id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0508108 | Tristan Denmat | Tristan Denmat, Arnaud Gotlieb and Mireille Ducasse | Proving or Disproving likely Invariants with Constraint Reasoning | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078 | null | null | null | cs.SE cs.PL | null | A program invariant is a property that holds for every execution of the
program. Recent work suggest to infer likely-only invariants, via dynamic
analysis. A likely invariant is a property that holds for some executions but
is not guaranteed to hold for all executions. In this paper, we present work in
progress addressing the challenging problem of automatically verifying that
likely invariants are actual invariants. We propose a constraint-based
reasoning approach that is able, unlike other approaches, to both prove or
disprove likely invariants. In the latter case, our approach provides
counter-examples. We illustrate the approach on a motivating example where
automatically generated likely invariants are verified.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 13:30:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Denmat",
"Tristan",
""
],
[
"Gotlieb",
"Arnaud",
""
],
[
"Ducasse",
"Mireille",
""
]
]
|
cs/0508109 | William Heaven | William Heaven and Alessandra Russo | Enhancing the Alloy Analyzer with Patterns of Analysis | 17 pages, 15th Workshop on Logic Programming Environments (WLPE05),
Sitges (Barcelona), Spain, 2005 | 15th Workshop on Logic Programming Environments (WLPE05), Sitges
(Barcelona), Spain, 2005 | null | null | cs.SE cs.LO | null | Formal techniques have been shown to be useful in the development of correct
software. But the level of expertise required of practitioners of these
techniques prohibits their widespread adoption. Formal techniques need to be
tailored to the commercial software developer. Alloy is a lightweight
specification language supported by the Alloy Analyzer (AA), a tool based on
off-the-shelf SAT technology. The tool allows a user to check interactively
whether given properties are consistent or valid with respect to a high-level
specification, providing an environment in which the correctness of such a
specification may be established. However, Alloy is not particularly suited to
expressing program specifications and the feedback provided by AA can be
misleading where the specification under analysis or the property being checked
contains inconsistencies. In this paper, we address these two shortcomings.
Firstly, we present a lightweight language called "Loy", tailored to the
specification of object-oriented programs. An encoding of Loy into Alloy is
provided so that AA can be used for automated analysis of Loy program
specifications. Secondly, we present some "patterns of analysis" that guide a
developer through the analysis of a Loy specification in order to establish its
correctness before implementation.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 15:35:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heaven",
"William",
""
],
[
"Russo",
"Alessandra",
""
]
]
|
cs/0508110 | Ali Bagherzandi | Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri and Mahmoud
Salmasizadeh | Relations between semantic security and indistinguishability against
cpa, non-adaptive cca and adaptive cca in comparison based framework | 8 pages, 1 figure | null | null | null | cs.CR | null | In this paper we try to unify the frameworks of definitions of semantic
security, indistinguishability and non-malleability by defining semantic
security in comparison based framework. This facilitates the study of relations
among these goals against different attack models and makes the proof of the
equivalence of semantic security and indistinguishability easier and more
understandable. Besides, our proof of the equivalence of semantic security and
indistinguishability does not need any intermediate goals such as non
devidability to change the definition framework.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2005 04:58:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bagherzandi",
"Ali",
""
],
[
"Azimian",
"Kooshiar",
""
],
[
"Mohajeri",
"Javad",
""
],
[
"Salmasizadeh",
"Mahmoud",
""
]
]
|
cs/0508111 | Elvira Albert | German Puebla, Elvira Albert, Manuel Hermenegildo | A Generic Framework for the Analysis and Specialization of Logic
Programs | In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078 | null | null | null | cs.PL cs.SE | null | The relationship between abstract interpretation and partial deduction has
received considerable attention and (partial) integrations have been proposed
starting from both the partial deduction and abstract interpretation
perspectives. In this work we present what we argue is the first fully
described generic algorithm for efficient and precise integration of abstract
interpretation and partial deduction. Taking as starting point state-of-the-art
algorithms for context-sensitive, polyvariant abstract interpretation and
(abstract) partial deduction, we present an algorithm which combines the best
of both worlds. Key ingredients include the accurate success propagation
inherent to abstract interpretation and the powerful program transformations
achievable by partial deduction. In our algorithm, the calls which appear in
the analysis graph are not analyzed w.r.t. the original definition of the
procedure but w.r.t. specialized definitions of these procedures. Such
specialized definitions are obtained by applying both unfolding and abstract
executability. Our framework is parametric w.r.t. different control strategies
and abstract domains. Different combinations of such parameters correspond to
existing algorithms for program analysis and specialization. Simultaneously,
our approach opens the door to the efficient computation of strictly more
precise results than those achievable by each of the individual techniques. The
algorithm is now one of the key components of the CiaoPP analysis and
specialization system.
| [
{
"version": "v1",
"created": "Wed, 24 Aug 2005 21:50:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Puebla",
"German",
""
],
[
"Albert",
"Elvira",
""
],
[
"Hermenegildo",
"Manuel",
""
]
]
|
cs/0508113 | Gilles Villard | Claude-Pierre Jeannerod (LIP), Gilles Villard (LIP) | Asymptotically fast polynomial matrix algorithms for multivariable
systems | null | null | null | JeVi05 | cs.SC cs.CC | null | We present the asymptotically fastest known algorithms for some basic
problems on univariate polynomial matrices: rank, nullspace, determinant,
generic inverse, reduced form. We show that they essentially can be reduced to
two computer algebra techniques, minimal basis computations and matrix fraction
expansion/reconstruction, and to polynomial matrix multiplication. Such
reductions eventually imply that all these problems can be solved in about the
same amount of time as polynomial matrix multiplication.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2005 13:52:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jeannerod",
"Claude-Pierre",
"",
"LIP"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
]
|
cs/0508116 | Robert Burger PhD | John Robert Burger | Quantum Algorithm Processors to Reveal Hamiltonian Cycles | 10 pages | null | null | null | cs.AR cs.CG | null | Quantum computer versus quantum algorithm processor in CMOS are compared to
find (in parallel) all Hamiltonian cycles in a graph with m edges and n
vertices, each represented by k bits. A quantum computer uses quantum states
analogous to CMOS registers. With efficient initialization, number of CMOS
registers is proportional to (n-1)! Number of qubits in a quantum computer is
approximately proportional to kn+2mn in the approach below. Using CMOS, the
bits per register is about proportional to kn, which is less since bits can be
irreversibly reset. In either concept, number of gates, or operations to
identify Hamiltonian cycles is proportional to kmn. However, a quantum computer
needs an additional exponentially large number of operations to accomplish a
probabilistic readout. In contrast, CMOS is deterministic and readout is
comparable to ordinary memory.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2005 19:04:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
]
|
cs/0508117 | Xi Shen | Xi Shen (1), Philippe De Wilde (2) ((1) Imperial College London,
United Kingdom, (2) Heriot-Watt University, United Kingdom) | Long-term neuronal behavior caused by two synaptic modification
mechanisms | 11 pages, 5 figures | null | null | null | cs.NE cs.CE | null | We report the first results of simulating the coupling of neuronal,
astrocyte, and cerebrovascular activity. It is suggested that the dynamics of
the system is different from systems that only include neurons. In the
neuron-vascular coupling, distribution of synapse strengths affects neuronal
behavior and thus balance of the blood flow; oscillations are induced in the
neuron-to-astrocyte coupling.
| [
{
"version": "v1",
"created": "Fri, 26 Aug 2005 10:38:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shen",
"Xi",
""
],
[
"De Wilde",
"Philippe",
""
]
]
|
cs/0508120 | Vyacheslav Gorshkov Mr | Gennady P. Berman, Vyacheslav N. Gorshkov, Edward P. MacKerrow
(Theoretical Division, Los Alamos National Laboratory), and Xidi Wang (Global
Consumer Bank, Citigroup) | Iterative Algorithm for Finding Frequent Patterns in Transactional
Databases | 13 pages, 8 tables and figures | null | null | null | cs.DB | null | A high-performance algorithm for searching for frequent patterns (FPs) in
transactional databases is presented. The search for FPs is carried out by
using an iterative sieve algorithm by computing the set of enclosed cycles. In
each inner cycle of level FPs composed of elements are generated. The assigned
number of enclosed cycles (the parameter of the problem) defines the maximum
length of the desired FPs. The efficiency of the algorithm is produced by (i)
the extremely simple logical searching scheme, (ii) the avoidance of recursive
procedures, and (iii) the usage of only one-dimensional arrays of integers.
| [
{
"version": "v1",
"created": "Fri, 26 Aug 2005 21:05:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Berman",
"Gennady P.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"Gorshkov",
"Vyacheslav N.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"MacKerrow",
"Edward P.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"Wang",
"Xidi",
"",
"Global\n Consumer Bank, Citigroup"
]
]
|
cs/0508125 | Sheng Bao | Sheng Bao, De-Shun Zheng | A Sorting Algorithm Based on Calculation | null | null | null | null | cs.DS | null | This article introduces an adaptive sorting algorithm that can relocate
elements accurately by substituting their values into a function which we name
it the guessing function. We focus on building this function which is the
mapping relationship between record values and their corresponding sorted
locations essentially. The time complexity of this algorithm O(n),when records
distributed uniformly. Additionally, similar approach can be used in the
searching algorithm.
| [
{
"version": "v1",
"created": "Mon, 29 Aug 2005 14:22:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bao",
"Sheng",
""
],
[
"Zheng",
"De-Shun",
""
]
]
|
cs/0508128 | Dmitry Zinoviev | Dmitry Zinoviev | Mapping DEVS Models onto UML Models | 6 pages, 4 figures Presented at Simulation Multiconference 2005 | D. Zinoviev, "Mapping DEVS Models onto UML Models," Proc. of the
2005 DEVS Integrative M&S Symposium, San Diego, CA, April 2005, pp. 101-106 | null | null | cs.OH | null | Discrete event simulation specification (DEVS) is a formalism designed to
describe both discrete state and continuous state systems. It is a powerful
abstract mathematical notation. However, until recently it lacked proper
graphical representation, which made computer simulation of DEVS models a
challenging issue. Unified modeling language (UML) is a multipurpose graphical
modeling language, a de-facto industrial modeling standard. There exist several
commercial and open-source UML editors and code generators. Most of them can
save UML models in XML-based XMI files ready for further automated processing.
In this paper, we propose a mapping of DEVS models onto UML state and component
diagrams. This mapping may lead to an eventual unification of the two modeling
formalisms, combining the abstractness of DEVS and expressive power and
``computer friendliness'' of the UML.
| [
{
"version": "v1",
"created": "Tue, 30 Aug 2005 00:02:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zinoviev",
"Dmitry",
""
]
]
|
cs/0508129 | Esra Erdem | Esra Erdem, Vladimir Lifschitz, and Don Ringe | Temporal Phylogenetic Networks and Logic Programming | null | null | null | null | cs.LO cs.AI cs.PL | null | The concept of a temporal phylogenetic network is a mathematical model of
evolution of a family of natural languages. It takes into account the fact that
languages can trade their characteristics with each other when linguistic
communities are in contact, and also that a contact is only possible when the
languages are spoken at the same time. We show how computational methods of
answer set programming and constraint logic programming can be used to generate
plausible conjectures about contacts between prehistoric linguistic
communities, and illustrate our approach by applying it to the evolutionary
history of Indo-European languages.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Tue, 30 Aug 2005 13:04:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Erdem",
"Esra",
""
],
[
"Lifschitz",
"Vladimir",
""
],
[
"Ringe",
"Don",
""
]
]
|
cs/0508130 | Mehul Shah | Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos,
Petros Maniatis, TJ Giuli, Prashanth Bungale | A Fresh Look at the Reliability of Long-term Digital Storage | null | null | null | null | cs.DL cs.DB cs.OS | null | Many emerging Web services, such as email, photo sharing, and web site
archives, need to preserve large amounts of quickly-accessible data
indefinitely into the future. In this paper, we make the case that these
applications' demands on large scale storage systems over long time horizons
require us to re-evaluate traditional storage system designs. We examine
threats to long-lived data from an end-to-end perspective, taking into account
not just hardware and software faults but also faults due to humans and
organizations. We present a simple model of long-term storage failures that
helps us reason about the various strategies for addressing these threats in a
cost-effective manner. Using this model we show that the most important
strategies for increasing the reliability of long-term storage are detecting
latent faults quickly, automating fault repair to make it faster and cheaper,
and increasing the independence of data replicas.
| [
{
"version": "v1",
"created": "Wed, 31 Aug 2005 01:44:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baker",
"Mary",
""
],
[
"Shah",
"Mehul",
""
],
[
"Rosenthal",
"David S. H.",
""
],
[
"Roussopoulos",
"Mema",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Giuli",
"TJ",
""
],
[
"Bungale",
"Prashanth",
""
]
]
|
cs/0508131 | Vygintas Gontis | V. Gontis, B. Kaulakys, J. Ruseckas | Point Process Models of 1/f Noise and Internet Traffic | 6 pages, 2 figures, CNET2004 Proceedings AIP | AIP Conf. Proc. 776, 144 (2005) 144-149 | 10.1063/1.1985385 | null | cs.NI | null | We present a simple model reproducing the long-range autocorrelations and the
power spectrum of the web traffic. The model assumes the traffic as Poisson
flow of files with size distributed according to the power-law. In this model
the long-range autocorrelations are independent of the network properties as
well as of inter-packet time distribution.
