id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0511014 | Kumar Neeraj Verma | Helmut Seidl, Kumar Neeraj Verma | Flat and One-Variable Clauses: Complexity of Verifying Cryptographic
Protocols with Single Blind Copying | Long version of paper presented at LPAR 2004 | null | null | null | cs.LO cs.CR | null | Cryptographic protocols with single blind copying were defined and modeled by
Comon and Cortier using the new class $\mathcal C$ of first order clauses. They
showed its satisfiability problem to be in 3-DEXPTIME. We improve this result
by showing that satisfiability for this class is NEXPTIME-complete, using new
resolution techniques. We show satisfiability to be DEXPTIME-complete if
clauses are Horn, which is what is required for modeling cryptographic
protocols. While translation to Horn clauses only gives a DEXPTIME upper bound
for the secrecy problem for these protocols, we further show that this secrecy
problem is actually DEXPTIME-complete.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 13:40:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Seidl",
"Helmut",
""
],
[
"Verma",
"Kumar Neeraj",
""
]
]
|
cs/0511015 | Prashant Singh | Prashant | Towards a Hierarchical Model of Consciousness, Intelligence, Mind and
Body | 12 pages, 2 figures | null | null | null | cs.AI | null | This article is taken out.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 16:28:05 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 00:00:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
]
|
cs/0511016 | Santo Fortunato Dr | Santo Fortunato, Marian Boguna, Alessandro Flammini, Filippo Menczer | How to make the top ten: Approximating PageRank from in-degree | 8 pages, 7 figures, 2 tables | null | null | null | cs.IR physics.soc-ph | null | PageRank has become a key element in the success of search engines, allowing
to rank the most important hits in the top screen of results. One key aspect
that distinguishes PageRank from other prestige measures such as in-degree is
its global nature. From the information provider perspective, this makes it
difficult or impossible to predict how their pages will be ranked. Consequently
a market has emerged for the optimization of search engine results. Here we
study the accuracy with which PageRank can be approximated by in-degree, a
local measure made freely available by search engines. Theoretical and
empirical analyses lead to conclude that given the weak degree correlations in
the Web link graph, the approximation can be relatively accurate, giving
service and information providers an effective new marketing tool.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:01:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fortunato",
"Santo",
""
],
[
"Boguna",
"Marian",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
]
]
|
cs/0511017 | Gus Gutoski | Gus Gutoski | Short Quantum Games | MSc thesis, 79 pages single-spaced | null | null | null | cs.CC quant-ph | null | In this thesis we introduce quantum refereed games, which are quantum
interactive proof systems with two competing provers. We focus on a restriction
of this model that we call "short quantum games" and we prove an upper bound
and a lower bound on the expressive power of these games.
For the lower bound, we prove that every language having an ordinary quantum
interactive proof system also has a short quantum game. An important part of
this proof is the establishment of a quantum measurement that reliably
distinguishes between quantum states chosen from disjoint convex sets.
For the upper bound, we show that certain types of quantum refereed games,
including short quantum games, are decidable in deterministic exponential time
by supplying a separation oracle for use with the ellipsoid method for convex
feasibility.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:00:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutoski",
"Gus",
""
]
]
|
cs/0511018 | Prashant Singh | Prashant | From General Systems to Soft Systems to Soft Computing: Applications for
Large and Complex Real World Systems | 9 pages | null | null | null | cs.SE | null | This is article is taken out.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:29:55 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 00:00:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
]
|
cs/0511020 | David P{\l}aneta S | David S. P{\l}aneta | Pbit and other list sorting algorithms | 25 pages, 4 tables | Cornell University Computing and Information Science Technical
Reports, 2006 | null | TR2006-2013 | cs.DS | null | Pbit, besides its simplicity, is definitely the fastest list sorting
algorithm. It considerably surpasses all already known methods. Among many
advantages, it is stable, linear and be made to run in place. I will compare
Pbit with algorithm described by Donald E. Knuth in the third volume of ''The
Art of Computer Programming'' and other (QuickerSort, MergeSort) list sorting
algorithms.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 01:52:02 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 23:48:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Płaneta",
"David S.",
""
]
]
|
cs/0511021 | Thorsten Theobald | Ravi Kannan and Thorsten Theobald | Games of fixed rank: A hierarchy of bimatrix games | 13 pages | null | null | null | cs.GT math.CO | null | We propose a new hierarchical approach to understand the complexity of the
open problem of computing a Nash equilibrium in a bimatrix game. Specifically,
we investigate a hierarchy of bimatrix games $(A,B)$ which results from
restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For
every fixed $k$, this class strictly generalizes the class of zero-sum games,
but is a very special case of general bimatrix games. We show that even for
$k=1$ the set of Nash equilibria of these games can consist of an arbitrarily
large number of connected components. While the question of exact polynomial
time algorithms to find a Nash equilibrium remains open for games of fixed
rank, we can provide polynomial time algorithms for finding an
$\epsilon$-approximation.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 10:29:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kannan",
"Ravi",
""
],
[
"Theobald",
"Thorsten",
""
]
]
|
cs/0511022 | Emanuel Diamant | Emanuel Diamant | Does a Plane Imitate a Bird? Does Computer Vision Have to Follow
Biological Paradigms? | Proceedings of the 1st International Symposium on Brain, Vision, and
Artificial Intelligence, 19-21 October 2005, Naples, Italy | LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin
Heidelberg 2005 | null | null | cs.NE | null | We posit a new paradigm for image information processing. For the last 25
years, this task was usually approached in the frame of Treisman's two-stage
paradigm [1]. The latter supposes an unsupervised, bottom-up directed process
of preliminary information pieces gathering at the lower processing stages and
a supervised, top-down directed process of information pieces binding and
grouping at the higher stages. It is acknowledged that these sub-processes
interact and intervene between them in a tricky and a complicated manner.
Notwithstanding the prevalence of this paradigm in biological and computer
vision, we nevertheless propose to replace it with a new one, which we would
like to designate as a two-part paradigm. In it, information contained in an
image is initially extracted in an independent top-down manner by one part of
the system, and then it is examined and interpreted by another, separate system
part. We argue that the new paradigm seems to be more plausible than its
forerunner. We provide evidence from human attention vision studies and
insights of Kolmogorov's complexity theory to support our arguments. We also
provide some reasons in favor of separate image interpretation issues.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 15:08:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
]
|
cs/0511024 | Bourgade Paul | Bourgade Paul, Croissant Olivier | Heat kernel expansion for a family of stochastic volatility models :
delta-geometry | null | null | null | null | cs.CE | null | In this paper, we study a family of stochastic volatility processes; this
family features a mean reversion term for the volatility and a double CEV-like
exponent that generalizes SABR and Heston's models. We derive approximated
closed form formulas for the digital prices, the local and implied
volatilities. Our formulas are efficient for small maturities.
Our method is based on differential geometry, especially small time
diffusions on riemanian spaces. This geometrical point of view can be extended
to other processes, and is very accurate to produce variate smiles for small
maturities and small moneyness.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2005 18:31:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paul",
"Bourgade",
""
],
[
"Olivier",
"Croissant",
""
]
]
|
cs/0511025 | Riccardo Pucella | James Cheney | Logic Column 14: Nominal Logic and Abstract Syntax | 24 pages | SIGACT News 36 (4), pp. 47-69, 2005 | null | null | cs.LO | null | Formalizing syntactic proofs of properties of logics, programming languages,
security protocols, and other formal systems is a significant challenge, in
large part because of the obligation to handle name-binding correctly. We
present an approach called nominal abstract syntax that has attracted
considerable interest since its introduction approximately six years ago. After
an overview of other approaches, we describe nominal abstract syntax and
nominal logic, a logic for reasoning about nominal abstract syntax. We also
discuss applications of nominal techniques to programming, automated reasoning,
and identify some future directions.
| [
{
"version": "v1",
"created": "Sat, 5 Nov 2005 02:47:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cheney",
"James",
""
]
]
|
cs/0511027 | Stephen Luttrell | Stephen Luttrell | Discrete Network Dynamics. Part 1: Operator Theory | 39 pages, 5 figures | null | null | null | cs.NE | null | An operator algebra implementation of Markov chain Monte Carlo algorithms for
simulating Markov random fields is proposed. It allows the dynamics of networks
whose nodes have discrete state spaces to be specified by the action of an
update operator that is composed of creation and annihilation operators. This
formulation of discrete network dynamics has properties that are similar to
those of a quantum field theory of bosons, which allows reuse of many
conceptual and theoretical structures from QFT. The equilibrium behaviour of
one of these generalised MRFs and of the adaptive cluster expansion network
(ACEnet) are shown to be equivalent, which provides a way of unifying these two
theories.
| [
{
"version": "v1",
"created": "Mon, 7 Nov 2005 19:09:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
]
|
cs/0511030 | Gregory Gutin | G. Gutin, A. Rafiey, S. Szeider, A. Yeo | The Linear Arrangement Problem Parameterized Above Guaranteed Value | null | null | null | null | cs.DS cs.CC | null | A linear arrangement (LA) is an assignment of distinct integers to the
vertices of a graph. The cost of an LA is the sum of lengths of the edges of
the graph, where the length of an edge is defined as the absolute value of the
difference of the integers assigned to its ends. For many application one hopes
to find an LA with small cost. However, it is a classical NP-complete problem
to decide whether a given graph $G$ admits an LA of cost bounded by a given
integer. Since every edge of $G$ contributes at least one to the cost of any
LA, the problem becomes trivially fixed-parameter tractable (FPT) if
parameterized by the upper bound of the cost. Fernau asked whether the problem
remains FPT if parameterized by the upper bound of the cost minus the number of
edges of the given graph; thus whether the problem is FPT ``parameterized above
guaranteed value.'' We answer this question positively by deriving an algorithm
which decides in time $O(m+n+5.88^k)$ whether a given graph with $m$ edges and
$n$ vertices admits an LA of cost at most $m+k$ (the algorithm computes such an
LA if it exists). Our algorithm is based on a procedure which generates a
problem kernel of linear size in linear time for a connected graph $G$. We also
prove that more general parameterized LA problems stated by Serna and Thilikos
are not FPT, unless P=NP.
| [
{
"version": "v1",
"created": "Mon, 7 Nov 2005 17:47:55 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Dec 2005 18:26:42 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Mar 2006 10:00:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Szeider",
"S.",
""
],
[
"Yeo",
"A.",
""
]
]
|
cs/0511031 | Prashant Singh | Prashant | Internet Protocol Black Holes: A E-Security Threat | null | null | null | null | cs.NI | null | The paper is taken out.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 00:14:06 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:05:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Prashant",
"",
""
]
]
|
cs/0511032 | Yangli Hector Yee | Yang Li Hector Yee (Cornell University) | Spatiotemporal sensistivity and visual attention for efficient rendering
of dynamic environments | null | ACM Transactions on Graphics, 20(1), January 2001 | null | null | cs.GR cs.CV | null | We present a method to accelerate global illumination computation in dynamic
environments by taking advantage of limitations of the human visual system. A
model of visual attention is used to locate regions of interest in a scene and
to modulate spatiotemporal sensitivity. The method is applied in the form of a
spatiotemporal error tolerance map. Perceptual acceleration combined with good
sampling protocols provide a global illumination solution feasible for use in
animation. Results indicate an order of magnitude improvement in computational
speed. The method is adaptable and can also be used in image-based rendering,
geometry level of detail selection, realistic image synthesis, video telephony
and video compression.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 14:40:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yee",
"Yang Li Hector",
"",
"Cornell University"
]
]
|
cs/0511033 | Martin Ziegler | Martin Ziegler | Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements
and Applications | null | null | null | null | cs.SC | null | For a linearly recurrent vector sequence P[n+1] = A(n) * P[n], consider the
problem of calculating either the n-th term P[n] or L<=n arbitrary terms
P[n_1],...,P[n_L], both for the case of constant coefficients A(n)=A and for a
matrix A(n) with entries polynomial in n. We improve and extend known
algorithms for this problem and present new applications for it. Specifically
it turns out that for instance * any family (p_n) of classical orthogonal
polynomials admits evaluation at given x within O(n^{1/2} log n) operations
INDEPENDENT of the family (p_n) under consideration. * For any L indices
n_1,...,n_L <= n, the values p_{n_i}(x) can be calculated simultaneously using
O(n^{1/2} log n + L log(n/L)) arithmetic operations; again this running time
bound holds uniformly. * Every hypergeometric (or, more generally, holonomic)
function admits approximate evaluation up to absolute error e>0 within
O((log(1/e)^{1/2} loglog(1/e)) -- as opposed to O(log(1/e)) -- arithmetic
steps. * Given m and a polynomial p of degree d over a field of characteristic
zero, the coefficient of p^m to term X^n can be computed within O(d^2
M(n^{1/2})) steps where M(n) denotes the cost of multiplying two degree-n
polynomials. * The same time bound holds for the joint calculation of any
L<=n^{1/2} desired coefficients of p^m to terms X^{n_i}, n_1,...,n_L <= n.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 16:46:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ziegler",
"Martin",
""
]
]
|
cs/0511034 | Stanislav Bulygin V. | Stanislav Bulygin | Generalized Hermitian Codes over GF(2^r) | null | null | null | null | cs.DM | null | In this paper we studied generalization of Hermitian function field proposed
by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semigroup of the
point at infinity for the case q=2, r>=3. It turned out that unlike Hermitian
case, we have already three generators for the semigroup. We then applied this
result to codes, constructed on generalized Hermitian function fields. Further,
we applied results of C.Kirfel and R.Pellikaan to estimating a Feng-Rao
designed distance for GH-codes, which improved on Goppa designed distance.
