id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0511014
Kumar Neeraj Verma
Helmut Seidl, Kumar Neeraj Verma
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying
Long version of paper presented at LPAR 2004
null
null
null
cs.LO cs.CR
null
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class $\mathcal C$ of first order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques. We show satisfiability to be DEXPTIME-complete if clauses are Horn, which is what is required for modeling cryptographic protocols. While translation to Horn clauses only gives a DEXPTIME upper bound for the secrecy problem for these protocols, we further show that this secrecy problem is actually DEXPTIME-complete.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 13:40:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Seidl", "Helmut", "" ], [ "Verma", "Kumar Neeraj", "" ] ]
cs/0511015
Prashant Singh
Prashant
Towards a Hierarchical Model of Consciousness, Intelligence, Mind and Body
12 pages, 2 figures
null
null
null
cs.AI
null
This article is taken out.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 16:28:05 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 00:00:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0511016
Santo Fortunato Dr
Santo Fortunato, Marian Boguna, Alessandro Flammini, Filippo Menczer
How to make the top ten: Approximating PageRank from in-degree
8 pages, 7 figures, 2 tables
null
null
null
cs.IR physics.soc-ph
null
PageRank has become a key element in the success of search engines, allowing to rank the most important hits in the top screen of results. One key aspect that distinguishes PageRank from other prestige measures such as in-degree is its global nature. From the information provider perspective, this makes it difficult or impossible to predict how their pages will be ranked. Consequently a market has emerged for the optimization of search engine results. Here we study the accuracy with which PageRank can be approximated by in-degree, a local measure made freely available by search engines. Theoretical and empirical analyses lead to conclude that given the weak degree correlations in the Web link graph, the approximation can be relatively accurate, giving service and information providers an effective new marketing tool.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:01:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Fortunato", "Santo", "" ], [ "Boguna", "Marian", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ] ]
cs/0511017
Gus Gutoski
Gus Gutoski
Short Quantum Games
MSc thesis, 79 pages single-spaced
null
null
null
cs.CC quant-ph
null
In this thesis we introduce quantum refereed games, which are quantum interactive proof systems with two competing provers. We focus on a restriction of this model that we call "short quantum games" and we prove an upper bound and a lower bound on the expressive power of these games. For the lower bound, we prove that every language having an ordinary quantum interactive proof system also has a short quantum game. An important part of this proof is the establishment of a quantum measurement that reliably distinguishes between quantum states chosen from disjoint convex sets. For the upper bound, we show that certain types of quantum refereed games, including short quantum games, are decidable in deterministic exponential time by supplying a separation oracle for use with the ellipsoid method for convex feasibility.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
cs/0511018
Prashant Singh
Prashant
From General Systems to Soft Systems to Soft Computing: Applications for Large and Complex Real World Systems
9 pages
null
null
null
cs.SE
null
This is article is taken out.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:29:55 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 00:00:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0511020
David P{\l}aneta S
David S. P{\l}aneta
Pbit and other list sorting algorithms
25 pages, 4 tables
Cornell University Computing and Information Science Technical Reports, 2006
null
TR2006-2013
cs.DS
null
Pbit, besides its simplicity, is definitely the fastest list sorting algorithm. It considerably surpasses all already known methods. Among many advantages, it is stable, linear and be made to run in place. I will compare Pbit with algorithm described by Donald E. Knuth in the third volume of ''The Art of Computer Programming'' and other (QuickerSort, MergeSort) list sorting algorithms.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 01:52:02 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 23:48:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Płaneta", "David S.", "" ] ]
cs/0511021
Thorsten Theobald
Ravi Kannan and Thorsten Theobald
Games of fixed rank: A hierarchy of bimatrix games
13 pages
null
null
null
cs.GT math.CO
null
We propose a new hierarchical approach to understand the complexity of the open problem of computing a Nash equilibrium in a bimatrix game. Specifically, we investigate a hierarchy of bimatrix games $(A,B)$ which results from restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For every fixed $k$, this class strictly generalizes the class of zero-sum games, but is a very special case of general bimatrix games. We show that even for $k=1$ the set of Nash equilibria of these games can consist of an arbitrarily large number of connected components. While the question of exact polynomial time algorithms to find a Nash equilibrium remains open for games of fixed rank, we can provide polynomial time algorithms for finding an $\epsilon$-approximation.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 10:29:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kannan", "Ravi", "" ], [ "Theobald", "Thorsten", "" ] ]
cs/0511022
Emanuel Diamant
Emanuel Diamant
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow Biological Paradigms?
Proceedings of the 1st International Symposium on Brain, Vision, and Artificial Intelligence, 19-21 October 2005, Naples, Italy
LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin Heidelberg 2005
null
null
cs.NE
null
We posit a new paradigm for image information processing. For the last 25 years, this task was usually approached in the frame of Treisman's two-stage paradigm [1]. The latter supposes an unsupervised, bottom-up directed process of preliminary information pieces gathering at the lower processing stages and a supervised, top-down directed process of information pieces binding and grouping at the higher stages. It is acknowledged that these sub-processes interact and intervene between them in a tricky and a complicated manner. Notwithstanding the prevalence of this paradigm in biological and computer vision, we nevertheless propose to replace it with a new one, which we would like to designate as a two-part paradigm. In it, information contained in an image is initially extracted in an independent top-down manner by one part of the system, and then it is examined and interpreted by another, separate system part. We argue that the new paradigm seems to be more plausible than its forerunner. We provide evidence from human attention vision studies and insights of Kolmogorov's complexity theory to support our arguments. We also provide some reasons in favor of separate image interpretation issues.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 15:08:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0511024
Bourgade Paul
Bourgade Paul, Croissant Olivier
Heat kernel expansion for a family of stochastic volatility models : delta-geometry
null
null
null
null
cs.CE
null
In this paper, we study a family of stochastic volatility processes; this family features a mean reversion term for the volatility and a double CEV-like exponent that generalizes SABR and Heston's models. We derive approximated closed form formulas for the digital prices, the local and implied volatilities. Our formulas are efficient for small maturities. Our method is based on differential geometry, especially small time diffusions on riemanian spaces. This geometrical point of view can be extended to other processes, and is very accurate to produce variate smiles for small maturities and small moneyness.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 18:31:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Paul", "Bourgade", "" ], [ "Olivier", "Croissant", "" ] ]
cs/0511025
Riccardo Pucella
James Cheney
Logic Column 14: Nominal Logic and Abstract Syntax
24 pages
SIGACT News 36 (4), pp. 47-69, 2005
null
null
cs.LO
null
Formalizing syntactic proofs of properties of logics, programming languages, security protocols, and other formal systems is a significant challenge, in large part because of the obligation to handle name-binding correctly. We present an approach called nominal abstract syntax that has attracted considerable interest since its introduction approximately six years ago. After an overview of other approaches, we describe nominal abstract syntax and nominal logic, a logic for reasoning about nominal abstract syntax. We also discuss applications of nominal techniques to programming, automated reasoning, and identify some future directions.
[ { "version": "v1", "created": "Sat, 5 Nov 2005 02:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheney", "James", "" ] ]
cs/0511027
Stephen Luttrell
Stephen Luttrell
Discrete Network Dynamics. Part 1: Operator Theory
39 pages, 5 figures
null
null
null
cs.NE
null
An operator algebra implementation of Markov chain Monte Carlo algorithms for simulating Markov random fields is proposed. It allows the dynamics of networks whose nodes have discrete state spaces to be specified by the action of an update operator that is composed of creation and annihilation operators. This formulation of discrete network dynamics has properties that are similar to those of a quantum field theory of bosons, which allows reuse of many conceptual and theoretical structures from QFT. The equilibrium behaviour of one of these generalised MRFs and of the adaptive cluster expansion network (ACEnet) are shown to be equivalent, which provides a way of unifying these two theories.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 19:09:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
cs/0511030
Gregory Gutin
G. Gutin, A. Rafiey, S. Szeider, A. Yeo
The Linear Arrangement Problem Parameterized Above Guaranteed Value
null
null
null
null
cs.DS cs.CC
null
A linear arrangement (LA) is an assignment of distinct integers to the vertices of a graph. The cost of an LA is the sum of lengths of the edges of the graph, where the length of an edge is defined as the absolute value of the difference of the integers assigned to its ends. For many application one hopes to find an LA with small cost. However, it is a classical NP-complete problem to decide whether a given graph $G$ admits an LA of cost bounded by a given integer. Since every edge of $G$ contributes at least one to the cost of any LA, the problem becomes trivially fixed-parameter tractable (FPT) if parameterized by the upper bound of the cost. Fernau asked whether the problem remains FPT if parameterized by the upper bound of the cost minus the number of edges of the given graph; thus whether the problem is FPT ``parameterized above guaranteed value.'' We answer this question positively by deriving an algorithm which decides in time $O(m+n+5.88^k)$ whether a given graph with $m$ edges and $n$ vertices admits an LA of cost at most $m+k$ (the algorithm computes such an LA if it exists). Our algorithm is based on a procedure which generates a problem kernel of linear size in linear time for a connected graph $G$. We also prove that more general parameterized LA problems stated by Serna and Thilikos are not FPT, unless P=NP.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 17:47:55 GMT" }, { "version": "v2", "created": "Mon, 12 Dec 2005 18:26:42 GMT" }, { "version": "v3", "created": "Mon, 13 Mar 2006 10:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Szeider", "S.", "" ], [ "Yeo", "A.", "" ] ]
cs/0511031
Prashant Singh
Prashant
Internet Protocol Black Holes: A E-Security Threat
null
null
null
null
cs.NI
null
The paper is taken out.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 00:14:06 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:05:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0511032
Yangli Hector Yee
Yang Li Hector Yee (Cornell University)
Spatiotemporal sensistivity and visual attention for efficient rendering of dynamic environments
null
ACM Transactions on Graphics, 20(1), January 2001
null
null
cs.GR cs.CV
null
We present a method to accelerate global illumination computation in dynamic environments by taking advantage of limitations of the human visual system. A model of visual attention is used to locate regions of interest in a scene and to modulate spatiotemporal sensitivity. The method is applied in the form of a spatiotemporal error tolerance map. Perceptual acceleration combined with good sampling protocols provide a global illumination solution feasible for use in animation. Results indicate an order of magnitude improvement in computational speed. The method is adaptable and can also be used in image-based rendering, geometry level of detail selection, realistic image synthesis, video telephony and video compression.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 14:40:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Yee", "Yang Li Hector", "", "Cornell University" ] ]
cs/0511033
Martin Ziegler
Martin Ziegler
Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements and Applications
null
null
null
null
cs.SC
null
For a linearly recurrent vector sequence P[n+1] = A(n) * P[n], consider the problem of calculating either the n-th term P[n] or L<=n arbitrary terms P[n_1],...,P[n_L], both for the case of constant coefficients A(n)=A and for a matrix A(n) with entries polynomial in n. We improve and extend known algorithms for this problem and present new applications for it. Specifically it turns out that for instance * any family (p_n) of classical orthogonal polynomials admits evaluation at given x within O(n^{1/2} log n) operations INDEPENDENT of the family (p_n) under consideration. * For any L indices n_1,...,n_L <= n, the values p_{n_i}(x) can be calculated simultaneously using O(n^{1/2} log n + L log(n/L)) arithmetic operations; again this running time bound holds uniformly. * Every hypergeometric (or, more generally, holonomic) function admits approximate evaluation up to absolute error e>0 within O((log(1/e)^{1/2} loglog(1/e)) -- as opposed to O(log(1/e)) -- arithmetic steps. * Given m and a polynomial p of degree d over a field of characteristic zero, the coefficient of p^m to term X^n can be computed within O(d^2 M(n^{1/2})) steps where M(n) denotes the cost of multiplying two degree-n polynomials. * The same time bound holds for the joint calculation of any L<=n^{1/2} desired coefficients of p^m to terms X^{n_i}, n_1,...,n_L <= n.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 16:46:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ] ]
cs/0511034
Stanislav Bulygin V.