| [
{
"version": "v1",
"created": "Wed, 31 Aug 2005 13:53:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gontis",
"V.",
""
],
[
"Kaulakys",
"B.",
""
],
[
"Ruseckas",
"J.",
""
]
]
|
cs/0509005 | Anne-Marie Vercoustre | Alistair McLean (CSIRO Ict Center), Mingfang Wu (CSIRO Ict Center),
Anne-Marie Vercoustre (CSIRO Ict Center) | Combining Structured Corporate Data and Document Content to Improve
Expertise Finding | long version of the ADCS'03 paper | null | null | null | cs.IR | null | In this paper, we present an algorithm for automatically building expertise
evidence for finding experts within an organization by combining structured
corporate information with different content. We also describe our test data
collection and our evaluation method. Evaluation of the algorithm shows that
using organizational structure leads to a significant improvement in the
precision of finding an expert. Furthermore we evaluate the impact of using
different data sources on the quality of the results and conclude that Expert
Finding is not a "one engine fits all" solution. It requires an analysis of the
information space into which a solution will be placed and the appropriate
selection and weighting scheme of the data sources.
| [
{
"version": "v1",
"created": "Fri, 2 Sep 2005 08:24:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McLean",
"Alistair",
"",
"CSIRO Ict Center"
],
[
"Wu",
"Mingfang",
"",
"CSIRO Ict Center"
],
[
"Vercoustre",
"Anne-Marie",
"",
"CSIRO Ict Center"
]
]
|
cs/0509011 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | Clustering Mixed Numeric and Categorical Data: A Cluster Ensemble
Approach | 14 pages | null | null | Tr-2002-10 | cs.AI | null | Clustering is a widely used technique in data mining applications for
discovering patterns in underlying data. Most traditional clustering algorithms
are limited to handling datasets that contain either numeric or categorical
attributes. However, datasets with mixed types of attributes are common in real
life data mining applications. In this paper, we propose a novel
divide-and-conquer technique to solve this problem. First, the original mixed
dataset is divided into two sub-datasets: the pure categorical dataset and the
pure numeric dataset. Next, existing well established clustering algorithms
designed for different types of datasets are employed to produce corresponding
clusters. Last, the clustering results on the categorical and numeric dataset
are combined as a categorical dataset, on which the categorical data clustering
algorithm is used to get the final clusters. Our contribution in this paper is
to provide an algorithm framework for the mixed attributes clustering problem,
in which existing clustering algorithms can be easily integrated, the
capabilities of different kinds of clustering algorithms and characteristics of
different types of datasets could be fully exploited. Comparisons with other
clustering algorithms on real life datasets illustrate the superiority of our
approach.
| [
{
"version": "v1",
"created": "Mon, 5 Sep 2005 02:47:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
cs/0509017 | Gilles Daniel | Gilles Daniel, Lev Muchnik, Sorin Solomon | Traders imprint themselves by adaptively updating their own avatar | 12 pages, 4 figures, draft of a paper submitted to Artificial
Economics 2005, September 15-16, Lille, France | null | null | null | cs.MA cs.CE | null | Simulations of artificial stock markets were considered as early as 1964 and
multi-agent ones were introduced as early as 1989. Starting the early 90's,
collaborations of economists and physicists produced increasingly realistic
simulation platforms. Currently, the market stylized facts are easily
reproduced and one has now to address the realistic details of the Market
Microstructure and of the Traders Behaviour. This calls for new methods and
tools capable of bridging smoothly between simulations and experiments in
economics.
We propose here the following Avatar-Based Method (ABM). The subjects
implement and maintain their Avatars (programs encoding their personal decision
making procedures) on NatLab, a market simulation platform. Once these
procedures are fed in a computer edible format, they can be operationally used
as such without the need for belabouring, interpreting or conceptualising them.
Thus ABM short-circuits the usual behavioural economics experiments that search
for the psychological mechanisms underlying the subjects behaviour. Finally,
ABM maintains a level of objectivity close to the classical behaviourism while
extending its scope to subjects' decision making mechanisms.
We report on experiments where Avatars designed and maintained by humans from
different backgrounds (including real traders) compete in a continuous
double-auction market. We hope this unbiased way of capturing the adaptive
evolution of real subjects behaviour may lead to a new kind of behavioural
economics experiments with a high degree of reliability, analysability and
reproducibility.
| [
{
"version": "v1",
"created": "Tue, 6 Sep 2005 17:02:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Daniel",
"Gilles",
""
],
[
"Muchnik",
"Lev",
""
],
[
"Solomon",
"Sorin",
""
]
]
|
cs/0509018 | David S. H. Rosenthal | David S. H. Rosenthal, Thomas S. Robertson, Tom Lipkis, Vicky Reich,
Seth Morabito | Requirements for Digital Preservation Systems: A Bottom-Up Approach | null | null | null | null | cs.DL | null | The field of digital preservation is being defined by a set of standards
developed top-down, starting with an abstract reference model (OAIS) and
gradually adding more specific detail. Systems claiming conformance to these
standards are entering production use. Work is underway to certify that systems
conform to requirements derived from OAIS.
We complement these requirements derived top-down by presenting an alternate,
bottom-up view of the field. The fundamental goal of these systems is to ensure
that the information they contain remains accessible for the long term. We
develop a parallel set of requirements based on observations of how existing
systems handle this task, and on an analysis of the threats to achieving the
goal. On this basis we suggest disclosures that systems should provide as to
how they satisfy their goals.
| [
{
"version": "v1",
"created": "Tue, 6 Sep 2005 19:26:08 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Sep 2005 20:17:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rosenthal",
"David S. H.",
""
],
[
"Robertson",
"Thomas S.",
""
],
[
"Lipkis",
"Tom",
""
],
[
"Reich",
"Vicky",
""
],
[
"Morabito",
"Seth",
""
]
]
|
cs/0509020 | Johannes Stegmann Dr. | Johannes Stegmann, Guenter Grohmann (Charite, Berlin) | Transitive Text Mining for Information Extraction and Hypothesis
Generation | 12 pages, 6 figures | null | null | null | cs.IR cs.AI | null | Transitive text mining - also named Swanson Linking (SL) after its primary
and principal researcher - tries to establish meaningful links between
literature sets which are virtually disjoint in the sense that each does not
mention the main concept of the other. If successful, SL may give rise to the
development of new hypotheses. In this communication we describe our approach
to transitive text mining which employs co-occurrence analysis of the medical
subject headings (MeSH), the descriptors assigned to papers indexed in PubMed.
In addition, we will outline the current state of our web-based information
system which will enable our users to perform literature-driven hypothesis
building on their own.
| [
{
"version": "v1",
"created": "Wed, 7 Sep 2005 12:16:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stegmann",
"Johannes",
"",
"Charite, Berlin"
],
[
"Grohmann",
"Guenter",
"",
"Charite, Berlin"
]
]
|
cs/0509024 | Nikolay Pelov | Nikolay Pelov, Marc Denecker, Maurice Bruynooghe | Well-founded and Stable Semantics of Logic Programs with Aggregates | 54 pages; To appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.LO | null | In this paper, we present a framework for the semantics and the computation
of aggregates in the context of logic programming. In our study, an aggregate
can be an arbitrary interpreted second order predicate or function. We define
extensions of the Kripke-Kleene, the well-founded and the stable semantics for
aggregate programs. The semantics is based on the concept of a three-valued
immediate consequence operator of an aggregate program. Such an operator
approximates the standard two-valued immediate consequence operator of the
program, and induces a unique Kripke-Kleene model, a unique well-founded model
and a collection of stable models. We study different ways of defining such
operators and thus obtain a framework of semantics, offering different
trade-offs between precision and tractability. In particular, we investigate
conditions on the operator that guarantee that the computation of the three
types of semantics remains on the same level as for logic programs without
aggregates. Other results show that, in practice, even efficient three-valued
immediate consequence operators which are very low in the precision hierarchy,
still provide optimal precision.
| [
{
"version": "v1",
"created": "Thu, 8 Sep 2005 19:54:53 GMT"
},
{
"version": "v2",
"created": "Mon, 15 May 2006 18:41:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pelov",
"Nikolay",
""
],
[
"Denecker",
"Marc",
""
],
[
"Bruynooghe",
"Maurice",
""
]
]
|
cs/0509025 | Jeremy Avigad | Jeremy Avigad, Kevin Donnelly, David Gray, and Paul Raff | A formally verified proof of the prime number theorem | 23 pages | null | null | null | cs.AI cs.LO cs.SC | null | The prime number theorem, established by Hadamard and de la Vall'ee Poussin
independently in 1896, asserts that the density of primes in the positive
integers is asymptotic to 1 / ln x. Whereas their proofs made serious use of
the methods of complex analysis, elementary proofs were provided by Selberg and
Erd"os in 1948. We describe a formally verified version of Selberg's proof,
obtained using the Isabelle proof assistant.
| [
{
"version": "v1",
"created": "Fri, 9 Sep 2005 15:47:35 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jan 2006 21:18:33 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2006 20:27:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Donnelly",
"Kevin",
""
],
[
"Gray",
"David",
""
],
[
"Raff",
"Paul",
""
]
]
|
cs/0509026 | Mikkel Thorup | Nick Duffield, Carsten Lund, Mikkel Thorup | Sampling to estimate arbitrary subset sums | null | null | null | null | cs.DS | null | Starting with a set of weighted items, we want to create a generic sample of
a certain size that we can later use to estimate the total weight of arbitrary
subsets. For this purpose, we propose priority sampling which tested on
Internet data performed better than previous methods by orders of magnitude.
Priority sampling is simple to define and implement: we consider a steam of
items i=0,...,n-1 with weights w_i. For each item i, we generate a random
number r_i in (0,1) and create a priority q_i=w_i/r_i. The sample S consists of
the k highest priority items. Let t be the (k+1)th highest priority. Each
sampled item i in S gets a weight estimate W_i=max{w_i,t}, while non-sampled
items get weight estimate W_i=0.
Magically, it turns out that the weight estimates are unbiased, that is,
E[W_i]=w_i, and by linearity of expectation, we get unbiased estimators over
any subset sum simply by adding the sampled weight estimates from the subset.
Also, we can estimate the variance of the estimates, and surpricingly, there is
no co-variance between different weight estimates W_i and W_j.
We conjecture an extremely strong near-optimality; namely that for any weight
sequence, there exists no specialized scheme for sampling k items with unbiased
estimators that gets smaller total variance than priority sampling with k+1
items. Very recently Mario Szegedy has settled this conjecture.
| [
{
"version": "v1",
"created": "Fri, 9 Sep 2005 21:47:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Duffield",
"Nick",
""
],
[
"Lund",
"Carsten",
""
],
[
"Thorup",
"Mikkel",
""
]
]
|
cs/0509027 | Laemmel | Oleg Kiselyov and Ralf Laemmel | Haskell's overlooked object system | 79 pages; software available at
http://homepages.cwi.nl/~ralf/OOHaskell/ | null | null | null | cs.PL | null | Haskell provides type-class-bounded and parametric polymorphism as opposed to
subtype polymorphism of object-oriented languages such as Java and OCaml. It is
a contentious question whether Haskell 98 without extensions, or with common
extensions, or with new extensions can fully support conventional
object-oriented programming with encapsulation, mutable state, inheritance,
overriding, statically checked implicit and explicit subtyping, and so on. We
systematically substantiate that Haskell 98, with some common extensions,
supports all the conventional OO features plus more advanced ones, including
first-class lexically scoped classes, implicitly polymorphic classes, flexible
multiple inheritance, safe downcasts and safe co-variant arguments. Haskell
indeed can support width and depth, structural and nominal subtyping. We
address the particular challenge to preserve Haskell's type inference even for
objects and object-operating functions. The OO features are introduced in
Haskell as the OOHaskell library. OOHaskell lends itself as a sandbox for typed
OO language design.
| [
{
"version": "v1",
"created": "Sat, 10 Sep 2005 12:35:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kiselyov",
"Oleg",
""
],
[
"Laemmel",
"Ralf",
""
]
]
|
cs/0509030 | Liu Jun-Bao Dr. | Liu Jun-Bao, Xiao Guo-Zhen | Multi-Proxy Multi-Signcryption Scheme from Pairings | 4 pages | null | null | null | cs.CR | null | A first multi-proxy multi-signcryption scheme from pairings, which
efficiently combines a multi-proxy multi-signature scheme with a signcryption,
is proposed. Its security is analyzed in detail. In our scheme, a proxy
signcrypter group could be authorized as a proxy agent by the cooperation of
all members in the original signcrypter group. Then the proxy signcryptions can
be generated by the cooperation of all the signcrypters in the authorized proxy
signcrypter group on behalf of the original signcrypter group. The correctness
and the security of this scheme are proved.
| [
{
"version": "v1",
"created": "Mon, 12 Sep 2005 12:51:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jun-Bao",
"Liu",
""
],
[
"Guo-Zhen",
"Xiao",
""
]
]
|
cs/0509031 | David S. Johnson | Janos Csirik, David S. Johnson, and Claire Kenyon | On the Worst-case Performance of the Sum-of-Squares Algorithm for Bin
Packing | null | null | null | null | cs.DS | null | The Sum of Squares algorithm for bin packing was defined in [2] and studied
in great detail in [1], where it was proved that its worst case performance
ratio is at most 3. In this note, we improve the asymptotic worst case bound to
2.7777...
