [
{
"version": "v1",
"created": "Tue, 10 May 2005 06:37:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Malik",
"Nitin",
""
]
]
|
cs/0505023 | Guillaume Gardey | Guillaume Gardey and Olivier H. Roux and Olivier F. Roux | State Space Computation and Analysis of Time Petri Nets | 21 pages | null | null | null | cs.LO | null | The theory of Petri Nets provides a general framework to specify the
behaviors of real-time reactive systems and Time Petri Nets were introduced to
take also temporal specifications into account. We present in this paper a
forward zone-based algorithm to compute the state space of a bounded Time Petri
Net: the method is different and more efficient than the classical State Class
Graph. We prove the algorithm to be exact with respect to the reachability
problem. Furthermore, we propose a translation of the computed state space into
a Timed Automaton, proved to be timed bisimilar to the original Time Petri Net.
As the method produce a single Timed Automaton, syntactical clocks reduction
methods (Daws and Yovine for instance) may be applied to produce an automaton
with fewer clocks. Then, our method allows to model-check TTPN by the use of
efficient Timed Automata tools.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Tue, 10 May 2005 13:30:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gardey",
"Guillaume",
""
],
[
"Roux",
"Olivier H.",
""
],
[
"Roux",
"Olivier F.",
""
]
]
|
cs/0505024 | Riccardo Pucella | Riccardo Pucella | Logic Column 12: Logical Verification and Equational Verification | 11 pages | SIGACT News, 36(2), pp. 77-88, 2005 | null | null | cs.LO | null | This article examines two approaches to verification, one based on using a
logic for expressing properties of a system, and one based on showing the
system equivalent to a simpler system that obviously has whatever property is
of interest. Using examples such as process calculi and regular programs, the
relationship between these two approaches is explored.
| [
{
"version": "v1",
"created": "Tue, 10 May 2005 14:49:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0505025 | Anton\'in Ku\v{c}era | Antonin Kucera and Petr Jancar | Equivalence-Checking on Infinite-State Systems: Techniques and Results | null | null | null | null | cs.LO | null | The paper presents a selection of recently developed and/or used techniques
for equivalence-checking on infinite-state systems, and an up-to-date overview
of existing results (as of September 2004).
| [
{
"version": "v1",
"created": "Tue, 10 May 2005 16:47:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kucera",
"Antonin",
""
],
[
"Jancar",
"Petr",
""
]
]
|
cs/0505026 | Alicia Villanueva | Moreno Falaschi and Alicia Villanueva | Automatic Verification of Timed Concurrent Constraint Programs | null | null | null | null | cs.LO | null | The language Timed Concurrent Constraint (tccp) is the extension over time of
the Concurrent Constraint Programming (cc) paradigm that allows us to specify
concurrent systems where timing is critical, for example reactive systems.
Systems which may have an infinite number of states can be specified in tccp.
Model checking is a technique which is able to verify finite-state systems with
a huge number of states in an automatic way. In the last years several studies
have investigated how to extend model checking techniques to systems with an
infinite number of states. In this paper we propose an approach which exploits
the computation model of tccp. Constraint based computations allow us to define
a methodology for applying a model checking algorithm to (a class of)
infinite-state systems. We extend the classical algorithm of model checking for
LTL to a specific logic defined for the verification of tccp and to the tccp
Structure which we define in this work for modeling the program behavior. We
define a restriction on the time in order to get a finite model and then we
develop some illustrative examples. To the best of our knowledge this is the
first approach that defines a model checking methodology for tccp.
| [
{
"version": "v1",
"created": "Wed, 11 May 2005 11:33:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Falaschi",
"Moreno",
""
],
[
"Villanueva",
"Alicia",
""
]
]
|
cs/0505028 | Irmtraud Meyer | Istvan Miklos, Irmtraud M. Meyer | A linear memory algorithm for Baum-Welch training | 14 pages, 1 figure version 2: fixed some errors, final version of
paper | BMC Bioinformatics (2005) 6:231 | null | null | cs.LG cs.DS q-bio.QM | null | Background: Baum-Welch training is an expectation-maximisation algorithm for
training the emission and transition probabilities of hidden Markov models in a
fully automated way.
Methods and results: We introduce a linear space algorithm for Baum-Welch
training. For a hidden Markov model with M states, T free transition and E free
emission parameters, and an input sequence of length L, our new algorithm
requires O(M) memory and O(L M T_max (T + E)) time for one Baum-Welch
iteration, where T_max is the maximum number of states that any state is
connected to. The most memory efficient algorithm until now was the
checkpointing algorithm with O(log(L) M) memory and O(log(L) L M T_max) time
requirement. Our novel algorithm thus renders the memory requirement completely
independent of the length of the training sequences. More generally, for an
n-hidden Markov model and n input sequences of length L, the memory requirement
of O(log(L) L^(n-1) M) is reduced to O(L^(n-1) M) memory while the running time
is changed from O(log(L) L^n M T_max + L^n (T + E)) to O(L^n M T_max (T + E)).
Conclusions: For the large class of hidden Markov models used for example in
gene prediction, whose number of states does not scale with the length of the
input sequence, our novel algorithm can thus be both faster and more
memory-efficient than any of the existing algorithms.
| [
{
"version": "v1",
"created": "Wed, 11 May 2005 16:45:58 GMT"
},
{
"version": "v2",
"created": "Mon, 30 May 2005 19:46:56 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Aug 2005 12:43:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Miklos",
"Istvan",
""
],
[
"Meyer",
"Irmtraud M.",
""
]
]
|
cs/0505030 | Gilles Villard | Arne Storjohann (UWO), Gilles Villard (LIP) | Computing the Rank and a Small Nullspace Basis of a Polynomial Matrix | Research Report LIP RR2005-03, January 2005 | Proceedings of the 2005 International Symposium on Symbolic and
Algebraic Computation (2005) 309-316 | null | null | cs.SC cs.CC | null | We reduce the problem of computing the rank and a nullspace basis of a
univariate polynomial matrix to polynomial matrix multiplication. For an input
n x n matrix of degree d over a field K we give a rank and nullspace algorithm
using about the same number of operations as for multiplying two matrices of
dimension n and degree d. If the latter multiplication is done in
MM(n,d)=softO(n^omega d) operations, with omega the exponent of matrix
multiplication over K, then the algorithm uses softO(MM(n,d)) operations in K.
The softO notation indicates some missing logarithmic factors. The method is
randomized with Las Vegas certification. We achieve our results in part through
a combination of matrix Hensel high-order lifting and matrix minimal fraction
reconstruction, and through the computation of minimal or small degree vectors
in the nullspace seen as a K[x]-module
| [
{
"version": "v1",
"created": "Wed, 11 May 2005 18:29:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Storjohann",
"Arne",
"",
"UWO"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
]
|
cs/0505031 | Rudini Sampaio | Rudini M. Sampaio, Horacio H. Yanasse | Estudo e Implementacao de Algoritmos de Roteamento sobre Grafos em um
Sistema de Informacoes Geograficas | INFOCOMP Journal of Computer Science | INFOCOMP Journal of Computer Science, 3(1), 2004 | null | null | cs.MS cs.DS | null | This article presents an implementation of a graphical software with various
algorithms in Operations research, like minimum path, minimum tree, chinese
postman problem and travelling salesman.
| [
{
"version": "v1",
"created": "Wed, 11 May 2005 18:50:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sampaio",
"Rudini M.",
""
],
[
"Yanasse",
"Horacio H.",
""
]
]
|
cs/0505035 | Hubie Chen | Hubie Chen and Victor Dalmau | Beyond Hypertree Width: Decomposition Methods Without Decompositions | null | null | null | null | cs.CC cs.AI | null | The general intractability of the constraint satisfaction problem has
motivated the study of restrictions on this problem that permit polynomial-time
solvability. One major line of work has focused on structural restrictions,
which arise from restricting the interaction among constraint scopes. In this
paper, we engage in a mathematical investigation of generalized hypertree
width, a structural measure that has up to recently eluded study. We obtain a
number of computational results, including a simple proof of the tractability
of CSP instances having bounded generalized hypertree width.
| [
{
"version": "v1",
"created": "Thu, 12 May 2005 16:53:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
],
[
"Dalmau",
"Victor",
""
]
]
|
cs/0505036 | Eduardo Moreno | Martin Matamala and Eduardo Moreno | Minimal Eulerian trail in a labeled digraph | Tech. Report DIM-CMM, Universidad de Chile, August 2004 | null | null | CMM-B-04/08-108 | cs.DM | null | Let $G$ be an Eulerian directed graph with an arc-labeling such that arcs
going out from the same vertex have different labels. In this work, we present
an algorithm to construct the Eulerian trail starting at an arbitrary vertex
$v$ of minimum lexicographical label among labels of all Eulerian trails
starting at this vertex.
We also show an application of this algorithm to construct the minimal de
Bruijn sequence of a language.
| [
{
"version": "v1",
"created": "Thu, 12 May 2005 20:52:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Matamala",
"Martin",
""
],
[
"Moreno",
"Eduardo",
""
]
]
|
cs/0505038 | Albrecht Schmidt | Albrecht Schmidt, Christian S. Jensen | Efficient Management of Short-Lived Data | switched to TimeCenter latex style | null | null | TimeCenter, TR-82 | cs.DB | null | Motivated by the increasing prominence of loosely-coupled systems, such as
mobile and sensor networks, which are characterised by intermittent
connectivity and volatile data, we study the tagging of data with so-called
expiration times. More specifically, when data are inserted into a database,
they may be tagged with time values indicating when they expire, i.e., when
they are regarded as stale or invalid and thus are no longer considered part of
the database. In a number of applications, expiration times are known and can
be assigned at insertion time. We present data structures and algorithms for
online management of data tagged with expiration times. The algorithms are
based on fully functional, persistent treaps, which are a combination of binary
search trees with respect to a primary attribute and heaps with respect to a
secondary attribute. The primary attribute implements primary keys, and the
secondary attribute stores expiration times in a minimum heap, thus keeping a
priority queue of tuples to expire. A detailed and comprehensive experimental
study demonstrates the well-behavedness and scalability of the approach as well
as its efficiency with respect to a number of competitors.
