id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0508108
Tristan Denmat
Tristan Denmat, Arnaud Gotlieb and Mireille Ducasse
Proving or Disproving likely Invariants with Constraint Reasoning
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments October 2005, Sitges. cs.PL/0508078
null
null
null
cs.SE cs.PL
null
A program invariant is a property that holds for every execution of the program. Recent work suggest to infer likely-only invariants, via dynamic analysis. A likely invariant is a property that holds for some executions but is not guaranteed to hold for all executions. In this paper, we present work in progress addressing the challenging problem of automatically verifying that likely invariants are actual invariants. We propose a constraint-based reasoning approach that is able, unlike other approaches, to both prove or disprove likely invariants. In the latter case, our approach provides counter-examples. We illustrate the approach on a motivating example where automatically generated likely invariants are verified.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 13:30:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Denmat", "Tristan", "" ], [ "Gotlieb", "Arnaud", "" ], [ "Ducasse", "Mireille", "" ] ]
cs/0508109
William Heaven
William Heaven and Alessandra Russo
Enhancing the Alloy Analyzer with Patterns of Analysis
17 pages, 15th Workshop on Logic Programming Environments (WLPE05), Sitges (Barcelona), Spain, 2005
15th Workshop on Logic Programming Environments (WLPE05), Sitges (Barcelona), Spain, 2005
null
null
cs.SE cs.LO
null
Formal techniques have been shown to be useful in the development of correct software. But the level of expertise required of practitioners of these techniques prohibits their widespread adoption. Formal techniques need to be tailored to the commercial software developer. Alloy is a lightweight specification language supported by the Alloy Analyzer (AA), a tool based on off-the-shelf SAT technology. The tool allows a user to check interactively whether given properties are consistent or valid with respect to a high-level specification, providing an environment in which the correctness of such a specification may be established. However, Alloy is not particularly suited to expressing program specifications and the feedback provided by AA can be misleading where the specification under analysis or the property being checked contains inconsistencies. In this paper, we address these two shortcomings. Firstly, we present a lightweight language called "Loy", tailored to the specification of object-oriented programs. An encoding of Loy into Alloy is provided so that AA can be used for automated analysis of Loy program specifications. Secondly, we present some "patterns of analysis" that guide a developer through the analysis of a Loy specification in order to establish its correctness before implementation.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 15:35:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Heaven", "William", "" ], [ "Russo", "Alessandra", "" ] ]
cs/0508110
Ali Bagherzandi
Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri and Mahmoud Salmasizadeh
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework
8 pages, 1 figure
null
null
null
cs.CR
null
In this paper we try to unify the frameworks of definitions of semantic security, indistinguishability and non-malleability by defining semantic security in comparison based framework. This facilitates the study of relations among these goals against different attack models and makes the proof of the equivalence of semantic security and indistinguishability easier and more understandable. Besides, our proof of the equivalence of semantic security and indistinguishability does not need any intermediate goals such as non devidability to change the definition framework.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 04:58:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagherzandi", "Ali", "" ], [ "Azimian", "Kooshiar", "" ], [ "Mohajeri", "Javad", "" ], [ "Salmasizadeh", "Mahmoud", "" ] ]
cs/0508111
Elvira Albert
German Puebla, Elvira Albert, Manuel Hermenegildo
A Generic Framework for the Analysis and Specialization of Logic Programs
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the 15th Workshop on Logic-based methods in Programming Environments October 2005, Sitges. cs.PL/0508078
null
null
null
cs.PL cs.SE
null
The relationship between abstract interpretation and partial deduction has received considerable attention and (partial) integrations have been proposed starting from both the partial deduction and abstract interpretation perspectives. In this work we present what we argue is the first fully described generic algorithm for efficient and precise integration of abstract interpretation and partial deduction. Taking as starting point state-of-the-art algorithms for context-sensitive, polyvariant abstract interpretation and (abstract) partial deduction, we present an algorithm which combines the best of both worlds. Key ingredients include the accurate success propagation inherent to abstract interpretation and the powerful program transformations achievable by partial deduction. In our algorithm, the calls which appear in the analysis graph are not analyzed w.r.t. the original definition of the procedure but w.r.t. specialized definitions of these procedures. Such specialized definitions are obtained by applying both unfolding and abstract executability. Our framework is parametric w.r.t. different control strategies and abstract domains. Different combinations of such parameters correspond to existing algorithms for program analysis and specialization. Simultaneously, our approach opens the door to the efficient computation of strictly more precise results than those achievable by each of the individual techniques. The algorithm is now one of the key components of the CiaoPP analysis and specialization system.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 21:50:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Puebla", "German", "" ], [ "Albert", "Elvira", "" ], [ "Hermenegildo", "Manuel", "" ] ]
cs/0508113
Gilles Villard
Claude-Pierre Jeannerod (LIP), Gilles Villard (LIP)
Asymptotically fast polynomial matrix algorithms for multivariable systems
null
null
null
JeVi05
cs.SC cs.CC
null
We present the asymptotically fastest known algorithms for some basic problems on univariate polynomial matrices: rank, nullspace, determinant, generic inverse, reduced form. We show that they essentially can be reduced to two computer algebra techniques, minimal basis computations and matrix fraction expansion/reconstruction, and to polynomial matrix multiplication. Such reductions eventually imply that all these problems can be solved in about the same amount of time as polynomial matrix multiplication.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 13:52:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Jeannerod", "Claude-Pierre", "", "LIP" ], [ "Villard", "Gilles", "", "LIP" ] ]
cs/0508116
Robert Burger PhD
John Robert Burger
Quantum Algorithm Processors to Reveal Hamiltonian Cycles
10 pages
null
null
null
cs.AR cs.CG
null
Quantum computer versus quantum algorithm processor in CMOS are compared to find (in parallel) all Hamiltonian cycles in a graph with m edges and n vertices, each represented by k bits. A quantum computer uses quantum states analogous to CMOS registers. With efficient initialization, number of CMOS registers is proportional to (n-1)! Number of qubits in a quantum computer is approximately proportional to kn+2mn in the approach below. Using CMOS, the bits per register is about proportional to kn, which is less since bits can be irreversibly reset. In either concept, number of gates, or operations to identify Hamiltonian cycles is proportional to kmn. However, a quantum computer needs an additional exponentially large number of operations to accomplish a probabilistic readout. In contrast, CMOS is deterministic and readout is comparable to ordinary memory.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 19:04:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0508117
Xi Shen
Xi Shen (1), Philippe De Wilde (2) ((1) Imperial College London, United Kingdom, (2) Heriot-Watt University, United Kingdom)
Long-term neuronal behavior caused by two synaptic modification mechanisms
11 pages, 5 figures
null
null
null
cs.NE cs.CE
null
We report the first results of simulating the coupling of neuronal, astrocyte, and cerebrovascular activity. It is suggested that the dynamics of the system is different from systems that only include neurons. In the neuron-vascular coupling, distribution of synapse strengths affects neuronal behavior and thus balance of the blood flow; oscillations are induced in the neuron-to-astrocyte coupling.
[ { "version": "v1", "created": "Fri, 26 Aug 2005 10:38:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Xi", "" ], [ "De Wilde", "Philippe", "" ] ]
cs/0508120
Vyacheslav Gorshkov Mr
Gennady P. Berman, Vyacheslav N. Gorshkov, Edward P. MacKerrow (Theoretical Division, Los Alamos National Laboratory), and Xidi Wang (Global Consumer Bank, Citigroup)
Iterative Algorithm for Finding Frequent Patterns in Transactional Databases
13 pages, 8 tables and figures
null
null
null
cs.DB
null
A high-performance algorithm for searching for frequent patterns (FPs) in transactional databases is presented. The search for FPs is carried out by using an iterative sieve algorithm by computing the set of enclosed cycles. In each inner cycle of level FPs composed of elements are generated. The assigned number of enclosed cycles (the parameter of the problem) defines the maximum length of the desired FPs. The efficiency of the algorithm is produced by (i) the extremely simple logical searching scheme, (ii) the avoidance of recursive procedures, and (iii) the usage of only one-dimensional arrays of integers.
[ { "version": "v1", "created": "Fri, 26 Aug 2005 21:05:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Berman", "Gennady P.", "", "Theoretical Division, Los Alamos National Laboratory" ], [ "Gorshkov", "Vyacheslav N.", "", "Theoretical Division, Los Alamos National Laboratory" ], [ "MacKerrow", "Edward P.", "", "Theoretical Division, Los Alamos National Laboratory" ], [ "Wang", "Xidi", "", "Global\n Consumer Bank, Citigroup" ] ]
cs/0508125
Sheng Bao
Sheng Bao, De-Shun Zheng
A Sorting Algorithm Based on Calculation
null
null
null
null
cs.DS
null
This article introduces an adaptive sorting algorithm that can relocate elements accurately by substituting their values into a function which we name it the guessing function. We focus on building this function which is the mapping relationship between record values and their corresponding sorted locations essentially. The time complexity of this algorithm O(n),when records distributed uniformly. Additionally, similar approach can be used in the searching algorithm.
[ { "version": "v1", "created": "Mon, 29 Aug 2005 14:22:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Bao", "Sheng", "" ], [ "Zheng", "De-Shun", "" ] ]
cs/0508128
Dmitry Zinoviev
Dmitry Zinoviev
Mapping DEVS Models onto UML Models
6 pages, 4 figures Presented at Simulation Multiconference 2005
D. Zinoviev, "Mapping DEVS Models onto UML Models," Proc. of the 2005 DEVS Integrative M&S Symposium, San Diego, CA, April 2005, pp. 101-106
null
null
cs.OH
null
Discrete event simulation specification (DEVS) is a formalism designed to describe both discrete state and continuous state systems. It is a powerful abstract mathematical notation. However, until recently it lacked proper graphical representation, which made computer simulation of DEVS models a challenging issue. Unified modeling language (UML) is a multipurpose graphical modeling language, a de-facto industrial modeling standard. There exist several commercial and open-source UML editors and code generators. Most of them can save UML models in XML-based XMI files ready for further automated processing. In this paper, we propose a mapping of DEVS models onto UML state and component diagrams. This mapping may lead to an eventual unification of the two modeling formalisms, combining the abstractness of DEVS and expressive power and ``computer friendliness'' of the UML.
[ { "version": "v1", "created": "Tue, 30 Aug 2005 00:02:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Zinoviev", "Dmitry", "" ] ]
cs/0508129
Esra Erdem
Esra Erdem, Vladimir Lifschitz, and Don Ringe
Temporal Phylogenetic Networks and Logic Programming
null
null
null
null
cs.LO cs.AI cs.PL
null
The concept of a temporal phylogenetic network is a mathematical model of evolution of a family of natural languages. It takes into account the fact that languages can trade their characteristics with each other when linguistic communities are in contact, and also that a contact is only possible when the languages are spoken at the same time. We show how computational methods of answer set programming and constraint logic programming can be used to generate plausible conjectures about contacts between prehistoric linguistic communities, and illustrate our approach by applying it to the evolutionary history of Indo-European languages. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 30 Aug 2005 13:04:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdem", "Esra", "" ], [ "Lifschitz", "Vladimir", "" ], [ "Ringe", "Don", "" ] ]
cs/0508130
Mehul Shah
Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, TJ Giuli, Prashanth Bungale
A Fresh Look at the Reliability of Long-term Digital Storage
null
null
null
null
cs.DL cs.DB cs.OS
null
Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an end-to-end perspective, taking into account not just hardware and software faults but also faults due to humans and organizations. We present a simple model of long-term storage failures that helps us reason about the various strategies for addressing these threats in a cost-effective manner. Using this model we show that the most important strategies for increasing the reliability of long-term storage are detecting latent faults quickly, automating fault repair to make it faster and cheaper, and increasing the independence of data replicas.
[ { "version": "v1", "created": "Wed, 31 Aug 2005 01:44:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Baker", "Mary", "" ], [ "Shah", "Mehul", "" ], [ "Rosenthal", "David S. H.", "" ], [ "Roussopoulos", "Mema", "" ], [ "Maniatis", "Petros", "" ], [ "Giuli", "TJ", "" ], [ "Bungale", "Prashanth", "" ] ]
cs/0508131
Vygintas Gontis
V. Gontis, B. Kaulakys, J. Ruseckas
Point Process Models of 1/f Noise and Internet Traffic
6 pages, 2 figures, CNET2004 Proceedings AIP
AIP Conf. Proc. 776, 144 (2005) 144-149
10.1063/1.1985385
null
cs.NI
null
We present a simple model reproducing the long-range autocorrelations and the power spectrum of the web traffic. The model assumes the traffic as Poisson flow of files with size distributed according to the power-law. In this model the long-range autocorrelations are independent of the network properties as well as of inter-packet time distribution.