| [
{
"version": "v1",
"created": "Mon, 12 Sep 2005 14:49:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Csirik",
"Janos",
""
],
[
"Johnson",
"David S.",
""
],
[
"Kenyon",
"Claire",
""
]
]
|
cs/0509033 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng, Bin Dong | K-Histograms: An Efficient Clustering Algorithm for Categorical Dataset | 11 pages | null | null | Tr-2003-08 | cs.AI | null | Clustering categorical data is an integral part of data mining and has
attracted much attention recently. In this paper, we present k-histogram, a new
efficient algorithm for clustering categorical data. The k-histogram algorithm
extends the k-means algorithm to categorical domain by replacing the means of
clusters with histograms, and dynamically updates histograms in the clustering
process. Experimental results on real datasets show that k-histogram algorithm
can produce better clustering results than k-modes algorithm, the one related
with our work most closely.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2005 06:33:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
],
[
"Dong",
"Bin",
""
]
]
|
cs/0509034 | Maurice Pouzet | Maurice Pouzet (ICJ), Nejib Zaguia (SITE) | N-free extensions of posets.Note on a theorem of P.A.Grillet | 7 pages, 4 pictures | null | null | null | cs.DM | null | Let $S\_{N}(P)$ be the poset obtained by adding a dummy vertex on each
diagonal edge of the $N$'s of a finite poset $P$. We show that
$S\_{N}(S\_{N}(P))$ is $N$-free. It follows that this poset is the smallest
$N$-free barycentric subdivision of the diagram of $P$, poset whose existence
was proved by P.A. Grillet. This is also the poset obtained by the algorithm
starting with $P\_0:=P$ and consisting at step $m$ of adding a dummy vertex on
a diagonal edge of some $N$ in $P\_m$, proving that the result of this
algorithm does not depend upon the particular choice of the diagonal edge
choosen at each step. These results are linked to drawing of posets.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2005 08:29:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pouzet",
"Maurice",
"",
"ICJ"
],
[
"Zaguia",
"Nejib",
"",
"SITE"
]
]
|
cs/0509036 | Shujun Li Dr. | Shujun Li and Kwok-Tung Lo | Security Problems with Improper Implementations of Improved FEA-M | 8 pages, elsart.cls | Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, 2007 | 10.1016/j.jss.2006.05.002 | null | cs.CR cs.MM | null | This paper reports security problems with improper implementations of an
improved version of FEA-M (fast encryption algorithm for multimedia). It is
found that an implementation-dependent differential chosen-plaintext attack or
its chosen-ciphertext counterpart can reveal the secret key of the
cryptosystem, if the involved (pseudo-)random process can be tampered (for
example, through a public time service). The implementation-dependent
differential attack is very efficient in complexity and needs only $O(n^2)$
chosen plaintext or ciphertext bits. In addition, this paper also points out a
minor security problem with the selection of the session key. In real
implementations of the cryptosystem, these security problems should be
carefully avoided, or the cryptosystem has to be further enhanced to work under
such weak implementations.
| [
{
"version": "v1",
"created": "Tue, 13 Sep 2005 10:35:52 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Jun 2006 12:20:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Lo",
"Kwok-Tung",
""
]
]
|
cs/0509037 | David Hales | David Hales, Stefano Arteconi | Friends for Free: Self-Organizing Artificial Social Networks for Trust
and Cooperation | null | null | null | null | cs.MA | null | By harvesting friendship networks from e-mail contacts or instant message
"buddy lists" Peer-to-Peer (P2P) applications can improve performance in low
trust environments such as the Internet. However, natural social networks are
not always suitable, reliable or available. We propose an algorithm (SLACER)
that allows peer nodes to create and manage their own friendship networks.
We evaluate performance using a canonical test application, requiring
cooperation between peers for socially optimal outcomes. The Artificial Social
Networks (ASN) produced are connected, cooperative and robust - possessing many
of the disable properties of human friendship networks such as trust between
friends (directly linked peers) and short paths linking everyone via a chain of
friends.
In addition to new application possibilities, SLACER could supply ASN to P2P
applications that currently depend on human social networks thus transforming
them into fully autonomous, self-managing systems.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 07:30:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hales",
"David",
""
],
[
"Arteconi",
"Stefano",
""
]
]
|
cs/0509038 | Vilhelm Dahll\"of | Vilhelm Dahllof | Algorithms for Max Hamming Exact Satisfiability | null | null | null | null | cs.DS | null | We here study Max Hamming XSAT, ie, the problem of finding two XSAT models at
maximum Hamming distance. By using a recent XSAT solver as an auxiliary
function, an O(1.911^n) time algorithm can be constructed, where n is the
number of variables. This upper time bound can be further improved to
O(1.8348^n) by introducing a new kind of branching, more directly suited for
finding models at maximum Hamming distance. The techniques presented here are
likely to be of practical use as well as of theoretical value, proving that
there are non-trivial algorithms for maximum Hamming distance problems.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 09:04:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dahllof",
"Vilhelm",
""
]
]
|
cs/0509040 | Christian Betz | Christian Betz, Alexander Hoernlein and Frank Puppe | Authoring case based training by document data extraction | 11 pages, 10th ChEM Workshop, 2005; technical article | null | null | null | cs.AI cs.IR | null | In this paper, we propose an scalable approach to modeling based upon word
processing documents, and we describe the tool Phoenix providing the technical
infrastructure.
For our training environment d3web.Train, we developed a tool to extract case
knowledge from existing documents, usually dismissal records, extending Phoenix
to d3web.CaseImporter. Independent authors used this tool to develop training
systems, observing a significant decrease of time for setteling-in and a
decrease of time necessary for developing a case.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 13:20:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Betz",
"Christian",
""
],
[
"Hoernlein",
"Alexander",
""
],
[
"Puppe",
"Frank",
""
]
]
|
cs/0509042 | Mark Braverman | Mark Braverman, Stephen Cook | Computing over the Reals: Foundations for Scientific Computing | null | null | null | null | cs.CC cs.LO | null | We give a detailed treatment of the ``bit-model'' of computability and
complexity of real functions and subsets of R^n, and argue that this is a good
way to formalize many problems of scientific computation. In the introduction
we also discuss the alternative Blum-Shub-Smale model. In the final section we
discuss the issue of whether physical systems could defeat the Church-Turing
Thesis.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 17:58:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Braverman",
"Mark",
""
],
[
"Cook",
"Stephen",
""
]
]
|
cs/0509050 | Martyn Amos | Martyn Amos and Andrew Wood | Effect of door delay on aircraft evacuation time | 8 pages, 2 figures | null | null | null | cs.MA | null | The recent commercial launch of twin-deck Very Large Transport Aircraft
(VLTA) such as the Airbus A380 has raised questions concerning the speed at
which they may be evacuated. The abnormal height of emergency exits on the
upper deck has led to speculation that emotional factors such as fear may lead
to door delay, and thus play a significant role in increasing overall
evacuation time. Full-scale evacuation tests are financially expensive and
potentially hazardous, and systematic studies of the evacuation of VLTA are
rare. Here we present a computationally cheap agent-based framework for the
general simulation of aircraft evacuation, and apply it to the particular case
of the Airbus A380. In particular, we investigate the effect of door delay, and
conclude that even a moderate average delay can lead to evacuation times that
exceed the maximum for safety certification. The model suggests practical ways
to minimise evacuation time, as well as providing a general framework for the
simulation of evacuation.
| [
{
"version": "v1",
"created": "Fri, 16 Sep 2005 17:15:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Amos",
"Martyn",
""
],
[
"Wood",
"Andrew",
""
]
]
|
cs/0509053 | Joshua Brandon Holden | Joshua Holden, Richard Layton, Laurence Merkle, and Tina Hudson | Underwater Hacker Missile Wars: A Cryptography and Engineering Contest | 11 pages, 3 figures, uses amsrefs.sty v2.0 and cryptologiabib.sty
(included); to appear in Cryptologia | Cryptologia, 30:69--77, 2006 | null | null | cs.CR cs.CE | null | For a recent student conference, the authors developed a day-long design
problem and competition suitable for engineering, mathematics and science
undergraduates. The competition included a cryptography problem, for which a
workshop was run during the conference. This paper describes the competition,
focusing on the cryptography problem and the workshop. Notes from the workshop
and code for the computer programs are made available via the Internet. The
results of a personal self-evaluation (PSE) are described.
| [
{
"version": "v1",
"created": "Sun, 18 Sep 2005 22:11:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Holden",
"Joshua",
""
],
[
"Layton",
"Richard",
""
],
[
"Merkle",
"Laurence",
""
],
[
"Hudson",
"Tina",
""
]
]
|
cs/0509054 | Joseph O'Rourke | Mirela Damian, Robin Flatland, Joseph O'Rourke | Grid Vertex-Unfolding Orthogonal Polyhedra | Original: 12 pages, 8 figures, 11 references. Revised: 22 pages, 16
figures, 12 references. New version is a substantial revision superceding the
preliminary extended abstract that appeared in Lecture Notes in Computer
Science, Volume 3884, Springer, Berlin/Heidelberg, Feb. 2006, pp. 264-276 | null | null | null | cs.CG cs.DM | null | An edge-unfolding of a polyhedron is produced by cutting along edges and
flattening the faces to a *net*, a connected planar piece with no overlaps. A
*grid unfolding* allows additional cuts along grid edges induced by coordinate
planes passing through every vertex. A vertex-unfolding permits faces in the
net to be connected at single vertices, not necessarily along edges. We show
that any orthogonal polyhedron of genus zero has a grid vertex-unfolding.
(There are orthogonal polyhedra that cannot be vertex-unfolded, so some type of
"gridding" of the faces is necessary.) For any orthogonal polyhedron P with n
vertices, we describe an algorithm that vertex-unfolds P in O(n^2) time.
Enroute to explaining this algorithm, we present a simpler vertex-unfolding
algorithm that requires a 3 x 1 refinement of the vertex grid.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 00:22:03 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2006 18:21:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
]
]
|
cs/0509055 | Vikas Hamine | Vikas Hamine and Paul Helman | Learning Optimal Augmented Bayes Networks | 4 pages, 1 figure | null | null | TR-CS-2004-11 | cs.LG | null | Naive Bayes is a simple Bayesian classifier with strong independence
assumptions among the attributes. This classifier, desipte its strong
independence assumptions, often performs well in practice. It is believed that
relaxing the independence assumptions of a naive Bayes classifier may improve
the classification accuracy of the resulting structure. While finding an
optimal unconstrained Bayesian Network (for most any reasonable scoring
measure) is an NP-hard problem, it is possible to learn in polynomial time
optimal networks obeying various structural restrictions. Several authors have
examined the possibilities of adding augmenting arcs between attributes of a
Naive Bayes classifier. Friedman, Geiger and Goldszmidt define the TAN
structure in which the augmenting arcs form a tree on the attributes, and
present a polynomial time algorithm that learns an optimal TAN with respect to
MDL score. Keogh and Pazzani define Augmented Bayes Networks in which the
augmenting arcs form a forest on the attributes (a collection of trees, hence a
relaxation of the stuctural restriction of TAN), and present heuristic search
methods for learning good, though not optimal, augmenting arc sets. The
authors, however, evaluate the learned structure only in terms of observed
misclassification error and not against a scoring metric, such as MDL. In this
paper, we present a simple, polynomial time greedy algorithm for learning an
optimal Augmented Bayes Network with respect to MDL score.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 04:57:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hamine",
"Vikas",
""
],
[
"Helman",
"Paul",
""
]
]
|
cs/0509056 | David Freeman | David Freeman | Pairing-based identification schemes | null | null | null | null | cs.CR | null | We propose four different identification schemes that make use of bilinear
pairings, and prove their security under certain computational assumptions.
Each of the schemes is more efficient and/or more secure than any known
pairing-based identification scheme.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 07:52:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Freeman",
"David",
""
]
]
|
cs/0509057 | Todd Veldhuizen | Todd L. Veldhuizen | Language embeddings that preserve staging and safety | null | null | null | null | cs.PL | null | We study embeddings of programming languages into one another that preserve
what reductions take place at compile-time, i.e., staging. A certain condition
-- what we call a `Turing complete kernel' -- is sufficient for a language to
be stage-universal in the sense that any language may be embedded in it while
preserving staging. A similar line of reasoning yields the notion of
safety-preserving embeddings, and a useful characterization of
safety-universality. Languages universal with respect to staging and safety are
good candidates for realizing domain-specific embedded languages (DSELs) and
`active libraries' that provide domain-specific optimizations and safety
checks.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 15:30:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Veldhuizen",
"Todd L.",
""
]
]
|
cs/0509060 | Lane A. Hemaspaandra | Lane A. Hemaspaandra, Christopher M. Homan, Sven Kosub | Cluster Computing and the Power of Edge Recognition | null | null | null | URCS-TR-2005-878 | cs.CC cs.DM | null | We study the robustness--the invariance under definition changes--of the
cluster class CL#P [HHKW05]. This class contains each #P function that is
computed by a balanced Turing machine whose accepting paths always form a
cluster with respect to some length-respecting total order with efficient
adjacency checks. The definition of CL#P is heavily influenced by the defining
paper's focus on (global) orders. In contrast, we define a cluster class,
CLU#P, to capture what seems to us a more natural model of cluster computing.
We prove that the naturalness is costless: CL#P = CLU#P. Then we exploit the
more natural, flexible features of CLU#P to prove new robustness results for
CL#P and to expand what is known about the closure properties of CL#P.
The complexity of recognizing edges--of an ordered collection of computation
paths or of a cluster of accepting computation paths--is central to this study.
