id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0506078 | David Renato Carreta Dominguez | David Dominguez, Kostadin Koroutchev, Eduardo Serrano & Francisco B.
Rodriguez | Dynamical Neural Network: Information and Topology | 10pg, 5fig | null | null | null | cs.IR cs.NE | null | A neural network works as an associative memory device if it has large
storage capacity and the quality of the retrieval is good enough. The learning
and attractor abilities of the network both can be measured by the mutual
information (MI), between patterns and retrieval states. This paper deals with
a search for an optimal topology, of a Hebb network, in the sense of the
maximal MI. We use small-world topology. The connectivity $\gamma$ ranges from
an extremely diluted to the fully connected network; the randomness $\omega$
ranges from purely local to completely random neighbors. It is found that,
while stability implies an optimal $MI(\gamma,\omega)$ at
$\gamma_{opt}(\omega)\to 0$, for the dynamics, the optimal topology holds at
certain $\gamma_{opt}>0$ whenever $0\leq\omega<0.3$.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 14:54:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dominguez",
"David",
""
],
[
"Koroutchev",
"Kostadin",
""
],
[
"Serrano",
"Eduardo",
""
],
[
"Rodriguez",
"Francisco B.",
""
]
]
|
cs/0506079 | Ugo Dal Lago | U. Dal Lago and M. Hofmann | Quantitative Models and Implicit Complexity | 29 pages | null | null | null | cs.LO cs.CC | null | We give new proofs of soundness (all representable functions on base types
lies in certain complexity classes) for Elementary Affine Logic, LFPL (a
language for polytime computation close to realistic functional programming
introduced by one of us), Light Affine Logic and Soft Affine Logic. The proofs
are based on a common semantical framework which is merely instantiated in four
different ways. The framework consists of an innovative modification of
realizability which allows us to use resource-bounded computations as realisers
as opposed to including all Turing computable functions as is usually the case
in realizability constructions. For example, all realisers in the model for
LFPL are polynomially bounded computations whence soundness holds by
construction of the model. The work then lies in being able to interpret all
the required constructs in the model. While being the first entirely semantical
proof of polytime soundness for light logi cs, our proof also provides a
notable simplification of the original already semantical proof of polytime
soundness for LFPL. A new result made possible by the semantic framework is the
addition of polymorphism and a modality to LFPL thus allowing for an internal
definition of inductive datatypes.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 16:00:10 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jun 2005 13:20:25 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Oct 2005 15:21:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lago",
"U. Dal",
""
],
[
"Hofmann",
"M.",
""
]
]
|
cs/0506081 | Gatis Midrijanis | Gatis Midrijanis | Three lines proof of the lower bound for the matrix rigidity | 4 pages | null | null | null | cs.CC | null | The rigidity of a matrix describes the minimal number of entries one has to
change to reduce matrix's rank to r. We give very simple combinatorial proof of
the lower bound for the rigidity of Sylvester (special case of Hadamard) matrix
that matches the best known result by de Wolf(2005) for Hadamard matrices
proved by quantum information theoretical arguments.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 19:54:48 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jun 2005 20:12:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Midrijanis",
"Gatis",
""
]
]
|
cs/0506082 | Lane A. Hemaspaandra | Piotr Faliszewski and Lane A. Hemaspaandra | Open Questions in the Theory of Semifeasible Computation | null | null | null | URCS-TR-2005-872 | cs.CC | null | The study of semifeasible algorithms was initiated by Selman's work a quarter
of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream
studies the power of those sets L for which there is a deterministic (or in
some cases, the function may belong to one of various nondeterministic function
classes) polynomial-time function f such that when at least one of x and y
belongs to L, then f(x,y) \in L \cap \{x,y\}. The intuition here is that it is
saying: ``Regarding membership in L, if you put a gun to my head and forced me
to bet on one of x or y as belonging to L, my money would be on f(x,y).''
In this article, we present a number of open problems from the theory of
semifeasible algorithms. For each we present its background and review what
partial results, if any, are known.
| [
{
"version": "v1",
"created": "Mon, 20 Jun 2005 22:33:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
]
|
cs/0506084 | Jason Holt | Jason E. Holt (BYU) | The One Page Model Checker | 12 pages | null | null | null | cs.LO | null | We show how standard IPC mechanisms can be used with the fork() system call
to perform explicit state model checking on all interleavings of a
multithreaded application. We specifically show how to check for deadlock and
race conditions in programs with two threads. Our techniques are easy to apply
to other languages, and require only the most rudimentary parsing of the target
language. Our fundamental system fits in one page of C code.
| [
{
"version": "v1",
"created": "Wed, 22 Jun 2005 20:54:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Holt",
"Jason E.",
"",
"BYU"
]
]
|
cs/0506085 | Jason Holt | Jason E. Holt (BYU) | On the Job Training | 8 pages, submitted to NIPS 2005 | null | null | null | cs.LG | null | We propose a new framework for building and evaluating machine learning
algorithms. We argue that many real-world problems require an agent which must
quickly learn to respond to demands, yet can continue to perform and respond to
new training throughout its useful life. We give a framework for how such
agents can be built, describe several metrics for evaluating them, and show
that subtle changes in system construction can significantly affect agent
performance.
| [
{
"version": "v1",
"created": "Wed, 22 Jun 2005 21:21:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Holt",
"Jason E.",
"",
"BYU"
]
]
|
cs/0506090 | Tobias Riege | Tobias Riege, J\"org Rothe | An Exact 2.9416^n Algorithm for the Three Domatic Number Problem | 20 pages, 1 figure | null | null | null | cs.CC | null | The three domatic number problem asks whether a given undirected graph can be
partitioned into at least three dominating sets, i.e., sets whose closed
neighborhood equals the vertex set of the graph. Since this problem is
NP-complete, no polynomial-time algorithm is known for it. The naive
deterministic algorithm for this problem runs in time 3^n, up to polynomial
factors. In this paper, we design an exact deterministic algorithm for this
problem running in time 2.9416^n. Thus, our algorithm can handle problem
instances of larger size than the naive algorithm in the same amount of time.
We also present another deterministic and a randomized algorithm for this
problem that both have an even better performance for graphs with small maximum
degree.
| [
{
"version": "v1",
"created": "Fri, 24 Jun 2005 12:58:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Riege",
"Tobias",
""
],
[
"Rothe",
"Jörg",
""
]
]
|
cs/0506092 | Simone Alfarano | Thomas Lux | Emergent Statistical Wealth Distributions in Simple Monetary Exchange
Models: A Critical Review | null | null | null | null | cs.MA | null | This paper reviews recent attempts at modelling inequality of wealth as an
emergent phenomenon of interacting-agent processes. We point out that recent
models of wealth condensation which draw their inspiration from molecular
dynamics have, in fact, reinvented a process introduced quite some time ago by
Angle (1986) in the sociological literature. We emphasize some problematic
aspects of simple wealth exchange models and contrast them with a monetary
model based on economic principles of market mediated exchange. The paper also
reports new results on the influence of market power on the wealth distribution
in statistical equilibrium. As it turns out, inequality increases but market
power alone is not sufficient for changing the exponential tails of simple
exchange models into Pareto tails.
| [
{
"version": "v1",
"created": "Fri, 24 Jun 2005 16:46:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lux",
"Thomas",
""
]
]
|
cs/0506095 | Yi-Dong Shen | Y. D. Shen, Q. Yang, J. H. You and L. Y. Yuan | Deriving a Stationary Dynamic Bayesian Network from a Logic Program with
Recursive Loops | 29 pages | null | null | null | cs.AI cs.LG cs.LO | null | Recursive loops in a logic program present a challenging problem to the PLP
framework. On the one hand, they loop forever so that the PLP backward-chaining
inferences would never stop. On the other hand, they generate cyclic
influences, which are disallowed in Bayesian networks. Therefore, in existing
PLP approaches logic programs with recursive loops are considered to be
problematic and thus are excluded. In this paper, we propose an approach that
makes use of recursive loops to build a stationary dynamic Bayesian network.
Our work stems from an observation that recursive loops in a logic program
imply a time sequence and thus can be used to model a stationary dynamic
Bayesian network without using explicit time parameters. We introduce a
Bayesian knowledge base with logic clauses of the form $A \leftarrow
A_1,...,A_l, true, Context, Types$, which naturally represents the knowledge
that the $A_i$s have direct influences on $A$ in the context $Context$ under
the type constraints $Types$. We then use the well-founded model of a logic
program to define the direct influence relation and apply SLG-resolution to
compute the space of random variables together with their parental connections.
We introduce a novel notion of influence clauses, based on which a declarative
semantics for a Bayesian knowledge base is established and algorithms for
building a two-slice dynamic Bayesian network from a logic program are
developed.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 04:07:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shen",
"Y. D.",
""
],
[
"Yang",
"Q.",
""
],
[
"You",
"J. H.",
""
],
[
"Yuan",
"L. Y.",
""
]
]
|
cs/0506097 | Samuel Thibault | Samuel Thibault (INRIA Futurs) | A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines | null | null | null | null | cs.DC | null | With the current trend of multiprocessor machines towards more and more
hierarchical architectures, exploiting the full computational power requires
careful distribution of execution threads and data so as to limit expensive
remote memory accesses. Existing multi-threaded libraries provide only limited
facilities to let applications express distribution indications, so that
programmers end up with explicitly distributing tasks according to the
underlying architecture, which is difficult and not portable. In this article,
we present: (1) a model for dynamically expressing the structure of the
computation; (2) a scheduler interpreting this model so as to make judicious
hierarchical distribution decisions; (3) an implementation within the Marcel
user-level thread library. We experimented our proposal on a scientific
application running on a ccNUMA Bull NovaScale with 16 Intel Itanium II
processors; results show a 30% gain compared to a classical scheduler, and are
similar to what a handmade scheduler achieves in a non-portable way.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 14:32:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
]
]
|
cs/0506098 | Russell Martin | Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul Goldberg,
Zengjian Hu, Russell Martin | Distributed Selfish Load Balancing | null | null | null | null | cs.GT math.OC | null | Suppose that a set of $m$ tasks are to be shared as equally as possible
amongst a set of $n$ resources. A game-theoretic mechanism to find a suitable
allocation is to associate each task with a ``selfish agent'', and require each
agent to select a resource, with the cost of a resource being the number of
agents to select it. Agents would then be expected to migrate from overloaded
to underloaded resources, until the allocation becomes balanced.
Recent work has studied the question of how this can take place within a
distributed setting in which agents migrate selfishly without any centralized
control. In this paper we discuss a natural protocol for the agents which
combines the following desirable features: It can be implemented in a strongly
distributed setting, uses no central control, and has good convergence
properties. For $m\gg n$, the system becomes approximately balanced (an
$\epsilon$-Nash equilibrium) in expected time $O(\log\log m)$. We show using a
martingale technique that the process converges to a perfectly balanced
allocation in expected time $O(\log\log m+n^4)$. We also give a lower bound of
$\Omega(\max\{\log\log m,n\})$ for the convergence time.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 14:54:23 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 18:04:06 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Apr 2007 15:20:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Friedetzky",
"Tom",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul",
""
],
[
"Hu",
"Zengjian",
""
],
[
"Martin",
"Russell",
""
]
]
|
cs/0506099 | Yuval Shavitt | Yuval Shavitt and Eran Shir | DIMES: Let the Internet Measure Itself | 10 pages, 12 figures | null | null | null | cs.NI | null | Today's Internet maps, which are all collected from a small number of vantage
points, are falling short of being accurate. We suggest here a paradigm shift
for this task. DIMES is a distributed measurement infrastructure for the
Internet that is based on the deployment of thousands of light weight
measurement agents around the globe.