[ { "version": "v1", "created": "Wed, 31 Aug 2005 13:53:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Gontis", "V.", "" ], [ "Kaulakys", "B.", "" ], [ "Ruseckas", "J.", "" ] ]
cs/0509005
Anne-Marie Vercoustre
Alistair McLean (CSIRO Ict Center), Mingfang Wu (CSIRO Ict Center), Anne-Marie Vercoustre (CSIRO Ict Center)
Combining Structured Corporate Data and Document Content to Improve Expertise Finding
long version of the ADCS'03 paper
null
null
null
cs.IR
null
In this paper, we present an algorithm for automatically building expertise evidence for finding experts within an organization by combining structured corporate information with different content. We also describe our test data collection and our evaluation method. Evaluation of the algorithm shows that using organizational structure leads to a significant improvement in the precision of finding an expert. Furthermore we evaluate the impact of using different data sources on the quality of the results and conclude that Expert Finding is not a "one engine fits all" solution. It requires an analysis of the information space into which a solution will be placed and the appropriate selection and weighting scheme of the data sources.
[ { "version": "v1", "created": "Fri, 2 Sep 2005 08:24:07 GMT" } ]
2007-05-23T00:00:00
[ [ "McLean", "Alistair", "", "CSIRO Ict Center" ], [ "Wu", "Mingfang", "", "CSIRO Ict Center" ], [ "Vercoustre", "Anne-Marie", "", "CSIRO Ict Center" ] ]
cs/0509011
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
Clustering Mixed Numeric and Categorical Data: A Cluster Ensemble Approach
14 pages
null
null
Tr-2002-10
cs.AI
null
Clustering is a widely used technique in data mining applications for discovering patterns in underlying data. Most traditional clustering algorithms are limited to handling datasets that contain either numeric or categorical attributes. However, datasets with mixed types of attributes are common in real life data mining applications. In this paper, we propose a novel divide-and-conquer technique to solve this problem. First, the original mixed dataset is divided into two sub-datasets: the pure categorical dataset and the pure numeric dataset. Next, existing well established clustering algorithms designed for different types of datasets are employed to produce corresponding clusters. Last, the clustering results on the categorical and numeric dataset are combined as a categorical dataset, on which the categorical data clustering algorithm is used to get the final clusters. Our contribution in this paper is to provide an algorithm framework for the mixed attributes clustering problem, in which existing clustering algorithms can be easily integrated, the capabilities of different kinds of clustering algorithms and characteristics of different types of datasets could be fully exploited. Comparisons with other clustering algorithms on real life datasets illustrate the superiority of our approach.
[ { "version": "v1", "created": "Mon, 5 Sep 2005 02:47:12 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0509017
Gilles Daniel
Gilles Daniel, Lev Muchnik, Sorin Solomon
Traders imprint themselves by adaptively updating their own avatar
12 pages, 4 figures, draft of a paper submitted to Artificial Economics 2005, September 15-16, Lille, France
null
null
null
cs.MA cs.CE
null
Simulations of artificial stock markets were considered as early as 1964 and multi-agent ones were introduced as early as 1989. Starting the early 90's, collaborations of economists and physicists produced increasingly realistic simulation platforms. Currently, the market stylized facts are easily reproduced and one has now to address the realistic details of the Market Microstructure and of the Traders Behaviour. This calls for new methods and tools capable of bridging smoothly between simulations and experiments in economics. We propose here the following Avatar-Based Method (ABM). The subjects implement and maintain their Avatars (programs encoding their personal decision making procedures) on NatLab, a market simulation platform. Once these procedures are fed in a computer edible format, they can be operationally used as such without the need for belabouring, interpreting or conceptualising them. Thus ABM short-circuits the usual behavioural economics experiments that search for the psychological mechanisms underlying the subjects behaviour. Finally, ABM maintains a level of objectivity close to the classical behaviourism while extending its scope to subjects' decision making mechanisms. We report on experiments where Avatars designed and maintained by humans from different backgrounds (including real traders) compete in a continuous double-auction market. We hope this unbiased way of capturing the adaptive evolution of real subjects behaviour may lead to a new kind of behavioural economics experiments with a high degree of reliability, analysability and reproducibility.
[ { "version": "v1", "created": "Tue, 6 Sep 2005 17:02:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Daniel", "Gilles", "" ], [ "Muchnik", "Lev", "" ], [ "Solomon", "Sorin", "" ] ]
cs/0509018
David S. H. Rosenthal
David S. H. Rosenthal, Thomas S. Robertson, Tom Lipkis, Vicky Reich, Seth Morabito
Requirements for Digital Preservation Systems: A Bottom-Up Approach
null
null
null
null
cs.DL
null
The field of digital preservation is being defined by a set of standards developed top-down, starting with an abstract reference model (OAIS) and gradually adding more specific detail. Systems claiming conformance to these standards are entering production use. Work is underway to certify that systems conform to requirements derived from OAIS. We complement these requirements derived top-down by presenting an alternate, bottom-up view of the field. The fundamental goal of these systems is to ensure that the information they contain remains accessible for the long term. We develop a parallel set of requirements based on observations of how existing systems handle this task, and on an analysis of the threats to achieving the goal. On this basis we suggest disclosures that systems should provide as to how they satisfy their goals.
[ { "version": "v1", "created": "Tue, 6 Sep 2005 19:26:08 GMT" }, { "version": "v2", "created": "Tue, 6 Sep 2005 20:17:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosenthal", "David S. H.", "" ], [ "Robertson", "Thomas S.", "" ], [ "Lipkis", "Tom", "" ], [ "Reich", "Vicky", "" ], [ "Morabito", "Seth", "" ] ]
cs/0509020
Johannes Stegmann Dr.
Johannes Stegmann, Guenter Grohmann (Charite, Berlin)
Transitive Text Mining for Information Extraction and Hypothesis Generation
12 pages, 6 figures
null
null
null
cs.IR cs.AI
null
Transitive text mining - also named Swanson Linking (SL) after its primary and principal researcher - tries to establish meaningful links between literature sets which are virtually disjoint in the sense that each does not mention the main concept of the other. If successful, SL may give rise to the development of new hypotheses. In this communication we describe our approach to transitive text mining which employs co-occurrence analysis of the medical subject headings (MeSH), the descriptors assigned to papers indexed in PubMed. In addition, we will outline the current state of our web-based information system which will enable our users to perform literature-driven hypothesis building on their own.
[ { "version": "v1", "created": "Wed, 7 Sep 2005 12:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Stegmann", "Johannes", "", "Charite, Berlin" ], [ "Grohmann", "Guenter", "", "Charite, Berlin" ] ]
cs/0509024
Nikolay Pelov
Nikolay Pelov, Marc Denecker, Maurice Bruynooghe
Well-founded and Stable Semantics of Logic Programs with Aggregates
54 pages; To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
null
In this paper, we present a framework for the semantics and the computation of aggregates in the context of logic programming. In our study, an aggregate can be an arbitrary interpreted second order predicate or function. We define extensions of the Kripke-Kleene, the well-founded and the stable semantics for aggregate programs. The semantics is based on the concept of a three-valued immediate consequence operator of an aggregate program. Such an operator approximates the standard two-valued immediate consequence operator of the program, and induces a unique Kripke-Kleene model, a unique well-founded model and a collection of stable models. We study different ways of defining such operators and thus obtain a framework of semantics, offering different trade-offs between precision and tractability. In particular, we investigate conditions on the operator that guarantee that the computation of the three types of semantics remains on the same level as for logic programs without aggregates. Other results show that, in practice, even efficient three-valued immediate consequence operators which are very low in the precision hierarchy, still provide optimal precision.
[ { "version": "v1", "created": "Thu, 8 Sep 2005 19:54:53 GMT" }, { "version": "v2", "created": "Mon, 15 May 2006 18:41:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Pelov", "Nikolay", "" ], [ "Denecker", "Marc", "" ], [ "Bruynooghe", "Maurice", "" ] ]
cs/0509025
Jeremy Avigad
Jeremy Avigad, Kevin Donnelly, David Gray, and Paul Raff
A formally verified proof of the prime number theorem
23 pages
null
null
null
cs.AI cs.LO cs.SC
null
The prime number theorem, established by Hadamard and de la Vall'ee Poussin independently in 1896, asserts that the density of primes in the positive integers is asymptotic to 1 / ln x. Whereas their proofs made serious use of the methods of complex analysis, elementary proofs were provided by Selberg and Erd"os in 1948. We describe a formally verified version of Selberg's proof, obtained using the Isabelle proof assistant.
[ { "version": "v1", "created": "Fri, 9 Sep 2005 15:47:35 GMT" }, { "version": "v2", "created": "Thu, 19 Jan 2006 21:18:33 GMT" }, { "version": "v3", "created": "Thu, 6 Apr 2006 20:27:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Donnelly", "Kevin", "" ], [ "Gray", "David", "" ], [ "Raff", "Paul", "" ] ]
cs/0509026
Mikkel Thorup
Nick Duffield, Carsten Lund, Mikkel Thorup
Sampling to estimate arbitrary subset sums
null
null
null
null
cs.DS
null
Starting with a set of weighted items, we want to create a generic sample of a certain size that we can later use to estimate the total weight of arbitrary subsets. For this purpose, we propose priority sampling which tested on Internet data performed better than previous methods by orders of magnitude. Priority sampling is simple to define and implement: we consider a steam of items i=0,...,n-1 with weights w_i. For each item i, we generate a random number r_i in (0,1) and create a priority q_i=w_i/r_i. The sample S consists of the k highest priority items. Let t be the (k+1)th highest priority. Each sampled item i in S gets a weight estimate W_i=max{w_i,t}, while non-sampled items get weight estimate W_i=0. Magically, it turns out that the weight estimates are unbiased, that is, E[W_i]=w_i, and by linearity of expectation, we get unbiased estimators over any subset sum simply by adding the sampled weight estimates from the subset. Also, we can estimate the variance of the estimates, and surpricingly, there is no co-variance between different weight estimates W_i and W_j. We conjecture an extremely strong near-optimality; namely that for any weight sequence, there exists no specialized scheme for sampling k items with unbiased estimators that gets smaller total variance than priority sampling with k+1 items. Very recently Mario Szegedy has settled this conjecture.
[ { "version": "v1", "created": "Fri, 9 Sep 2005 21:47:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Duffield", "Nick", "" ], [ "Lund", "Carsten", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0509027
Laemmel
Oleg Kiselyov and Ralf Laemmel
Haskell's overlooked object system
79 pages; software available at http://homepages.cwi.nl/~ralf/OOHaskell/
null
null
null
cs.PL
null
Haskell provides type-class-bounded and parametric polymorphism as opposed to subtype polymorphism of object-oriented languages such as Java and OCaml. It is a contentious question whether Haskell 98 without extensions, or with common extensions, or with new extensions can fully support conventional object-oriented programming with encapsulation, mutable state, inheritance, overriding, statically checked implicit and explicit subtyping, and so on. We systematically substantiate that Haskell 98, with some common extensions, supports all the conventional OO features plus more advanced ones, including first-class lexically scoped classes, implicitly polymorphic classes, flexible multiple inheritance, safe downcasts and safe co-variant arguments. Haskell indeed can support width and depth, structural and nominal subtyping. We address the particular challenge to preserve Haskell's type inference even for objects and object-operating functions. The OO features are introduced in Haskell as the OOHaskell library. OOHaskell lends itself as a sandbox for typed OO language design.
[ { "version": "v1", "created": "Sat, 10 Sep 2005 12:35:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiselyov", "Oleg", "" ], [ "Laemmel", "Ralf", "" ] ]
cs/0509030
Liu Jun-Bao Dr.
Liu Jun-Bao, Xiao Guo-Zhen
Multi-Proxy Multi-Signcryption Scheme from Pairings
4 pages
null
null
null
cs.CR
null
A first multi-proxy multi-signcryption scheme from pairings, which efficiently combines a multi-proxy multi-signature scheme with a signcryption, is proposed. Its security is analyzed in detail. In our scheme, a proxy signcrypter group could be authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryptions can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on behalf of the original signcrypter group. The correctness and the security of this scheme are proved.
[ { "version": "v1", "created": "Mon, 12 Sep 2005 12:51:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Jun-Bao", "Liu", "" ], [ "Guo-Zhen", "Xiao", "" ] ]
cs/0509031
David S. Johnson
Janos Csirik, David S. Johnson, and Claire Kenyon
On the Worst-case Performance of the Sum-of-Squares Algorithm for Bin Packing
null
null
null
null
cs.DS
null
The Sum of Squares algorithm for bin packing was defined in [2] and studied in great detail in [1], where it was proved that its worst case performance ratio is at most 3. In this note, we improve the asymptotic worst case bound to 2.7777...
