id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0506078
David Renato Carreta Dominguez
David Dominguez, Kostadin Koroutchev, Eduardo Serrano & Francisco B. Rodriguez
Dynamical Neural Network: Information and Topology
10pg, 5fig
null
null
null
cs.IR cs.NE
null
A neural network works as an associative memory device if it has large storage capacity and the quality of the retrieval is good enough. The learning and attractor abilities of the network both can be measured by the mutual information (MI), between patterns and retrieval states. This paper deals with a search for an optimal topology, of a Hebb network, in the sense of the maximal MI. We use small-world topology. The connectivity $\gamma$ ranges from an extremely diluted to the fully connected network; the randomness $\omega$ ranges from purely local to completely random neighbors. It is found that, while stability implies an optimal $MI(\gamma,\omega)$ at $\gamma_{opt}(\omega)\to 0$, for the dynamics, the optimal topology holds at certain $\gamma_{opt}>0$ whenever $0\leq\omega<0.3$.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 14:54:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Dominguez", "David", "" ], [ "Koroutchev", "Kostadin", "" ], [ "Serrano", "Eduardo", "" ], [ "Rodriguez", "Francisco B.", "" ] ]
cs/0506079
Ugo Dal Lago
U. Dal Lago and M. Hofmann
Quantitative Models and Implicit Complexity
29 pages
null
null
null
cs.LO cs.CC
null
We give new proofs of soundness (all representable functions on base types lies in certain complexity classes) for Elementary Affine Logic, LFPL (a language for polytime computation close to realistic functional programming introduced by one of us), Light Affine Logic and Soft Affine Logic. The proofs are based on a common semantical framework which is merely instantiated in four different ways. The framework consists of an innovative modification of realizability which allows us to use resource-bounded computations as realisers as opposed to including all Turing computable functions as is usually the case in realizability constructions. For example, all realisers in the model for LFPL are polynomially bounded computations whence soundness holds by construction of the model. The work then lies in being able to interpret all the required constructs in the model. While being the first entirely semantical proof of polytime soundness for light logi cs, our proof also provides a notable simplification of the original already semantical proof of polytime soundness for LFPL. A new result made possible by the semantic framework is the addition of polymorphism and a modality to LFPL thus allowing for an internal definition of inductive datatypes.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 16:00:10 GMT" }, { "version": "v2", "created": "Fri, 24 Jun 2005 13:20:25 GMT" }, { "version": "v3", "created": "Tue, 25 Oct 2005 15:21:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "U. Dal", "" ], [ "Hofmann", "M.", "" ] ]
cs/0506081
Gatis Midrijanis
Gatis Midrijanis
Three lines proof of the lower bound for the matrix rigidity
4 pages
null
null
null
cs.CC
null
The rigidity of a matrix describes the minimal number of entries one has to change to reduce matrix's rank to r. We give very simple combinatorial proof of the lower bound for the rigidity of Sylvester (special case of Hadamard) matrix that matches the best known result by de Wolf(2005) for Hadamard matrices proved by quantum information theoretical arguments.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 19:54:48 GMT" }, { "version": "v2", "created": "Mon, 20 Jun 2005 20:12:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Midrijanis", "Gatis", "" ] ]
cs/0506082
Lane A. Hemaspaandra
Piotr Faliszewski and Lane A. Hemaspaandra
Open Questions in the Theory of Semifeasible Computation
null
null
null
URCS-TR-2005-872
cs.CC
null
The study of semifeasible algorithms was initiated by Selman's work a quarter of century ago [Sel79,Sel81,Sel82]. Informally put, this research stream studies the power of those sets L for which there is a deterministic (or in some cases, the function may belong to one of various nondeterministic function classes) polynomial-time function f such that when at least one of x and y belongs to L, then f(x,y) \in L \cap \{x,y\}. The intuition here is that it is saying: ``Regarding membership in L, if you put a gun to my head and forced me to bet on one of x or y as belonging to L, my money would be on f(x,y).'' In this article, we present a number of open problems from the theory of semifeasible algorithms. For each we present its background and review what partial results, if any, are known.
[ { "version": "v1", "created": "Mon, 20 Jun 2005 22:33:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/0506084
Jason Holt
Jason E. Holt (BYU)
The One Page Model Checker
12 pages
null
null
null
cs.LO
null
We show how standard IPC mechanisms can be used with the fork() system call to perform explicit state model checking on all interleavings of a multithreaded application. We specifically show how to check for deadlock and race conditions in programs with two threads. Our techniques are easy to apply to other languages, and require only the most rudimentary parsing of the target language. Our fundamental system fits in one page of C code.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 20:54:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Holt", "Jason E.", "", "BYU" ] ]
cs/0506085
Jason Holt
Jason E. Holt (BYU)
On the Job Training
8 pages, submitted to NIPS 2005
null
null
null
cs.LG
null
We propose a new framework for building and evaluating machine learning algorithms. We argue that many real-world problems require an agent which must quickly learn to respond to demands, yet can continue to perform and respond to new training throughout its useful life. We give a framework for how such agents can be built, describe several metrics for evaluating them, and show that subtle changes in system construction can significantly affect agent performance.
[ { "version": "v1", "created": "Wed, 22 Jun 2005 21:21:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Holt", "Jason E.", "", "BYU" ] ]
cs/0506090
Tobias Riege
Tobias Riege, J\"org Rothe
An Exact 2.9416^n Algorithm for the Three Domatic Number Problem
20 pages, 1 figure
null
null
null
cs.CC
null
The three domatic number problem asks whether a given undirected graph can be partitioned into at least three dominating sets, i.e., sets whose closed neighborhood equals the vertex set of the graph. Since this problem is NP-complete, no polynomial-time algorithm is known for it. The naive deterministic algorithm for this problem runs in time 3^n, up to polynomial factors. In this paper, we design an exact deterministic algorithm for this problem running in time 2.9416^n. Thus, our algorithm can handle problem instances of larger size than the naive algorithm in the same amount of time. We also present another deterministic and a randomized algorithm for this problem that both have an even better performance for graphs with small maximum degree.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 12:58:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Riege", "Tobias", "" ], [ "Rothe", "Jörg", "" ] ]
cs/0506092
Simone Alfarano
Thomas Lux
Emergent Statistical Wealth Distributions in Simple Monetary Exchange Models: A Critical Review
null
null
null
null
cs.MA
null
This paper reviews recent attempts at modelling inequality of wealth as an emergent phenomenon of interacting-agent processes. We point out that recent models of wealth condensation which draw their inspiration from molecular dynamics have, in fact, reinvented a process introduced quite some time ago by Angle (1986) in the sociological literature. We emphasize some problematic aspects of simple wealth exchange models and contrast them with a monetary model based on economic principles of market mediated exchange. The paper also reports new results on the influence of market power on the wealth distribution in statistical equilibrium. As it turns out, inequality increases but market power alone is not sufficient for changing the exponential tails of simple exchange models into Pareto tails.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 16:46:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Lux", "Thomas", "" ] ]
cs/0506095
Yi-Dong Shen
Y. D. Shen, Q. Yang, J. H. You and L. Y. Yuan
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops
29 pages
null
null
null
cs.AI cs.LG cs.LO
null
Recursive loops in a logic program present a challenging problem to the PLP framework. On the one hand, they loop forever so that the PLP backward-chaining inferences would never stop. On the other hand, they generate cyclic influences, which are disallowed in Bayesian networks. Therefore, in existing PLP approaches logic programs with recursive loops are considered to be problematic and thus are excluded. In this paper, we propose an approach that makes use of recursive loops to build a stationary dynamic Bayesian network. Our work stems from an observation that recursive loops in a logic program imply a time sequence and thus can be used to model a stationary dynamic Bayesian network without using explicit time parameters. We introduce a Bayesian knowledge base with logic clauses of the form $A \leftarrow A_1,...,A_l, true, Context, Types$, which naturally represents the knowledge that the $A_i$s have direct influences on $A$ in the context $Context$ under the type constraints $Types$. We then use the well-founded model of a logic program to define the direct influence relation and apply SLG-resolution to compute the space of random variables together with their parental connections. We introduce a novel notion of influence clauses, based on which a declarative semantics for a Bayesian knowledge base is established and algorithms for building a two-slice dynamic Bayesian network from a logic program are developed.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 04:07:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Y. D.", "" ], [ "Yang", "Q.", "" ], [ "You", "J. H.", "" ], [ "Yuan", "L. Y.", "" ] ]
cs/0506097
Samuel Thibault
Samuel Thibault (INRIA Futurs)
A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines
null
null
null
null
cs.DC
null
With the current trend of multiprocessor machines towards more and more hierarchical architectures, exploiting the full computational power requires careful distribution of execution threads and data so as to limit expensive remote memory accesses. Existing multi-threaded libraries provide only limited facilities to let applications express distribution indications, so that programmers end up with explicitly distributing tasks according to the underlying architecture, which is difficult and not portable. In this article, we present: (1) a model for dynamically expressing the structure of the computation; (2) a scheduler interpreting this model so as to make judicious hierarchical distribution decisions; (3) an implementation within the Marcel user-level thread library. We experimented our proposal on a scientific application running on a ccNUMA Bull NovaScale with 16 Intel Itanium II processors; results show a 30% gain compared to a classical scheduler, and are similar to what a handmade scheduler achieves in a non-portable way.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 14:32:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ] ]
cs/0506098
Russell Martin
Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul Goldberg, Zengjian Hu, Russell Martin
Distributed Selfish Load Balancing
null
null
null
null
cs.GT math.OC
null
Suppose that a set of $m$ tasks are to be shared as equally as possible amongst a set of $n$ resources. A game-theoretic mechanism to find a suitable allocation is to associate each task with a ``selfish agent'', and require each agent to select a resource, with the cost of a resource being the number of agents to select it. Agents would then be expected to migrate from overloaded to underloaded resources, until the allocation becomes balanced. Recent work has studied the question of how this can take place within a distributed setting in which agents migrate selfishly without any centralized control. In this paper we discuss a natural protocol for the agents which combines the following desirable features: It can be implemented in a strongly distributed setting, uses no central control, and has good convergence properties. For $m\gg n$, the system becomes approximately balanced (an $\epsilon$-Nash equilibrium) in expected time $O(\log\log m)$. We show using a martingale technique that the process converges to a perfectly balanced allocation in expected time $O(\log\log m+n^4)$. We also give a lower bound of $\Omega(\max\{\log\log m,n\})$ for the convergence time.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 14:54:23 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 18:04:06 GMT" }, { "version": "v3", "created": "Mon, 2 Apr 2007 15:20:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Friedetzky", "Tom", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Goldberg", "Paul", "" ], [ "Hu", "Zengjian", "" ], [ "Martin", "Russell", "" ] ]
cs/0506099
Yuval Shavitt
Yuval Shavitt and Eran Shir
DIMES: Let the Internet Measure Itself
10 pages, 12 figures
null
null
null
cs.NI
null
Today's Internet maps, which are all collected from a small number of vantage points, are falling short of being accurate. We suggest here a paradigm shift for this task. DIMES is a distributed measurement infrastructure for the Internet that is based on the deployment of thousands of light weight measurement agents around the globe. We describe the rationale behind DIMES deployment, discuss its design trade-offs and algorithmic challenges, and analyze the structure of the Internet as it seen with DIMES.