We describe the rationale behind DIMES deployment, discuss its design
trade-offs and algorithmic challenges, and analyze the structure of the
Internet as it seen with DIMES.
| [
{
"version": "v1",
"created": "Tue, 28 Jun 2005 20:29:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shavitt",
"Yuval",
""
],
[
"Shir",
"Eran",
""
]
]
|
cs/0506100 | Satu Elisa Schaeffer | Jiri Sima and Satu Elisa Schaeffer | On the NP-Completeness of Some Graph Cluster Measures | 9 pages, no figures | null | null | null | cs.CC | null | Graph clustering is the problem of identifying sparsely connected dense
subgraphs (clusters) in a given graph. Proposed clustering algorithms usually
optimize various fitness functions that measure the quality of a cluster within
the graph. Examples of such cluster measures include the conductance, the local
and relative densities, and single cluster editing. We prove that the decision
problems associated with the optimization tasks of finding the clusters that
are optimal with respect to these fitness measures are NP-complete.
| [
{
"version": "v1",
"created": "Wed, 29 Jun 2005 18:12:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sima",
"Jiri",
""
],
[
"Schaeffer",
"Satu Elisa",
""
]
]
|
cs/0506101 | Patrick Haffner | Patrick Haffner, Steven Phillips, Rob Schapire | Efficient Multiclass Implementations of L1-Regularized Maximum Entropy | 13 pages, describes new conditional maxent algorithm, to be submitted | null | null | null | cs.LG cs.CL | null | This paper discusses the application of L1-regularized maximum entropy
modeling or SL1-Max [9] to multiclass categorization problems. A new
modification to the SL1-Max fast sequential learning algorithm is proposed to
handle conditional distributions. Furthermore, unlike most previous studies,
the present research goes beyond a single type of conditional distribution. It
describes and compares a variety of modeling assumptions about the class
distribution (independent or exclusive) and various types of joint or
conditional distributions. It results in a new methodology for combining binary
regularized classifiers to achieve multiclass categorization. In this context,
Maximum Entropy can be considered as a generic and efficient regularized
classification tool that matches or outperforms the state-of-the art
represented by AdaBoost and SVMs.
| [
{
"version": "v1",
"created": "Wed, 29 Jun 2005 20:26:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haffner",
"Patrick",
""
],
[
"Phillips",
"Steven",
""
],
[
"Schapire",
"Rob",
""
]
]
|
cs/0506103 | Aneta Zwierko | Aneta Zwierko, Zbigniew Kotulski | Security of mobile agents: a new concept of the integrity protection | 11 pages, 2 figures | null | null | null | cs.CR | null | The recent developments in the mobile technology (mobile phones, middleware)
created a need for new methods of protecting the code transmitted through the
network. The proposed mechanisms not only secure the compiled program, but also
the data, that can be gathered during its "journey". The oldest and the
simplest methods are more concentrated on integrity of the code itself and on
the detection of unauthorized manipulation. Other, more advanced proposals
protect not only the code but also the execution state and the collected data.
The paper is divided into two parts. The first one is mostly devoted to
different methods of securing the code and protecting its integrity; starting
from watermarking and fingerprinting, up to methods designed specially for
mobile agent systems: encrypted function, cryptographic traces, time limited
black-box security, chained-MAC protocol, publicly-verifiable chained digital
signatures The second part presents new concept for providing mobile agents
with integrity protection, based on a zero-knowledge proof system.
| [
{
"version": "v1",
"created": "Wed, 29 Jun 2005 22:01:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zwierko",
"Aneta",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
|
cs/0506104 | Miroslaw Truszczynski | Z. Lonc, M. Truszczynski | Computing minimal models, stable models and answer sets | 55 pages, 1 figure. To appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.LO cs.DS | null | We propose and study algorithms to compute minimal models, stable models and
answer sets of t-CNF theories, and normal and disjunctive t-programs. We are
especially interested in algorithms with non-trivial worst-case performance
bounds. The bulk of the paper is concerned with the classes of 2- and 3-CNF
theories, and normal and disjunctive 2- and 3-programs, for which we obtain
significantly stronger results than those implied by our general
considerations. We show that one can find all minimal models of 2-CNF theories
and all answer sets of disjunctive 2-programs in time O(m 1.4422..^n). Our main
results concern computing stable models of normal 3-programs, minimal models of
3-CNF theories and answer sets of disjunctive 3-programs. We design algorithms
that run in time O(m 1.6701..^n), in the case of the first problem, and in time
O(mn^2 2.2782..^n), in the case of the latter two. All these bounds improve by
exponential factors the best algorithms known previously. We also obtain
closely related upper bounds on the number of minimal models, stable models and
answer sets a t-CNF theory, a normal t-program or a disjunctive t-program may
have.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Thu, 30 Jun 2005 01:51:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lonc",
"Z.",
""
],
[
"Truszczynski",
"M.",
""
]
]
|
cs/0506105 | Ren-Chiun Wang | Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo | A protected password change protocol | null | null | null | null | cs.CR | null | Some protected password change protocols were proposed. However, the previous
protocols were easily vulnerable to several attacks such as denial of service,
password guessing, stolen-verifier and impersonation atacks etc. Recently,
Chang et al. proposed a simple authenticated key agreement and protected
password change protocol for enhancing the security and efficiency. In this
paper, authors shall show that password guessing, denial of service and
known-key attacks can work in their password change protocol. At the same time,
authors shall propose a new password change protocol to withstand all the
threats of security.
| [
{
"version": "v1",
"created": "Thu, 30 Jun 2005 03:20:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Ren-Chiun",
""
],
[
"Yang",
"Chou-Chen",
""
],
[
"Mo",
"Kun-Ru",
""
]
]
|
cs/0507010 | Jiayang Wang | Jiayang Wang | A Study for the Feature Core of Dynamic Reduct | 9 pages | null | null | null | cs.AI | null | To the reduct problems of decision system, the paper proposes the notion of
dynamic core according to the dynamic reduct model. It describes various formal
definitions of dynamic core, and discusses some properties about dynamic core.
All of these show that dynamic core possesses the essential characters of the
feature core.
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2005 13:02:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Jiayang",
""
]
]
|
cs/0507012 | Adilson Xavier V. | Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo
S. Rodrigues | Lattice Gas Cellular Automata for Computational Fluid Animation | null | null | null | null | cs.GR | null | The past two decades showed a rapid growing of physically-based modeling of
fluids for computer graphics applications. In this area, a common top down
approach is to model the fluid dynamics by Navier-Stokes equations and apply a
numerical techniques such as Finite Differences or Finite Elements for the
simulation. In this paper we focus on fluid modeling through Lattice Gas
Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete
models based on point particles that move on a lattice, according to suitable
and simple rules in order to mimic a fully molecular dynamics. By
Chapman-Enskog expansion, a known multiscale technique in this area, it can be
demonstrated that the Navier-Stokes model can be reproduced by the LGCA
technique. Thus, with LGCA we get a fluid model that does not require solution
of complicated equations. Therefore, we combine the advantage of the low
computational cost of LGCA and its ability to mimic the realistic fluid
dynamics to develop a new animating framework for computer graphics
applications. In this work, we discuss the theoretical elements of our proposal
and show experimental results.
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2005 19:48:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Xavier",
"Adilson V.",
""
],
[
"Apolinario",
"Antonio L.",
"Jr"
],
[
"Rodrigues",
"Paulo S.",
""
]
]
|
cs/0507013 | Mirela Damian | Justin Colannino, Mirela Damian, Ferran Hurtado, John Iacono, Henk
Meijer, Suneeta Ramaswami and Godfried Toussaint | An O(n log n)-Time Algorithm for the Restricted Scaffold Assignment | 13 pages, 8 figures | null | null | null | cs.CG cs.DM | null | The assignment problem takes as input two finite point sets S and T and
establishes a correspondence between points in S and points in T, such that
each point in S maps to exactly one point in T, and each point in T maps to at
least one point in S. In this paper we show that this problem has an O(n log
n)-time solution, provided that the points in S and T are restricted to lie on
a line (linear time, if S and T are presorted).
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2005 19:50:11 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jul 2005 21:26:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Colannino",
"Justin",
""
],
[
"Damian",
"Mirela",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Iacono",
"John",
""
],
[
"Meijer",
"Henk",
""
],
[
"Ramaswami",
"Suneeta",
""
],
[
"Toussaint",
"Godfried",
""
]
]
|
cs/0507014 | Moshe Schwartz | Moshe Schwartz | Isomorphism of graphs-a polynomial test | null | null | null | null | cs.DS | null | An explicit algorithm is presented for testing whether two non-directed
graphs are isomorphic or not. It is shown that for a graph of n vertices, the
number of n independent operations needed for the test is polynomial in n. A
proof that the algorithm actually performs the test is presented.
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2005 11:35:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schwartz",
"Moshe",
""
]
]
|
cs/0507017 | Gregory Gutin | G. Gutin, A. Rafiey, A. Yeo | Minimum Cost and List Homomorphisms to Semicomplete Digraphs | 8 pages | null | null | null | cs.DM | null | The following optimization problem was introduced in \cite{gutinDAM}, where
it was motivated by a real-world problem in defence logistics. Suppose we are
given a pair of digraphs $D,H$ and a positive cost $c_i(u)$ for each $u\in
V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is
$\sum_{u\in V(D)}c_{f(u)}(u)$. For a fixed digraph $H$, the minimum cost
homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For an input
digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify
whether there is a homomorphism of $D$ to $H$ and, if it exists, find such a
homomorphism of minimum cost.
We obtain dichotomy classifications of the computational complexity of the
list homomorphism problem and MinHOMP($H$), when $H$ is a semicomplete digraph
(a digraph in which every two vertices have at least one arc between them). Our
dichotomy for the list homomorphism problem coincides with the one obtained by
Bang-Jensen, Hell and MacGillivray in 1988 for the homomorphism problem when
$H$ is a semicomplete digraph: both problems are polynomial solvable if $H$ has
at most one cycle; otherwise, both problems are NP-complete. The dichotomy for
\MiP is different: the problem is polynomial time solvable if $H$ is acyclic or
$H$ is a cycle of length 2 or 3; otherwise, the problem is NP-hard.
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2005 18:45:50 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Aug 2005 13:31:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
]
|
cs/0507020 | Arnaud Durand | Arnaud Durand, Etienne Grandjean | First-order queries on structures of bounded degree are computable with
constant delay | 18 pages, 1 figure | null | null | null | cs.LO cs.CC | null | A bounded degree structure is either a relational structure all of whose
relations are of bounded degree or a functional structure involving bijective
functions only. In this paper, we revisit the complexity of the evaluation
problem of not necessarily Boolean first-order queries over structures of
bounded degree. Query evaluation is considered here as a dynamical process. We
prove that any query on bounded degree structures is $\constantdelaylin$, i.e.,
can be computed by an algorithm that has two separate parts: it has a
precomputation step of linear time in the size of the structure and then, it
outputs all tuples one by one with a constant (i.e. depending on the size of
the formula only) delay between each. Seen as a global process, this implies
that queries on bounded structures can be evaluated in total time
$O(f(|\phi|).(|\calS|+|\phi(\calS)|))$ and space $O(f(|\phi|).|\calS|)$ where
$\calS$ is the structure, $\phi$ is the formula, $\phi(\calS)$ is the result of
the query and $f$ is some function.
Among other things, our results generalize a result of \cite{Seese-96} on the
data complexity of the model-checking problem for bounded degree structures.
Besides, the originality of our approach compared to that \cite{Seese-96} and
comparable results is that it does not rely on the Hanf's model-theoretic
technic (see \cite{Hanf-65}) and is completely effective.
| [
{
"version": "v1",
"created": "Thu, 7 Jul 2005 09:40:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Durand",
"Arnaud",
""
],
[
"Grandjean",
"Etienne",
""
]
]
|
cs/0507021 | Valmir Barbosa | Renato C. Dutra, Valmir C. Barbosa | Finding routes in anonymous sensor networks | null | Information Processing Letters 98 (2006), 139-144 | 10.1016/j.ipl.2006.01.001 | null | cs.NI | null | We consider networks of anonymous sensors and address the problem of
constructing routes for the delivery of information from a group of sensors in
response to a query by a sink. In order to circumvent the restrictions imposed
by anonymity, we rely on using the power level perceived by the sensors in the
query from the sink. We introduce a simple distributed algorithm to achieve the
building of routes to the sink and evaluate its performance by means of
simulations.
| [
{
"version": "v1",
"created": "Thu, 7 Jul 2005 16:28:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dutra",
"Renato C.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
]
|
cs/0507023 | Valmir Barbosa | Luis O. Rigo Jr., Valmir C. Barbosa | Two-dimensional cellular automata and the analysis of correlated time
series | null | Pattern Recognition Letters 27 (2006), 1353-1360 | 10.1016/j.patrec.2006.01.005 | null | cs.AI | null | Correlated time series are time series that, by virtue of the underlying
process to which they refer, are expected to influence each other strongly. We
introduce a novel approach to handle such time series, one that models their
interaction as a two-dimensional cellular automaton and therefore allows them
to be treated as a single entity. We apply our approach to the problems of
filling gaps and predicting values in rainfall time series. Computational
results show that the new approach compares favorably to Kalman smoothing and
filtering.
| [
{
"version": "v1",
"created": "Fri, 8 Jul 2005 12:47:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rigo",
"Luis O.",
"Jr."
],
[
"Barbosa",
"Valmir C.",
""
]
]
|
cs/0507024 | Anne-Marie Vercoustre | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves
Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse
(INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA
Rocquencourt / INRIA Sophia Antipolis) | Experiments in Clustering Homogeneous XML Documents to Validate an
Existing Typology | (postprint); This version corrects a couple of errors in authors'
names in the bibliography | null | null | null | cs.IR | null | This paper presents some experiments in clustering homogeneous XMLdocuments
to validate an existing classification or more generally anorganisational
structure. Our approach integrates techniques for extracting knowledge from
documents with unsupervised classification (clustering) of documents. We focus
on the feature selection used for representing documents and its impact on the
emerging classification. We mix the selection of structured features with fine
textual selection based on syntactic characteristics.We illustrate and evaluate
this approach with a collection of Inria activity reports for the year 2003.