[ { "version": "v1", "created": "Mon, 12 Sep 2005 14:49:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Csirik", "Janos", "" ], [ "Johnson", "David S.", "" ], [ "Kenyon", "Claire", "" ] ]
cs/0509033
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng, Bin Dong
K-Histograms: An Efficient Clustering Algorithm for Categorical Dataset
11 pages
null
null
Tr-2003-08
cs.AI
null
Clustering categorical data is an integral part of data mining and has attracted much attention recently. In this paper, we present k-histogram, a new efficient algorithm for clustering categorical data. The k-histogram algorithm extends the k-means algorithm to categorical domain by replacing the means of clusters with histograms, and dynamically updates histograms in the clustering process. Experimental results on real datasets show that k-histogram algorithm can produce better clustering results than k-modes algorithm, the one related with our work most closely.
[ { "version": "v1", "created": "Tue, 13 Sep 2005 06:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ], [ "Dong", "Bin", "" ] ]
cs/0509034
Maurice Pouzet
Maurice Pouzet (ICJ), Nejib Zaguia (SITE)
N-free extensions of posets.Note on a theorem of P.A.Grillet
7 pages, 4 pictures
null
null
null
cs.DM
null
Let $S\_{N}(P)$ be the poset obtained by adding a dummy vertex on each diagonal edge of the $N$'s of a finite poset $P$. We show that $S\_{N}(S\_{N}(P))$ is $N$-free. It follows that this poset is the smallest $N$-free barycentric subdivision of the diagram of $P$, poset whose existence was proved by P.A. Grillet. This is also the poset obtained by the algorithm starting with $P\_0:=P$ and consisting at step $m$ of adding a dummy vertex on a diagonal edge of some $N$ in $P\_m$, proving that the result of this algorithm does not depend upon the particular choice of the diagonal edge choosen at each step. These results are linked to drawing of posets.
[ { "version": "v1", "created": "Tue, 13 Sep 2005 08:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pouzet", "Maurice", "", "ICJ" ], [ "Zaguia", "Nejib", "", "SITE" ] ]
cs/0509036
Shujun Li Dr.
Shujun Li and Kwok-Tung Lo
Security Problems with Improper Implementations of Improved FEA-M
8 pages, elsart.cls
Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, 2007
10.1016/j.jss.2006.05.002
null
cs.CR cs.MM
null
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service). The implementation-dependent differential attack is very efficient in complexity and needs only $O(n^2)$ chosen plaintext or ciphertext bits. In addition, this paper also points out a minor security problem with the selection of the session key. In real implementations of the cryptosystem, these security problems should be carefully avoided, or the cryptosystem has to be further enhanced to work under such weak implementations.
[ { "version": "v1", "created": "Tue, 13 Sep 2005 10:35:52 GMT" }, { "version": "v2", "created": "Sun, 25 Jun 2006 12:20:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Lo", "Kwok-Tung", "" ] ]
cs/0509037
David Hales
David Hales, Stefano Arteconi
Friends for Free: Self-Organizing Artificial Social Networks for Trust and Cooperation
null
null
null
null
cs.MA
null
By harvesting friendship networks from e-mail contacts or instant message "buddy lists" Peer-to-Peer (P2P) applications can improve performance in low trust environments such as the Internet. However, natural social networks are not always suitable, reliable or available. We propose an algorithm (SLACER) that allows peer nodes to create and manage their own friendship networks. We evaluate performance using a canonical test application, requiring cooperation between peers for socially optimal outcomes. The Artificial Social Networks (ASN) produced are connected, cooperative and robust - possessing many of the disable properties of human friendship networks such as trust between friends (directly linked peers) and short paths linking everyone via a chain of friends. In addition to new application possibilities, SLACER could supply ASN to P2P applications that currently depend on human social networks thus transforming them into fully autonomous, self-managing systems.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 07:30:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Hales", "David", "" ], [ "Arteconi", "Stefano", "" ] ]
cs/0509038
Vilhelm Dahll\"of
Vilhelm Dahllof
Algorithms for Max Hamming Exact Satisfiability
null
null
null
null
cs.DS
null
We here study Max Hamming XSAT, ie, the problem of finding two XSAT models at maximum Hamming distance. By using a recent XSAT solver as an auxiliary function, an O(1.911^n) time algorithm can be constructed, where n is the number of variables. This upper time bound can be further improved to O(1.8348^n) by introducing a new kind of branching, more directly suited for finding models at maximum Hamming distance. The techniques presented here are likely to be of practical use as well as of theoretical value, proving that there are non-trivial algorithms for maximum Hamming distance problems.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 09:04:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Dahllof", "Vilhelm", "" ] ]
cs/0509040
Christian Betz
Christian Betz, Alexander Hoernlein and Frank Puppe
Authoring case based training by document data extraction
11 pages, 10th ChEM Workshop, 2005; technical article
null
null
null
cs.AI cs.IR
null
In this paper, we propose an scalable approach to modeling based upon word processing documents, and we describe the tool Phoenix providing the technical infrastructure. For our training environment d3web.Train, we developed a tool to extract case knowledge from existing documents, usually dismissal records, extending Phoenix to d3web.CaseImporter. Independent authors used this tool to develop training systems, observing a significant decrease of time for setteling-in and a decrease of time necessary for developing a case.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 13:20:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Betz", "Christian", "" ], [ "Hoernlein", "Alexander", "" ], [ "Puppe", "Frank", "" ] ]
cs/0509042
Mark Braverman
Mark Braverman, Stephen Cook
Computing over the Reals: Foundations for Scientific Computing
null
null
null
null
cs.CC cs.LO
null
We give a detailed treatment of the ``bit-model'' of computability and complexity of real functions and subsets of R^n, and argue that this is a good way to formalize many problems of scientific computation. In the introduction we also discuss the alternative Blum-Shub-Smale model. In the final section we discuss the issue of whether physical systems could defeat the Church-Turing Thesis.
[ { "version": "v1", "created": "Wed, 14 Sep 2005 17:58:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Braverman", "Mark", "" ], [ "Cook", "Stephen", "" ] ]
cs/0509050
Martyn Amos
Martyn Amos and Andrew Wood
Effect of door delay on aircraft evacuation time
8 pages, 2 figures
null
null
null
cs.MA
null
The recent commercial launch of twin-deck Very Large Transport Aircraft (VLTA) such as the Airbus A380 has raised questions concerning the speed at which they may be evacuated. The abnormal height of emergency exits on the upper deck has led to speculation that emotional factors such as fear may lead to door delay, and thus play a significant role in increasing overall evacuation time. Full-scale evacuation tests are financially expensive and potentially hazardous, and systematic studies of the evacuation of VLTA are rare. Here we present a computationally cheap agent-based framework for the general simulation of aircraft evacuation, and apply it to the particular case of the Airbus A380. In particular, we investigate the effect of door delay, and conclude that even a moderate average delay can lead to evacuation times that exceed the maximum for safety certification. The model suggests practical ways to minimise evacuation time, as well as providing a general framework for the simulation of evacuation.
[ { "version": "v1", "created": "Fri, 16 Sep 2005 17:15:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Amos", "Martyn", "" ], [ "Wood", "Andrew", "" ] ]
cs/0509053
Joshua Brandon Holden
Joshua Holden, Richard Layton, Laurence Merkle, and Tina Hudson
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
11 pages, 3 figures, uses amsrefs.sty v2.0 and cryptologiabib.sty (included); to appear in Cryptologia
Cryptologia, 30:69--77, 2006
null
null
cs.CR cs.CE
null
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates. The competition included a cryptography problem, for which a workshop was run during the conference. This paper describes the competition, focusing on the cryptography problem and the workshop. Notes from the workshop and code for the computer programs are made available via the Internet. The results of a personal self-evaluation (PSE) are described.
[ { "version": "v1", "created": "Sun, 18 Sep 2005 22:11:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Holden", "Joshua", "" ], [ "Layton", "Richard", "" ], [ "Merkle", "Laurence", "" ], [ "Hudson", "Tina", "" ] ]
cs/0509054
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke
Grid Vertex-Unfolding Orthogonal Polyhedra
Original: 12 pages, 8 figures, 11 references. Revised: 22 pages, 16 figures, 12 references. New version is a substantial revision superceding the preliminary extended abstract that appeared in Lecture Notes in Computer Science, Volume 3884, Springer, Berlin/Heidelberg, Feb. 2006, pp. 264-276
null
null
null
cs.CG cs.DM
null
An edge-unfolding of a polyhedron is produced by cutting along edges and flattening the faces to a *net*, a connected planar piece with no overlaps. A *grid unfolding* allows additional cuts along grid edges induced by coordinate planes passing through every vertex. A vertex-unfolding permits faces in the net to be connected at single vertices, not necessarily along edges. We show that any orthogonal polyhedron of genus zero has a grid vertex-unfolding. (There are orthogonal polyhedra that cannot be vertex-unfolded, so some type of "gridding" of the faces is necessary.) For any orthogonal polyhedron P with n vertices, we describe an algorithm that vertex-unfolds P in O(n^2) time. Enroute to explaining this algorithm, we present a simpler vertex-unfolding algorithm that requires a 3 x 1 refinement of the vertex grid.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 00:22:03 GMT" }, { "version": "v2", "created": "Wed, 27 Sep 2006 18:21:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/0509055
Vikas Hamine
Vikas Hamine and Paul Helman
Learning Optimal Augmented Bayes Networks
4 pages, 1 figure
null
null
TR-CS-2004-11
cs.LG
null
Naive Bayes is a simple Bayesian classifier with strong independence assumptions among the attributes. This classifier, desipte its strong independence assumptions, often performs well in practice. It is believed that relaxing the independence assumptions of a naive Bayes classifier may improve the classification accuracy of the resulting structure. While finding an optimal unconstrained Bayesian Network (for most any reasonable scoring measure) is an NP-hard problem, it is possible to learn in polynomial time optimal networks obeying various structural restrictions. Several authors have examined the possibilities of adding augmenting arcs between attributes of a Naive Bayes classifier. Friedman, Geiger and Goldszmidt define the TAN structure in which the augmenting arcs form a tree on the attributes, and present a polynomial time algorithm that learns an optimal TAN with respect to MDL score. Keogh and Pazzani define Augmented Bayes Networks in which the augmenting arcs form a forest on the attributes (a collection of trees, hence a relaxation of the stuctural restriction of TAN), and present heuristic search methods for learning good, though not optimal, augmenting arc sets. The authors, however, evaluate the learned structure only in terms of observed misclassification error and not against a scoring metric, such as MDL. In this paper, we present a simple, polynomial time greedy algorithm for learning an optimal Augmented Bayes Network with respect to MDL score.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 04:57:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamine", "Vikas", "" ], [ "Helman", "Paul", "" ] ]
cs/0509056
David Freeman
David Freeman
Pairing-based identification schemes
null
null
null
null
cs.CR
null
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification scheme.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 07:52:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Freeman", "David", "" ] ]
cs/0509057
Todd Veldhuizen
Todd L. Veldhuizen
Language embeddings that preserve staging and safety
null
null
null
null
cs.PL
null
We study embeddings of programming languages into one another that preserve what reductions take place at compile-time, i.e., staging. A certain condition -- what we call a `Turing complete kernel' -- is sufficient for a language to be stage-universal in the sense that any language may be embedded in it while preserving staging. A similar line of reasoning yields the notion of safety-preserving embeddings, and a useful characterization of safety-universality. Languages universal with respect to staging and safety are good candidates for realizing domain-specific embedded languages (DSELs) and `active libraries' that provide domain-specific optimizations and safety checks.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 15:30:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
cs/0509060
Lane A. Hemaspaandra
Lane A. Hemaspaandra, Christopher M. Homan, Sven Kosub
Cluster Computing and the Power of Edge Recognition
null
null
null
URCS-TR-2005-878
cs.CC cs.DM
null
We study the robustness--the invariance under definition changes--of the cluster class CL#P [HHKW05]. This class contains each #P function that is computed by a balanced Turing machine whose accepting paths always form a cluster with respect to some length-respecting total order with efficient adjacency checks. The definition of CL#P is heavily influenced by the defining paper's focus on (global) orders. In contrast, we define a cluster class, CLU#P, to capture what seems to us a more natural model of cluster computing. We prove that the naturalness is costless: CL#P = CLU#P. Then we exploit the more natural, flexible features of CLU#P to prove new robustness results for CL#P and to expand what is known about the closure properties of CL#P. The complexity of recognizing edges--of an ordered collection of computation paths or of a cluster of accepting computation paths--is central to this study. Most particularly, our proofs exploit the power of unique discovery of edges--the ability of nondeterministic functions to, in certain settings, discover on exactly one (in some cases, on at most one) computation path a critical piece of information regarding edges of orderings or clusters.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 21:25:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Homan", "Christopher M.", "" ], [ "Kosub", "Sven", "" ] ]
cs/0509063
Krzysztof R. Apt
Krzysztof R. Apt
Order Independence and Rationalizability
Appeared in: Proc. of the 10th conference on Theoretical Aspects of Rationality and Knowledge (TARK X), pp. 22-38 (2005)
null
null
null
cs.GT
null
Two natural strategy elimination procedures have been studied for strategic games. The first one involves the notion of (strict, weak, etc) dominance and the second the notion of rationalizability. In the case of dominance the criterion of order independence allowed us to clarify which notions and under what circumstances are robust. In the case of rationalizability this criterion has not been considered. In this paper we investigate the problem of order independence for rationalizability by focusing on three naturally entailed reduction relations on games. These reduction relations are distinguished by the adopted reference point for the notion of a better response. Additionally, they are parametrized by the adopted system of beliefs. We show that for one reduction relation the outcome of its (possibly transfinite) iterations does not depend on the order of elimination of the strategies. This result does not hold for the other two reduction relations. However, under a natural assumption the iterations of all three reduction relations yield the same outcome. The obtained order independence results apply to the frameworks considered in Bernheim 84 and Pearce 84. For finite games the iterations of all three reduction relations coincide and the order independence holds for three natural systems of beliefs considered in the literature.