[ { "version": "v1", "created": "Tue, 28 Jun 2005 20:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Shavitt", "Yuval", "" ], [ "Shir", "Eran", "" ] ]
cs/0506100
Satu Elisa Schaeffer
Jiri Sima and Satu Elisa Schaeffer
On the NP-Completeness of Some Graph Cluster Measures
9 pages, no figures
null
null
null
cs.CC
null
Graph clustering is the problem of identifying sparsely connected dense subgraphs (clusters) in a given graph. Proposed clustering algorithms usually optimize various fitness functions that measure the quality of a cluster within the graph. Examples of such cluster measures include the conductance, the local and relative densities, and single cluster editing. We prove that the decision problems associated with the optimization tasks of finding the clusters that are optimal with respect to these fitness measures are NP-complete.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 18:12:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Sima", "Jiri", "" ], [ "Schaeffer", "Satu Elisa", "" ] ]
cs/0506101
Patrick Haffner
Patrick Haffner, Steven Phillips, Rob Schapire
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy
13 pages, describes new conditional maxent algorithm, to be submitted
null
null
null
cs.LG cs.CL
null
This paper discusses the application of L1-regularized maximum entropy modeling or SL1-Max [9] to multiclass categorization problems. A new modification to the SL1-Max fast sequential learning algorithm is proposed to handle conditional distributions. Furthermore, unlike most previous studies, the present research goes beyond a single type of conditional distribution. It describes and compares a variety of modeling assumptions about the class distribution (independent or exclusive) and various types of joint or conditional distributions. It results in a new methodology for combining binary regularized classifiers to achieve multiclass categorization. In this context, Maximum Entropy can be considered as a generic and efficient regularized classification tool that matches or outperforms the state-of-the art represented by AdaBoost and SVMs.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 20:26:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Haffner", "Patrick", "" ], [ "Phillips", "Steven", "" ], [ "Schapire", "Rob", "" ] ]
cs/0506103
Aneta Zwierko
Aneta Zwierko, Zbigniew Kotulski
Security of mobile agents: a new concept of the integrity protection
11 pages, 2 figures
null
null
null
cs.CR
null
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The proposed mechanisms not only secure the compiled program, but also the data, that can be gathered during its "journey". The oldest and the simplest methods are more concentrated on integrity of the code itself and on the detection of unauthorized manipulation. Other, more advanced proposals protect not only the code but also the execution state and the collected data. The paper is divided into two parts. The first one is mostly devoted to different methods of securing the code and protecting its integrity; starting from watermarking and fingerprinting, up to methods designed specially for mobile agent systems: encrypted function, cryptographic traces, time limited black-box security, chained-MAC protocol, publicly-verifiable chained digital signatures The second part presents new concept for providing mobile agents with integrity protection, based on a zero-knowledge proof system.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 22:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zwierko", "Aneta", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0506104
Miroslaw Truszczynski
Z. Lonc, M. Truszczynski
Computing minimal models, stable models and answer sets
55 pages, 1 figure. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.DS
null
We propose and study algorithms to compute minimal models, stable models and answer sets of t-CNF theories, and normal and disjunctive t-programs. We are especially interested in algorithms with non-trivial worst-case performance bounds. The bulk of the paper is concerned with the classes of 2- and 3-CNF theories, and normal and disjunctive 2- and 3-programs, for which we obtain significantly stronger results than those implied by our general considerations. We show that one can find all minimal models of 2-CNF theories and all answer sets of disjunctive 2-programs in time O(m 1.4422..^n). Our main results concern computing stable models of normal 3-programs, minimal models of 3-CNF theories and answer sets of disjunctive 3-programs. We design algorithms that run in time O(m 1.6701..^n), in the case of the first problem, and in time O(mn^2 2.2782..^n), in the case of the latter two. All these bounds improve by exponential factors the best algorithms known previously. We also obtain closely related upper bounds on the number of minimal models, stable models and answer sets a t-CNF theory, a normal t-program or a disjunctive t-program may have. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Thu, 30 Jun 2005 01:51:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Lonc", "Z.", "" ], [ "Truszczynski", "M.", "" ] ]
cs/0506105
Ren-Chiun Wang
Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo
A protected password change protocol
null
null
null
null
cs.CR
null
Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password change protocol. At the same time, authors shall propose a new password change protocol to withstand all the threats of security.
[ { "version": "v1", "created": "Thu, 30 Jun 2005 03:20:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Ren-Chiun", "" ], [ "Yang", "Chou-Chen", "" ], [ "Mo", "Kun-Ru", "" ] ]
cs/0507010
Jiayang Wang
Jiayang Wang
A Study for the Feature Core of Dynamic Reduct
9 pages
null
null
null
cs.AI
null
To the reduct problems of decision system, the paper proposes the notion of dynamic core according to the dynamic reduct model. It describes various formal definitions of dynamic core, and discusses some properties about dynamic core. All of these show that dynamic core possesses the essential characters of the feature core.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 13:02:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Jiayang", "" ] ]
cs/0507012
Adilson Xavier V.
Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo S. Rodrigues
Lattice Gas Cellular Automata for Computational Fluid Animation
null
null
null
null
cs.GR
null
The past two decades showed a rapid growing of physically-based modeling of fluids for computer graphics applications. In this area, a common top down approach is to model the fluid dynamics by Navier-Stokes equations and apply a numerical techniques such as Finite Differences or Finite Elements for the simulation. In this paper we focus on fluid modeling through Lattice Gas Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete models based on point particles that move on a lattice, according to suitable and simple rules in order to mimic a fully molecular dynamics. By Chapman-Enskog expansion, a known multiscale technique in this area, it can be demonstrated that the Navier-Stokes model can be reproduced by the LGCA technique. Thus, with LGCA we get a fluid model that does not require solution of complicated equations. Therefore, we combine the advantage of the low computational cost of LGCA and its ability to mimic the realistic fluid dynamics to develop a new animating framework for computer graphics applications. In this work, we discuss the theoretical elements of our proposal and show experimental results.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:48:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Apolinario", "Antonio L.", "Jr" ], [ "Rodrigues", "Paulo S.", "" ] ]
cs/0507013
Mirela Damian
Justin Colannino, Mirela Damian, Ferran Hurtado, John Iacono, Henk Meijer, Suneeta Ramaswami and Godfried Toussaint
An O(n log n)-Time Algorithm for the Restricted Scaffold Assignment
13 pages, 8 figures
null
null
null
cs.CG cs.DM
null
The assignment problem takes as input two finite point sets S and T and establishes a correspondence between points in S and points in T, such that each point in S maps to exactly one point in T, and each point in T maps to at least one point in S. In this paper we show that this problem has an O(n log n)-time solution, provided that the points in S and T are restricted to lie on a line (linear time, if S and T are presorted).
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:50:11 GMT" }, { "version": "v2", "created": "Tue, 5 Jul 2005 21:26:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Colannino", "Justin", "" ], [ "Damian", "Mirela", "" ], [ "Hurtado", "Ferran", "" ], [ "Iacono", "John", "" ], [ "Meijer", "Henk", "" ], [ "Ramaswami", "Suneeta", "" ], [ "Toussaint", "Godfried", "" ] ]
cs/0507014
Moshe Schwartz
Moshe Schwartz
Isomorphism of graphs-a polynomial test
null
null
null
null
cs.DS
null
An explicit algorithm is presented for testing whether two non-directed graphs are isomorphic or not. It is shown that for a graph of n vertices, the number of n independent operations needed for the test is polynomial in n. A proof that the algorithm actually performs the test is presented.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 11:35:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Schwartz", "Moshe", "" ] ]
cs/0507017
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost and List Homomorphisms to Semicomplete Digraphs
8 pages
null
null
null
cs.DM
null
The following optimization problem was introduced in \cite{gutinDAM}, where it was motivated by a real-world problem in defence logistics. Suppose we are given a pair of digraphs $D,H$ and a positive cost $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For a fixed digraph $H$, the minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For an input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify whether there is a homomorphism of $D$ to $H$ and, if it exists, find such a homomorphism of minimum cost. We obtain dichotomy classifications of the computational complexity of the list homomorphism problem and MinHOMP($H$), when $H$ is a semicomplete digraph (a digraph in which every two vertices have at least one arc between them). Our dichotomy for the list homomorphism problem coincides with the one obtained by Bang-Jensen, Hell and MacGillivray in 1988 for the homomorphism problem when $H$ is a semicomplete digraph: both problems are polynomial solvable if $H$ has at most one cycle; otherwise, both problems are NP-complete. The dichotomy for \MiP is different: the problem is polynomial time solvable if $H$ is acyclic or $H$ is a cycle of length 2 or 3; otherwise, the problem is NP-hard.
[ { "version": "v1", "created": "Wed, 6 Jul 2005 18:45:50 GMT" }, { "version": "v2", "created": "Wed, 24 Aug 2005 13:31:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0507020
Arnaud Durand
Arnaud Durand, Etienne Grandjean
First-order queries on structures of bounded degree are computable with constant delay
18 pages, 1 figure
null
null
null
cs.LO cs.CC
null
A bounded degree structure is either a relational structure all of whose relations are of bounded degree or a functional structure involving bijective functions only. In this paper, we revisit the complexity of the evaluation problem of not necessarily Boolean first-order queries over structures of bounded degree. Query evaluation is considered here as a dynamical process. We prove that any query on bounded degree structures is $\constantdelaylin$, i.e., can be computed by an algorithm that has two separate parts: it has a precomputation step of linear time in the size of the structure and then, it outputs all tuples one by one with a constant (i.e. depending on the size of the formula only) delay between each. Seen as a global process, this implies that queries on bounded structures can be evaluated in total time $O(f(|\phi|).(|\calS|+|\phi(\calS)|))$ and space $O(f(|\phi|).|\calS|)$ where $\calS$ is the structure, $\phi$ is the formula, $\phi(\calS)$ is the result of the query and $f$ is some function. Among other things, our results generalize a result of \cite{Seese-96} on the data complexity of the model-checking problem for bounded degree structures. Besides, the originality of our approach compared to that \cite{Seese-96} and comparable results is that it does not rely on the Hanf's model-theoretic technic (see \cite{Hanf-65}) and is completely effective.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 09:40:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Arnaud", "" ], [ "Grandjean", "Etienne", "" ] ]
cs/0507021
Valmir Barbosa
Renato C. Dutra, Valmir C. Barbosa
Finding routes in anonymous sensor networks
null
Information Processing Letters 98 (2006), 139-144
10.1016/j.ipl.2006.01.001
null
cs.NI
null
We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink. In order to circumvent the restrictions imposed by anonymity, we rely on using the power level perceived by the sensors in the query from the sink. We introduce a simple distributed algorithm to achieve the building of routes to the sink and evaluate its performance by means of simulations.
[ { "version": "v1", "created": "Thu, 7 Jul 2005 16:28:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutra", "Renato C.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
cs/0507023
Valmir Barbosa
Luis O. Rigo Jr., Valmir C. Barbosa
Two-dimensional cellular automata and the analysis of correlated time series
null
Pattern Recognition Letters 27 (2006), 1353-1360
10.1016/j.patrec.2006.01.005
null
cs.AI
null
Correlated time series are time series that, by virtue of the underlying process to which they refer, are expected to influence each other strongly. We introduce a novel approach to handle such time series, one that models their interaction as a two-dimensional cellular automaton and therefore allows them to be treated as a single entity. We apply our approach to the problems of filling gaps and predicting values in rainfall time series. Computational results show that the new approach compares favorably to Kalman smoothing and filtering.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 12:47:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Luis O.", "Jr." ], [ "Barbosa", "Valmir C.", "" ] ]
cs/0507024
Anne-Marie Vercoustre
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis)
Experiments in Clustering Homogeneous XML Documents to Validate an Existing Typology
(postprint); This version corrects a couple of errors in authors' names in the bibliography
null
null
null
cs.IR
null
This paper presents some experiments in clustering homogeneous XMLdocuments to validate an existing classification or more generally anorganisational structure. Our approach integrates techniques for extracting knowledge from documents with unsupervised classification (clustering) of documents. We focus on the feature selection used for representing documents and its impact on the emerging classification. We mix the selection of structured features with fine textual selection based on syntactic characteristics.We illustrate and evaluate this approach with a collection of Inria activity reports for the year 2003. The objective is to cluster projects into larger groups (Themes), based on the keywords or different chapters of these activity reports. We then compare the results of clustering using different feature selections, with the official theme structure used by Inria.