| [
{
"version": "v1",
"created": "Mon, 16 May 2005 14:42:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schmidt",
"Albrecht",
""
],
[
"Jensen",
"Christian S.",
""
]
]
|
cs/0505039 | Judit Bar-Ilan | Judit Bar-Ilan, Mazlita Mat-Hassan, Mark Levene | Methods for comparing rankings of search engine results | 19 pages, 4 figures, 8 tables | null | null | null | cs.IR | null | In this paper we present a number of measures that compare rankings of search
engine results. We apply these measures to five queries that were monitored
daily for two periods of about 21 days each. Rankings of the different search
engines (Google, Yahoo and Teoma for text searches and Google, Yahoo and
Picsearch for image searches) are compared on a daily basis, in addition to
longitudinal comparisons of the same engine for the same query over time. The
results and rankings of the two periods are compared as well.
| [
{
"version": "v1",
"created": "Sat, 14 May 2005 17:48:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bar-Ilan",
"Judit",
""
],
[
"Mat-Hassan",
"Mazlita",
""
],
[
"Levene",
"Mark",
""
]
]
|
cs/0505040 | Serban Vlad E. | Serban E. Vlad | Asynchronous pseudo-systems | 28 pages | Analele Universitatii Oradea, Fasc. Matematica, Tom XI, 2004,
133-174 | null | null | cs.OH | null | The paper introduces the concept of asynchronous pseudo-system. Its purpose
is to correct/generalize/continue the study of the asynchronous systems (the
models of the asynchronous circuits) that has been started in [1], [2].
| [
{
"version": "v1",
"created": "Sat, 14 May 2005 17:59:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
]
|
cs/0505041 | Sanjiang Li | Yongming Li, Sanjiang Li and Mingsheng Ying | Relational reasoning in the region connection calculus | Latex2e, 35 pages, 2 figures | null | null | null | cs.AI cs.LO | null | This paper is mainly concerned with the relation-algebraical aspects of the
well-known Region Connection Calculus (RCC). We show that the contact relation
algebra (CRA) of certain RCC model is not atomic complete and hence infinite.
So in general an extensional composition table for the RCC cannot be obtained
by simply refining the RCC8 relations. After having shown that each RCC model
is a consistent model of the RCC11 CT, we give an exhaustive investigation
about extensional interpretation of the RCC11 CT. More important, we show the
complemented closed disk algebra is a representation for the relation algebra
determined by the RCC11 table. The domain of this algebra contains two classes
of regions, the closed disks and closures of their complements in the real
plane.
| [
{
"version": "v1",
"created": "Sat, 14 May 2005 21:16:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Yongming",
""
],
[
"Li",
"Sanjiang",
""
],
[
"Ying",
"Mingsheng",
""
]
]
|
cs/0505042 | Matthew Earl | Matthew Earl and Raffaello D'Andrea | Iterative MILP Methods for Vehicle Control Problems | 22 pages, 9 figures, submitted to IEEE Transactions on Robotics, for
associated web page see http://control.mae.cornell.edu/earl/milp2 | M. G. Earl and R. D'Andrea, "Iterative MILP Methods for Vehicle
Control Problems," IEEE Transactions on Robotics, Volume 21, Issue 6, pages
1158-1167, Dec. 2005. | null | null | cs.RO | null | Mixed integer linear programming (MILP) is a powerful tool for planning and
control problems because of its modeling capability and the availability of
good solvers. However, for large models, MILP methods suffer computationally.
In this paper, we present iterative MILP algorithms that address this issue. We
consider trajectory generation problems with obstacle avoidance requirements
and minimum time trajectory generation problems. The algorithms use fewer
binary variables than standard MILP methods and require less computational
effort.
| [
{
"version": "v1",
"created": "Mon, 16 May 2005 03:54:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Earl",
"Matthew",
""
],
[
"D'Andrea",
"Raffaello",
""
]
]
|
cs/0505045 | Madhava Krishna K | K Madhava Krishna, Henry Hexmoor and Shravan Sogani | A T Step Ahead Optimal Target Detection Algorithm for a Multi Sensor
Surveillance System | 7 pages, 3 figures, 2 tables | null | null | null | cs.MA cs.RO | null | This paper presents a methodology for optimal target detection in a multi
sensor surveillance system. The system consists of mobile sensors that guard a
rectangular surveillance zone crisscrossed by moving targets. Targets percolate
the surveillance zone in a poisson fashion with uniform velocities. Under these
statistics this paper computes a motion strategy for a sensor that maximizes
target detections for the next T time steps. A coordination mechanism between
sensors ensures that overlapping areas between sensors is reduced. This
coordination mechanism is interleaved with the motion strategy computation to
reduce detections of the same target by more than one sensor. To avoid an
exhaustive search in the joint space of all sensors the coordination mechanism
constraints the search by assigning priorities to the sensors. A comparison of
this methodology with other multi target tracking schemes verifies its efficacy
in maximizing detections. A tabulation of these comparisons is reported in
results section of the paper
| [
{
"version": "v1",
"created": "Tue, 17 May 2005 13:06:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Krishna",
"K Madhava",
""
],
[
"Hexmoor",
"Henry",
""
],
[
"Sogani",
"Shravan",
""
]
]
|
cs/0505047 | David Wood | David R. Wood | A Simple Proof of the F{\'a}ry-Wagner Theorem | 2 pages | null | null | null | cs.CG | null | We give a simple proof of the following fundamental result independently due
to Fary (1948) and Wagner (1936): Every plane graph has a drawing in which
every edge is straight.
| [
{
"version": "v1",
"created": "Wed, 18 May 2005 11:27:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wood",
"David R.",
""
]
]
|
cs/0505050 | Manuel Arturo Izquierdo | Manuel Arturo Izquierdo | The QDF file format: an electronic system to describe ancient andean
khipus | LaTeX text, 12 pages | null | null | null | cs.CY | null | With the goal of bringing to reseachers of the ancient andean khipus with a
tool to share and process electronically the current corpus of these ancient
information devices, I present on this paper a proposal for a Quipu Description
Format (QDF), a XML based file format designed to describe such documents in a
systematic and computer standard way.
| [
{
"version": "v1",
"created": "Thu, 19 May 2005 22:42:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Izquierdo",
"Manuel Arturo",
""
]
]
|
cs/0505051 | Jaime Gomez | Jaime Gomez, Ignacio Melgar, Juan Seijas, Diego Andina | Sub-Optimum Signal Linear Detector Using Wavelets and Support Vector
Machines | 6 pages | WSEAS Transactions on Communications, ISSN 1109-2742, issue 4, vol
2, p426-431, October-2003 | null | null | cs.IR cs.NE | null | The problem of known signal detection in Additive White Gaussian Noise is
considered. In previous work, a new detection scheme was introduced by the
authors, and it was demonstrated that optimum performance cannot be reached in
a real implementation. In this paper we analyse Support Vector Machines (SVM)
as an alternative, evaluating the results in terms of Probability of detection
curves for a fixed Probability of false alarm.
| [
{
"version": "v1",
"created": "Fri, 20 May 2005 14:54:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gomez",
"Jaime",
""
],
[
"Melgar",
"Ignacio",
""
],
[
"Seijas",
"Juan",
""
],
[
"Andina",
"Diego",
""
]
]
|
cs/0505052 | Jaime Gomez | Jaime Gomez, Ignacio Melgar, Juan Seijas | Upgrading Pulse Detection with Time Shift Properties Using Wavelets and
Support Vector Machines | 6 pages | Proceedings of the World Automation Congress (WAC-04), Sevilla,
Spain, June-2004 | null | null | cs.IR cs.NE | null | Current approaches in pulse detection use domain transformations so as to
concentrate frequency related information that can be distinguishable from
noise. In real cases we do not know when the pulse will begin, so we need a
time search process in which time windows are scheduled and analysed. Each
window can contain the pulsed signal (either complete or incomplete) and / or
noise. In this paper a simple search process will be introduced, allowing the
algorithm to process more information, upgrading the capabilities in terms of
probability of detection (Pd) and probability of false alarm (Pfa).
| [
{
"version": "v1",
"created": "Fri, 20 May 2005 15:01:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gomez",
"Jaime",
""
],
[
"Melgar",
"Ignacio",
""
],
[
"Seijas",
"Juan",
""
]
]
|
cs/0505053 | Jaime Gomez | Jaime Gomez, Ignacio Melgar, Juan Seijas | Wavelet Time Shift Properties Integration with Support Vector Machines | 11 pages | LNAI-3131 Modeling Decisions for Artificial Intelligence, ISSN
0302-9743, p49-59, Barcelona, Spain, August-2004 | null | null | cs.IR cs.NE | null | This paper presents a short evaluation about the integration of information
derived from wavelet non-linear-time-invariant (non-LTI) projection properties
using Support Vector Machines (SVM). These properties may give additional
information for a classifier trying to detect known patterns hidden by noise.
In the experiments we present a simple electromagnetic pulsed signal
recognition scheme, where some improvement is achieved with respect to previous
work. SVMs are used as a tool for information integration, exploiting some
unique properties not easily found in neural networks.
| [
{
"version": "v1",
"created": "Fri, 20 May 2005 15:06:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gomez",
"Jaime",
""
],
[
"Melgar",
"Ignacio",
""
],
[
"Seijas",
"Juan",
""
]
]
|
cs/0505055 | Kooshiar Azimian | Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Siamak Fayyaz | A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme | null | null | null | null | cs.CR cs.CC | null | In this paper, firstly we propose two new concepts concerning the notion of
key escrow encryption schemes: provable partiality and independency. Roughly
speaking we say that a scheme has provable partiality if existing polynomial
time algorithm for recovering the secret knowing escrowed information implies a
polynomial time algorithm that can solve a well-known intractable problem. In
addition, we say that a scheme is independent if the secret key and the
escrowed information are independent. Finally, we propose a new verifiable
partial key escrow, which has both of above criteria. The new scheme use
McCurley encryption scheme as underlying scheme.
| [
{
"version": "v1",
"created": "Sun, 22 May 2005 12:40:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Azimian",
"Kooshiar",
""
],
[
"Mohajeri",
"Javad",
""
],
[
"Salmasizadeh",
"Mahmoud",
""
],
[
"Fayyaz",
"Siamak",
""
]
]
|
cs/0505059 | Francesco Parisi | Sergio Flesca, Filippo Furfaro, Francesco Parisi | Consistent query answers on numerical databases under aggregate
constraints | null | null | null | null | cs.DB | null | The problem of extracting consistent information from relational databases
violating integrity constraints on numerical data is addressed. In particular,
aggregate constraints defined as linear inequalities on aggregate-sum queries
on input data are considered. The notion of repair as consistent set of updates
at attribute-value level is exploited, and the characterization of several
complexity issues related to repairing data and computing consistent query
answers is provided.
| [
{
"version": "v1",
"created": "Mon, 23 May 2005 14:19:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Flesca",
"Sergio",
""
],
[
"Furfaro",
"Filippo",
""
],
[
"Parisi",
"Francesco",
""
]
]
|
cs/0505060 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A Unified Subspace Outlier Ensemble Framework for Outlier Detection in
High Dimensional Spaces | 17 pages | null | null | TR-04-08 | cs.DB cs.AI | null | The task of outlier detection is to find small groups of data objects that
are exceptional when compared with rest large amount of data. Detection of such
outliers is important for many applications such as fraud detection and
customer migration. Most such applications are high dimensional domains in
which the data may contain hundreds of dimensions. However, the outlier
detection problem itself is not well defined and none of the existing
definitions are widely accepted, especially in high dimensional space. In this
paper, our first contribution is to propose a unified framework for outlier
detection in high dimensional spaces from an ensemble-learning viewpoint. In
our new framework, the outlying-ness of each data object is measured by fusing
outlier factors in different subspaces using a combination function.