Most particularly, our proofs exploit the power of unique discovery of
edges--the ability of nondeterministic functions to, in certain settings,
discover on exactly one (in some cases, on at most one) computation path a
critical piece of information regarding edges of orderings or clusters.
| [
{
"version": "v1",
"created": "Mon, 19 Sep 2005 21:25:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Homan",
"Christopher M.",
""
],
[
"Kosub",
"Sven",
""
]
]
|
cs/0509063 | Krzysztof R. Apt | Krzysztof R. Apt | Order Independence and Rationalizability | Appeared in: Proc. of the 10th conference on Theoretical Aspects of
Rationality and Knowledge (TARK X), pp. 22-38 (2005) | null | null | null | cs.GT | null | Two natural strategy elimination procedures have been studied for strategic
games. The first one involves the notion of (strict, weak, etc) dominance and
the second the notion of rationalizability. In the case of dominance the
criterion of order independence allowed us to clarify which notions and under
what circumstances are robust. In the case of rationalizability this criterion
has not been considered. In this paper we investigate the problem of order
independence for rationalizability by focusing on three naturally entailed
reduction relations on games. These reduction relations are distinguished by
the adopted reference point for the notion of a better response. Additionally,
they are parametrized by the adopted system of beliefs. We show that for one
reduction relation the outcome of its (possibly transfinite) iterations does
not depend on the order of elimination of the strategies. This result does not
hold for the other two reduction relations. However, under a natural assumption
the iterations of all three reduction relations yield the same outcome. The
obtained order independence results apply to the frameworks considered in
Bernheim 84 and Pearce 84. For finite games the iterations of all three
reduction relations coincide and the order independence holds for three natural
systems of beliefs considered in the literature.
| [
{
"version": "v1",
"created": "Tue, 20 Sep 2005 08:27:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
]
|
cs/0509066 | Richard McClatchey | David Manset, Richard McClatchey, Flavio Oquendo, Herve Verjus | A Model-driven Approach for Grid Services Engineering | 7 pages, 3 figures. Proc of the 18th international conference on
Software and Systems Engineering and Applications. Paris November 2005 | null | null | null | cs.SE cs.DC | null | As a consequence to the hype of Grid computing, such systems have seldom been
designed using formal techniques. The complexity and rapidly growing demand
around Grid technologies has favour the use of classical development
techniques, resulting in no guidelines or rules and unstructured engineering
processes. This paper advocates a formal approach to Grid applications
development in an effort to contribute to the rigorous development of Grids
software architectures. This approach addresses cross-platform interoperability
and quality of service; the model-driven paradigm is applied to a formal
architecture-centric engineering method in order to benefit from the formal
semantic description power in addition to model-based transformations. The
result of such a novel combined concept promotes the re-use of design models
and eases developments in Grid computing by providing an adapted development
process and ensuring correctness at each design step.
| [
{
"version": "v1",
"created": "Wed, 21 Sep 2005 17:39:19 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2005 15:36:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Manset",
"David",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Oquendo",
"Flavio",
""
],
[
"Verjus",
"Herve",
""
]
]
|
cs/0509071 | Krzysztof R. Apt | Krzysztof R. Apt, Francesca Rossi and K. Brent Venable | CP-nets and Nash equilibria | 6 pages. in: roc. of the Third International Conference on
Computational Intelligence, Robotics and Autonomous Systems (CIRAS '05). To
appear | null | null | null | cs.GT cs.AI | null | We relate here two formalisms that are used for different purposes in
reasoning about multi-agent systems. One of them are strategic games that are
used to capture the idea that agents interact with each other while pursuing
their own interest. The other are CP-nets that were introduced to express
qualitative and conditional preferences of the users and which aim at
facilitating the process of preference elicitation. To relate these two
formalisms we introduce a natural, qualitative, extension of the notion of a
strategic game. We show then that the optimal outcomes of a CP-net are exactly
the Nash equilibria of an appropriately defined strategic game in the above
sense. This allows us to use the techniques of game theory to search for
optimal outcomes of CP-nets and vice-versa, to use techniques developed for
CP-nets to search for Nash equilibria of the considered games.
| [
{
"version": "v1",
"created": "Thu, 22 Sep 2005 16:07:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"K. Brent",
""
]
]
|
cs/0509072 | Kaikai Shen | Kaikai Shen, Lide Wu | Folksonomy as a Complex Network | null | null | null | null | cs.IR cs.DL physics.soc-ph | null | Folksonomy is an emerging technology that works to classify the information
over WWW through tagging the bookmarks, photos or other web-based contents. It
is understood to be organized by every user while not limited to the authors of
the contents and the professional editors. This study surveyed the folksonomy
as a complex network. The result indicates that the network, which is composed
of the tags from the folksonomy, displays both properties of small world and
scale-free. However, the statistics only shows a local and static slice of the
vast body of folksonomy which is still evolving.
| [
{
"version": "v1",
"created": "Fri, 23 Sep 2005 13:27:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shen",
"Kaikai",
""
],
[
"Wu",
"Lide",
""
]
]
|
cs/0509074 | Assaf Naor | Assaf Naor and Gideon Schechtman | Planar Earthmover is not in $L_1$ | null | null | null | null | cs.CG math.FA | null | We show that any $L_1$ embedding of the transportation cost (a.k.a.
Earthmover) metric on probability measures supported on the grid
$\{0,1,...,n\}^2\subseteq \R^2$ incurs distortion $\Omega(\sqrt{\log n})$. We
also use Fourier analytic techniques to construct a simple $L_1$ embedding of
this space which has distortion $O(\log n)$.
| [
{
"version": "v1",
"created": "Mon, 26 Sep 2005 16:26:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Naor",
"Assaf",
""
],
[
"Schechtman",
"Gideon",
""
]
]
|
cs/0509076 | Anil Bazaz | Anil Bazaz and James D. Arthur | On Vulnerabilities, Constraints and Assumptions | null | null | null | null | cs.CR | null | This report presents a taxonomy of vulnerabilities created as a part of an
effort to develop a framework for deriving verification and validation
strategies to assess software security. This taxonomy is grounded in a
theoretical model of computing, which establishes the relationship between
vulnerabilities, software applications and the computer system resources. This
relationship illustrates that a software application is exploited by violating
constraints imposed by computer system resources and assumptions made about
their usage. In other words, a vulnerability exists in the software application
if it allows violation of these constraints and assumptions. The taxonomy
classifies these constraints and assumptions. The model also serves as a basis
for the classification scheme the taxonomy uses, in which the computer system
resources such as, memory, input/output, and cryptographic resources serve as
categories and subcategories. Vulnerabilities, which are expressed in the form
of constraints and assumptions, are classified according to these categories
and subcategories. This taxonomy is both novel and distinctively different from
other taxonomies found in the literature.
| [
{
"version": "v1",
"created": "Mon, 26 Sep 2005 21:20:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bazaz",
"Anil",
""
],
[
"Arthur",
"James D.",
""
]
]
|
cs/0509082 | Yossi Zana | Yossi Zana, Roberto M. Cesar-JR | Face Recognition Based on Polar Frequency Features | ACM Transactions on Applied Perception | null | null | null | cs.CV | null | A novel biologically motivated face recognition algorithm based on polar
frequency is presented. Polar frequency descriptors are extracted from face
images by Fourier-Bessel transform (FBT). Next, the Euclidean distance between
all images is computed and each image is now represented by its dissimilarity
to the other images. A Pseudo-Fisher Linear Discriminant was built on this
dissimilarity space. The performance of Discrete Fourier transform (DFT)
descriptors, and a combination of both feature types was also evaluated. The
algorithms were tested on a 40- and 1196-subjects face database (ORL and FERET,
respectively). With 5 images per subject in the training and test datasets,
error rate on the ORL database was 3.8, 1.25 and 0.2% for the FBT, DFT, and the
combined classifier, respectively, as compared to 2.6% achieved by the best
previous algorithm. The most informative polar frequency features were
concentrated at low-to-medium angular frequencies coupled to low radial
frequencies. On the FERET database, where an affine normalization
pre-processing was applied, the FBT algorithm outperformed only the PCA in a
rank recognition test. However, it achieved performance comparable to
state-of-the-art methods when evaluated by verification tests. These results
indicate the high informative value of the polar frequency content of face
images in relation to recognition and verification tasks, and that the
Cartesian frequency content can complement information about the subjects'
identity, but possibly only when the images are not pre-normalized. Possible
implications for human face recognition are discussed.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 15:50:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zana",
"Yossi",
""
],
[
"Cesar-JR",
"Roberto M.",
""
]
]
|
cs/0509083 | Yossi Zana | Yossi Zana, Roberto M. Cesar-Jr, Rogerio S. Feris, Matthew Turk | Face Verification in Polar Frequency Domain: a Biologically Motivated
Approach | 2005, International Symposium on Visual Computing (ISVC) | null | null | null | cs.CV | null | We present a novel local-based face verification system whose components are
analogous to those of biological systems. In the proposed system, after global
registration and normalization, three eye regions are converted from the
spatial to polar frequency domain by a Fourier-Bessel Transform. The resulting
representations are embedded in a dissimilarity space, where each image is
represented by its distance to all the other images. In this dissimilarity
space a Pseudo-Fisher discriminator is built. ROC and equal error rate
verification test results on the FERET database showed that the system
performed at least as state-of-the-art methods and better than a system based
on polar Fourier features. The local-based system is especially robust to
facial expression and age variations, but sensitive to registration errors.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 16:06:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zana",
"Yossi",
""
],
[
"Cesar-Jr",
"Roberto M.",
""
],
[
"Feris",
"Rogerio S.",
""
],
[
"Turk",
"Matthew",
""
]
]
|
cs/0509084 | Herbert van de Sompel | Jeroen Bekaert, Xiaoming Liu, Herbert Van de Sompel | Representing Digital Assets for Long-Term Preservation using MPEG-21 DID | Accepted paper for PV 2005 "Ensuring Long-term Preservation and
Adding Value to Scientific and Technical data"
(http://www.ukoln.ac.uk/events/pv-2005/) | null | null | null | cs.DL | null | Various efforts aimed at representing digital assets have emerged from
several communities over the last years, including the Metadata Encoding and
Transmission Standard (METS), the IMS Content Packaging (IMS-CP) XML Binding
and the XML Formatted Data Units (XFDU). The MPEG-21 Digital Item Declaration
(MPEG-21 DID) is another approach that can be used for the representation of
digital assets in XML. This paper will explore the potential of the MPEG-21 DID
in a Digital Preservation context, by looking at the core building blocks of
the OAIS Information Model and the way in which they map to the MPEG-21 DID
abstract model and the MPEG-21 DIDL XML syntax.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 19:05:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bekaert",
"Jeroen",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
|
cs/0509090 | Herbert van de Sompel | Jeroen Bekaert, Herbert Van de Sompel | Access Interfaces for Open Archival Information Systems based on the
OAI-PMH and the OpenURL Framework for Context-Sensitive Services | Accepted paper for PV 2005 "Ensuring Long-term Preservation and
Adding Value to Scientific and Technical data"
(http://www.ukoln.ac.uk/events/pv-2005/) | null | null | null | cs.DL | null | In recent years, a variety of digital repository and archival systems have
been developed and adopted. All of these systems aim at hosting a variety of
compound digital assets and at providing tools for storing, managing and
accessing those assets. This paper will focus on the definition of common and
standardized access interfaces that could be deployed across such diverse
digital respository and archival systems. The proposed interfaces are based on
the two formal specifications that have recently emerged from the Digital
Library community: The Open Archive Initiative Protocol for Metadata Harvesting
(OAI-PMH) and the NISO OpenURL Framework for Context-Sensitive Services
(OpenURL Standard). As will be described, the former allows for the retrieval
of batches of XML-based representations of digital assets, while the latter
facilitates the retrieval of disseminations of a specific digital asset or of
one or more of its constituents. The core properties of the proposed interfaces
are explained in terms of the Reference Model for an Open Archival Information
System (OAIS).
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2005 14:57:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bekaert",
"Jeroen",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
|
cs/0509091 | Gregory Gutin | G. Gutin, A. Rafiey, A. Yeo | Minimum Cost Homomorphisms to Semicomplete Multipartite Digraphs | null | null | null | null | cs.DM | null | For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a {\em homomorphism
of $D$ to $H$} if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed directed
or undirected graph $H$ and an input graph $D$, the problem of verifying
whether there exists a homomorphism of $D$ to $H$ has been studied in a large
number of papers. We study an optimization version of this decision problem.
Our optimization problem is motivated by a real-world problem in defence
logistics and was introduced very recently by the authors and M. Tso.