[ { "version": "v1", "created": "Fri, 8 Jul 2005 13:42:42 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 13:52:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Trousse", "Brigitte", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Vercoustre", "Anne-Marie", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0507027
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
Anyone but Him: The Complexity of Precluding an Alternative
Preliminary version appeared in AAAI '05. Also appears as URCS-TR-2005-873
null
null
null
cs.GT cs.CC cs.MA
null
Preference aggregation in a multiagent setting is a central issue in both human and computer contexts. In this paper, we study in terms of complexity the vulnerability of preference aggregation to destructive control. That is, we study the ability of an election's chair to, through such mechanisms as voter/candidate addition/suppression/partition, ensure that a particular candidate (equivalently, alternative) does not win. And we study the extent to which election systems can make it impossible, or computationally costly (NP-complete), for the chair to execute such control. Among the systems we study--plurality, Condorcet, and approval voting--we find cases where systems immune or computationally resistant to a chair choosing the winner nonetheless are vulnerable to the chair blocking a victory. Beyond that, we see that among our studied systems no one system offers the best protection against destructive control. Rather, the choice of a preference aggregation system will depend closely on which types of control one wishes to be protected against. We also find concrete cases where the complexity of or susceptibility to control varies dramatically based on the choice among natural tie-handling rules.
[ { "version": "v1", "created": "Sat, 9 Jul 2005 18:20:00 GMT" }, { "version": "v2", "created": "Sun, 17 Jul 2005 23:01:02 GMT" }, { "version": "v3", "created": "Thu, 28 Jul 2005 15:20:07 GMT" }, { "version": "v4", "created": "Thu, 16 Mar 2006 16:51:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/0507028
Robert Milson
Robert Milson, Aaron Krowne
Adapting CBPP platforms for instructional use
Will be presented at the 2005, Emory university symposium on Free Culture and the Digital Library
null
null
null
cs.DL cs.HC
null
Commons based peer-production (CBPP) is the de-centralized, net-based approach to the creation and dissemination of information resources. Underlying every CBPP system is a virtual community brought together by an internet tool (such as a web site) and structured by a specific collaboration protocol. In this talk we will argue that the value of such platforms can be leveraged by adapting them for pedagogical purposes. We report on one such recent adaptation. The Noosphere system is a web-based collaboration environment that underlies the popular Planetmath website, a collaboratively written encyclopedia of mathematics licensed under the GNU Free Documentation License (FDL). Recently, the system was used to host a graduate-level mathematics course at Dalhousie University, in Halifax, Canada. The course consisted of regular lectures and assignment problems. The students in the course collaborated on a set of course notes, encapsulating the lecture content and giving solutions of assigned problems. The successful outcome of this experiment demonstrated that a dedicated Noosphere system is well suited for classroom applications. We argue that this ``proof of concept'' experience also strongly suggests that every successful CBPP platform possesses latent pedagogical value.
[ { "version": "v1", "created": "Sun, 10 Jul 2005 19:05:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Milson", "Robert", "" ], [ "Krowne", "Aaron", "" ] ]
cs/0507030
G\"unter Rote
Imre Barany and Guenter Rote
Strictly convex drawings of planar graphs
20 pages, 13 figures. to be published in Documenta Mathematica. The revision includes numerous small additions, corrections, and improvements, in particular: - a discussion of the constants in the O-notation, after the statement of thm.1. - a different set-up and clarification of the case distinction for Lemma 1
DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391
null
null
cs.CG cs.DM
null
Every three-connected planar graph with n vertices has a drawing on an O(n^2) x O(n^2) grid in which all faces are strictly convex polygons. These drawings are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids. More generally, a strictly convex drawing exists on a grid of size O(W) x O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds are obtained when the faces have fewer sides. In the proof, we derive an explicit lower bound on the number of primitive vectors in a triangle.
[ { "version": "v1", "created": "Mon, 11 Jul 2005 20:06:06 GMT" }, { "version": "v2", "created": "Wed, 21 Jun 2006 10:01:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Barany", "Imre", "" ], [ "Rote", "Guenter", "" ] ]
cs/0507033
Marco Cuturi
Marco Cuturi, Kenji Fukumizu
Multiresolution Kernels
8 pages
null
null
null
cs.LG
null
We present in this work a new methodology to design kernels on data which is structured with smaller components, such as text, images or sequences. This methodology is a template procedure which can be applied on most kernels on measures and takes advantage of a more detailed "bag of components" representation of the objects. To obtain such a detailed description, we consider possible decompositions of the original bag into a collection of nested bags, following a prior knowledge on the objects' structure. We then consider these smaller bags to compare two objects both in a detailed perspective, stressing local matches between the smaller bags, and in a global or coarse perspective, by considering the entire bag. This multiresolution approach is likely to be best suited for tasks where the coarse approach is not precise enough, and where a more subtle mixture of both local and global similarities is necessary to compare objects. The approach presented here would not be computationally tractable without a factorization trick that we introduce before presenting promising results on an image retrieval task.
[ { "version": "v1", "created": "Wed, 13 Jul 2005 05:45:28 GMT" }, { "version": "v2", "created": "Mon, 14 Nov 2005 08:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Cuturi", "Marco", "" ], [ "Fukumizu", "Kenji", "" ] ]
cs/0507034
Ittai Abraham
Ittai Abraham and Dahlia Malkhi and Gurmeet Singh Manku
Papillon: Greedy Routing in Rings
null
null
null
null
cs.DC cs.NI
null
We study {\sc greedy} routing over $n$ nodes placed in a ring, with the \emph{distance} between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such graphs arise in the context of modeling social networks and in routing networks for peer-to-peer systems. We construct the first network over $n$ nodes in which {\sc greedy} routing takes $O(\log n / \log d)$ hops in the worst-case, with $d$ out-going links per node. Our result has the first asymptotically optimal greedy routing complexity. Previous constructions required $O(\frac{\log^2 n}{d})$ hops.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 00:34:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ittai", "" ], [ "Malkhi", "Dahlia", "" ], [ "Manku", "Gurmeet Singh", "" ] ]
cs/0507035
Yi-Dong Shen
Yi-Dong Shen, Jia-Huai You and Li-Yan Yuan
Enhancing Global SLS-Resolution with Loop Cutting and Tabling Mechanisms
null
Theoretical Computer Science 328(3):271-287, 2004
null
null
cs.LO cs.AI
null
Global SLS-resolution is a well-known procedural semantics for top-down computation of queries under the well-founded model. It inherits from SLDNF-resolution the {\em linearity} property of derivations, which makes it easy and efficient to implement using a simple stack-based memory structure. However, like SLDNF-resolution it suffers from the problem of infinite loops and redundant computations. To resolve this problem, in this paper we develop a new procedural semantics, called {\em SLTNF-resolution}, by enhancing Global SLS-resolution with loop cutting and tabling mechanisms. SLTNF-resolution is sound and complete w.r.t. the well-founded semantics for logic programs with the bounded-term-size property, and is superior to existing linear tabling procedural semantics such as SLT-resolution.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:24:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "You", "Jia-Huai", "" ], [ "Yuan", "Li-Yan", "" ] ]
cs/0507036
Martin Sulzmann
Peter J Stuckey, Martin Sulzmann, Jeremy Wazny
Improved Inference for Checking Annotations
null
null
null
null
cs.PL cs.LO
null
We consider type inference in the Hindley/Milner system extended with type annotations and constraints with a particular focus on Haskell-style type classes. We observe that standard inference algorithms are incomplete in the presence of nested type annotations. To improve the situation we introduce a novel inference scheme for checking type annotations. Our inference scheme is also incomplete in general but improves over existing implementations as found e.g. in the Glasgow Haskell Compiler (GHC). For certain cases (e.g. Haskell 98) our inference scheme is complete. Our approach has been fully implemented as part of the Chameleon system (experimental version of Haskell).
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:47:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J", "" ], [ "Sulzmann", "Martin", "" ], [ "Wazny", "Jeremy", "" ] ]
cs/0507037
Martin Sulzmann
Peter J. Stuckey, Martin Sulzmann
Type Inference for Guarded Recursive Data Types
null
null
null
null
cs.PL cs.LO
null
We consider type inference for guarded recursive data types (GRDTs) -- a recent generalization of algebraic data types. We reduce type inference for GRDTs to unification under a mixed prefix. Thus, we obtain efficient type inference. Inference is incomplete because the set of type constraints allowed to appear in the type system is only a subset of those type constraints generated by type inference. Hence, inference only succeeds if the program is sufficiently type annotated. We present refined procedures to infer types incrementally and to assist the user in identifying which pieces of type information are missing. Additionally, we introduce procedures to test if a type is not principal and to find a principal type if one exists.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:58:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J.", "" ], [ "Sulzmann", "Martin", "" ] ]
cs/0507038
Zvi Lotker
Khaled Elbassioni, Zvi Lotker, Raimund Seidel
Upper Bound on the Number of Vertices of Polyhedra with $0,1$-Constraint Matrices
3 pages
null
null
null
cs.CG
null
In this note we show that the maximum number of vertices in any polyhedron $P=\{x\in \mathbb{R}^d : Ax\leq b\}$ with $0,1$-constraint matrix $A$ and a real vector $b$ is at most $d!$.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 18:45:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Elbassioni", "Khaled", "" ], [ "Lotker", "Zvi", "" ], [ "Seidel", "Raimund", "" ] ]
cs/0507042
Richard McClatchey
Florida Estrella, Richard McClatchey, Dmitry Rogulin
The MammoGrid Virtual Organisation - Federating Distributed Mammograms
^ pages, 3 figures, 2 tables
null
null
Medical Informatics Europe MIE2005 paper publication
cs.DC cs.DB
null
The MammoGrid project aims to deliver a prototype which enables the effective collaboration between radiologists using grid, service-orientation and database solutions. The grid technologies and service-based database management solution provide the platform for integrating diverse and distributed resources, creating what is called a virtual organisation. The MammoGrid Virtual Organisation facilitates the sharing and coordinated access to mammography data, medical imaging software and computing resources of participating hospitals. Hospitals manage their local database of mammograms, but in addition, radiologists who are part of this organisation can share mammograms, reports, results and image analysis software. The MammoGrid Virtual Organisation is a federation of autonomous multi-centres sites which transcends national boundaries. This paper outlines the service-based approach in the creation and management of the federated distributed mammography database and discusses the role of virtual organisations in distributed image analysis.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 12:17:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Estrella", "Florida", "" ], [ "McClatchey", "Richard", "" ], [ "Rogulin", "Dmitry", "" ] ]
cs/0507043
Yuan Feng
Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying
Proof rules for purely quantum programs
Now 12 pages, introduction and Section 3 rewritten, some errors corrected
null
null
null
cs.PL quant-ph
null
We apply the notion of quantum predicate proposed by D'Hondt and Panangaden to analyze a purely quantum language fragment which describes the quantum part of a future quantum computer in Knill's architecture. The denotational semantics, weakest precondition semantics, and weakest liberal precondition semantics of this language fragment are introduced. To help reasoning about quantum programs involving quantum loops, we extend proof rules for classical probabilistic programs to our purely quantum programs.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 13:06:13 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2005 16:08:40 GMT" }, { "version": "v3", "created": "Thu, 16 Mar 2006 08:24:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Feng", "Yuan", "" ], [ "Duan", "Runyao", "" ], [ "Ji", "Zhengfeng", "" ], [ "Ying", "Mingsheng", "" ] ]
cs/0507044
Marcus Hutter
Jan Poland and Marcus Hutter
Defensive Universal Learning with Experts
15 LaTeX pages
Proc. 16th International Conf. on Algorithmic Learning Theory (ALT 2005) 356-370
null
IDSIA-15-05
cs.LG
null
This paper shows how universal learning can be achieved with expert advice. To this aim, we specify an experts algorithm with the following characteristics: (a) it uses only feedback from the actions actually chosen (bandit setup), (b) it can be applied with countably infinite expert classes, and (c) it copes with losses that may grow in time appropriately slowly. We prove loss bounds against an adaptive adversary. From this, we obtain a master algorithm for "reactive" experts problems, which means that the master's actions may influence the behavior of the adversary. Our algorithm can significantly outperform standard experts algorithms on such problems. Finally, we combine it with a universal expert class. The resulting universal learner performs -- in a certain sense -- almost as well as any computable strategy, for any online decision problem. We also specify the (worst-case) convergence speed, which is very slow.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 14:33:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0507046
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley
Revisiting Internet AS-level Topology Discovery
null
PAM 2005; LNCS 3431, p. 177, 2005
10.1007/b135479
null
cs.NI
null
The development of veracious models of the Internet topology has received a lot of attention in the last few years. Many proposed models are based on topologies derived from RouteViews BGP table dumps (BTDs). However, BTDs do not capture all AS-links of the Internet topology and most importantly the number of the hidden AS-links is unknown, resulting in AS-graphs of questionable quality. As a first step to address this problem, we introduce a new AS-topology discovery methodology that results in more complete and accurate graphs. Moreover, we use data available from existing measurement facilities, circumventing the burden of additional measurement infrastructure. We deploy our methodology and construct an AS-topology that has at least 61.5% more AS-links than BTD-derived AS-topologies we examined. Finally, we analyze the temporal and topological properties of the augmented graph and pinpoint the differences from BTD-derived AS-topologies.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 07:15:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Riley", "George", "" ] ]
cs/0507047
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, Bradley Huffaker, kc claffy, George Riley
Inferring AS Relationships: Dead End or Lively Beginning?