Accordingly, we show that all existing researches on outlier detection can be
regarded as special cases in the unified framework with respect to the set of
subspaces considered and the type of combination function used. In addition, to
demonstrate the usefulness of the ensemble-learning based outlier detection
framework, we developed a very simple and fast algorithm, namely SOE1 (Subspace
Outlier Ensemble using 1-dimensional Subspaces) in which only subspaces with
one dimension is used for mining outliers from large categorical datasets. The
SOE1 algorithm needs only two scans over the dataset and hence is very
appealing in real data mining applications. Experimental results on real
datasets and large synthetic datasets show that: (1) SOE1 has comparable
performance with respect to those state-of-art outlier detection algorithms on
identifying true outliers and (2) SOE1 can be an order of magnitude faster than
one of the fastest outlier detection algorithms known so far.
| [
{
"version": "v1",
"created": "Tue, 24 May 2005 02:41:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0505061 | Dragos Trinca | Dragos Trinca | EAH: A New Encoder based on Adaptive Variable-length Codes | 16 pages | null | null | null | cs.DS | null | Adaptive variable-length codes associate a variable-length codeword to the
symbol being encoded depending on the previous symbols in the input string.
This class of codes has been recently presented in [Dragos Trinca,
arXiv:cs.DS/0505007] as a new class of non-standard variable-length codes. New
algorithms for data compression, based on adaptive variable-length codes of
order one and Huffman's algorithm, have been recently presented in [Dragos
Trinca, ITCC 2004]. In this paper, we extend the work done so far by the
following contributions: first, we propose an improved generalization of these
algorithms, called EAHn. Second, we compute the entropy bounds for EAHn, using
the well-known bounds for Huffman's algorithm. Third, we discuss implementation
details and give reports of experimental results obtained on some well-known
corpora. Finally, we describe a parallel version of EAHn using the PRAM model
of computation.
| [
{
"version": "v1",
"created": "Tue, 24 May 2005 06:53:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
]
|
cs/0505062 | Ashutosh Saxena PhD Comp. Science | Ravi S. Veerubhotla, Ashutosh Saxena, V.P. Gulati, A.K. Pujari | Gossip Codes for Fingerprinting: Construction, Erasure Analysis and
Pirate Tracing | 28 pages | Journal of Universal Computer Science, vol. 11, no. 1 (2005),
122-149 | null | null | cs.CR | null | This work presents two new construction techniques for q-ary Gossip codes
from tdesigns and Traceability schemes. These Gossip codes achieve the shortest
code length specified in terms of code parameters and can withstand erasures in
digital fingerprinting applications. This work presents the construction of
embedded Gossip codes for extending an existing Gossip code into a bigger code.
It discusses the construction of concatenated codes and realisation of erasure
model through concatenated codes.
| [
{
"version": "v1",
"created": "Tue, 24 May 2005 13:44:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Veerubhotla",
"Ravi S.",
""
],
[
"Saxena",
"Ashutosh",
""
],
[
"Gulati",
"V. P.",
""
],
[
"Pujari",
"A. K.",
""
]
]
|
cs/0505065 | Xiao-feng Xie | Xiao-Feng Xie, Wen-Jun Zhang, Zhi-Lian Yang | A dissipative particle swarm optimization | Proceedings of the 2002 Congress on Evolutionary Computation, 2002.
Volume: 2, On page(s): 1456-1461 | null | null | null | cs.NE | null | A dissipative particle swarm optimization is developed according to the
self-organization of dissipative structure. The negative entropy is introduced
to construct an opening dissipative system that is far-from-equilibrium so as
to driving the irreversible evolution process with better fitness. The testing
of two multimodal functions indicates it improves the performance effectively
| [
{
"version": "v1",
"created": "Tue, 24 May 2005 14:54:06 GMT"
},
{
"version": "v2",
"created": "Fri, 27 May 2005 04:41:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xie",
"Xiao-Feng",
""
],
[
"Zhang",
"Wen-Jun",
""
],
[
"Yang",
"Zhi-Lian",
""
]
]
|
cs/0505066 | Udayan Khurana | Udayan Khuarana | Decision Sort and its Parallel Implementation | 5 pages, 3 tables, 1 figure, National Conference on Bioinformatics
Computing'05 | null | null | null | cs.DS | null | In this paper, a sorting technique is presented that takes as input a data
set whose primary key domain is known to the sorting algorithm, and works with
an time efficiency of O(n+k), where k is the primary key domain. It is shown
that the algorithm has applicability over a wide range of data sets. Later, a
parallel formulation of the same is proposed and its effectiveness is argued.
Though this algorithm is applicable over a wide range of general data sets, it
finds special application (much superior to others) in places where sorting
information that arrives in parts and in cases where input data is huge in
size.
| [
{
"version": "v1",
"created": "Tue, 24 May 2005 15:41:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Khuarana",
"Udayan",
""
]
]
|
cs/0505067 | Xiao-feng Xie | Xiao-Feng Xie, Wen-Jun Zhang, De-Chun Bi | Optimizing semiconductor devices by self-organizing particle swarm | Congress on Evolutionary Computation, 2004. CEC2004. Volume: 2, On
page(s): 2017- 2022 Vol.2 | null | null | null | cs.NE | null | A self-organizing particle swarm is presented. It works in dissipative state
by employing the small inertia weight, according to experimental analysis on a
simplified model, which with fast convergence. Then by recognizing and
replacing inactive particles according to the process deviation information of
device parameters, the fluctuation is introduced so as to driving the
irreversible evolution process with better fitness. The testing on benchmark
functions and an application example for device optimization with designed
fitness function indicates it improves the performance effectively.
| [
{
"version": "v1",
"created": "Wed, 25 May 2005 01:28:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xie",
"Xiao-Feng",
""
],
[
"Zhang",
"Wen-Jun",
""
],
[
"Bi",
"De-Chun",
""
]
]
|
cs/0505068 | Xiao-feng Xie | Xiao-Feng Xie, Wen-Jun Zhang, De-Chun Bi | Handling equality constraints by adaptive relaxing rule for swarm
algorithms | Congress on Evolutionary Computation, 2004. CEC2004. Volume: 2, On
page(s): 2012- 2016 Vol.2 | null | null | null | cs.NE | null | The adaptive constraints relaxing rule for swarm algorithms to handle with
the problems with equality constraints is presented. The feasible space of such
problems may be similiar to ridge function class, which is hard for applying
swarm algorithms. To enter the solution space more easily, the relaxed quasi
feasible space is introduced and shrinked adaptively. The experimental results
on benchmark functions are compared with the performance of other algorithms,
which show its efficiency.
| [
{
"version": "v1",
"created": "Wed, 25 May 2005 01:32:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xie",
"Xiao-Feng",
""
],
[
"Zhang",
"Wen-Jun",
""
],
[
"Bi",
"De-Chun",
""
]
]
|
cs/0505069 | Xiao-feng Xie | Wen-Jun Zhang, Xiao-Feng Xie, De-Chun Bi | Handling boundary constraints for numerical optimization by particle
swarm flying in periodic search space | Congress on Evolutionary Computation, 2004. CEC2004. Volume: 2, On
page(s): 2307- 2311 Vol.2 | null | null | null | cs.NE | null | The periodic mode is analyzed together with two conventional boundary
handling modes for particle swarm. By providing an infinite space that
comprises periodic copies of original search space, it avoids possible
disorganizing of particle swarm that is induced by the undesired mutations at
the boundary. The results on benchmark functions show that particle swarm with
periodic mode is capable of improving the search performance significantly, by
compared with that of conventional modes and other algorithms.
| [
{
"version": "v1",
"created": "Wed, 25 May 2005 01:36:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"Wen-Jun",
""
],
[
"Xie",
"Xiao-Feng",
""
],
[
"Bi",
"De-Chun",
""
]
]
|
cs/0505070 | Xiao-feng Xie | Xiao-Feng Xie, Wen-Jun Zhang | SWAF: Swarm Algorithm Framework for Numerical Optimization | Genetic and Evolutionary Computation Conference (GECCO), Part I,
2004: 238-250 (LNCS 3102) | null | null | null | cs.NE | null | A swarm algorithm framework (SWAF), realized by agent-based modeling, is
presented to solve numerical optimization problems. Each agent is a bare bones
cognitive architecture, which learns knowledge by appropriately deploying a set
of simple rules in fast and frugal heuristics. Two essential categories of
rules, the generate-and-test and the problem-formulation rules, are
implemented, and both of the macro rules by simple combination and subsymbolic
deploying of multiple rules among them are also studied. Experimental results
on benchmark problems are presented, and performance comparison between SWAF
and other existing algorithms indicates that it is efficiently.
| [
{
"version": "v1",
"created": "Wed, 25 May 2005 01:39:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Xie",
"Xiao-Feng",
""
],
[
"Zhang",
"Wen-Jun",
""
]
]
|
cs/0505071 | Taneli Mielik\"ainen | Taneli Mielik\"ainen | Summarization Techniques for Pattern Collections in Data Mining | PhD Thesis, Department of Computer Science, University of Helsinki | null | null | A-2005-1, Department of Computer Science, University of Helsinki | cs.DB cs.AI cs.DS | null | Discovering patterns from data is an important task in data mining. There
exist techniques to find large collections of many kinds of patterns from data
very efficiently. A collection of patterns can be regarded as a summary of the
data. A major difficulty with patterns is that pattern collections summarizing
the data well are often very large.