Next, we studied the question of codes dual to GH-codes. We identified that the
duals are also GH-codes and gave an explicit formula. We concluded with some
computational results. In particular, a new record-giving [32,16,>=12]-code
over GF(8) was presented.
| [
{
"version": "v1",
"created": "Tue, 8 Nov 2005 19:29:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bulygin",
"Stanislav",
""
]
]
|
cs/0511041 | Susumu Yamasaki | Susumu Yamasaki | Logic Programming with Default, Weak and Strict Negations | 14 pages, to appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.LO | null | This paper treats logic programming with three kinds of negation: default,
weak and strict negations. A 3-valued logic model theory is discussed for logic
programs with three kinds of negation. The procedure is constructed for
negations so that a soundness of the procedure is guaranteed in terms of
3-valued logic model theory.
| [
{
"version": "v1",
"created": "Thu, 10 Nov 2005 06:29:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yamasaki",
"Susumu",
""
]
]
|
cs/0511042 | Pascal Hitzler | Sebastian Bader and Pascal Hitzler | Dimensions of Neural-symbolic Integration - A Structured Survey | 28 pages | null | null | null | cs.AI cs.LO cs.NE | null | Research on integrated neural-symbolic systems has made significant progress
in the recent past. In particular the understanding of ways to deal with
symbolic knowledge within connectionist systems (also called artificial neural
networks) has reached a critical mass which enables the community to strive for
applicable implementations and use cases. Recent work has covered a great
variety of logics used in artificial intelligence and provides a multitude of
techniques for dealing with them within the context of artificial neural
networks. We present a comprehensive survey of the field of neural-symbolic
integration, including a new classification of system according to their
architectures and abilities.
| [
{
"version": "v1",
"created": "Thu, 10 Nov 2005 10:00:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bader",
"Sebastian",
""
],
[
"Hitzler",
"Pascal",
""
]
]
|
cs/0511043 | Damiano Bolzoni | Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter Hartel | Poseidon: a 2-tier Anomaly-based Intrusion Detection System | null | null | null | TR-CTIT-05-53 | cs.CR | null | We present Poseidon, a new anomaly based intrusion detection system. Poseidon
is payload-based, and presents a two-tier architecture: the first stage
consists of a Self-Organizing Map, while the second one is a modified PAYL
system. Our benchmarks on the 1999 DARPA data set show a higher detection rate
and lower number of false positives than PAYL and PHAD.
| [
{
"version": "v1",
"created": "Fri, 11 Nov 2005 13:43:04 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Dec 2005 15:11:44 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jan 2006 14:27:46 GMT"
},
{
"version": "v4",
"created": "Fri, 3 Feb 2006 12:26:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bolzoni",
"Damiano",
""
],
[
"Zambon",
"Emmanuele",
""
],
[
"Etalle",
"Sandro",
""
],
[
"Hartel",
"Pieter",
""
]
]
|
cs/0511044 | Mimmo Parente | J. Gruska, S. La Torre, M. Napoli, M. Parente | Various Solutions to the Firing Squad Synchronization Problems | null | null | null | null | cs.DS cs.CC | null | We present different classes of solutions to the Firing Squad Synchronization
Problem on networks of different shapes. The nodes are finite state processors
that work at unison discrete steps. The networks considered are the line, the
ring and the square. For all of these models we have considered one and two-way
communication modes and also constrained the quantity of information that
adjacent processors can exchange each step. We are given a particular time
expressed as a function of the number of nodes of the network, $f(n)$ and
present synchronization algorithms in time $n^2$, $n \log n$, $n\sqrt n$,
$2^n$. The solutions are presented as {\em signals} that are used as building
blocks to compose new solutions for all times expressed by polynomials with
nonnegative coefficients.
| [
{
"version": "v1",
"created": "Sat, 12 Nov 2005 06:44:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gruska",
"J.",
""
],
[
"La Torre",
"S.",
""
],
[
"Napoli",
"M.",
""
],
[
"Parente",
"M.",
""
]
]
|
cs/0511045 | Ugo Dal Lago | Ugo Dal Lago and Simone Martini | An Invariant Cost Model for the Lambda Calculus | 19 pages | null | null | null | cs.LO cs.CC | null | We define a new cost model for the call-by-value lambda-calculus satisfying
the invariance thesis. That is, under the proposed cost model, Turing machines
and the call-by-value lambda-calculus can simulate each other within a
polynomial time overhead. The model only relies on combinatorial properties of
usual beta-reduction, without any reference to a specific machine or evaluator.
In particular, the cost of a single beta reduction is proportional to the
difference between the size of the redex and the size of the reduct. In this
way, the total cost of normalizing a lambda term will take into account the
size of all intermediate results (as well as the number of steps to normal
form).
| [
{
"version": "v1",
"created": "Sat, 12 Nov 2005 11:57:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Martini",
"Simone",
""
]
]
|
cs/0511049 | Gus Gutoski | Gus Gutoski | Entropy, Convex Optimization, and Competitive Quantum Interactions | withdrawn | null | null | null | cs.CC cs.GT quant-ph | null | This paper has been withdrawn by the author due to errors.
| [
{
"version": "v1",
"created": "Sat, 12 Nov 2005 21:15:40 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Nov 2005 23:09:33 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Oct 2006 20:16:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutoski",
"Gus",
""
]
]
|
cs/0511052 | Gilson Antonio Giraldi | Gilson A. Giraldi, Antonio A.F. Oliveira, Leonardo Carvalho | Mining Cellular Automata DataBases throug PCA Models | 13 pages, 4 figures, 5 tables | null | null | null | cs.DM cs.DB | null | Cellular Automata are discrete dynamical systems that evolve following simple
and local rules. Despite of its local simplicity, knowledge discovery in CA is
a NP problem. This is the main motivation for using data mining techniques for
CA study. The Principal Component Analysis (PCA) is a useful tool for data
mining because it provides a compact and optimal description of data sets. Such
feature have been explored to compute the best subspace which maximizes the
projection of the I/O patterns of CA onto the principal axis. The stability of
the principal components against the input patterns is the main result of this
approach. In this paper we perform such analysis but in the presence of noise
which randomly reverses the CA output values with probability $p$. As expected,
the number of principal components increases when the pattern size is
increased. However, it seems to remain stable when the pattern size is
unchanged but the noise intensity gets larger. We describe our experiments and
point out further works using KL transform theory and parameter sensitivity
analysis.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2005 10:54:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Giraldi",
"Gilson A.",
""
],
[
"Oliveira",
"Antonio A. F.",
""
],
[
"Carvalho",
"Leonardo",
""
]
]
|
cs/0511053 | Leland Smith | Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, and
Naren Ramakrishnan | A Model Based Approach to Reachability Routing | In submission to IEEE Journal on Selected Areas of Communication | null | null | null | cs.NI | null | Current directions in network routing research have not kept pace with the
latest developments in network architectures, such as peer-to-peer networks,
sensor networks, ad-hoc wireless networks, and overlay networks. A common
characteristic among all of these new technologies is the presence of highly
dynamic network topologies. Currently deployed single-path routing protocols
cannot adequately cope with this dynamism, and existing multi-path algorithms
make trade-offs which lead to less than optimal performance on these networks.
This drives the need for routing protocols designed with the unique
characteristics of these networks in mind.
In this paper we propose the notion of reachability routing as a solution to
the challenges posed by routing on such dynamic networks. In particular, our
formulation of reachability routing provides cost-sensitive multi-path
forwarding along with loop avoidance within the confines of the Internet
Protocol (IP) architecture. This is achieved through the application of
reinforcement learning within a probabilistic routing framework. Following an
explanation of our design decisions and a description of the algorithm, we
provide an evaluation of the performance of the algorithm on a variety of
network topologies. The results show consistently superior performance compared
to other reinforcement learning based routing algorithms.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2005 16:32:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smith",
"Leland",
""
],
[
"Thirunavukkarasu",
"Muthukumar",
""
],
[
"Varadarajan",
"Srinidhi",
""
],
[
"Ramakrishnan",
"Naren",
""
]
]
|
cs/0511058 | Vladimir Vovk | Vladimir Vovk | On-line regression competitive with reproducing kernel Hilbert spaces | 37 pages, 1 figure | null | null | null | cs.LG | null | We consider the problem of on-line prediction of real-valued labels, assumed
bounded in absolute value by a known constant, of new objects from known
labeled objects. The prediction algorithm's performance is measured by the
squared deviation of the predictions from the actual labels. No stochastic
assumptions are made about the way the labels and objects are generated.
Instead, we are given a benchmark class of prediction rules some of which are
hoped to produce good predictions. We show that for a wide range of
infinite-dimensional benchmark classes one can construct a prediction algorithm
whose cumulative loss over the first N examples does not exceed the cumulative
loss of any prediction rule in the class plus O(sqrt(N)); the main differences
from the known results are that we do not impose any upper bound on the norm of
the considered prediction rules and that we achieve an optimal leading term in
the excess loss of our algorithm. If the benchmark class is "universal" (dense
in the class of continuous functions on each compact set), this provides an
on-line non-stochastic analogue of universally consistent prediction in
non-parametric statistics. We use two proof techniques: one is based on the
Aggregating Algorithm and the other on the recently developed method of
defensive forecasting.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 2005 17:13:50 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2006 23:27:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
]
|
cs/0511061 | Stephan Merz | Moritz Hammer (IFI-LMU), Alexander Knapp (IFI-LMU), Stephan Merz
(INRIA Lorraine - LORIA) | Truly On-The-Fly LTL Model Checking | null | Dans Tools and Algorithms for the Construction and Analysis of
Systems (TACAS 2005) | null | null | cs.LO | null | We propose a novel algorithm for automata-based LTL model checking that
interleaves the construction of the generalized B\"{u}chi automaton for the
negation of the formula and the emptiness check. Our algorithm first converts
the LTL formula into a linear weak alternating automaton; configurations of the
alternating automaton correspond to the locations of a generalized B\"{u}chi
automaton, and a variant of Tarjan's algorithm is used to decide the existence
of an accepting run of the product of the transition system and the automaton.
Because we avoid an explicit construction of the B\"{u}chi automaton, our
approach can yield significant improvements in runtime and memory, for large
LTL formulas. The algorithm has been implemented within the SPIN model checker,
and we present experimental results for some benchmark examples.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 12:56:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hammer",
"Moritz",
"",
"IFI-LMU"
],
[
"Knapp",
"Alexander",
"",
"IFI-LMU"
],
[
"Merz",
"Stephan",
"",
"INRIA Lorraine - LORIA"
]
]
|
cs/0511062 | Liping Lu | Gerd Bumiller, Liping Lu (INRIA Lorraine - LORIA), Yeqiong Song (INRIA
Lorraine - LORIA) | Analytic performance comparison of routing protocols in master-slave PLC
networks | null | null | null | null | cs.NI | null | In the wide area master-slave PLC (powerline communication) system, the
source node cannot reach the destination node without packet relay. Due to the
time-variable attenuation in the powerline, the communication distance cannot
be defined. Two kind of dynamic repeater algorithms are developed, dynamic
source routing and flooding based routing. In this paper, we use analytic
approach to compare the performance of those two routing protocols. We give
formulas to calculate the average duration of a polling cycle for each
protocols. Then we present simulation results to bolster the results of our
analysis. We use three metrics, which are bandwidth consumed for routing
signaling, normalized routing load and average duration of a polling cycle to
evaluate those routing protocols.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 16:24:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bumiller",
"Gerd",
"",
"INRIA Lorraine - LORIA"
],
[
"Lu",
"Liping",
"",
"INRIA Lorraine - LORIA"
],
[
"Song",
"Yeqiong",
"",
"INRIA\n Lorraine - LORIA"
]
]
|
cs/0511063 | Michele Finelli | Michele Finelli | Pathwords: a user-friendly schema for common passwords management | null | null | null | null | cs.CR | null | Many computer-based authentication schemata are based on pass- words. Logging
on a computer, reading email, accessing content on a web server are all
examples of applications where the identification of the user is usually
accomplished matching the data provided by the user with data known by the
application.