Stanislav Bulygin
Generalized Hermitian Codes over GF(2^r)
null
null
null
null
cs.DM
null
In this paper we studied generalization of Hermitian function field proposed by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semigroup of the point at infinity for the case q=2, r>=3. It turned out that unlike Hermitian case, we have already three generators for the semigroup. We then applied this result to codes, constructed on generalized Hermitian function fields. Further, we applied results of C.Kirfel and R.Pellikaan to estimating a Feng-Rao designed distance for GH-codes, which improved on Goppa designed distance. Next, we studied the question of codes dual to GH-codes. We identified that the duals are also GH-codes and gave an explicit formula. We concluded with some computational results. In particular, a new record-giving [32,16,>=12]-code over GF(8) was presented.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 19:29:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bulygin", "Stanislav", "" ] ]
cs/0511041
Susumu Yamasaki
Susumu Yamasaki
Logic Programming with Default, Weak and Strict Negations
14 pages, to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
null
This paper treats logic programming with three kinds of negation: default, weak and strict negations. A 3-valued logic model theory is discussed for logic programs with three kinds of negation. The procedure is constructed for negations so that a soundness of the procedure is guaranteed in terms of 3-valued logic model theory.
[ { "version": "v1", "created": "Thu, 10 Nov 2005 06:29:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Yamasaki", "Susumu", "" ] ]
cs/0511042
Pascal Hitzler
Sebastian Bader and Pascal Hitzler
Dimensions of Neural-symbolic Integration - A Structured Survey
28 pages
null
null
null
cs.AI cs.LO cs.NE
null
Research on integrated neural-symbolic systems has made significant progress in the recent past. In particular the understanding of ways to deal with symbolic knowledge within connectionist systems (also called artificial neural networks) has reached a critical mass which enables the community to strive for applicable implementations and use cases. Recent work has covered a great variety of logics used in artificial intelligence and provides a multitude of techniques for dealing with them within the context of artificial neural networks. We present a comprehensive survey of the field of neural-symbolic integration, including a new classification of system according to their architectures and abilities.
[ { "version": "v1", "created": "Thu, 10 Nov 2005 10:00:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bader", "Sebastian", "" ], [ "Hitzler", "Pascal", "" ] ]
cs/0511043
Damiano Bolzoni
Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter Hartel
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
null
null
null
TR-CTIT-05-53
cs.CR
null
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
[ { "version": "v1", "created": "Fri, 11 Nov 2005 13:43:04 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2005 15:11:44 GMT" }, { "version": "v3", "created": "Mon, 30 Jan 2006 14:27:46 GMT" }, { "version": "v4", "created": "Fri, 3 Feb 2006 12:26:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Zambon", "Emmanuele", "" ], [ "Etalle", "Sandro", "" ], [ "Hartel", "Pieter", "" ] ]
cs/0511044
Mimmo Parente
J. Gruska, S. La Torre, M. Napoli, M. Parente
Various Solutions to the Firing Squad Synchronization Problems
null
null
null
null
cs.DS cs.CC
null
We present different classes of solutions to the Firing Squad Synchronization Problem on networks of different shapes. The nodes are finite state processors that work at unison discrete steps. The networks considered are the line, the ring and the square. For all of these models we have considered one and two-way communication modes and also constrained the quantity of information that adjacent processors can exchange each step. We are given a particular time expressed as a function of the number of nodes of the network, $f(n)$ and present synchronization algorithms in time $n^2$, $n \log n$, $n\sqrt n$, $2^n$. The solutions are presented as {\em signals} that are used as building blocks to compose new solutions for all times expressed by polynomials with nonnegative coefficients.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 06:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gruska", "J.", "" ], [ "La Torre", "S.", "" ], [ "Napoli", "M.", "" ], [ "Parente", "M.", "" ] ]
cs/0511045
Ugo Dal Lago
Ugo Dal Lago and Simone Martini
An Invariant Cost Model for the Lambda Calculus
19 pages
null
null
null
cs.LO cs.CC
null
We define a new cost model for the call-by-value lambda-calculus satisfying the invariance thesis. That is, under the proposed cost model, Turing machines and the call-by-value lambda-calculus can simulate each other within a polynomial time overhead. The model only relies on combinatorial properties of usual beta-reduction, without any reference to a specific machine or evaluator. In particular, the cost of a single beta reduction is proportional to the difference between the size of the redex and the size of the reduct. In this way, the total cost of normalizing a lambda term will take into account the size of all intermediate results (as well as the number of steps to normal form).
[ { "version": "v1", "created": "Sat, 12 Nov 2005 11:57:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Martini", "Simone", "" ] ]
cs/0511049
Gus Gutoski
Gus Gutoski
Entropy, Convex Optimization, and Competitive Quantum Interactions
withdrawn
null
null
null
cs.CC cs.GT quant-ph
null
This paper has been withdrawn by the author due to errors.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 21:15:40 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2005 23:09:33 GMT" }, { "version": "v3", "created": "Mon, 30 Oct 2006 20:16:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
cs/0511052
Gilson Antonio Giraldi
Gilson A. Giraldi, Antonio A.F. Oliveira, Leonardo Carvalho
Mining Cellular Automata DataBases throug PCA Models
13 pages, 4 figures, 5 tables
null
null
null
cs.DM cs.DB
null
Cellular Automata are discrete dynamical systems that evolve following simple and local rules. Despite of its local simplicity, knowledge discovery in CA is a NP problem. This is the main motivation for using data mining techniques for CA study. The Principal Component Analysis (PCA) is a useful tool for data mining because it provides a compact and optimal description of data sets. Such feature have been explored to compute the best subspace which maximizes the projection of the I/O patterns of CA onto the principal axis. The stability of the principal components against the input patterns is the main result of this approach. In this paper we perform such analysis but in the presence of noise which randomly reverses the CA output values with probability $p$. As expected, the number of principal components increases when the pattern size is increased. However, it seems to remain stable when the pattern size is unchanged but the noise intensity gets larger. We describe our experiments and point out further works using KL transform theory and parameter sensitivity analysis.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 10:54:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Oliveira", "Antonio A. F.", "" ], [ "Carvalho", "Leonardo", "" ] ]
cs/0511053
Leland Smith
Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, and Naren Ramakrishnan
A Model Based Approach to Reachability Routing
In submission to IEEE Journal on Selected Areas of Communication
null
null
null
cs.NI
null
Current directions in network routing research have not kept pace with the latest developments in network architectures, such as peer-to-peer networks, sensor networks, ad-hoc wireless networks, and overlay networks. A common characteristic among all of these new technologies is the presence of highly dynamic network topologies. Currently deployed single-path routing protocols cannot adequately cope with this dynamism, and existing multi-path algorithms make trade-offs which lead to less than optimal performance on these networks. This drives the need for routing protocols designed with the unique characteristics of these networks in mind. In this paper we propose the notion of reachability routing as a solution to the challenges posed by routing on such dynamic networks. In particular, our formulation of reachability routing provides cost-sensitive multi-path forwarding along with loop avoidance within the confines of the Internet Protocol (IP) architecture. This is achieved through the application of reinforcement learning within a probabilistic routing framework. Following an explanation of our design decisions and a description of the algorithm, we provide an evaluation of the performance of the algorithm on a variety of network topologies. The results show consistently superior performance compared to other reinforcement learning based routing algorithms.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 16:32:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Leland", "" ], [ "Thirunavukkarasu", "Muthukumar", "" ], [ "Varadarajan", "Srinidhi", "" ], [ "Ramakrishnan", "Naren", "" ] ]
cs/0511058
Vladimir Vovk
Vladimir Vovk
On-line regression competitive with reproducing kernel Hilbert spaces
37 pages, 1 figure
null
null
null
cs.LG
null
We consider the problem of on-line prediction of real-valued labels, assumed bounded in absolute value by a known constant, of new objects from known labeled objects. The prediction algorithm's performance is measured by the squared deviation of the predictions from the actual labels. No stochastic assumptions are made about the way the labels and objects are generated. Instead, we are given a benchmark class of prediction rules some of which are hoped to produce good predictions. We show that for a wide range of infinite-dimensional benchmark classes one can construct a prediction algorithm whose cumulative loss over the first N examples does not exceed the cumulative loss of any prediction rule in the class plus O(sqrt(N)); the main differences from the known results are that we do not impose any upper bound on the norm of the considered prediction rules and that we achieve an optimal leading term in the excess loss of our algorithm. If the benchmark class is "universal" (dense in the class of continuous functions on each compact set), this provides an on-line non-stochastic analogue of universally consistent prediction in non-parametric statistics. We use two proof techniques: one is based on the Aggregating Algorithm and the other on the recently developed method of defensive forecasting.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 17:13:50 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2006 23:27:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0511061
Stephan Merz
Moritz Hammer (IFI-LMU), Alexander Knapp (IFI-LMU), Stephan Merz (INRIA Lorraine - LORIA)
Truly On-The-Fly LTL Model Checking
null
Dans Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2005)
null
null
cs.LO
null
We propose a novel algorithm for automata-based LTL model checking that interleaves the construction of the generalized B\"{u}chi automaton for the negation of the formula and the emptiness check. Our algorithm first converts the LTL formula into a linear weak alternating automaton; configurations of the alternating automaton correspond to the locations of a generalized B\"{u}chi automaton, and a variant of Tarjan's algorithm is used to decide the existence of an accepting run of the product of the transition system and the automaton. Because we avoid an explicit construction of the B\"{u}chi automaton, our approach can yield significant improvements in runtime and memory, for large LTL formulas. The algorithm has been implemented within the SPIN model checker, and we present experimental results for some benchmark examples.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 12:56:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hammer", "Moritz", "", "IFI-LMU" ], [ "Knapp", "Alexander", "", "IFI-LMU" ], [ "Merz", "Stephan", "", "INRIA Lorraine - LORIA" ] ]
cs/0511062
Liping Lu
Gerd Bumiller, Liping Lu (INRIA Lorraine - LORIA), Yeqiong Song (INRIA Lorraine - LORIA)
Analytic performance comparison of routing protocols in master-slave PLC networks
null
null
null
null
cs.NI
null
In the wide area master-slave PLC (powerline communication) system, the source node cannot reach the destination node without packet relay. Due to the time-variable attenuation in the powerline, the communication distance cannot be defined. Two kind of dynamic repeater algorithms are developed, dynamic source routing and flooding based routing. In this paper, we use analytic approach to compare the performance of those two routing protocols. We give formulas to calculate the average duration of a polling cycle for each protocols. Then we present simulation results to bolster the results of our analysis. We use three metrics, which are bandwidth consumed for routing signaling, normalized routing load and average duration of a polling cycle to evaluate those routing protocols.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 16:24:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Bumiller", "Gerd", "", "INRIA Lorraine - LORIA" ], [ "Lu", "Liping", "", "INRIA Lorraine - LORIA" ], [ "Song", "Yeqiong", "", "INRIA\n Lorraine - LORIA" ] ]
cs/0511063
Michele Finelli
Michele Finelli
Pathwords: a user-friendly schema for common passwords management
null
null
null
null
cs.CR
null