In this dissertation we describe methods for summarizing pattern collections
in order to make them also more understandable. More specifically, we focus on
the following themes: 1) Quality value simplifications. 2) Pattern orderings.
3) Pattern chains and antichains. 4) Change profiles. 5) Inverse pattern
discovery.
| [
{
"version": "v1",
"created": "Thu, 26 May 2005 04:41:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mielikäinen",
"Taneli",
""
]
]
|
cs/0505074 | Roel Vercammen | Stijn Dekeyser, Jan Hidders, Jan Paredaens, Roel Vercammen | Instance-Independent View Serializability for Semistructured Databases | null | null | null | null | cs.DB | null | Semistructured databases require tailor-made concurrency control mechanisms
since traditional solutions for the relational model have been shown to be
inadequate. Such mechanisms need to take full advantage of the hierarchical
structure of semistructured data, for instance allowing concurrent updates of
subtrees of, or even individual elements in, XML documents. We present an
approach for concurrency control which is document-independent in the sense
that two schedules of semistructured transactions are considered equivalent if
they are equivalent on all possible documents. We prove that it is decidable in
polynomial time whether two given schedules in this framework are equivalent.
This also solves the view serializability for semistructured schedules
polynomially in the size of the schedule and exponentially in the number of
transactions.
| [
{
"version": "v1",
"created": "Thu, 26 May 2005 09:51:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dekeyser",
"Stijn",
""
],
[
"Hidders",
"Jan",
""
],
[
"Paredaens",
"Jan",
""
],
[
"Vercammen",
"Roel",
""
]
]
|
cs/0505075 | Yongxi Cheng | Yongxi Cheng, Xi Chen, Yiqun Lisa Yin | On Searching a Table Consistent with Division Poset | 16 pages, no figure; same results, representation improved, add
references | null | null | null | cs.DM cs.DS | null | Suppose $P_n=\{1,2,...,n\}$ is a partially ordered set with the partial order
defined by divisibility, that is, for any two distinct elements $i,j\in P_n$
satisfying $i$ divides $j$, $i<_{P_n} j$. A table $A_n=\{a_i|i=1,2,...,n\}$ of
distinct real numbers is said to be \emph{consistent} with $P_n$, provided for
any two distinct elements $i,j\in \{1,2,...,n\}$ satisfying $i$ divides $j$,
$a_i< a_j$. Given an real number $x$, we want to determine whether $x\in A_n$,
by comparing $x$ with as few entries of $A_n$ as possible. In this paper we
investigate the complexity $\tau(n)$, measured in the number of comparisons, of
the above search problem. We present a $\frac{55n}{72}+O(\ln^2 n)$ search
algorithm for $A_n$ and prove a lower bound $({3/4}+{17/2160})n+O(1)$ on
$\tau(n)$ by using an adversary argument.
| [
{
"version": "v1",
"created": "Thu, 26 May 2005 17:45:48 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2006 04:46:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cheng",
"Yongxi",
""
],
[
"Chen",
"Xi",
""
],
[
"Yin",
"Yiqun Lisa",
""
]
]
|
cs/0505076 | Marats Golovkins | Marats Golovkins | On the Solution of Graph Isomorphism by Dynamical Algorithms | 20 pages | null | null | null | cs.CC | null | In the recent years, several polynomial algorithms of a dynamical nature have
been proposed to address the graph isomorphism problem. In this paper we
propose a generalization of an approach exposed in cond-mat/0209112 and find
that this dynamical algorithm is covered by a combinatorial approach. It is
possible to infer that polynomial dynamical algorithms addressing graph
isomorphism are covered by suitable polynomial combinatorial approaches and
thus are tackled by the same weaknesses as the last ones.
| [
{
"version": "v1",
"created": "Fri, 27 May 2005 00:09:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Golovkins",
"Marats",
""
]
]
|
cs/0505077 | Sagi Snir | Shlomo Moran and Sagi Snir | Efficient Approximation of Convex Recolorings | null | null | null | null | cs.DS | null | A coloring of a tree is convex if the vertices that pertain to any color
induce a connected subtree; a partial coloring (which assigns colors to some of
the vertices) is convex if it can be completed to a convex (total) coloring.
Convex coloring of trees arise in areas such as phylogenetics, linguistics,
etc. eg, a perfect phylogenetic tree is one in which the states of each
character induce a convex coloring of the tree. Research on perfect phylogeny
is usually focused on finding a tree so that few predetermined partial
colorings of its vertices are convex.
When a coloring of a tree is not convex, it is desirable to know "how far" it
is from a convex one. In [19], a natural measure for this distance, called the
recoloring distance was defined: the minimal number of color changes at the
vertices needed to make the coloring convex. This can be viewed as minimizing
the number of "exceptional vertices" w.r.t. to a closest convex coloring. The
problem was proved to be NP-hard even for colored string.
In this paper we continue the work of [19], and present a 2-approximation
algorithm of convex recoloring of strings whose running time O(cn), where c is
the number of colors and n is the size of the input, and an O(cn^2)-time
3-approximation algorithm for convex recoloring of trees.
| [
{
"version": "v1",
"created": "Fri, 27 May 2005 23:16:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moran",
"Shlomo",
""
],
[
"Snir",
"Sagi",
""
]
]
|
cs/0505079 | Boris Ryabko | Boris Ryabko and Jaakko Astola and Alex Gammerman | Application of Kolmogorov complexity and universal codes to identity
testing and nonparametric testing of serial independence for time series | submitted | null | null | null | cs.CC | null | We show that Kolmogorov complexity and such its estimators as universal codes
(or data compression methods) can be applied for hypotheses testing in a
framework of classical mathematical statistics. The methods for identity
testing and nonparametric testing of serial independence for time series are
suggested.
| [
{
"version": "v1",
"created": "Sun, 29 May 2005 17:12:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ryabko",
"Boris",
""
],
[
"Astola",
"Jaakko",
""
],
[
"Gammerman",
"Alex",
""
]
]
|
cs/0505081 | Gilles Kassel | Sabine Bruaux (LaRIA), Gilles Kassel (LaRIA), Gilles Morel (LaRIA) | An ontological approach to the construction of problem-solving models | null | null | null | LRR 2005-03 | cs.AI | null | Our ongoing work aims at defining an ontology-centered approach for building
expertise models for the CommonKADS methodology. This approach (which we have
named "OntoKADS") is founded on a core problem-solving ontology which
distinguishes between two conceptualization levels: at an object level, a set
of concepts enable us to define classes of problem-solving situations, and at a
meta level, a set of meta-concepts represent modeling primitives. In this
article, our presentation of OntoKADS will focus on the core ontology and, in
particular, on roles - the primitive situated at the interface between domain
knowledge and reasoning, and whose ontological status is still much debated. We
first propose a coherent, global, ontological framework which enables us to
account for this primitive. We then show how this novel characterization of the
primitive allows definition of new rules for the construction of expertise
models.
| [
{
"version": "v1",
"created": "Mon, 30 May 2005 13:42:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bruaux",
"Sabine",
"",
"LaRIA"
],
[
"Kassel",
"Gilles",
"",
"LaRIA"
],
[
"Morel",
"Gilles",
"",
"LaRIA"
]
]
|
cs/0505083 | Vladimir Vovk | Vladimir Vovk, Akimichi Takemura, Glenn Shafer | Defensive forecasting | 15 pages, 2 figures, to appear in the AIStats'2005 electronic
proceedings | Proceedings of the Tenth International Workshop on Artificial
Intelligence and Statistics, 2005, pages 365--372. | null | null | cs.LG cs.AI | null | We consider how to make probability forecasts of binary labels. Our main
mathematical result is that for any continuous gambling strategy used for
detecting disagreement between the forecasts and the actual labels, there
exists a forecasting strategy whose forecasts are ideal as far as this gambling
strategy is concerned. A forecasting strategy obtained in this way from a
gambling strategy demonstrating a strong law of large numbers is simplified and
studied empirically.
| [
{
"version": "v1",
"created": "Mon, 30 May 2005 21:12:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
],
[
"Takemura",
"Akimichi",
""
],
[
"Shafer",
"Glenn",
""
]
]
|
cs/0505084 | Valentin Brimkov | Valentin Brimkov, Angelo Maimone, Giorgio Nordo | An explicit formula for the number of tunnels in digital objects | 9 pages, 4 figures | null | null | null | cs.DM cs.CG cs.CV | null | An important concept in digital geometry for computer imagery is that of
tunnel. In this paper we obtain a formula for the number of tunnels as a
function of the number of the object vertices, pixels, holes, connected
components, and 2x2 grid squares. It can be used to test for tunnel-freedom a
digital object, in particular a digital curve.
| [
{
"version": "v1",
"created": "Tue, 31 May 2005 00:44:16 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Sep 2005 23:28:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brimkov",
"Valentin",
""
],
[
"Maimone",
"Angelo",
""
],
[
"Nordo",
"Giorgio",
""
]
]
|
cs/0505087 | Michael Soltys | Michael Soltys | Feasible Proofs of Matrix Properties with Csanky's Algorithm | null | null | null | null | cs.LO | null | We show that Csanky's fast parallel algorithm for computing the
characteristic polynomial of a matrix can be formalized in the logical theory
LAP, and can be proved correct in LAP from the principle of linear
independence. LAP is a natural theory for reasoning about linear algebra
introduced by Cook and Soltys. Further, we show that several principles of
matrix algebra, such as linear independence or the Cayley-Hamilton Theorem, can
be shown equivalent in the logical theory QLA. Applying the separation between
complexity classes AC^0[2] contained in DET(GF(2)), we show that these
principles are in fact not provable in QLA. In a nutshell, we show that linear
independence is ``all there is'' to elementary linear algebra (from a proof
complexity point of view), and furthermore, linear independence cannot be
proved trivially (again, from a proof complexity point of view).