null
WEA 2005; LNCS 3503, p. 113, 2005
10.1007/11427186_12
null
cs.NI cs.DS
null
Recent techniques for inferring business relationships between ASs have yielded maps that have extremely few invalid BGP paths in the terminology of Gao. However, some relationships inferred by these newer algorithms are incorrect, leading to the deduction of unrealistic AS hierarchies. We investigate this problem and discover what causes it. Having obtained such insight, we generalize the problem of AS relationship inference as a multiobjective optimization problem with node-degree-based corrections to the original objective function of minimizing the number of invalid paths. We solve the generalized version of the problem using the semidefinite programming relaxation of the MAX2SAT problem. Keeping the number of invalid paths small, we obtain a more veracious solution than that yielded by recent heuristics.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 09:32:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Huffaker", "Bradley", "" ], [ "claffy", "kc", "" ], [ "Riley", "George", "" ] ]
cs/0507049
David Eppstein
David Eppstein, Michael T. Goodrich, Jonathan Z. Sun
The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional Data
12 pages, 3 figures. A preliminary version of this paper appeared in the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305
null
null
null
cs.CG
null
We present a new multi-dimensional data structure, which we call the skip quadtree (for point data in R^2) or the skip octree (for point data in R^d, with constant d>2). Our data structure combines the best features of two well-known data structures, in that it has the well-defined "box"-shaped regions of region quadtrees and the logarithmic-height search and update hierarchical structure of skip lists. Indeed, the bottom level of our structure is exactly a region quadtree (or octree for higher dimensional data). We describe efficient algorithms for inserting and deleting points in a skip quadtree, as well as fast methods for performing point location and approximate range queries.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:17:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Sun", "Jonathan Z.", "" ] ]
cs/0507050
David Eppstein
Lars Arge, David Eppstein, Michael T. Goodrich
Skip-Webs: Efficient Distributed Data Structures for Multi-Dimensional Data Sets
8 pages, 4 figures. Appearing at 24th ACM SIGACT-SIGOPS Symp. Principles of Distributed Computing (PODC 2005), Las Vegas
null
null
null
cs.DC cs.CG cs.DS
null
We present a framework for designing efficient distributed data structures for multi-dimensional data. Our structures, which we call skip-webs, extend and improve previous randomized distributed data structures, including skipnets and skip graphs. Our framework applies to a general class of data querying scenarios, which include linear (one-dimensional) data, such as sorted sets, as well as multi-dimensional data, such as d-dimensional octrees and digital tries of character strings defined over a fixed alphabet. We show how to perform a query over such a set of n items spread among n hosts using O(log n / log log n) messages for one-dimensional data, or O(log n) messages for fixed-dimensional data, while using only O(log n) space per host. We also show how to make such structures dynamic so as to allow for insertions and deletions in O(log n) messages for quadtrees, octrees, and digital tries, and O(log n / log log n) messages for one-dimensional data. Finally, we show how to apply a blocking strategy to skip-webs to further improve message complexity for one-dimensional data when hosts can store more data.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:30:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Arge", "Lars", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ] ]
cs/0507053
David Eppstein
David Eppstein
Nonrepetitive Paths and Cycles in Graphs with Application to Sudoku
17 pages, 11 figures
null
null
null
cs.DS cs.AI
null
We provide a simple linear time transformation from a directed or undirected graph with labeled edges to an unlabeled digraph, such that paths in the input graph in which no two consecutive edges have the same label correspond to paths in the transformed graph and vice versa. Using this transformation, we provide efficient algorithms for finding paths and cycles with no two consecutive equal labels. We also consider related problems where the paths and cycles are required to be simple; we find efficient algorithms for the undirected case of these problems but show the directed case to be NP-complete. We apply our path and cycle finding algorithms in a program for generating and solving Sudoku puzzles, and show experimentally that they lead to effective puzzle-solving rules that may also be of interest to human Sudoku puzzle solvers.
[ { "version": "v1", "created": "Wed, 20 Jul 2005 15:58:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/0507054
Andrey Siver S.
A. S. Siver
f2mma: FORTRAN to Mathematica translator
null
null
null
null
cs.OH
null
f2mma program can be used to translate programs written in some subset of the FORTRAN language into {\sl Mathematica} system's programming language. This subset have been enough to translate GAPP (Global Analysis of Particle Properties) programm into {\sl Mathematica} language automatically. Observables table calculated with GAPP({\sl Mathematica}) is presented.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 13:32:15 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 06:48:26 GMT" }, { "version": "v3", "created": "Fri, 5 Aug 2005 09:26:15 GMT" }, { "version": "v4", "created": "Mon, 23 Jan 2006 14:27:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
cs/0507055
Andrey Siver S.
A. S. Siver
ReacProc: A Tool to Process Reactions Describing Particle Interactions
5 pages
null
null
null
cs.CE
null
ReacProc is a program written in C/C++ programming language which can be used (1) to check out of reactions describing particles interactions against conservation laws and (2) to reduce input reaction into some canonical form. A table with particles properties is available within ReacProc package.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 14:17:47 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 07:14:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
cs/0507056
Christopher Lee
Candace L. Sidner, Christopher Lee, Cory Kidd, Neal Lesh, Charles Rich
Explorations in engagement for humans and robots
31 pages, 5 figures, 3 tables
Artificial Intelligence, volume 166, issues 1-2, August 2005, pp. 140-164
null
MERL TR2005-017
cs.AI cs.CL cs.RO
null
This paper explores the concept of engagement, the process by which individuals in an interaction start, maintain and end their perceived connection to one another. The paper reports on one aspect of engagement among human interactors--the effect of tracking faces during an interaction. It also describes the architecture of a robot that can participate in conversational, collaborative interactions with engagement gestures. Finally, the paper reports on findings of experiments with human participants who interacted with a robot when it either performed or did not perform engagement gestures. Results of the human-robot studies indicate that people become engaged with robots: they direct their attention to the robot more often in interactions where engagement gestures are present, and they find interactions more appropriate when engagement gestures are present than when they are not.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 21:56:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidner", "Candace L.", "" ], [ "Lee", "Christopher", "" ], [ "Kidd", "Cory", "" ], [ "Lesh", "Neal", "" ], [ "Rich", "Charles", "" ] ]
cs/0507057
Tereza Tu\v{s}arov\'a
Tereza Tusarova
A new sibling of BQP
extended abstract, submitted to UC'05
null
null
null
cs.CC
null
We present a new quantum complexity class, called MQ^2, which is contained in AWPP. This class has a compact and simple mathematical definition, involving only polynomial-time computable functions and a unitarity condition. It contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP is unknown. This shows that in the complexity class hierarchy, BQP is not an extraordinary isolated island, but has ''siblings'' which as well can solve prime-factorization.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 22:36:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Tusarova", "Tereza", "" ] ]
cs/0507058
Emanuel Diamant
Emanuel Diamant
Paving the Way for Image Understanding: A New Kind of Image Decomposition is Desired
14th Scandinavian Conference on Image Analysis (SCIA 2005)
LNCS vol. 3540, pp. 17-24, Springer Verlag, 2005
null
null
cs.CV
null
In this paper we present an unconventional image segmentation approach which is devised to meet the requirements of image understanding and pattern recognition tasks. Generally image understanding assumes interplay of two sub-processes: image information content discovery and image information content interpretation. Despite of its widespread use, the notion of "image information content" is still ill defined, intuitive, and ambiguous. Most often, it is used in the Shannon's sense, which means information content assessment averaged over the whole signal ensemble. Humans, however,rarely resort to such estimates. They are very effective in decomposing images into their meaningful constituents and focusing attention to the perceptually relevant image parts. We posit that following the latest findings in human attention vision studies and the concepts of Kolmogorov's complexity theory an unorthodox segmentation approach can be proposed that provides effective image decomposition to information preserving image fragments well suited for subsequent image interpretation. We provide some illustrative examples, demonstrating effectiveness of this approach.
[ { "version": "v1", "created": "Fri, 22 Jul 2005 12:18:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0507059
M. Magdalena Ortiz de la Fuente
M. Magdalena Ortiz de la Fuente, Diego Calvanese, Thomas Eiter and Enrico Franconi
Data complexity of answering conjunctive queries over SHIQ knowledge bases
Technical Report, 22 pages
null
null
null
cs.LO cs.AI cs.CC
null
An algorithm for answering conjunctive queries over SHIQ knowledge bases that is coNP in data complexity is given. The algorithm is based on the tableau algorithm for reasoning with individuals in SHIQ. The blocking conditions of the tableau are weakened in such a way that the set of models the modified algorithm yields suffices to check query entailment. The modified blocking conditions are based on the ones proposed by Levy and Rousset for reasoning with Horn Rules in the description logic ALCNR.
[ { "version": "v1", "created": "Fri, 22 Jul 2005 15:43:07 GMT" } ]
2007-05-23T00:00:00
[ [ "de la Fuente", "M. Magdalena Ortiz", "" ], [ "Calvanese", "Diego", "" ], [ "Eiter", "Thomas", "" ], [ "Franconi", "Enrico", "" ] ]
cs/0507061
Andre Adrian
Andre Adrian
Software Architecture Overview
9 pages, version 23jul2005
null
null
null
cs.SE
null
What is Software Architecture? The rules, paradigmen, pattern that help to construct, build and test a serious piece of software. It is the practical experience boiled down to abstract level. Software Architecture builds on System Engineering and the scientific method as established by Galileo Galilei: Measure what you can and make measureable what you can not. The experiment (test) is more important then the deduction. Pieces of information about software architecture are all over the internet. This paper uses citation as much as possible. The aim is to bring together an overview, not to rephrase the wording.
[ { "version": "v1", "created": "Sun, 24 Jul 2005 09:43:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Adrian", "Andre", "" ] ]
cs/0507062
Jan Poland
Jan Poland
FPL Analysis for Adaptive Bandits
null
null
null
null
cs.LG
null
A main problem of "Follow the Perturbed Leader" strategies for online decision problems is that regret bounds are typically proven against oblivious adversary. In partial observation cases, it was not clear how to obtain performance guarantees against adaptive adversary, without worsening the bounds. We propose a conceptually simple argument to resolve this problem. Using this, a regret bound of O(t^(2/3)) for FPL in the adversarial multi-armed bandit problem is shown. This bound holds for the common FPL variant using only the observations from designated exploration rounds. Using all observations allows for the stronger bound of O(t^(1/2)), matching the best bound known so far (and essentially the known lower bound) for adversarial bandits. Surprisingly, this variant does not even need explicit exploration, it is self-stabilizing. However the sampling probabilities have to be either externally provided or approximated to sufficient accuracy, using O(t^2 log t) samples in each step.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 05:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ] ]
cs/0507064
Isabelle Gnaedig
Isabelle Gnaedig and Helene Kirchner
Termination of rewriting strategies: a generic approach
49 pages
null
null
null
cs.LO
null
We propose a generic termination proof method for rewriting under strategies, based on an explicit induction on the termination property. Rewriting trees on ground terms are modeled by proof trees, generated by alternatively applying narrowing and abstracting steps. The induction principle is applied through the abstraction mechanism, where terms are replaced by variables representing any of their normal forms. The induction ordering is not given a priori, but defined with ordering constraints, incrementally set during the proof. Abstraction constraints can be used to control the narrowing mechanism, well known to easily diverge. The generic method is then instantiated for the innermost, outermost and local strategies.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 20:18:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gnaedig", "Isabelle", "" ], [ "Kirchner", "Helene", "" ] ]
cs/0507065
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A Fast Greedy Algorithm for Outlier Mining
11 pages
null
null
Tr-05-0406
cs.DB cs.AI
null
The task of outlier detection is to find small groups of data objects that are exceptional when compared with rest large amount of data. In [38], the problem of outlier detection in categorical data is defined as an optimization problem and a local-search heuristic based algorithm (LSA) is presented. However, as is the case with most iterative type algorithms, the LSA algorithm is still very time-consuming on very large datasets. In this paper, we present a very fast greedy algorithm for mining outliers under the same optimization model. Experimental results on real datasets and large synthetic datasets show that: (1) Our algorithm has comparable performance with respect to those state-of-art outlier detection algorithms on identifying true outliers and (2) Our algorithm can be an order of magnitude faster than LSA algorithm.