The objective is to cluster projects into larger groups (Themes), based on the
keywords or different chapters of these activity reports. We then compare the
results of clustering using different feature selections, with the official
theme structure used by Inria.
| [
{
"version": "v1",
"created": "Fri, 8 Jul 2005 13:42:42 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 13:52:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Trousse",
"Brigitte",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
]
]
|
cs/0507027 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe | Anyone but Him: The Complexity of Precluding an Alternative | Preliminary version appeared in AAAI '05. Also appears as
URCS-TR-2005-873 | null | null | null | cs.GT cs.CC cs.MA | null | Preference aggregation in a multiagent setting is a central issue in both
human and computer contexts. In this paper, we study in terms of complexity the
vulnerability of preference aggregation to destructive control. That is, we
study the ability of an election's chair to, through such mechanisms as
voter/candidate addition/suppression/partition, ensure that a particular
candidate (equivalently, alternative) does not win. And we study the extent to
which election systems can make it impossible, or computationally costly
(NP-complete), for the chair to execute such control. Among the systems we
study--plurality, Condorcet, and approval voting--we find cases where systems
immune or computationally resistant to a chair choosing the winner nonetheless
are vulnerable to the chair blocking a victory. Beyond that, we see that among
our studied systems no one system offers the best protection against
destructive control. Rather, the choice of a preference aggregation system will
depend closely on which types of control one wishes to be protected against. We
also find concrete cases where the complexity of or susceptibility to control
varies dramatically based on the choice among natural tie-handling rules.
| [
{
"version": "v1",
"created": "Sat, 9 Jul 2005 18:20:00 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Jul 2005 23:01:02 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Jul 2005 15:20:07 GMT"
},
{
"version": "v4",
"created": "Thu, 16 Mar 2006 16:51:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
]
|
cs/0507028 | Robert Milson | Robert Milson, Aaron Krowne | Adapting CBPP platforms for instructional use | Will be presented at the 2005, Emory university symposium on Free
Culture and the Digital Library | null | null | null | cs.DL cs.HC | null | Commons based peer-production (CBPP) is the de-centralized, net-based
approach to the creation and dissemination of information resources. Underlying
every CBPP system is a virtual community brought together by an internet tool
(such as a web site) and structured by a specific collaboration protocol. In
this talk we will argue that the value of such platforms can be leveraged by
adapting them for pedagogical purposes.
We report on one such recent adaptation. The Noosphere system is a web-based
collaboration environment that underlies the popular Planetmath website, a
collaboratively written encyclopedia of mathematics licensed under the GNU Free
Documentation License (FDL). Recently, the system was used to host a
graduate-level mathematics course at Dalhousie University, in Halifax, Canada.
The course consisted of regular lectures and assignment problems. The students
in the course collaborated on a set of course notes, encapsulating the lecture
content and giving solutions of assigned problems. The successful outcome of
this experiment demonstrated that a dedicated Noosphere system is well suited
for classroom applications. We argue that this ``proof of concept'' experience
also strongly suggests that every successful CBPP platform possesses latent
pedagogical value.
| [
{
"version": "v1",
"created": "Sun, 10 Jul 2005 19:05:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Milson",
"Robert",
""
],
[
"Krowne",
"Aaron",
""
]
]
|
cs/0507030 | G\"unter Rote | Imre Barany and Guenter Rote | Strictly convex drawings of planar graphs | 20 pages, 13 figures. to be published in Documenta Mathematica. The
revision includes numerous small additions, corrections, and improvements, in
particular: - a discussion of the constants in the O-notation, after the
statement of thm.1. - a different set-up and clarification of the case
distinction for Lemma 1 | DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391 | null | null | cs.CG cs.DM | null | Every three-connected planar graph with n vertices has a drawing on an O(n^2)
x O(n^2) grid in which all faces are strictly convex polygons. These drawings
are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids.
More generally, a strictly convex drawing exists on a grid of size O(W) x
O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds
are obtained when the faces have fewer sides.
In the proof, we derive an explicit lower bound on the number of primitive
vectors in a triangle.
| [
{
"version": "v1",
"created": "Mon, 11 Jul 2005 20:06:06 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2006 10:01:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barany",
"Imre",
""
],
[
"Rote",
"Guenter",
""
]
]
|
cs/0507033 | Marco Cuturi | Marco Cuturi, Kenji Fukumizu | Multiresolution Kernels | 8 pages | null | null | null | cs.LG | null | We present in this work a new methodology to design kernels on data which is
structured with smaller components, such as text, images or sequences. This
methodology is a template procedure which can be applied on most kernels on
measures and takes advantage of a more detailed "bag of components"
representation of the objects. To obtain such a detailed description, we
consider possible decompositions of the original bag into a collection of
nested bags, following a prior knowledge on the objects' structure. We then
consider these smaller bags to compare two objects both in a detailed
perspective, stressing local matches between the smaller bags, and in a global
or coarse perspective, by considering the entire bag. This multiresolution
approach is likely to be best suited for tasks where the coarse approach is not
precise enough, and where a more subtle mixture of both local and global
similarities is necessary to compare objects. The approach presented here would
not be computationally tractable without a factorization trick that we
introduce before presenting promising results on an image retrieval task.
| [
{
"version": "v1",
"created": "Wed, 13 Jul 2005 05:45:28 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Nov 2005 08:18:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cuturi",
"Marco",
""
],
[
"Fukumizu",
"Kenji",
""
]
]
|
cs/0507034 | Ittai Abraham | Ittai Abraham and Dahlia Malkhi and Gurmeet Singh Manku | Papillon: Greedy Routing in Rings | null | null | null | null | cs.DC cs.NI | null | We study {\sc greedy} routing over $n$ nodes placed in a ring, with the
\emph{distance} between two nodes defined to be the clockwise or the absolute
distance between them along the ring. Such graphs arise in the context of
modeling social networks and in routing networks for peer-to-peer systems. We
construct the first network over $n$ nodes in which {\sc greedy} routing takes
$O(\log n / \log d)$ hops in the worst-case, with $d$ out-going links per node.
Our result has the first asymptotically optimal greedy routing complexity.
Previous constructions required $O(\frac{\log^2 n}{d})$ hops.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 00:34:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abraham",
"Ittai",
""
],
[
"Malkhi",
"Dahlia",
""
],
[
"Manku",
"Gurmeet Singh",
""
]
]
|
cs/0507035 | Yi-Dong Shen | Yi-Dong Shen, Jia-Huai You and Li-Yan Yuan | Enhancing Global SLS-Resolution with Loop Cutting and Tabling Mechanisms | null | Theoretical Computer Science 328(3):271-287, 2004 | null | null | cs.LO cs.AI | null | Global SLS-resolution is a well-known procedural semantics for top-down
computation of queries under the well-founded model. It inherits from
SLDNF-resolution the {\em linearity} property of derivations, which makes it
easy and efficient to implement using a simple stack-based memory structure.
However, like SLDNF-resolution it suffers from the problem of infinite loops
and redundant computations. To resolve this problem, in this paper we develop a
new procedural semantics, called {\em SLTNF-resolution}, by enhancing Global
SLS-resolution with loop cutting and tabling mechanisms. SLTNF-resolution is
sound and complete w.r.t. the well-founded semantics for logic programs with
the bounded-term-size property, and is superior to existing linear tabling
procedural semantics such as SLT-resolution.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:24:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"You",
"Jia-Huai",
""
],
[
"Yuan",
"Li-Yan",
""
]
]
|
cs/0507036 | Martin Sulzmann | Peter J Stuckey, Martin Sulzmann, Jeremy Wazny | Improved Inference for Checking Annotations | null | null | null | null | cs.PL cs.LO | null | We consider type inference in the Hindley/Milner system extended with type
annotations and constraints with a particular focus on Haskell-style type
classes. We observe that standard inference algorithms are incomplete in the
presence of nested type annotations. To improve the situation we introduce a
novel inference scheme for checking type annotations. Our inference scheme is
also incomplete in general but improves over existing implementations as found
e.g. in the Glasgow Haskell Compiler (GHC). For certain cases (e.g. Haskell 98)
our inference scheme is complete. Our approach has been fully implemented as
part of the Chameleon system (experimental version of Haskell).
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:47:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stuckey",
"Peter J",
""
],
[
"Sulzmann",
"Martin",
""
],
[
"Wazny",
"Jeremy",
""
]
]
|
cs/0507037 | Martin Sulzmann | Peter J. Stuckey, Martin Sulzmann | Type Inference for Guarded Recursive Data Types | null | null | null | null | cs.PL cs.LO | null | We consider type inference for guarded recursive data types (GRDTs) -- a
recent generalization of algebraic data types. We reduce type inference for
GRDTs to unification under a mixed prefix. Thus, we obtain efficient type
inference. Inference is incomplete because the set of type constraints allowed
to appear in the type system is only a subset of those type constraints
generated by type inference. Hence, inference only succeeds if the program is
sufficiently type annotated. We present refined procedures to infer types
incrementally and to assist the user in identifying which pieces of type
information are missing. Additionally, we introduce procedures to test if a
type is not principal and to find a principal type if one exists.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:58:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stuckey",
"Peter J.",
""
],
[
"Sulzmann",
"Martin",
""
]
]
|
cs/0507038 | Zvi Lotker | Khaled Elbassioni, Zvi Lotker, Raimund Seidel | Upper Bound on the Number of Vertices of Polyhedra with $0,1$-Constraint
Matrices | 3 pages | null | null | null | cs.CG | null | In this note we show that the maximum number of vertices in any polyhedron
$P=\{x\in \mathbb{R}^d : Ax\leq b\}$ with $0,1$-constraint matrix $A$ and a
real vector $b$ is at most $d!$.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2005 18:45:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Elbassioni",
"Khaled",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Seidel",
"Raimund",
""
]
]
|
cs/0507042 | Richard McClatchey | Florida Estrella, Richard McClatchey, Dmitry Rogulin | The MammoGrid Virtual Organisation - Federating Distributed Mammograms | ^ pages, 3 figures, 2 tables | null | null | Medical Informatics Europe MIE2005 paper publication | cs.DC cs.DB | null | The MammoGrid project aims to deliver a prototype which enables the effective
collaboration between radiologists using grid, service-orientation and database
solutions. The grid technologies and service-based database management solution
provide the platform for integrating diverse and distributed resources,
creating what is called a virtual organisation. The MammoGrid Virtual
Organisation facilitates the sharing and coordinated access to mammography
data, medical imaging software and computing resources of participating
hospitals. Hospitals manage their local database of mammograms, but in
addition, radiologists who are part of this organisation can share mammograms,
reports, results and image analysis software. The MammoGrid Virtual
Organisation is a federation of autonomous multi-centres sites which transcends
national boundaries. This paper outlines the service-based approach in the
creation and management of the federated distributed mammography database and
discusses the role of virtual organisations in distributed image analysis.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2005 12:17:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Estrella",
"Florida",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Rogulin",
"Dmitry",
""
]
]
|
cs/0507043 | Yuan Feng | Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying | Proof rules for purely quantum programs | Now 12 pages, introduction and Section 3 rewritten, some errors
corrected | null | null | null | cs.PL quant-ph | null | We apply the notion of quantum predicate proposed by D'Hondt and Panangaden
to analyze a purely quantum language fragment which describes the quantum part
of a future quantum computer in Knill's architecture. The denotational
semantics, weakest precondition semantics, and weakest liberal precondition
semantics of this language fragment are introduced. To help reasoning about
quantum programs involving quantum loops, we extend proof rules for classical
probabilistic programs to our purely quantum programs.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2005 13:06:13 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Aug 2005 16:08:40 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Mar 2006 08:24:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feng",
"Yuan",
""
],
[
"Duan",
"Runyao",
""
],
[
"Ji",
"Zhengfeng",
""
],
[
"Ying",
"Mingsheng",
""
]
]
|
cs/0507044 | Marcus Hutter | Jan Poland and Marcus Hutter | Defensive Universal Learning with Experts | 15 LaTeX pages | Proc. 16th International Conf. on Algorithmic Learning Theory (ALT
2005) 356-370 | null | IDSIA-15-05 | cs.LG | null | This paper shows how universal learning can be achieved with expert advice.