| [
{
"version": "v1",
"created": "Tue, 31 May 2005 11:13:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Soltys",
"Michael",
""
]
]
|
cs/0506001 | Dmitry Mogilevsky | Dmitry Mogilevsky, Sean Keller | SafeMPI - Extending MPI for Byzantine Error Detection on Parallel
Clusters | null | null | null | null | cs.DC | null | Modern high-performance computing relies heavily on the use of commodity
processors arranged together in clusters. These clusters consist of individual
nodes (typically off-the-shelf single or dual processor machines) connected
together with a high speed interconnect. Using cluster computation has many
benefits, but also carries the liability of being failure prone due to the
sheer number of components involved. Many effective solutions have been
proposed to aid failure recovery in clusters, their one significant downside
being the failure models they support. Most of the work in the area has focused
on detecting and correcting fail-stop errors. We propose a system that will
also detect more general error models, such as Byzantine errors, thus allowing
existing failure recovery methods to handle them correctly.
| [
{
"version": "v1",
"created": "Tue, 31 May 2005 21:05:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mogilevsky",
"Dmitry",
""
],
[
"Keller",
"Sean",
""
]
]
|
cs/0506002 | Angela Bonifati | Angela Bonifati (Icar CNR, Italy), Elaine Qing Chang (UBC, Canada),
Terence Ho (UBC, Canada), and Laks V.S. Lakshmanan (UBC, Canada) | HepToX: Heterogeneous Peer to Peer XML Databases | 11 pages plus cover page | null | null | UBC TR-2005-15 | cs.DB | null | We study a collection of heterogeneous XML databases maintaining similar and
related information, exchanging data via a peer to peer overlay network. In
this setting, a mediated global schema is unrealistic. Yet, users/applications
wish to query the databases via one peer using its schema. We have recently
developed HepToX, a P2P Heterogeneous XML database system. A key idea is that
whenever a peer enters the system, it establishes an acquaintance with a small
number of peer databases, possibly with different schema. The peer
administrator provides correspondences between the local schema and the
acquaintance schema using an informal and intuitive notation of arrows and
boxes. We develop a novel algorithm that infers a set of precise mapping rules
between the schemas from these visual annotations. We pin down a semantics of
query translation given such mapping rules, and present a novel query
translation algorithm for a simple but expressive fragment of XQuery, that
employs the mapping rules in either direction. We show the translation
algorithm is correct. Finally, we demonstrate the utility and scalability of
our ideas and algorithms with a detailed set of experiments on top of the
Emulab, a large scale P2P network emulation testbed.
| [
{
"version": "v1",
"created": "Wed, 1 Jun 2005 01:30:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bonifati",
"Angela",
"",
"Icar CNR, Italy"
],
[
"Chang",
"Elaine Qing",
"",
"UBC, Canada"
],
[
"Ho",
"Terence",
"",
"UBC, Canada"
],
[
"Lakshmanan",
"Laks V. S.",
"",
"UBC, Canada"
]
]
|
cs/0506003 | Andrea Pasquinucci | Andrea Pasquinucci | Authentication and routing in simple Quantum Key Distribution networks | 12 pages, latex, 6 eps figures | null | null | null | cs.NI cs.CR quant-ph | null | We consider various issues which arise as soon as one tries to practically
implement simple networks of quantum relays for QKD. In particular we discuss
authentication and routing which are essential ingredients of any QKD network.
This paper aims to address some gaps between quantum and networking aspects of
QKD networks usually reserved to specialist in physics and computer science
respectively.
| [
{
"version": "v1",
"created": "Wed, 1 Jun 2005 10:37:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pasquinucci",
"Andrea",
""
]
]
|
cs/0506004 | Vladimir Vovk | Vladimir Vovk | Non-asymptotic calibration and resolution | 20 pages | null | null | null | cs.LG | null | We analyze a new algorithm for probability forecasting of binary observations
on the basis of the available data, without making any assumptions about the
way the observations are generated. The algorithm is shown to be well
calibrated and to have good resolution for long enough sequences of
observations and for a suitable choice of its parameter, a kernel on the
Cartesian product of the forecast space $[0,1]$ and the data space. Our main
results are non-asymptotic: we establish explicit inequalities, shown to be
tight, for the performance of the algorithm.
| [
{
"version": "v1",
"created": "Wed, 1 Jun 2005 14:03:20 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jul 2005 16:15:54 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Aug 2005 19:55:55 GMT"
},
{
"version": "v4",
"created": "Sat, 1 Jul 2006 13:46:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
]
|
cs/0506005 | Neng-Fa Zhou | Neng-Fa Zhou | Programming Finite-Domain Constraint Propagators in Action Rules | null | TPLP Vol 5(4&5) 2005 | null | null | cs.PL | null | In this paper, we propose a new language, called AR ({\it Action Rules}), and
describe how various propagators for finite-domain constraints can be
implemented in it. An action rule specifies a pattern for agents, an action
that the agents can carry out, and an event pattern for events that can
activate the agents. AR combines the goal-oriented execution model of logic
programming with the event-driven execution model. This hybrid execution model
facilitates programming constraint propagators. A propagator for a constraint
is an agent that maintains the consistency of the constraint and is activated
by the updates of the domain variables in the constraint. AR has a much
stronger descriptive power than {\it indexicals}, the language widely used in
the current finite-domain constraint systems, and is flexible for implementing
not only interval-consistency but also arc-consistency algorithms. As examples,
we present a weak arc-consistency propagator for the {\tt all\_distinct}
constraint and a hybrid algorithm for n-ary linear equality constraints.
B-Prolog has been extended to accommodate action rules. Benchmarking shows that
B-Prolog as a CLP(FD) system significantly outperforms other CLP(FD) systems.
| [
{
"version": "v1",
"created": "Thu, 2 Jun 2005 03:49:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Neng-Fa",
""
]
]
|
cs/0506007 | Vladimir Vovk | Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer | Defensive forecasting for linear protocols | 16 pages | null | null | null | cs.LG | null | We consider a general class of forecasting protocols, called "linear
protocols", and discuss several important special cases, including multi-class
forecasting. Forecasting is formalized as a game between three players:
Reality, whose role is to generate observations; Forecaster, whose goal is to
predict the observations; and Skeptic, who tries to make money on any lack of
agreement between Forecaster's predictions and the actual observations. Our
main mathematical result is that for any continuous strategy for Skeptic in a
linear protocol there exists a strategy for Forecaster that does not allow
Skeptic's capital to grow. This result is a meta-theorem that allows one to
transform any continuous law of probability in a linear protocol into a
forecasting strategy whose predictions are guaranteed to satisfy this law. We
apply this meta-theorem to a weak law of large numbers in Hilbert spaces to
obtain a version of the K29 prediction algorithm for linear protocols and show
that this version also satisfies the attractive properties of proper
calibration and resolution under a suitable choice of its kernel parameter,
with no assumptions about the way the data is generated.
| [
{
"version": "v1",
"created": "Thu, 2 Jun 2005 13:26:43 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Sep 2005 16:55:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
],
[
"Nouretdinov",
"Ilia",
""
],
[
"Takemura",
"Akimichi",
""
],
[
"Shafer",
"Glenn",
""
]
]
|
cs/0506008 | Felix Klaedtke | Felix Klaedtke | Bounds on the Automata Size for Presburger Arithmetic | null | null | null | null | cs.LO | null | Automata provide a decision procedure for Presburger arithmetic. However,
until now only crude lower and upper bounds were known on the sizes of the
automata produced by this approach. In this paper, we prove an upper bound on
the the number of states of the minimal deterministic automaton for a
Presburger arithmetic formula. This bound depends on the length of the formula
and the quantifiers occurring in the formula. The upper bound is established by
comparing the automata for Presburger arithmetic formulas with the formulas
produced by a quantifier elimination method. We also show that our bound is
tight, even for nondeterministic automata. Moreover, we provide optimal
automata constructions for linear equations and inequations.
| [
{
"version": "v1",
"created": "Thu, 2 Jun 2005 15:11:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Klaedtke",
"Felix",
""
]
]
|
cs/0506010 | Simeon Warner | Simeon Warner (Cornell University) | The OAI Data-Provider Registration and Validation Service | null | null | null | null | cs.DL | null | I present a summary of recent use of the Open Archives Initiative (OAI)
registration and validation services for data-providers. The registration
service has seen a steady stream of registrations since its launch in 2002, and
there are now over 220 registered repositories. I examine the validation logs
to produce a breakdown of reasons why repositories fail validation. This
breakdown highlights some common problems and will be used to guide work to
improve the validation service.
| [
{
"version": "v1",
"created": "Fri, 3 Jun 2005 17:15:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Warner",
"Simeon",
"",
"Cornell University"
]
]
|
cs/0506014 | Sebastian Maneth | Joost Engelfriet and Sebastian Maneth | The Equivalence Problem for Deterministic MSO Tree Transducers is
Decidable | null | null | null | null | cs.LO | null | It is decidable for deterministic MSO definable graph-to-string or
graph-to-tree transducers whether they are equivalent on a context-free set of
graphs.
| [
{
"version": "v1",
"created": "Mon, 6 Jun 2005 07:05:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Engelfriet",
"Joost",
""
],
[
"Maneth",
"Sebastian",
""
]
]
|
cs/0506015 | Raju Gangishetti | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena | Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems | Submitted to National Workshop on Cryptology 2005, India | null | null | null | cs.CR | null | To remove key escrow problem and avoid the need of secure channel in ID based
cryptosystem Lee et al. proposed a secure key issuing protocol. However we show
that it suffers from impersonation, insider attacks and incompetency of the key
privacy authorities. We also cryptanalyze Sui et al.'s separable and anonymous
key issuing protocol.
| [
{
"version": "v1",
"created": "Mon, 6 Jun 2005 09:48:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gangishetti",
"Raju",
""
],
[
"Gorantla",
"M. Choudary",
""
],
[
"Das",
"Manik Lal",
""
],
[
"Saxena",
"Ashutosh",
""
]
]
|
cs/0506019 | Vicky Choi | Vicky Choi, Navin Goyal | An Efficient Approximation Algorithm for Point Pattern Matching Under
Noise | 18 pages | null | null | null | cs.CV cs.CG | null | Point pattern matching problems are of fundamental importance in various
areas including computer vision and structural bioinformatics. In this paper,
we study one of the more general problems, known as LCP (largest common point
set problem): Let $\PP$ and $\QQ$ be two point sets in $\mathbb{R}^3$, and let
$\epsilon \geq 0$ be a tolerance parameter, the problem is to find a rigid
motion $\mu$ that maximizes the cardinality of subset $\II$ of $Q$, such that
the Hausdorff distance $\distance(\PP,\mu(\II)) \leq \epsilon$. We denote the
size of the optimal solution to the above problem by $\LCP(P,Q)$. The problem
is called exact-LCP for $\epsilon=0$, and \tolerant-LCP when $\epsilon>0$ and
the minimum interpoint distance is greater than $2\epsilon$. A
$\beta$-distance-approximation algorithm for tolerant-LCP finds a subset $I
\subseteq \QQ$ such that $|I|\geq \LCP(P,Q)$ and $\distance(\PP,\mu(\II)) \leq
\beta \epsilon$ for some $\beta \ge 1$.