[ { "version": "v1", "created": "Wed, 27 Jul 2005 02:14:02 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0507066
Atul Chaturvedi Mr.
Sunder Lal and Atul Chaturvedi (Department of Mathematics Institute of Basic Science)
Authentication Schemes Using Braid Groups
6 pages, 2 figures
null
null
null
cs.CR cs.CY
null
In this paper we proposed two identification schemes based on the root problem. The proposed schemes are secure against passive attacks assuming that the root problem (RP) is hard in braid groups.
[ { "version": "v1", "created": "Wed, 27 Jul 2005 10:14:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "", "Department of Mathematics Institute of\n Basic Science" ], [ "Chaturvedi", "Atul", "", "Department of Mathematics Institute of\n Basic Science" ] ]
cs/0507067
Diego Calvanese
Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini
Conjunctive Query Containment and Answering under Description Logics Constraints
null
null
null
null
cs.DB cs.AI
null
Query containment and query answering are two important computational tasks in databases. While query answering amounts to compute the result of a query over a database, query containment is the problem of checking whether for every database, the result of one query is a subset of the result of another query. In this paper, we deal with unions of conjunctive queries, and we address query containment and query answering under Description Logic constraints. Every such constraint is essentially an inclusion dependencies between concepts and relations, and their expressive power is due to the possibility of using complex expressions, e.g., intersection and difference of relations, special forms of quantification, regular expressions over binary relations, in the specification of the dependencies. These types of constraints capture a great variety of data models, including the relational, the entity-relationship, and the object-oriented model, all extended with various forms of constraints, and also the basic features of the ontology languages used in the context of the Semantic Web. We present the following results on both query containment and query answering. We provide a method for query containment under Description Logic constraints, thus showing that the problem is decidable, and analyze its computational complexity. We prove that query containment is undecidable in the case where we allow inequalities in the right-hand side query, even for very simple constraints and queries. We show that query answering under Description Logic constraints can be reduced to query containment, and illustrate how such a reduction provides upper bound results with respect to both combined and data complexity.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 08:25:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Calvanese", "Diego", "" ], [ "De Giacomo", "Giuseppe", "" ], [ "Lenzerini", "Maurizio", "" ] ]
cs/0507070
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Hybrid XML Retrieval: Combining Information Retrieval and a Native XML Database
Postprint version. The editor version can be accessed through the DOI
null
10.1007/s10791-005-0748-1
null
cs.IR
null
This paper investigates the impact of three approaches to XML retrieval: using Zettair, a full-text information retrieval system; using eXist, a native XML database; and using a hybrid system that takes full article answers from Zettair and uses eXist to extract elements from those articles. For the content-only topics, we undertake a preliminary analysis of the INEX 2003 relevance assessments in order to identify the types of highly relevant document components. Further analysis identifies two complementary sub-cases of relevance assessments ("General" and "Specific") and two categories of topics ("Broad" and "Narrow"). We develop a novel retrieval module that for a content-only topic utilises the information from the resulting answer list of a native XML database and dynamically determines the preferable units of retrieval, which we call "Coherent Retrieval Elements". The results of our experiments show that -- when each of the three systems is evaluated against different retrieval scenarios (such as different cases of relevance assessments, different topic categories and different choices of evaluation metrics) -- the XML retrieval systems exhibit varying behaviour and the best performance can be reached for different values of the retrieval parameters. In the case of INEX 2003 relevance assessments for the content-only topics, our newly developed hybrid XML retrieval system is substantially more effective than either Zettair or eXist, and yields a robust and a very effective XML retrieval.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 19:19:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
cs/0507071
Andreas U. Schmidt
Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt
Security for Distributed Web-Applications via Aspect-Oriented Programming
Refereed contribution to the Conference Information Security South Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005
null
null
null
cs.CR
null
Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on aspect oriented programming and the liberty alliance framework, an upcoming industrie standard providing single sign on. In an initial training phase the module is adapted to the application which is to be secured. Moreover the use of hardware tokens and proactive computing is demonstrated. The high modularisation is achived through use of AspectJ, a programming language extension of Java.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 10:44:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Rauch", "Thomas", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0507072
Matthew Leslie
Matthew Leslie
Reliable Data Storage in Distributed Hash Tables
null
null
null
null
cs.DC cs.NI
null
Distributed Hash Tables offer a resilient lookup service for unstable distributed environments. Resilient data storage, however, requires additional data replication and maintenance algorithms. These algorithms can have an impact on both the performance and the scalability of the system. In this paper, we describe the goals and design space of these replication algorithms. We examine an existing replication algorithm, and present a new analysis of its reliability. We then present a new dynamic replication algorithm which can operate in unstable environments. We give several possible replica placement strategies for this algorithm, and show how they impact reliability and performance. Finally we compare all replication algorithms through simulation, showing quantitatively the difference between their bandwidth use, fault tolerance and performance.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 16:54:00 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2005 21:49:19 GMT" }, { "version": "v3", "created": "Tue, 2 Aug 2005 22:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Leslie", "Matthew", "" ] ]
cs/0507073
Michel Dagenais
Michel R. Dagenais (Dept. of Computer Engineering, Ecole Polytechnique, Montreal, Canada) Karim Yaghmour (Opersys, Montreal, Canada) Charles Levert (Ericsson Research, Montreal, Canada) Makan Pourzandi (Ericsson Research, Montreal, Canada)
Software Performance Analysis
null
null
null
null
cs.PF cs.OS
null
The key to speeding up applications is often understanding where the elapsed time is spent, and why. This document reviews in depth the full array of performance analysis tools and techniques available on Linux for this task, from the traditional tools like gcov and gprof, to the more advanced tools still under development like oprofile and the Linux Trace Toolkit. The focus is more on the underlying data collection and processing algorithms, and their overhead and precision, than on the cosmetic details of the graphical user interface frontends.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 19:33:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagenais", "Michel R.", "", "Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada" ], [ "Yaghmour", "Karim", "", "Opersys, Montreal, Canada" ], [ "Levert", "Charles", "", "Ericsson Research, Montreal, Canada" ], [ "Pourzandi", "Makan", "", "Ericsson Research, Montreal, Canada" ] ]
cs/0508002
Adilson Xavier V.
Gilson A. Giraldi, Luis C. da Costa, Adilson V. Xavier, Paulo S. Rodrigues
Methods for Analytical Understanding of Agent-Based Modeling of Complex Systems
null
null
null
null
cs.GR
null
Von Neuman's work on universal machines and the hardware development have allowed the simulation of dynamical systems through a large set of interacting agents. This is a bottom-up approach which tries to derive global properties of a complex system through local interaction rules and agent behaviour. Traditionally, such systems are modeled and simulated through top-down methods based on differential equations. Agent-Based Modeling has the advantage of simplicity and low computational cost. However, unlike differential equations, there is no standard way to express agent behaviour. Besides, it is not clear how to analytically predict the results obtained by the simulation. In this paper we survey some of these methods. For expressing agent behaviour formal methods, like Stochastic Process Algebras have been used. Such approach is useful if the global properties of interest can be expressed as a function of stochastic time series. However, if space variables must be considered, we shall change the focus. In this case, multiscale techniques, based on Chapman-Enskog expansion, was used to establish the connection between the microscopic dynamics and the macroscopic observables. Also, we use data mining techniques,like Principal Component Analysis (PCA), to study agent systems like Cellular Automata. With the help of these tools we will discuss a simple society model, a Lattice Gas Automaton for fluid modeling, and knowledge discovery in CA databases. Besides, we show the capabilities of the NetLogo, a software for agent simulation of complex system and show our experience about.
[ { "version": "v1", "created": "Sat, 30 Jul 2005 12:31:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "da Costa", "Luis C.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Rodrigues", "Paulo S.", "" ] ]
cs/0508005
Riccardo Pucella
Nick Papanikolaou
Logic Column 13: Reasoning Formally about Quantum Systems: An Overview
17 pages
SIGACT News, 36(3), pp. 51-66, 2005
null
null
cs.LO
null
This article is intended as an introduction to the subject of quantum logic, and as a brief survey of the relevant literature. Also discussed here are logics for specification and analysis of quantum information systems, in particular, recent work by P. Mateus and A. Sernadas, and also by R. van der Meyden and M. Patra. Overall, our objective is to provide a high-level presentation of the logical aspects of quantum theory. Mateus' and Sernadas' EQPL logic is illustrated with a small example, namely the state of an entangled pair of qubits. The "KT" logic of van der Meyden and Patra is demonstrated briefly in the context of the B92 protocol for quantum key distribution.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 14:34:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Papanikolaou", "Nick", "" ] ]
cs/0508006
Sandor P. Fekete
Sandor P. Fekete, Michael Kaufmann, Alexander Kroeller, and Katharina Lehmann
A New Approach for Boundary Recognition in Geometric Sensor Networks
4 pages, 5 figures, Latex, to appear in Canadian Conference on Computational Geometry (CCCG 2005)
null
null
null
cs.DS cs.DC
null
We describe a new approach for dealing with the following central problem in the self-organization of a geometric sensor network: Given a polygonal region R, and a large, dense set of sensor nodes that are scattered uniformly at random in R. There is no central control unit, and nodes can only communicate locally by wireless radio to all other nodes that are within communication radius r, without knowing their coordinates or distances to other nodes. The objective is to develop a simple distributed protocol that allows nodes to identify themselves as being located near the boundary of R and form connected pieces of the boundary. We give a comparison of several centrality measures commonly used in the analysis of social networks and show that restricted stress centrality is particularly suited for geometric networks; we provide mathematical as well as experimental evidence for the quality of this measure.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 19:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Kaufmann", "Michael", "" ], [ "Kroeller", "Alexander", "" ], [ "Lehmann", "Katharina", "" ] ]
cs/0508010
Yongjin Kim
Yongjin Kim, Ahmed Helmy
ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION
null
null
null
null
cs.NI
null
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging problem due to the dynamic topology, and limited network resources. It is especially difficult to trace back attacker(s) when they are moving to avoid traceback. In this paper, we introduce the ATTENTION protocol framework, which pays special attention to MAC layer abnormal activity under attack. ATTENTION consists of three classes, namely, coarse-grained traceback, fine-grained traceback and spatio-temporal fusion architecture. For energy-efficient attacker searching in MANETs, we also utilize small-world model. Our simulation analysis shows 79% of success rate in DoS attacker traceback with coarse-grained attack signature. In addition, with fine-grained attack signature, it shows 97% of success rate in DoS attacker traceback and 83% of success rate in DDoS attacker traceback. We also show that ATTENTION has robustness against node collusion and mobility.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 04:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Yongjin", "" ], [ "Helmy", "Ahmed", "" ] ]
cs/0508016
Jang-Won Lee
Jang-Won Lee, Mung Chiang, and A. Robert Calderbank
Distributed Algorithms for Optimal Rate-Reliability Tradeoff in Networks
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.NI
null