Such a widespread approach relies on some assumptions, whose satisfaction is
of foremost importance to guarantee the robustness of the solution. Some of
these assumptions, like having a "secure" chan- nel to transmit data, or having
sound algorithms to check the correct- ness of the data, are not addressed by
this paper. We will focus on two simple issues: the problem of using adequate
passwords and the problem of managing passwords.
The proposed solution, the pathword, is a method that guarantees:
1 that the passwords generated with the help of a pathword are adequate (i.e.
that they are not easy to guess),
2 that managing pathwords is more user friendly than managing passwords and
that pathwords are less amenable to problems typical of passwords.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 17:46:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Finelli",
"Michele",
""
]
]
|
cs/0511064 | Alexander Evako | Alexander V. Evako | The consistency principle for a digitization procedure. An algorithm for
building normal digital spaces of continuous n-dimensional objects | 13 pages, 11 figures | null | null | null | cs.CV cs.DM | null | This paper considers conditions, which allow to preserve important
topological and geometric properties in the process of digitization. For this
purpose, we introduce a triplet {C,M,D} consisting of a continuous object C, an
intermediate model M, which is a collection of subregions whose union is C, a
digital model D, which is the intersection graph of M, and apply the
consistency principle and criteria of similarity to M in order to make its
mathematical structure consistent with the natural structure of D.
Specifically, this paper introduces a locally centered lump collection of
subregions and shows that for any locally centered lump cover of an
n-dimensional continuous manifold, the digital model of the manifold is a
digital normal n-dimensional space. In addition, we give examples of locally
centered lump tilings of two-manifolds. We propose an algorithm for
constructing normal digital models of continuous objects.
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2005 20:33:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Evako",
"Alexander V.",
""
]
]
|
cs/0511067 | Vedran Kordic | Dongqing He and Peisun Ma | Effects of Initial Stance of Quadruped Trotting on Walking Stability | null | null | null | null | cs.RO | null | It is very important for quadruped walking machine to keep its stability in
high speed walking. It has been indicated that moment around the supporting
diagonal line of quadruped in trotting gait largely influences walking
stability. In this paper, moment around the supporting diagonal line of
quadruped in trotting gait is modeled and its effects on body attitude are
analyzed. The degree of influence varies with different initial stances of
quadruped and we get the optimal initial stance of quadruped in trotting gait
with maximal walking stability. Simulation results are presented. Keywords:
quadruped, trotting, attitude, walking stability.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 14:39:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"He",
"Dongqing",
""
],
[
"Ma",
"Peisun",
""
]
]
|
cs/0511068 | Vedran Kordic | S. Heinrich, H. Durr, T. Hanel and J. Lassig | An Agent-based Manufacturing Management System for Production and
Logistics within Cross-Company Regional and National Production Networks | null | null | null | null | cs.RO | null | The goal is the development of a simultaneous, dynamic, technological as well
as logistical real-time planning and an organizational control of the
production by the production units themselves, working in the production
network under the use of Multi-Agent-Technology. The design of the
multi-agent-based manufacturing management system, the models of the single
agents, algorithms for the agent-based, decentralized dispatching of orders,
strategies and data management concepts as well as their integration into the
SCM, basing on the solution described, will be explained in the following.
Keywords: production engineering and management, dynamic manufacturing
planning and control, multi-agentsystems (MAS), supply-chain-management (SCM),
e-manufacturing
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 14:41:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Heinrich",
"S.",
""
],
[
"Durr",
"H.",
""
],
[
"Hanel",
"T.",
""
],
[
"Lassig",
"J.",
""
]
]
|
cs/0511069 | Vedran Kordic | R. Hedjar and P. Boucher | Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators | null | null | null | null | cs.RO | null | The approximate nonlinear receding-horizon control law is used to treat the
trajectory tracking control problem of rigid link robot manipulators. The
derived nonlinear predictive law uses a quadratic performance index of the
predicted tracking error and the predicted control effort. A key feature of
this control law is that, for their implementation, there is no need to perform
an online optimization, and asymptotic tracking of smooth reference
trajectories is guaranteed. It is shown that this controller achieves the
positions tracking objectives via link position measurements. The stability
convergence of the output tracking error to the origin is proved. To enhance
the robustness of the closed loop system with respect to payload uncertainties
and viscous friction, an integral action is introduced in the loop. A nonlinear
observer is used to estimate velocity. Simulation results for a two-link rigid
robot are performed to validate the performance of the proposed controller.
Keywords: receding-horizon control, nonlinear observer, robot manipulators,
integral action, robustness.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 14:42:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hedjar",
"R.",
""
],
[
"Boucher",
"P.",
""
]
]
|
cs/0511071 | Francesco Capasso | Francesco Capasso | A polynomial-time heuristic for Circuit-SAT | 20 pages, 8 figures | null | null | null | cs.CC cs.DS | null | In this paper is presented an heuristic that, in polynomial time and space in
the input dimension, determines if a circuit describes a tautology or a
contradiction. If the circuit is neither a tautology nor a contradiction, then
the heuristic finds an assignment to the circuit inputs such that the circuit
is satisfied.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2005 20:23:46 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Nov 2005 21:56:11 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Nov 2005 22:19:18 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Nov 2005 19:52:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Capasso",
"Francesco",
""
]
]
|
cs/0511073 | Eric Mjolsness | Eric Mjolsness | Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview | Accepted for: Ninth International Symposium on Artificial
Intelligence and Mathematics, January 2006 | null | null | UCI ICS TR# 05-14 | cs.AI cs.LO nlin.AO | null | We define a class of probabilistic models in terms of an operator algebra of
stochastic processes, and a representation for this class in terms of
stochastic parameterized grammars. A syntactic specification of a grammar is
mapped to semantics given in terms of a ring of operators, so that grammatical
composition corresponds to operator addition or multiplication. The operators
are generators for the time-evolution of stochastic processes. Within this
modeling framework one can express data clustering models, logic programs,
ordinary and stochastic differential equations, graph grammars, and stochastic
chemical reaction kinetics. This mathematical formulation connects these
apparently distant fields to one another and to mathematical methods from
quantum field theory and operator algebra.
| [
{
"version": "v1",
"created": "Sun, 20 Nov 2005 00:42:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mjolsness",
"Eric",
""
]
]
|
cs/0511075 | Vasant Honavar | Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan,
Susan Carpenter, Vasant Honavar, Drena Dobbs | Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted
Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with
Experimental Data | Pacific Symposium on Biocomputing, Hawaii, In press, Accepted, 2006 | null | null | null | cs.LG cs.AI | null | Protein-protein and protein nucleic acid interactions are vitally important
for a wide range of biological processes, including regulation of gene
expression, protein synthesis, and replication and assembly of many viruses. We
have developed machine learning approaches for predicting which amino acids of
a protein participate in its interactions with other proteins and/or nucleic
acids, using only the protein sequence as input. In this paper, we describe an
application of classifiers trained on datasets of well-characterized
protein-protein and protein-RNA complexes for which experimental structures are
available. We apply these classifiers to the problem of predicting protein and
RNA binding sites in the sequence of a clinically important protein for which
the structure is not known: the regulatory protein Rev, essential for the
replication of HIV-1 and other lentiviruses. We compare our predictions with
published biochemical, genetic and partial structural information for HIV-1 and
EIAV Rev and with our own published experimental mapping of RNA binding sites
in EIAV Rev. The predicted and experimentally determined binding sites are in
very good agreement. The ability to predict reliably the residues of a protein
that directly contribute to specific binding events - without the requirement
for structural information regarding either the protein or complexes in which
it participates - can potentially generate new disease intervention strategies.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2005 01:47:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Terribilini",
"Michael",
""
],
[
"Lee",
"Jae-Hyung",
""
],
[
"Yan",
"Changhui",
""
],
[
"Jernigan",
"Robert L.",
""
],
[
"Carpenter",
"Susan",
""
],
[
"Honavar",
"Vasant",
""
],
[
"Dobbs",
"Drena",
""
]
]
|
cs/0511076 | Yves Laprie | Blaise Potard (INRIA Lorraine - LORIA), Yves Laprie (INRIA Lorraine -
LORIA) | Using phonetic constraints in acoustic-to-articulatory inversion | null | Proceedings of Interspeech, 9th European Conference on Speech
Communication and Technology (2005) 3217-3220 | null | null | cs.CL | null | The goal of this work is to recover articulatory information from the speech
signal by acoustic-to-articulatory inversion. One of the main difficulties with
inversion is that the problem is underdetermined and inversion methods
generally offer no guarantee on the phonetical realism of the inverse
solutions. A way to adress this issue is to use additional phonetic
constraints. Knowledge of the phonetic caracteristics of French vowels enable
the derivation of reasonable articulatory domains in the space of Maeda
parameters: given the formants frequencies (F1,F2,F3) of a speech sample, and
thus the vowel identity, an "ideal" articulatory domain can be derived. The
space of formants frequencies is partitioned into vowels, using either
speaker-specific data or generic information on formants. Then, to each
articulatory vector can be associated a phonetic score varying with the
distance to the "ideal domain" associated with the corresponding vowel.
Inversion experiments were conducted on isolated vowels and vowel-to-vowel
transitions. Articulatory parameters were compared with those obtained without
using these constraints and those measured from X-ray data.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2005 14:50:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Potard",
"Blaise",
"",
"INRIA Lorraine - LORIA"
],
[
"Laprie",
"Yves",
"",
"INRIA Lorraine -\n LORIA"
]
]
|
cs/0511079 | Anne Bonneau | Jean-Baptiste Maj (LORIA), Anne Bonneau (LORIA), Dominique Fohr
(LORIA), Yves Laprie (LORIA) | An elitist approach for extracting automatically well-realized speech
sounds with high confidence | null | null | null | null | cs.CL | null | This paper presents an "elitist approach" for extracting automatically
well-realized speech sounds with high confidence. The elitist approach uses a
speech recognition system based on Hidden Markov Models (HMM). The HMM are
trained on speech sounds which are systematically well-detected in an iterative
procedure. The results show that, by using the HMM models defined in the
training phase, the speech recognizer detects reliably specific speech sounds
with a small rate of errors.
| [
{
"version": "v1",
"created": "Tue, 22 Nov 2005 07:06:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Maj",
"Jean-Baptiste",
"",
"LORIA"
],
[
"Bonneau",
"Anne",
"",
"LORIA"
],
[
"Fohr",
"Dominique",
"",
"LORIA"
],
[
"Laprie",
"Yves",
"",
"LORIA"
]
]
|
cs/0511080 | Valmir Barbosa | Alexandre O. Stauffer, Valmir C. Barbosa | A dissemination strategy for immunizing scale-free networks | null | Physical Review E 74 (2006), 056105 | 10.1103/PhysRevE.74.056105 | null | cs.NI | null | We consider the problem of distributing a vaccine for immunizing a scale-free
network against a given virus or worm. We introduce a new method, based on
vaccine dissemination, that seems to reflect more accurately what is expected
to occur in real-world networks. Also, since the dissemination is performed
using only local information, the method can be easily employed in practice.
Using a random-graph framework, we analyze our method both mathematically and
by means of simulations. We demonstrate its efficacy regarding the trade-off
between the expected number of nodes that receive the vaccine and the network's
resulting vulnerability to develop an epidemic as the virus or worm attempts to
infect one of its nodes. For some scenarios, the new method is seen to render
the network practically invulnerable to attacks while requiring only a small
fraction of the nodes to receive the vaccine.
| [
{
"version": "v1",
"created": "Tue, 22 Nov 2005 10:59:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stauffer",
"Alexandre O.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
]
|
cs/0511083 | Olivier Powell | Olivier Powell, Aubin Jarry, Pierre Leone, Jose Rolim | Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy | 4 pages, 2 figures | null | null | null | cs.DC | null | We show how recent theoretical advances for data-propagation in Wireless
Sensor Networks (WSNs) can be combined to improve gradient-based routing (GBR)
in Wireless Sensor Networks. We propose a mixed-strategy of direct transmission
and multi-hop propagation of data which improves the lifespan of WSNs by
reaching better energy-load-balancing amongst sensor nodes.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2005 18:13:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Powell",
"Olivier",
""
],
[
"Jarry",
"Aubin",
""
],
[
"Leone",
"Pierre",
""
],
[
"Rolim",
"Jose",
""
]
]
|
cs/0511085 | Ron Cohen | R. A. Cohen | Proving that P is not equal to NP and that P is not equal to the
intersection of NP and co-NP | 9 pages ; 3 figures | null | null | null | cs.CC | null | The open question, P=NP?, was presented by Cook (1971). In this paper, a
proof that P is not equal to NP is presented. In addition, it is shown that P
is not equal to the intersection of NP and co-NP. Finally, the exact inclusion
relationships between the classes P, NP and co-NP are presented.
| [
{
"version": "v1",
"created": "Fri, 25 Nov 2005 15:23:18 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2005 14:58:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cohen",
"R. A.",
""
]
]
|
cs/0511088 | Barak Pearlmutter | Barak A. Pearlmutter | Bounds on Query Convergence | 6 pages, 2 figures | null | null | null | cs.LG | null | The problem of finding an optimum using noisy evaluations of a smooth cost
function arises in many contexts, including economics, business, medicine,
experiment design, and foraging theory. We derive an asymptotic bound E[ (x_t -
x*)^2 ] >= O(1/sqrt(t)) on the rate of convergence of a sequence (x_0, x_1,
>...) generated by an unbiased feedback process observing noisy evaluations of
an unknown quadratic function maximised at x*. The bound is tight, as the proof
leads to a simple algorithm which meets it. We further establish a bound on the
total regret, E[ sum_{i=1..t} (x_i - x*)^2 ] >= O(sqrt(t)) These bounds may
impose practical limitations on an agent's performance, as O(eps^-4) queries
are made before the queries converge to x* with eps accuracy.
| [
{
"version": "v1",
"created": "Fri, 25 Nov 2005 15:57:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pearlmutter",
"Barak A.",
""
]
]
|
cs/0511090 | Petra Hofstedt | Petra Hofstedt, Peter Pepper | Integration of Declarative and Constraint Programming | 30 pages, 9 figures, To appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.PL cs.AI | null | Combining a set of existing constraint solvers into an integrated system of
cooperating solvers is a useful and economic principle to solve hybrid
constraint problems. In this paper we show that this approach can also be used
to integrate different language paradigms into a unified framework.