To this aim, we specify an experts algorithm with the following
characteristics: (a) it uses only feedback from the actions actually chosen
(bandit setup), (b) it can be applied with countably infinite expert classes,
and (c) it copes with losses that may grow in time appropriately slowly. We
prove loss bounds against an adaptive adversary. From this, we obtain a master
algorithm for "reactive" experts problems, which means that the master's
actions may influence the behavior of the adversary. Our algorithm can
significantly outperform standard experts algorithms on such problems. Finally,
we combine it with a universal expert class. The resulting universal learner
performs -- in a certain sense -- almost as well as any computable strategy,
for any online decision problem. We also specify the (worst-case) convergence
speed, which is very slow.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2005 14:33:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
]
|
cs/0507046 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley | Revisiting Internet AS-level Topology Discovery | null | PAM 2005; LNCS 3431, p. 177, 2005 | 10.1007/b135479 | null | cs.NI | null | The development of veracious models of the Internet topology has received a
lot of attention in the last few years. Many proposed models are based on
topologies derived from RouteViews BGP table dumps (BTDs). However, BTDs do not
capture all AS-links of the Internet topology and most importantly the number
of the hidden AS-links is unknown, resulting in AS-graphs of questionable
quality. As a first step to address this problem, we introduce a new
AS-topology discovery methodology that results in more complete and accurate
graphs. Moreover, we use data available from existing measurement facilities,
circumventing the burden of additional measurement infrastructure. We deploy
our methodology and construct an AS-topology that has at least 61.5% more
AS-links than BTD-derived AS-topologies we examined. Finally, we analyze the
temporal and topological properties of the augmented graph and pinpoint the
differences from BTD-derived AS-topologies.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 07:15:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Riley",
"George",
""
]
]
|
cs/0507047 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, Bradley Huffaker, kc
claffy, George Riley | Inferring AS Relationships: Dead End or Lively Beginning? | null | WEA 2005; LNCS 3503, p. 113, 2005 | 10.1007/11427186_12 | null | cs.NI cs.DS | null | Recent techniques for inferring business relationships between ASs have
yielded maps that have extremely few invalid BGP paths in the terminology of
Gao. However, some relationships inferred by these newer algorithms are
incorrect, leading to the deduction of unrealistic AS hierarchies. We
investigate this problem and discover what causes it. Having obtained such
insight, we generalize the problem of AS relationship inference as a
multiobjective optimization problem with node-degree-based corrections to the
original objective function of minimizing the number of invalid paths. We solve
the generalized version of the problem using the semidefinite programming
relaxation of the MAX2SAT problem. Keeping the number of invalid paths small,
we obtain a more veracious solution than that yielded by recent heuristics.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 09:32:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"claffy",
"kc",
""
],
[
"Riley",
"George",
""
]
]
|
cs/0507049 | David Eppstein | David Eppstein, Michael T. Goodrich, Jonathan Z. Sun | The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional
Data | 12 pages, 3 figures. A preliminary version of this paper appeared in
the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305 | null | null | null | cs.CG | null | We present a new multi-dimensional data structure, which we call the skip
quadtree (for point data in R^2) or the skip octree (for point data in R^d,
with constant d>2). Our data structure combines the best features of two
well-known data structures, in that it has the well-defined "box"-shaped
regions of region quadtrees and the logarithmic-height search and update
hierarchical structure of skip lists. Indeed, the bottom level of our structure
is exactly a region quadtree (or octree for higher dimensional data). We
describe efficient algorithms for inserting and deleting points in a skip
quadtree, as well as fast methods for performing point location and approximate
range queries.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 20:17:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Sun",
"Jonathan Z.",
""
]
]
|
cs/0507050 | David Eppstein | Lars Arge, David Eppstein, Michael T. Goodrich | Skip-Webs: Efficient Distributed Data Structures for Multi-Dimensional
Data Sets | 8 pages, 4 figures. Appearing at 24th ACM SIGACT-SIGOPS Symp.
Principles of Distributed Computing (PODC 2005), Las Vegas | null | null | null | cs.DC cs.CG cs.DS | null | We present a framework for designing efficient distributed data structures
for multi-dimensional data. Our structures, which we call skip-webs, extend and
improve previous randomized distributed data structures, including skipnets and
skip graphs. Our framework applies to a general class of data querying
scenarios, which include linear (one-dimensional) data, such as sorted sets, as
well as multi-dimensional data, such as d-dimensional octrees and digital tries
of character strings defined over a fixed alphabet. We show how to perform a
query over such a set of n items spread among n hosts using O(log n / log log
n) messages for one-dimensional data, or O(log n) messages for
fixed-dimensional data, while using only O(log n) space per host. We also show
how to make such structures dynamic so as to allow for insertions and deletions
in O(log n) messages for quadtrees, octrees, and digital tries, and O(log n /
log log n) messages for one-dimensional data. Finally, we show how to apply a
blocking strategy to skip-webs to further improve message complexity for
one-dimensional data when hosts can store more data.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2005 20:30:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arge",
"Lars",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
]
|
cs/0507053 | David Eppstein | David Eppstein | Nonrepetitive Paths and Cycles in Graphs with Application to Sudoku | 17 pages, 11 figures | null | null | null | cs.DS cs.AI | null | We provide a simple linear time transformation from a directed or undirected
graph with labeled edges to an unlabeled digraph, such that paths in the input
graph in which no two consecutive edges have the same label correspond to paths
in the transformed graph and vice versa. Using this transformation, we provide
efficient algorithms for finding paths and cycles with no two consecutive equal
labels. We also consider related problems where the paths and cycles are
required to be simple; we find efficient algorithms for the undirected case of
these problems but show the directed case to be NP-complete. We apply our path
and cycle finding algorithms in a program for generating and solving Sudoku
puzzles, and show experimentally that they lead to effective puzzle-solving
rules that may also be of interest to human Sudoku puzzle solvers.
| [
{
"version": "v1",
"created": "Wed, 20 Jul 2005 15:58:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
]
|
cs/0507054 | Andrey Siver S. | A. S. Siver | f2mma: FORTRAN to Mathematica translator | null | null | null | null | cs.OH | null | f2mma program can be used to translate programs written in some subset of the
FORTRAN language into {\sl Mathematica} system's programming language. This
subset have been enough to translate GAPP (Global Analysis of Particle
Properties) programm into {\sl Mathematica} language automatically. Observables
table calculated with GAPP({\sl Mathematica}) is presented.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 13:32:15 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2005 06:48:26 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Aug 2005 09:26:15 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Jan 2006 14:27:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Siver",
"A. S.",
""
]
]
|
cs/0507055 | Andrey Siver S. | A. S. Siver | ReacProc: A Tool to Process Reactions Describing Particle Interactions | 5 pages | null | null | null | cs.CE | null | ReacProc is a program written in C/C++ programming language which can be used
(1) to check out of reactions describing particles interactions against
conservation laws and (2) to reduce input reaction into some canonical form. A
table with particles properties is available within ReacProc package.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 14:17:47 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2005 07:14:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Siver",
"A. S.",
""
]
]
|
cs/0507056 | Christopher Lee | Candace L. Sidner, Christopher Lee, Cory Kidd, Neal Lesh, Charles Rich | Explorations in engagement for humans and robots | 31 pages, 5 figures, 3 tables | Artificial Intelligence, volume 166, issues 1-2, August 2005, pp.
140-164 | null | MERL TR2005-017 | cs.AI cs.CL cs.RO | null | This paper explores the concept of engagement, the process by which
individuals in an interaction start, maintain and end their perceived
connection to one another. The paper reports on one aspect of engagement among
human interactors--the effect of tracking faces during an interaction. It also
describes the architecture of a robot that can participate in conversational,
collaborative interactions with engagement gestures. Finally, the paper reports
on findings of experiments with human participants who interacted with a robot
when it either performed or did not perform engagement gestures. Results of the
human-robot studies indicate that people become engaged with robots: they
direct their attention to the robot more often in interactions where engagement
gestures are present, and they find interactions more appropriate when
engagement gestures are present than when they are not.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 21:56:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sidner",
"Candace L.",
""
],
[
"Lee",
"Christopher",
""
],
[
"Kidd",
"Cory",
""
],
[
"Lesh",
"Neal",
""
],
[
"Rich",
"Charles",
""
]
]
|
cs/0507057 | Tereza Tu\v{s}arov\'a | Tereza Tusarova | A new sibling of BQP | extended abstract, submitted to UC'05 | null | null | null | cs.CC | null | We present a new quantum complexity class, called MQ^2, which is contained in
AWPP. This class has a compact and simple mathematical definition, involving
only polynomial-time computable functions and a unitarity condition. It
contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP
is unknown. This shows that in the complexity class hierarchy, BQP is not an
extraordinary isolated island, but has ''siblings'' which as well can solve
prime-factorization.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2005 22:36:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tusarova",
"Tereza",
""
]
]
|
cs/0507058 | Emanuel Diamant | Emanuel Diamant | Paving the Way for Image Understanding: A New Kind of Image
Decomposition is Desired | 14th Scandinavian Conference on Image Analysis (SCIA 2005) | LNCS vol. 3540, pp. 17-24, Springer Verlag, 2005 | null | null | cs.CV | null | In this paper we present an unconventional image segmentation approach which
is devised to meet the requirements of image understanding and pattern
recognition tasks. Generally image understanding assumes interplay of two
sub-processes: image information content discovery and image information
content interpretation. Despite of its widespread use, the notion of "image
information content" is still ill defined, intuitive, and ambiguous. Most
often, it is used in the Shannon's sense, which means information content
assessment averaged over the whole signal ensemble. Humans, however,rarely
resort to such estimates. They are very effective in decomposing images into
their meaningful constituents and focusing attention to the perceptually
relevant image parts. We posit that following the latest findings in human
attention vision studies and the concepts of Kolmogorov's complexity theory an
unorthodox segmentation approach can be proposed that provides effective image
decomposition to information preserving image fragments well suited for
subsequent image interpretation. We provide some illustrative examples,
demonstrating effectiveness of this approach.
| [
{
"version": "v1",
"created": "Fri, 22 Jul 2005 12:18:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
]
|
cs/0507059 | M. Magdalena Ortiz de la Fuente | M. Magdalena Ortiz de la Fuente, Diego Calvanese, Thomas Eiter and
Enrico Franconi | Data complexity of answering conjunctive queries over SHIQ knowledge
bases | Technical Report, 22 pages | null | null | null | cs.LO cs.AI cs.CC | null | An algorithm for answering conjunctive queries over SHIQ knowledge bases that
is coNP in data complexity is given. The algorithm is based on the tableau
algorithm for reasoning with individuals in SHIQ. The blocking conditions of
the tableau are weakened in such a way that the set of models the modified
algorithm yields suffices to check query entailment. The modified blocking
conditions are based on the ones proposed by Levy and Rousset for reasoning
with Horn Rules in the description logic ALCNR.
| [
{
"version": "v1",
"created": "Fri, 22 Jul 2005 15:43:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"de la Fuente",
"M. Magdalena Ortiz",
""
],
[
"Calvanese",
"Diego",
""
],
[
"Eiter",
"Thomas",
""
],
[
"Franconi",
"Enrico",
""
]
]
|
cs/0507061 | Andre Adrian | Andre Adrian | Software Architecture Overview | 9 pages, version 23jul2005 | null | null | null | cs.SE | null | What is Software Architecture? The rules, paradigmen, pattern that help to
construct, build and test a serious piece of software. It is the practical
experience boiled down to abstract level. Software Architecture builds on
System Engineering and the scientific method as established by Galileo Galilei:
Measure what you can and make measureable what you can not. The experiment
(test) is more important then the deduction. Pieces of information about
software architecture are all over the internet. This paper uses citation as
much as possible. The aim is to bring together an overview, not to rephrase the
wording.
| [
{
"version": "v1",
"created": "Sun, 24 Jul 2005 09:43:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Adrian",
"Andre",
""
]
]
|
cs/0507062 | Jan Poland | Jan Poland | FPL Analysis for Adaptive Bandits | null | null | null | null | cs.LG | null | A main problem of "Follow the Perturbed Leader" strategies for online
decision problems is that regret bounds are typically proven against oblivious
adversary. In partial observation cases, it was not clear how to obtain
performance guarantees against adaptive adversary, without worsening the
bounds. We propose a conceptually simple argument to resolve this problem.
Using this, a regret bound of O(t^(2/3)) for FPL in the adversarial multi-armed
bandit problem is shown. This bound holds for the common FPL variant using only
the observations from designated exploration rounds. Using all observations
allows for the stronger bound of O(t^(1/2)), matching the best bound known so
far (and essentially the known lower bound) for adversarial bandits.
Surprisingly, this variant does not even need explicit exploration, it is
self-stabilizing. However the sampling probabilities have to be either
externally provided or approximated to sufficient accuracy, using O(t^2 log t)
samples in each step.
| [
{
"version": "v1",
"created": "Tue, 26 Jul 2005 05:00:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
]
]
|
cs/0507064 | Isabelle Gnaedig | Isabelle Gnaedig and Helene Kirchner | Termination of rewriting strategies: a generic approach | 49 pages | null | null | null | cs.LO | null | We propose a generic termination proof method for rewriting under strategies,
based on an explicit induction on the termination property. Rewriting trees on
ground terms are modeled by proof trees, generated by alternatively applying
narrowing and abstracting steps. The induction principle is applied through the
abstraction mechanism, where terms are replaced by variables representing any
of their normal forms. The induction ordering is not given a priori, but
defined with ordering constraints, incrementally set during the proof.
Abstraction constraints can be used to control the narrowing mechanism, well
known to easily diverge. The generic method is then instantiated for the
innermost, outermost and local strategies.
| [
{
"version": "v1",
"created": "Tue, 26 Jul 2005 20:18:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gnaedig",
"Isabelle",
""
],
[
"Kirchner",
"Helene",
""
]
]
|
cs/0507065 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | A Fast Greedy Algorithm for Outlier Mining | 11 pages | null | null | Tr-05-0406 | cs.DB cs.AI | null | The task of outlier detection is to find small groups of data objects that
are exceptional when compared with rest large amount of data. In [38], the
problem of outlier detection in categorical data is defined as an optimization
problem and a local-search heuristic based algorithm (LSA) is presented.