Many computer-based authentication schemata are based on pass- words. Logging on a computer, reading email, accessing content on a web server are all examples of applications where the identification of the user is usually accomplished matching the data provided by the user with data known by the application. Such a widespread approach relies on some assumptions, whose satisfaction is of foremost importance to guarantee the robustness of the solution. Some of these assumptions, like having a "secure" chan- nel to transmit data, or having sound algorithms to check the correct- ness of the data, are not addressed by this paper. We will focus on two simple issues: the problem of using adequate passwords and the problem of managing passwords. The proposed solution, the pathword, is a method that guarantees: 1 that the passwords generated with the help of a pathword are adequate (i.e. that they are not easy to guess), 2 that managing pathwords is more user friendly than managing passwords and that pathwords are less amenable to problems typical of passwords.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 17:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Finelli", "Michele", "" ] ]
cs/0511064
Alexander Evako
Alexander V. Evako
The consistency principle for a digitization procedure. An algorithm for building normal digital spaces of continuous n-dimensional objects
13 pages, 11 figures
null
null
null
cs.CV cs.DM
null
This paper considers conditions, which allow to preserve important topological and geometric properties in the process of digitization. For this purpose, we introduce a triplet {C,M,D} consisting of a continuous object C, an intermediate model M, which is a collection of subregions whose union is C, a digital model D, which is the intersection graph of M, and apply the consistency principle and criteria of similarity to M in order to make its mathematical structure consistent with the natural structure of D. Specifically, this paper introduces a locally centered lump collection of subregions and shows that for any locally centered lump cover of an n-dimensional continuous manifold, the digital model of the manifold is a digital normal n-dimensional space. In addition, we give examples of locally centered lump tilings of two-manifolds. We propose an algorithm for constructing normal digital models of continuous objects.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 20:33:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
cs/0511067
Vedran Kordic
Dongqing He and Peisun Ma
Effects of Initial Stance of Quadruped Trotting on Walking Stability
null
null
null
null
cs.RO
null
It is very important for quadruped walking machine to keep its stability in high speed walking. It has been indicated that moment around the supporting diagonal line of quadruped in trotting gait largely influences walking stability. In this paper, moment around the supporting diagonal line of quadruped in trotting gait is modeled and its effects on body attitude are analyzed. The degree of influence varies with different initial stances of quadruped and we get the optimal initial stance of quadruped in trotting gait with maximal walking stability. Simulation results are presented. Keywords: quadruped, trotting, attitude, walking stability.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Dongqing", "" ], [ "Ma", "Peisun", "" ] ]
cs/0511068
Vedran Kordic
S. Heinrich, H. Durr, T. Hanel and J. Lassig
An Agent-based Manufacturing Management System for Production and Logistics within Cross-Company Regional and National Production Networks
null
null
null
null
cs.RO
null
The goal is the development of a simultaneous, dynamic, technological as well as logistical real-time planning and an organizational control of the production by the production units themselves, working in the production network under the use of Multi-Agent-Technology. The design of the multi-agent-based manufacturing management system, the models of the single agents, algorithms for the agent-based, decentralized dispatching of orders, strategies and data management concepts as well as their integration into the SCM, basing on the solution described, will be explained in the following. Keywords: production engineering and management, dynamic manufacturing planning and control, multi-agentsystems (MAS), supply-chain-management (SCM), e-manufacturing
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:41:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Heinrich", "S.", "" ], [ "Durr", "H.", "" ], [ "Hanel", "T.", "" ], [ "Lassig", "J.", "" ] ]
cs/0511069
Vedran Kordic
R. Hedjar and P. Boucher
Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators
null
null
null
null
cs.RO
null
The approximate nonlinear receding-horizon control law is used to treat the trajectory tracking control problem of rigid link robot manipulators. The derived nonlinear predictive law uses a quadratic performance index of the predicted tracking error and the predicted control effort. A key feature of this control law is that, for their implementation, there is no need to perform an online optimization, and asymptotic tracking of smooth reference trajectories is guaranteed. It is shown that this controller achieves the positions tracking objectives via link position measurements. The stability convergence of the output tracking error to the origin is proved. To enhance the robustness of the closed loop system with respect to payload uncertainties and viscous friction, an integral action is introduced in the loop. A nonlinear observer is used to estimate velocity. Simulation results for a two-link rigid robot are performed to validate the performance of the proposed controller. Keywords: receding-horizon control, nonlinear observer, robot manipulators, integral action, robustness.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hedjar", "R.", "" ], [ "Boucher", "P.", "" ] ]
cs/0511071
Francesco Capasso
Francesco Capasso
A polynomial-time heuristic for Circuit-SAT
20 pages, 8 figures
null
null
null
cs.CC cs.DS
null
In this paper is presented an heuristic that, in polynomial time and space in the input dimension, determines if a circuit describes a tautology or a contradiction. If the circuit is neither a tautology nor a contradiction, then the heuristic finds an assignment to the circuit inputs such that the circuit is satisfied.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 20:23:46 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2005 21:56:11 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2005 22:19:18 GMT" }, { "version": "v4", "created": "Mon, 28 Nov 2005 19:52:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Capasso", "Francesco", "" ] ]
cs/0511073
Eric Mjolsness
Eric Mjolsness
Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview
Accepted for: Ninth International Symposium on Artificial Intelligence and Mathematics, January 2006
null
null
UCI ICS TR# 05-14
cs.AI cs.LO nlin.AO
null
We define a class of probabilistic models in terms of an operator algebra of stochastic processes, and a representation for this class in terms of stochastic parameterized grammars. A syntactic specification of a grammar is mapped to semantics given in terms of a ring of operators, so that grammatical composition corresponds to operator addition or multiplication. The operators are generators for the time-evolution of stochastic processes. Within this modeling framework one can express data clustering models, logic programs, ordinary and stochastic differential equations, graph grammars, and stochastic chemical reaction kinetics. This mathematical formulation connects these apparently distant fields to one another and to mathematical methods from quantum field theory and operator algebra.
[ { "version": "v1", "created": "Sun, 20 Nov 2005 00:42:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Mjolsness", "Eric", "" ] ]
cs/0511075
Vasant Honavar
Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan, Susan Carpenter, Vasant Honavar, Drena Dobbs
Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with Experimental Data
Pacific Symposium on Biocomputing, Hawaii, In press, Accepted, 2006
null
null
null
cs.LG cs.AI
null
Protein-protein and protein nucleic acid interactions are vitally important for a wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses. We have developed machine learning approaches for predicting which amino acids of a protein participate in its interactions with other proteins and/or nucleic acids, using only the protein sequence as input. In this paper, we describe an application of classifiers trained on datasets of well-characterized protein-protein and protein-RNA complexes for which experimental structures are available. We apply these classifiers to the problem of predicting protein and RNA binding sites in the sequence of a clinically important protein for which the structure is not known: the regulatory protein Rev, essential for the replication of HIV-1 and other lentiviruses. We compare our predictions with published biochemical, genetic and partial structural information for HIV-1 and EIAV Rev and with our own published experimental mapping of RNA binding sites in EIAV Rev. The predicted and experimentally determined binding sites are in very good agreement. The ability to predict reliably the residues of a protein that directly contribute to specific binding events - without the requirement for structural information regarding either the protein or complexes in which it participates - can potentially generate new disease intervention strategies.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 01:47:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Terribilini", "Michael", "" ], [ "Lee", "Jae-Hyung", "" ], [ "Yan", "Changhui", "" ], [ "Jernigan", "Robert L.", "" ], [ "Carpenter", "Susan", "" ], [ "Honavar", "Vasant", "" ], [ "Dobbs", "Drena", "" ] ]
cs/0511076
Yves Laprie
Blaise Potard (INRIA Lorraine - LORIA), Yves Laprie (INRIA Lorraine - LORIA)
Using phonetic constraints in acoustic-to-articulatory inversion
null
Proceedings of Interspeech, 9th European Conference on Speech Communication and Technology (2005) 3217-3220
null
null
cs.CL
null
The goal of this work is to recover articulatory information from the speech signal by acoustic-to-articulatory inversion. One of the main difficulties with inversion is that the problem is underdetermined and inversion methods generally offer no guarantee on the phonetical realism of the inverse solutions. A way to adress this issue is to use additional phonetic constraints. Knowledge of the phonetic caracteristics of French vowels enable the derivation of reasonable articulatory domains in the space of Maeda parameters: given the formants frequencies (F1,F2,F3) of a speech sample, and thus the vowel identity, an "ideal" articulatory domain can be derived. The space of formants frequencies is partitioned into vowels, using either speaker-specific data or generic information on formants. Then, to each articulatory vector can be associated a phonetic score varying with the distance to the "ideal domain" associated with the corresponding vowel. Inversion experiments were conducted on isolated vowels and vowel-to-vowel transitions. Articulatory parameters were compared with those obtained without using these constraints and those measured from X-ray data.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 14:50:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Potard", "Blaise", "", "INRIA Lorraine - LORIA" ], [ "Laprie", "Yves", "", "INRIA Lorraine -\n LORIA" ] ]
cs/0511079
Anne Bonneau
Jean-Baptiste Maj (LORIA), Anne Bonneau (LORIA), Dominique Fohr (LORIA), Yves Laprie (LORIA)
An elitist approach for extracting automatically well-realized speech sounds with high confidence
null
null
null
null
cs.CL
null
This paper presents an "elitist approach" for extracting automatically well-realized speech sounds with high confidence. The elitist approach uses a speech recognition system based on Hidden Markov Models (HMM). The HMM are trained on speech sounds which are systematically well-detected in an iterative procedure. The results show that, by using the HMM models defined in the training phase, the speech recognizer detects reliably specific speech sounds with a small rate of errors.
[ { "version": "v1", "created": "Tue, 22 Nov 2005 07:06:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Maj", "Jean-Baptiste", "", "LORIA" ], [ "Bonneau", "Anne", "", "LORIA" ], [ "Fohr", "Dominique", "", "LORIA" ], [ "Laprie", "Yves", "", "LORIA" ] ]
cs/0511080
Valmir Barbosa
Alexandre O. Stauffer, Valmir C. Barbosa
A dissemination strategy for immunizing scale-free networks
null
Physical Review E 74 (2006), 056105
10.1103/PhysRevE.74.056105
null
cs.NI
null
We consider the problem of distributing a vaccine for immunizing a scale-free network against a given virus or worm. We introduce a new method, based on vaccine dissemination, that seems to reflect more accurately what is expected to occur in real-world networks. Also, since the dissemination is performed using only local information, the method can be easily employed in practice. Using a random-graph framework, we analyze our method both mathematically and by means of simulations. We demonstrate its efficacy regarding the trade-off between the expected number of nodes that receive the vaccine and the network's resulting vulnerability to develop an epidemic as the virus or worm attempts to infect one of its nodes. For some scenarios, the new method is seen to render the network practically invulnerable to attacks while requiring only a small fraction of the nodes to receive the vaccine.