Furthermore, we study the syntactic, semantic and operational impacts of this
idea for the amalgamation of declarative and constraint programming.
| [
{
"version": "v1",
"created": "Sun, 27 Nov 2005 14:58:22 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Jan 2006 15:48:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hofstedt",
"Petra",
""
],
[
"Pepper",
"Peter",
""
]
]
|
cs/0511091 | Marc Schoenauer | Carlos Kavka (INRIA Futurs, UNSL-DI), Patricia Roggero (UNSL-DI), Marc
Schoenauer (INRIA Futurs) | Evolution of Voronoi based Fuzzy Recurrent Controllers | null | Dans GECCO 2005 | null | null | cs.AI | null | A fuzzy controller is usually designed by formulating the knowledge of a
human expert into a set of linguistic variables and fuzzy rules. Among the most
successful methods to automate the fuzzy controllers development process are
evolutionary algorithms. In this work, we propose the Recurrent Fuzzy Voronoi
(RFV) model, a representation for recurrent fuzzy systems. It is an extension
of the FV model proposed by Kavka and Schoenauer that extends the application
domain to include temporal problems. The FV model is a representation for fuzzy
controllers based on Voronoi diagrams that can represent fuzzy systems with
synergistic rules, fulfilling the $\epsilon$-completeness property and
providing a simple way to introduce a priory knowledge. In the proposed
representation, the temporal relations are embedded by including internal units
that provide feedback by connecting outputs to inputs. These internal units act
as memory elements. In the RFV model, the semantic of the internal units can be
specified together with the a priori rules. The geometric interpretation of the
rules allows the use of geometric variational operators during the evolution.
The representation and the algorithms are validated in two problems in the area
of system identification and evolutionary robotics.
| [
{
"version": "v1",
"created": "Mon, 28 Nov 2005 07:14:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kavka",
"Carlos",
"",
"INRIA Futurs, UNSL-DI"
],
[
"Roggero",
"Patricia",
"",
"UNSL-DI"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
]
|
cs/0511099 | Na Li | Na Li and Wen-feng Qi | Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number
of Variables | null | null | null | null | cs.CR | null | To resist algebraic attack, a Boolean function should possess good algebraic
immunity (AI). Several papers constructed symmetric functions with the maximum
algebraic immunity $\lceil \frac{n}{2}\rceil $. In this correspondence we prove
that for each odd $n$, there is exactly one trivial balanced $n$-variable
symmetric Boolean function achieving the algebraic immunity $\lceil
\frac{n}{2}\rceil $. And we also obtain a necessary condition for the algebraic
normal form of a symmetric Boolean function with maximum algebraic immunity.
| [
{
"version": "v1",
"created": "Tue, 29 Nov 2005 11:42:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Na",
""
],
[
"Qi",
"Wen-feng",
""
]
]
|
cs/0511105 | Todd Young | Erik M. Boczko, Todd R. Young | The Signed Distance Function: A New Tool for Binary Classification | 13 pages, 5 figures | null | null | null | cs.LG cs.CG | null | From a geometric perspective most nonlinear binary classification algorithms,
including state of the art versions of Support Vector Machine (SVM) and Radial
Basis Function Network (RBFN) classifiers, and are based on the idea of
reconstructing indicator functions. We propose instead to use reconstruction of
the signed distance function (SDF) as a basis for binary classification. We
discuss properties of the signed distance function that can be exploited in
classification algorithms. We develop simple versions of such classifiers and
test them on several linear and nonlinear problems. On linear tests accuracy of
the new algorithm exceeds that of standard SVM methods, with an average of 50%
fewer misclassifications. Performance of the new methods also matches or
exceeds that of standard methods on several nonlinear problems including
classification of benchmark diagnostic micro-array data sets.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 14:15:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Boczko",
"Erik M.",
""
],
[
"Young",
"Todd R.",
""
]
]
|
cs/0511106 | Sergiu Chelcea | Sergiu Theodor Chelcea (INRIA Rocquencourt / INRIA Sophia Antipolis),
Alzennyr Da Silva (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves
Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Doru Tanasa
(INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA
Rocquencourt / INRIA Sophia Antipolis) | Benefits of InterSite Pre-Processing and Clustering Methods in
E-Commerce Domain | null | Dans Proceedings of the ECML/PKDD2005 Discovery Challenge, A
Collaborative Effort in Knowledge Discovery from Databases | null | null | cs.DB | null | This paper presents our preprocessing and clustering analysis on the
clickstream dataset proposed for the ECMLPKDD 2005 Discovery Challenge. The
main contributions of this article are double. First, after presenting the
clickstream dataset, we show how we build a rich data warehouse based an
advanced preprocesing. We take into account the intersite aspects in the given
ecommerce domain, which offers an interesting data structuration. A preliminary
statistical analysis based on time period clickstreams is given, emphasing the
importance of intersite user visits in such a context. Secondly, we describe
our crossed-clustering method which is applied on data generated from our data
warehouse. Our preliminary results are interesting and promising illustrating
the benefits of our WUM methods, even if more investigations are needed on the
same dataset.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 16:12:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chelcea",
"Sergiu Theodor",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Da Silva",
"Alzennyr",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Tanasa",
"Doru",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Trousse",
"Brigitte",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
]
]
|
cs/0511107 | J. G. Esteve | J. G. Esteve and F. Falceto | Phase transition in the assignment problem for random matrices | 7 pages, 5 figures; accepted for publication in Europhys. Lett.
http://www.edpsciences.org/journal/index.cfm?edpsname=epl | null | 10.1209/epl/i2005-10296-6 | null | cs.CC cond-mat.stat-mech | null | We report an analytic and numerical study of a phase transition in a P
problem (the assignment problem) that separates two phases whose
representatives are the simple matching problem (an easy P problem) and the
traveling salesman problem (a NP-complete problem). Like other phase
transitions found in combinatoric problems (K-satisfiability, number
partitioning) this can help to understand the nature of the difficulties in
solving NP problems an to find more accurate algorithms for them.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 18:03:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Esteve",
"J. G.",
""
],
[
"Falceto",
"F.",
""
]
]
|
cs/0511108 | Abdelhadi Benabdallah | A. Benabdallah and G. Radons | Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs.
Modified Baum-Welch Algorithm | 15 pages, 3 figures, 2 tables | null | null | null | cs.DS cs.LG | null | We propose a new method for the estimation of parameters of hidden diffusion
processes. Based on parametrization of the transition matrix, the Baum-Welch
algorithm is improved. The algorithm is compared to the particle filter in
application to the noisy periodic systems. It is shown that the modified
Baum-Welch algorithm is capable of estimating the system parameters with better
accuracy than particle filters.
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 20:23:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Benabdallah",
"A.",
""
],
[
"Radons",
"G.",
""
]
]
|
cs/0512001 | Frank Ruskey | Jeremy Carroll (1), Frank Ruskey (2), Mark Weston (2) ((1) HP
Laboratories, Bristol, UK, (2) University of Victoria, Canada) | Which n-Venn diagrams can be drawn with convex k-gons? | 10 pages, 3 figures. To be published in Proceedings of the Second
International Workshop on Euler Diagrams (Euler 2005), Electronic Notes in
Theoretical Computer Science | null | null | null | cs.CG | null | We establish a new lower bound for the number of sides required for the
component curves of simple Venn diagrams made from polygons. Specifically, for
any n-Venn diagram of convex k-gons, we prove that k >= (2^n - 2 - n) / (n
(n-2)). In the process we prove that Venn diagrams of seven curves, simple or
not, cannot be formed from triangles. We then give an example achieving the new
lower bound of a (simple, symmetric) Venn diagram of seven quadrilaterals.
Previously Grunbaum had constructed a 7-Venn diagram of non-convex 5-gons
[``Venn Diagrams II'', Geombinatorics 2:25-31, 1992].
| [
{
"version": "v1",
"created": "Wed, 30 Nov 2005 23:30:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carroll",
"Jeremy",
""
],
[
"Ruskey",
"Frank",
""
],
[
"Weston",
"Mark",
""
]
]
|
cs/0512002 | Vitorino Ramos Dr. | Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa | On Self-Regulated Swarms, Societal Memory, Speed and Dynamics | 11 pages, 8 figures,
http://alfa.ist.utl.pt/~cvrm/staff/vramos/refs_2005.html, KEYWORDS: Dynamic
Optimization, Dynamic Optimal Control problems, Swarm Intelligence,
Self-Organization, Societal Implicit Memory. Submitted to ALIFE-X, Int. Conf.
on the Simulation and Synthesis of Living Systems, Bloomington, Indiana, USA,
June 3-7, 2006 | null | null | null | cs.NE cs.AI | null | We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the
advantageous characteristics of Swarm Intelligence as the emergence of a
societal environmental memory or cognitive map via collective pheromone laying
in the landscape (properly balancing the exploration/exploitation nature of our
dynamic search strategy), with a simple Evolutionary mechanism that trough a
direct reproduction procedure linked to local environmental features is able to
self-regulate the above exploratory swarm population, speeding it up globally.
In order to test his adaptive response and robustness, we have recurred to
different dynamic multimodal complex functions as well as to Dynamic
Optimization Control problems, measuring reaction speeds and performance. Final
comparisons were made with standard Genetic Algorithms (GAs), Bacterial
Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches.
SRS's were able to demonstrate quick adaptive responses, while outperforming
the results obtained by the other approaches. Additionally, some successful
behaviors were found. One of the most interesting illustrate that the present
SRS collective swarm of bio-inspired ant-like agents is able to track about 65%
of moving peaks traveling up to ten times faster than the velocity of a single
individual composing that precise swarm tracking system.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 03:10:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Fernandes",
"Carlos",
""
],
[
"Rosa",
"Agostinho C.",
""
]
]
|
cs/0512003 | Vitorino Ramos Dr. | Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa | Societal Implicit Memory and his Speed on Tracking Extrema over Dynamic
Environments using Self-Regulatory Swarms | 20 pages, 25 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos .
Draft submitted to Journal of Systems Architecture, Farooq M. and Menezes R.
(Eds.), Special issue on Nature Inspired Applied Systems, Elsevier, 2006 | null | null | null | cs.MA cs.AI | null | In order to overcome difficult dynamic optimization and environment extrema
tracking problems, We propose a Self-Regulated Swarm (SRS) algorithm which
hybridizes the advantageous characteristics of Swarm Intelligence as the
emergence of a societal environmental memory or cognitive map via collective
pheromone laying in the landscape (properly balancing the
exploration/exploitation nature of our dynamic search strategy), with a simple
Evolutionary mechanism that trough a direct reproduction procedure linked to
local environmental features is able to self-regulate the above exploratory
swarm population, speeding it up globally. In order to test his adaptive
response and robustness, we have recurred to different dynamic multimodal
complex functions as well as to Dynamic Optimization Control problems,
measuring reaction speeds and performance. Final comparisons were made with
standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as
well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate
quick adaptive responses, while outperforming the results obtained by the other
approaches. Additionally, some successful behaviors were found. One of the most
interesting illustrate that the present SRS collective swarm of bio-inspired
ant-like agents is able to track about 65% of moving peaks traveling up to ten
times faster than the velocity of a single individual composing that precise
swarm tracking system.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 04:09:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Fernandes",
"Carlos",
""
],
[
"Rosa",
"Agostinho C.",
""
]
]
|
cs/0512004 | Vitorino Ramos Dr. | Carlos Fernandes, Vitorino Ramos and Agostinho C. Rosa | Self-Regulated Artificial Ant Colonies on Digital Image Habitats | 8 pages, 17 figures, full pictures in
http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-WCLC05b.pdf | in International Journal of Lateral Computing, IJLC, vol. 2 (1),
pp. 1-8, ISSN 0973-208X, Dec. 2005 | null | null | cs.MA cs.AI | null | Artificial life models, swarm intelligent and evolutionary computation
algorithms are usually built on fixed size populations. Some studies indicate
however that varying the population size can increase the adaptability of these
systems and their capability to react to changing environments. In this paper
we present an extended model of an artificial ant colony system designed to
evolve on digital image habitats. We will show that the present swarm can adapt
the size of the population according to the type of image on which it is
evolving and reacting faster to changing images, thus converging more rapidly
to the new desired regions, regulating the number of his image foraging agents.