However, as is the case with most iterative type algorithms, the LSA algorithm
is still very time-consuming on very large datasets. In this paper, we present
a very fast greedy algorithm for mining outliers under the same optimization
model. Experimental results on real datasets and large synthetic datasets show
that: (1) Our algorithm has comparable performance with respect to those
state-of-art outlier detection algorithms on identifying true outliers and (2)
Our algorithm can be an order of magnitude faster than LSA algorithm.
| [
{
"version": "v1",
"created": "Wed, 27 Jul 2005 02:14:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0507066 | Atul Chaturvedi Mr. | Sunder Lal and Atul Chaturvedi (Department of Mathematics Institute of
Basic Science) | Authentication Schemes Using Braid Groups | 6 pages, 2 figures | null | null | null | cs.CR cs.CY | null | In this paper we proposed two identification schemes based on the root
problem. The proposed schemes are secure against passive attacks assuming that
the root problem (RP) is hard in braid groups.
| [
{
"version": "v1",
"created": "Wed, 27 Jul 2005 10:14:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
"",
"Department of Mathematics Institute of\n Basic Science"
],
[
"Chaturvedi",
"Atul",
"",
"Department of Mathematics Institute of\n Basic Science"
]
]
|
cs/0507067 | Diego Calvanese | Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini | Conjunctive Query Containment and Answering under Description Logics
Constraints | null | null | null | null | cs.DB cs.AI | null | Query containment and query answering are two important computational tasks
in databases. While query answering amounts to compute the result of a query
over a database, query containment is the problem of checking whether for every
database, the result of one query is a subset of the result of another query.
In this paper, we deal with unions of conjunctive queries, and we address
query containment and query answering under Description Logic constraints.
Every such constraint is essentially an inclusion dependencies between concepts
and relations, and their expressive power is due to the possibility of using
complex expressions, e.g., intersection and difference of relations, special
forms of quantification, regular expressions over binary relations, in the
specification of the dependencies. These types of constraints capture a great
variety of data models, including the relational, the entity-relationship, and
the object-oriented model, all extended with various forms of constraints, and
also the basic features of the ontology languages used in the context of the
Semantic Web.
We present the following results on both query containment and query
answering. We provide a method for query containment under Description Logic
constraints, thus showing that the problem is decidable, and analyze its
computational complexity. We prove that query containment is undecidable in the
case where we allow inequalities in the right-hand side query, even for very
simple constraints and queries. We show that query answering under Description
Logic constraints can be reduced to query containment, and illustrate how such
a reduction provides upper bound results with respect to both combined and data
complexity.
| [
{
"version": "v1",
"created": "Thu, 28 Jul 2005 08:25:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Calvanese",
"Diego",
""
],
[
"De Giacomo",
"Giuseppe",
""
],
[
"Lenzerini",
"Maurizio",
""
]
]
|
cs/0507070 | Anne-Marie Vercoustre | Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre | Hybrid XML Retrieval: Combining Information Retrieval and a Native XML
Database | Postprint version. The editor version can be accessed through the DOI | null | 10.1007/s10791-005-0748-1 | null | cs.IR | null | This paper investigates the impact of three approaches to XML retrieval:
using Zettair, a full-text information retrieval system; using eXist, a native
XML database; and using a hybrid system that takes full article answers from
Zettair and uses eXist to extract elements from those articles. For the
content-only topics, we undertake a preliminary analysis of the INEX 2003
relevance assessments in order to identify the types of highly relevant
document components. Further analysis identifies two complementary sub-cases of
relevance assessments ("General" and "Specific") and two categories of topics
("Broad" and "Narrow"). We develop a novel retrieval module that for a
content-only topic utilises the information from the resulting answer list of a
native XML database and dynamically determines the preferable units of
retrieval, which we call "Coherent Retrieval Elements". The results of our
experiments show that -- when each of the three systems is evaluated against
different retrieval scenarios (such as different cases of relevance
assessments, different topic categories and different choices of evaluation
metrics) -- the XML retrieval systems exhibit varying behaviour and the best
performance can be reached for different values of the retrieval parameters. In
the case of INEX 2003 relevance assessments for the content-only topics, our
newly developed hybrid XML retrieval system is substantially more effective
than either Zettair or eXist, and yields a robust and a very effective XML
retrieval.
| [
{
"version": "v1",
"created": "Thu, 28 Jul 2005 19:19:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
]
|
cs/0507071 | Andreas U. Schmidt | Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt | Security for Distributed Web-Applications via Aspect-Oriented
Programming | Refereed contribution to the Conference Information Security South
Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005 | null | null | null | cs.CR | null | Identity Management is becoming more and more important in business systems
as they are opened for third parties including trading partners, consumers and
suppliers. This paper presents an approach securing a system without any
knowledge of the system source code. The security module adds to the existing
system authentication and authorisation based on aspect oriented programming
and the liberty alliance framework, an upcoming industrie standard providing
single sign on. In an initial training phase the module is adapted to the
application which is to be secured. Moreover the use of hardware tokens and
proactive computing is demonstrated. The high modularisation is achived through
use of AspectJ, a programming language extension of Java.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2005 10:44:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Rauch",
"Thomas",
""
],
[
"Schmidt",
"Andreas U.",
""
]
]
|
cs/0507072 | Matthew Leslie | Matthew Leslie | Reliable Data Storage in Distributed Hash Tables | null | null | null | null | cs.DC cs.NI | null | Distributed Hash Tables offer a resilient lookup service for unstable
distributed environments. Resilient data storage, however, requires additional
data replication and maintenance algorithms. These algorithms can have an
impact on both the performance and the scalability of the system. In this
paper, we describe the goals and design space of these replication algorithms.
We examine an existing replication algorithm, and present a new analysis of
its reliability. We then present a new dynamic replication algorithm which can
operate in unstable environments. We give several possible replica placement
strategies for this algorithm, and show how they impact reliability and
performance.
Finally we compare all replication algorithms through simulation, showing
quantitatively the difference between their bandwidth use, fault tolerance and
performance.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2005 16:54:00 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jul 2005 21:49:19 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Aug 2005 22:47:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leslie",
"Matthew",
""
]
]
|
cs/0507073 | Michel Dagenais | Michel R. Dagenais (Dept. of Computer Engineering, Ecole
Polytechnique, Montreal, Canada) Karim Yaghmour (Opersys, Montreal, Canada)
Charles Levert (Ericsson Research, Montreal, Canada) Makan Pourzandi
(Ericsson Research, Montreal, Canada) | Software Performance Analysis | null | null | null | null | cs.PF cs.OS | null | The key to speeding up applications is often understanding where the elapsed
time is spent, and why. This document reviews in depth the full array of
performance analysis tools and techniques available on Linux for this task,
from the traditional tools like gcov and gprof, to the more advanced tools
still under development like oprofile and the Linux Trace Toolkit. The focus is
more on the underlying data collection and processing algorithms, and their
overhead and precision, than on the cosmetic details of the graphical user
interface frontends.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2005 19:33:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dagenais",
"Michel R.",
"",
"Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada"
],
[
"Yaghmour",
"Karim",
"",
"Opersys, Montreal, Canada"
],
[
"Levert",
"Charles",
"",
"Ericsson Research, Montreal, Canada"
],
[
"Pourzandi",
"Makan",
"",
"Ericsson Research, Montreal, Canada"
]
]
|
cs/0508002 | Adilson Xavier V. | Gilson A. Giraldi, Luis C. da Costa, Adilson V. Xavier, Paulo S.
Rodrigues | Methods for Analytical Understanding of Agent-Based Modeling of Complex
Systems | null | null | null | null | cs.GR | null | Von Neuman's work on universal machines and the hardware development have
allowed the simulation of dynamical systems through a large set of interacting
agents. This is a bottom-up approach which tries to derive global properties of
a complex system through local interaction rules and agent behaviour.
Traditionally, such systems are modeled and simulated through top-down methods
based on differential equations. Agent-Based Modeling has the advantage of
simplicity and low computational cost. However, unlike differential equations,
there is no standard way to express agent behaviour. Besides, it is not clear
how to analytically predict the results obtained by the simulation. In this
paper we survey some of these methods. For expressing agent behaviour formal
methods, like Stochastic Process Algebras have been used. Such approach is
useful if the global properties of interest can be expressed as a function of
stochastic time series. However, if space variables must be considered, we
shall change the focus. In this case, multiscale techniques, based on
Chapman-Enskog expansion, was used to establish the connection between the
microscopic dynamics and the macroscopic observables. Also, we use data mining
techniques,like Principal Component Analysis (PCA), to study agent systems like
Cellular Automata. With the help of these tools we will discuss a simple
society model, a Lattice Gas Automaton for fluid modeling, and knowledge
discovery in CA databases. Besides, we show the capabilities of the NetLogo, a
software for agent simulation of complex system and show our experience about.
| [
{
"version": "v1",
"created": "Sat, 30 Jul 2005 12:31:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"da Costa",
"Luis C.",
""
],
[
"Xavier",
"Adilson V.",
""
],
[
"Rodrigues",
"Paulo S.",
""
]
]
|
cs/0508005 | Riccardo Pucella | Nick Papanikolaou | Logic Column 13: Reasoning Formally about Quantum Systems: An Overview | 17 pages | SIGACT News, 36(3), pp. 51-66, 2005 | null | null | cs.LO | null | This article is intended as an introduction to the subject of quantum logic,
and as a brief survey of the relevant literature. Also discussed here are
logics for specification and analysis of quantum information systems, in
particular, recent work by P. Mateus and A. Sernadas, and also by R. van der
Meyden and M. Patra. Overall, our objective is to provide a high-level
presentation of the logical aspects of quantum theory. Mateus' and Sernadas'
EQPL logic is illustrated with a small example, namely the state of an
entangled pair of qubits. The "KT" logic of van der Meyden and Patra is
demonstrated briefly in the context of the B92 protocol for quantum key
distribution.
| [
{
"version": "v1",
"created": "Mon, 1 Aug 2005 14:34:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Papanikolaou",
"Nick",
""
]
]
|
cs/0508006 | Sandor P. Fekete | Sandor P. Fekete, Michael Kaufmann, Alexander Kroeller, and Katharina
Lehmann | A New Approach for Boundary Recognition in Geometric Sensor Networks | 4 pages, 5 figures, Latex, to appear in Canadian Conference on
Computational Geometry (CCCG 2005) | null | null | null | cs.DS cs.DC | null | We describe a new approach for dealing with the following central problem in
the self-organization of a geometric sensor network: Given a polygonal region
R, and a large, dense set of sensor nodes that are scattered uniformly at
random in R. There is no central control unit, and nodes can only communicate
locally by wireless radio to all other nodes that are within communication
radius r, without knowing their coordinates or distances to other nodes. The
objective is to develop a simple distributed protocol that allows nodes to
identify themselves as being located near the boundary of R and form connected
pieces of the boundary. We give a comparison of several centrality measures
commonly used in the analysis of social networks and show that restricted
stress centrality is particularly suited for geometric networks; we provide
mathematical as well as experimental evidence for the quality of this measure.
| [
{
"version": "v1",
"created": "Mon, 1 Aug 2005 19:44:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fekete",
"Sandor P.",
""
],
[
"Kaufmann",
"Michael",
""
],
[
"Kroeller",
"Alexander",
""
],
[
"Lehmann",
"Katharina",
""
]
]
|
cs/0508010 | Yongjin Kim | Yongjin Kim, Ahmed Helmy | ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION | null | null | null | null | cs.NI | null | Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious
problems in wireless networks due to limited network and host resources.
Attacker traceback is a promising solution to take a proper countermeasure near
the attack origins, to discourage attackers from launching attacks, and for
forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a
challenging problem due to the dynamic topology, and limited network resources.
It is especially difficult to trace back attacker(s) when they are moving to
avoid traceback. In this paper, we introduce the ATTENTION protocol framework,
which pays special attention to MAC layer abnormal activity under attack.