[ { "version": "v1", "created": "Tue, 22 Nov 2005 10:59:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Stauffer", "Alexandre O.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
cs/0511083
Olivier Powell
Olivier Powell, Aubin Jarry, Pierre Leone, Jose Rolim
Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy
4 pages, 2 figures
null
null
null
cs.DC
null
We show how recent theoretical advances for data-propagation in Wireless Sensor Networks (WSNs) can be combined to improve gradient-based routing (GBR) in Wireless Sensor Networks. We propose a mixed-strategy of direct transmission and multi-hop propagation of data which improves the lifespan of WSNs by reaching better energy-load-balancing amongst sensor nodes.
[ { "version": "v1", "created": "Wed, 23 Nov 2005 18:13:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "Olivier", "" ], [ "Jarry", "Aubin", "" ], [ "Leone", "Pierre", "" ], [ "Rolim", "Jose", "" ] ]
cs/0511085
Ron Cohen
R. A. Cohen
Proving that P is not equal to NP and that P is not equal to the intersection of NP and co-NP
9 pages ; 3 figures
null
null
null
cs.CC
null
The open question, P=NP?, was presented by Cook (1971). In this paper, a proof that P is not equal to NP is presented. In addition, it is shown that P is not equal to the intersection of NP and co-NP. Finally, the exact inclusion relationships between the classes P, NP and co-NP are presented.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 15:23:18 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2005 14:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "R. A.", "" ] ]
cs/0511088
Barak Pearlmutter
Barak A. Pearlmutter
Bounds on Query Convergence
6 pages, 2 figures
null
null
null
cs.LG
null
The problem of finding an optimum using noisy evaluations of a smooth cost function arises in many contexts, including economics, business, medicine, experiment design, and foraging theory. We derive an asymptotic bound E[ (x_t - x*)^2 ] >= O(1/sqrt(t)) on the rate of convergence of a sequence (x_0, x_1, >...) generated by an unbiased feedback process observing noisy evaluations of an unknown quadratic function maximised at x*. The bound is tight, as the proof leads to a simple algorithm which meets it. We further establish a bound on the total regret, E[ sum_{i=1..t} (x_i - x*)^2 ] >= O(sqrt(t)) These bounds may impose practical limitations on an agent's performance, as O(eps^-4) queries are made before the queries converge to x* with eps accuracy.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 15:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Pearlmutter", "Barak A.", "" ] ]
cs/0511090
Petra Hofstedt
Petra Hofstedt, Peter Pepper
Integration of Declarative and Constraint Programming
30 pages, 9 figures, To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.AI
null
Combining a set of existing constraint solvers into an integrated system of cooperating solvers is a useful and economic principle to solve hybrid constraint problems. In this paper we show that this approach can also be used to integrate different language paradigms into a unified framework. Furthermore, we study the syntactic, semantic and operational impacts of this idea for the amalgamation of declarative and constraint programming.
[ { "version": "v1", "created": "Sun, 27 Nov 2005 14:58:22 GMT" }, { "version": "v2", "created": "Sat, 14 Jan 2006 15:48:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofstedt", "Petra", "" ], [ "Pepper", "Peter", "" ] ]
cs/0511091
Marc Schoenauer
Carlos Kavka (INRIA Futurs, UNSL-DI), Patricia Roggero (UNSL-DI), Marc Schoenauer (INRIA Futurs)
Evolution of Voronoi based Fuzzy Recurrent Controllers
null
Dans GECCO 2005
null
null
cs.AI
null
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. Among the most successful methods to automate the fuzzy controllers development process are evolutionary algorithms. In this work, we propose the Recurrent Fuzzy Voronoi (RFV) model, a representation for recurrent fuzzy systems. It is an extension of the FV model proposed by Kavka and Schoenauer that extends the application domain to include temporal problems. The FV model is a representation for fuzzy controllers based on Voronoi diagrams that can represent fuzzy systems with synergistic rules, fulfilling the $\epsilon$-completeness property and providing a simple way to introduce a priory knowledge. In the proposed representation, the temporal relations are embedded by including internal units that provide feedback by connecting outputs to inputs. These internal units act as memory elements. In the RFV model, the semantic of the internal units can be specified together with the a priori rules. The geometric interpretation of the rules allows the use of geometric variational operators during the evolution. The representation and the algorithms are validated in two problems in the area of system identification and evolutionary robotics.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 07:14:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kavka", "Carlos", "", "INRIA Futurs, UNSL-DI" ], [ "Roggero", "Patricia", "", "UNSL-DI" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
cs/0511099
Na Li
Na Li and Wen-feng Qi
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables
null
null
null
null
cs.CR
null
To resist algebraic attack, a Boolean function should possess good algebraic immunity (AI). Several papers constructed symmetric functions with the maximum algebraic immunity $\lceil \frac{n}{2}\rceil $. In this correspondence we prove that for each odd $n$, there is exactly one trivial balanced $n$-variable symmetric Boolean function achieving the algebraic immunity $\lceil \frac{n}{2}\rceil $. And we also obtain a necessary condition for the algebraic normal form of a symmetric Boolean function with maximum algebraic immunity.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 11:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Na", "" ], [ "Qi", "Wen-feng", "" ] ]
cs/0511105
Todd Young
Erik M. Boczko, Todd R. Young
The Signed Distance Function: A New Tool for Binary Classification
13 pages, 5 figures
null
null
null
cs.LG cs.CG
null
From a geometric perspective most nonlinear binary classification algorithms, including state of the art versions of Support Vector Machine (SVM) and Radial Basis Function Network (RBFN) classifiers, and are based on the idea of reconstructing indicator functions. We propose instead to use reconstruction of the signed distance function (SDF) as a basis for binary classification. We discuss properties of the signed distance function that can be exploited in classification algorithms. We develop simple versions of such classifiers and test them on several linear and nonlinear problems. On linear tests accuracy of the new algorithm exceeds that of standard SVM methods, with an average of 50% fewer misclassifications. Performance of the new methods also matches or exceeds that of standard methods on several nonlinear problems including classification of benchmark diagnostic micro-array data sets.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 14:15:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Boczko", "Erik M.", "" ], [ "Young", "Todd R.", "" ] ]
cs/0511106
Sergiu Chelcea
Sergiu Theodor Chelcea (INRIA Rocquencourt / INRIA Sophia Antipolis), Alzennyr Da Silva (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Doru Tanasa (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA Rocquencourt / INRIA Sophia Antipolis)
Benefits of InterSite Pre-Processing and Clustering Methods in E-Commerce Domain
null
Dans Proceedings of the ECML/PKDD2005 Discovery Challenge, A Collaborative Effort in Knowledge Discovery from Databases
null
null
cs.DB
null
This paper presents our preprocessing and clustering analysis on the clickstream dataset proposed for the ECMLPKDD 2005 Discovery Challenge. The main contributions of this article are double. First, after presenting the clickstream dataset, we show how we build a rich data warehouse based an advanced preprocesing. We take into account the intersite aspects in the given ecommerce domain, which offers an interesting data structuration. A preliminary statistical analysis based on time period clickstreams is given, emphasing the importance of intersite user visits in such a context. Secondly, we describe our crossed-clustering method which is applied on data generated from our data warehouse. Our preliminary results are interesting and promising illustrating the benefits of our WUM methods, even if more investigations are needed on the same dataset.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 16:12:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Chelcea", "Sergiu Theodor", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Da Silva", "Alzennyr", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Tanasa", "Doru", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Trousse", "Brigitte", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0511107
J. G. Esteve
J. G. Esteve and F. Falceto
Phase transition in the assignment problem for random matrices
7 pages, 5 figures; accepted for publication in Europhys. Lett. http://www.edpsciences.org/journal/index.cfm?edpsname=epl
null
10.1209/epl/i2005-10296-6
null
cs.CC cond-mat.stat-mech
null
We report an analytic and numerical study of a phase transition in a P problem (the assignment problem) that separates two phases whose representatives are the simple matching problem (an easy P problem) and the traveling salesman problem (a NP-complete problem). Like other phase transitions found in combinatoric problems (K-satisfiability, number partitioning) this can help to understand the nature of the difficulties in solving NP problems an to find more accurate algorithms for them.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 18:03:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Esteve", "J. G.", "" ], [ "Falceto", "F.", "" ] ]
cs/0511108
Abdelhadi Benabdallah
A. Benabdallah and G. Radons
Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs. Modified Baum-Welch Algorithm
15 pages, 3 figures, 2 tables
null
null
null
cs.DS cs.LG
null
We propose a new method for the estimation of parameters of hidden diffusion processes. Based on parametrization of the transition matrix, the Baum-Welch algorithm is improved. The algorithm is compared to the particle filter in application to the noisy periodic systems. It is shown that the modified Baum-Welch algorithm is capable of estimating the system parameters with better accuracy than particle filters.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 20:23:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Benabdallah", "A.", "" ], [ "Radons", "G.", "" ] ]
cs/0512001
Frank Ruskey
Jeremy Carroll (1), Frank Ruskey (2), Mark Weston (2) ((1) HP Laboratories, Bristol, UK, (2) University of Victoria, Canada)
Which n-Venn diagrams can be drawn with convex k-gons?
10 pages, 3 figures. To be published in Proceedings of the Second International Workshop on Euler Diagrams (Euler 2005), Electronic Notes in Theoretical Computer Science
null
null
null
cs.CG
null
We establish a new lower bound for the number of sides required for the component curves of simple Venn diagrams made from polygons. Specifically, for any n-Venn diagram of convex k-gons, we prove that k >= (2^n - 2 - n) / (n (n-2)). In the process we prove that Venn diagrams of seven curves, simple or not, cannot be formed from triangles. We then give an example achieving the new lower bound of a (simple, symmetric) Venn diagram of seven quadrilaterals. Previously Grunbaum had constructed a 7-Venn diagram of non-convex 5-gons [``Venn Diagrams II'', Geombinatorics 2:25-31, 1992].
[ { "version": "v1", "created": "Wed, 30 Nov 2005 23:30:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Carroll", "Jeremy", "" ], [ "Ruskey", "Frank", "" ], [ "Weston", "Mark", "" ] ]
cs/0512002
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa
On Self-Regulated Swarms, Societal Memory, Speed and Dynamics
11 pages, 8 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos/refs_2005.html, KEYWORDS: Dynamic Optimization, Dynamic Optimal Control problems, Swarm Intelligence, Self-Organization, Societal Implicit Memory. Submitted to ALIFE-X, Int. Conf. on the Simulation and Synthesis of Living Systems, Bloomington, Indiana, USA, June 3-7, 2006
null
null
null
cs.NE cs.AI
null
We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 03:10:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512003
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa
Societal Implicit Memory and his Speed on Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms
20 pages, 25 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos . Draft submitted to Journal of Systems Architecture, Farooq M. and Menezes R. (Eds.), Special issue on Nature Inspired Applied Systems, Elsevier, 2006
null
null
null
cs.MA cs.AI
null
In order to overcome difficult dynamic optimization and environment extrema tracking problems, We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:09:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512004
Vitorino Ramos Dr.