[ { "version": "v1", "created": "Tue, 20 Sep 2005 08:27:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/0509066
Richard McClatchey
David Manset, Richard McClatchey, Flavio Oquendo, Herve Verjus
A Model-driven Approach for Grid Services Engineering
7 pages, 3 figures. Proc of the 18th international conference on Software and Systems Engineering and Applications. Paris November 2005
null
null
null
cs.SE cs.DC
null
As a consequence to the hype of Grid computing, such systems have seldom been designed using formal techniques. The complexity and rapidly growing demand around Grid technologies has favour the use of classical development techniques, resulting in no guidelines or rules and unstructured engineering processes. This paper advocates a formal approach to Grid applications development in an effort to contribute to the rigorous development of Grids software architectures. This approach addresses cross-platform interoperability and quality of service; the model-driven paradigm is applied to a formal architecture-centric engineering method in order to benefit from the formal semantic description power in addition to model-based transformations. The result of such a novel combined concept promotes the re-use of design models and eases developments in Grid computing by providing an adapted development process and ensuring correctness at each design step.
[ { "version": "v1", "created": "Wed, 21 Sep 2005 17:39:19 GMT" }, { "version": "v2", "created": "Tue, 27 Sep 2005 15:36:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Manset", "David", "" ], [ "McClatchey", "Richard", "" ], [ "Oquendo", "Flavio", "" ], [ "Verjus", "Herve", "" ] ]
cs/0509071
Krzysztof R. Apt
Krzysztof R. Apt, Francesca Rossi and K. Brent Venable
CP-nets and Nash equilibria
6 pages. in: roc. of the Third International Conference on Computational Intelligence, Robotics and Autonomous Systems (CIRAS '05). To appear
null
null
null
cs.GT cs.AI
null
We relate here two formalisms that are used for different purposes in reasoning about multi-agent systems. One of them are strategic games that are used to capture the idea that agents interact with each other while pursuing their own interest. The other are CP-nets that were introduced to express qualitative and conditional preferences of the users and which aim at facilitating the process of preference elicitation. To relate these two formalisms we introduce a natural, qualitative, extension of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of an appropriately defined strategic game in the above sense. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games.
[ { "version": "v1", "created": "Thu, 22 Sep 2005 16:07:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "K. Brent", "" ] ]
cs/0509072
Kaikai Shen
Kaikai Shen, Lide Wu
Folksonomy as a Complex Network
null
null
null
null
cs.IR cs.DL physics.soc-ph
null
Folksonomy is an emerging technology that works to classify the information over WWW through tagging the bookmarks, photos or other web-based contents. It is understood to be organized by every user while not limited to the authors of the contents and the professional editors. This study surveyed the folksonomy as a complex network. The result indicates that the network, which is composed of the tags from the folksonomy, displays both properties of small world and scale-free. However, the statistics only shows a local and static slice of the vast body of folksonomy which is still evolving.
[ { "version": "v1", "created": "Fri, 23 Sep 2005 13:27:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Kaikai", "" ], [ "Wu", "Lide", "" ] ]
cs/0509074
Assaf Naor
Assaf Naor and Gideon Schechtman
Planar Earthmover is not in $L_1$
null
null
null
null
cs.CG math.FA
null
We show that any $L_1$ embedding of the transportation cost (a.k.a. Earthmover) metric on probability measures supported on the grid $\{0,1,...,n\}^2\subseteq \R^2$ incurs distortion $\Omega(\sqrt{\log n})$. We also use Fourier analytic techniques to construct a simple $L_1$ embedding of this space which has distortion $O(\log n)$.
[ { "version": "v1", "created": "Mon, 26 Sep 2005 16:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Naor", "Assaf", "" ], [ "Schechtman", "Gideon", "" ] ]
cs/0509076
Anil Bazaz
Anil Bazaz and James D. Arthur
On Vulnerabilities, Constraints and Assumptions
null
null
null
null
cs.CR
null
This report presents a taxonomy of vulnerabilities created as a part of an effort to develop a framework for deriving verification and validation strategies to assess software security. This taxonomy is grounded in a theoretical model of computing, which establishes the relationship between vulnerabilities, software applications and the computer system resources. This relationship illustrates that a software application is exploited by violating constraints imposed by computer system resources and assumptions made about their usage. In other words, a vulnerability exists in the software application if it allows violation of these constraints and assumptions. The taxonomy classifies these constraints and assumptions. The model also serves as a basis for the classification scheme the taxonomy uses, in which the computer system resources such as, memory, input/output, and cryptographic resources serve as categories and subcategories. Vulnerabilities, which are expressed in the form of constraints and assumptions, are classified according to these categories and subcategories. This taxonomy is both novel and distinctively different from other taxonomies found in the literature.
[ { "version": "v1", "created": "Mon, 26 Sep 2005 21:20:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Bazaz", "Anil", "" ], [ "Arthur", "James D.", "" ] ]
cs/0509082
Yossi Zana
Yossi Zana, Roberto M. Cesar-JR
Face Recognition Based on Polar Frequency Features
ACM Transactions on Applied Perception
null
null
null
cs.CV
null
A novel biologically motivated face recognition algorithm based on polar frequency is presented. Polar frequency descriptors are extracted from face images by Fourier-Bessel transform (FBT). Next, the Euclidean distance between all images is computed and each image is now represented by its dissimilarity to the other images. A Pseudo-Fisher Linear Discriminant was built on this dissimilarity space. The performance of Discrete Fourier transform (DFT) descriptors, and a combination of both feature types was also evaluated. The algorithms were tested on a 40- and 1196-subjects face database (ORL and FERET, respectively). With 5 images per subject in the training and test datasets, error rate on the ORL database was 3.8, 1.25 and 0.2% for the FBT, DFT, and the combined classifier, respectively, as compared to 2.6% achieved by the best previous algorithm. The most informative polar frequency features were concentrated at low-to-medium angular frequencies coupled to low radial frequencies. On the FERET database, where an affine normalization pre-processing was applied, the FBT algorithm outperformed only the PCA in a rank recognition test. However, it achieved performance comparable to state-of-the-art methods when evaluated by verification tests. These results indicate the high informative value of the polar frequency content of face images in relation to recognition and verification tasks, and that the Cartesian frequency content can complement information about the subjects' identity, but possibly only when the images are not pre-normalized. Possible implications for human face recognition are discussed.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 15:50:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Zana", "Yossi", "" ], [ "Cesar-JR", "Roberto M.", "" ] ]
cs/0509083
Yossi Zana
Yossi Zana, Roberto M. Cesar-Jr, Rogerio S. Feris, Matthew Turk
Face Verification in Polar Frequency Domain: a Biologically Motivated Approach
2005, International Symposium on Visual Computing (ISVC)
null
null
null
cs.CV
null
We present a novel local-based face verification system whose components are analogous to those of biological systems. In the proposed system, after global registration and normalization, three eye regions are converted from the spatial to polar frequency domain by a Fourier-Bessel Transform. The resulting representations are embedded in a dissimilarity space, where each image is represented by its distance to all the other images. In this dissimilarity space a Pseudo-Fisher discriminator is built. ROC and equal error rate verification test results on the FERET database showed that the system performed at least as state-of-the-art methods and better than a system based on polar Fourier features. The local-based system is especially robust to facial expression and age variations, but sensitive to registration errors.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 16:06:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Zana", "Yossi", "" ], [ "Cesar-Jr", "Roberto M.", "" ], [ "Feris", "Rogerio S.", "" ], [ "Turk", "Matthew", "" ] ]
cs/0509084
Herbert van de Sompel
Jeroen Bekaert, Xiaoming Liu, Herbert Van de Sompel
Representing Digital Assets for Long-Term Preservation using MPEG-21 DID
Accepted paper for PV 2005 "Ensuring Long-term Preservation and Adding Value to Scientific and Technical data" (http://www.ukoln.ac.uk/events/pv-2005/)
null
null
null
cs.DL
null
Various efforts aimed at representing digital assets have emerged from several communities over the last years, including the Metadata Encoding and Transmission Standard (METS), the IMS Content Packaging (IMS-CP) XML Binding and the XML Formatted Data Units (XFDU). The MPEG-21 Digital Item Declaration (MPEG-21 DID) is another approach that can be used for the representation of digital assets in XML. This paper will explore the potential of the MPEG-21 DID in a Digital Preservation context, by looking at the core building blocks of the OAIS Information Model and the way in which they map to the MPEG-21 DID abstract model and the MPEG-21 DIDL XML syntax.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 19:05:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Bekaert", "Jeroen", "" ], [ "Liu", "Xiaoming", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0509090
Herbert van de Sompel
Jeroen Bekaert, Herbert Van de Sompel
Access Interfaces for Open Archival Information Systems based on the OAI-PMH and the OpenURL Framework for Context-Sensitive Services
Accepted paper for PV 2005 "Ensuring Long-term Preservation and Adding Value to Scientific and Technical data" (http://www.ukoln.ac.uk/events/pv-2005/)
null
null
null
cs.DL
null
In recent years, a variety of digital repository and archival systems have been developed and adopted. All of these systems aim at hosting a variety of compound digital assets and at providing tools for storing, managing and accessing those assets. This paper will focus on the definition of common and standardized access interfaces that could be deployed across such diverse digital respository and archival systems. The proposed interfaces are based on the two formal specifications that have recently emerged from the Digital Library community: The Open Archive Initiative Protocol for Metadata Harvesting (OAI-PMH) and the NISO OpenURL Framework for Context-Sensitive Services (OpenURL Standard). As will be described, the former allows for the retrieval of batches of XML-based representations of digital assets, while the latter facilitates the retrieval of disseminations of a specific digital asset or of one or more of its constituents. The core properties of the proposed interfaces are explained in terms of the Reference Model for an Open Archival Information System (OAIS).
[ { "version": "v1", "created": "Wed, 28 Sep 2005 14:57:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Bekaert", "Jeroen", "" ], [ "Van de Sompel", "Herbert", "" ] ]
cs/0509091
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Semicomplete Multipartite Digraphs
null
null
null
null
cs.DM
null
For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a {\em homomorphism of $D$ to $H$} if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed directed or undirected graph $H$ and an input graph $D$, the problem of verifying whether there exists a homomorphism of $D$ to $H$ has been studied in a large number of papers. We study an optimization version of this decision problem. Our optimization problem is motivated by a real-world problem in defence logistics and was introduced very recently by the authors and M. Tso. Suppose we are given a pair of digraphs $D,H$ and a positive integral cost $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$ of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. Let $H$ be a fixed digraph. The minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows: For input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$, verify whether there is a homomorphism of $D$ to $H$ and, if it does exist, find such a homomorphism of minimum cost. In our previous paper we obtained a dichotomy classification of the time complexity of \MiP for $H$ being a semicomplete digraph. In this paper we extend the classification to semicomplete $k$-partite digraphs, $k\ge 3$, and obtain such a classification for bipartite tournaments.