ATTENTION consists of three classes, namely, coarse-grained traceback,
fine-grained traceback and spatio-temporal fusion architecture. For
energy-efficient attacker searching in MANETs, we also utilize small-world
model. Our simulation analysis shows 79% of success rate in DoS attacker
traceback with coarse-grained attack signature. In addition, with fine-grained
attack signature, it shows 97% of success rate in DoS attacker traceback and
83% of success rate in DDoS attacker traceback. We also show that ATTENTION has
robustness against node collusion and mobility.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 04:04:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kim",
"Yongjin",
""
],
[
"Helmy",
"Ahmed",
""
]
]
|
cs/0508016 | Jang-Won Lee | Jang-Won Lee, Mung Chiang, and A. Robert Calderbank | Distributed Algorithms for Optimal Rate-Reliability Tradeoff in Networks | To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005 | null | null | null | cs.NI | null | The current framework of network utility maximization for distributed rate
allocation assumes fixed channel code rates. However, by adapting the physical
layer channel coding, different rate-reliability tradeoffs can be achieved on
each link and for each end user. Consider a network where each user has a
utility function that depends on both signal quality and data rate, and each
link may provide a `fatter' (`thinner') information `pipe' by allowing a higher
(lower) decoding error probability. We propose two distributed, pricing-based
algorithms to attain optimal rate-reliability tradeoff, with an interpretation
that each user provides its willingness to pay for reliability to the network
and the network feeds back congestion prices to users. The proposed algorithms
converge to a tradeoff point between rate and reliability, which is proved to
be globally optimal for codes with sufficiently large codeword lengths and user
utilities with sufficiently negative curvatures.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 14:35:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lee",
"Jang-Won",
""
],
[
"Chiang",
"Mung",
""
],
[
"Calderbank",
"A. Robert",
""
]
]
|
cs/0508017 | Anne-Marie Vercoustre | Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre | Enhancing Content-And-Structure Information Retrieval using a Native XML
Database | null | null | null | null | cs.IR | null | Three approaches to content-and-structure XML retrieval are analysed in this
paper: first by using Zettair, a full-text information retrieval system; second
by using eXist, a native XML database, and third by using a hybrid XML
retrieval system that uses eXist to produce the final answers from likely
relevant articles retrieved by Zettair. INEX 2003 content-and-structure topics
can be classified in two categories: the first retrieving full articles as
final answers, and the second retrieving more specific elements within articles
as final answers. We show that for both topic categories our initial hybrid
system improves the retrieval effectiveness of a native XML database. For
ranking the final answer elements, we propose and evaluate a novel retrieval
model that utilises the structural relationships between the answer elements of
a native XML database and retrieves Coherent Retrieval Elements. The final
results of our experiments show that when the XML retrieval task focusses on
highly relevant elements our hybrid XML retrieval system with the Coherent
Retrieval Elements module is 1.8 times more effective than Zettair and 3 times
more effective than eXist, and yields an effective content-and-structure XML
retrieval.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 15:05:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
]
|
cs/0508021 | Dmitri Krioukov | Dmitri Krioukov, kc claffy | Toward Compact Interdomain Routing | null | null | null | null | cs.NI | null | Despite prevailing concerns that the current Internet interdomain routing
system will not scale to meet the needs of the 21st century global Internet,
networking research has not yet led to the construction of a new routing
architecture with satisfactory and mathematically provable scalability
characteristics. Worse, continuing empirical trends of the existing routing and
topology structure of the Internet are alarming: the foundational principles of
the current routing and addressing architecture are an inherently bad match for
the naturally evolving structure of Internet interdomain topology. We are
fortunate that a sister discipline, theory of distributed computation, has
developed routing algorithms that offer promising potential for genuinely
scalable routing on realistic Internet-like topologies. Indeed, there are many
recent breakthroughs in the area of compact routing, which has been shown to
drastically outperform, in terms of efficiency and scalability, even the
boldest proposals developed in networking research. Many open questions remain,
but we believe the applicability of compact routing techniques to Internet
interdomain routing is a research area whose potential payoff for the future of
networking is too high to ignore.
| [
{
"version": "v1",
"created": "Tue, 2 Aug 2005 19:32:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Krioukov",
"Dmitri",
""
],
[
"claffy",
"kc",
""
]
]
|
cs/0508028 | Bernardo Huberman | Fang Wu, Zi Zhang and Bernardo A. Huberman | Truth-telling Reservations | null | null | null | null | cs.GT cond-mat.stat-mech cs.MA | null | We present a mechanism for reservations of bursty resources that is both
truthful and robust. It consists of option contracts whose pricing structure
induces users to reveal the true likelihoods that they will purchase a given
resource. Users are also allowed to adjust their options as their likelihood
changes. This scheme helps users save cost and the providers to plan ahead so
as to reduce the risk of under-utilization and overbooking. The mechanism
extracts revenue similar to that of a monopoly provider practicing temporal
pricing discrimination with a user population whose preference distribution is
known in advance.
| [
{
"version": "v1",
"created": "Wed, 3 Aug 2005 17:11:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wu",
"Fang",
""
],
[
"Zhang",
"Zi",
""
],
[
"Huberman",
"Bernardo A.",
""
]
]
|
cs/0508029 | Johannes Schneider | Johannes J. Schneider and Scott Kirkpatrick | Selfish vs. Unselfish Optimization of Network Creation | 16 pages, 6 figures | null | 10.1088/1742-5468/2005/08/P08007 | null | cs.NI cs.AR cs.MA | null | We investigate several variants of a network creation model: a group of
agents builds up a network between them while trying to keep the costs of this
network small. The cost function consists of two addends, namely (i) a constant
amount for each edge an agent buys and (ii) the minimum number of hops it takes
sending messages to other agents. Despite the simplicity of this model, various
complex network structures emerge depending on the weight between the two
addends of the cost function and on the selfish or unselfish behaviour of the
agents.
| [
{
"version": "v1",
"created": "Wed, 3 Aug 2005 18:16:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schneider",
"Johannes J.",
""
],
[
"Kirkpatrick",
"Scott",
""
]
]
|
cs/0508032 | Derek Messie | Derek Messie (1) and Jae C. Oh (1) ((1) Syracuse University) | Polymorphic Self-* Agents for Stigmergic Fault Mitigation in Large-Scale
Real-Time Embedded Systems | Fourth International Joint Conference on Autonomous Agents and
Multi-Agent Systems (AAMAS), Utrecht, Netherlands, July, 2005 | null | null | null | cs.AI cs.MA | null | Organization and coordination of agents within large-scale, complex,
distributed environments is one of the primary challenges in the field of
multi-agent systems. A lot of interest has surfaced recently around self-*
(self-organizing, self-managing, self-optimizing, self-protecting) agents. This
paper presents polymorphic self-* agents that evolve a core set of roles and
behavior based on environmental cues. The agents adapt these roles based on the
changing demands of the environment, and are directly implementable in computer
systems applications. The design combines strategies from game theory,
stigmergy, and other biologically inspired models to address fault mitigation
in large-scale, real-time, distributed systems. The agents are embedded within
the individual digital signal processors of BTeV, a High Energy Physics
experiment consisting of 2500 such processors. Results obtained using a SWARM
simulation of the BTeV environment demonstrate the polymorphic character of the
agents, and show how this design exceeds performance and reliability metrics
obtained from comparable centralized, and even traditional decentralized
approaches.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 01:43:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Messie",
"Derek",
"",
"Syracuse University"
],
[
"Oh",
"Jae C.",
"",
"Syracuse University"
]
]
|
cs/0508033 | Dmitri Krioukov | Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker,
Xenofontas Dimitropoulos, kc claffy, Amin Vahdat | Lessons from Three Views of the Internet Topology | null | null | null | CAIDA-TR-2005-02 | cs.NI physics.soc-ph | null | Network topology plays a vital role in understanding the performance of
network applications and protocols. Thus, recently there has been tremendous
interest in generating realistic network topologies. Such work must begin with
an understanding of existing network topologies, which today typically consists
of a relatively small number of data sources. In this paper, we calculate an
extensive set of important characteristics of Internet AS-level topologies
extracted from the three data sources most frequently used by the research
community: traceroutes, BGP, and WHOIS. We find that traceroute and BGP
topologies are similar to one another but differ substantially from the WHOIS
topology. We discuss the interplay between the properties of the data sources
that result from specific data collection mechanisms and the resulting topology
views. We find that, among metrics widely considered, the joint degree
distribution appears to fundamentally characterize Internet AS-topologies: it
narrowly defines values for other important metrics. We also introduce an
evaluation criteria for the accuracy of topology generators and verify previous
observations that generators solely reproducing degree distributions cannot
capture the full spectrum of critical topological characteristics of any of the
three topologies. Finally, we release to the community the input topology
datasets, along with the scripts and output of our calculations. This
supplement should enable researchers to validate their models against real data
and to make more informed selection of topology data sources for their specific
needs.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 02:35:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mahadevan",
"Priya",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Fomenkov",
"Marina",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"claffy",
"kc",
""
],
[
"Vahdat",
"Amin",
""
]
]
|
cs/0508036 | Anne-Marie Vercoustre | Thierry Despeyroux, Yves Lechevallier, Brigitte Trousse, Anne-Marie
Vercoustre | Exp\'{e}riences de classification d'une collection de documents XML de
structure homog\`{e}ne | Cette version corrige des erreurs dans le nom de 2 auteurs cites dans
la bibliographie | Dans 5\`{e}me Journ\'{e}es d' Extraction et de Gestion des
Connaissances (EGC 2005) | null | null | cs.IR | null | This paper presents some experiments in clustering homogeneous XMLdocuments
to validate an existing classification or more generally anorganisational
structure. Our approach integrates techniques for extracting knowledge from
documents with unsupervised classification (clustering) of documents. We focus
on the feature selection used for representing documents and its impact on the
emerging classification. We mix the selection of structured features with fine
textual selection based on syntactic characteristics.We illustrate and evaluate
this approach with a collection of Inria activity reports for the year 2003.
The objective is to cluster projects into larger groups (Themes), based on the
keywords or different chapters of these activity reports. We then compare the
results of clustering using different feature selections, with the official
theme structure used by Inria.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 14:14:59 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 13:15:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
""
],
[
"Lechevallier",
"Yves",
""
],
[
"Trousse",
"Brigitte",
""
],
[
"Vercoustre",
"Anne-Marie",
""
]
]
|
cs/0508038 | Robert Burger PhD | John Robert Burger | Quantum Algorithm Processor For Finding Exact Divisors | null | null | null | null | cs.AR | null | Wiring diagrams are given for a quantum algorithm processor in CMOS to
compute, in parallel, all divisors of an n-bit integer. Lines required in a
wiring diagram are proportional to n. Execution time is proportional to the
square of n.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 17:35:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
]
|
cs/0508041 | Tian-Jian Jiang | Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan,
Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu | OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services | 4 pages | null | null | null | cs.HC | null | Input method (IM) is a sine qua non for text entry of many Asian languages,
but its potential applications on other languages remain under-explored. This
paper proposes a philosophy of input method design by seeing it as a
nonintrusive plug-in text service framework. Such design allows new
functionalities of text processing to be attached onto a running application
without any tweaking of code. We also introduce OpenVanilla, a cross-platform
framework that is designed with the above-mentioned model in mind. Frameworks
like OpenVanilla have shown that an input method can be more than just a text
entry tool: it offers a convenient way for developing various text service and
language tools.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 22:39:49 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 06:41:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jiang",
"Tian-Jian",
""
],
[
"Deng-Liu",
"",
""
],
[
"Liu",
"Kang-min",
""
],
[
"Yang",
"Weizhong",
""
],
[
"Tan",
"Pek-tiong",
""
],
[
"Hsieh",
"Mengjuei",
""
],
[
"Chang",
"Tsung-hsiang",
""
],
[
"Hsu",
"Wen-Lien",
""
]
]
|
cs/0508042 | Tian-Jian Jiang | Tien-chien Chiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong
Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu | OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services | This paper has been withdrawn | null | null | null | cs.HC | null | This paper has been withdrawn by the author, because it was merged into
cs.HC/0508041
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2005 22:49:38 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 06:46:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chiang",
"Tien-chien",
""
],
[
"Deng-Liu",
"",
""
],
[
"Liu",
"Kang-min",
""
],
[
"Yang",
"Weizhong",
""
],
[
"Tan",
"Pek-tiong",
""
],
[
"Hsieh",
"Mengjuei",
""
],
[
"Chang",
"Tsung-hsiang",
""
],
[
"Hsu",
"Wen-Lien",
""
]
]
|
cs/0508045 | Ion Mandoiu | Christoph Albrecht, Andrew B. Kahng, Ion I. Mandoiu, and Alexander
Zelikovsky | Multicommodity Flow Algorithms for Buffered Global Routing | null | null | null | null | cs.DS | null | In this paper we describe a new algorithm for buffered global routing
according to a prescribed buffer site map. Specifically, we describe a provably
good multi-commodity flow based algorithm that finds a global routing
minimizing buffer and wire congestion subject to given constraints on routing
area (wirelength and number of buffers) and sink delays. Our algorithm allows
computing the tradeoff curve between routing area and wire/buffer congestion
under any combination of delay and capacity constraints, and simultaneously
performs buffer/wire sizing, as well as layer and pin assignment. Experimental
results show that near-optimal results are obtained with a practical runtime.
| [
{
"version": "v1",
"created": "Sat, 6 Aug 2005 12:44:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Albrecht",
"Christoph",
""
],
[
"Kahng",
"Andrew B.",
""
],
[
"Mandoiu",
"Ion I.",
""
],
[
"Zelikovsky",
"Alexander",
""
]
]
|
cs/0508052 | Olivier Powell | Pierre Leone, Olivier Powell and Jose Rolim | Energy Optimal Data Propagation in Wireless Sensor Networks | 19 pages | Journal of Parallel and Distributed Computing Volume 67, Issue 3 ,
March 2007, Pages 302-317 | 10.1016/j.jpdc.2006.10.007 | null | cs.DC | null | We propose an algorithm which produces a randomized strategy reaching optimal
data propagation in wireless sensor networks (WSN).In [6] and [8], an energy
balanced solution is sought using an approximation algorithm. Our algorithm
improves by (a) when an energy-balanced solution does not exist, it still finds
an optimal solution (whereas previous algorithms did not consider this case and
provide no useful solution) (b) instead of being an approximation algorithm, it
finds the exact solution in one pass. We also provide a rigorous proof of the
optimality of our solution.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2005 15:54:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leone",
"Pierre",
""
],
[
"Powell",
"Olivier",
""
],
[
"Rolim",
"Jose",
""
]
]
|
cs/0508053 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Measuring Semantic Similarity by Latent Relational Analysis | 6 pages, related work available at http://purl.org/peter.turney/ | Proceedings of the Nineteenth International Joint Conference on
Artificial Intelligence (IJCAI-05), (2005), Edinburgh, Scotland, 1136-1141 | null | NRC-48255 | cs.LG cs.CL cs.IR | null | This paper introduces Latent Relational Analysis (LRA), a method for
measuring semantic similarity. LRA measures similarity in the semantic
relations between two pairs of words. When two pairs have a high degree of
relational similarity, they are analogous. For example, the pair cat:meow is
analogous to the pair dog:bark. There is evidence from cognitive science that
relational similarity is fundamental to many cognitive and linguistic tasks
(e.g., analogical reasoning). In the Vector Space Model (VSM) approach to
measuring relational similarity, the similarity between two pairs is calculated
by the cosine of the angle between the vectors that represent the two pairs.