This paper has three main contributions. (1) We introduce a new algorithm,
called {\DA}, which gives the fastest known deterministic
4-distance-approximation algorithm for \tolerant-LCP. (2) For the exact-LCP,
when the matched set is required to be large, we give a simple sampling
strategy that improves the running times of all known deterministic algorithms,
yielding the fastest known deterministic algorithm for this problem. (3) We use
expander graphs to speed-up the \DA algorithm for \tolerant-LCP when the size
of the matched set is required to be large, at the expense of approximation in
the matched set size. Our algorithms also work when the transformation $\mu$ is
allowed to be scaling transformation.
| [
{
"version": "v1",
"created": "Tue, 7 Jun 2005 17:41:53 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2005 21:33:55 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Sep 2005 15:43:28 GMT"
},
{
"version": "v4",
"created": "Sun, 2 Jul 2006 22:19:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Choi",
"Vicky",
""
],
[
"Goyal",
"Navin",
""
]
]
|
cs/0506023 | Alexandre d'Aspremont | Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui | Sparse Covariance Selection via Robust Maximum Likelihood Estimation | Submitted to NIPS 2005 | null | null | null | cs.CE cs.AI | null | We address a problem of covariance selection, where we seek a trade-off
between a high likelihood against the number of non-zero elements in the
inverse covariance matrix. We solve a maximum likelihood problem with a penalty
term given by the sum of absolute values of the elements of the inverse
covariance matrix, and allow for imposing bounds on the condition number of the
solution. The problem is directly amenable to now standard interior-point
algorithms for convex optimization, but remains challenging due to its size. We
first give some results on the theoretical computational complexity of the
problem, by showing that a recent methodology for non-smooth convex
optimization due to Nesterov can be applied to this problem, to greatly improve
on the complexity estimate given by interior-point algorithms. We then examine
two practical algorithms aimed at solving large-scale, noisy (hence dense)
instances: one is based on a block-coordinate descent approach, where columns
and rows are updated sequentially, another applies a dual version of Nesterov's
method.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 21:08:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Banerjee",
"Onureena",
""
],
[
"d'Aspremont",
"Alexandre",
""
],
[
"Ghaoui",
"Laurent El",
""
]
]
|
cs/0506024 | Marko Antonio Rodriguez | Marko A. Rodriguez | The Hyper-Cortex of Human Collective-Intelligence Systems | ECCO Working Paper 06-2005 (17-pages) This paper will be shortened to
just the multi-layered digital-library hyper-cortex | null | null | null | cs.CY cs.AI cs.DL cs.NE | null | Individual-intelligence research, from a neurological perspective, discusses
the hierarchical layers of the cortex as a structure that performs conceptual
abstraction and specification. This theory has been used to explain how
motor-cortex regions responsible for different behavioral modalities such as
writing and speaking can be utilized to express the same general concept
represented higher in the cortical hierarchy. For example, the concept of a
dog, represented across a region of high-level cortical-neurons, can either be
written or spoken about depending on the individual's context. The higher-layer
cortical areas project down the hierarchy, sending abstract information to
specific regions of the motor-cortex for contextual implementation. In this
paper, this idea is expanded to incorporate collective-intelligence within a
hyper-cortical construct. This hyper-cortex is a multi-layered network used to
represent abstract collective concepts. These ideas play an important role in
understanding how collective-intelligence systems can be engineered to handle
problem abstraction and solution specification. Finally, a collection of common
problems in the scientific community are solved using an artificial
hyper-cortex generated from digital-library metadata.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 21:33:44 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jun 2005 21:14:29 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Jun 2005 19:24:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
]
|
cs/0506026 | Rada Chirkova | Rada Chirkova and Michael R. Genesereth | Database Reformulation with Integrity Constraints (extended abstract) | In the proceedings of the the Logic and Computational Complexity
Workshop, in conjunction with of the Logic in Computer Science Conference
(LICS), Chicago, June 2005 | null | null | null | cs.DB | null | In this paper we study the problem of reducing the evaluation costs of
queries on finite databases in presence of integrity constraints, by designing
and materializing views. Given a database schema, a set of queries defined on
the schema, a set of integrity constraints, and a storage limit, to find a
solution to this problem means to find a set of views that satisfies the
storage limit, provides equivalent rewritings of the queries under the
constraints (this requirement is weaker than equivalence in the absence of
constraints), and reduces the total costs of evaluating the queries. This
problem, database reformulation, is important for many applications, including
data warehousing and query optimization. We give complexity results and
algorithms for database reformulation in presence of constraints, for
conjunctive queries, views, and rewritings and for several types of
constraints, including functional and inclusion dependencies. To obtain better
complexity results, we introduce an unchase technique, which reduces the
problem of query equivalence under constraints to equivalence in the absence of
constraints without increasing query size.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 22:03:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chirkova",
"Rada",
""
],
[
"Genesereth",
"Michael R.",
""
]
]
|
cs/0506027 | Travis Gagie | Travis Gagie | Sorting a Low-Entropy Sequence | null | null | null | null | cs.DS | null | We give the first sorting algorithm with bounds in terms of higher-order
entropies: let $S$ be a sequence of length $m$ containing $n$ distinct elements
and let (H_\ell (S)) be the $\ell$th-order empirical entropy of $S$, with
(n^{\ell + 1} \log n \in O (m)); our algorithm sorts $S$ using ((H_\ell (S) + O
(1)) m) comparisons.
| [
{
"version": "v1",
"created": "Wed, 8 Jun 2005 22:15:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gagie",
"Travis",
""
]
]
|
cs/0506030 | Jonathan Ben-Naim | Jonathan Ben-Naim (LIF) | Preferential and Preferential-discriminative Consequence relations | team Logic and Complexity, written in 2004-2005 | Journal of Logic and Computation 15 (2005) number 3, pp. 263-294 | 10.1093/logcom/exi013 | null | cs.AI cs.LO | null | The present paper investigates consequence relations that are both
non-monotonic and paraconsistent. More precisely, we put the focus on
preferential consequence relations, i.e. those relations that can be defined by
a binary preference relation on states labelled by valuations. We worked with a
general notion of valuation that covers e.g. the classical valuations as well
as certain kinds of many-valued valuations. In the many-valued cases,
preferential consequence relations are paraconsistant (in addition to be
non-monotonic), i.e. they are capable of drawing reasonable conclusions which
contain contradictions. The first purpose of this paper is to provide in our
general framework syntactic characterizations of several families of
preferential relations. The second and main purpose is to provide, again in our
general framework, characterizations of several families of preferential
discriminative consequence relations. They are defined exactly as the plain
version, but any conclusion such that its negation is also a conclusion is
rejected (these relations bring something new essentially in the many-valued
cases).
| [
{
"version": "v1",
"created": "Thu, 9 Jun 2005 12:53:47 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2006 12:19:55 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Mar 2006 14:47:04 GMT"
},
{
"version": "v4",
"created": "Mon, 19 Jun 2006 08:17:49 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Apr 2007 14:52:32 GMT"
},
{
"version": "v6",
"created": "Sun, 8 Apr 2007 15:04:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
]
|
cs/0506031 | Laurent Henocque | Patrick Albert, Laurent Henocque, Mathias Kleiner | A Constrained Object Model for Configuration Based Workflow Composition | This is an extended version of the article published at BPM'05, Third
International Conference on Business Process Management, Nancy France | null | null | null | cs.AI | null | Automatic or assisted workflow composition is a field of intense research for
applications to the world wide web or to business process modeling. Workflow
composition is traditionally addressed in various ways, generally via theorem
proving techniques. Recent research observed that building a composite workflow
bears strong relationships with finite model search, and that some workflow
languages can be defined as constrained object metamodels . This lead to
consider the viability of applying configuration techniques to this problem,
which was proven feasible. Constrained based configuration expects a
constrained object model as input. The purpose of this document is to formally
specify the constrained object model involved in ongoing experiments and
research using the Z specification language.
| [
{
"version": "v1",
"created": "Thu, 9 Jun 2005 14:57:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Albert",
"Patrick",
""
],
[
"Henocque",
"Laurent",
""
],
[
"Kleiner",
"Mathias",
""
]
]
|
cs/0506032 | Shankar Ramachandran Mr | R. Shankar | Framework for Hopfield Network based Adaptive routing - A design level
approach for adaptive routing phenomena with Artificial Neural Network | (13 pages, 7 figures, code) | null | null | null | cs.NE | null | Routing, as a basic phenomena, by itself, has got umpteen scopes to analyse,
discuss and arrive at an optimal solution for the technocrats over years.
Routing is analysed based on many factors; few key constraints that decide the
factors are communication medium, time dependency, information source nature.
Parametric routing has become the requirement of the day, with some kind of
adaptation to the underlying network environment. Satellite constellations,
particularly LEO satellite constellations have become a reality in operational
to have a non-breaking voice/data communication around the world.Routing in
these constellations has to be treated in a non conventional way, taking their
network geometry into consideration. One of the efficient methods of
optimization is putting Neural Networks to use. Few Artificial Neural Network
models are very much suitable for the adaptive control mechanism, by their
nature of network arrangement. One such efficient model is Hopfield Network
model.
This paper is an attempt to design a framework for the Hopfield Network based
adaptive routing phenomena in satellite constellations.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 05:30:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shankar",
"R.",
""
]
]
|
cs/0506034 | Srikumar Venugopal | Srikumar Venugopal, Rajkumar Buyya and Kotagiri Ramamohanarao | A Taxonomy of Data Grids for Distributed Data Sharing, Management and
Processing | 46 pages, 16 figures, Technical Report | null | null | GRIDS-TR-2005-3 | cs.DC cs.CE | null | Data Grids have been adopted as the platform for scientific communities that
need to share, access, transport, process and manage large data collections
distributed worldwide. They combine high-end computing technologies with
high-performance networking and wide-area storage management techniques. In
this paper, we discuss the key concepts behind Data Grids and compare them with
other data sharing and distribution paradigms such as content delivery
networks, peer-to-peer networks and distributed databases. We then provide
comprehensive taxonomies that cover various aspects of architecture, data
transportation, data replication and resource allocation and scheduling.