Carlos Fernandes, Vitorino Ramos and Agostinho C. Rosa
Self-Regulated Artificial Ant Colonies on Digital Image Habitats
8 pages, 17 figures, full pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-WCLC05b.pdf
in International Journal of Lateral Computing, IJLC, vol. 2 (1), pp. 1-8, ISSN 0973-208X, Dec. 2005
null
null
cs.MA cs.AI
null
Artificial life models, swarm intelligent and evolutionary computation algorithms are usually built on fixed size populations. Some studies indicate however that varying the population size can increase the adaptability of these systems and their capability to react to changing environments. In this paper we present an extended model of an artificial ant colony system designed to evolve on digital image habitats. We will show that the present swarm can adapt the size of the population according to the type of image on which it is evolving and reacting faster to changing images, thus converging more rapidly to the new desired regions, regulating the number of his image foraging agents. Finally, we will show evidences that the model can be associated with the Mathematical Morphology Watershed algorithm to improve the segmentation of digital grey-scale images. KEYWORDS: Swarm Intelligence, Perception and Image Processing, Pattern Recognition, Mathematical Morphology, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:39:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandes", "Carlos", "" ], [ "Ramos", "Vitorino", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512005
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes and Agostinho C. Rosa
On Ants, Bacteria and Dynamic Environments
8 pages, 6 figures, full paper with pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_63.html, keywords: Swarm Intelligence and Perception, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search and Optimization in Dynamic Environments. In NCA-05, Natural Computing and Applications Workshop, IEEE Computer Press, Timisoara, Romania, Sep. 25-29, 2005
null
null
null
cs.DC
null
Wasps, bees, ants and termites all make effective use of their environment and resources by displaying collective swarm intelligence. Termite colonies - for instance - build nests with a complexity far beyond the comprehension of the individual termite, while ant colonies dynamically allocate labor to various vital tasks such as foraging or defense without any central decision-making ability. Recent research suggests that microbial life can be even richer: highly social, intricately networked, and teeming with interactions, as found in bacteria. What strikes from these observations is that both ant colonies and bacteria have similar natural mechanisms based on Stigmergy and Self-Organization in order to emerge coherent and sophisticated patterns of global behaviour. Keeping in mind the above characteristics we will present a simple model to tackle the collective adaptation of a social swarm based on real ant colony behaviors (SSA algorithm) for tracking extrema in dynamic environments and highly multimodal complex functions described in the well-know De Jong test suite. Then, for the purpose of comparison, a recent model of artificial bacterial foraging (BFOA algorithm) based on similar stigmergic features is described and analyzed. Final results indicate that the SSA collective intelligence is able to cope and quickly adapt to unforeseen situations even when over the same cooperative foraging period, the community is requested to deal with two different and contradictory purposes, while outperforming BFOA in adaptive speed.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:52:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
cs/0512007
Arindam Mitra
Arindam Mitra
Entangled messages
PDF, 2 Pages
null
null
null
cs.CR cs.IR
null
It is sometimes necessary to send copies of the same email to different parties, but it is impossible to ensure that if one party reads the message the other parties will bound to read it. We propose an entanglement based scheme where if one party reads the message the other party will bound to read it simultaneously.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 15:40:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
cs/0512008
Joel Friedman
Joel Friedman
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
70 pages, abstract corrected and modified
null
null
null
cs.CC math.AG
null
This paper is motivated by questions such as P vs. NP and other questions in Boolean complexity theory. We describe an approach to attacking such questions with cohomology, and we show that using Grothendieck topologies and other ideas from the Grothendieck school gives new hope for such an attack. We focus on circuit depth complexity, and consider only finite topological spaces or Grothendieck topologies based on finite categories; as such, we do not use algebraic geometry or manifolds. Given two sheaves on a Grothendieck topology, their "cohomological complexity" is the sum of the dimensions of their Ext groups. We seek to model the depth complexity of Boolean functions by the cohomological complexity of sheaves on a Grothendieck topology. We propose that the logical AND of two Boolean functions will have its corresponding cohomological complexity bounded in terms of those of the two functions using ``virtual zero extensions.'' We propose that the logical negation of a function will have its corresponding cohomological complexity equal to that of the original function using duality theory. We explain these approaches and show that they are stable under pullbacks and base change. It is the subject of ongoing work to achieve AND and negation bounds simultaneously in a way that yields an interesting depth lower bound.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 22:40:27 GMT" }, { "version": "v2", "created": "Fri, 2 Dec 2005 21:25:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]
cs/0512010
Timothy Porter
Jonathan Gratus and Timothy Porter
A geometry of information, I: Nerves, posets and differential forms
28 pages. A version of this paper appears also on the Dagstuhl seminar portal http://drops.dagstuhl.de/portals/04351/
null
null
null
cs.AI cs.GR
null
The main theme of this workshop (Dagstuhl seminar 04351) is `Spatial Representation: Continuous vs. Discrete'. Spatial representation has two contrasting but interacting aspects (i) representation of spaces' and (ii) representation by spaces. In this paper, we will examine two aspects that are common to both interpretations of the theme, namely nerve constructions and refinement. Representations change, data changes, spaces change. We will examine the possibility of a `differential geometry' of spatial representations of both types, and in the sequel give an algebra of differential forms that has the potential to handle the dynamical aspect of such a geometry. We will discuss briefly a conjectured class of spaces, generalising the Cantor set which would seem ideal as a test-bed for the set of tools we are developing.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 16:18:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Gratus", "Jonathan", "" ], [ "Porter", "Timothy", "" ] ]
cs/0512011
Shi Zhou Dr.
Shi Zhou
Understanding the internet topology evolution dynamics
15 figures
Physical Review E, vol. 70, no. 016124, July 2006.
10.1103/PhysRevE.74.016124
null
cs.NI
null
The internet structure is extremely complex. The Positive-Feedback Preference (PFP) model is a recently introduced internet topology generator. The model uses two generic algorithms to replicate the evolution dynamics observed on the internet historic data. The phenomenological model was originally designed to match only two topology properties of the internet, i.e. the rich-club connectivity and the exact form of degree distribution. Whereas numerical evaluation has shown that the PFP model accurately reproduces a large set of other nontrivial characteristics as well. This paper aims to investigate why and how this generative model captures so many diverse properties of the internet. Based on comprehensive simulation results, the paper presents a detailed analysis on the exact origin of each of the topology properties produced by the model. This work reveals how network evolution mechanisms control the obtained topology properties and it also provides insights on correlations between various structural characteristics of complex networks.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 18:24:10 GMT" }, { "version": "v2", "created": "Tue, 18 Apr 2006 11:45:01 GMT" }, { "version": "v3", "created": "Thu, 13 Jul 2006 08:37:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ] ]
cs/0512016
Mikl\'os Cs\H{u}r\"os
Mikl\'os Cs\H{u}r\"os
A linear-time algorithm for finding the longest segment which scores above a given threshold
null
null
null
null
cs.DS cs.CE
null
This paper describes a linear-time algorithm that finds the longest stretch in a sequence of real numbers (``scores'') in which the sum exceeds an input parameter. The algorithm also solves the problem of finding the longest interval in which the average of the scores is above a fixed threshold. The problem originates from molecular sequence analysis: for instance, the algorithm can be employed to identify long GC-rich regions in DNA sequences. The algorithm can also be used to trim low-quality ends of shotgun sequences in a preprocessing step of whole-genome assembly.
[ { "version": "v1", "created": "Sun, 4 Dec 2005 04:28:00 GMT" }, { "version": "v2", "created": "Sun, 12 Mar 2006 02:40:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Csűrös", "Miklós", "" ] ]
cs/0512019
Marek W. Gutowski
Marek W. Gutowski
Amazing geometry of genetic space or are genetic algorithms convergent?
7 pages, presented on VII KAEiOG (VII Domestic Conference on Evolutionary Algorithms and Global Optimization), May 24-26, 2004, Kazimierz Dolny, Poland
null
null
null
cs.NE cs.DM cs.SE
null
There is no proof yet of convergence of Genetic Algorithms. We do not supply it too. Instead, we present some thoughts and arguments to convince the Reader, that Genetic Algorithms are essentially bound for success. For this purpose, we consider only the crossover operators, single- or multiple-point, together with selection procedure. We also give a proof that the soft selection is superior to other selection schemes.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 11:12:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutowski", "Marek W.", "" ] ]
cs/0512021
Ted Herman
Brahim Hamid (1), Ted Herman (2), Morten Mjelde (3) ((1) LaBRI University of Bordeaux-1 France, (2) University of Iowa, (3) University in Bergen Norway)
The Poster Session of SSS 2005
3 pages, related to Springer LNCS 3764, Proceedings of Symposium on Self-Stabilizing Systems
null
null
TR-05-13
cs.DC cs.DS
null
This technical report documents the poster session of SSS 2005, the Symposium on Self-Stabilizing Systems published by Springer as LNCS volume 3764. The poster session included five presentations. Two of these presentations are summarized in brief abstracts contained in this technical report.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 22:51:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamid", "Brahim", "" ], [ "Herman", "Ted", "" ], [ "Mjelde", "Morten", "" ] ]
cs/0512026
Ingo Josopait
I. Josopait
Checking C++ Programs for Dimensional Consistency
submitted to "Computing in Science and Engineering"
null
null
null
cs.PL
null
I will present my implementation 'n-units' of physical units into C++ programs. It allows the compiler to check for dimensional consistency.
[ { "version": "v1", "created": "Wed, 7 Dec 2005 15:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Josopait", "I.", "" ] ]
cs/0512031
Slawomir Lasota
Slawomir Lasota and Igor Walukiewicz
Alternating Timed Automata
the full version of the Fossacs'05 conference preliminary paper revised according ot the referee's comments
null
null
null
cs.LO
null
A notion of alternating timed automata is proposed. It is shown that such automata with only one clock have decidable emptiness problem over finite words. This gives a new class of timed languages which is closed under boolean operations and which has an effective presentation. We prove that the complexity of the emptiness problem for alternating timed automata with one clock is non-primitive recursive. The proof gives also the same lower bound for the universality problem for nondeterministic timed automata with one clock. We investigate extension of the model with epsilon-transitions and prove that emptiness is undecidable. Over infinite words, we show undecidability of the universality problem.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 08:50:35 GMT" }, { "version": "v2", "created": "Thu, 24 Aug 2006 14:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lasota", "Slawomir", "" ], [ "Walukiewicz", "Igor", "" ] ]
cs/0512033
Bernardo Huberman
Bernardo A. Huberman and Fang Wu
Bootstrapping the Long Tail in Peer to Peer Systems
null
null
null
null
cs.NI cs.CY physics.soc-ph
null
We describe an efficient incentive mechanism for P2P systems that generates a wide diversity of content offerings while responding adaptively to customer demand. Files are served and paid for through a parimutuel market similar to that commonly used for betting in horse races. An analysis of the performance of such a system shows that there exists an equilibrium with a long tail in the distribution of content offerings, which guarantees the real time provision of any content regardless of its popularity.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 18:02:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Wu", "Fang", "" ] ]
cs/0512034
Bernardo Huberman
Bernardo A. Huberman, Fang Wu and Li Zhang
Ensuring Trust in One Time Exchanges: Solving the QoS Problem
null
null
null
null
cs.GT physics.soc-ph
null
We describe a pricing structure for the provision of IT services that ensures trust without requiring repeated interactions between service providers and users. It does so by offering a pricing structure that elicits truthful reporting of quality of service (QoS) by providers while making them profitable. This mechanism also induces truth-telling on the part of users reserving the service.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 19:44:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Wu", "Fang", "" ], [ "Zhang", "Li", "" ] ]
cs/0512035
Michael N. Vyalyi
Sergey P. Tarasov, Mikhail N. Vyalyi
Semidefinite programming and arithmetic circuit evaluation
Submitted to Special issue of DAM in memory of L.Khachiyan
null
null
null
cs.CC
null
A rational number can be naturally presented by an arithmetic computation (AC): a sequence of elementary arithmetic operations starting from a fixed constant, say 1. The asymptotic complexity issues of such a representation are studied e.g. in the framework of the algebraic complexity theory over arbitrary field. Here we study a related problem of the complexity of performing arithmetic operations and computing elementary predicates, e.g. ``='' or ``>'', on rational numbers given by AC. In the first place, we prove that AC can be efficiently simulated by the exact semidefinite programming (SDP). Secondly, we give a BPP-algorithm for the equality predicate. Thirdly, we put ``>''-predicate into the complexity class PSPACE. We conjecture that ``>''-predicate is hard to compute. This conjecture, if true, would clarify the complexity status of the exact SDP - a well known open problem in the field of mathematical programming.