The current framework of network utility maximization for distributed rate allocation assumes fixed channel code rates. However, by adapting the physical layer channel coding, different rate-reliability tradeoffs can be achieved on each link and for each end user. Consider a network where each user has a utility function that depends on both signal quality and data rate, and each link may provide a `fatter' (`thinner') information `pipe' by allowing a higher (lower) decoding error probability. We propose two distributed, pricing-based algorithms to attain optimal rate-reliability tradeoff, with an interpretation that each user provides its willingness to pay for reliability to the network and the network feeds back congestion prices to users. The proposed algorithms converge to a tradeoff point between rate and reliability, which is proved to be globally optimal for codes with sufficiently large codeword lengths and user utilities with sufficiently negative curvatures.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 14:35:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Jang-Won", "" ], [ "Chiang", "Mung", "" ], [ "Calderbank", "A. Robert", "" ] ]
cs/0508017
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Enhancing Content-And-Structure Information Retrieval using a Native XML Database
null
null
null
null
cs.IR
null
Three approaches to content-and-structure XML retrieval are analysed in this paper: first by using Zettair, a full-text information retrieval system; second by using eXist, a native XML database, and third by using a hybrid XML retrieval system that uses eXist to produce the final answers from likely relevant articles retrieved by Zettair. INEX 2003 content-and-structure topics can be classified in two categories: the first retrieving full articles as final answers, and the second retrieving more specific elements within articles as final answers. We show that for both topic categories our initial hybrid system improves the retrieval effectiveness of a native XML database. For ranking the final answer elements, we propose and evaluate a novel retrieval model that utilises the structural relationships between the answer elements of a native XML database and retrieves Coherent Retrieval Elements. The final results of our experiments show that when the XML retrieval task focusses on highly relevant elements our hybrid XML retrieval system with the Coherent Retrieval Elements module is 1.8 times more effective than Zettair and 3 times more effective than eXist, and yields an effective content-and-structure XML retrieval.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 15:05:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
cs/0508021
Dmitri Krioukov
Dmitri Krioukov, kc claffy
Toward Compact Interdomain Routing
null
null
null
null
cs.NI
null
Despite prevailing concerns that the current Internet interdomain routing system will not scale to meet the needs of the 21st century global Internet, networking research has not yet led to the construction of a new routing architecture with satisfactory and mathematically provable scalability characteristics. Worse, continuing empirical trends of the existing routing and topology structure of the Internet are alarming: the foundational principles of the current routing and addressing architecture are an inherently bad match for the naturally evolving structure of Internet interdomain topology. We are fortunate that a sister discipline, theory of distributed computation, has developed routing algorithms that offer promising potential for genuinely scalable routing on realistic Internet-like topologies. Indeed, there are many recent breakthroughs in the area of compact routing, which has been shown to drastically outperform, in terms of efficiency and scalability, even the boldest proposals developed in networking research. Many open questions remain, but we believe the applicability of compact routing techniques to Internet interdomain routing is a research area whose potential payoff for the future of networking is too high to ignore.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 19:32:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ] ]
cs/0508028
Bernardo Huberman
Fang Wu, Zi Zhang and Bernardo A. Huberman
Truth-telling Reservations
null
null
null
null
cs.GT cond-mat.stat-mech cs.MA
null
We present a mechanism for reservations of bursty resources that is both truthful and robust. It consists of option contracts whose pricing structure induces users to reveal the true likelihoods that they will purchase a given resource. Users are also allowed to adjust their options as their likelihood changes. This scheme helps users save cost and the providers to plan ahead so as to reduce the risk of under-utilization and overbooking. The mechanism extracts revenue similar to that of a monopoly provider practicing temporal pricing discrimination with a user population whose preference distribution is known in advance.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 17:11:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Fang", "" ], [ "Zhang", "Zi", "" ], [ "Huberman", "Bernardo A.", "" ] ]
cs/0508029
Johannes Schneider
Johannes J. Schneider and Scott Kirkpatrick
Selfish vs. Unselfish Optimization of Network Creation
16 pages, 6 figures
null
10.1088/1742-5468/2005/08/P08007
null
cs.NI cs.AR cs.MA
null
We investigate several variants of a network creation model: a group of agents builds up a network between them while trying to keep the costs of this network small. The cost function consists of two addends, namely (i) a constant amount for each edge an agent buys and (ii) the minimum number of hops it takes sending messages to other agents. Despite the simplicity of this model, various complex network structures emerge depending on the weight between the two addends of the cost function and on the selfish or unselfish behaviour of the agents.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 18:16:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Schneider", "Johannes J.", "" ], [ "Kirkpatrick", "Scott", "" ] ]
cs/0508032
Derek Messie
Derek Messie (1) and Jae C. Oh (1) ((1) Syracuse University)
Polymorphic Self-* Agents for Stigmergic Fault Mitigation in Large-Scale Real-Time Embedded Systems
Fourth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Utrecht, Netherlands, July, 2005
null
null
null
cs.AI cs.MA
null
Organization and coordination of agents within large-scale, complex, distributed environments is one of the primary challenges in the field of multi-agent systems. A lot of interest has surfaced recently around self-* (self-organizing, self-managing, self-optimizing, self-protecting) agents. This paper presents polymorphic self-* agents that evolve a core set of roles and behavior based on environmental cues. The agents adapt these roles based on the changing demands of the environment, and are directly implementable in computer systems applications. The design combines strategies from game theory, stigmergy, and other biologically inspired models to address fault mitigation in large-scale, real-time, distributed systems. The agents are embedded within the individual digital signal processors of BTeV, a High Energy Physics experiment consisting of 2500 such processors. Results obtained using a SWARM simulation of the BTeV environment demonstrate the polymorphic character of the agents, and show how this design exceeds performance and reliability metrics obtained from comparable centralized, and even traditional decentralized approaches.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 01:43:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Messie", "Derek", "", "Syracuse University" ], [ "Oh", "Jae C.", "", "Syracuse University" ] ]
cs/0508033
Dmitri Krioukov
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Lessons from Three Views of the Internet Topology
null
null
null
CAIDA-TR-2005-02
cs.NI physics.soc-ph
null
Network topology plays a vital role in understanding the performance of network applications and protocols. Thus, recently there has been tremendous interest in generating realistic network topologies. Such work must begin with an understanding of existing network topologies, which today typically consists of a relatively small number of data sources. In this paper, we calculate an extensive set of important characteristics of Internet AS-level topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP, and WHOIS. We find that traceroute and BGP topologies are similar to one another but differ substantially from the WHOIS topology. We discuss the interplay between the properties of the data sources that result from specific data collection mechanisms and the resulting topology views. We find that, among metrics widely considered, the joint degree distribution appears to fundamentally characterize Internet AS-topologies: it narrowly defines values for other important metrics. We also introduce an evaluation criteria for the accuracy of topology generators and verify previous observations that generators solely reproducing degree distributions cannot capture the full spectrum of critical topological characteristics of any of the three topologies. Finally, we release to the community the input topology datasets, along with the scripts and output of our calculations. This supplement should enable researchers to validate their models against real data and to make more informed selection of topology data sources for their specific needs.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 02:35:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahadevan", "Priya", "" ], [ "Krioukov", "Dmitri", "" ], [ "Fomenkov", "Marina", "" ], [ "Huffaker", "Bradley", "" ], [ "Dimitropoulos", "Xenofontas", "" ], [ "claffy", "kc", "" ], [ "Vahdat", "Amin", "" ] ]
cs/0508036
Anne-Marie Vercoustre
Thierry Despeyroux, Yves Lechevallier, Brigitte Trousse, Anne-Marie Vercoustre
Exp\'{e}riences de classification d'une collection de documents XML de structure homog\`{e}ne
Cette version corrige des erreurs dans le nom de 2 auteurs cites dans la bibliographie
Dans 5\`{e}me Journ\'{e}es d' Extraction et de Gestion des Connaissances (EGC 2005)
null
null
cs.IR
null
This paper presents some experiments in clustering homogeneous XMLdocuments to validate an existing classification or more generally anorganisational structure. Our approach integrates techniques for extracting knowledge from documents with unsupervised classification (clustering) of documents. We focus on the feature selection used for representing documents and its impact on the emerging classification. We mix the selection of structured features with fine textual selection based on syntactic characteristics.We illustrate and evaluate this approach with a collection of Inria activity reports for the year 2003. The objective is to cluster projects into larger groups (Themes), based on the keywords or different chapters of these activity reports. We then compare the results of clustering using different feature selections, with the official theme structure used by Inria.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 14:14:59 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 13:15:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "" ], [ "Lechevallier", "Yves", "" ], [ "Trousse", "Brigitte", "" ], [ "Vercoustre", "Anne-Marie", "" ] ]
cs/0508038
Robert Burger PhD
John Robert Burger
Quantum Algorithm Processor For Finding Exact Divisors
null
null
null
null
cs.AR
null
Wiring diagrams are given for a quantum algorithm processor in CMOS to compute, in parallel, all divisors of an n-bit integer. Lines required in a wiring diagram are proportional to n. Execution time is proportional to the square of n.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 17:35:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0508041
Tian-Jian Jiang
Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
4 pages
null
null
null
cs.HC
null
Input method (IM) is a sine qua non for text entry of many Asian languages, but its potential applications on other languages remain under-explored. This paper proposes a philosophy of input method design by seeing it as a nonintrusive plug-in text service framework. Such design allows new functionalities of text processing to be attached onto a running application without any tweaking of code. We also introduce OpenVanilla, a cross-platform framework that is designed with the above-mentioned model in mind. Frameworks like OpenVanilla have shown that an input method can be more than just a text entry tool: it offers a convenient way for developing various text service and language tools.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:39:49 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tian-Jian", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
cs/0508042
Tian-Jian Jiang
Tien-chien Chiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
This paper has been withdrawn
null
null
null
cs.HC
null
This paper has been withdrawn by the author, because it was merged into cs.HC/0508041
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:49:38 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:46:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Chiang", "Tien-chien", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
cs/0508045
Ion Mandoiu
Christoph Albrecht, Andrew B. Kahng, Ion I. Mandoiu, and Alexander Zelikovsky
Multicommodity Flow Algorithms for Buffered Global Routing
null
null
null
null
cs.DS
null
In this paper we describe a new algorithm for buffered global routing according to a prescribed buffer site map. Specifically, we describe a provably good multi-commodity flow based algorithm that finds a global routing minimizing buffer and wire congestion subject to given constraints on routing area (wirelength and number of buffers) and sink delays. Our algorithm allows computing the tradeoff curve between routing area and wire/buffer congestion under any combination of delay and capacity constraints, and simultaneously performs buffer/wire sizing, as well as layer and pin assignment. Experimental results show that near-optimal results are obtained with a practical runtime.