Finally, we will show evidences that the model can be associated with the
Mathematical Morphology Watershed algorithm to improve the segmentation of
digital grey-scale images. KEYWORDS: Swarm Intelligence, Perception and Image
Processing, Pattern Recognition, Mathematical Morphology, Social Cognitive
Maps, Social Foraging, Self-Organization, Distributed Search.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 04:39:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fernandes",
"Carlos",
""
],
[
"Ramos",
"Vitorino",
""
],
[
"Rosa",
"Agostinho C.",
""
]
]
|
cs/0512005 | Vitorino Ramos Dr. | Vitorino Ramos, Carlos Fernandes and Agostinho C. Rosa | On Ants, Bacteria and Dynamic Environments | 8 pages, 6 figures, full paper with pictures in
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_63.html, keywords: Swarm
Intelligence and Perception, Social Cognitive Maps, Social Foraging,
Self-Organization, Distributed Search and Optimization in Dynamic
Environments. In NCA-05, Natural Computing and Applications Workshop, IEEE
Computer Press, Timisoara, Romania, Sep. 25-29, 2005 | null | null | null | cs.DC | null | Wasps, bees, ants and termites all make effective use of their environment
and resources by displaying collective swarm intelligence. Termite colonies -
for instance - build nests with a complexity far beyond the comprehension of
the individual termite, while ant colonies dynamically allocate labor to
various vital tasks such as foraging or defense without any central
decision-making ability. Recent research suggests that microbial life can be
even richer: highly social, intricately networked, and teeming with
interactions, as found in bacteria. What strikes from these observations is
that both ant colonies and bacteria have similar natural mechanisms based on
Stigmergy and Self-Organization in order to emerge coherent and sophisticated
patterns of global behaviour. Keeping in mind the above characteristics we will
present a simple model to tackle the collective adaptation of a social swarm
based on real ant colony behaviors (SSA algorithm) for tracking extrema in
dynamic environments and highly multimodal complex functions described in the
well-know De Jong test suite. Then, for the purpose of comparison, a recent
model of artificial bacterial foraging (BFOA algorithm) based on similar
stigmergic features is described and analyzed. Final results indicate that the
SSA collective intelligence is able to cope and quickly adapt to unforeseen
situations even when over the same cooperative foraging period, the community
is requested to deal with two different and contradictory purposes, while
outperforming BFOA in adaptive speed.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 04:52:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Fernandes",
"Carlos",
""
],
[
"Rosa",
"Agostinho C.",
""
]
]
|
cs/0512007 | Arindam Mitra | Arindam Mitra | Entangled messages | PDF, 2 Pages | null | null | null | cs.CR cs.IR | null | It is sometimes necessary to send copies of the same email to different
parties, but it is impossible to ensure that if one party reads the message the
other parties will bound to read it. We propose an entanglement based scheme
where if one party reads the message the other party will bound to read it
simultaneously.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 15:40:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
]
|
cs/0512008 | Joel Friedman | Joel Friedman | Cohomology in Grothendieck Topologies and Lower Bounds in Boolean
Complexity | 70 pages, abstract corrected and modified | null | null | null | cs.CC math.AG | null | This paper is motivated by questions such as P vs. NP and other questions in
Boolean complexity theory. We describe an approach to attacking such questions
with cohomology, and we show that using Grothendieck topologies and other ideas
from the Grothendieck school gives new hope for such an attack.
We focus on circuit depth complexity, and consider only finite topological
spaces or Grothendieck topologies based on finite categories; as such, we do
not use algebraic geometry or manifolds.
Given two sheaves on a Grothendieck topology, their "cohomological
complexity" is the sum of the dimensions of their Ext groups. We seek to model
the depth complexity of Boolean functions by the cohomological complexity of
sheaves on a Grothendieck topology. We propose that the logical AND of two
Boolean functions will have its corresponding cohomological complexity bounded
in terms of those of the two functions using ``virtual zero extensions.'' We
propose that the logical negation of a function will have its corresponding
cohomological complexity equal to that of the original function using duality
theory. We explain these approaches and show that they are stable under
pullbacks and base change. It is the subject of ongoing work to achieve AND and
negation bounds simultaneously in a way that yields an interesting depth lower
bound.
| [
{
"version": "v1",
"created": "Thu, 1 Dec 2005 22:40:27 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Dec 2005 21:25:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
]
]
|
cs/0512010 | Timothy Porter | Jonathan Gratus and Timothy Porter | A geometry of information, I: Nerves, posets and differential forms | 28 pages. A version of this paper appears also on the Dagstuhl
seminar portal http://drops.dagstuhl.de/portals/04351/ | null | null | null | cs.AI cs.GR | null | The main theme of this workshop (Dagstuhl seminar 04351) is `Spatial
Representation: Continuous vs. Discrete'. Spatial representation has two
contrasting but interacting aspects (i) representation of spaces' and (ii)
representation by spaces. In this paper, we will examine two aspects that are
common to both interpretations of the theme, namely nerve constructions and
refinement. Representations change, data changes, spaces change. We will
examine the possibility of a `differential geometry' of spatial representations
of both types, and in the sequel give an algebra of differential forms that has
the potential to handle the dynamical aspect of such a geometry. We will
discuss briefly a conjectured class of spaces, generalising the Cantor set
which would seem ideal as a test-bed for the set of tools we are developing.
| [
{
"version": "v1",
"created": "Fri, 2 Dec 2005 16:18:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gratus",
"Jonathan",
""
],
[
"Porter",
"Timothy",
""
]
]
|
cs/0512011 | Shi Zhou Dr. | Shi Zhou | Understanding the internet topology evolution dynamics | 15 figures | Physical Review E, vol. 70, no. 016124, July 2006. | 10.1103/PhysRevE.74.016124 | null | cs.NI | null | The internet structure is extremely complex. The Positive-Feedback Preference
(PFP) model is a recently introduced internet topology generator. The model
uses two generic algorithms to replicate the evolution dynamics observed on the
internet historic data. The phenomenological model was originally designed to
match only two topology properties of the internet, i.e. the rich-club
connectivity and the exact form of degree distribution. Whereas numerical
evaluation has shown that the PFP model accurately reproduces a large set of
other nontrivial characteristics as well. This paper aims to investigate why
and how this generative model captures so many diverse properties of the
internet. Based on comprehensive simulation results, the paper presents a
detailed analysis on the exact origin of each of the topology properties
produced by the model. This work reveals how network evolution mechanisms
control the obtained topology properties and it also provides insights on
correlations between various structural characteristics of complex networks.
| [
{
"version": "v1",
"created": "Fri, 2 Dec 2005 18:24:10 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2006 11:45:01 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jul 2006 08:37:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Shi",
""
]
]
|
cs/0512016 | Mikl\'os Cs\H{u}r\"os | Mikl\'os Cs\H{u}r\"os | A linear-time algorithm for finding the longest segment which scores
above a given threshold | null | null | null | null | cs.DS cs.CE | null | This paper describes a linear-time algorithm that finds the longest stretch
in a sequence of real numbers (``scores'') in which the sum exceeds an input
parameter. The algorithm also solves the problem of finding the longest
interval in which the average of the scores is above a fixed threshold. The
problem originates from molecular sequence analysis: for instance, the
algorithm can be employed to identify long GC-rich regions in DNA sequences.
The algorithm can also be used to trim low-quality ends of shotgun sequences in
a preprocessing step of whole-genome assembly.
| [
{
"version": "v1",
"created": "Sun, 4 Dec 2005 04:28:00 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Mar 2006 02:40:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Csűrös",
"Miklós",
""
]
]
|
cs/0512019 | Marek W. Gutowski | Marek W. Gutowski | Amazing geometry of genetic space or are genetic algorithms convergent? | 7 pages, presented on VII KAEiOG (VII Domestic Conference on
Evolutionary Algorithms and Global Optimization), May 24-26, 2004, Kazimierz
Dolny, Poland | null | null | null | cs.NE cs.DM cs.SE | null | There is no proof yet of convergence of Genetic Algorithms. We do not supply
it too. Instead, we present some thoughts and arguments to convince the Reader,
that Genetic Algorithms are essentially bound for success. For this purpose, we
consider only the crossover operators, single- or multiple-point, together with
selection procedure. We also give a proof that the soft selection is superior
to other selection schemes.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2005 11:12:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gutowski",
"Marek W.",
""
]
]
|
cs/0512021 | Ted Herman | Brahim Hamid (1), Ted Herman (2), Morten Mjelde (3) ((1) LaBRI
University of Bordeaux-1 France, (2) University of Iowa, (3) University in
Bergen Norway) | The Poster Session of SSS 2005 | 3 pages, related to Springer LNCS 3764, Proceedings of Symposium on
Self-Stabilizing Systems | null | null | TR-05-13 | cs.DC cs.DS | null | This technical report documents the poster session of SSS 2005, the Symposium
on Self-Stabilizing Systems published by Springer as LNCS volume 3764. The
poster session included five presentations. Two of these presentations are
summarized in brief abstracts contained in this technical report.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2005 22:51:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hamid",
"Brahim",
""
],
[
"Herman",
"Ted",
""
],
[
"Mjelde",
"Morten",
""
]
]
|
cs/0512026 | Ingo Josopait | I. Josopait | Checking C++ Programs for Dimensional Consistency | submitted to "Computing in Science and Engineering" | null | null | null | cs.PL | null | I will present my implementation 'n-units' of physical units into C++
programs. It allows the compiler to check for dimensional consistency.
| [
{
"version": "v1",
"created": "Wed, 7 Dec 2005 15:51:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Josopait",
"I.",
""
]
]
|
cs/0512031 | Slawomir Lasota | Slawomir Lasota and Igor Walukiewicz | Alternating Timed Automata | the full version of the Fossacs'05 conference preliminary paper
revised according ot the referee's comments | null | null | null | cs.LO | null | A notion of alternating timed automata is proposed. It is shown that such
automata with only one clock have decidable emptiness problem over finite
words. This gives a new class of timed languages which is closed under boolean
operations and which has an effective presentation. We prove that the
complexity of the emptiness problem for alternating timed automata with one
clock is non-primitive recursive. The proof gives also the same lower bound for
the universality problem for nondeterministic timed automata with one clock. We
investigate extension of the model with epsilon-transitions and prove that
emptiness is undecidable. Over infinite words, we show undecidability of the
universality problem.
| [
{
"version": "v1",
"created": "Thu, 8 Dec 2005 08:50:35 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Aug 2006 14:56:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lasota",
"Slawomir",
""
],
[
"Walukiewicz",
"Igor",
""
]
]
|
cs/0512033 | Bernardo Huberman | Bernardo A. Huberman and Fang Wu | Bootstrapping the Long Tail in Peer to Peer Systems | null | null | null | null | cs.NI cs.CY physics.soc-ph | null | We describe an efficient incentive mechanism for P2P systems that generates a
wide diversity of content offerings while responding adaptively to customer
demand. Files are served and paid for through a parimutuel market similar to
that commonly used for betting in horse races. An analysis of the performance
of such a system shows that there exists an equilibrium with a long tail in the
distribution of content offerings, which guarantees the real time provision of
any content regardless of its popularity.
| [
{
"version": "v1",
"created": "Thu, 8 Dec 2005 18:02:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Wu",
"Fang",
""
]
]
|
cs/0512034 | Bernardo Huberman | Bernardo A. Huberman, Fang Wu and Li Zhang | Ensuring Trust in One Time Exchanges: Solving the QoS Problem | null | null | null | null | cs.GT physics.soc-ph | null | We describe a pricing structure for the provision of IT services that ensures
trust without requiring repeated interactions between service providers and
users. It does so by offering a pricing structure that elicits truthful
reporting of quality of service (QoS) by providers while making them
profitable. This mechanism also induces truth-telling on the part of users
reserving the service.
| [
{
"version": "v1",
"created": "Thu, 8 Dec 2005 19:44:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Wu",
"Fang",
""
],
[
"Zhang",
"Li",
""
]
]
|
cs/0512035 | Michael N. Vyalyi | Sergey P. Tarasov, Mikhail N. Vyalyi | Semidefinite programming and arithmetic circuit evaluation | Submitted to Special issue of DAM in memory of L.Khachiyan | null | null | null | cs.CC | null | A rational number can be naturally presented by an arithmetic computation
(AC): a sequence of elementary arithmetic operations starting from a fixed
constant, say 1. The asymptotic complexity issues of such a representation are
studied e.g. in the framework of the algebraic complexity theory over arbitrary
field.