[ { "version": "v1", "created": "Fri, 9 Dec 2005 16:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Tarasov", "Sergey P.", "" ], [ "Vyalyi", "Mikhail N.", "" ] ]
cs/0512039
Jianqin Zhou
Jianqin Zhou, Xirong Xu
An algorithm for the k-error linear complexity of a sequence with period 2pn over GF(q)
6 pages
null
null
null
cs.CR
null
The union cost is used, so that an efficient algorithm for computing the k-error linear complexity of a sequence with period 2pn over GF(q) is presented, where p and q are odd primes, and q is a primitive root of modulo p2.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:21:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ], [ "Xu", "Xirong", "" ] ]
cs/0512040
Jianqin Zhou
Jianqin Zhou
A fast algorithm for determining the linear complexity of periodic sequences
7 pages
null
null
null
cs.CR
null
A fast algorithm is presented for determining the linear complexity and the minimal polynomial of periodic sequences over GF(q) with period q n p m, where p is a prime, q is a prime and a primitive root modulo p2. The algorithm presented here generalizes both the algorithm in [4] where the period of a sequence over GF(q) is p m and the algorithm in [5] where the period of a binary sequence is 2 n p m . When m=0, the algorithm simplifies the generalized Games-Chan algorithm.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:38:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ] ]
cs/0512041
Jianqin Zhou
Jianqin Zhou
Generalized partially bent functions
7 pages
null
null
null
cs.CR
null
Based on the definition of generalized partially bent functions, using the theory of linear transformation, the relationship among generalized partially bent functions over ring Z N, generalized bent functions over ring Z N and affine functions is discussed. When N is a prime number, it is proved that a generalized partially bent function can be decomposed as the addition of a generalized bent function and an affine function. The result obtained here generalizes the main works concerning partially bent functions by Claud Carlet in [1].
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:43:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ] ]
cs/0512042
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo
Points on Computable Curves
10 pages, 12 pages appendix
null
null
null
cs.CC cs.CG
null
The ``analyst's traveling salesman theorem'' of geometric measure theory characterizes those subsets of Euclidean space that are contained in curves of finite length. This result, proven for the plane by Jones (1990) and extended to higher-dimensional Euclidean spaces by Okikiolu (1991), says that a bounded set $K$ is contained in some curve of finite length if and only if a certain ``square beta sum'', involving the ``width of $K$'' in each element of an infinite system of overlapping ``tiles'' of descending size, is finite. In this paper we characterize those {\it points} of Euclidean space that lie on {\it computable} curves of finite length by formulating and proving a computable extension of the analyst's traveling salesman theorem. Our extension says that a point in Euclidean space lies on some computable curve of finite length if and only if it is ``permitted'' by some computable ``Jones constriction''. A Jones constriction here is an explicit assignment of a rational cylinder to each of the above-mentioned tiles in such a way that, when the radius of the cylinder corresponding to a tile is used in place of the ``width of $K$'' in each tile, the square beta sum is finite. A point is permitted by a Jones constriction if it is contained in the cylinder assigned to each tile containing the point. The main part of our proof is the construction of a computable curve of finite length traversing all the points permitted by a given Jones constriction. Our construction uses the main ideas of Jones's ``farthest insertion'' construction, but our algorithm for computing the curve must work exclusively with the Jones constriction itself, because it has no direct access to the (typically uncomputable) points permitted by the Jones constriction.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 03:08:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Mayordomo", "Elvira", "" ] ]
cs/0512043
Dirk Wagner
Dirk Wagner, John Noga
Random Walks with Anti-Correlated Steps
5 pages, 1 chart, 2 tables
null
null
null
cs.DM cs.PF
null
We conjecture the expected value of random walks with anti-correlated steps to be exactly 1. We support this conjecture with 2 plausibility arguments and experimental data. The experimental analysis includes the computation of the expected values of random walks for steps up to 22. The result shows the expected value asymptotically converging to 1.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 08:04:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Wagner", "Dirk", "" ], [ "Noga", "John", "" ] ]
cs/0512045
Xuan-Ha Vu
Xuan-Ha Vu, Marius-Calin Silaghi, Djamila Sam-Haroud and Boi Faltings
Branch-and-Prune Search Strategies for Numerical Constraint Solving
43 pages, 11 figures
null
null
LIA-REPORT-2006-007
cs.AI
null
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps. To find the complete solution set, most of these solvers alternate the pruning steps with branching steps, which split each problem into subproblems. This forms the so-called branch-and-prune framework, well known among the approaches for solving numerical constraints. The basic branch-and-prune search strategy that uses domain bisections in place of the branching steps is called the bisection search. In general, the bisection search works well in case (i) the solutions are isolated, but it can be improved further in case (ii) there are continuums of solutions (this often occurs when inequalities are involved). In this paper, we propose a new branch-and-prune search strategy along with several variants, which not only allow yielding better branching decisions in the latter case, but also work as well as the bisection search does in the former case. These new search algorithms enable us to employ various pruning techniques in the construction of inner and outer approximations of the solution set. Our experiments show that these algorithms speed up the solving process often by one order of magnitude or more when solving problems with continuums of solutions, while keeping the same performance as the bisection search when the solutions are isolated.
[ { "version": "v1", "created": "Sun, 11 Dec 2005 19:47:42 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 22:59:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Vu", "Xuan-Ha", "" ], [ "Silaghi", "Marius-Calin", "" ], [ "Sam-Haroud", "Djamila", "" ], [ "Faltings", "Boi", "" ] ]
cs/0512049
Gq Zhang Ph.D.
Jeff Stuckman and Guo-Qiang Zhang
Mastermind is NP-Complete
null
null
null
null
cs.CC cs.DM
null
In this paper we show that the Mastermind Satisfiability Problem (MSP) is NP-complete. The Mastermind is a popular game which can be turned into a logical puzzle called Mastermind Satisfiability Problem in a similar spirit to the Minesweeper puzzle. By proving that MSP is NP-complete, we reveal its intrinsic computational property that makes it challenging and interesting. This serves as an addition to our knowledge about a host of other puzzles, such as Minesweeper, Mah-Jongg, and the 15-puzzle.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 04:19:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckman", "Jeff", "" ], [ "Zhang", "Guo-Qiang", "" ] ]
cs/0512052
Ion Mandoiu
Ion I. Mandoiu and Claudia Prajescu
High-Throughput SNP Genotyping by SBE/SBH
19 pages
null
null
null
cs.DS q-bio.GN
null
Despite much progress over the past decade, current Single Nucleotide Polymorphism (SNP) genotyping technologies still offer an insufficient degree of multiplexing when required to handle user-selected sets of SNPs. In this paper we propose a new genotyping assay architecture combining multiplexed solution-phase single-base extension (SBE) reactions with sequencing by hybridization (SBH) using universal DNA arrays such as all $k$-mer arrays. In addition to PCR amplification of genomic DNA, SNP genotyping using SBE/SBH assays involves the following steps: (1) Synthesizing primers complementing the genomic sequence immediately preceding SNPs of interest; (2) Hybridizing these primers with the genomic DNA; (3) Extending each primer by a single base using polymerase enzyme and dideoxynucleotides labeled with 4 different fluorescent dyes; and finally (4) Hybridizing extended primers to a universal DNA array and determining the identity of the bases that extend each primer by hybridization pattern analysis. Our contributions include a study of multiplexing algorithms for SBE/SBH genotyping assays and preliminary experimental results showing the achievable tradeoffs between the number of array probes and primer length on one hand and the number of SNPs that can be assayed simultaneously on the other. Simulation results on datasets both randomly generated and extracted from the NCBI dbSNP database suggest that the SBE/SBH architecture provides a flexible and cost-effective alternative to genotyping assays currently used in the industry, enabling genotyping of up to hundreds of thousands of user-specified SNPs per assay.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 18:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Prajescu", "Claudia", "" ] ]
cs/0512053
John Hitchcock
John M. Hitchcock
Online Learning and Resource-Bounded Dimension: Winnow Yields New Lower Bounds for Hard Sets
null
null
null
null
cs.CC cs.LG
null
We establish a relationship between the online mistake-bound model of learning and resource-bounded dimension. This connection is combined with the Winnow algorithm to obtain new results about the density of hard sets under adaptive reductions. This improves previous work of Fu (1995) and Lutz and Zhao (2000), and solves one of Lutz and Mayordomo's "Twelve Problems in Resource-Bounded Measure" (1999).
[ { "version": "v1", "created": "Tue, 13 Dec 2005 22:01:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitchcock", "John M.", "" ] ]
cs/0512054
Vyacheslav Gorshkov Mr
Gennady P.Berman (Los Alamos National Laboratory, T-13), Vyacheslav N.Gorshkov (Los Alamos National Laboratory, Center for Nonlinear Studies), Xidi Wang (Citigroup, Sao Paulo, Brasil)
Irreducible Frequent Patterns in Transactional Databases
30 pages, 18 figures
null
null
null
cs.DS cs.DB
null
Irreducible frequent patters (IFPs) are introduced for transactional databases. An IFP is such a frequent pattern (FP),(x1,x2,...xn), the probability of which, P(x1,x2,...xn), cannot be represented as a product of the probabilities of two (or more) other FPs of the smaller lengths. We have developed an algorithm for searching IFPs in transactional databases. We argue that IFPs represent useful tools for characterizing the transactional databases and may have important applications to bio-systems including the immune systems and for improving vaccination strategies. The effectiveness of the IFPs approach has been illustrated in application to a classification problem.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 22:53:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Berman", "Gennady P.", "", "Los Alamos National Laboratory, T-13" ], [ "Gorshkov", "Vyacheslav N.", "", "Los Alamos National Laboratory, Center for Nonlinear Studies" ], [ "Wang", "Xidi", "", "Citigroup, Sao Paulo, Brasil" ] ]
cs/0512055
Yi-Dong Shen
Yi-Dong Shen and Danny De Schreye
Termination Analysis of General Logic Programs for Moded Queries: A Dynamic Approach
24 Pages
null
null
null
cs.LO cs.PL
null
The termination problem of a logic program can be addressed in either a static or a dynamic way. A static approach performs termination analysis at compile time, while a dynamic approach characterizes and tests termination of a logic program by applying a loop checking technique. In this paper, we present a novel dynamic approach to termination analysis for general logic programs with moded queries. We address several interesting questions, including how to formulate an SLDNF-derivation for a moded query, how to characterize an infinite SLDNF-derivation with a moded query, and how to apply a loop checking mechanism to cut infinite SLDNF-derivations for the purpose of termination analysis. The proposed approach is very powerful and useful. It can be used (1) to test if a logic program terminates for a given concrete or moded query, (2) to test if a logic program terminates for all concrete or moded queries, and (3) to find all (most general) concrete/moded queries that are most likely terminating (or non-terminating).