Finally, we map the proposed taxonomy to various Data Grid systems not only to
validate the taxonomy but also to identify areas for future exploration.
Through this taxonomy, we aim to categorise existing systems to better
understand their goals and their methodology. This would help evaluate their
applicability for solving similar problems. This taxonomy also provides a "gap
analysis" of this area through which researchers can potentially identify new
issues for investigation. Finally, we hope that the proposed taxonomy and
mapping also helps to provide an easy way for new practitioners to understand
this complex area of research.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 10:59:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Venugopal",
"Srikumar",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Ramamohanarao",
"Kotagiri",
""
]
]
|
cs/0506035 | Michel Dagenais | Jerome Collin (Computer Engineering, Ecole Polytechnique de Montreal),
Michel Dagenais (Computer Engineering, Ecole Polytechnique de Montreal) | Fast Recompilation of Object Oriented Modules | null | null | null | null | cs.PL | null | Once a program file is modified, the recompilation time should be minimized,
without sacrificing execution speed or high level object oriented features. The
recompilation time is often a problem for the large graphical interactive
distributed applications tackled by modern OO languages. A compilation server
and fast code generator were developed and integrated with the SRC Modula-3
compiler and Linux ELF dynamic linker. The resulting compilation and
recompilation speedups are impressive. The impact of different language
features, processor speed, and application size are discussed.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 15:28:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Collin",
"Jerome",
"",
"Computer Engineering, Ecole Polytechnique de Montreal"
],
[
"Dagenais",
"Michel",
"",
"Computer Engineering, Ecole Polytechnique de Montreal"
]
]
|
cs/0506038 | Wen Ding | Wen Ding & William Yurcik | A Game Theoretic Economics Framework to understanding Information
Security Oursourcing Market | 16 pages, 2 figures | null | null | null | cs.GT | null | On information security outsourcing market, an important reason that firms do
not want to let outside firms(usually called MSSPs-Managed Security Service
Providers) to take care of their security need is that they worry about service
quality MSSPs provide because they cannot monitor effort of the MSSPs. Since
MSSPs action is unobservable to buyers, MSSPs can lower cost by working less
hard than required in the contract and get higher profit. In the asymmetric
information literature, this possible secret shirking behavior is termed as
moral hazard problem. This paper considers a game theoretic economic framework
to show that under information asymmetry, an optimal contract can be designed
so that MSSPs will stick to their promised effort level. We also show that the
optimal contract should be performance-based, i.e., payment to MSSP should base
on performance of MSSP's security service period by period. For comparison, we
also showed that if the moral hazard problem does not exist, the optimal
contract does not depend on MSSP's performance. A contract that specifies
constant payment to MSSP will be optimal. Besides these, we show that for no
matter under perfect information scenario or imperfect information scenario,
the higher the transaction cost is, the lower payment to MSSPs will be.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 23:58:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ding",
"Wen",
""
],
[
"Yurcik",
"William",
""
]
]
|
cs/0506041 | Vladimir Vovk | Vladimir Vovk | Competitive on-line learning with a convex loss function | 26 pages | null | null | null | cs.LG cs.AI | null | We consider the problem of sequential decision making under uncertainty in
which the loss caused by a decision depends on the following binary
observation. In competitive on-line learning, the goal is to design decision
algorithms that are almost as good as the best decision rules in a wide
benchmark class, without making any assumptions about the way the observations
are generated. However, standard algorithms in this area can only deal with
finite-dimensional (often countable) benchmark classes. In this paper we give
similar results for decision rules ranging over an arbitrary reproducing kernel
Hilbert space. For example, it is shown that for a wide class of loss functions
(including the standard square, absolute, and log loss functions) the average
loss of the master algorithm, over the first $N$ observations, does not exceed
the average loss of the best decision rule with a bounded norm plus
$O(N^{-1/2})$. Our proof technique is very different from the standard ones and
is based on recent results about defensive forecasting. Given the probabilities
produced by a defensive forecasting algorithm, which are known to be well
calibrated and to have good resolution in the long run, we use the expected
loss minimization principle to find a suitable decision.
| [
{
"version": "v1",
"created": "Sat, 11 Jun 2005 18:11:22 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jul 2005 16:49:33 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Sep 2005 14:27:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
]
|
cs/0506046 | Bernard Jacquemin | Bernard Jacquemin (ISC) | Dictionaries merger for text expansion in question answering | 4 pp | Proceedings of COLING 2004 (2004) 1398 | null | null | cs.DL | null | This paper presents an original way to add new data in a reference dictionary
from several other lexical resources, without loosing any consistence. This
operation is carried in order to get lexical information classified by the
sense of the entry. This classification makes it possible to enrich utterances
(in QA: the queries) following the meaning, and to reduce noise. An analysis of
the experienced problems shows the interest of this method, and insists on the
points that have to be tackled.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:36:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
]
|
cs/0506047 | Bernard Jacquemin | Bernard Jacquemin (ISC) | Analyse et expansion des textes en question-r\'{e}ponse | 11 pp | Le poids des mots. Actes des 7es journ\'{e}es internationales
d'Analyse statistique des Donn\'{e}es Textuelles (2004) 1219 | null | null | cs.IR | null | This paper presents an original methodology to consider question answering.
We noticed that query expansion is often incorrect because of a bad
understanding of the question. But the automatic good understanding of an
utterance is linked to the context length, and the question are often short.
This methodology proposes to analyse the documents and to construct an
informative structure from the results of the analysis and from a semantic text
expansion. The linguistic analysis identifies words (tokenization and
morphological analysis), links between words (syntactic analysis) and word
sense (semantic disambiguation). The text expansion adds to each word the
synonyms matching its sense and replaces the words in the utterances by
derivatives, modifying the syntactic schema if necessary. In this way, whatever
enrichment may be, the text keeps the same meaning, but each piece of
information matches many realisations. The questioning method consists in
constructing a local informative structure without enrichment, and matches it
with the documentary structure. If a sentence in the informative structure
matches the question structure, this sentence is the answer to the question.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:39:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
]
]
|
cs/0506048 | Bernard Jacquemin | Bernard Jacquemin (ISC), Caroline Brun, Claude Roux | Enriching a Text by Semantic Disambiguation for Information Extraction | 7 pp | LREC 2002 Workshop Proceedings "Using semantics for informaiton
retrival and filtering" (2002) 45-51 | null | null | cs.IR | null | External linguistic resources have been used for a very long time in
information extraction. These methods enrich a document with data that are
semantically equivalent, in order to improve recall. For instance, some of
these methods use synonym dictionaries. These dictionaries enrich a sentence
with words that have a similar meaning. However, these methods present some
serious drawbacks, since words are usually synonyms only in restricted
contexts. The method we propose here consists of using word sense
disambiguation rules (WSD) to restrict the selection of synonyms to only these
that match a specific syntactico-semantic context. We show how WSD rules are
built and how information extraction techniques can benefit from the
application of these rules.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2005 16:44:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC"
],
[
"Brun",
"Caroline",
""
],
[
"Roux",
"Claude",
""
]
]
|
cs/0506050 | Alex Wiesmaier | A. Wiesmaier, V. Karatsiolis, M. Lippert, J. Buchmann | The Workshop - Implementing Well Structured Enterprise Applications | 7 pages (ieee), 1 figure, accepted for SERP'05 | Proceedings of "The 2005 International Conference on Software
Engineering Research and Practice"; June 2005 | null | null | cs.SE | null | We specify an abstraction layer to be used between an enterprise application
and the utilized enterprise framework (like J2EE or .NET). This specification
is called the Workshop. It provides an intuitive metaphor supporting the
programmer in designing easy understandable code. We present an implementation
of this specification. It is based upon the J2EE framework and is called the
JWorkshop. As a proof of concept we implement a special certification authority
called the Key Authority based upon the JWorkshop. The mentioned certification
authority runs very successfully in a variety of different real world projects.
| [
{
"version": "v1",
"created": "Mon, 13 Jun 2005 13:25:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wiesmaier",
"A.",
""
],
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Buchmann",
"J.",
""
]
]
|
cs/0506051 | Heiko Herrmann | Heiko Herrmann, Gunnar Rueckner | Comparison of two different implementations of a
finite-difference-method for first-order pde in mathematica and matlab | LaTeX, 6 pages, 9 eps-figures, v2: minor additions/corrections | null | null | null | cs.CE cs.DM | null | In this article two implementations of a symmetric finite difference
algorithm for a first-order partial differential equation are discussed. The
considered partial differential equation discribes the time evolution of the
crack length distribution of microcracks in brittle materia.
| [
{
"version": "v1",
"created": "Mon, 13 Jun 2005 15:26:16 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Nov 2005 10:25:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Herrmann",
"Heiko",
""
],
[
"Rueckner",
"Gunnar",
""
]
]
|
cs/0506054 | Ramesh Johari | Ramesh Johari (Stanford University), Shie Mannor (McGill University),
John N. Tsitsiklis (MIT) | Efficiency Loss in a Network Resource Allocation Game: The Case of
Elastic Supply | Originally Laboratory for Information and Decision Systems (MIT)
Publication 2605 | null | null | null | cs.GT | null | We consider a resource allocation problem where individual users wish to send
data across a network to maximize their utility, and a cost is incurred at each
link that depends on the total rate sent through the link. It is known that as
long as users do not anticipate the effect of their actions on prices, a simple
proportional pricing mechanism can maximize the sum of users' utilities minus
the cost (called aggregate surplus). Continuing previous efforts to quantify
the effects of selfish behavior in network pricing mechanisms, we consider the
possibility that users anticipate the effect of their actions on link prices.