[ { "version": "v1", "created": "Wed, 28 Sep 2005 15:40:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0509094
Carol Minton Morris Ms
Carol Minton Morris
Telling Great Stories: An NSDL Content and Communications System for Aggregation, Display, and Distribution of News and Features
3 pages, 2 figures
null
null
null
cs.DL cs.SE
null
Education digital libraries contain cataloged resources as well as contextual information about innovations in the use of educational technology, exemplar stories about community activities, and news from various user communities that include teachers, students, scholars, and developers. Long-standing library traditions of service, preservation, democratization of knowledge, rich discourse, equal access, and fair use are evident in library communications models that both pull in and push out contextual information from multiple sources integrated with editorial production processes. This paper argues that a dynamic narrative flow [1] is enabled by effective management of complex content and communications in a decentralized web-based education digital library making publishing objects such as aggregations of resources, or selected parts of objects [4] accessible through a Content and Communications System. Providing services that encourage patrons to reuse, reflect out, and contribute resources back [5] to the Library increases the reach and impact of the National Science Digital Library (NSDL). This system is a model for distributed content development and effective communications for education digital libraries in general.
[ { "version": "v1", "created": "Wed, 28 Sep 2005 16:28:19 GMT" }, { "version": "v2", "created": "Wed, 19 Oct 2005 21:20:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Morris", "Carol Minton", "" ] ]
cs/0509100
Shripad Thite
Jeff Erickson (1), Shripad Thite (1), David P. Bunde (1) ((1) Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA)
Distance-2 Edge Coloring is NP-Complete
3 pages, 1 figure in color
null
null
null
cs.DM cs.CC
null
We prove that it is NP-complete to determine whether there exists a distance-2 edge coloring (strong edge coloring) with 5 colors of a bipartite 2-inductive graph with girth 6 and maximum degree 3.
[ { "version": "v1", "created": "Fri, 30 Sep 2005 13:15:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Thite", "Shripad", "" ], [ "Bunde", "David P.", "" ] ]
cs/0510001
Jo\~ao Vitor Baldini Soares
Jo\~ao V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr., Herbert F. Jelinek, Michael J. Cree
Retinal Vessel Segmentation Using the 2-D Morlet Wavelet and Supervised Classification
9 pages, 7 figures and 1 table. Accepted for publication in IEEE Trans Med Imag; added copyright notice
IEEE Trans Med Imag, Vol. 25, no. 9, pp. 1214- 1222, Sep. 2006.
10.1109/TMI.2006.879967
null
cs.CV
null
We present a method for automated segmentation of the vasculature in retinal images. The method produces segmentations by classifying each image pixel as vessel or non-vessel, based on the pixel's feature vector. Feature vectors are composed of the pixel's intensity and continuous two-dimensional Morlet wavelet transform responses taken at multiple scales. The Morlet wavelet is capable of tuning to specific frequencies, thus allowing noise filtering and vessel enhancement in a single step. We use a Bayesian classifier with class-conditional probability density functions (likelihoods) described as Gaussian mixtures, yielding a fast classification, while being able to model complex decision surfaces and compare its performance with the linear minimum squared error classifier. The probability distributions are estimated based on a training set of labeled pixels obtained from manual segmentations. The method's performance is evaluated on publicly available DRIVE and STARE databases of manually labeled non-mydriatic images. On the DRIVE database, it achieves an area under the receiver operating characteristic (ROC) curve of 0.9598, being slightly superior than that presented by the method of Staal et al.
[ { "version": "v1", "created": "Fri, 30 Sep 2005 22:27:45 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 17:09:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Soares", "João V. B.", "" ], [ "Leandro", "Jorge J. G.", "" ], [ "Cesar", "Roberto M.", "Jr." ], [ "Jelinek", "Herbert F.", "" ], [ "Cree", "Michael J.", "" ] ]
cs/0510011
David Delahaye
David Delahaye (CEDRIC), Micaela Mayero (LIPN)
Diophantus' 20th Problem and Fermat's Last Theorem for n=4: Formalization of Fermat's Proofs in the Coq Proof Assistant
16 pages
null
null
null
cs.LO cs.SE math.NT
null
We present the proof of Diophantus' 20th problem (book VI of Diophantus' Arithmetica), which consists in wondering if there exist right triangles whose sides may be measured as integers and whose surface may be a square. This problem was negatively solved by Fermat in the 17th century, who used the "wonderful" method (ipse dixit Fermat) of infinite descent. This method, which is, historically, the first use of induction, consists in producing smaller and smaller non-negative integer solutions assuming that one exists; this naturally leads to a reductio ad absurdum reasoning because we are bounded by zero. We describe the formalization of this proof which has been carried out in the Coq proof assistant. Moreover, as a direct and no less historical application, we also provide the proof (by Fermat) of Fermat's last theorem for n=4, as well as the corresponding formalization made in Coq.
[ { "version": "v1", "created": "Tue, 4 Oct 2005 08:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Delahaye", "David", "", "CEDRIC" ], [ "Mayero", "Micaela", "", "LIPN" ] ]
cs/0510013
Luc Bouganim
Luc Bouganim (INRIA Rocquencourt), Cosmin Cremarenco (INRIA Rocquencourt), Fran\c{c}ois Dang Ngoc (INRIA Rocquencourt, PRISM - UVSQ), Nicolas Dieu (INRIA Rocquencourt), Philippe Pucheral (INRIA Rocquencourt, PRISM - UVSQ)
Safe Data Sharing and Data Dissemination on Smart Devices
null
null
null
null
cs.CR cs.DB
null
The erosion of trust put in traditional database servers, the growing interest for different forms of data dissemination and the concern for protecting children from suspicious Internet content are different factors that lead to move the access control from servers to clients. Several encryption schemes can be used to serve this purpose but all suffer from a static way of sharing data. In a precedent paper, we devised smarter client-based access control managers exploiting hardware security elements on client devices. The goal pursued is being able to evaluate dynamic and personalized access control rules on a ciphered XML input document, with the benefit of dissociating access rights from encryption. In this demonstration, we validate our solution using a real smart card platform and explain how we deal with the constraints usually met on hardware security elements (small memory and low throughput). Finally, we illustrate the generality of the approach and the easiness of its deployment through two different applications: a collaborative application and a parental control application on video streams.
[ { "version": "v1", "created": "Wed, 5 Oct 2005 12:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Bouganim", "Luc", "", "INRIA Rocquencourt" ], [ "Cremarenco", "Cosmin", "", "INRIA\n Rocquencourt" ], [ "Ngoc", "François Dang", "", "INRIA Rocquencourt, PRISM - UVSQ" ], [ "Dieu", "Nicolas", "", "INRIA Rocquencourt" ], [ "Pucheral", "Philippe", "", "INRIA Rocquencourt,\n PRISM - UVSQ" ] ]
cs/0510015
Laurent Audibert
Laurent Audibert (DELIC)
Word sense disambiguation criteria: a systematic study
null
20th International Conference on Computational Linguistics (COLING-2004) (2004) pp. 910-916
null
null
cs.CL
null
This article describes the results of a systematic in-depth study of the criteria used for word sense disambiguation. Our study is based on 60 target words: 20 nouns, 20 adjectives and 20 verbs. Our results are not always in line with some practices in the field. For example, we show that omitting non-content words decreases performance and that bigrams yield better results than unigrams.
[ { "version": "v1", "created": "Wed, 5 Oct 2005 14:23:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Audibert", "Laurent", "", "DELIC" ] ]
cs/0510017
Svante Janson
Svante Janson and Wojciech Szpankowski
Partial fillup and search time in LC tries
13 pages
null
null
null
cs.DS math.PR
null
Andersson and Nilsson introduced in 1993 a level-compressed trie (in short: LC trie) in which a full subtree of a node is compressed to a single node of degree being the size of the subtree. Recent experimental results indicated a 'dramatic improvement' when full subtrees are replaced by partially filled subtrees. In this paper, we provide a theoretical justification of these experimental results showing, among others, a rather moderate improvement of the search time over the original LC tries. For such an analysis, we assume that n strings are generated independently by a binary memoryless source with p denoting the probability of emitting a 1. We first prove that the so called alpha-fillup level (i.e., the largest level in a trie with alpha fraction of nodes present at this level) is concentrated on two values with high probability. We give these values explicitly up to O(1), and observe that the value of alpha (strictly between 0 and 1) does not affect the leading term. This result directly yields the typical depth (search time) in the alpha-LC tries with p not equal to 1/2, which turns out to be C loglog n for an explicitly given constant C (depending on p but not on alpha). This should be compared with recently found typical depth in the original LC tries which is C' loglog n for a larger constant C'. The search time in alpha-LC tries is thus smaller but of the same order as in the original LC tries.
[ { "version": "v1", "created": "Thu, 6 Oct 2005 10:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Janson", "Svante", "" ], [ "Szpankowski", "Wojciech", "" ] ]
cs/0510018
Danilo Gligoroski
Danilo Gligoroski
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Submitetd to conference
null
null
null
cs.CR cs.CC
null
In this paper we propose a definition and construction of a new family of one-way candidate functions ${\cal R}_N:Q^N \to Q^N$, where $Q=\{0,1,...,s-1\}$ is an alphabet with $s$ elements. Special instances of these functions can have the additional property to be permutations (i.e. one-way permutations). These one-way functions have the property that for achieving the security level of $2^n$ computations in order to invert them, only $n$ bits of input are needed. The construction is based on quasigroup string transformations. Since quasigroups in general do not have algebraic properties such as associativity, commutativity, neutral elements, inverting these functions seems to require exponentially many readings from the lookup table that defines them (a Latin Square) in order to check the satisfiability for the initial conditions, thus making them natural candidates for one-way functions.
[ { "version": "v1", "created": "Fri, 7 Oct 2005 00:29:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Gligoroski", "Danilo", "" ] ]
cs/0510019
Panigrahy Rina
Rina Panigrahy
Entropy based Nearest Neighbor Search in High Dimensions
null
null
null
null
cs.DS
null
In this paper we study the problem of finding the approximate nearest neighbor of a query point in the high dimensional space, focusing on the Euclidean space. The earlier approaches use locality-preserving hash functions (that tend to map nearby points to the same value) to construct several hash tables to ensure that the query point hashes to the same bucket as its nearest neighbor in at least one table. Our approach is different -- we use one (or a few) hash table and hash several randomly chosen points in the neighborhood of the query point showing that at least one of them will hash to the bucket containing its nearest neighbor. We show that the number of randomly chosen points in the neighborhood of the query point $q$ required depends on the entropy of the hash value $h(p)$ of a random point $p$ at the same distance from $q$ at its nearest neighbor, given $q$ and the locality preserving hash function $h$ chosen randomly from the hash family. Precisely, we show that if the entropy $I(h(p)|q,h) = M$ and $g$ is a bound on the probability that two far-off points will hash to the same bucket, then we can find the approximate nearest neighbor in $O(n^\rho)$ time and near linear $\tilde O(n)$ space where $\rho = M/\log(1/g)$. Alternatively we can build a data structure of size $\tilde O(n^{1/(1-\rho)})$ to answer queries in $\tilde O(d)$ time. By applying this analysis to the locality preserving hash functions in and adjusting the parameters we show that the $c$ nearest neighbor can be computed in time $\tilde O(n^\rho)$ and near linear space where $\rho \approx 2.06/c$ as $c$ becomes large.
[ { "version": "v1", "created": "Fri, 7 Oct 2005 00:55:06 GMT" }, { "version": "v2", "created": "Fri, 4 Nov 2005 16:55:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Panigrahy", "Rina", "" ] ]
cs/0510020
Thierry Poibeau
Thierry Poibeau (LIPN)
Sur le statut r\'{e}f\'{e}rentiel des entit\'{e}s nomm\'{e}es
11 pages
Conf\'{e}rence Traitement Automatique des Langues 2005, France (2005)
null
null
cs.AI cs.IR
null
We show in this paper that, on the one hand, named entities can be designated using different denominations and that, on the second hand, names denoting named entities are polysemous. The analysis cannot be limited to reference resolution but should take into account naming strategies, which are mainly based on two linguistic operations: synecdoche and metonymy. Lastly, we present a model that explicitly represents the different denominations in discourse, unifying the way to represent linguistic knowledge and world knowledge.