Here we study a related problem of the complexity of performing arithmetic
operations and computing elementary predicates, e.g. ``='' or ``>'', on
rational numbers given by AC.
In the first place, we prove that AC can be efficiently simulated by the
exact semidefinite programming (SDP).
Secondly, we give a BPP-algorithm for the equality predicate.
Thirdly, we put ``>''-predicate into the complexity class PSPACE.
We conjecture that ``>''-predicate is hard to compute. This conjecture, if
true, would clarify the complexity status of the exact SDP - a well known open
problem in the field of mathematical programming.
| [
{
"version": "v1",
"created": "Fri, 9 Dec 2005 16:01:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tarasov",
"Sergey P.",
""
],
[
"Vyalyi",
"Mikhail N.",
""
]
]
|
cs/0512039 | Jianqin Zhou | Jianqin Zhou, Xirong Xu | An algorithm for the k-error linear complexity of a sequence with period
2pn over GF(q) | 6 pages | null | null | null | cs.CR | null | The union cost is used, so that an efficient algorithm for computing the
k-error linear complexity of a sequence with period 2pn over GF(q) is
presented, where p and q are odd primes, and q is a primitive root of modulo
p2.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 00:21:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Jianqin",
""
],
[
"Xu",
"Xirong",
""
]
]
|
cs/0512040 | Jianqin Zhou | Jianqin Zhou | A fast algorithm for determining the linear complexity of periodic
sequences | 7 pages | null | null | null | cs.CR | null | A fast algorithm is presented for determining the linear complexity and the
minimal polynomial of periodic sequences over GF(q) with period q n p m, where
p is a prime, q is a prime and a primitive root modulo p2. The algorithm
presented here generalizes both the algorithm in [4] where the period of a
sequence over GF(q) is p m and the algorithm in [5] where the period of a
binary sequence is 2 n p m . When m=0, the algorithm simplifies the generalized
Games-Chan algorithm.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 00:38:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Jianqin",
""
]
]
|
cs/0512041 | Jianqin Zhou | Jianqin Zhou | Generalized partially bent functions | 7 pages | null | null | null | cs.CR | null | Based on the definition of generalized partially bent functions, using the
theory of linear transformation, the relationship among generalized partially
bent functions over ring Z N, generalized bent functions over ring Z N and
affine functions is discussed. When N is a prime number, it is proved that a
generalized partially bent function can be decomposed as the addition of a
generalized bent function and an affine function. The result obtained here
generalizes the main works concerning partially bent functions by Claud Carlet
in [1].
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 00:43:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhou",
"Jianqin",
""
]
]
|
cs/0512042 | Xiaoyang Gu | Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo | Points on Computable Curves | 10 pages, 12 pages appendix | null | null | null | cs.CC cs.CG | null | The ``analyst's traveling salesman theorem'' of geometric measure theory
characterizes those subsets of Euclidean space that are contained in curves of
finite length. This result, proven for the plane by Jones (1990) and extended
to higher-dimensional Euclidean spaces by Okikiolu (1991), says that a bounded
set $K$ is contained in some curve of finite length if and only if a certain
``square beta sum'', involving the ``width of $K$'' in each element of an
infinite system of overlapping ``tiles'' of descending size, is finite.
In this paper we characterize those {\it points} of Euclidean space that lie
on {\it computable} curves of finite length by formulating and proving a
computable extension of the analyst's traveling salesman theorem. Our extension
says that a point in Euclidean space lies on some computable curve of finite
length if and only if it is ``permitted'' by some computable ``Jones
constriction''. A Jones constriction here is an explicit assignment of a
rational cylinder to each of the above-mentioned tiles in such a way that, when
the radius of the cylinder corresponding to a tile is used in place of the
``width of $K$'' in each tile, the square beta sum is finite. A point is
permitted by a Jones constriction if it is contained in the cylinder assigned
to each tile containing the point. The main part of our proof is the
construction of a computable curve of finite length traversing all the points
permitted by a given Jones constriction. Our construction uses the main ideas
of Jones's ``farthest insertion'' construction, but our algorithm for computing
the curve must work exclusively with the Jones constriction itself, because it
has no direct access to the (typically uncomputable) points permitted by the
Jones constriction.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 03:08:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Mayordomo",
"Elvira",
""
]
]
|
cs/0512043 | Dirk Wagner | Dirk Wagner, John Noga | Random Walks with Anti-Correlated Steps | 5 pages, 1 chart, 2 tables | null | null | null | cs.DM cs.PF | null | We conjecture the expected value of random walks with anti-correlated steps
to be exactly 1. We support this conjecture with 2 plausibility arguments and
experimental data. The experimental analysis includes the computation of the
expected values of random walks for steps up to 22. The result shows the
expected value asymptotically converging to 1.
| [
{
"version": "v1",
"created": "Sat, 10 Dec 2005 08:04:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wagner",
"Dirk",
""
],
[
"Noga",
"John",
""
]
]
|
cs/0512045 | Xuan-Ha Vu | Xuan-Ha Vu, Marius-Calin Silaghi, Djamila Sam-Haroud and Boi Faltings | Branch-and-Prune Search Strategies for Numerical Constraint Solving | 43 pages, 11 figures | null | null | LIA-REPORT-2006-007 | cs.AI | null | When solving numerical constraints such as nonlinear equations and
inequalities, solvers often exploit pruning techniques, which remove redundant
value combinations from the domains of variables, at pruning steps. To find the
complete solution set, most of these solvers alternate the pruning steps with
branching steps, which split each problem into subproblems. This forms the
so-called branch-and-prune framework, well known among the approaches for
solving numerical constraints. The basic branch-and-prune search strategy that
uses domain bisections in place of the branching steps is called the bisection
search. In general, the bisection search works well in case (i) the solutions
are isolated, but it can be improved further in case (ii) there are continuums
of solutions (this often occurs when inequalities are involved). In this paper,
we propose a new branch-and-prune search strategy along with several variants,
which not only allow yielding better branching decisions in the latter case,
but also work as well as the bisection search does in the former case. These
new search algorithms enable us to employ various pruning techniques in the
construction of inner and outer approximations of the solution set. Our
experiments show that these algorithms speed up the solving process often by
one order of magnitude or more when solving problems with continuums of
solutions, while keeping the same performance as the bisection search when the
solutions are isolated.
| [
{
"version": "v1",
"created": "Sun, 11 Dec 2005 19:47:42 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 22:59:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vu",
"Xuan-Ha",
""
],
[
"Silaghi",
"Marius-Calin",
""
],
[
"Sam-Haroud",
"Djamila",
""
],
[
"Faltings",
"Boi",
""
]
]
|
cs/0512049 | Gq Zhang Ph.D. | Jeff Stuckman and Guo-Qiang Zhang | Mastermind is NP-Complete | null | null | null | null | cs.CC cs.DM | null | In this paper we show that the Mastermind Satisfiability Problem (MSP) is
NP-complete. The Mastermind is a popular game which can be turned into a
logical puzzle called Mastermind Satisfiability Problem in a similar spirit to
the Minesweeper puzzle. By proving that MSP is NP-complete, we reveal its
intrinsic computational property that makes it challenging and interesting.
This serves as an addition to our knowledge about a host of other puzzles, such
as Minesweeper, Mah-Jongg, and the 15-puzzle.
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 04:19:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Stuckman",
"Jeff",
""
],
[
"Zhang",
"Guo-Qiang",
""
]
]
|
cs/0512052 | Ion Mandoiu | Ion I. Mandoiu and Claudia Prajescu | High-Throughput SNP Genotyping by SBE/SBH | 19 pages | null | null | null | cs.DS q-bio.GN | null | Despite much progress over the past decade, current Single Nucleotide
Polymorphism (SNP) genotyping technologies still offer an insufficient degree
of multiplexing when required to handle user-selected sets of SNPs. In this
paper we propose a new genotyping assay architecture combining multiplexed
solution-phase single-base extension (SBE) reactions with sequencing by
hybridization (SBH) using universal DNA arrays such as all $k$-mer arrays. In
addition to PCR amplification of genomic DNA, SNP genotyping using SBE/SBH
assays involves the following steps: (1) Synthesizing primers complementing the
genomic sequence immediately preceding SNPs of interest; (2) Hybridizing these
primers with the genomic DNA; (3) Extending each primer by a single base using
polymerase enzyme and dideoxynucleotides labeled with 4 different fluorescent
dyes; and finally (4) Hybridizing extended primers to a universal DNA array and
determining the identity of the bases that extend each primer by hybridization
pattern analysis. Our contributions include a study of multiplexing algorithms
for SBE/SBH genotyping assays and preliminary experimental results showing the
achievable tradeoffs between the number of array probes and primer length on
one hand and the number of SNPs that can be assayed simultaneously on the
other. Simulation results on datasets both randomly generated and extracted
from the NCBI dbSNP database suggest that the SBE/SBH architecture provides a
flexible and cost-effective alternative to genotyping assays currently used in
the industry, enabling genotyping of up to hundreds of thousands of
user-specified SNPs per assay.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 18:01:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mandoiu",
"Ion I.",
""
],
[
"Prajescu",
"Claudia",
""
]
]
|
cs/0512053 | John Hitchcock | John M. Hitchcock | Online Learning and Resource-Bounded Dimension: Winnow Yields New Lower
Bounds for Hard Sets | null | null | null | null | cs.CC cs.LG | null | We establish a relationship between the online mistake-bound model of
learning and resource-bounded dimension. This connection is combined with the
Winnow algorithm to obtain new results about the density of hard sets under
adaptive reductions. This improves previous work of Fu (1995) and Lutz and Zhao
(2000), and solves one of Lutz and Mayordomo's "Twelve Problems in
Resource-Bounded Measure" (1999).
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 22:01:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hitchcock",
"John M.",
""
]
]
|
cs/0512054 | Vyacheslav Gorshkov Mr | Gennady P.Berman (Los Alamos National Laboratory, T-13), Vyacheslav
N.Gorshkov (Los Alamos National Laboratory, Center for Nonlinear Studies),
Xidi Wang (Citigroup, Sao Paulo, Brasil) | Irreducible Frequent Patterns in Transactional Databases | 30 pages, 18 figures | null | null | null | cs.DS cs.DB | null | Irreducible frequent patters (IFPs) are introduced for transactional
databases. An IFP is such a frequent pattern (FP),(x1,x2,...xn), the
probability of which, P(x1,x2,...xn), cannot be represented as a product of the
probabilities of two (or more) other FPs of the smaller lengths. We have
developed an algorithm for searching IFPs in transactional databases. We argue
that IFPs represent useful tools for characterizing the transactional databases
and may have important applications to bio-systems including the immune systems
and for improving vaccination strategies. The effectiveness of the IFPs
approach has been illustrated in application to a classification problem.
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 22:53:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Berman",
"Gennady P.",
"",
"Los Alamos National Laboratory, T-13"
],
[
"Gorshkov",
"Vyacheslav N.",
"",
"Los Alamos National Laboratory, Center for Nonlinear Studies"
],
[
"Wang",
"Xidi",
"",
"Citigroup, Sao Paulo, Brasil"
]
]
|
cs/0512055 | Yi-Dong Shen | Yi-Dong Shen and Danny De Schreye | Termination Analysis of General Logic Programs for Moded Queries: A
Dynamic Approach | 24 Pages | null | null | null | cs.LO cs.PL | null | The termination problem of a logic program can be addressed in either a
static or a dynamic way. A static approach performs termination analysis at
compile time, while a dynamic approach characterizes and tests termination of a
logic program by applying a loop checking technique. In this paper, we present
a novel dynamic approach to termination analysis for general logic programs
with moded queries. We address several interesting questions, including how to
formulate an SLDNF-derivation for a moded query, how to characterize an
infinite SLDNF-derivation with a moded query, and how to apply a loop checking
mechanism to cut infinite SLDNF-derivations for the purpose of termination
analysis. The proposed approach is very powerful and useful. It can be used (1)
to test if a logic program terminates for a given concrete or moded query, (2)
to test if a logic program terminates for all concrete or moded queries, and
(3) to find all (most general) concrete/moded queries that are most likely
terminating (or non-terminating).