[ { "version": "v1", "created": "Wed, 14 Dec 2005 07:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "De Schreye", "Danny", "" ] ]
cs/0512056
Roberto Bagnara
Roberto Bagnara, Andrea Pescetti, Alessandro Zaccagnini, Enea Zaffanella (University of Parma)
PURRS: Towards Computer Algebra Support for Fully Automatic Worst-Case Complexity Analysis
6 pages
null
null
null
cs.MS cs.CC
null
Fully automatic worst-case complexity analysis has a number of applications in computer-assisted program manipulation. A classical and powerful approach to complexity analysis consists in formally deriving, from the program syntax, a set of constraints expressing bounds on the resources required by the program, which are then solved, possibly applying safe approximations. In several interesting cases, these constraints take the form of recurrence relations. While techniques for solving recurrences are known and implemented in several computer algebra systems, these do not completely fulfill the needs of fully automatic complexity analysis: they only deal with a somewhat restricted class of recurrence relations, or sometimes require user intervention, or they are restricted to the computation of exact solutions that are often so complex to be unmanageable, and thus useless in practice. In this paper we briefly describe PURRS, a system and software library aimed at providing all the computer algebra services needed by applications performing or exploiting the results of worst-case complexity analyses. The capabilities of the system are illustrated by means of examples derived from the analysis of programs written in a domain-specific functional programming language for real-time embedded systems.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 09:54:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "", "University of Parma" ], [ "Pescetti", "Andrea", "", "University of Parma" ], [ "Zaccagnini", "Alessandro", "", "University of Parma" ], [ "Zaffanella", "Enea", "", "University of Parma" ] ]
cs/0512059
Vladimir Vovk
Vladimir Vovk
Competing with wild prediction rules
28 pages, 3 figures
null
null
null
cs.LG
null
We consider the problem of on-line prediction competitive with a benchmark class of continuous but highly irregular prediction rules. It is known that if the benchmark class is a reproducing kernel Hilbert space, there exists a prediction algorithm whose average loss over the first N examples does not exceed the average loss of any prediction rule in the class plus a "regret term" of O(N^(-1/2)). The elements of some natural benchmark classes, however, are so irregular that these classes are not Hilbert spaces. In this paper we develop Banach-space methods to construct a prediction algorithm with a regret term of O(N^(-1/p)), where p is in [2,infty) and p-2 reflects the degree to which the benchmark class fails to be a Hilbert space.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 20:03:30 GMT" }, { "version": "v2", "created": "Wed, 25 Jan 2006 17:36:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0512060
Chiranjeeb Buragohain
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri
Distributed Navigation Algorithms for Sensor Networks
To Appear in INFOCOM 2006
null
null
null
cs.NI cs.DC cs.DS
null
We propose efficient distributed algorithms to aid navigation of a user through a geographic area covered by sensors. The sensors sense the level of danger at their locations and we use this information to find a safe path for the user through the sensor field. Traditional distributed navigation algorithms rely upon flooding the whole network with packets to find an optimal safe path. To reduce the communication expense, we introduce the concept of a skeleton graph which is a sparse subset of the true sensor network communication graph. Using skeleton graphs we show that it is possible to find approximate safe paths with much lower communication cost. We give tight theoretical guarantees on the quality of our approximation and by simulation, show the effectiveness of our algorithms in realistic sensor network situations.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 22:36:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Buragohain", "Chiranjeeb", "" ], [ "Agrawal", "Divyakant", "" ], [ "Suri", "Subhash", "" ] ]
cs/0512062
Matteo Gagliolo
Juergen Schmidhuber, Matteo Gagliolo, Daan Wierstra, Faustino Gomez
Evolino for recurrent support vector machines
10 pages, 2 figures
null
null
IDSIA-19-05 version 2.0
cs.NE
null
Traditional Support Vector Machines (SVMs) need pre-wired finite time windows to predict and classify time series. They do not have an internal state necessary to deal with sequences involving arbitrary long-term dependencies. Here we introduce a new class of recurrent, truly sequential SVM-like devices with internal adaptive states, trained by a novel method called EVOlution of systems with KErnel-based outputs (Evoke), an instance of the recent Evolino class of methods. Evoke evolves recurrent neural networks to detect and represent temporal dependencies while using quadratic programming/support vector regression to produce precise outputs. Evoke is the first SVM-based mechanism learning to classify a context-sensitive language. It also outperforms recent state-of-the-art gradient-based recurrent neural networks (RNNs) on various time series prediction tasks.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 15:05:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ], [ "Gagliolo", "Matteo", "" ], [ "Wierstra", "Daan", "" ], [ "Gomez", "Faustino", "" ] ]
cs/0512064
Martin Kutz
Martin Kutz
Computing shortest non-trivial cycles on orientable surfaces of bounded genus in almost linear time
13 pages, 7 figures
null
null
null
cs.CG
null
We present an algorithm that computes a shortest non-contractible and a shortest non-separating cycle on an orientable combinatorial surface of bounded genus in O(n \log n) time, where n denotes the complexity of the surface. This solves a central open problem in computational topology, improving upon the current-best O(n^{3/2})-time algorithm by Cabello and Mohar (ESA 2005). Our algorithm uses universal-cover constructions to find short cycles and makes extensive use of existing tools from the field.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 17:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
cs/0512070
Bertrand Nouvel
Bertrand Nouvel (LIP), Eric Remila (LIP)
Incremental and Transitive Discrete Rotations
null
null
null
null
cs.DM cs.GR
null
A discrete rotation algorithm can be apprehended as a parametric application $f\_\alpha$ from $\ZZ[i]$ to $\ZZ[i]$, whose resulting permutation ``looks like'' the map induced by an Euclidean rotation. For this kind of algorithm, to be incremental means to compute successively all the intermediate rotate d copies of an image for angles in-between 0 and a destination angle. The di scretized rotation consists in the composition of an Euclidean rotation with a discretization; the aim of this article is to describe an algorithm whic h computes incrementally a discretized rotation. The suggested method uses o nly integer arithmetic and does not compute any sine nor any cosine. More pr ecisely, its design relies on the analysis of the discretized rotation as a step function: the precise description of the discontinuities turns to be th e key ingredient that will make the resulting procedure optimally fast and e xact. A complete description of the incremental rotation process is provided, also this result may be useful in the specification of a consistent set of defin itions for discrete geometry.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:12:12 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 07:02:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouvel", "Bertrand", "", "LIP" ], [ "Remila", "Eric", "", "LIP" ] ]
cs/0512071
Martyn Amos
Jon Timmis, Martyn Amos, Wolfgang Banzhaf and Andy Tyrrell
"Going back to our roots": second generation biocomputing
Submitted to the International Journal of Unconventional Computing
null
null
null
cs.AI cs.NE
null
Researchers in the field of biocomputing have, for many years, successfully "harvested and exploited" the natural world for inspiration in developing systems that are robust, adaptable and capable of generating novel and even "creative" solutions to human-defined problems. However, in this position paper we argue that the time has now come for a reassessment of how we exploit biology to generate new computational systems. Previous solutions (the "first generation" of biocomputing techniques), whilst reasonably effective, are crude analogues of actual biological systems. We believe that a new, inherently inter-disciplinary approach is needed for the development of the emerging "second generation" of bio-inspired methods. This new modus operandi will require much closer interaction between the engineering and life sciences communities, as well as a bidirectional flow of concepts, applications and expertise. We support our argument by examining, in this new light, three existing areas of biocomputing (genetic programming, artificial immune systems and evolvable hardware), as well as an emerging area (natural genetic engineering) which may provide useful pointers as to the way forward.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:42:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Timmis", "Jon", "" ], [ "Amos", "Martyn", "" ], [ "Banzhaf", "Wolfgang", "" ], [ "Tyrrell", "Andy", "" ] ]
cs/0512072
Elias Tsigaridas
Ioannis Z. Emiris and Elias P. Tsigaridas
Computations with one and two real algebraic numbers
null
null
null
null
cs.SC cs.MS
null
We present algorithmic and complexity results concerning computations with one and two real algebraic numbers, as well as real solving of univariate polynomials and bivariate polynomial systems with integer coefficients using Sturm-Habicht sequences. Our main results, in the univariate case, concern the problems of real root isolation (Th. 19) and simultaneous inequalities (Cor.26) and in the bivariate, the problems of system real solving (Th.42), sign evaluation (Th. 37) and simultaneous inequalities (Cor. 43).