The elements in the vectors are based on the frequencies of manually
constructed patterns in a large corpus. LRA extends the VSM approach in three
ways: (1) patterns are derived automatically from the corpus, (2) Singular
Value Decomposition is used to smooth the frequency data, and (3) synonyms are
used to reformulate word pairs. This paper describes the LRA algorithm and
experimentally compares LRA to VSM on two tasks, answering college-level
multiple-choice word analogy questions and classifying semantic relations in
noun-modifier expressions. LRA achieves state-of-the-art results, reaching
human-level performance on the analogy questions and significantly exceeding
VSM performance on both tasks.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2005 19:35:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
]
|
cs/0508061 | L.T. Handoko | L.T. Handoko | SciBlog : A Tool for Scientific Collaboration | 4 figures, invited talk at the Workshop on Knowledge Management (6-9
December 2004) | Proceeding of the WKM 2004 | null | FISIKALIPI-04013 | cs.CY | null | I describe a newly developed online scientific web-log (SciBlog). The online
facility consists of several moduls needed in a common and conventional
research activity. I show that this enables scientists around the world to
perform an online collaboration over the net.
| [
{
"version": "v1",
"created": "Thu, 11 Aug 2005 22:29:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Handoko",
"L. T.",
""
]
]
|
cs/0508063 | Michel Dagenais | Michel R. Dagenais (Dept. of Computer Engineering, Ecole
Polytechnique, Montreal, Canada) | Disks, Partitions, Volumes and RAID Performance with the Linux Operating
System | null | null | null | null | cs.PF cs.OS | null | Block devices in computer operating systems typically correspond to disks or
disk partitions, and are used to store files in a filesystem. Disks are not the
only real or virtual device which adhere to the block accessible stream of
bytes block device model. Files, remote devices, or even RAM may be used as a
virtual disks. This article examines several common combinations of block
device layers used as virtual disks in the Linux operating system: disk
partitions, loopback files, software RAID, Logical Volume Manager, and Network
Block Devices. It measures their relative performance using different
filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
| [
{
"version": "v1",
"created": "Fri, 12 Aug 2005 16:13:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dagenais",
"Michel R.",
"",
"Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada"
]
]
|
cs/0508065 | Herbert van de Sompel | Jeroen Bekaert, Herbert Van de Sompel | Representing Digital Assets using MPEG-21 Digital Item Declaration | 27 pages, accepted submission to the special edition on complex
objects of the International Journal on Digital Libraries | null | null | null | cs.DL cs.AR | null | Various XML-based approaches aimed at representing compound digital assets
have emerged over the last several years. Approaches that are of specific
relevance to the digital library community include the Metadata Encoding and
Transmission Standard (METS), the IMS Content Packaging XML Binding, and the
XML Formatted Data Units (XFDU) developed by CCSDS Panel 2. The MPEG-21 Digital
Item Declaration (MPEG-21 DID) is another standard specifying the
representation of digital assets in XML that, so far, has received little
attention in the digital library community. This article gives a brief insight
into the MPEG-21 standardization effort, highlights the major characteristics
of the MPEG-21 DID Abstract Model, and describes the MPEG-21 Digital Item
Declaration Language (MPEG-21 DIDL), an XML syntax for the representation of
digital assets based on the MPEG-21 DID Abstract Model. Also, it briefly
demonstrates the potential relevance of MPEG-21 DID to the digital library
community by describing its use in the aDORe repository environment at the
Research Library of the Los Alamos National Laboratory (LANL) for the
representation of digital assets.
| [
{
"version": "v1",
"created": "Sat, 13 Aug 2005 03:09:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bekaert",
"Jeroen",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
|
cs/0508066 | Jonathan Bowen | Silvia Filippini-Fantoni and Jonathan P. Bowen | Can Small Museums Develop Compelling, Educational and Accessible Web
Resources? The Case of Accademia Carrara | 14 pages, 6 figures | In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005
London Conference Proceedings, University College London, UK, 25-29 July
2005, pages 18.1-18.14. ISBN: 0-9543146-6-2 | null | null | cs.MM cs.CY cs.DL cs.IR | null | Due to the lack of budget, competence, personnel and time, small museums are
often unable to develop compelling, educational and accessible web resources
for their permanent collections or temporary exhibitions. In an attempt to
prove that investing in these types of resources can be very fruitful even for
small institutions, we will illustrate the case of Accademia Carrara, a museum
in Bergamo, northern Italy, which, for a current temporary exhibition on
Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed
a series of multimedia applications, including an accessible website, rich in
content and educational material [www.cezannerenoir.it].
| [
{
"version": "v1",
"created": "Sat, 13 Aug 2005 14:46:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Filippini-Fantoni",
"Silvia",
""
],
[
"Bowen",
"Jonathan P.",
""
]
]
|
cs/0508067 | Jonathan Bowen | Teresa Numerico and Jonathan P. Bowen | Copyright and Promotion: Oxymoron or Opportunity? | 10 pages, 0 figures | In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005
London Conference Proceedings, University College London, UK, 25-29 July
2005, pages 25.1-25.10. ISBN: 0-9543146-6-2 | null | null | cs.CY cs.DL | null | Copyright in the cultural sphere can act as a barrier to the dissemination of
high-quality information. On the other hand it protects works of art that might
not be made available otherwise. This dichotomy makes the area of copyright
difficult, especially when it applies to the digital arena of the web where
copying is so easy and natural. Here we present a snapshot of the issues for
online copyright, with particular emphasis on the relevance to cultural
institutions. We concentrate on Europe and the US; as an example we include a
special section dedicated to the situation in Italy.
| [
{
"version": "v1",
"created": "Sat, 13 Aug 2005 14:58:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Numerico",
"Teresa",
""
],
[
"Bowen",
"Jonathan P.",
""
]
]
|
cs/0508071 | Oded Schramm | Ryan O'Donnell, Michael Saks, Oded Schramm, Rocco A. Servedio | Every decision tree has an influential variable | This paper is posted by permission from the IEEE Computer Society. To
appear in FOCS 2005 | null | null | null | cs.CC cs.DM math.PR | null | We prove that for any decision tree calculating a boolean function
$f:\{-1,1\}^n\to\{-1,1\}$, \[ \Var[f] \le \sum_{i=1}^n \delta_i \Inf_i(f), \]
where $\delta_i$ is the probability that the $i$th input variable is read and
$\Inf_i(f)$ is the influence of the $i$th variable on $f$. The variance,
influence and probability are taken with respect to an arbitrary product
measure on $\{-1,1\}^n$. It follows that the minimum depth of a decision tree
calculating a given balanced function is at least the reciprocal of the largest
influence of any input variable. Likewise, any balanced boolean function with a
decision tree of depth $d$ has a variable with influence at least
$\frac{1}{d}$. The only previous nontrivial lower bound known was $\Omega(d
2^{-d})$. Our inequality has many generalizations, allowing us to prove
influence lower bounds for randomized decision trees, decision trees on
arbitrary product probability spaces, and decision trees with non-boolean
outputs. As an application of our results we give a very easy proof that the
randomized query complexity of nontrivial monotone graph properties is at least
$\Omega(v^{4/3}/p^{1/3})$, where $v$ is the number of vertices and $p \leq
\half$ is the critical threshold probability. This supersedes the milestone
$\Omega(v^{4/3})$ bound of Hajnal and is sometimes superior to the best known
lower bounds of Chakrabarti-Khot and Friedgut-Kahn-Wigderson.
| [
{
"version": "v1",
"created": "Tue, 16 Aug 2005 01:00:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"O'Donnell",
"Ryan",
""
],
[
"Saks",
"Michael",
""
],
[
"Schramm",
"Oded",
""
],
[
"Servedio",
"Rocco A.",
""
]
]
|
cs/0508073 | Marcus Hutter | Jan Poland and Marcus Hutter | Universal Learning of Repeated Matrix Games | 16 LaTeX pages, 8 eps figures | Proc. 15th Annual Machine Learning Conf. of Belgium and The
Netherlands (Benelearn 2006) pages 7-14 | null | IDSIA-18-05 | cs.LG cs.AI | null | We study and compare the learning dynamics of two universal learning
algorithms, one based on Bayesian learning and the other on prediction with
expert advice. Both approaches have strong asymptotic performance guarantees.
When confronted with the task of finding good long-term strategies in repeated
2x2 matrix games, they behave quite differently.
| [
{
"version": "v1",
"created": "Tue, 16 Aug 2005 16:27:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
]
|
cs/0508078 | Serebrenik Alexander | Alexander Serebrenik, Susana Munoz-Hernandez | Proceedings of the 15th Workshop on Logic-based methods in Programming
Environments WLPE'05 -- October 5, 2005 -- Sitges (Barcelona), Spain | Seven accepted papers | null | null | null | cs.PL cs.LO cs.SE | null | This volume contains papers presented at WLPE 2005, 15th International
Workshop on Logic-based methods in Programming Environments.
The aim of the workshop is to provide an informal meeting for the researchers
working on logic-based tools for development and analysis of programs. This
year we emphasized two aspects: on one hand the presentation, pragmatics and
experiences of tools for logic programming environments; on the other one,
logic-based environmental tools for programming in general.
The workshop took place in Sitges (Barcelona), Spain as a satellite workshop
of the 21th International Conference on Logic Programming (ICLP 2005). This
workshop continues the series of successful international workshops on logic
programming environments held in Ohio, USA (1989), Eilat, Israel (1990), Paris,
France (1991), Washington, USA (1992), Vancouver, Canada (1993), Santa
Margherita Ligure, Italy (1994), Portland, USA (1995), Leuven, Belgium and Port
Jefferson, USA (1997), Las Cruces, USA (1999), Paphos, Cyprus (2001),
Copenhagen, Denmark (2002), Mumbai, India (2003) and Saint Malo, France (2004).
We have received eight submissions (2 from France, 2 Spain-US cooperations,
one Spain-Argentina cooperation, one from Japan, one from the United Kingdom
and one Sweden-France cooperation). Program committee has decided to accept
seven papers. This volume contains revised versions of the accepted papers.
We are grateful to the authors of the papers, the reviewers and the members
of the Program Committee for the help and fruitful discussions.
| [
{
"version": "v1",
"created": "Wed, 17 Aug 2005 13:35:20 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Aug 2005 07:57:41 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Aug 2005 16:15:24 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Aug 2005 06:42:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Munoz-Hernandez",
"Susana",
""
]
]
|
cs/0508079 | Nithin Nagaraj | Nithin Nagaraj and Vivek Vaidya and Prabhakar G Vaidya | Re-visiting the One-Time Pad | 13 pages, 3 figures, submitted for publication to IndoCrypt 2005
conference | null | null | null | cs.CR | null | In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic
system,also popularly known as the One-Time Pad (OTP). Since then, it has been
believed that the perfectly random and uncompressible OTP which is transmitted
needs to have a length equal to the message length for this result to be true.
In this paper, we prove that the length of the transmitted OTP which actually
contains useful information need not be compromised and could be less than the
message length without sacrificing perfect secrecy. We also provide a new
interpretation for the OTP encryption by treating the message bits as making
True/False statements about the pad, which we define as a private-object. We
introduce the paradigm of private-object cryptography where messages are
transmitted by verifying statements about a secret-object. We conclude by
suggesting the use of Formal Axiomatic Systems for investing N bits of secret.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 04:37:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nagaraj",
"Nithin",
""
],
[
"Vaidya",
"Vivek",
""
],
[
"Vaidya",
"Prabhakar G",
""
]
]
|
cs/0508080 | Kirti Chawla | Kirti Chawla | A 3D RGB Axis-based Color-oriented Cryptography | 16 Pages, 12 figures | null | null | null | cs.CR | null | In this document, a formal approach to encrypt, decrypt, transmit and receive
information using colors is explored. A piece of information consists of set of
symbols with a definite property imposed on the generating set. The symbols are
usually encoded using ascii scheme. A linear to 3d transformation is presented.