[ { "version": "v1", "created": "Fri, 7 Oct 2005 17:39:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Poibeau", "Thierry", "", "LIPN" ] ]
cs/0510022
Sam Bretheim
Sam Bretheim
Cryptographic Authentication of Navigation Protocols
12 pages
null
null
null
cs.CR
null
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
[ { "version": "v1", "created": "Sun, 9 Oct 2005 02:39:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Bretheim", "Sam", "" ] ]
cs/0510024
David Eppstein
David Eppstein, Michael T. Goodrich, and Jeremy Yu Meng
Delta-confluent Drawings
14 pages, 8 figures. A preliminary version of this work was presented at the 13th Int. Symp. Graph Drawing, Limerick, Ireland, September 2005
null
null
null
cs.CG
null
We generalize the tree-confluent graphs to a broader class of graphs called Delta-confluent graphs. This class of graphs and distance-hereditary graphs, a well-known class of graphs, coincide. Some results about the visualization of Delta-confluent graphs are also given.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 00:47:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Meng", "Jeremy Yu", "" ] ]
cs/0510025
Thierry Despeyroux
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis)
Practical Semantic Analysis of Web Sites and Documents
null
null
null
null
cs.IR
null
As Web sites are now ordinary products, it is necessary to explicit the notion of quality of a Web site. The quality of a site may be linked to the easiness of accessibility and also to other criteria such as the fact that the site is up to date and coherent. This last quality is difficult to insure because sites may be updated very frequently, may have many authors, may be partially generated and in this context proof-reading is very difficult. The same piece of information may be found in different occurrences, but also in data or meta-data, leading to the need for consistency checking. In this paper we make a parallel between programs and Web sites. We present some examples of semantic constraints that one would like to specify (constraints between the meaning of categories and sub-categories in a thematic directory, consistency between the organization chart and the rest of the site in an academic site). We present quickly the Natural Semantics, a way to specify the semantics of programming languages that inspires our works. Then we propose a specification language for semantic constraints in Web sites that, in conjunction with the well known ``make'' program, permits to generate some site verification tools by compiling the specification into Prolog code. We apply our method to a large XML document which is the scientific part of our institute activity report, tracking errors or inconsistencies and also constructing some indicators that can be used by the management of the institute.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 08:40:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0510027
Alexandre d'Aspremont
Alexandre d'Aspremont
A Market Test for the Positivity of Arrow-Debreu Prices
New version, fixes a few minor errors and typos
null
null
null
cs.CE
null
We derive tractable necessary and sufficient conditions for the absence of buy-and-hold arbitrage opportunities in a perfectly liquid, one period market. We formulate the positivity of Arrow-Debreu prices as a generalized moment problem to show that this no arbitrage condition is equivalent to the positive semidefiniteness of matrices formed by the market price of tradeable securities and their products. We apply this result to a market with multiple assets and basket call options.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 13:40:17 GMT" }, { "version": "v2", "created": "Thu, 15 Jun 2006 17:05:08 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
cs/0510028
Victor Grishchenko
Victor S. Grishchenko
Geo-aggregation permits low stretch and routing tables of logarithmical size
6 pages
null
null
null
cs.NI
null
This article first addresses applicability of Euclidean models to the domain of Internet routing. Those models are found (limitedly) applicable. Then a simplistic model of routing is constructed for Euclidean plane densely covered with points-routers. The model guarantees low stretch and logarithmical size of routing tables at any node. The paper concludes with a discussion on applicability of the model to real-world Internet routing.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 16:20:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Grishchenko", "Victor S.", "" ] ]
cs/0510031
Constantinos Daskalakis
Constantinos Daskalakis
Computing Pure Nash Equilibria via Markov Random Fields
null
null
null
null
cs.GT
null
In this paper we present a novel generic mapping between Graphical Games and Markov Random Fields so that pure Nash equilibria in the former can be found by statistical inference on the latter. Thus, the problem of deciding whether a graphical game has a pure Nash equilibrium, a well-known intractable problem, can be attacked by well-established algorithms such as Belief Propagation, Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes of graphical games become thus tractable, including all classes already known, but also new classes such as the games with O(log n) treewidth.
[ { "version": "v1", "created": "Thu, 13 Oct 2005 04:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Daskalakis", "Constantinos", "" ] ]
cs/0510036
Jan Chomicki
Jan Chomicki
Semantic Optimization Techniques for Preference Queries
null
null
null
null
cs.DB cs.AI cs.LO
null
Preference queries are relational algebra or SQL queries that contain occurrences of the winnow operator ("find the most preferred tuples in a given relation"). Such queries are parameterized by specific preference relations. Semantic optimization techniques make use of integrity constraints holding in the database. In the context of semantic optimization of preference queries, we identify two fundamental properties: containment of preference relations relative to integrity constraints and satisfaction of order axioms relative to integrity constraints. We show numerous applications of those notions to preference query evaluation and optimization. As integrity constraints, we consider constraint-generating dependencies, a class generalizing functional dependencies. We demonstrate that the problems of containment and satisfaction of order axioms can be captured as specific instances of constraint-generating dependency entailment. This makes it possible to formulate necessary and sufficient conditions for the applicability of our techniques as constraint validity problems. We characterize the computational complexity of such problems.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 13:25:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
cs/0510037
Rokia Bendaoud
Rokia Bendaoud (INRIA Lorraine - LORIA), Yannick Toussaint (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA)
Hi\'{e}rarchisation des r\`{e}gles d'association en fouille de textes
null
null
null
null
cs.IR cs.AI
null
Extraction of association rules is widely used as a data mining method. However, one of the limit of this approach comes from the large number of extracted rules and the difficulty for a human expert to deal with the totality of these rules. We propose to solve this problem by structuring the set of rules into hierarchy. The expert can then therefore explore the rules, access from one rule to another one more general when we raise up in the hierarchy, and in other hand, or a more specific rules. Rules are structured at two levels. The global level aims at building a hierarchy from the set of rules extracted. Thus we define a first type of rule-subsomption relying on Galois lattices. The second level consists in a local and more detailed analysis of each rule. It generate for a given rule a set of generalization rules structured into a local hierarchy. This leads to the definition of a second type of subsomption. This subsomption comes from inductive logic programming and integrates a terminological model.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 14:24:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bendaoud", "Rokia", "", "INRIA Lorraine - LORIA" ], [ "Toussaint", "Yannick", "", "INRIA\n Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ] ]
cs/0510039
Sandor P. Fekete
Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor P. Fekete, Jan van der Veen
DyNoC: A Dynamic Infrastructure for Communication in Dynamically Reconfigurable Devices
9 pages, 7 figures, 1 table, Latex, to appear in 15th International Conference on Field-Programmable Logic and Application
null
null
null
cs.AR
null
A new paradigm to support the communication among modules dynamically placed on a reconfigurable device at run-time is presented. Based on the network on chip (NoC) infrastructure, we developed a dynamic communication infrastructure as well as routing methodologies capable to handle routing in a NoC with obstacles created by dynamically placed components. We prove the unrestricted reachability of components and pins, the deadlock-freeness and we finally show the feasibility of our approach by means on real life example applications.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Bobda", "Christophe", "" ], [ "Ahmadinia", "Ali", "" ], [ "Majer", "Mateusz", "" ], [ "Teich", "Juergen", "" ], [ "Fekete", "Sandor P.", "" ], [ "van der Veen", "Jan", "" ] ]
cs/0510042
David Naccache
David Naccache
Secure and {\sl Practical} Identity-Based Encryption
null
null
null
null
cs.CR
null
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In essence, the new scheme divides Waters' public key size by a factor $\ell$ at the cost of (negligibly) reducing security by $\ell$ bits. Therefore, our construction settles an open question asked by Waters and constitutes the first fully secure {\sl practical} Identity-Based Encryption scheme
[ { "version": "v1", "created": "Sat, 15 Oct 2005 11:08:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Naccache", "David", "" ] ]
cs/0510046
Dmitry Mogilevsky
Dmitry Mogilevsky, Adam Lee, William Yurcik
Defining a Comprehensive Threat Model for High Performance Computational Clusters
null
null
null
null
cs.CR cs.DC
null
Over the past decade, high performance computational (HPC) clusters have become mainstream in academic and industrial settings as accessible means of computation. Throughout their proliferation, HPC security has been a secondary concern to performance. It is evident, however, that ensuring HPC security presents different challenges than the ones faced when dealing with traditional networks. To design suitable security measures for high performance computing, it is necessary to first realize the threats faced by such an environment. This task can be accomplished by the means of constructing a comprehensive threat model. To our knowledge, no such threat model exists with regards to Cluster Computing. In this paper, we explore the unique challenges of securing HPCs and propose a threat model based on the classical Confidentiality, Integrity and Availability security principles.
[ { "version": "v1", "created": "Sun, 16 Oct 2005 23:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ], [ "Lee", "Adam", "" ], [ "Yurcik", "William", "" ] ]
cs/0510048
Sandor P. Fekete
Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and Stefan Fischer
Deterministic boundary recognition and topology extraction for large sensor networks
10 pages, 9 figures, Latex, to appear in Symposium on Discrete Algorithms (SODA 2006)
null
null
null
cs.DC cs.CG
null
We present a new framework for the crucial challenge of self-organization of a large sensor network. The basic scenario can be described as follows: Given a large swarm of immobile sensor nodes that have been scattered in a polygonal region, such as a street network. Nodes have no knowledge of size or shape of the environment or the position of other nodes. Moreover, they have no way of measuring coordinates, geometric distances to other nodes, or their direction. Their only way of interacting with other nodes is to send or to receive messages from any node that is within communication range. The objective is to develop algorithms and protocols that allow self-organization of the swarm into large-scale structures that reflect the structure of the street network, setting the stage for global routing, tracking and guiding algorithms.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 12:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Kroeller", "Alexander", "" ], [ "Fekete", "Sandor P.", "" ], [ "Pfisterer", "Dennis", "" ], [ "Fischer", "Stefan", "" ] ]
cs/0510050
Gilles Kassel
Gilles Kassel (LaRIA)
Integration of the DOLCE top-level ontology into the OntoSpec methodology
null
null
null
LRR-2005-08
cs.AI
null
This report describes a new version of the OntoSpec methodology for ontology building. Defined by the LaRIA Knowledge Engineering Team (University of Picardie Jules Verne, Amiens, France), OntoSpec aims at helping builders to model ontological knowledge (upstream of formal representation). The methodology relies on a set of rigorously-defined modelling primitives and principles. Its application leads to the elaboration of a semi-informal ontology, which is independent of knowledge representation languages. We recently enriched the OntoSpec methodology by endowing it with a new resource, the DOLCE top-level ontology defined at the LOA (IST-CNR, Trento, Italy). The goal of this integration is to provide modellers with additional help in structuring application ontologies, while maintaining independence vis-\`{a}-vis formal representation languages. In this report, we first provide an overview of the OntoSpec methodology's general principles and then describe the DOLCE re-engineering process. A complete version of DOLCE-OS (i.e. a specification of DOLCE in the semi-informal OntoSpec language) is presented in an appendix.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 08:32:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kassel", "Gilles", "", "LaRIA" ] ]
cs/0510051
Gianluca Argentini
Gianluca Argentini
Numerical resolution of some BVP using Bernstein polynomials
7 pages, 3 figures
Posted since 2005-11-29 at Applied Mathematics E-Notes, http://www.math.nthu.edu.tw/~amen/
null
null
cs.NA cs.MS math.CA physics.comp-ph
null
In this work we present a method, based on the use of Bernstein polynomials, for the numerical resolution of some boundary values problems. The computations have not need of particular approximations of derivatives, such as finite differences, or particular techniques, such as finite elements. Also, the method doesn't require the use of matrices, as in resolution of linear algebraic systems, nor the use of like-Newton algorithms, as in resolution of non linear sets of equations. An initial equation is resolved only once, then the method is based on iterated evaluations of appropriate polynomials.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 09:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
cs/0510052
Victor Grishchenko
Victor S. Grishchenko
Remarks on "Toward Compact Interdomain Routing"
null
null
null
null
cs.NI
null
This paper critically examines some propositions and arguments of cs.NI/0508021 regarding applicability of hierarchical routing and perspectives of compact routing. Arguments against the former are found to be inaccurate while the latter is found to be equivalent to well-known deployed solutions. Also, multiple (stacked) application of compact-routing solutions is found to be equivalent to hierarchical routing.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 13:01:08 GMT" }, { "version": "v2", "created": "Thu, 20 Oct 2005 15:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Grishchenko", "Victor S.", "" ] ]
cs/0510053
Martin Kutz
Martin Kutz
A pair of trees without a simultaneous geometric embedding in the plane
This paper has been withdrawn by the author because it had turned out that the result was already known before
null
null
null
cs.CG
null
Any planar graph has a crossing-free straight-line drawing in the plane. A simultaneous geometric embedding of two n-vertex graphs is a straight-line drawing of both graphs on a common set of n points, such that the edges withing each individual graph do not cross. We consider simultaneous embeddings of two labeled trees, with predescribed vertex correspondences, and present an instance of such a pair that cannot be embedded. Further we provide an example of a planar graph that cannot be embedded together with a path when vertex correspondences are given.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 18:26:00 GMT" }, { "version": "v2", "created": "Tue, 1 Nov 2005 13:14:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
cs/0510054
Le Zhao Mr.