Suppose we are given a pair of digraphs $D,H$ and a positive integral cost
$c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$
of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. Let $H$ be a fixed digraph. The
minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows:
For input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$,
verify whether there is a homomorphism of $D$ to $H$ and, if it does exist,
find such a homomorphism of minimum cost. In our previous paper we obtained a
dichotomy classification of the time complexity of \MiP for $H$ being a
semicomplete digraph. In this paper we extend the classification to
semicomplete $k$-partite digraphs, $k\ge 3$, and obtain such a classification
for bipartite tournaments.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2005 15:40:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
]
|
cs/0509094 | Carol Minton Morris Ms | Carol Minton Morris | Telling Great Stories: An NSDL Content and Communications System for
Aggregation, Display, and Distribution of News and Features | 3 pages, 2 figures | null | null | null | cs.DL cs.SE | null | Education digital libraries contain cataloged resources as well as contextual
information about innovations in the use of educational technology, exemplar
stories about community activities, and news from various user communities that
include teachers, students, scholars, and developers. Long-standing library
traditions of service, preservation, democratization of knowledge, rich
discourse, equal access, and fair use are evident in library communications
models that both pull in and push out contextual information from multiple
sources integrated with editorial production processes. This paper argues that
a dynamic narrative flow [1] is enabled by effective management of complex
content and communications in a decentralized web-based education digital
library making publishing objects such as aggregations of resources, or
selected parts of objects [4] accessible through a Content and Communications
System. Providing services that encourage patrons to reuse, reflect out, and
contribute resources back [5] to the Library increases the reach and impact of
the National Science Digital Library (NSDL). This system is a model for
distributed content development and effective communications for education
digital libraries in general.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2005 16:28:19 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Oct 2005 21:20:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Morris",
"Carol Minton",
""
]
]
|
cs/0509100 | Shripad Thite | Jeff Erickson (1), Shripad Thite (1), David P. Bunde (1) ((1)
Department of Computer Science, University of Illinois at Urbana-Champaign,
Urbana, IL, USA) | Distance-2 Edge Coloring is NP-Complete | 3 pages, 1 figure in color | null | null | null | cs.DM cs.CC | null | We prove that it is NP-complete to determine whether there exists a
distance-2 edge coloring (strong edge coloring) with 5 colors of a bipartite
2-inductive graph with girth 6 and maximum degree 3.
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2005 13:15:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
],
[
"Thite",
"Shripad",
""
],
[
"Bunde",
"David P.",
""
]
]
|
cs/0510001 | Jo\~ao Vitor Baldini Soares | Jo\~ao V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr.,
Herbert F. Jelinek, Michael J. Cree | Retinal Vessel Segmentation Using the 2-D Morlet Wavelet and Supervised
Classification | 9 pages, 7 figures and 1 table. Accepted for publication in IEEE
Trans Med Imag; added copyright notice | IEEE Trans Med Imag, Vol. 25, no. 9, pp. 1214- 1222, Sep. 2006. | 10.1109/TMI.2006.879967 | null | cs.CV | null | We present a method for automated segmentation of the vasculature in retinal
images. The method produces segmentations by classifying each image pixel as
vessel or non-vessel, based on the pixel's feature vector. Feature vectors are
composed of the pixel's intensity and continuous two-dimensional Morlet wavelet
transform responses taken at multiple scales. The Morlet wavelet is capable of
tuning to specific frequencies, thus allowing noise filtering and vessel
enhancement in a single step. We use a Bayesian classifier with
class-conditional probability density functions (likelihoods) described as
Gaussian mixtures, yielding a fast classification, while being able to model
complex decision surfaces and compare its performance with the linear minimum
squared error classifier. The probability distributions are estimated based on
a training set of labeled pixels obtained from manual segmentations. The
method's performance is evaluated on publicly available DRIVE and STARE
databases of manually labeled non-mydriatic images. On the DRIVE database, it
achieves an area under the receiver operating characteristic (ROC) curve of
0.9598, being slightly superior than that presented by the method of Staal et
al.
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2005 22:27:45 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 17:09:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Soares",
"João V. B.",
""
],
[
"Leandro",
"Jorge J. G.",
""
],
[
"Cesar",
"Roberto M.",
"Jr."
],
[
"Jelinek",
"Herbert F.",
""
],
[
"Cree",
"Michael J.",
""
]
]
|
cs/0510011 | David Delahaye | David Delahaye (CEDRIC), Micaela Mayero (LIPN) | Diophantus' 20th Problem and Fermat's Last Theorem for n=4:
Formalization of Fermat's Proofs in the Coq Proof Assistant | 16 pages | null | null | null | cs.LO cs.SE math.NT | null | We present the proof of Diophantus' 20th problem (book VI of Diophantus'
Arithmetica), which consists in wondering if there exist right triangles whose
sides may be measured as integers and whose surface may be a square. This
problem was negatively solved by Fermat in the 17th century, who used the
"wonderful" method (ipse dixit Fermat) of infinite descent. This method, which
is, historically, the first use of induction, consists in producing smaller and
smaller non-negative integer solutions assuming that one exists; this naturally
leads to a reductio ad absurdum reasoning because we are bounded by zero. We
describe the formalization of this proof which has been carried out in the Coq
proof assistant. Moreover, as a direct and no less historical application, we
also provide the proof (by Fermat) of Fermat's last theorem for n=4, as well as
the corresponding formalization made in Coq.
| [
{
"version": "v1",
"created": "Tue, 4 Oct 2005 08:53:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Delahaye",
"David",
"",
"CEDRIC"
],
[
"Mayero",
"Micaela",
"",
"LIPN"
]
]
|
cs/0510013 | Luc Bouganim | Luc Bouganim (INRIA Rocquencourt), Cosmin Cremarenco (INRIA
Rocquencourt), Fran\c{c}ois Dang Ngoc (INRIA Rocquencourt, PRISM - UVSQ),
Nicolas Dieu (INRIA Rocquencourt), Philippe Pucheral (INRIA Rocquencourt,
PRISM - UVSQ) | Safe Data Sharing and Data Dissemination on Smart Devices | null | null | null | null | cs.CR cs.DB | null | The erosion of trust put in traditional database servers, the growing
interest for different forms of data dissemination and the concern for
protecting children from suspicious Internet content are different factors that
lead to move the access control from servers to clients. Several encryption
schemes can be used to serve this purpose but all suffer from a static way of
sharing data. In a precedent paper, we devised smarter client-based access
control managers exploiting hardware security elements on client devices. The
goal pursued is being able to evaluate dynamic and personalized access control
rules on a ciphered XML input document, with the benefit of dissociating access
rights from encryption. In this demonstration, we validate our solution using a
real smart card platform and explain how we deal with the constraints usually
met on hardware security elements (small memory and low throughput). Finally,
we illustrate the generality of the approach and the easiness of its deployment
through two different applications: a collaborative application and a parental
control application on video streams.
| [
{
"version": "v1",
"created": "Wed, 5 Oct 2005 12:14:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bouganim",
"Luc",
"",
"INRIA Rocquencourt"
],
[
"Cremarenco",
"Cosmin",
"",
"INRIA\n Rocquencourt"
],
[
"Ngoc",
"François Dang",
"",
"INRIA Rocquencourt, PRISM - UVSQ"
],
[
"Dieu",
"Nicolas",
"",
"INRIA Rocquencourt"
],
[
"Pucheral",
"Philippe",
"",
"INRIA Rocquencourt,\n PRISM - UVSQ"
]
]
|
cs/0510015 | Laurent Audibert | Laurent Audibert (DELIC) | Word sense disambiguation criteria: a systematic study | null | 20th International Conference on Computational Linguistics
(COLING-2004) (2004) pp. 910-916 | null | null | cs.CL | null | This article describes the results of a systematic in-depth study of the
criteria used for word sense disambiguation. Our study is based on 60 target
words: 20 nouns, 20 adjectives and 20 verbs. Our results are not always in line
with some practices in the field. For example, we show that omitting
non-content words decreases performance and that bigrams yield better results
than unigrams.
| [
{
"version": "v1",
"created": "Wed, 5 Oct 2005 14:23:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Audibert",
"Laurent",
"",
"DELIC"
]
]
|
cs/0510017 | Svante Janson | Svante Janson and Wojciech Szpankowski | Partial fillup and search time in LC tries | 13 pages | null | null | null | cs.DS math.PR | null | Andersson and Nilsson introduced in 1993 a level-compressed trie (in short:
LC trie) in which a full subtree of a node is compressed to a single node of
degree being the size of the subtree. Recent experimental results indicated a
'dramatic improvement' when full subtrees are replaced by partially filled
subtrees. In this paper, we provide a theoretical justification of these
experimental results showing, among others, a rather moderate improvement of
the search time over the original LC tries. For such an analysis, we assume
that n strings are generated independently by a binary memoryless source with p
denoting the probability of emitting a 1. We first prove that the so called
alpha-fillup level (i.e., the largest level in a trie with alpha fraction of
nodes present at this level) is concentrated on two values with high
probability. We give these values explicitly up to O(1), and observe that the
value of alpha (strictly between 0 and 1) does not affect the leading term.
This result directly yields the typical depth (search time) in the alpha-LC
tries with p not equal to 1/2, which turns out to be C loglog n for an
explicitly given constant C (depending on p but not on alpha). This should be
compared with recently found typical depth in the original LC tries which is C'
loglog n for a larger constant C'. The search time in alpha-LC tries is thus
smaller but of the same order as in the original LC tries.
| [
{
"version": "v1",
"created": "Thu, 6 Oct 2005 10:04:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Janson",
"Svante",
""
],
[
"Szpankowski",
"Wojciech",
""
]
]
|
cs/0510018 | Danilo Gligoroski | Danilo Gligoroski | Candidate One-Way Functions and One-Way Permutations Based on Quasigroup
String Transformations | Submitetd to conference | null | null | null | cs.CR cs.CC | null | In this paper we propose a definition and construction of a new family of
one-way candidate functions ${\cal R}_N:Q^N \to Q^N$, where $Q=\{0,1,...,s-1\}$
is an alphabet with $s$ elements. Special instances of these functions can have
the additional property to be permutations (i.e. one-way permutations). These
one-way functions have the property that for achieving the security level of
$2^n$ computations in order to invert them, only $n$ bits of input are needed.
The construction is based on quasigroup string transformations. Since
quasigroups in general do not have algebraic properties such as associativity,
commutativity, neutral elements, inverting these functions seems to require
exponentially many readings from the lookup table that defines them (a Latin
Square) in order to check the satisfiability for the initial conditions, thus
making them natural candidates for one-way functions.
| [
{
"version": "v1",
"created": "Fri, 7 Oct 2005 00:29:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gligoroski",
"Danilo",
""
]
]
|
cs/0510019 | Panigrahy Rina | Rina Panigrahy | Entropy based Nearest Neighbor Search in High Dimensions | null | null | null | null | cs.DS | null | In this paper we study the problem of finding the approximate nearest
neighbor of a query point in the high dimensional space, focusing on the
Euclidean space. The earlier approaches use locality-preserving hash functions
(that tend to map nearby points to the same value) to construct several hash
tables to ensure that the query point hashes to the same bucket as its nearest
neighbor in at least one table. Our approach is different -- we use one (or a
few) hash table and hash several randomly chosen points in the neighborhood of
the query point showing that at least one of them will hash to the bucket
containing its nearest neighbor. We show that the number of randomly chosen
points in the neighborhood of the query point $q$ required depends on the
entropy of the hash value $h(p)$ of a random point $p$ at the same distance
from $q$ at its nearest neighbor, given $q$ and the locality preserving hash
function $h$ chosen randomly from the hash family. Precisely, we show that if
the entropy $I(h(p)|q,h) = M$ and $g$ is a bound on the probability that two
far-off points will hash to the same bucket, then we can find the approximate
nearest neighbor in $O(n^\rho)$ time and near linear $\tilde O(n)$ space where
$\rho = M/\log(1/g)$. Alternatively we can build a data structure of size
$\tilde O(n^{1/(1-\rho)})$ to answer queries in $\tilde O(d)$ time. By applying
this analysis to the locality preserving hash functions in and adjusting the
parameters we show that the $c$ nearest neighbor can be computed in time
$\tilde O(n^\rho)$ and near linear space where $\rho \approx 2.06/c$ as $c$
becomes large.
| [
{
"version": "v1",
"created": "Fri, 7 Oct 2005 00:55:06 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Nov 2005 16:55:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Panigrahy",
"Rina",
""
]
]
|
cs/0510020 | Thierry Poibeau | Thierry Poibeau (LIPN) | Sur le statut r\'{e}f\'{e}rentiel des entit\'{e}s nomm\'{e}es | 11 pages | Conf\'{e}rence Traitement Automatique des Langues 2005, France
(2005) | null | null | cs.AI cs.IR | null | We show in this paper that, on the one hand, named entities can be designated
using different denominations and that, on the second hand, names denoting
named entities are polysemous. The analysis cannot be limited to reference
resolution but should take into account naming strategies, which are mainly
based on two linguistic operations: synecdoche and metonymy. Lastly, we present
a model that explicitly represents the different denominations in discourse,
unifying the way to represent linguistic knowledge and world knowledge.
| [
{
"version": "v1",
"created": "Fri, 7 Oct 2005 17:39:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
]
|
cs/0510022 | Sam Bretheim | Sam Bretheim | Cryptographic Authentication of Navigation Protocols | 12 pages | null | null | null | cs.CR | null | We examine the security of existing radio navigation protocols and attempt to
define secure, scalable replacements.
| [
{
"version": "v1",
"created": "Sun, 9 Oct 2005 02:39:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bretheim",
"Sam",
""
]
]
|
cs/0510024 | David Eppstein | David Eppstein, Michael T. Goodrich, and Jeremy Yu Meng | Delta-confluent Drawings | 14 pages, 8 figures. A preliminary version of this work was presented
at the 13th Int. Symp. Graph Drawing, Limerick, Ireland, September 2005 | null | null | null | cs.CG | null | We generalize the tree-confluent graphs to a broader class of graphs called
Delta-confluent graphs. This class of graphs and distance-hereditary graphs, a
well-known class of graphs, coincide. Some results about the visualization of
Delta-confluent graphs are also given.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 00:47:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Meng",
"Jeremy Yu",
""
]
]
|
cs/0510025 | Thierry Despeyroux | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis) | Practical Semantic Analysis of Web Sites and Documents | null | null | null | null | cs.IR | null | As Web sites are now ordinary products, it is necessary to explicit the
notion of quality of a Web site. The quality of a site may be linked to the
easiness of accessibility and also to other criteria such as the fact that the
site is up to date and coherent. This last quality is difficult to insure
because sites may be updated very frequently, may have many authors, may be
partially generated and in this context proof-reading is very difficult. The
same piece of information may be found in different occurrences, but also in
data or meta-data, leading to the need for consistency checking. In this paper
we make a parallel between programs and Web sites. We present some examples of
semantic constraints that one would like to specify (constraints between the
meaning of categories and sub-categories in a thematic directory, consistency
between the organization chart and the rest of the site in an academic site).