[ { "version": "v1", "created": "Sat, 6 Aug 2005 12:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Albrecht", "Christoph", "" ], [ "Kahng", "Andrew B.", "" ], [ "Mandoiu", "Ion I.", "" ], [ "Zelikovsky", "Alexander", "" ] ]
cs/0508052
Olivier Powell
Pierre Leone, Olivier Powell and Jose Rolim
Energy Optimal Data Propagation in Wireless Sensor Networks
19 pages
Journal of Parallel and Distributed Computing Volume 67, Issue 3 , March 2007, Pages 302-317
10.1016/j.jpdc.2006.10.007
null
cs.DC
null
We propose an algorithm which produces a randomized strategy reaching optimal data propagation in wireless sensor networks (WSN).In [6] and [8], an energy balanced solution is sought using an approximation algorithm. Our algorithm improves by (a) when an energy-balanced solution does not exist, it still finds an optimal solution (whereas previous algorithms did not consider this case and provide no useful solution) (b) instead of being an approximation algorithm, it finds the exact solution in one pass. We also provide a rigorous proof of the optimality of our solution.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 15:54:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Leone", "Pierre", "" ], [ "Powell", "Olivier", "" ], [ "Rolim", "Jose", "" ] ]
cs/0508053
Peter Turney
Peter D. Turney (National Research Council of Canada)
Measuring Semantic Similarity by Latent Relational Analysis
6 pages, related work available at http://purl.org/peter.turney/
Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05), (2005), Edinburgh, Scotland, 1136-1141
null
NRC-48255
cs.LG cs.CL cs.IR
null
This paper introduces Latent Relational Analysis (LRA), a method for measuring semantic similarity. LRA measures similarity in the semantic relations between two pairs of words. When two pairs have a high degree of relational similarity, they are analogous. For example, the pair cat:meow is analogous to the pair dog:bark. There is evidence from cognitive science that relational similarity is fundamental to many cognitive and linguistic tasks (e.g., analogical reasoning). In the Vector Space Model (VSM) approach to measuring relational similarity, the similarity between two pairs is calculated by the cosine of the angle between the vectors that represent the two pairs. The elements in the vectors are based on the frequencies of manually constructed patterns in a large corpus. LRA extends the VSM approach in three ways: (1) patterns are derived automatically from the corpus, (2) Singular Value Decomposition is used to smooth the frequency data, and (3) synonyms are used to reformulate word pairs. This paper describes the LRA algorithm and experimentally compares LRA to VSM on two tasks, answering college-level multiple-choice word analogy questions and classifying semantic relations in noun-modifier expressions. LRA achieves state-of-the-art results, reaching human-level performance on the analogy questions and significantly exceeding VSM performance on both tasks.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 19:35:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
cs/0508061
L.T. Handoko
L.T. Handoko
SciBlog : A Tool for Scientific Collaboration
4 figures, invited talk at the Workshop on Knowledge Management (6-9 December 2004)
Proceeding of the WKM 2004
null
FISIKALIPI-04013
cs.CY
null
I describe a newly developed online scientific web-log (SciBlog). The online facility consists of several moduls needed in a common and conventional research activity. I show that this enables scientists around the world to perform an online collaboration over the net.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 22:29:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Handoko", "L. T.", "" ] ]
cs/0508063
Michel Dagenais
Michel R. Dagenais (Dept. of Computer Engineering, Ecole Polytechnique, Montreal, Canada)
Disks, Partitions, Volumes and RAID Performance with the Linux Operating System
null
null
null
null
cs.PF cs.OS
null
Block devices in computer operating systems typically correspond to disks or disk partitions, and are used to store files in a filesystem. Disks are not the only real or virtual device which adhere to the block accessible stream of bytes block device model. Files, remote devices, or even RAM may be used as a virtual disks. This article examines several common combinations of block device layers used as virtual disks in the Linux operating system: disk partitions, loopback files, software RAID, Logical Volume Manager, and Network Block Devices. It measures their relative performance using different filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
[ { "version": "v1", "created": "Fri, 12 Aug 2005 16:13:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagenais", "Michel R.", "", "Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada" ] ]
cs/0508065
Herbert van de Sompel
Jeroen Bekaert, Herbert Van de Sompel
Representing Digital Assets using MPEG-21 Digital Item Declaration
27 pages, accepted submission to the special edition on complex objects of the International Journal on Digital Libraries
null
null
null
cs.DL cs.AR
null
Various XML-based approaches aimed at representing compound digital assets have emerged over the last several years. Approaches that are of specific relevance to the digital library community include the Metadata Encoding and Transmission Standard (METS), the IMS Content Packaging XML Binding, and the XML Formatted Data Units (XFDU) developed by CCSDS Panel 2. The MPEG-21 Digital Item Declaration (MPEG-21 DID) is another standard specifying the representation of digital assets in XML that, so far, has received little attention in the digital library community. This article gives a brief insight into the MPEG-21 standardization effort, highlights the major characteristics of the MPEG-21 DID Abstract Model, and describes the MPEG-21 Digital Item Declaration Language (MPEG-21 DIDL), an XML syntax for the representation of digital assets based on the MPEG-21 DID Abstract Model. Also, it briefly demonstrates the potential relevance of MPEG-21 DID to the digital library community by describing its use in the aDORe repository environment at the Research Library of the Los Alamos National Laboratory (LANL) for the representation of digital assets.
[ { "version": "v1", "created": "Sat, 13 Aug 2005 03:09:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bekaert", "Jeroen", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0508066
Jonathan Bowen
Silvia Filippini-Fantoni and Jonathan P. Bowen
Can Small Museums Develop Compelling, Educational and Accessible Web Resources? The Case of Accademia Carrara
14 pages, 6 figures
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005 London Conference Proceedings, University College London, UK, 25-29 July 2005, pages 18.1-18.14. ISBN: 0-9543146-6-2
null
null
cs.MM cs.CY cs.DL cs.IR
null
Due to the lack of budget, competence, personnel and time, small museums are often unable to develop compelling, educational and accessible web resources for their permanent collections or temporary exhibitions. In an attempt to prove that investing in these types of resources can be very fruitful even for small institutions, we will illustrate the case of Accademia Carrara, a museum in Bergamo, northern Italy, which, for a current temporary exhibition on Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed a series of multimedia applications, including an accessible website, rich in content and educational material [www.cezannerenoir.it].
[ { "version": "v1", "created": "Sat, 13 Aug 2005 14:46:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Filippini-Fantoni", "Silvia", "" ], [ "Bowen", "Jonathan P.", "" ] ]
cs/0508067
Jonathan Bowen
Teresa Numerico and Jonathan P. Bowen
Copyright and Promotion: Oxymoron or Opportunity?
10 pages, 0 figures
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005 London Conference Proceedings, University College London, UK, 25-29 July 2005, pages 25.1-25.10. ISBN: 0-9543146-6-2
null
null
cs.CY cs.DL
null
Copyright in the cultural sphere can act as a barrier to the dissemination of high-quality information. On the other hand it protects works of art that might not be made available otherwise. This dichotomy makes the area of copyright difficult, especially when it applies to the digital arena of the web where copying is so easy and natural. Here we present a snapshot of the issues for online copyright, with particular emphasis on the relevance to cultural institutions. We concentrate on Europe and the US; as an example we include a special section dedicated to the situation in Italy.
[ { "version": "v1", "created": "Sat, 13 Aug 2005 14:58:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Numerico", "Teresa", "" ], [ "Bowen", "Jonathan P.", "" ] ]
cs/0508071
Oded Schramm
Ryan O'Donnell, Michael Saks, Oded Schramm, Rocco A. Servedio
Every decision tree has an influential variable
This paper is posted by permission from the IEEE Computer Society. To appear in FOCS 2005
null
null
null
cs.CC cs.DM math.PR
null
We prove that for any decision tree calculating a boolean function $f:\{-1,1\}^n\to\{-1,1\}$, \[ \Var[f] \le \sum_{i=1}^n \delta_i \Inf_i(f), \] where $\delta_i$ is the probability that the $i$th input variable is read and $\Inf_i(f)$ is the influence of the $i$th variable on $f$. The variance, influence and probability are taken with respect to an arbitrary product measure on $\{-1,1\}^n$. It follows that the minimum depth of a decision tree calculating a given balanced function is at least the reciprocal of the largest influence of any input variable. Likewise, any balanced boolean function with a decision tree of depth $d$ has a variable with influence at least $\frac{1}{d}$. The only previous nontrivial lower bound known was $\Omega(d 2^{-d})$. Our inequality has many generalizations, allowing us to prove influence lower bounds for randomized decision trees, decision trees on arbitrary product probability spaces, and decision trees with non-boolean outputs. As an application of our results we give a very easy proof that the randomized query complexity of nontrivial monotone graph properties is at least $\Omega(v^{4/3}/p^{1/3})$, where $v$ is the number of vertices and $p \leq \half$ is the critical threshold probability. This supersedes the milestone $\Omega(v^{4/3})$ bound of Hajnal and is sometimes superior to the best known lower bounds of Chakrabarti-Khot and Friedgut-Kahn-Wigderson.
[ { "version": "v1", "created": "Tue, 16 Aug 2005 01:00:05 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Donnell", "Ryan", "" ], [ "Saks", "Michael", "" ], [ "Schramm", "Oded", "" ], [ "Servedio", "Rocco A.", "" ] ]
cs/0508073
Marcus Hutter
Jan Poland and Marcus Hutter
Universal Learning of Repeated Matrix Games
16 LaTeX pages, 8 eps figures
Proc. 15th Annual Machine Learning Conf. of Belgium and The Netherlands (Benelearn 2006) pages 7-14
null
IDSIA-18-05
cs.LG cs.AI
null
We study and compare the learning dynamics of two universal learning algorithms, one based on Bayesian learning and the other on prediction with expert advice. Both approaches have strong asymptotic performance guarantees. When confronted with the task of finding good long-term strategies in repeated 2x2 matrix games, they behave quite differently.
[ { "version": "v1", "created": "Tue, 16 Aug 2005 16:27:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0508078
Serebrenik Alexander
Alexander Serebrenik, Susana Munoz-Hernandez
Proceedings of the 15th Workshop on Logic-based methods in Programming Environments WLPE'05 -- October 5, 2005 -- Sitges (Barcelona), Spain
Seven accepted papers
null
null
null
cs.PL cs.LO cs.SE
null
This volume contains papers presented at WLPE 2005, 15th International Workshop on Logic-based methods in Programming Environments. The aim of the workshop is to provide an informal meeting for the researchers working on logic-based tools for development and analysis of programs. This year we emphasized two aspects: on one hand the presentation, pragmatics and experiences of tools for logic programming environments; on the other one, logic-based environmental tools for programming in general. The workshop took place in Sitges (Barcelona), Spain as a satellite workshop of the 21th International Conference on Logic Programming (ICLP 2005). This workshop continues the series of successful international workshops on logic programming environments held in Ohio, USA (1989), Eilat, Israel (1990), Paris, France (1991), Washington, USA (1992), Vancouver, Canada (1993), Santa Margherita Ligure, Italy (1994), Portland, USA (1995), Leuven, Belgium and Port Jefferson, USA (1997), Las Cruces, USA (1999), Paphos, Cyprus (2001), Copenhagen, Denmark (2002), Mumbai, India (2003) and Saint Malo, France (2004). We have received eight submissions (2 from France, 2 Spain-US cooperations, one Spain-Argentina cooperation, one from Japan, one from the United Kingdom and one Sweden-France cooperation). Program committee has decided to accept seven papers. This volume contains revised versions of the accepted papers. We are grateful to the authors of the papers, the reviewers and the members of the Program Committee for the help and fruitful discussions.
[ { "version": "v1", "created": "Wed, 17 Aug 2005 13:35:20 GMT" }, { "version": "v2", "created": "Mon, 22 Aug 2005 07:57:41 GMT" }, { "version": "v3", "created": "Wed, 24 Aug 2005 16:15:24 GMT" }, { "version": "v4", "created": "Thu, 25 Aug 2005 06:42:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Munoz-Hernandez", "Susana", "" ] ]
cs/0508079
Nithin Nagaraj
Nithin Nagaraj and Vivek Vaidya and Prabhakar G Vaidya
Re-visiting the One-Time Pad
13 pages, 3 figures, submitted for publication to IndoCrypt 2005 conference
null
null
null
cs.CR
null
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system,also popularly known as the One-Time Pad (OTP). Since then, it has been believed that the perfectly random and uncompressible OTP which is transmitted needs to have a length equal to the message length for this result to be true. In this paper, we prove that the length of the transmitted OTP which actually contains useful information need not be compromised and could be less than the message length without sacrificing perfect secrecy. We also provide a new interpretation for the OTP encryption by treating the message bits as making True/False statements about the pad, which we define as a private-object. We introduce the paradigm of private-object cryptography where messages are transmitted by verifying statements about a secret-object. We conclude by suggesting the use of Formal Axiomatic Systems for investing N bits of secret.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 04:37:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Nagaraj", "Nithin", "" ], [ "Vaidya", "Vivek", "" ], [ "Vaidya", "Prabhakar G", "" ] ]
cs/0508080
Kirti Chawla
Kirti Chawla
A 3D RGB Axis-based Color-oriented Cryptography
16 Pages, 12 figures
null
null
null
cs.CR
null
In this document, a formal approach to encrypt, decrypt, transmit and receive information using colors is explored. A piece of information consists of set of symbols with a definite property imposed on the generating set. The symbols are usually encoded using ascii scheme. A linear to 3d transformation is presented. The change of axis from traditional xyz to rgb is highlighted and its effect are studied. A point in this new axis is then represented as a unique color and a vector or matrix is associated with it, making it amenable to standard vector or matrix operations. A formal notion on hybrid cryptography is introduced as the algorithm lies on the boundary of symmetric and asymmetric cryptography. No discussion is complete, without mentioning reference to communication aspects of secure information in a channel. Transmission scheme pertaining to light as carrier is introduced and studied. Key-exchanges do not come under the scope of current frame of document.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 07:07:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Chawla", "Kirti", "" ] ]
cs/0508081
Kirti Chawla
Kirti Chawla
ZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol
5 Pages
null
null
null
cs.CR
null
In this paper, facts existing in different domains are explored, which are comparable by their end result. Properties of various domains and the facts that are part of such a unit are also presented, examples of comparison and methods of usage as means of zero-knowledge protocols are given, finally a zero-knowledge protocol based on afore-mentioned concept is given.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 07:17:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Chawla", "Kirti", "" ] ]
cs/0508082
Bernardo Huberman
Scott Golder, Bernardo A. Huberman
The Structure of Collaborative Tagging Systems
null
null
null
null
cs.DL cs.CY
null
Collaborative tagging describes the process by which many users add metadata in the form of keywords to shared content. Recently, collaborative tagging has grown in popularity on the web, on sites that allow users to tag bookmarks, photographs and other content. In this paper we analyze the structure of collaborative tagging systems as well as their dynamical aspects. Specifically, we discovered regularities in user activity, tag frequencies, kinds of tags used, bursts of popularity in bookmarking and a remarkable stability in the relative proportions of tags within a given url. We also present a dynamical model of collaborative tagging that predicts these stable patterns and relates them to imitation and shared knowledge.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 18:34:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Golder", "Scott", "" ], [ "Huberman", "Bernardo A.", "" ] ]
cs/0508086
Dragos Trinca
Dragos Trinca
High-performance BWT-based Encoders
12 pages
null
null
null
cs.DS
null
In 1994, Burrows and Wheeler developed a data compression algorithm which performs significantly better than Lempel-Ziv based algorithms. Since then, a lot of work has been done in order to improve their algorithm, which is based on a reversible transformation of the input string, called BWT (the Burrows-Wheeler transformation). In this paper, we propose a compression scheme based on BWT, MTF (move-to-front coding), and a version of the algorithms presented in [Dragos Trinca, ITCC-2004].