The change of axis from traditional xyz to rgb is highlighted and its effect
are studied. A point in this new axis is then represented as a unique color and
a vector or matrix is associated with it, making it amenable to standard vector
or matrix operations. A formal notion on hybrid cryptography is introduced as
the algorithm lies on the boundary of symmetric and asymmetric cryptography. No
discussion is complete, without mentioning reference to communication aspects
of secure information in a channel. Transmission scheme pertaining to light as
carrier is introduced and studied. Key-exchanges do not come under the scope of
current frame of document.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 07:07:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chawla",
"Kirti",
""
]
]
|
cs/0508081 | Kirti Chawla | Kirti Chawla | ZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol | 5 Pages | null | null | null | cs.CR | null | In this paper, facts existing in different domains are explored, which are
comparable by their end result. Properties of various domains and the facts
that are part of such a unit are also presented, examples of comparison and
methods of usage as means of zero-knowledge protocols are given, finally a
zero-knowledge protocol based on afore-mentioned concept is given.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 07:17:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chawla",
"Kirti",
""
]
]
|
cs/0508082 | Bernardo Huberman | Scott Golder, Bernardo A. Huberman | The Structure of Collaborative Tagging Systems | null | null | null | null | cs.DL cs.CY | null | Collaborative tagging describes the process by which many users add metadata
in the form of keywords to shared content. Recently, collaborative tagging has
grown in popularity on the web, on sites that allow users to tag bookmarks,
photographs and other content. In this paper we analyze the structure of
collaborative tagging systems as well as their dynamical aspects. Specifically,
we discovered regularities in user activity, tag frequencies, kinds of tags
used, bursts of popularity in bookmarking and a remarkable stability in the
relative proportions of tags within a given url. We also present a dynamical
model of collaborative tagging that predicts these stable patterns and relates
them to imitation and shared knowledge.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 18:34:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Golder",
"Scott",
""
],
[
"Huberman",
"Bernardo A.",
""
]
]
|
cs/0508086 | Dragos Trinca | Dragos Trinca | High-performance BWT-based Encoders | 12 pages | null | null | null | cs.DS | null | In 1994, Burrows and Wheeler developed a data compression algorithm which
performs significantly better than Lempel-Ziv based algorithms. Since then, a
lot of work has been done in order to improve their algorithm, which is based
on a reversible transformation of the input string, called BWT (the
Burrows-Wheeler transformation). In this paper, we propose a compression scheme
based on BWT, MTF (move-to-front coding), and a version of the algorithms
presented in [Dragos Trinca, ITCC-2004].
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 05:47:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
]
|
cs/0508087 | Dragos Trinca | Dragos Trinca | Modelling the Eulerian Path Problem using a String Matching Framework | 10 pages | null | null | null | cs.DS | null | The well-known Eulerian path problem can be solved in polynomial time (more
exactly, there exists a linear time algorithm for this problem). In this paper,
we model the problem using a string matching framework, and then initiate an
algorithmic study on a variant of this problem, called the (2,1)-STRING-MATCH
problem (which is actually a generalization of the Eulerian path problem).
Then, we present a polynomial-time algorithm for the (2,1)-STRING-MATCH
problem, which is the most important result of this paper. Specifically, we get
a lower bound of Omega(n), and an upper bound of O(n^{2}).
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 06:08:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
]
|
cs/0508089 | Dragos Trinca | Dragos Trinca | Modelling the EAH Data Compression Algorithm using Graph Theory | 10 pages | null | null | null | cs.DS | null | Adaptive codes associate variable-length codewords to symbols being encoded
depending on the previous symbols in the input data string. This class of codes
has been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of
non-standard variable-length codes. New algorithms for data compression, based
on adaptive codes of order one, have been presented in [Dragos Trinca,
ITCC-2004], where we have behaviorally shown that for a large class of input
data strings, these algorithms substantially outperform the Lempel-Ziv
universal data compression algorithm. EAH has been introduced in [Dragos
Trinca, cs.DS/0505061], as an improved generalization of these algorithms. In
this paper, we present a translation of the EAH algorithm into the graph
theory.
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 19:32:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
]
|
cs/0508090 | Dragos Trinca | Dragos Trinca | Translating the EAH Data Compression Algorithm into Automata Theory | 9 pages | null | null | null | cs.DS | null | Adaptive codes have been introduced in [Dragos Trinca, cs.DS/0505007] as a
new class of non-standard variable-length codes. These codes associate
variable-length codewords to symbols being encoded depending on the previous
symbols in the input data string. A new data compression algorithm, called EAH,
has been introduced in [Dragos Trinca, cs.DS/0505061], where we have
behaviorally shown that for a large class of input data strings, this algorithm
substantially outperforms the well-known Lempel-Ziv universal data compression
algorithm. In this paper, we translate the EAH encoder into automata theory.
| [
{
"version": "v1",
"created": "Sun, 21 Aug 2005 19:56:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Trinca",
"Dragos",
""
]
]
|
cs/0508091 | Serebrenik Alexander | Susana Munoz-Hernandez and Claudio Vaucheret | Extending Prolog with Incomplete Fuzzy Information | null | null | null | null | cs.PL cs.SE | null | Incomplete information is a problem in many aspects of actual environments.
Furthermore, in many sceneries the knowledge is not represented in a crisp way.
It is common to find fuzzy concepts or problems with some level of uncertainty.
There are not many practical systems which handle fuzziness and uncertainty and
the few examples that we can find are used by a minority. To extend a popular
system (which many programmers are using) with the ability of combining crisp
and fuzzy knowledge representations seems to be an interesting issue.
Our first work (Fuzzy Prolog) was a language that models
$\mathcal{B}([0,1])$-valued Fuzzy Logic. In the Borel algebra,
$\mathcal{B}([0,1])$, truth value is represented using unions of intervals of
real numbers. This work was more general in truth value representation and
propagation than previous works.
An interpreter for this language using Constraint Logic Programming over Real
numbers (CLP(${\cal R}$)) was implemented and is available in the Ciao system.
Now, we enhance our former approach by using default knowledge to represent
incomplete information in Logic Programming. We also provide the implementation
of this new framework. This new release of Fuzzy Prolog handles incomplete
information, it has a complete semantics (the previous one was incomplete as
Prolog) and moreover it is able to combine crisp and fuzzy logic in Prolog
programs. Therefore, new Fuzzy Prolog is more expressive to represent real
world.
Fuzzy Prolog inherited from Prolog its incompleteness. The incorporation of
default reasoning to Fuzzy Prolog removes this problem and requires a richer
semantics which we discuss.
| [
{
"version": "v1",
"created": "Mon, 22 Aug 2005 07:41:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Munoz-Hernandez",
"Susana",
""
],
[
"Vaucheret",
"Claudio",
""
]
]
|
cs/0508092 | Stergos Afantenos | Stergos D. Afantenos, Vangelis Karkaletsis and Panagiotis
Stamatopoulos | Summarizing Reports on Evolving Events; Part I: Linear Evolution | 7 pages. Published on the Conference Recent Advances in Natural
Language Processing (RANLP, 2005) | Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas
Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing
(RANLP 2005). Borovets, Bulgaria: INCOMA, 18-24. | null | null | cs.CL cs.IR | null | We present an approach for summarization from multiple documents which report
on events that evolve through time, taking into account the different document
sources. We distinguish the evolution of an event into linear and non-linear.
According to our approach, each document is represented by a collection of
messages which are then used in order to instantiate the cross-document
relations that determine the summary content. The paper presents the
summarization system that implements this approach through a case study on
linear evolution.
| [
{
"version": "v1",
"created": "Mon, 22 Aug 2005 12:56:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Stamatopoulos",
"Panagiotis",
""
]
]
|
cs/0508100 | Alessandro Provetti | Alessandro Provetti | A primer on Answer Set Programming | 6 pages | null | null | null | cs.AI cs.LO | null | A introduction to the syntax and Semantics of Answer Set Programming intended
as an handout to [under]graduate students taking Artificial Intlligence or
Logic Programming classes.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2005 15:05:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Provetti",
"Alessandro",
""
]
]
|
cs/0508102 | Emily Stone | Emily Stone, Suhail Ahmed, Abe Askari and Hong Tat | Investigations of Process Damping Forces in Metal Cutting | 27 pages, 27 figures, submitted to Journal of Computational Methods
in Science and Engineering, Feb. 2005 | null | null | null | cs.CE | null | Using finite element software developed for metal cutting by Third Wave
Systems we investigate the forces involved in chatter, a self-sustained
oscillation of the cutting tool. The phenomena is decomposed into a vibrating
tool cutting a flat surface work piece, and motionless tool cutting a work
piece with a wavy surface. While cutting the wavy surface, the shearplane was
seen to oscillate in advance of the oscillation of the depth of cut, as were
the cutting, thrust, and shear plane forces. The vibrating tool was used to
investigate process damping through the interaction of the relief face of the
tool and the workpiece. Crushing forces are isolated and compared to the
contact length between the tool and workpiece. We found that the wavelength
dependence of the forces depended on the relative size of the wavelength to the
length of the relief face of the tool. The results indicate that the damping
force from crushing will be proportional to the cutting speed for short tools,
and inversely proportional for long tools.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2005 19:52:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stone",
"Emily",
""
],
[
"Ahmed",
"Suhail",
""
],
[
"Askari",
"Abe",
""
],
[
"Tat",
"Hong",
""
]
]
|
cs/0508103 | Peter Turney | Peter D. Turney (National Research Council of Canada), Michael L.
Littman (Rutgers University) | Corpus-based Learning of Analogies and Semantic Relations | related work available at http://purl.org/peter.turney/ and
http://www.cs.rutgers.edu/~mlittman/ | Machine Learning, (2005), 60(1-3), 251-278 | null | NRC-48273 | cs.LG cs.CL cs.IR | null | We present an algorithm for learning from unlabeled text, based on the Vector
Space Model (VSM) of information retrieval, that can solve verbal analogy
questions of the kind found in the SAT college entrance exam. A verbal analogy
has the form A:B::C:D, meaning "A is to B as C is to D"; for example,
mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B,
and the problem is to select the most analogous word pair, C:D, from a set of
five choices. The VSM algorithm correctly answers 47% of a collection of 374
college-level analogy questions (random guessing would yield 20% correct; the
average college-bound senior high school student answers about 57% correctly).
We motivate this research by applying it to a difficult problem in natural
language processing, determining semantic relations in noun-modifier pairs. The
problem is to classify a noun-modifier pair, such as "laser printer", according
to the semantic relation between the noun (printer) and the modifier (laser).
We use a supervised nearest-neighbour algorithm that assigns a class to a given
noun-modifier pair by finding the most analogous noun-modifier pair in the
training data. With 30 classes of semantic relations, on a collection of 600
labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5%
(random guessing: 3.3%). With 5 classes of semantic relations, the F value is
43.2% (random: 20%). The performance is state-of-the-art for both verbal
analogies and noun-modifier relations.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2005 20:21:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
],
[
"Littman",
"Michael L.",
"",
"Rutgers University"
]
]
|
cs/0508105 | Ludovic Langevine | Ludovic Langevine and Mireille Ducasse | A Tracer Driver for Versatile Dynamic Analyses of Constraint Logic
Programs | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments, October
2005, Spain. Whole proceedings: cs.PL/0508078. 15 pages | null | null | null | cs.SE | null | Programs with constraints are hard to debug. In this paper, we describe a
general architecture to help develop new debugging tools for constraint
programming. The possible tools are fed by a single general-purpose tracer. A
tracer-driver is used to adapt the actual content of the trace, according to
the needs of the tool. This enables the tools and the tracer to communicate in
a client-server scheme. Each tool describes its needs of execution data thanks
to event patterns. The tracer driver scrutinizes the execution according to
these event patterns and sends only the data that are relevant to the connected
tools. Experimental measures show that this approach leads to good performance
in the context of constraint logic programming, where a large variety of tools
exists and the trace is potentially huge.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 11:30:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Langevine",
"Ludovic",
""
],
[
"Ducasse",
"Mireille",
""
]
]
|
cs/0508106 | Fred Mesnard | Etienne Payet and Fred Mesnard | An Improved Non-Termination Criterion for Binary Constraint Logic
Programs | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078 | null | null | null | cs.PL | null | On one hand, termination analysis of logic programs is now a fairly
established research topic within the logic programming community. On the other
hand, non-termination analysis seems to remain a much less attractive subject.
If we divide this line of research into two kinds of approaches: dynamic versus
static analysis, this paper belongs to the latter. It proposes a criterion for
detecting non-terminating atomic queries with respect to binary CLP clauses,
which strictly generalizes our previous works on this subject. We give a
generic operational definition and a logical form of this criterion. Then we
show that the logical form is correct and complete with respect to the
operational definition.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 12:18:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Payet",
"Etienne",
""
],
[
"Mesnard",
"Fred",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.