We present quickly the Natural Semantics, a way to specify the semantics of
programming languages that inspires our works. Then we propose a specification
language for semantic constraints in Web sites that, in conjunction with the
well known ``make'' program, permits to generate some site verification tools
by compiling the specification into Prolog code. We apply our method to a large
XML document which is the scientific part of our institute activity report,
tracking errors or inconsistencies and also constructing some indicators that
can be used by the management of the institute.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 08:40:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
]
|
cs/0510027 | Alexandre d'Aspremont | Alexandre d'Aspremont | A Market Test for the Positivity of Arrow-Debreu Prices | New version, fixes a few minor errors and typos | null | null | null | cs.CE | null | We derive tractable necessary and sufficient conditions for the absence of
buy-and-hold arbitrage opportunities in a perfectly liquid, one period market.
We formulate the positivity of Arrow-Debreu prices as a generalized moment
problem to show that this no arbitrage condition is equivalent to the positive
semidefiniteness of matrices formed by the market price of tradeable securities
and their products. We apply this result to a market with multiple assets and
basket call options.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 13:40:17 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jun 2006 17:05:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
]
]
|
cs/0510028 | Victor Grishchenko | Victor S. Grishchenko | Geo-aggregation permits low stretch and routing tables of logarithmical
size | 6 pages | null | null | null | cs.NI | null | This article first addresses applicability of Euclidean models to the domain
of Internet routing. Those models are found (limitedly) applicable. Then a
simplistic model of routing is constructed for Euclidean plane densely covered
with points-routers. The model guarantees low stretch and logarithmical size of
routing tables at any node. The paper concludes with a discussion on
applicability of the model to real-world Internet routing.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2005 16:20:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grishchenko",
"Victor S.",
""
]
]
|
cs/0510031 | Constantinos Daskalakis | Constantinos Daskalakis | Computing Pure Nash Equilibria via Markov Random Fields | null | null | null | null | cs.GT | null | In this paper we present a novel generic mapping between Graphical Games and
Markov Random Fields so that pure Nash equilibria in the former can be found by
statistical inference on the latter. Thus, the problem of deciding whether a
graphical game has a pure Nash equilibrium, a well-known intractable problem,
can be attacked by well-established algorithms such as Belief Propagation,
Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes
of graphical games become thus tractable, including all classes already known,
but also new classes such as the games with O(log n) treewidth.
| [
{
"version": "v1",
"created": "Thu, 13 Oct 2005 04:42:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
]
]
|
cs/0510036 | Jan Chomicki | Jan Chomicki | Semantic Optimization Techniques for Preference Queries | null | null | null | null | cs.DB cs.AI cs.LO | null | Preference queries are relational algebra or SQL queries that contain
occurrences of the winnow operator ("find the most preferred tuples in a given
relation"). Such queries are parameterized by specific preference relations.
Semantic optimization techniques make use of integrity constraints holding in
the database. In the context of semantic optimization of preference queries, we
identify two fundamental properties: containment of preference relations
relative to integrity constraints and satisfaction of order axioms relative to
integrity constraints. We show numerous applications of those notions to
preference query evaluation and optimization. As integrity constraints, we
consider constraint-generating dependencies, a class generalizing functional
dependencies. We demonstrate that the problems of containment and satisfaction
of order axioms can be captured as specific instances of constraint-generating
dependency entailment. This makes it possible to formulate necessary and
sufficient conditions for the applicability of our techniques as constraint
validity problems. We characterize the computational complexity of such
problems.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 13:25:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
]
]
|
cs/0510037 | Rokia Bendaoud | Rokia Bendaoud (INRIA Lorraine - LORIA), Yannick Toussaint (INRIA
Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA) | Hi\'{e}rarchisation des r\`{e}gles d'association en fouille de textes | null | null | null | null | cs.IR cs.AI | null | Extraction of association rules is widely used as a data mining method.
However, one of the limit of this approach comes from the large number of
extracted rules and the difficulty for a human expert to deal with the totality
of these rules. We propose to solve this problem by structuring the set of
rules into hierarchy. The expert can then therefore explore the rules, access
from one rule to another one more general when we raise up in the hierarchy,
and in other hand, or a more specific rules. Rules are structured at two
levels. The global level aims at building a hierarchy from the set of rules
extracted. Thus we define a first type of rule-subsomption relying on Galois
lattices. The second level consists in a local and more detailed analysis of
each rule. It generate for a given rule a set of generalization rules
structured into a local hierarchy. This leads to the definition of a second
type of subsomption. This subsomption comes from inductive logic programming
and integrates a terminological model.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 14:24:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bendaoud",
"Rokia",
"",
"INRIA Lorraine - LORIA"
],
[
"Toussaint",
"Yannick",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0510039 | Sandor P. Fekete | Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor
P. Fekete, Jan van der Veen | DyNoC: A Dynamic Infrastructure for Communication in Dynamically
Reconfigurable Devices | 9 pages, 7 figures, 1 table, Latex, to appear in 15th International
Conference on Field-Programmable Logic and Application | null | null | null | cs.AR | null | A new paradigm to support the communication among modules dynamically placed
on a reconfigurable device at run-time is presented. Based on the network on
chip (NoC) infrastructure, we developed a dynamic communication infrastructure
as well as routing methodologies capable to handle routing in a NoC with
obstacles created by dynamically placed components. We prove the unrestricted
reachability of components and pins, the deadlock-freeness and we finally show
the feasibility of our approach by means on real life example applications.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 22:03:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bobda",
"Christophe",
""
],
[
"Ahmadinia",
"Ali",
""
],
[
"Majer",
"Mateusz",
""
],
[
"Teich",
"Juergen",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"van der Veen",
"Jan",
""
]
]
|
cs/0510042 | David Naccache | David Naccache | Secure and {\sl Practical} Identity-Based Encryption | null | null | null | null | cs.CR | null | In this paper, we present a variant of Waters' Identity-Based Encryption
scheme with a much smaller public-key size (only a few kilobytes). We show that
this variant is semantically secure against passive adversaries in the standard
model.\smallskip
In essence, the new scheme divides Waters' public key size by a factor $\ell$
at the cost of (negligibly) reducing security by $\ell$ bits. Therefore, our
construction settles an open question asked by Waters and constitutes the first
fully secure {\sl practical} Identity-Based Encryption scheme
| [
{
"version": "v1",
"created": "Sat, 15 Oct 2005 11:08:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Naccache",
"David",
""
]
]
|
cs/0510046 | Dmitry Mogilevsky | Dmitry Mogilevsky, Adam Lee, William Yurcik | Defining a Comprehensive Threat Model for High Performance Computational
Clusters | null | null | null | null | cs.CR cs.DC | null | Over the past decade, high performance computational (HPC) clusters have
become mainstream in academic and industrial settings as accessible means of
computation. Throughout their proliferation, HPC security has been a secondary
concern to performance. It is evident, however, that ensuring HPC security
presents different challenges than the ones faced when dealing with traditional
networks. To design suitable security measures for high performance computing,
it is necessary to first realize the threats faced by such an environment. This
task can be accomplished by the means of constructing a comprehensive threat
model. To our knowledge, no such threat model exists with regards to Cluster
Computing. In this paper, we explore the unique challenges of securing HPCs and
propose a threat model based on the classical Confidentiality, Integrity and
Availability security principles.
| [
{
"version": "v1",
"created": "Sun, 16 Oct 2005 23:32:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mogilevsky",
"Dmitry",
""
],
[
"Lee",
"Adam",
""
],
[
"Yurcik",
"William",
""
]
]
|
cs/0510048 | Sandor P. Fekete | Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and
Stefan Fischer | Deterministic boundary recognition and topology extraction for large
sensor networks | 10 pages, 9 figures, Latex, to appear in Symposium on Discrete
Algorithms (SODA 2006) | null | null | null | cs.DC cs.CG | null | We present a new framework for the crucial challenge of self-organization of
a large sensor network. The basic scenario can be described as follows: Given a
large swarm of immobile sensor nodes that have been scattered in a polygonal
region, such as a street network. Nodes have no knowledge of size or shape of
the environment or the position of other nodes. Moreover, they have no way of
measuring coordinates, geometric distances to other nodes, or their direction.
Their only way of interacting with other nodes is to send or to receive
messages from any node that is within communication range. The objective is to
develop algorithms and protocols that allow self-organization of the swarm into
large-scale structures that reflect the structure of the street network,
setting the stage for global routing, tracking and guiding algorithms.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2005 12:23:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kroeller",
"Alexander",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Pfisterer",
"Dennis",
""
],
[
"Fischer",
"Stefan",
""
]
]
|
cs/0510050 | Gilles Kassel | Gilles Kassel (LaRIA) | Integration of the DOLCE top-level ontology into the OntoSpec
methodology | null | null | null | LRR-2005-08 | cs.AI | null | This report describes a new version of the OntoSpec methodology for ontology
building. Defined by the LaRIA Knowledge Engineering Team (University of
Picardie Jules Verne, Amiens, France), OntoSpec aims at helping builders to
model ontological knowledge (upstream of formal representation). The
methodology relies on a set of rigorously-defined modelling primitives and
principles. Its application leads to the elaboration of a semi-informal
ontology, which is independent of knowledge representation languages. We
recently enriched the OntoSpec methodology by endowing it with a new resource,
the DOLCE top-level ontology defined at the LOA (IST-CNR, Trento, Italy). The
goal of this integration is to provide modellers with additional help in
structuring application ontologies, while maintaining independence
vis-\`{a}-vis formal representation languages. In this report, we first provide
an overview of the OntoSpec methodology's general principles and then describe
the DOLCE re-engineering process. A complete version of DOLCE-OS (i.e. a
specification of DOLCE in the semi-informal OntoSpec language) is presented in
an appendix.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 08:32:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kassel",
"Gilles",
"",
"LaRIA"
]
]
|
cs/0510051 | Gianluca Argentini | Gianluca Argentini | Numerical resolution of some BVP using Bernstein polynomials | 7 pages, 3 figures | Posted since 2005-11-29 at Applied Mathematics E-Notes,
http://www.math.nthu.edu.tw/~amen/ | null | null | cs.NA cs.MS math.CA physics.comp-ph | null | In this work we present a method, based on the use of Bernstein polynomials,
for the numerical resolution of some boundary values problems. The computations
have not need of particular approximations of derivatives, such as finite
differences, or particular techniques, such as finite elements. Also, the
method doesn't require the use of matrices, as in resolution of linear
algebraic systems, nor the use of like-Newton algorithms, as in resolution of
non linear sets of equations. An initial equation is resolved only once, then
the method is based on iterated evaluations of appropriate polynomials.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 09:55:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
|
cs/0510052 | Victor Grishchenko | Victor S. Grishchenko | Remarks on "Toward Compact Interdomain Routing" | null | null | null | null | cs.NI | null | This paper critically examines some propositions and arguments of
cs.NI/0508021 regarding applicability of hierarchical routing and perspectives
of compact routing. Arguments against the former are found to be inaccurate
while the latter is found to be equivalent to well-known deployed solutions.
Also, multiple (stacked) application of compact-routing solutions is found to
be equivalent to hierarchical routing.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 13:01:08 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Oct 2005 15:18:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grishchenko",
"Victor S.",
""
]
]
|
cs/0510053 | Martin Kutz | Martin Kutz | A pair of trees without a simultaneous geometric embedding in the plane | This paper has been withdrawn by the author because it had turned out
that the result was already known before | null | null | null | cs.CG | null | Any planar graph has a crossing-free straight-line drawing in the plane. A
simultaneous geometric embedding of two n-vertex graphs is a straight-line
drawing of both graphs on a common set of n points, such that the edges withing
each individual graph do not cross. We consider simultaneous embeddings of two
labeled trees, with predescribed vertex correspondences, and present an
instance of such a pair that cannot be embedded. Further we provide an example
of a planar graph that cannot be embedded together with a path when vertex
correspondences are given.
| [
{
"version": "v1",
"created": "Tue, 18 Oct 2005 18:26:00 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2005 13:14:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kutz",
"Martin",
""
]
]
|
cs/0510054 | Le Zhao Mr. | Le Zhao, Min Zhang, Shaoping Ma | The Nature of Novelty Detection | This paper pointed out the future direction for novelty detection
research. 37 pages, double spaced version | null | null | null | cs.IR cs.CL | null | Sentence level novelty detection aims at reducing redundant sentences from a
sentence list. In the task, sentences appearing later in the list with no new
meanings are eliminated. Aiming at a better accuracy for detecting redundancy,
this paper reveals the nature of the novelty detection task currently
overlooked by the Novelty community $-$ Novelty as a combination of the partial
overlap (PO, two sentences sharing common facts) and complete overlap (CO, the
first sentence covers all the facts of the second sentence) relations. By
formalizing novelty detection as a combination of the two relations between
sentences, new viewpoints toward techniques dealing with Novelty are proposed.
Among the methods discussed, the similarity, overlap, pool and language
modeling approaches are commonly used. Furthermore, a novel approach, selected
pool method is provided, which is immediate following the nature of the task.