[ { "version": "v1", "created": "Sun, 21 Aug 2005 05:47:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508087
Dragos Trinca
Dragos Trinca
Modelling the Eulerian Path Problem using a String Matching Framework
10 pages
null
null
null
cs.DS
null
The well-known Eulerian path problem can be solved in polynomial time (more exactly, there exists a linear time algorithm for this problem). In this paper, we model the problem using a string matching framework, and then initiate an algorithmic study on a variant of this problem, called the (2,1)-STRING-MATCH problem (which is actually a generalization of the Eulerian path problem). Then, we present a polynomial-time algorithm for the (2,1)-STRING-MATCH problem, which is the most important result of this paper. Specifically, we get a lower bound of Omega(n), and an upper bound of O(n^{2}).
[ { "version": "v1", "created": "Sun, 21 Aug 2005 06:08:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508089
Dragos Trinca
Dragos Trinca
Modelling the EAH Data Compression Algorithm using Graph Theory
10 pages
null
null
null
cs.DS
null
Adaptive codes associate variable-length codewords to symbols being encoded depending on the previous symbols in the input data string. This class of codes has been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of non-standard variable-length codes. New algorithms for data compression, based on adaptive codes of order one, have been presented in [Dragos Trinca, ITCC-2004], where we have behaviorally shown that for a large class of input data strings, these algorithms substantially outperform the Lempel-Ziv universal data compression algorithm. EAH has been introduced in [Dragos Trinca, cs.DS/0505061], as an improved generalization of these algorithms. In this paper, we present a translation of the EAH algorithm into the graph theory.
[ { "version": "v1", "created": "Sun, 21 Aug 2005 19:32:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508090
Dragos Trinca
Dragos Trinca
Translating the EAH Data Compression Algorithm into Automata Theory
9 pages
null
null
null
cs.DS
null
Adaptive codes have been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of non-standard variable-length codes. These codes associate variable-length codewords to symbols being encoded depending on the previous symbols in the input data string. A new data compression algorithm, called EAH, has been introduced in [Dragos Trinca, cs.DS/0505061], where we have behaviorally shown that for a large class of input data strings, this algorithm substantially outperforms the well-known Lempel-Ziv universal data compression algorithm. In this paper, we translate the EAH encoder into automata theory.
[ { "version": "v1", "created": "Sun, 21 Aug 2005 19:56:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
cs/0508091
Serebrenik Alexander
Susana Munoz-Hernandez and Claudio Vaucheret
Extending Prolog with Incomplete Fuzzy Information
null
null
null
null
cs.PL cs.SE
null
Incomplete information is a problem in many aspects of actual environments. Furthermore, in many sceneries the knowledge is not represented in a crisp way. It is common to find fuzzy concepts or problems with some level of uncertainty. There are not many practical systems which handle fuzziness and uncertainty and the few examples that we can find are used by a minority. To extend a popular system (which many programmers are using) with the ability of combining crisp and fuzzy knowledge representations seems to be an interesting issue. Our first work (Fuzzy Prolog) was a language that models $\mathcal{B}([0,1])$-valued Fuzzy Logic. In the Borel algebra, $\mathcal{B}([0,1])$, truth value is represented using unions of intervals of real numbers. This work was more general in truth value representation and propagation than previous works. An interpreter for this language using Constraint Logic Programming over Real numbers (CLP(${\cal R}$)) was implemented and is available in the Ciao system. Now, we enhance our former approach by using default knowledge to represent incomplete information in Logic Programming. We also provide the implementation of this new framework. This new release of Fuzzy Prolog handles incomplete information, it has a complete semantics (the previous one was incomplete as Prolog) and moreover it is able to combine crisp and fuzzy logic in Prolog programs. Therefore, new Fuzzy Prolog is more expressive to represent real world. Fuzzy Prolog inherited from Prolog its incompleteness. The incorporation of default reasoning to Fuzzy Prolog removes this problem and requires a richer semantics which we discuss.
[ { "version": "v1", "created": "Mon, 22 Aug 2005 07:41:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Munoz-Hernandez", "Susana", "" ], [ "Vaucheret", "Claudio", "" ] ]
cs/0508092
Stergos Afantenos
Stergos D. Afantenos, Vangelis Karkaletsis and Panagiotis Stamatopoulos
Summarizing Reports on Evolving Events; Part I: Linear Evolution
7 pages. Published on the Conference Recent Advances in Natural Language Processing (RANLP, 2005)
Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing (RANLP 2005). Borovets, Bulgaria: INCOMA, 18-24.
null
null
cs.CL cs.IR
null
We present an approach for summarization from multiple documents which report on events that evolve through time, taking into account the different document sources. We distinguish the evolution of an event into linear and non-linear. According to our approach, each document is represented by a collection of messages which are then used in order to instantiate the cross-document relations that determine the summary content. The paper presents the summarization system that implements this approach through a case study on linear evolution.
[ { "version": "v1", "created": "Mon, 22 Aug 2005 12:56:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Afantenos", "Stergos D.", "" ], [ "Karkaletsis", "Vangelis", "" ], [ "Stamatopoulos", "Panagiotis", "" ] ]
cs/0508100
Alessandro Provetti
Alessandro Provetti
A primer on Answer Set Programming
6 pages
null
null
null
cs.AI cs.LO
null
A introduction to the syntax and Semantics of Answer Set Programming intended as an handout to [under]graduate students taking Artificial Intlligence or Logic Programming classes.
[ { "version": "v1", "created": "Tue, 23 Aug 2005 15:05:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Provetti", "Alessandro", "" ] ]
cs/0508102
Emily Stone
Emily Stone, Suhail Ahmed, Abe Askari and Hong Tat
Investigations of Process Damping Forces in Metal Cutting
27 pages, 27 figures, submitted to Journal of Computational Methods in Science and Engineering, Feb. 2005
null
null
null
cs.CE
null
Using finite element software developed for metal cutting by Third Wave Systems we investigate the forces involved in chatter, a self-sustained oscillation of the cutting tool. The phenomena is decomposed into a vibrating tool cutting a flat surface work piece, and motionless tool cutting a work piece with a wavy surface. While cutting the wavy surface, the shearplane was seen to oscillate in advance of the oscillation of the depth of cut, as were the cutting, thrust, and shear plane forces. The vibrating tool was used to investigate process damping through the interaction of the relief face of the tool and the workpiece. Crushing forces are isolated and compared to the contact length between the tool and workpiece. We found that the wavelength dependence of the forces depended on the relative size of the wavelength to the length of the relief face of the tool. The results indicate that the damping force from crushing will be proportional to the cutting speed for short tools, and inversely proportional for long tools.
[ { "version": "v1", "created": "Tue, 23 Aug 2005 19:52:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Stone", "Emily", "" ], [ "Ahmed", "Suhail", "" ], [ "Askari", "Abe", "" ], [ "Tat", "Hong", "" ] ]
cs/0508103
Peter Turney
Peter D. Turney (National Research Council of Canada), Michael L. Littman (Rutgers University)
Corpus-based Learning of Analogies and Semantic Relations
related work available at http://purl.org/peter.turney/ and http://www.cs.rutgers.edu/~mlittman/
Machine Learning, (2005), 60(1-3), 251-278
null
NRC-48273
cs.LG cs.CL cs.IR
null
We present an algorithm for learning from unlabeled text, based on the Vector Space Model (VSM) of information retrieval, that can solve verbal analogy questions of the kind found in the SAT college entrance exam. A verbal analogy has the form A:B::C:D, meaning "A is to B as C is to D"; for example, mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B, and the problem is to select the most analogous word pair, C:D, from a set of five choices. The VSM algorithm correctly answers 47% of a collection of 374 college-level analogy questions (random guessing would yield 20% correct; the average college-bound senior high school student answers about 57% correctly). We motivate this research by applying it to a difficult problem in natural language processing, determining semantic relations in noun-modifier pairs. The problem is to classify a noun-modifier pair, such as "laser printer", according to the semantic relation between the noun (printer) and the modifier (laser). We use a supervised nearest-neighbour algorithm that assigns a class to a given noun-modifier pair by finding the most analogous noun-modifier pair in the training data. With 30 classes of semantic relations, on a collection of 600 labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5% (random guessing: 3.3%). With 5 classes of semantic relations, the F value is 43.2% (random: 20%). The performance is state-of-the-art for both verbal analogies and noun-modifier relations.
[ { "version": "v1", "created": "Tue, 23 Aug 2005 20:21:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ], [ "Littman", "Michael L.", "", "Rutgers University" ] ]
cs/0508105
Ludovic Langevine
Ludovic Langevine and Mireille Ducasse
A Tracer Driver for Versatile Dynamic Analyses of Constraint Logic Programs
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments, October 2005, Spain. Whole proceedings: cs.PL/0508078. 15 pages
null
null
null
cs.SE
null
Programs with constraints are hard to debug. In this paper, we describe a general architecture to help develop new debugging tools for constraint programming. The possible tools are fed by a single general-purpose tracer. A tracer-driver is used to adapt the actual content of the trace, according to the needs of the tool. This enables the tools and the tracer to communicate in a client-server scheme. Each tool describes its needs of execution data thanks to event patterns. The tracer driver scrutinizes the execution according to these event patterns and sends only the data that are relevant to the connected tools. Experimental measures show that this approach leads to good performance in the context of constraint logic programming, where a large variety of tools exists and the trace is potentially huge.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 11:30:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Langevine", "Ludovic", "" ], [ "Ducasse", "Mireille", "" ] ]
cs/0508106
Fred Mesnard
Etienne Payet and Fred Mesnard
An Improved Non-Termination Criterion for Binary Constraint Logic Programs
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments October 2005, Sitges. cs.PL/0508078
null
null
null
cs.PL
null
On one hand, termination analysis of logic programs is now a fairly established research topic within the logic programming community. On the other hand, non-termination analysis seems to remain a much less attractive subject. If we divide this line of research into two kinds of approaches: dynamic versus static analysis, this paper belongs to the latter. It proposes a criterion for detecting non-terminating atomic queries with respect to binary CLP clauses, which strictly generalizes our previous works on this subject. We give a generic operational definition and a logical form of this criterion. Then we show that the logical form is correct and complete with respect to the operational definition.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 12:18:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Payet", "Etienne", "" ], [ "Mesnard", "Fred", "" ] ]