[ { "version": "v1", "created": "Sun, 18 Dec 2005 16:58:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Emiris", "Ioannis Z.", "" ], [ "Tsigaridas", "Elias P.", "" ] ]
cs/0512080
Grigorii Pivovarov
G. B. Pivovarov and S. E. Trunov
EqRank: Theme Evolution in Citation Graphs
8 pages, 7 figs, 2 tables
null
null
null
cs.DS cs.DL
null
Time evolution of the classification scheme generated by the EqRank algorithm is studied with hep-th citation graph as an example. Intuitive expectations about evolution of an adequate classification scheme for a growing set of objects are formulated. Evolution compliant with these expectations is called natural. It is demonstrated that EqRank yields a naturally evolving classification scheme. We conclude that EqRank can be used as a means to detect new scientific themes, and to track their development.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 14:01:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "G. B.", "" ], [ "Trunov", "S. E.", "" ] ]
cs/0512081
Mihai Patrascu
Erik D. Demaine, Friedhelm Meyer auf der Heide, Rasmus Pagh and Mihai Patrascu
De Dictionariis Dynamicis Pauco Spatio Utentibus
14 pages. Full version of a paper accepted to LATIN'06
null
null
null
cs.DS
null
We develop dynamic dictionaries on the word RAM that use asymptotically optimal space, up to constant factors, subject to insertions and deletions, and subject to supporting perfect-hashing queries and/or membership queries, each operation in constant time with high probability. When supporting only membership queries, we attain the optimal space bound of Theta(n lg(u/n)) bits, where n and u are the sizes of the dictionary and the universe, respectively. Previous dictionaries either did not achieve this space bound or had time bounds that were only expected and amortized. When supporting perfect-hashing queries, the optimal space bound depends on the range {1,2,...,n+t} of hashcodes allowed as output. We prove that the optimal space bound is Theta(n lglg(u/n) + n lg(n/(t+1))) bits when supporting only perfect-hashing queries, and it is Theta(n lg(u/n) + n lg(n/(t+1))) bits when also supporting membership queries. All upper bounds are new, as is the Omega(n lg(n/(t+1))) lower bound.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 23:01:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "der Heide", "Friedhelm Meyer auf", "" ], [ "Pagh", "Rasmus", "" ], [ "Patrascu", "Mihai", "" ] ]
cs/0512082
Didier Bert
Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG)
A Fixpoint Semantics of Event Systems with and without Fairness Assumptions
null
null
null
RR 1081-L LSR 21
cs.LO
null
We present a fixpoint semantics of event systems. The semantics is presented in a general framework without concerns of fairness. Soundness and completeness of rules for deriving "leads-to" properties are proved in this general framework. The general framework is instantiated to minimal progress and weak fairness assumptions and similar results are obtained. We show the power of these results by deriving sufficient conditions for "leads-to" under minimal progress proving soundness of proof obligations without reasoning over state-traces.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 08:23:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Barradas", "Hector Ruiz", "", "LSR - IMAG" ], [ "Bert", "Didier", "", "LSR - IMAG" ] ]
cs/0512084
Hanna E. Makaruk
Nikita Sakhanenko, Hanna Makaruk
Understanding physics from interconnected data
9 pages, 8 figures
null
null
LA-UR-05-5921
cs.CV
null
Metal melting on release after explosion is a physical system far from quilibrium. A complete physical model of this system does not exist, because many interrelated effects have to be considered. General methodology needs to be developed so as to describe and understand physical phenomena involved. The high noise of the data, moving blur of images, the high degree of uncertainty due to the different types of sensors, and the information entangled and hidden inside the noisy images makes reasoning about the physical processes very difficult. Major problems include proper information extraction and the problem of reconstruction, as well as prediction of the missing data. In this paper, several techniques addressing the first problem are given, building the basis for tackling the second problem.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 20:23:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Sakhanenko", "Nikita", "" ], [ "Makaruk", "Hanna", "" ] ]
cs/0512085
Todd Holloway
Todd Holloway, Miran Bozicevic, Katy B\"orner
Analyzing and Visualizing the Semantic Coverage of Wikipedia and Its Authors
null
null
null
null
cs.IR
null
This paper presents a novel analysis and visualization of English Wikipedia data. Our specific interest is the analysis of basic statistics, the identification of the semantic structure and age of the categories in this free online encyclopedia, and the content coverage of its highly productive authors. The paper starts with an introduction of Wikipedia and a review of related work. We then introduce a suite of measures and approaches to analyze and map the semantic structure of Wikipedia. The results show that co-occurrences of categories within individual articles have a power-law distribution, and when mapped reveal the nicely clustered semantic structure of Wikipedia. The results also reveal the content coverage of the article's authors, although the roles these authors play are as varied as the authors themselves. We conclude with a discussion of major results and planned future work.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 19:31:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Holloway", "Todd", "" ], [ "Bozicevic", "Miran", "" ], [ "Börner", "Katy", "" ] ]
cs/0512089
Stephen F. Bush PhD
Stephen F. Bush, Todd Hughes
On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types
null
SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003, Santa Fe Institute, Santa Fe, NM, Nov 5-6, 2003
null
null
cs.NI cs.CR
null
We present progress on the experimental validation of a fundamental and universally applicable vulnerability analysis framework that is capable of identifying new types of vulnerabilities before attackers innovate attacks. This new framework proactively identifies system components that are vulnerable based upon their Kolmogorov Complexity estimates and it facilitates prediction of previously unknown vulnerabilities that are likely to be exploited by future attack methods. A tool that utilizes a growing library of complexity estimators is presented. This work is an incremental step towards validation of the concept of complexity-based vulnerability analysis. In particular, results indicate that data types (semantic types) can be identified by estimates of their complexity. Thus, a map of complexity can identify suspicious types, such as executable data embedded within passive data types, without resorting to predefined headers, signatures, or other limiting a priori information.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 22:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Hughes", "Todd", "" ] ]
cs/0512092
Stephen F. Bush PhD
Stephen F. Bush and Nathan Smith
The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance
Introduces flash routing
The 2005 International Conference on Wireless Networks (ICWN-05) Monte Carlo Resort, Las Vegas, Nevada, USA, June 27-30, 2005
null
null
cs.NI
null
A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for wireless ad hoc routing.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 22:17:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Smith", "Nathan", "" ] ]
cs/0512094
Stephen F. Bush PhD
Stephen F. Bush
Low-Energy Sensor Network Time Synchronization as an Emergent Property
null
null
null
null
cs.NI
null
The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. A proportion of the sensors may be integrated with GPS receivers in order to obtain a master clock time.
[ { "version": "v1", "created": "Fri, 23 Dec 2005 21:45:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ] ]
cs/0512096
Ralf L\"ammel
Ralf Laemmel
Book review "The Haskell Road to Logic, Maths and Programming"
To appear in the JoLLI journal in 2006
null
null
null
cs.PL cs.LO
null
The textbook by Doets and van Eijck puts the Haskell programming language systematically to work for presenting a major piece of logic and mathematics. The reader is taken through chapters on basic logic, proof recipes, sets and lists, relations and functions, recursion and co-recursion, the number systems, polynomials and power series, ending with Cantor's infinities. The book uses Haskell for the executable and strongly typed manifestation of various mathematical notions at the level of declarative programming. The book adopts a systematic but relaxed mathematical style (definition, example, exercise, ...); the text is very pleasant to read due to a small amount of anecdotal information, and due to the fact that definitions are fluently integrated in the running text. An important goal of the book is to get the reader acquainted with reasoning about programs.
[ { "version": "v1", "created": "Sat, 24 Dec 2005 23:08:25 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 00:50:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Laemmel", "Ralf", "" ] ]
cs/0512098
Dmitry Paukov
Dmitry P. Paukov
Mathematical models of the complex surfaces in simulation and visualization systems
8 pages, 4 figures
null
null
null
cs.GR cs.CG
null
Modeling, simulation and visualization of three-dimension complex bodies widely use mathematical model of curves and surfaces. The most important curves and surfaces for these purposes are curves and surfaces in Hermite and Bezier forms, splines and NURBS. Article is devoted to survey this way to use geometrical data in various computer graphics systems and adjacent fields.
[ { "version": "v1", "created": "Mon, 26 Dec 2005 14:45:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Paukov", "Dmitry P.", "" ] ]
cs/0512099
Mark Burgin
Mark Burgin
Mathematical Models in Schema Theory
null
null
null
null
cs.AI
null
In this paper, a mathematical schema theory is developed. This theory has three roots: brain theory schemas, grid automata, and block-shemas. In Section 2 of this paper, elements of the theory of grid automata necessary for the mathematical schema theory are presented. In Section 3, elements of brain theory necessary for the mathematical schema theory are presented. In Section 4, other types of schemas are considered. In Section 5, the mathematical schema theory is developed. The achieved level of schema representation allows one to model by mathematical tools virtually any type of schemas considered before, including schemas in neurophisiology, psychology, computer science, Internet technology, databases, logic, and mathematics.
[ { "version": "v1", "created": "Tue, 27 Dec 2005 21:29:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ] ]
cs/0512104
Robert Burger PhD
John Robert Burger
Reversible CAM Processor Modeled After Quantum Computer Behavior
null
null
null
null
cs.AR quant-ph
null
Proposed below is a reversible digital computer modeled after the natural behavior of a quantum system. Using approaches usually reserved for idealized quantum computers, the Reversible CAM, or State Vector Parallel (RSVP) processor can easily find keywords in an unstructured database (that is, it can solve a needle in a haystack problem). The RSVP processor efficiently solves a SAT (Satisfiability of Boolean Formulae) problem; also it can aid in the solution of a GP (Global Properties of Truth Table) problem. The power delay product of the RSVP processor is exponentially lower than that of a standard CAM programmed to perform similar operations.
[ { "version": "v1", "created": "Wed, 28 Dec 2005 19:59:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
cs/0601003
Ruben Vandeginste
Ruben Vandeginste, Bart Demoen
Incremental copying garbage collection for WAM-based Prolog systems
33 pages, 22 figures, 5 tables. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL
null
The design and implementation of an incremental copying heap garbage collector for WAM-based Prolog systems is presented. Its heap layout consists of a number of equal-sized blocks. Other changes to the standard WAM allow these blocks to be garbage collected independently. The independent collection of heap blocks forms the basis of an incremental collecting algorithm which employs copying without marking (contrary to the more frequently used mark&copy or mark&slide algorithms in the context of Prolog). Compared to standard semi-space copying collectors, this approach to heap garbage collection lowers in many cases the memory usage and reduces pause times. The algorithm also allows for a wide variety of garbage collection policies including generational ones. The algorithm is implemented and evaluated in the context of hProlog.
[ { "version": "v1", "created": "Mon, 2 Jan 2006 20:58:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandeginste", "Ruben", "" ], [ "Demoen", "Bart", "" ] ]
cs/0601005
Jinyun Ke
J-Y Ke and Y. Yao
Analyzing language development from a network approach
22 pages, 12 figures
null
null
null
cs.CL
null
In this paper we propose some new measures of language development using network analyses, which is inspired by the recent surge of interests in network studies of many real-world systems. Children's and care-takers' speech data from a longitudinal study are represented as a series of networks, word forms being taken as nodes and collocation of words as links. Measures on the properties of the networks, such as size, connectivity, hub and authority analyses, etc., allow us to make quantitative comparison so as to reveal different paths of development. For example, the asynchrony of development in network size and average degree suggests that children cannot be simply classified as early talkers or late talkers by one or two measures. Children follow different paths in a multi-dimensional space. They may develop faster in one dimension but slower in another dimension. The network approach requires little preprocessing of words and analyses on sentence structures, and the characteristics of words and their usage emerge from the network and are independent of any grammatical presumptions. We show that the change of the two articles "the" and "a" in their roles as important nodes in the network reflects the progress of children's syntactic development: the two articles often start in children's networks as hubs and later shift to authorities, while they are authorities constantly in the adult's networks. The network analyses provide a new approach to study language development, and at the same time language development also presents a rich area for network theories to explore.
[ { "version": "v1", "created": "Wed, 4 Jan 2006 18:33:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Ke", "J-Y", "" ], [ "Yao", "Y.", "" ] ]
cs/0601008
Ben Moszkowski
Ben Moszkowski
A Hierarchical Analysis of Propositional Temporal Logic Based on Intervals
64 pages, revised and expanded version of published work. An earlier version of this appeared in "We Will Show Them: Essays in Honour of Dov Gabbay on his 60th Birthday", Volume 2. S. Artemov, H. Barringer, A. S. d'Avila Garcez, L. C. Lamb, and J. Woods (editors.), pages 371-440, College Publications (formely KCL Publications), King's College, London, 2005, http://www.collegepublications.co.uk
null
null
null
cs.LO
null
We present a hierarchical framework for analysing propositional linear-time temporal logic (PTL) to obtain standard results such as a small model property, decision procedures and axiomatic completeness. Both finite time and infinite time are considered and one consequent benefit of the framework is the ability to systematically reduce infinite-time reasoning to finite-time reasoning. The treatment of PTL with both the operator Until and past time naturally reduces to that for PTL without either one. Our method utilises a low-level normal form for PTL called a "transition configuration". In addition, we employ reasoning about intervals of time. Besides being hierarchical and interval-based, the approach differs from other analyses of PTL typically based on sets of formulas and sequences of such sets. Instead we describe models using time intervals represented as finite and infinite sequences of states. The analysis relates larger intervals with smaller ones. Steps involved are expressed in Propositional Interval Temporal Logic (PITL) which is better suited than PTL for sequentially combining and decomposing formulas. Consequently, we can articulate issues in PTL model construction of equal relevance in more conventional analyses but normally only considered at the metalevel. We also describe a decision procedure based on Binary Decision Diagrams.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 18:35:38 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 23:30:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Moszkowski", "Ben", "" ] ]
cs/0601010
Xiaowen Zhang
Xiaowen Zhang, Li Shu, Ke Tang
Multi-Map Orbit Hopping Chaotic Stream Cipher
9 pages
null
null
null
cs.CR
null
In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum mechanism for secure digital communications and fundamental chaos characteristics of mixing, unpredictable, and extremely sensitive to initial conditions. The design, key and subkeys, and detail implementation of the system are addressed. A variable number of well studied chaotic maps form a map bank. And the key determines how the system hops between multiple orbits, and it also determines the number of maps, the number of orbits for each map, and the number of sample points for each orbits. A detailed example is provided.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 21:52:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Shu", "Li", "" ], [ "Tang", "Ke", "" ] ]