Experimental results obtained on all the three currently available novelty
datasets showed that selected pool is significantly better or no worse than the
current methods. Knowledge about the nature of the task also affects the
evaluation methodologies. We propose new evaluation measures for Novelty
according to the nature of the task, as well as possible directions for future
study.
| [
{
"version": "v1",
"created": "Wed, 19 Oct 2005 14:56:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhao",
"Le",
""
],
[
"Zhang",
"Min",
""
],
[
"Ma",
"Shaoping",
""
]
]
|
cs/0510056 | Jackie (Jianhong) Shen | Yoon-Mo Jung and Jianhong Shen | First-Order Modeling and Stability Analysis of Illusory Contours | 21 pages | null | null | null | cs.CV cs.AI | null | In visual cognition, illusions help elucidate certain intriguing latent
perceptual functions of the human vision system, and their proper mathematical
modeling and computational simulation are therefore deeply beneficial to both
biological and computer vision. Inspired by existent prior works, the current
paper proposes a first-order energy-based model for analyzing and simulating
illusory contours. The lower complexity of the proposed model facilitates
rigorous mathematical analysis on the detailed geometric structures of illusory
contours. After being asymptotically approximated by classical active contours,
the proposed model is then robustly computed using the celebrated level-set
method of Osher and Sethian (J. Comput. Phys., 79:12-49, 1988) with a natural
supervising scheme. Potential cognitive implications of the mathematical
results are addressed, and generic computational examples are demonstrated and
discussed.
| [
{
"version": "v1",
"created": "Wed, 19 Oct 2005 20:44:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jung",
"Yoon-Mo",
""
],
[
"Shen",
"Jianhong",
""
]
]
|
cs/0510059 | Arnaud De La Fortelle | Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA
Rocquencourt) | Cybercars : Past, Present and Future of the Technology | null | Dans ITS World Congress 2005 | null | null | cs.RO | null | Automobile has become the dominant transport mode in the world in the last
century. In order to meet a continuously growing demand for transport, one
solution is to change the control approach for vehicle to full driving
automation, which removes the driver from the control loop to improve
efficiency and reduce accidents. Recent work shows that there are several
realistic paths towards this deployment : driving assistance on passenger cars,
automated commercial vehicles on dedicated infrastructures, and new forms of
urban transport (car-sharing and cybercars). Cybercars have already been put
into operation in Europe, and it seems that this approach could lead the way
towards full automation on most urban, and later interurban infrastructures.
The European project CyberCars has brought many improvements in the technology
needed to operate cybercars over the last three years. A new, larger European
project is now being prepared to carry this work further in order to meet more
ambitious objectives in terms of safety and efficiency. This paper will present
past and present technologies and will focus on the future developments.
| [
{
"version": "v1",
"created": "Thu, 20 Oct 2005 15:03:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Parent",
"Michel",
"",
"INRIA Rocquencourt"
],
[
"De La Fortelle",
"Arnaud",
"",
"INRIA\n Rocquencourt"
]
]
|
cs/0510062 | Jamal Saboune | Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA
Lorraine - LORIA) | Using Interval Particle Filtering for Marker less 3D Human Motion
Capture | null | null | null | null | cs.AI | null | In this paper we present a new approach for marker less human motion capture
from conventional camera feeds. The aim of our study is to recover 3D positions
of key points of the body that can serve for gait analysis. Our approach is
based on foreground segmentation, an articulated body model and particle
filters. In order to be generic and simple no restrictive dynamic modelling was
used. A new modified particle filtering algorithm was introduced. It is used
efficiently to search the model configuration space. This new algorithm which
we call Interval Particle Filtering reorganizes the configurations search space
in an optimal deterministic way and proved to be efficient in tracking natural
human movement. Results for human motion capture from a single camera are
presented and compared to results obtained from a marker based system. The
system proved to be able to track motion successfully even in partial
occlusions.
| [
{
"version": "v1",
"created": "Fri, 21 Oct 2005 13:45:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Saboune",
"Jamal",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA\n Lorraine - LORIA"
]
]
|
cs/0510063 | Jamal Saboune | Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA
Lorraine - LORIA) | Markerless Human Motion Capture for Gait Analysis | null | null | null | null | cs.AI | null | The aim of our study is to detect balance disorders and a tendency towards
the falls in the elderly, knowing gait parameters. In this paper we present a
new tool for gait analysis based on markerless human motion capture, from
camera feeds. The system introduced here, recovers the 3D positions of several
key points of the human body while walking. Foreground segmentation, an
articulated body model and particle filtering are basic elements of our
approach. No dynamic model is used thus this system can be described as generic
and simple to implement. A modified particle filtering algorithm, which we call
Interval Particle Filtering, is used to reorganise and search through the
model's configurations search space in a deterministic optimal way. This
algorithm was able to perform human movement tracking with success. Results
from the treatment of a single cam feeds are shown and compared to results
obtained using a marker based human motion capture system.
| [
{
"version": "v1",
"created": "Fri, 21 Oct 2005 13:45:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Saboune",
"Jamal",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA\n Lorraine - LORIA"
]
]
|
cs/0510065 | Aneta Zwierko | Adam Wierzbicki, Aneta Zwierko and Zbigniew Kotulski | A new authentication protocol for revocable anonymity in ad-hoc networks | 8 pages, 8 figures, this an extended version of paper accepted for
IASTED conference CNIS'2005 | null | null | null | cs.CR cs.DC cs.NI | null | This paper describes a new protocol for authentication in ad-hoc networks.
The protocol has been designed to meet specialized requirements of ad-hoc
networks, such as lack of direct communication between nodes or requirements
for revocable anonymity. At the same time, a ad-hoc authentication protocol
must be resistant to spoofing, eavesdropping and playback, and
man-in-the-middle attacks. The article analyzes existing authentication methods
based on the Public Key Infrastructure, and finds that they have several
drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing
on established cryptographic primitives (Merkle's puzzles and zero-knowledge
proofs) is proposed. The protocol is studied for a model ad-hoc chat
application that provides private conversations.
| [
{
"version": "v1",
"created": "Sat, 22 Oct 2005 11:51:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wierzbicki",
"Adam",
""
],
[
"Zwierko",
"Aneta",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
|
cs/0510073 | Christian Attiogb | Christian Attiogbe | Semantic Embedding of Petri Nets into Event-B | 16 pages, 3 figures | null | null | null | cs.LO | null | We present an embedding of Petri nets into B abstract systems. The embedding
is achieved by translating both the static structure (modelling aspect) and the
evolution semantics of Petri nets. The static structure of a Petri-net is
captured within a B abstract system through a graph structure. This abstract
system is then included in another abstract system which captures the evolution
semantics of Petri-nets. The evolution semantics results in some B events
depending on the chosen policies: basic nets or high level Petri nets. The
current embedding enables one to use conjointly Petri nets and Event-B in the
same system development, but at different steps and for various analysis.
| [
{
"version": "v1",
"created": "Mon, 24 Oct 2005 09:17:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Attiogbe",
"Christian",
""
]
]
|
cs/0510074 | Riccardo Pucella | Matthew Fluet, Riccardo Pucella | Practical Datatype Specializations with Phantom Types and Recursion
Schemes | 25 pages. Appeared in the Proc. of the 2005 ACM SIGPLAN Workshop on
ML | null | null | null | cs.PL | null | Datatype specialization is a form of subtyping that captures program
invariants on data structures that are expressed using the convenient and
intuitive datatype notation. Of particular interest are structural invariants
such as well-formedness. We investigate the use of phantom types for describing
datatype specializations. We show that it is possible to express
statically-checked specializations within the type system of Standard ML. We
also show that this can be done in a way that does not lose useful programming
facilities such as pattern matching in case expressions.
| [
{
"version": "v1",
"created": "Mon, 24 Oct 2005 16:27:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fluet",
"Matthew",
""
],
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0510076 | Olivier Pauplin | Olivier Pauplin (INRIA Rocquencourt), Jean Louchet (INRIA
Rocquencourt), Evelyne Lutton (INRIA Rocquencourt), Michel Parent (INRIA
Rocquencourt) | Applying Evolutionary Optimisation to Robot Obstacle Avoidance | null | Dans ISCIIA 2004 | null | null | cs.AI cs.RO | null | This paper presents an artificial evolutionbased method for stereo image
analysis and its application to real-time obstacle detection and avoidance for
a mobile robot. It uses the Parisian approach, which consists here in splitting
the representation of the robot's environment into a large number of simple
primitives, the "flies", which are evolved following a biologically inspired
scheme and give a fast, low-cost solution to the obstacle detection problem in
mobile robotics.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 07:07:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pauplin",
"Olivier",
"",
"INRIA Rocquencourt"
],
[
"Louchet",
"Jean",
"",
"INRIA\n Rocquencourt"
],
[
"Lutton",
"Evelyne",
"",
"INRIA Rocquencourt"
],
[
"Parent",
"Michel",
"",
"INRIA\n Rocquencourt"
]
]
|
cs/0510079 | Riccardo Pucella | Joseph Y. Halpern, Riccardo Pucella | Evidence with Uncertain Likelihoods | 21 pages. A preliminary version appeared in the Proceedings of UAI'05 | null | null | null | cs.AI | null | An agent often has a number of hypotheses, and must choose among them based
on observations, or outcomes of experiments. Each of these observations can be
viewed as providing evidence for or against various hypotheses. All the
attempts to formalize this intuition up to now have assumed that associated
with each hypothesis h there is a likelihood function \mu_h, which is a
probability measure that intuitively describes how likely each observation is,
conditional on h being the correct hypothesis. We consider an extension of this
framework where there is uncertainty as to which of a number of likelihood
functions is appropriate, and discuss how one formal approach to defining
evidence, which views evidence as a function from priors to posteriors, can be
generalized to accommodate this uncertainty.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 21:15:31 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Aug 2006 17:34:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
]
|
cs/0510080 | Joseph Y. Halpern | Peter D. Grunwald and Joseph Y. Halpern | When Ignorance is Bliss | In Proceedings of the Twentieth Conference on Uncertainty in AI,
2004, pp. 226-234 | null | null | null | cs.AI cs.LG | null | It is commonly-accepted wisdom that more information is better, and that
information should never be ignored. Here we argue, using both a Bayesian and a
non-Bayesian analysis, that in some situations you are better off ignoring
information if your uncertainty is represented by a set of probability
measures. These include situations in which the information is relevant for the
prediction task at hand. In the non-Bayesian analysis, we show how ignoring
information avoids dilation, the phenomenon that additional pieces of
information sometimes lead to an increase in uncertainty. In the Bayesian
analysis, we show that for small sample sizes and certain prediction tasks, the
Bayesian posterior based on a noninformative prior yields worse predictions
than simply ignoring the given information.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 22:14:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grunwald",
"Peter D.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
|
cs/0510083 | Nizar Kerkeni | Nizar Kerkeni (TIM), Frederic Alexandre (CORTEX), Mohamed Hedi Bedoui
(TIM), Laurent Bougrain (CORTEX), Mohamed Dogui (SAHLOUL) | Neuronal Spectral Analysis of EEG and Expert Knowledge Integration for
Automatic Classification of Sleep Stages | null | null | null | null | cs.AI | null | Being able to analyze and interpret signal coming from electroencephalogram
(EEG) recording can be of high interest for many applications including medical
diagnosis and Brain-Computer Interfaces. Indeed, human experts are today able
to extract from this signal many hints related to physiological as well as
cognitive states of the recorded subject and it would be very interesting to
perform such task automatically but today no completely automatic system
exists. In previous studies, we have compared human expertise and automatic
processing tools, including artificial neural networks (ANN), to better
understand the competences of each and determine which are the difficult
aspects to integrate in a fully automatic system. In this paper, we bring more
elements to that study in reporting the main results of a practical experiment
which was carried out in an hospital for sleep pathology study. An EEG
recording was studied and labeled by a human expert and an ANN. We describe
here the characteristics of the experiment, both human and neuronal procedure
of analysis, compare their performances and point out the main limitations
which arise from this study.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:47:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kerkeni",
"Nizar",
"",
"TIM"
],
[
"Alexandre",
"Frederic",
"",
"CORTEX"
],
[
"Bedoui",
"Mohamed Hedi",
"",
"TIM"
],
[
"Bougrain",
"Laurent",
"",
"CORTEX"
],
[
"Dogui",
"Mohamed",
"",
"SAHLOUL"
]
]
|
cs/0510084 | Michel Fliess | Michel Fliess | R\'{e}flexions sur la question fr\'{e}quentielle en traitement du signal | null | null | null | null | cs.CE cs.IR math-ph math.MP math.SP | null | New definitions are suggested for frequencies which may be instantaneous or
not. The Heisenberg-Gabor inequality and the Shannon sampling theorem are
briefly discussed.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:49:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fliess",
"Michel",
""
]
]
|
cs/0510086 | Krishnaram Kenthapadi | K. Kenthapadi and R. Panigrahy | Balanced Allocation on Graphs | null | null | null | null | cs.DS | null | In this paper, we study the two choice balls and bins process when balls are
not allowed to choose any two random bins, but only bins that are connected by
an edge in an underlying graph. We show that for $n$ balls and $n$ bins, if the
graph is almost regular with degree $n^\epsilon$, where $\epsilon$ is not too
small, the previous bounds on the maximum load continue to hold. Precisely, the
maximum load is $\log \log n + O(1/\epsilon) + O(1)$. For general
$\Delta$-regular graphs, we show that the maximum load is $\log\log n +
O(\frac{\log n}{\log (\Delta/\log^4 n)}) + O(1)$ and also provide an almost
matching lower bound of $\log \log n + \frac{\log n}{\log (\Delta \log n)}$.