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 07:09:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"De Schreye",
"Danny",
""
]
]
|
cs/0512056 | Roberto Bagnara | Roberto Bagnara, Andrea Pescetti, Alessandro Zaccagnini, Enea
Zaffanella (University of Parma) | PURRS: Towards Computer Algebra Support for Fully Automatic Worst-Case
Complexity Analysis | 6 pages | null | null | null | cs.MS cs.CC | null | Fully automatic worst-case complexity analysis has a number of applications
in computer-assisted program manipulation. A classical and powerful approach to
complexity analysis consists in formally deriving, from the program syntax, a
set of constraints expressing bounds on the resources required by the program,
which are then solved, possibly applying safe approximations. In several
interesting cases, these constraints take the form of recurrence relations.
While techniques for solving recurrences are known and implemented in several
computer algebra systems, these do not completely fulfill the needs of fully
automatic complexity analysis: they only deal with a somewhat restricted class
of recurrence relations, or sometimes require user intervention, or they are
restricted to the computation of exact solutions that are often so complex to
be unmanageable, and thus useless in practice. In this paper we briefly
describe PURRS, a system and software library aimed at providing all the
computer algebra services needed by applications performing or exploiting the
results of worst-case complexity analyses. The capabilities of the system are
illustrated by means of examples derived from the analysis of programs written
in a domain-specific functional programming language for real-time embedded
systems.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 09:54:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
"",
"University of Parma"
],
[
"Pescetti",
"Andrea",
"",
"University of Parma"
],
[
"Zaccagnini",
"Alessandro",
"",
"University of Parma"
],
[
"Zaffanella",
"Enea",
"",
"University of Parma"
]
]
|
cs/0512059 | Vladimir Vovk | Vladimir Vovk | Competing with wild prediction rules | 28 pages, 3 figures | null | null | null | cs.LG | null | We consider the problem of on-line prediction competitive with a benchmark
class of continuous but highly irregular prediction rules. It is known that if
the benchmark class is a reproducing kernel Hilbert space, there exists a
prediction algorithm whose average loss over the first N examples does not
exceed the average loss of any prediction rule in the class plus a "regret
term" of O(N^(-1/2)). The elements of some natural benchmark classes, however,
are so irregular that these classes are not Hilbert spaces. In this paper we
develop Banach-space methods to construct a prediction algorithm with a regret
term of O(N^(-1/p)), where p is in [2,infty) and p-2 reflects the degree to
which the benchmark class fails to be a Hilbert space.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 20:03:30 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jan 2006 17:36:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
]
|
cs/0512060 | Chiranjeeb Buragohain | Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri | Distributed Navigation Algorithms for Sensor Networks | To Appear in INFOCOM 2006 | null | null | null | cs.NI cs.DC cs.DS | null | We propose efficient distributed algorithms to aid navigation of a user
through a geographic area covered by sensors. The sensors sense the level of
danger at their locations and we use this information to find a safe path for
the user through the sensor field. Traditional distributed navigation
algorithms rely upon flooding the whole network with packets to find an optimal
safe path. To reduce the communication expense, we introduce the concept of a
skeleton graph which is a sparse subset of the true sensor network
communication graph. Using skeleton graphs we show that it is possible to find
approximate safe paths with much lower communication cost. We give tight
theoretical guarantees on the quality of our approximation and by simulation,
show the effectiveness of our algorithms in realistic sensor network
situations.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2005 22:36:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buragohain",
"Chiranjeeb",
""
],
[
"Agrawal",
"Divyakant",
""
],
[
"Suri",
"Subhash",
""
]
]
|
cs/0512062 | Matteo Gagliolo | Juergen Schmidhuber, Matteo Gagliolo, Daan Wierstra, Faustino Gomez | Evolino for recurrent support vector machines | 10 pages, 2 figures | null | null | IDSIA-19-05 version 2.0 | cs.NE | null | Traditional Support Vector Machines (SVMs) need pre-wired finite time windows
to predict and classify time series. They do not have an internal state
necessary to deal with sequences involving arbitrary long-term dependencies.
Here we introduce a new class of recurrent, truly sequential SVM-like devices
with internal adaptive states, trained by a novel method called EVOlution of
systems with KErnel-based outputs (Evoke), an instance of the recent Evolino
class of methods. Evoke evolves recurrent neural networks to detect and
represent temporal dependencies while using quadratic programming/support
vector regression to produce precise outputs. Evoke is the first SVM-based
mechanism learning to classify a context-sensitive language. It also
outperforms recent state-of-the-art gradient-based recurrent neural networks
(RNNs) on various time series prediction tasks.
| [
{
"version": "v1",
"created": "Thu, 15 Dec 2005 15:05:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
],
[
"Gagliolo",
"Matteo",
""
],
[
"Wierstra",
"Daan",
""
],
[
"Gomez",
"Faustino",
""
]
]
|
cs/0512064 | Martin Kutz | Martin Kutz | Computing shortest non-trivial cycles on orientable surfaces of bounded
genus in almost linear time | 13 pages, 7 figures | null | null | null | cs.CG | null | We present an algorithm that computes a shortest non-contractible and a
shortest non-separating cycle on an orientable combinatorial surface of bounded
genus in O(n \log n) time, where n denotes the complexity of the surface. This
solves a central open problem in computational topology, improving upon the
current-best O(n^{3/2})-time algorithm by Cabello and Mohar (ESA 2005). Our
algorithm uses universal-cover constructions to find short cycles and makes
extensive use of existing tools from the field.
| [
{
"version": "v1",
"created": "Thu, 15 Dec 2005 17:02:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kutz",
"Martin",
""
]
]
|
cs/0512070 | Bertrand Nouvel | Bertrand Nouvel (LIP), Eric Remila (LIP) | Incremental and Transitive Discrete Rotations | null | null | null | null | cs.DM cs.GR | null | A discrete rotation algorithm can be apprehended as a parametric application
$f\_\alpha$ from $\ZZ[i]$ to $\ZZ[i]$, whose resulting permutation ``looks
like'' the map induced by an Euclidean rotation. For this kind of algorithm, to
be incremental means to compute successively all the intermediate rotate d
copies of an image for angles in-between 0 and a destination angle. The di
scretized rotation consists in the composition of an Euclidean rotation with a
discretization; the aim of this article is to describe an algorithm whic h
computes incrementally a discretized rotation. The suggested method uses o nly
integer arithmetic and does not compute any sine nor any cosine. More pr
ecisely, its design relies on the analysis of the discretized rotation as a
step function: the precise description of the discontinuities turns to be th e
key ingredient that will make the resulting procedure optimally fast and e
xact. A complete description of the incremental rotation process is provided,
also this result may be useful in the specification of a consistent set of
defin itions for discrete geometry.
| [
{
"version": "v1",
"created": "Fri, 16 Dec 2005 16:12:12 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jan 2006 07:02:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nouvel",
"Bertrand",
"",
"LIP"
],
[
"Remila",
"Eric",
"",
"LIP"
]
]
|
cs/0512071 | Martyn Amos | Jon Timmis, Martyn Amos, Wolfgang Banzhaf and Andy Tyrrell | "Going back to our roots": second generation biocomputing | Submitted to the International Journal of Unconventional Computing | null | null | null | cs.AI cs.NE | null | Researchers in the field of biocomputing have, for many years, successfully
"harvested and exploited" the natural world for inspiration in developing
systems that are robust, adaptable and capable of generating novel and even
"creative" solutions to human-defined problems. However, in this position paper
we argue that the time has now come for a reassessment of how we exploit
biology to generate new computational systems. Previous solutions (the "first
generation" of biocomputing techniques), whilst reasonably effective, are crude
analogues of actual biological systems. We believe that a new, inherently
inter-disciplinary approach is needed for the development of the emerging
"second generation" of bio-inspired methods. This new modus operandi will
require much closer interaction between the engineering and life sciences
communities, as well as a bidirectional flow of concepts, applications and
expertise. We support our argument by examining, in this new light, three
existing areas of biocomputing (genetic programming, artificial immune systems
and evolvable hardware), as well as an emerging area (natural genetic
engineering) which may provide useful pointers as to the way forward.
| [
{
"version": "v1",
"created": "Fri, 16 Dec 2005 16:42:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Timmis",
"Jon",
""
],
[
"Amos",
"Martyn",
""
],
[
"Banzhaf",
"Wolfgang",
""
],
[
"Tyrrell",
"Andy",
""
]
]
|
cs/0512072 | Elias Tsigaridas | Ioannis Z. Emiris and Elias P. Tsigaridas | Computations with one and two real algebraic numbers | null | null | null | null | cs.SC cs.MS | null | We present algorithmic and complexity results concerning computations with
one and two real algebraic numbers, as well as real solving of univariate
polynomials and bivariate polynomial systems with integer coefficients using
Sturm-Habicht sequences.
Our main results, in the univariate case, concern the problems of real root
isolation (Th. 19) and simultaneous inequalities (Cor.26) and in the bivariate,
the problems of system real solving (Th.42), sign evaluation (Th. 37) and
simultaneous inequalities (Cor. 43).
| [
{
"version": "v1",
"created": "Sun, 18 Dec 2005 16:58:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Emiris",
"Ioannis Z.",
""
],
[
"Tsigaridas",
"Elias P.",
""
]
]
|
cs/0512080 | Grigorii Pivovarov | G. B. Pivovarov and S. E. Trunov | EqRank: Theme Evolution in Citation Graphs | 8 pages, 7 figs, 2 tables | null | null | null | cs.DS cs.DL | null | Time evolution of the classification scheme generated by the EqRank algorithm
is studied with hep-th citation graph as an example. Intuitive expectations
about evolution of an adequate classification scheme for a growing set of
objects are formulated. Evolution compliant with these expectations is called
natural. It is demonstrated that EqRank yields a naturally evolving
classification scheme. We conclude that EqRank can be used as a means to detect
new scientific themes, and to track their development.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2005 14:01:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pivovarov",
"G. B.",
""
],
[
"Trunov",
"S. E.",
""
]
]
|
cs/0512081 | Mihai Patrascu | Erik D. Demaine, Friedhelm Meyer auf der Heide, Rasmus Pagh and Mihai
Patrascu | De Dictionariis Dynamicis Pauco Spatio Utentibus | 14 pages. Full version of a paper accepted to LATIN'06 | null | null | null | cs.DS | null | We develop dynamic dictionaries on the word RAM that use asymptotically
optimal space, up to constant factors, subject to insertions and deletions, and
subject to supporting perfect-hashing queries and/or membership queries, each
operation in constant time with high probability. When supporting only
membership queries, we attain the optimal space bound of Theta(n lg(u/n)) bits,
where n and u are the sizes of the dictionary and the universe, respectively.
Previous dictionaries either did not achieve this space bound or had time
bounds that were only expected and amortized. When supporting perfect-hashing
queries, the optimal space bound depends on the range {1,2,...,n+t} of
hashcodes allowed as output. We prove that the optimal space bound is Theta(n
lglg(u/n) + n lg(n/(t+1))) bits when supporting only perfect-hashing queries,
and it is Theta(n lg(u/n) + n lg(n/(t+1))) bits when also supporting membership
queries. All upper bounds are new, as is the Omega(n lg(n/(t+1))) lower bound.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2005 23:01:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"der Heide",
"Friedhelm Meyer auf",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Patrascu",
"Mihai",
""
]
]
|
cs/0512082 | Didier Bert | Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG) | A Fixpoint Semantics of Event Systems with and without Fairness
Assumptions | null | null | null | RR 1081-L LSR 21 | cs.LO | null | We present a fixpoint semantics of event systems. The semantics is presented
in a general framework without concerns of fairness. Soundness and completeness
of rules for deriving "leads-to" properties are proved in this general
framework. The general framework is instantiated to minimal progress and weak
fairness assumptions and similar results are obtained. We show the power of
these results by deriving sufficient conditions for "leads-to" under minimal
progress proving soundness of proof obligations without reasoning over
state-traces.
| [
{
"version": "v1",
"created": "Wed, 21 Dec 2005 08:23:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barradas",
"Hector Ruiz",
"",
"LSR - IMAG"
],
[
"Bert",
"Didier",
"",
"LSR - IMAG"
]
]
|
cs/0512084 | Hanna E. Makaruk | Nikita Sakhanenko, Hanna Makaruk | Understanding physics from interconnected data | 9 pages, 8 figures | null | null | LA-UR-05-5921 | cs.CV | null | Metal melting on release after explosion is a physical system far from
quilibrium. A complete physical model of this system does not exist, because
many interrelated effects have to be considered. General methodology needs to
be developed so as to describe and understand physical phenomena involved.
The high noise of the data, moving blur of images, the high degree of
uncertainty due to the different types of sensors, and the information
entangled and hidden inside the noisy images makes reasoning about the physical
processes very difficult. Major problems include proper information extraction
and the problem of reconstruction, as well as prediction of the missing data.