Le Zhao, Min Zhang, Shaoping Ma
The Nature of Novelty Detection
This paper pointed out the future direction for novelty detection research. 37 pages, double spaced version
null
null
null
cs.IR cs.CL
null
Sentence level novelty detection aims at reducing redundant sentences from a sentence list. In the task, sentences appearing later in the list with no new meanings are eliminated. Aiming at a better accuracy for detecting redundancy, this paper reveals the nature of the novelty detection task currently overlooked by the Novelty community $-$ Novelty as a combination of the partial overlap (PO, two sentences sharing common facts) and complete overlap (CO, the first sentence covers all the facts of the second sentence) relations. By formalizing novelty detection as a combination of the two relations between sentences, new viewpoints toward techniques dealing with Novelty are proposed. Among the methods discussed, the similarity, overlap, pool and language modeling approaches are commonly used. Furthermore, a novel approach, selected pool method is provided, which is immediate following the nature of the task. Experimental results obtained on all the three currently available novelty datasets showed that selected pool is significantly better or no worse than the current methods. Knowledge about the nature of the task also affects the evaluation methodologies. We propose new evaluation measures for Novelty according to the nature of the task, as well as possible directions for future study.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 14:56:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhao", "Le", "" ], [ "Zhang", "Min", "" ], [ "Ma", "Shaoping", "" ] ]
cs/0510056
Jackie (Jianhong) Shen
Yoon-Mo Jung and Jianhong Shen
First-Order Modeling and Stability Analysis of Illusory Contours
21 pages
null
null
null
cs.CV cs.AI
null
In visual cognition, illusions help elucidate certain intriguing latent perceptual functions of the human vision system, and their proper mathematical modeling and computational simulation are therefore deeply beneficial to both biological and computer vision. Inspired by existent prior works, the current paper proposes a first-order energy-based model for analyzing and simulating illusory contours. The lower complexity of the proposed model facilitates rigorous mathematical analysis on the detailed geometric structures of illusory contours. After being asymptotically approximated by classical active contours, the proposed model is then robustly computed using the celebrated level-set method of Osher and Sethian (J. Comput. Phys., 79:12-49, 1988) with a natural supervising scheme. Potential cognitive implications of the mathematical results are addressed, and generic computational examples are demonstrated and discussed.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 20:44:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Jung", "Yoon-Mo", "" ], [ "Shen", "Jianhong", "" ] ]
cs/0510059
Arnaud De La Fortelle
Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA Rocquencourt)
Cybercars : Past, Present and Future of the Technology
null
Dans ITS World Congress 2005
null
null
cs.RO
null
Automobile has become the dominant transport mode in the world in the last century. In order to meet a continuously growing demand for transport, one solution is to change the control approach for vehicle to full driving automation, which removes the driver from the control loop to improve efficiency and reduce accidents. Recent work shows that there are several realistic paths towards this deployment : driving assistance on passenger cars, automated commercial vehicles on dedicated infrastructures, and new forms of urban transport (car-sharing and cybercars). Cybercars have already been put into operation in Europe, and it seems that this approach could lead the way towards full automation on most urban, and later interurban infrastructures. The European project CyberCars has brought many improvements in the technology needed to operate cybercars over the last three years. A new, larger European project is now being prepared to carry this work further in order to meet more ambitious objectives in terms of safety and efficiency. This paper will present past and present technologies and will focus on the future developments.
[ { "version": "v1", "created": "Thu, 20 Oct 2005 15:03:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Parent", "Michel", "", "INRIA Rocquencourt" ], [ "De La Fortelle", "Arnaud", "", "INRIA\n Rocquencourt" ] ]
cs/0510062
Jamal Saboune
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Using Interval Particle Filtering for Marker less 3D Human Motion Capture
null
null
null
null
cs.AI
null
In this paper we present a new approach for marker less human motion capture from conventional camera feeds. The aim of our study is to recover 3D positions of key points of the body that can serve for gait analysis. Our approach is based on foreground segmentation, an articulated body model and particle filters. In order to be generic and simple no restrictive dynamic modelling was used. A new modified particle filtering algorithm was introduced. It is used efficiently to search the model configuration space. This new algorithm which we call Interval Particle Filtering reorganizes the configurations search space in an optimal deterministic way and proved to be efficient in tracking natural human movement. Results for human motion capture from a single camera are presented and compared to results obtained from a marker based system. The system proved to be able to track motion successfully even in partial occlusions.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 13:45:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Saboune", "Jamal", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA\n Lorraine - LORIA" ] ]
cs/0510063
Jamal Saboune
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Markerless Human Motion Capture for Gait Analysis
null
null
null
null
cs.AI
null
The aim of our study is to detect balance disorders and a tendency towards the falls in the elderly, knowing gait parameters. In this paper we present a new tool for gait analysis based on markerless human motion capture, from camera feeds. The system introduced here, recovers the 3D positions of several key points of the human body while walking. Foreground segmentation, an articulated body model and particle filtering are basic elements of our approach. No dynamic model is used thus this system can be described as generic and simple to implement. A modified particle filtering algorithm, which we call Interval Particle Filtering, is used to reorganise and search through the model's configurations search space in a deterministic optimal way. This algorithm was able to perform human movement tracking with success. Results from the treatment of a single cam feeds are shown and compared to results obtained using a marker based human motion capture system.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 13:45:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Saboune", "Jamal", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA\n Lorraine - LORIA" ] ]
cs/0510065
Aneta Zwierko
Adam Wierzbicki, Aneta Zwierko and Zbigniew Kotulski
A new authentication protocol for revocable anonymity in ad-hoc networks
8 pages, 8 figures, this an extended version of paper accepted for IASTED conference CNIS'2005
null
null
null
cs.CR cs.DC cs.NI
null
This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds that they have several drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing on established cryptographic primitives (Merkle's puzzles and zero-knowledge proofs) is proposed. The protocol is studied for a model ad-hoc chat application that provides private conversations.
[ { "version": "v1", "created": "Sat, 22 Oct 2005 11:51:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Wierzbicki", "Adam", "" ], [ "Zwierko", "Aneta", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0510073
Christian Attiogb
Christian Attiogbe
Semantic Embedding of Petri Nets into Event-B
16 pages, 3 figures
null
null
null
cs.LO
null
We present an embedding of Petri nets into B abstract systems. The embedding is achieved by translating both the static structure (modelling aspect) and the evolution semantics of Petri nets. The static structure of a Petri-net is captured within a B abstract system through a graph structure. This abstract system is then included in another abstract system which captures the evolution semantics of Petri-nets. The evolution semantics results in some B events depending on the chosen policies: basic nets or high level Petri nets. The current embedding enables one to use conjointly Petri nets and Event-B in the same system development, but at different steps and for various analysis.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 09:17:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Attiogbe", "Christian", "" ] ]
cs/0510074
Riccardo Pucella
Matthew Fluet, Riccardo Pucella
Practical Datatype Specializations with Phantom Types and Recursion Schemes
25 pages. Appeared in the Proc. of the 2005 ACM SIGPLAN Workshop on ML
null
null
null
cs.PL
null
Datatype specialization is a form of subtyping that captures program invariants on data structures that are expressed using the convenient and intuitive datatype notation. Of particular interest are structural invariants such as well-formedness. We investigate the use of phantom types for describing datatype specializations. We show that it is possible to express statically-checked specializations within the type system of Standard ML. We also show that this can be done in a way that does not lose useful programming facilities such as pattern matching in case expressions.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 16:27:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Fluet", "Matthew", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0510076
Olivier Pauplin
Olivier Pauplin (INRIA Rocquencourt), Jean Louchet (INRIA Rocquencourt), Evelyne Lutton (INRIA Rocquencourt), Michel Parent (INRIA Rocquencourt)
Applying Evolutionary Optimisation to Robot Obstacle Avoidance
null
Dans ISCIIA 2004
null
null
cs.AI cs.RO
null
This paper presents an artificial evolutionbased method for stereo image analysis and its application to real-time obstacle detection and avoidance for a mobile robot. It uses the Parisian approach, which consists here in splitting the representation of the robot's environment into a large number of simple primitives, the "flies", which are evolved following a biologically inspired scheme and give a fast, low-cost solution to the obstacle detection problem in mobile robotics.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 07:07:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Pauplin", "Olivier", "", "INRIA Rocquencourt" ], [ "Louchet", "Jean", "", "INRIA\n Rocquencourt" ], [ "Lutton", "Evelyne", "", "INRIA Rocquencourt" ], [ "Parent", "Michel", "", "INRIA\n Rocquencourt" ] ]
cs/0510079
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
Evidence with Uncertain Likelihoods
21 pages. A preliminary version appeared in the Proceedings of UAI'05
null
null
null
cs.AI
null
An agent often has a number of hypotheses, and must choose among them based on observations, or outcomes of experiments. Each of these observations can be viewed as providing evidence for or against various hypotheses. All the attempts to formalize this intuition up to now have assumed that associated with each hypothesis h there is a likelihood function \mu_h, which is a probability measure that intuitively describes how likely each observation is, conditional on h being the correct hypothesis. We consider an extension of this framework where there is uncertainty as to which of a number of likelihood functions is appropriate, and discuss how one formal approach to defining evidence, which views evidence as a function from priors to posteriors, can be generalized to accommodate this uncertainty.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 21:15:31 GMT" }, { "version": "v2", "created": "Thu, 3 Aug 2006 17:34:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0510080
Joseph Y. Halpern
Peter D. Grunwald and Joseph Y. Halpern
When Ignorance is Bliss
In Proceedings of the Twentieth Conference on Uncertainty in AI, 2004, pp. 226-234
null
null
null
cs.AI cs.LG
null
It is commonly-accepted wisdom that more information is better, and that information should never be ignored. Here we argue, using both a Bayesian and a non-Bayesian analysis, that in some situations you are better off ignoring information if your uncertainty is represented by a set of probability measures. These include situations in which the information is relevant for the prediction task at hand. In the non-Bayesian analysis, we show how ignoring information avoids dilation, the phenomenon that additional pieces of information sometimes lead to an increase in uncertainty. In the Bayesian analysis, we show that for small sample sizes and certain prediction tasks, the Bayesian posterior based on a noninformative prior yields worse predictions than simply ignoring the given information.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 22:14:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Grunwald", "Peter D.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/0510083
Nizar Kerkeni
Nizar Kerkeni (TIM), Frederic Alexandre (CORTEX), Mohamed Hedi Bedoui (TIM), Laurent Bougrain (CORTEX), Mohamed Dogui (SAHLOUL)
Neuronal Spectral Analysis of EEG and Expert Knowledge Integration for Automatic Classification of Sleep Stages
null
null
null
null
cs.AI
null
Being able to analyze and interpret signal coming from electroencephalogram (EEG) recording can be of high interest for many applications including medical diagnosis and Brain-Computer Interfaces. Indeed, human experts are today able to extract from this signal many hints related to physiological as well as cognitive states of the recorded subject and it would be very interesting to perform such task automatically but today no completely automatic system exists. In previous studies, we have compared human expertise and automatic processing tools, including artificial neural networks (ANN), to better understand the competences of each and determine which are the difficult aspects to integrate in a fully automatic system. In this paper, we bring more elements to that study in reporting the main results of a practical experiment which was carried out in an hospital for sleep pathology study. An EEG recording was studied and labeled by a human expert and an ANN. We describe here the characteristics of the experiment, both human and neuronal procedure of analysis, compare their performances and point out the main limitations which arise from this study.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:47:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kerkeni", "Nizar", "", "TIM" ], [ "Alexandre", "Frederic", "", "CORTEX" ], [ "Bedoui", "Mohamed Hedi", "", "TIM" ], [ "Bougrain", "Laurent", "", "CORTEX" ], [ "Dogui", "Mohamed", "", "SAHLOUL" ] ]
cs/0510084
Michel Fliess
Michel Fliess
R\'{e}flexions sur la question fr\'{e}quentielle en traitement du signal
null
null
null
null
cs.CE cs.IR math-ph math.MP math.SP
null
New definitions are suggested for frequencies which may be instantaneous or not. The Heisenberg-Gabor inequality and the Shannon sampling theorem are briefly discussed.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:49:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Fliess", "Michel", "" ] ]
cs/0510086
Krishnaram Kenthapadi
K. Kenthapadi and R. Panigrahy
Balanced Allocation on Graphs
null
null
null
null
cs.DS
null
In this paper, we study the two choice balls and bins process when balls are not allowed to choose any two random bins, but only bins that are connected by an edge in an underlying graph. We show that for $n$ balls and $n$ bins, if the graph is almost regular with degree $n^\epsilon$, where $\epsilon$ is not too small, the previous bounds on the maximum load continue to hold. Precisely, the maximum load is $\log \log n + O(1/\epsilon) + O(1)$. For general $\Delta$-regular graphs, we show that the maximum load is $\log\log n + O(\frac{\log n}{\log (\Delta/\log^4 n)}) + O(1)$ and also provide an almost matching lower bound of $\log \log n + \frac{\log n}{\log (\Delta \log n)}$. V{\"o}cking [Voc99] showed that the maximum bin size with $d$ choice load balancing can be further improved to $O(\log\log n /d)$ by breaking ties to the left. This requires $d$ random bin choices. We show that such bounds can be achieved by making only two random accesses and querying $d/2$ contiguous bins in each access. By grouping a sequence of $n$ bins into $2n/d$ groups, each of $d/2$ consecutive bins, if each ball chooses two groups at random and inserts the new ball into the least-loaded bin in the lesser loaded group, then the maximum load is $O(\log\log n/d)$ with high probability.