V{\"o}cking [Voc99] showed that the maximum bin size with $d$ choice load
balancing can be further improved to $O(\log\log n /d)$ by breaking ties to the
left. This requires $d$ random bin choices. We show that such bounds can be
achieved by making only two random accesses and querying $d/2$ contiguous bins
in each access. By grouping a sequence of $n$ bins into $2n/d$ groups, each of
$d/2$ consecutive bins, if each ball chooses two groups at random and inserts
the new ball into the least-loaded bin in the lesser loaded group, then the
maximum load is $O(\log\log n/d)$ with high probability.
| [
{
"version": "v1",
"created": "Thu, 27 Oct 2005 21:59:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kenthapadi",
"K.",
""
],
[
"Panigrahy",
"R.",
""
]
]
|
cs/0510087 | Johannes Gro{\ss}e | J. Grosse | MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots | 7 pages, 8 figures, for associated Mathematica package, see
http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz | null | null | LMU-ASC 70/05; MPP-2005-126 | cs.GR | null | This article introduces a Mathematica package providing a graphics export
function that automatically replaces Mathematica expressions in a graphic by
the corresponding LaTeX constructs and positions them correctly. It thus
facilitates the creation of publication-quality Enscapulated PostScript (EPS)
graphics.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 09:40:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grosse",
"J.",
""
]
]
|
cs/0510088 | Assaf Naor | Rajeev Motwani and Assaf Naor and Rina Panigrahy | Lower bounds on Locality Sensitive Hashing | null | null | null | null | cs.CG | null | Given a metric space $(X,d_X)$, $c\ge 1$, $r>0$, and $p,q\in [0,1]$, a
distribution over mappings $\h:X\to \mathbb N$ is called a
$(r,cr,p,q)$-sensitive hash family if any two points in $X$ at distance at most
$r$ are mapped by $\h$ to the same value with probability at least $p$, and any
two points at distance greater than $cr$ are mapped by $\h$ to the same value
with probability at most $q$. This notion was introduced by Indyk and Motwani
in 1998 as the basis for an efficient approximate nearest neighbor search
algorithm, and has since been used extensively for this purpose. The
performance of these algorithms is governed by the parameter
$\rho=\frac{\log(1/p)}{\log(1/q)}$, and constructing hash families with small
$\rho$ automatically yields improved nearest neighbor algorithms. Here we show
that for $X=\ell_1$ it is impossible to achieve $\rho\le \frac{1}{2c}$. This
almost matches the construction of Indyk and Motwani which achieves $\rho\le
\frac{1}{c}$.
| [
{
"version": "v1",
"created": "Sat, 29 Oct 2005 15:05:52 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2005 20:32:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Motwani",
"Rajeev",
""
],
[
"Naor",
"Assaf",
""
],
[
"Panigrahy",
"Rina",
""
]
]
|
cs/0510090 | Sheng-Gwo Chen | Jyh-Yang Wu, Sheng-Gwo Chen and Mei-Hsiu Chi | A simple effective method for curvatures estimation on triangular meshes | null | null | null | null | cs.CG | null | To definite and compute differential invariants, like curvatures, for
triangular meshes (or polyhedral surfaces) is a key problem in CAGD and the
computer vision. The Gaussian curvature and the mean curvature are determined
by the differential of the Gauss map of the underlying surface. The Gauss map
assigns to each point in the surface the unit normal vector of the tangent
plane to the surface at this point. We follow the ideas developed in Chen and
Wu \cite{Chen2}(2004) and Wu, Chen and Chi\cite{Wu}(2005) to describe a new and
simple approach to estimate the differential of the Gauss map and curvatures
from the viewpoint of the gradient and the centroid weights. This will give us
a much better estimation of curvatures than Taubin's algorithm \cite{Taubin}
(1995).
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 02:41:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wu",
"Jyh-Yang",
""
],
[
"Chen",
"Sheng-Gwo",
""
],
[
"Chi",
"Mei-Hsiu",
""
]
]
|
cs/0510091 | Marc Schoenauer | Marc Schoenauer (INRIA Futurs), Yann Semet (INRIA Futurs) | An efficient memetic, permutation-based evolutionary algorithm for
real-world train timetabling | null | null | null | null | cs.AI | null | Train timetabling is a difficult and very tightly constrained combinatorial
problem that deals with the construction of train schedules. We focus on the
particular problem of local reconstruction of the schedule following a small
perturbation, seeking minimisation of the total accumulated delay by adapting
times of departure and arrival for each train and allocation of resources
(tracks, routing nodes, etc.). We describe a permutation-based evolutionary
algorithm that relies on a semi-greedy heuristic to gradually reconstruct the
schedule by inserting trains one after the other following the permutation.
This algorithm can be hybridised with ILOG commercial MIP programming tool
CPLEX in a coarse-grained manner: the evolutionary part is used to quickly
obtain a good but suboptimal solution and this intermediate solution is refined
using CPLEX. Experimental results are presented on a large real-world case
involving more than one million variables and 2 million constraints. Results
are surprisingly good as the evolutionary algorithm, alone or hybridised,
produces excellent solutions much faster than CPLEX alone.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 06:06:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
],
[
"Semet",
"Yann",
"",
"INRIA Futurs"
]
]
|
cs/0510094 | Angel de Vicente | Angel de Vicente, Nayra Rodriguez | Big Science with a Small Budget: Non-Embarrassingly Parallel
Applications in a Non-Dedicated Network of Workstations | 4 pages; to appear in Proceedings of ADASS XV
(http://www.adass.org:8080/Conferences/2005/Venue/) | null | null | null | cs.DC astro-ph | null | Many astronomers and astrophysicists require large computing resources for
their research, which are usually obtained via dedicated (and expensive)
parallel machines. Depending on the type of the problem to be solved, an
alternative solution can be provided by creating dynamically a computer cluster
out of non-dedicated workstations using the Condor High Throughput Computing
System and the Master-Worker (MW) framework. As an example of this we show in
this paper how a radiative transfer application previously coded with MPI is
solved using this solution without the need for dedicated machines.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 14:55:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"de Vicente",
"Angel",
""
],
[
"Rodriguez",
"Nayra",
""
]
]
|
cs/0511002 | Alberto Accomazzi | Alberto Accomazzi, Michael J. Kurtz, Guenther Eichhorn, Edwin
Henneken, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray | Bibliographic Classification using the ADS Databases | Latex, 4 pages, 1 Figure. To be published in the Proceedings of the
Conference "Astronomical Data Analysis Software & Systems XV" held October
2-5, 2005, in San Lorenzo de El Escorial, Spain | null | null | null | cs.IR cs.DL | null | We discuss two techniques used to characterize bibliographic records based on
their similarity to and relationship with the contents of the NASA Astrophysics
Data System (ADS) databases. The first method has been used to classify input
text as being relevant to one or more subject areas based on an analysis of the
frequency distribution of its individual words. The second method has been used
to classify existing records as being relevant to one or more databases based
on the distribution of the papers citing them. Both techniques have proven to
be valuable tools in assigning new and existing bibliographic records to
different disciplines within the ADS databases.
| [
{
"version": "v1",
"created": "Mon, 31 Oct 2005 22:34:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Accomazzi",
"Alberto",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Murray",
"Stephen S.",
""
]
]
|
cs/0511004 | Marc Schoenauer | Aguston E. Eiben (VU), Marc Schoenauer (FRACTALES) | Evolutionary Computing | null | null | null | null | cs.AI | null | Evolutionary computing (EC) is an exciting development in Computer Science.
It amounts to building, applying and studying algorithms based on the Darwinian
principles of natural selection. In this paper we briefly introduce the main
concepts behind evolutionary computing. We present the main components all
evolutionary algorithms (EA), sketch the differences between different types of
EAs and survey application areas ranging from optimization, modeling and
simulation to entertainment.
| [
{
"version": "v1",
"created": "Tue, 1 Nov 2005 19:46:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eiben",
"Aguston E.",
"",
"VU"
],
[
"Schoenauer",
"Marc",
"",
"FRACTALES"
]
]
|
cs/0511010 | Nadir Kiyanclar | Nadir Kiyanclar | A Survey of Virtualization Techniques Focusing on Secure On-Demand
Cluster Computing | null | null | null | null | cs.OS | null | Virtualization, a technique once used to multiplex the resources of
high-priced mainframe hardware, is seeing a resurgence in applicability with
the increasing computing power of commodity computers. By inserting a layer of
software between the machine and traditional operating systems, this technology
allows access to a shared computing medium in a manner that is secure,
resource-controlled, and efficient. These properties are attractive in the
field of on-demand computing, where the fine-grained subdivision of resources
provided by virtualized systems allows potentially higher utilization of
computing resources.
It this work, we survey a number of virtual machine systems with the goal of
finding an appropriate candidate to serve as the basis for the On-Demand Secure
Cluster Computing project at the National Center for Supercomputing
Applications. Contenders are reviewed on a number of desirable properties
including portability and security. We conclude with a comparison and
justification of our choice.
| [
{
"version": "v1",
"created": "Wed, 2 Nov 2005 19:52:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kiyanclar",
"Nadir",
""
]
]
|
cs/0511011 | Hamilton Link | Hamilton Link and Jared Saia and Terran Lane and Randall A. LaViolette | The Impact of Social Networks on Multi-Agent Recommender Systems | 12 pages, 4 figures. Published in the Proceedings of the Workshop on
Cooperative Multi-Agent Learning (ECML/PKDD '05). Resubmitted to fix
citations and metadata | null | null | null | cs.LG cs.CC cs.MA | null | Awerbuch et al.'s approach to distributed recommender systems (DRSs) is to
have agents sample products at random while randomly querying one another for
the best item they have found; we improve upon this by adding a communication
network. Agents can only communicate with their immediate neighbors in the
network, but neighboring agents may or may not represent users with common
interests. We define two network structures: in the ``mailing-list model,''
agents representing similar users form cliques, while in the ``word-of-mouth
model'' the agents are distributed randomly in a scale-free network (SFN). In
both models, agents tell their neighbors about satisfactory products as they
are found. In the word-of-mouth model, knowledge of items propagates only
through interested agents, and the SFN parameters affect the system's
performance. We include a summary of our new results on the character and
parameters of random subgraphs of SFNs, in particular SFNs with power-law
degree distributions down to minimum degree 1. These networks are not as
resilient as Cohen et al. originally suggested. In the case of the widely-cited
``Internet resilience'' result, high failure rates actually lead to the
orphaning of half of the surviving nodes after 60% of the network has failed
and the complete disintegration of the network at 90%. We show that given an
appropriate network, the communication network reduces the number of sampled
items, the number of messages sent, and the amount of ``spam.'' We conclude
that in many cases DRSs will be useful for sharing information in a multi-agent
learning system.
| [
{
"version": "v1",
"created": "Wed, 2 Nov 2005 23:44:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Link",
"Hamilton",
""
],
[
"Saia",
"Jared",
""
],
[
"Lane",
"Terran",
""
],
[
"LaViolette",
"Randall A.",
""
]
]
|
cs/0511012 | Hamilton Link | Hamilton Link and Randall A. LaViolette and Jared Saia and Terran Lane | Parameters Affecting the Resilience of Scale-Free Networks to Random
Failures | 12 pages, 7 figures. Submitting to Phys. Rev. Lett | null | null | null | cs.NI cs.AR cs.MA | null | It is commonly believed that scale-free networks are robust to massive
numbers of random node deletions. For example, Cohen et al. study scale-free
networks including some which approximate the measured degree distribution of
the Internet. Their results suggest that if each node in this network failed
independently with probability 0.99, the remaining network would continue to
have a giant component. In this paper, we show that a large and important
subclass of scale-free networks are not robust to massive numbers of random
node deletions for practical purposes. In particular, we study finite
scale-free networks which have minimum node degree of 1 and a power-law degree
distribution beginning with nodes of degree 1 (power-law networks). We show
that, in a power-law network approximating the Internet's reported
distribution, when the probability of deletion of each node is 0.5 only about
25% of the surviving nodes in the network remain connected in a giant
component, and the giant component does not persist beyond a critical failure
rate of 0.9. The new result is partially due to improved analytical
accommodation of the large number of degree-0 nodes that result after node
deletions. Our results apply to finite power-law networks with a wide range of
power-law exponents, including Internet-like networks. We give both analytical
and empirical evidence that such networks are not generally robust to massive
random node deletions.
| [
{
"version": "v1",
"created": "Wed, 2 Nov 2005 22:22:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Link",
"Hamilton",
""
],
[
"LaViolette",
"Randall A.",
""
],
[
"Saia",
"Jared",
""
],
[
"Lane",
"Terran",
""
]
]
|
cs/0511013 | Zengyou He | Zengyou He, Xiaofei Xu, Shengchun Deng | K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical
Data | 18 pages | null | null | Tr-2004-03 | cs.AI cs.DB | null | Clustering categorical data is an integral part of data mining and has
attracted much attention recently. In this paper, we present k-ANMI, a new
efficient algorithm for clustering categorical data. The k-ANMI algorithm works
in a way that is similar to the popular k-means algorithm, and the goodness of
clustering in each step is evaluated using a mutual information based criterion
(namely, Average Normalized Mutual Information-ANMI) borrowed from cluster
ensemble. Experimental results on real datasets show that k-ANMI algorithm is
competitive with those state-of-art categorical data clustering algorithms with
respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 01:18:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.