In this paper, several techniques addressing the first problem are given,
building the basis for tackling the second problem.
| [
{
"version": "v1",
"created": "Wed, 21 Dec 2005 20:23:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sakhanenko",
"Nikita",
""
],
[
"Makaruk",
"Hanna",
""
]
]
|
cs/0512085 | Todd Holloway | Todd Holloway, Miran Bozicevic, Katy B\"orner | Analyzing and Visualizing the Semantic Coverage of Wikipedia and Its
Authors | null | null | null | null | cs.IR | null | This paper presents a novel analysis and visualization of English Wikipedia
data. Our specific interest is the analysis of basic statistics, the
identification of the semantic structure and age of the categories in this free
online encyclopedia, and the content coverage of its highly productive authors.
The paper starts with an introduction of Wikipedia and a review of related
work. We then introduce a suite of measures and approaches to analyze and map
the semantic structure of Wikipedia. The results show that co-occurrences of
categories within individual articles have a power-law distribution, and when
mapped reveal the nicely clustered semantic structure of Wikipedia. The results
also reveal the content coverage of the article's authors, although the roles
these authors play are as varied as the authors themselves. We conclude with a
discussion of major results and planned future work.
| [
{
"version": "v1",
"created": "Wed, 21 Dec 2005 19:31:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Holloway",
"Todd",
""
],
[
"Bozicevic",
"Miran",
""
],
[
"Börner",
"Katy",
""
]
]
|
cs/0512089 | Stephen F. Bush PhD | Stephen F. Bush, Todd Hughes | On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate
Semantic Types | null | SFI Workshop: Resilient and Adaptive Defense of Computing Networks
2003, Santa Fe Institute, Santa Fe, NM, Nov 5-6, 2003 | null | null | cs.NI cs.CR | null | We present progress on the experimental validation of a fundamental and
universally applicable vulnerability analysis framework that is capable of
identifying new types of vulnerabilities before attackers innovate attacks.
This new framework proactively identifies system components that are vulnerable
based upon their Kolmogorov Complexity estimates and it facilitates prediction
of previously unknown vulnerabilities that are likely to be exploited by future
attack methods. A tool that utilizes a growing library of complexity estimators
is presented. This work is an incremental step towards validation of the
concept of complexity-based vulnerability analysis. In particular, results
indicate that data types (semantic types) can be identified by estimates of
their complexity. Thus, a map of complexity can identify suspicious types, such
as executable data embedded within passive data types, without resorting to
predefined headers, signatures, or other limiting a priori information.
| [
{
"version": "v1",
"created": "Thu, 22 Dec 2005 22:02:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Hughes",
"Todd",
""
]
]
|
cs/0512092 | Stephen F. Bush PhD | Stephen F. Bush and Nathan Smith | The Limits of Motion Prediction Support for Ad hoc Wireless Network
Performance | Introduces flash routing | The 2005 International Conference on Wireless Networks (ICWN-05)
Monte Carlo Resort, Las Vegas, Nevada, USA, June 27-30, 2005 | null | null | cs.NI | null | A fundamental understanding of gain provided by motion prediction in wireless
ad hoc routing is currently lacking. This paper examines benefits in routing
obtainable via prediction. A theoretical best-case non-predictive routing model
is quantified in terms of both message overhead and update time for
non-predictive routing. This best- case model of existing routing performance
is compared with predictive routing. Several specific instances of predictive
improvements in routing are examined. The primary contribution of this paper is
quantification of predictive gain for wireless ad hoc routing.
| [
{
"version": "v1",
"created": "Thu, 22 Dec 2005 22:17:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Smith",
"Nathan",
""
]
]
|
cs/0512094 | Stephen F. Bush PhD | Stephen F. Bush | Low-Energy Sensor Network Time Synchronization as an Emergent Property | null | null | null | null | cs.NI | null | The primary contribution of this work is to examine the energy efficiency of
pulse coupled oscillation for time synchronization in a realistic wireless
network environment and to explore the impact of mobility on convergence rate.
Energy coupled oscillation is susceptible to interference; this approach uses
reception and decoding of short packet bursts to eliminate this problem. The
energy efficiency of a commonly used timestamp broadcast algorithm is compared
and contrasted with pulse-coupled oscillation. The emergent pulse coupled
oscillation technique shows greater energy efficiency as well as robustness
with mobility. A proportion of the sensors may be integrated with GPS receivers
in order to obtain a master clock time.
| [
{
"version": "v1",
"created": "Fri, 23 Dec 2005 21:45:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
]
]
|
cs/0512096 | Ralf L\"ammel | Ralf Laemmel | Book review "The Haskell Road to Logic, Maths and Programming" | To appear in the JoLLI journal in 2006 | null | null | null | cs.PL cs.LO | null | The textbook by Doets and van Eijck puts the Haskell programming language
systematically to work for presenting a major piece of logic and mathematics.
The reader is taken through chapters on basic logic, proof recipes, sets and
lists, relations and functions, recursion and co-recursion, the number systems,
polynomials and power series, ending with Cantor's infinities. The book uses
Haskell for the executable and strongly typed manifestation of various
mathematical notions at the level of declarative programming. The book adopts a
systematic but relaxed mathematical style (definition, example, exercise, ...);
the text is very pleasant to read due to a small amount of anecdotal
information, and due to the fact that definitions are fluently integrated in
the running text. An important goal of the book is to get the reader acquainted
with reasoning about programs.
| [
{
"version": "v1",
"created": "Sat, 24 Dec 2005 23:08:25 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jun 2006 00:50:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Laemmel",
"Ralf",
""
]
]
|
cs/0512098 | Dmitry Paukov | Dmitry P. Paukov | Mathematical models of the complex surfaces in simulation and
visualization systems | 8 pages, 4 figures | null | null | null | cs.GR cs.CG | null | Modeling, simulation and visualization of three-dimension complex bodies
widely use mathematical model of curves and surfaces. The most important curves
and surfaces for these purposes are curves and surfaces in Hermite and Bezier
forms, splines and NURBS. Article is devoted to survey this way to use
geometrical data in various computer graphics systems and adjacent fields.
| [
{
"version": "v1",
"created": "Mon, 26 Dec 2005 14:45:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paukov",
"Dmitry P.",
""
]
]
|
cs/0512099 | Mark Burgin | Mark Burgin | Mathematical Models in Schema Theory | null | null | null | null | cs.AI | null | In this paper, a mathematical schema theory is developed. This theory has
three roots: brain theory schemas, grid automata, and block-shemas. In Section
2 of this paper, elements of the theory of grid automata necessary for the
mathematical schema theory are presented. In Section 3, elements of brain
theory necessary for the mathematical schema theory are presented. In Section
4, other types of schemas are considered. In Section 5, the mathematical schema
theory is developed. The achieved level of schema representation allows one to
model by mathematical tools virtually any type of schemas considered before,
including schemas in neurophisiology, psychology, computer science, Internet
technology, databases, logic, and mathematics.
| [
{
"version": "v1",
"created": "Tue, 27 Dec 2005 21:29:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burgin",
"Mark",
""
]
]
|
cs/0512104 | Robert Burger PhD | John Robert Burger | Reversible CAM Processor Modeled After Quantum Computer Behavior | null | null | null | null | cs.AR quant-ph | null | Proposed below is a reversible digital computer modeled after the natural
behavior of a quantum system. Using approaches usually reserved for idealized
quantum computers, the Reversible CAM, or State Vector Parallel (RSVP)
processor can easily find keywords in an unstructured database (that is, it can
solve a needle in a haystack problem). The RSVP processor efficiently solves a
SAT (Satisfiability of Boolean Formulae) problem; also it can aid in the
solution of a GP (Global Properties of Truth Table) problem. The power delay
product of the RSVP processor is exponentially lower than that of a standard
CAM programmed to perform similar operations.
| [
{
"version": "v1",
"created": "Wed, 28 Dec 2005 19:59:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burger",
"John Robert",
""
]
]
|
cs/0601003 | Ruben Vandeginste | Ruben Vandeginste, Bart Demoen | Incremental copying garbage collection for WAM-based Prolog systems | 33 pages, 22 figures, 5 tables. To appear in Theory and Practice of
Logic Programming (TPLP) | null | null | null | cs.PL | null | The design and implementation of an incremental copying heap garbage
collector for WAM-based Prolog systems is presented. Its heap layout consists
of a number of equal-sized blocks. Other changes to the standard WAM allow
these blocks to be garbage collected independently. The independent collection
of heap blocks forms the basis of an incremental collecting algorithm which
employs copying without marking (contrary to the more frequently used mark©
or mark&slide algorithms in the context of Prolog). Compared to standard
semi-space copying collectors, this approach to heap garbage collection lowers
in many cases the memory usage and reduces pause times. The algorithm also
allows for a wide variety of garbage collection policies including generational
ones. The algorithm is implemented and evaluated in the context of hProlog.
| [
{
"version": "v1",
"created": "Mon, 2 Jan 2006 20:58:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vandeginste",
"Ruben",
""
],
[
"Demoen",
"Bart",
""
]
]
|
cs/0601005 | Jinyun Ke | J-Y Ke and Y. Yao | Analyzing language development from a network approach | 22 pages, 12 figures | null | null | null | cs.CL | null | In this paper we propose some new measures of language development using
network analyses, which is inspired by the recent surge of interests in network
studies of many real-world systems. Children's and care-takers' speech data
from a longitudinal study are represented as a series of networks, word forms
being taken as nodes and collocation of words as links. Measures on the
properties of the networks, such as size, connectivity, hub and authority
analyses, etc., allow us to make quantitative comparison so as to reveal
different paths of development. For example, the asynchrony of development in
network size and average degree suggests that children cannot be simply
classified as early talkers or late talkers by one or two measures. Children
follow different paths in a multi-dimensional space. They may develop faster in
one dimension but slower in another dimension. The network approach requires
little preprocessing of words and analyses on sentence structures, and the
characteristics of words and their usage emerge from the network and are
independent of any grammatical presumptions. We show that the change of the two
articles "the" and "a" in their roles as important nodes in the network
reflects the progress of children's syntactic development: the two articles
often start in children's networks as hubs and later shift to authorities,
while they are authorities constantly in the adult's networks. The network
analyses provide a new approach to study language development, and at the same
time language development also presents a rich area for network theories to
explore.
| [
{
"version": "v1",
"created": "Wed, 4 Jan 2006 18:33:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ke",
"J-Y",
""
],
[
"Yao",
"Y.",
""
]
]
|
cs/0601008 | Ben Moszkowski | Ben Moszkowski | A Hierarchical Analysis of Propositional Temporal Logic Based on
Intervals | 64 pages, revised and expanded version of published work. An earlier
version of this appeared in "We Will Show Them: Essays in Honour of Dov
Gabbay on his 60th Birthday", Volume 2. S. Artemov, H. Barringer, A. S.
d'Avila Garcez, L. C. Lamb, and J. Woods (editors.), pages 371-440, College
Publications (formely KCL Publications), King's College, London, 2005,
http://www.collegepublications.co.uk | null | null | null | cs.LO | null | We present a hierarchical framework for analysing propositional linear-time
temporal logic (PTL) to obtain standard results such as a small model property,
decision procedures and axiomatic completeness. Both finite time and infinite
time are considered and one consequent benefit of the framework is the ability
to systematically reduce infinite-time reasoning to finite-time reasoning. The
treatment of PTL with both the operator Until and past time naturally reduces
to that for PTL without either one. Our method utilises a low-level normal form
for PTL called a "transition configuration". In addition, we employ reasoning
about intervals of time. Besides being hierarchical and interval-based, the
approach differs from other analyses of PTL typically based on sets of formulas
and sequences of such sets. Instead we describe models using time intervals
represented as finite and infinite sequences of states. The analysis relates
larger intervals with smaller ones. Steps involved are expressed in
Propositional Interval Temporal Logic (PITL) which is better suited than PTL
for sequentially combining and decomposing formulas. Consequently, we can
articulate issues in PTL model construction of equal relevance in more
conventional analyses but normally only considered at the metalevel. We also
describe a decision procedure based on Binary Decision Diagrams.
| [
{
"version": "v1",
"created": "Thu, 5 Jan 2006 18:35:38 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jan 2006 23:30:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moszkowski",
"Ben",
""
]
]
|
cs/0601010 | Xiaowen Zhang | Xiaowen Zhang, Li Shu, Ke Tang | Multi-Map Orbit Hopping Chaotic Stream Cipher | 9 pages | null | null | null | cs.CR | null | In this paper we propose a multi-map orbit hopping chaotic stream cipher that
utilizes the idea of spread spectrum mechanism for secure digital
communications and fundamental chaos characteristics of mixing, unpredictable,
and extremely sensitive to initial conditions. The design, key and subkeys, and
detail implementation of the system are addressed. A variable number of well
studied chaotic maps form a map bank. And the key determines how the system
hops between multiple orbits, and it also determines the number of maps, the
number of orbits for each map, and the number of sample points for each orbits.
A detailed example is provided.
| [
{
"version": "v1",
"created": "Thu, 5 Jan 2006 21:52:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Zhang",
"Xiaowen",
""
],
[
"Shu",
"Li",
""
],
[
"Tang",
"Ke",
""
]
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.