[ { "version": "v1", "created": "Thu, 27 Oct 2005 21:59:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenthapadi", "K.", "" ], [ "Panigrahy", "R.", "" ] ]
cs/0510087
Johannes Gro{\ss}e
J. Grosse
MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots
7 pages, 8 figures, for associated Mathematica package, see http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz
null
null
LMU-ASC 70/05; MPP-2005-126
cs.GR
null
This article introduces a Mathematica package providing a graphics export function that automatically replaces Mathematica expressions in a graphic by the corresponding LaTeX constructs and positions them correctly. It thus facilitates the creation of publication-quality Enscapulated PostScript (EPS) graphics.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 09:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Grosse", "J.", "" ] ]
cs/0510088
Assaf Naor
Rajeev Motwani and Assaf Naor and Rina Panigrahy
Lower bounds on Locality Sensitive Hashing
null
null
null
null
cs.CG
null
Given a metric space $(X,d_X)$, $c\ge 1$, $r>0$, and $p,q\in [0,1]$, a distribution over mappings $\h:X\to \mathbb N$ is called a $(r,cr,p,q)$-sensitive hash family if any two points in $X$ at distance at most $r$ are mapped by $\h$ to the same value with probability at least $p$, and any two points at distance greater than $cr$ are mapped by $\h$ to the same value with probability at most $q$. This notion was introduced by Indyk and Motwani in 1998 as the basis for an efficient approximate nearest neighbor search algorithm, and has since been used extensively for this purpose. The performance of these algorithms is governed by the parameter $\rho=\frac{\log(1/p)}{\log(1/q)}$, and constructing hash families with small $\rho$ automatically yields improved nearest neighbor algorithms. Here we show that for $X=\ell_1$ it is impossible to achieve $\rho\le \frac{1}{2c}$. This almost matches the construction of Indyk and Motwani which achieves $\rho\le \frac{1}{c}$.
[ { "version": "v1", "created": "Sat, 29 Oct 2005 15:05:52 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2005 20:32:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Motwani", "Rajeev", "" ], [ "Naor", "Assaf", "" ], [ "Panigrahy", "Rina", "" ] ]
cs/0510090
Sheng-Gwo Chen
Jyh-Yang Wu, Sheng-Gwo Chen and Mei-Hsiu Chi
A simple effective method for curvatures estimation on triangular meshes
null
null
null
null
cs.CG
null
To definite and compute differential invariants, like curvatures, for triangular meshes (or polyhedral surfaces) is a key problem in CAGD and the computer vision. The Gaussian curvature and the mean curvature are determined by the differential of the Gauss map of the underlying surface. The Gauss map assigns to each point in the surface the unit normal vector of the tangent plane to the surface at this point. We follow the ideas developed in Chen and Wu \cite{Chen2}(2004) and Wu, Chen and Chi\cite{Wu}(2005) to describe a new and simple approach to estimate the differential of the Gauss map and curvatures from the viewpoint of the gradient and the centroid weights. This will give us a much better estimation of curvatures than Taubin's algorithm \cite{Taubin} (1995).
[ { "version": "v1", "created": "Mon, 31 Oct 2005 02:41:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Jyh-Yang", "" ], [ "Chen", "Sheng-Gwo", "" ], [ "Chi", "Mei-Hsiu", "" ] ]
cs/0510091
Marc Schoenauer
Marc Schoenauer (INRIA Futurs), Yann Semet (INRIA Futurs)
An efficient memetic, permutation-based evolutionary algorithm for real-world train timetabling
null
null
null
null
cs.AI
null
Train timetabling is a difficult and very tightly constrained combinatorial problem that deals with the construction of train schedules. We focus on the particular problem of local reconstruction of the schedule following a small perturbation, seeking minimisation of the total accumulated delay by adapting times of departure and arrival for each train and allocation of resources (tracks, routing nodes, etc.). We describe a permutation-based evolutionary algorithm that relies on a semi-greedy heuristic to gradually reconstruct the schedule by inserting trains one after the other following the permutation. This algorithm can be hybridised with ILOG commercial MIP programming tool CPLEX in a coarse-grained manner: the evolutionary part is used to quickly obtain a good but suboptimal solution and this intermediate solution is refined using CPLEX. Experimental results are presented on a large real-world case involving more than one million variables and 2 million constraints. Results are surprisingly good as the evolutionary algorithm, alone or hybridised, produces excellent solutions much faster than CPLEX alone.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 06:06:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schoenauer", "Marc", "", "INRIA Futurs" ], [ "Semet", "Yann", "", "INRIA Futurs" ] ]
cs/0510094
Angel de Vicente
Angel de Vicente, Nayra Rodriguez
Big Science with a Small Budget: Non-Embarrassingly Parallel Applications in a Non-Dedicated Network of Workstations
4 pages; to appear in Proceedings of ADASS XV (http://www.adass.org:8080/Conferences/2005/Venue/)
null
null
null
cs.DC astro-ph
null
Many astronomers and astrophysicists require large computing resources for their research, which are usually obtained via dedicated (and expensive) parallel machines. Depending on the type of the problem to be solved, an alternative solution can be provided by creating dynamically a computer cluster out of non-dedicated workstations using the Condor High Throughput Computing System and the Master-Worker (MW) framework. As an example of this we show in this paper how a radiative transfer application previously coded with MPI is solved using this solution without the need for dedicated machines.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 14:55:57 GMT" } ]
2007-05-23T00:00:00
[ [ "de Vicente", "Angel", "" ], [ "Rodriguez", "Nayra", "" ] ]
cs/0511002
Alberto Accomazzi
Alberto Accomazzi, Michael J. Kurtz, Guenther Eichhorn, Edwin Henneken, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray
Bibliographic Classification using the ADS Databases
Latex, 4 pages, 1 Figure. To be published in the Proceedings of the Conference "Astronomical Data Analysis Software & Systems XV" held October 2-5, 2005, in San Lorenzo de El Escorial, Spain
null
null
null
cs.IR cs.DL
null
We discuss two techniques used to characterize bibliographic records based on their similarity to and relationship with the contents of the NASA Astrophysics Data System (ADS) databases. The first method has been used to classify input text as being relevant to one or more subject areas based on an analysis of the frequency distribution of its individual words. The second method has been used to classify existing records as being relevant to one or more databases based on the distribution of the papers citing them. Both techniques have proven to be valuable tools in assigning new and existing bibliographic records to different disciplines within the ADS databases.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 22:34:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Accomazzi", "Alberto", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Henneken", "Edwin", "" ], [ "Grant", "Carolyn S.", "" ], [ "Demleitner", "Markus", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0511004
Marc Schoenauer
Aguston E. Eiben (VU), Marc Schoenauer (FRACTALES)
Evolutionary Computing
null
null
null
null
cs.AI
null
Evolutionary computing (EC) is an exciting development in Computer Science. It amounts to building, applying and studying algorithms based on the Darwinian principles of natural selection. In this paper we briefly introduce the main concepts behind evolutionary computing. We present the main components all evolutionary algorithms (EA), sketch the differences between different types of EAs and survey application areas ranging from optimization, modeling and simulation to entertainment.
[ { "version": "v1", "created": "Tue, 1 Nov 2005 19:46:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiben", "Aguston E.", "", "VU" ], [ "Schoenauer", "Marc", "", "FRACTALES" ] ]
cs/0511010
Nadir Kiyanclar
Nadir Kiyanclar
A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing
null
null
null
null
cs.OS
null
Virtualization, a technique once used to multiplex the resources of high-priced mainframe hardware, is seeing a resurgence in applicability with the increasing computing power of commodity computers. By inserting a layer of software between the machine and traditional operating systems, this technology allows access to a shared computing medium in a manner that is secure, resource-controlled, and efficient. These properties are attractive in the field of on-demand computing, where the fine-grained subdivision of resources provided by virtualized systems allows potentially higher utilization of computing resources. It this work, we survey a number of virtual machine systems with the goal of finding an appropriate candidate to serve as the basis for the On-Demand Secure Cluster Computing project at the National Center for Supercomputing Applications. Contenders are reviewed on a number of desirable properties including portability and security. We conclude with a comparison and justification of our choice.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 19:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiyanclar", "Nadir", "" ] ]
cs/0511011
Hamilton Link
Hamilton Link and Jared Saia and Terran Lane and Randall A. LaViolette
The Impact of Social Networks on Multi-Agent Recommender Systems
12 pages, 4 figures. Published in the Proceedings of the Workshop on Cooperative Multi-Agent Learning (ECML/PKDD '05). Resubmitted to fix citations and metadata
null
null
null
cs.LG cs.CC cs.MA
null
Awerbuch et al.'s approach to distributed recommender systems (DRSs) is to have agents sample products at random while randomly querying one another for the best item they have found; we improve upon this by adding a communication network. Agents can only communicate with their immediate neighbors in the network, but neighboring agents may or may not represent users with common interests. We define two network structures: in the ``mailing-list model,'' agents representing similar users form cliques, while in the ``word-of-mouth model'' the agents are distributed randomly in a scale-free network (SFN). In both models, agents tell their neighbors about satisfactory products as they are found. In the word-of-mouth model, knowledge of items propagates only through interested agents, and the SFN parameters affect the system's performance. We include a summary of our new results on the character and parameters of random subgraphs of SFNs, in particular SFNs with power-law degree distributions down to minimum degree 1. These networks are not as resilient as Cohen et al. originally suggested. In the case of the widely-cited ``Internet resilience'' result, high failure rates actually lead to the orphaning of half of the surviving nodes after 60% of the network has failed and the complete disintegration of the network at 90%. We show that given an appropriate network, the communication network reduces the number of sampled items, the number of messages sent, and the amount of ``spam.'' We conclude that in many cases DRSs will be useful for sharing information in a multi-agent learning system.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 23:44:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Link", "Hamilton", "" ], [ "Saia", "Jared", "" ], [ "Lane", "Terran", "" ], [ "LaViolette", "Randall A.", "" ] ]
cs/0511012
Hamilton Link
Hamilton Link and Randall A. LaViolette and Jared Saia and Terran Lane
Parameters Affecting the Resilience of Scale-Free Networks to Random Failures
12 pages, 7 figures. Submitting to Phys. Rev. Lett
null
null
null
cs.NI cs.AR cs.MA
null
It is commonly believed that scale-free networks are robust to massive numbers of random node deletions. For example, Cohen et al. study scale-free networks including some which approximate the measured degree distribution of the Internet. Their results suggest that if each node in this network failed independently with probability 0.99, the remaining network would continue to have a giant component. In this paper, we show that a large and important subclass of scale-free networks are not robust to massive numbers of random node deletions for practical purposes. In particular, we study finite scale-free networks which have minimum node degree of 1 and a power-law degree distribution beginning with nodes of degree 1 (power-law networks). We show that, in a power-law network approximating the Internet's reported distribution, when the probability of deletion of each node is 0.5 only about 25% of the surviving nodes in the network remain connected in a giant component, and the giant component does not persist beyond a critical failure rate of 0.9. The new result is partially due to improved analytical accommodation of the large number of degree-0 nodes that result after node deletions. Our results apply to finite power-law networks with a wide range of power-law exponents, including Internet-like networks. We give both analytical and empirical evidence that such networks are not generally robust to massive random node deletions.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 22:22:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Link", "Hamilton", "" ], [ "LaViolette", "Randall A.", "" ], [ "Saia", "Jared", "" ], [ "Lane", "Terran", "" ] ]
cs/0511013
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical Data
18 pages
null
null
Tr-2004-03
cs.AI cs.DB
null
Clustering categorical data is an integral part of data mining and has attracted much attention recently. In this paper, we present k-ANMI, a new efficient algorithm for clustering categorical data. The k-ANMI algorithm works in a way that is similar to the popular k-means algorithm, and the goodness of clustering in each step is evaluated using a mutual information based criterion (namely, Average Normalized Mutual Information-ANMI) borrowed from cluster ensemble. Experimental results on real datasets show that k-ANMI algorithm is competitive with those state-of-art categorical data clustering algorithms with respect to clustering accuracy.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 01:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]