Under the assumption that the links' marginal cost functions are convex, we
establish existence of a Nash equilibrium. We show that the aggregate surplus
at a Nash equilibrium is no worse than a factor of 4*sqrt{2} - 5 times the
optimal aggregate surplus; thus, the efficiency loss when users are selfish is
no more than approximately 34%.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 02:11:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Johari",
"Ramesh",
"",
"Stanford University"
],
[
"Mannor",
"Shie",
"",
"McGill University"
],
[
"Tsitsiklis",
"John N.",
"",
"MIT"
]
]
|
cs/0506055 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe | The Complexity of Kings | null | null | null | URCS-TR-2005-870 | cs.CC cs.DM | null | A king in a directed graph is a node from which each node in the graph can be
reached via paths of length at most two. There is a broad literature on
tournaments (completely oriented digraphs), and it has been known for more than
half a century that all tournaments have at least one king [Lan53]. Recently,
kings have proven useful in theoretical computer science, in particular in the
study of the complexity of the semifeasible sets [HNP98,HT05] and in the study
of the complexity of reachability problems [Tan01,NT02].
In this paper, we study the complexity of recognizing kings. For each
succinctly specified family of tournaments, the king problem is known to belong
to $\Pi_2^p$ [HOZZ]. We prove that this bound is optimal: We construct a
succinctly specified tournament family whose king problem is
$\Pi_2^p$-complete. It follows easily from our proof approach that the problem
of testing kingship in succinctly specified graphs (which need not be
tournaments) is $\Pi_2^p$-complete. We also obtain $\Pi_2^p$-completeness
results for k-kings in succinctly specified j-partite tournaments, $k,j \geq
2$, and we generalize our main construction to show that $\Pi_2^p$-completeness
holds for testing k-kingship in succinctly specified families of tournaments
for all $k \geq 2$.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 02:31:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Watanabe",
"Osamu",
""
]
]
|
cs/0506057 | Victor Kromer | Kromer Victor | About one 3-parameter Model of Testing | 9 pages; in Russian; Paper with changed content | null | null | null | cs.LG | null | This article offers a 3-parameter model of testing, with 1) the difference
between the ability level of the examinee and item difficulty; 2) the examinee
discrimination and 3) the item discrimination as model parameters.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 04:00:38 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2005 02:43:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Victor",
"Kromer",
""
]
]
|
cs/0506059 | Hubie Chen | Hubie Chen | Existentially Restricted Quantified Constraint Satisfaction | null | null | null | null | cs.CC cs.LO | null | The quantified constraint satisfaction problem (QCSP) is a powerful framework
for modelling computational problems. The general intractability of the QCSP
has motivated the pursuit of restricted cases that avoid its maximal
complexity. In this paper, we introduce and study a new model for investigating
QCSP complexity in which the types of constraints given by the existentially
quantified variables, is restricted. Our primary technical contribution is the
development and application of a general technology for proving positive
results on parameterizations of the model, of inclusion in the complexity class
coNP.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 11:57:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
]
]
|
cs/0506060 | Yong Luo | Yong Luo | Yet another normalisation proof for Martin-Lof's logical
framework--Terms with correct arities are strongly normalising | 19 pages | null | null | null | cs.LO | null | In this paper, we prove the strong normalisation for Martin-L\"{o}f's Logical
Framework, and suggest that {}``correct arity'', a condition weaker than
well-typedness, will also guarantee the strong normalisation.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 12:13:22 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jun 2005 16:56:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luo",
"Yong",
""
]
]
|
cs/0506063 | Slawomir Staworko | Slawomir Staworko and Jan Chomicki | Priority-Based Conflict Resolution in Inconsistent Relational Databases | null | null | null | UB CSE Technical Report 2005-11 | cs.DB | null | We study here the impact of priorities on conflict resolution in inconsistent
relational databases. We extend the framework of repairs and consistent query
answers. We propose a set of postulates that an extended framework should
satisfy and consider two instantiations of the framework: (locally preferred)
l-repairs and (globally preferred) g-repairs. We study the relationships
between them and the impact each notion of repair has on the computational
complexity of repair checking and consistent query answers.
| [
{
"version": "v1",
"created": "Tue, 14 Jun 2005 23:10:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Staworko",
"Slawomir",
""
],
[
"Chomicki",
"Jan",
""
]
]
|
cs/0506066 | Yoo Chung | Yoo Chung and Dongman Lee | Impersonation with the Echo Protocol | submitted to ACM Workshop on Wireless Security (2005) | null | null | null | cs.CR cs.NI | null | The Echo protocol tries to do secure location verification using physical
limits imposed by the speeds of light and sound. While the protocol is able to
guarantee that a certain object is within a certain region, it cannot ensure
the authenticity of further messages from the object without using
cryptography. This paper describes an impersonation attack against the protocol
based on this weakness. It also describes a couple of approaches which can be
used to defend against the attack.
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2005 10:57:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chung",
"Yoo",
""
],
[
"Lee",
"Dongman",
""
]
]
|
cs/0506067 | Juan Jose Amor | Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona | Measuring Woody: The Size of Debian 3.0 | null | null | null | null | cs.SE | null | Debian is possibly the largest free software distribution, with well over
4,500 source packages in the latest stable release (Debian 3.0) and more than
8,000 source packages in the release currently in preparation. However, we wish
to know what these numbers mean. In this paper, we use David A. Wheeler's
SLOCCount system to determine the number of physical source lines of code
(SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than
105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months
later), showing that the Debian development model (based on the work of a large
group of voluntary developers spread around the world) is at least as capable
as other development methods (like the more centralized one, based on the work
of employees, used by Red Hat or Microsoft) to manage distributions of this
size.
It is also shown that if Debian had been developed using traditional
proprietary methods, the COCOMO model estimates that its cost would be close to
$6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis
of the programming languages used in the distribution (C amounts for about 65%,
C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others
to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3,
etc.)
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2005 21:48:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Amor",
"Juan Jose",
""
],
[
"Robles",
"Gregorio",
""
],
[
"Gonzalez-Barahona",
"Jesus",
""
]
]
|
cs/0506068 | John Watrous | Chris Marriott and John Watrous | Quantum Arthur-Merlin Games | 22 pages | Computational Complexity, 14(2): 122 - 152, 2005 | null | null | cs.CC quant-ph | null | This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games
in which Arthur and Merlin can perform quantum computations and Merlin can send
Arthur quantum information. As in the classical case, messages from Arthur to
Merlin are restricted to be strings of uniformly generated random bits. It is
proved that for one-message quantum Arthur-Merlin games, which correspond to
the complexity class QMA, completeness and soundness errors can be reduced
exponentially without increasing the length of Merlin's message. Previous
constructions for reducing error required a polynomial increase in the length
of Merlin's message. Applications of this fact include a proof that logarithmic
length quantum certificates yield no increase in power over BQP and a simple
proof that QMA is contained in PP. Other facts that are proved include the
equivalence of three (or more) message quantum Arthur-Merlin games with
ordinary quantum interactive proof systems and some basic properties concerning
two-message quantum Arthur-Merlin games.
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2005 22:13:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Marriott",
"Chris",
""
],
[
"Watrous",
"John",
""
]
]
|
cs/0506070 | Yuriy Chashkov | Ph.D. Yuriy A. Chashkov | Data Visualization on Shared Usage Multi-Screen Environment | 4 pages, 1 figure | null | null | null | cs.MM | null | The modern multimedia technologies based on the whole palette of hardware and
software facilities of real-time high-speed information processing, in a
combination with effective facilities of the remote access to information
resources, allow us to visualize diverse types of information. Data
visualization facilities – is the face of the Automated Control System on
whom often judge about their efficiency. They take a special place, providing
visualization of the diverse information necessary for decision-making by a
final control link - the person allocated by certain powers.
| [
{
"version": "v1",
"created": "Thu, 16 Jun 2005 10:15:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chashkov",
"Ph. D. Yuriy A.",
""
]
]
|
cs/0506071 | Yuriy Reznykov | Yu. Reznykov | Signal transmission on lossy lines as a dissipative quantum state
propagation | 6 pages, revtex4 | null | null | BTU LTP-05-06 | cs.NI | null | The transmission of electric signals on a coupled line with distributed
RLC-parameters is considered as a propagation of a dissipative quasi particle.
A calculation technique is developed, alternative to the one, accepted for
lumped lines. The relativistic wave equation for the transient response is
deduced following the common Ohm-low-type considerations. The exact expressions
for the Green function, for information transfer velocity and for time delay
are obtained on this base. The fundamental restrictions on the measurement
accuracy of the time delay are pointed out. The obtained results are naturally
generalized for the multilevel networks of the arbitrary dimension.
| [
{
"version": "v1",
"created": "Thu, 16 Jun 2005 11:40:54 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 07:28:35 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jun 2005 09:31:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Reznykov",
"Yu.",
""
]
]
|
cs/0506075 | Lillian Lee | Bo Pang and Lillian Lee | Seeing stars: Exploiting class relationships for sentiment
categorization with respect to rating scales | To appear, Proceedings of ACL 2005 | null | null | null | cs.CL cs.LG | null | We address the rating-inference problem, wherein rather than simply decide
whether a review is "thumbs up" or "thumbs down", as in previous sentiment
analysis work, one must determine an author's evaluation with respect to a
multi-point scale (e.g., one to five "stars"). This task represents an
interesting twist on standard multi-class text categorization because there are
several different degrees of similarity between class labels; for example,
"three stars" is intuitively closer to "four stars" than to "one star". We
first evaluate human performance at the task. Then, we apply a meta-algorithm,
based on a metric labeling formulation of the problem, that alters a given
n-ary classifier's output in an explicit attempt to ensure that similar items
receive similar labels. We show that the meta-algorithm can provide significant
improvements over both multi-class and regression versions of SVMs when we
employ a novel similarity measure appropriate to the problem.
| [
{
"version": "v1",
"created": "Fri, 17 Jun 2005 20:10:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
]
]
|
cs/0506076 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | Alternative security architecture for IP Telephony based on digital
watermarking | 10 pages, 5 figures | Lecture Notes in Computer Science 4166, pp. 170 - 181, Springer,
Heidelberg 2006. ISBN 978-3-540-45762-6 | null | null | cs.CR cs.MM | null | Problems with securing IP Telephony systems, insufficient standardization and
lack of security mechanisms emerged the need for new approaches and solutions.
In this paper a new, alternative security architecture for voice-systems is
presented. It is based on digital watermarking: a new, flexible and powerful
technology that is increasingly gaining more and more attention. Besides known
applications e.g. to solve copyright protection problems, we propose to use
digital watermarking to secure not only transmitted audio but also signaling
protocol that IP Telephony is based on.
| [
{
"version": "v1",
"created": "Sat, 18 Jun 2005 21:41:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.